A graph theoretic method for securing key fobs
From MaRDI portal
Recommendations
Cites work
- A Practical Attack on KeeLoq
- Intersection graphs of ideals of rings
- On the complement of the intersection graph of submodules of a module
- Practical Algebraic Attacks on the Hitag2 Stream Cipher
- The M-Regular Graph of a Commutative Ring
- The \(M\)-intersection graph of ideals of a commutative ring
- The \(M\)-principal graph of a commutative ring
- The annihilating-ideal graph of \(\mathbb{Z}_n\) is weakly perfect
- The graph of subgroups of a finite group
- The intersection graph of ideals of \(\mathbb Z_m\)
- The regular graph of a commutative ring
This page was built for publication: A graph theoretic method for securing key fobs
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2041164)