Algebraic cryptography: new constructions and their security against provable break (Q3079281): Difference between revisions

From MaRDI portal
Import240304020342 (talk | contribs)
Set profile property.
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: Q4526993 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2724419 / rank
 
Normal rank
Property / cites work
 
Property / cites work: An algebraic method for public-key cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Non-Abelian key agreement protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3995823 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Computational Complexity / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum information theory / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4265362 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Matrix Transformation Is Complete for the Average Case / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Boolean function requiring 3n network size / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Worst‐Case to Average‐Case Reductions for NP Problems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Breaking RSA may not be equivalent to factoring / rank
 
Normal rank
Property / cites work
 
Property / cites work: Breaking RSA may be as difficult as factoring / rank
 
Normal rank
Property / cites work
 
Property / cites work: New directions in cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4699284 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptocomplexity and NP-completeness / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3999544 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4314356 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Probabilistic encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Testing shift-equivalence of polynomials by deterministic, probabilistic and quantum machines. / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public-key cryptography and invariant theory / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Complete Public-Key Cryptosystem / rank
 
Normal rank
Property / cites work
 
Property / cites work: Algebraic cryptography: new constructions and their security against provable break / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5465362 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On non-Abelian homomorphic public-key cryptosystems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Homomorphic public-key cryptosystems and encrypting Boolean circuits / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3545322 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4826108 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Robust Combiners for Oblivious Transfer and Other Primitives / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4341710 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4249648 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Feebly Secure Trapdoor Function / rank
 
Normal rank
Property / cites work
 
Property / cites work: Elliptic Curve Cryptosystems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4910741 / rank
 
Normal rank
Property / cites work
 
Property / cites work: One way functions and pseudorandom generators / rank
 
Normal rank
Property / cites work
 
Property / cites work: The tale of one-way functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Introduction to Quantum Computation and Information / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4273608 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Polly Two: a new algebraic polynomial-based public-key scheme / rank
 
Normal rank
Property / cites work
 
Property / cites work: Group-based cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2706552 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4249647 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On lattices, learning with errors, random linear codes, and cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Lattice-Based Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: A method for obtaining digital signatures and public-key cryptosystems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4838154 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4406363 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3762226 / rank
 
Normal rank

Latest revision as of 20:32, 3 July 2024

scientific article
Language Label Description Also known as
English
Algebraic cryptography: new constructions and their security against provable break
scientific article

    Statements

    Algebraic cryptography: new constructions and their security against provable break (English)
    0 references
    2 March 2011
    0 references
    algebraic cryptography
    0 references
    cryptographic primitives
    0 references
    provable break
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references