Introduction to cryptography with coding theory.
From MaRDI portal
Publication:5459264
Recommendations
Cited in
(36)- Deciphering an Undergraduate Cryptology Course
- Bézier Coefficients Matrix for ElGamal Elliptic Curve Cryptosystem
- New Classes of Codes for Cryptologists and Computer Scientists
- Public key cryptography and coding theory
- Secrets of linear feedback shift registers
- scientific article; zbMATH DE number 2189154 (Why is no real title available?)
- A POLYNOMIAL DESCRIPTION OF THE RIJNDAEL ADVANCED ENCRYPTION STANDARD
- A Simplified IDEA Algorithm
- Semantically restricted argument dependencies
- Fundamentals of cryptology. A professional reference and interactive tutorial. Incl. 1 CD-ROM
- Introduction to cryptography with Maple
- Introduction to cryptography with mathematical foundations and computer implementations.
- A Go-Up code construction from linear codes yielding additive codes for quantum stabilizer codes
- EXPLICITLY SIMPLIFYING EVOLVED GENETIC PROGRAMS DURING EVOLUTION
- Analysis of simplified DES algorithms
- Basics of secrecy coding
- scientific article; zbMATH DE number 774344 (Why is no real title available?)
- scientific article; zbMATH DE number 7633457 (Why is no real title available?)
- scientific article; zbMATH DE number 1503461 (Why is no real title available?)
- Secure electronic bills of lading: Blind counts and digital signatures
- scientific article; zbMATH DE number 5291988 (Why is no real title available?)
- scientific article; zbMATH DE number 2120360 (Why is no real title available?)
- Algorithmic Cryptanalysis
- An introduction to cryptography.
- scientific article; zbMATH DE number 2132175 (Why is no real title available?)
- Coding and cryptography. Synergy for a robust communication
- Hadamard matrices: insights into their growth factor and determinant computations
- Coding theory and cryptography
- Disjunctivity and other properties of sets of pseudo-bordered words
- Determining whether a given cryptographic function is a permutation of another given cryptographic function -- a problem in intellectual property
- scientific article; zbMATH DE number 810755 (Why is no real title available?)
- scientific article; zbMATH DE number 5521658 (Why is no real title available?)
- Centralized key distribution protocol using the greatest common divisor method
- New directions of modern cryptography
- A blind signature-based protocol for tracing traitors
- Comments on: ``How to repair the Hill cipher
This page was built for publication: Introduction to cryptography with coding theory.
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5459264)