scientific article; zbMATH DE number 5252113
From MaRDI portal
Publication:5448019
Recommendations
- Cryptological Applications of Permutation Polynomials
- Permutation polynomials in RSA-cryptosystems
- On permutation polynomials over finite fields
- Permutation polynomials over finite fields
- Permutation polynomials over finite fields
- scientific article; zbMATH DE number 426128
- Cryptosystems based on permutation polynomials
- Some permutation polynomials over finite fields and a security key exchange protocol
- Permutation polynomials and a new public-key encryption
- Some permutation polynomials over finite fields
Cited in
(5)- Polynomial permutations on bounded commutative directoids with an antitone involution
- The action of a few random permutations on r-tuples and an application to cryptography
- Locks fit into keys: a crystal analysis of lock polynomials
- Just how hard are rotations of \(\mathbb{Z}^n\)? Algorithms and cryptography with the simplest lattice
- One-way permutations on elliptic curves
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5448019)