scientific article; zbMATH DE number 52794
zbMATH Open0766.11001MaRDI QIDQ4003085FDOQ4003085
Authors: Kenneth H. Rosen
Publication date: 23 January 1993
Title of this publication is not available (Why is that?)
Recommendations
algorithmscomplexitycryptologyelementary number theoryapplications of number theoryhashing functionspublic-key systemsuse of computerssplicing of telephone cables
Computing methodologies and applications (68U99) Analysis of algorithms and problem complexity (68Q25) Cryptography (94A60) Introductory exposition (textbooks, tutorial papers, etc.) pertaining to number theory (11-01) Computational number theory (11Yxx) Elementary number theory (11Axx)
Cited In (20)
- Cardinality of the Ellis semigroup on compact metric countable spaces
- Cryptanalysis of and improvement on the Hwang-Chen multi-proxy multi-signature schemes
- Title not available (Why is that?)
- On the commutative rings with at most two proper subrings
- Few Product Gates But Many Zeros
- The coincidence site lattices in 2D hexagonal lattices using Clifford algebra
- 2is irrational
- A minimal ring extension of a large finite local prime ring is probably ramified
- Title not available (Why is that?)
- Fibonacci order in the period-doubling cascade to chaos
- A traceable group signature scheme.
- Signed digit data hiding scheme
- Conway topograph, \(\operatorname{PGL}_2(\mathbb{Z})\)-dynamics and two-valued groups
- Why the nth-root function is not a rational function
- Key management for Pay-TV broadcast systems in hierarchy
- An N-D cryptoscheme
- Certain towers of ramified minimal ring extensions of commutative rings, II
- Consensus networks with time-delays over finite fields
- A note on factors of generalized Fermat numbers
- Cryptanalysis of a public key system based on Diophantine equations
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4003085)