Security Protocols, Constraint Systems, and Group Theories
From MaRDI portal
Publication:2908488
Recommendations
- Designing key transport protocols using combinatorial group theory
- scientific article; zbMATH DE number 5380257
- Group theoretic cryptography
- An application of group theory in confidential network communications
- Group theory in cryptography
- scientific article; zbMATH DE number 1017514
- Security, Cryptography and Directed Bigraphs
- Cryptographic group actions and applications
Cited in
(4)
This page was built for publication: Security Protocols, Constraint Systems, and Group Theories
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2908488)