An application of algebraic geometry to encryption: tame transformation method (Q1884054): Difference between revisions

From MaRDI portal
Importer (talk | contribs)
Created a new Item
 
ReferenceBot (talk | contribs)
Changed an Item
 
(4 intermediate revisions by 3 users not shown)
Property / author
 
Property / author: Tzuong-tsieng Moh / rank
Normal rank
 
Property / reviewed by
 
Property / reviewed by: Q189407 / rank
Normal rank
 
Property / author
 
Property / author: Tzuong-tsieng Moh / rank
 
Normal rank
Property / reviewed by
 
Property / reviewed by: Richard A. Mollin / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4097032 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Jacobian conjecture: Reduction of degree and formal expansion of the inverse / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5550483 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A PUBLIC-KEY CRYPTOSYSTEM BASED UPON EQUATIONS OVER A FINITE FIELD / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Algorithms for Manipulating Formal Power Series / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3139838 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3374924 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constructing roadmaps of semi-algebraic sets. I: Completeness / rank
 
Normal rank
Property / cites work
 
Property / cites work: The inverse of an automorphism in polynomial time / rank
 
Normal rank
Property / cites work
 
Property / cites work: Functional decomposition of polynomials: the tame case / rank
 
Normal rank
Property / cites work
 
Property / cites work: Functional decomposition of polynomials: the wild case / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2707400 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5818521 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Cryptosystems Based on Polynomials and Finite Fields / rank
 
Normal rank
Property / cites work
 
Property / cites work: A public key system with signature and master key functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4063564 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4314373 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4343439 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms / rank
 
Normal rank
Property / cites work
 
Property / cites work: A method for obtaining digital signatures and public-key cryptosystems / rank
 
Normal rank
links / mardi / namelinks / mardi / name
 

Latest revision as of 13:43, 7 June 2024

scientific article
Language Label Description Also known as
English
An application of algebraic geometry to encryption: tame transformation method
scientific article

    Statements

    An application of algebraic geometry to encryption: tame transformation method (English)
    0 references
    25 October 2004
    0 references
    The author employs the notion of tame transformations to produce a public-key cryptosystem having algebraic geometric notions at its foundation. Unfortunately, the paper suffers for rather poor use of the English language.
    0 references
    tame ramification
    0 references
    public-key cipher
    0 references
    cryptology
    0 references
    error detection
    0 references
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references