Introduction to cryptography with coding theory.
From MaRDI portal
Publication:5459264
zbMATH Open1148.94002MaRDI QIDQ5459264FDOQ5459264
Authors: Wade Trappe, Lawrence C. Washington
Publication date: 25 April 2008
Recommendations
Cryptography (94A60) Linear codes (general theory) (94B05) Quantum cryptography (quantum-theoretic aspects) (81P94) Introductory exposition (textbooks, tutorial papers, etc.) pertaining to information and communication theory (94-01)
Cited In (36)
- Secrets of linear feedback shift registers
- Title not available (Why is that?)
- Disjunctivity and other properties of sets of pseudo-bordered words
- Analysis of simplified DES algorithms
- Title not available (Why is that?)
- Title not available (Why is that?)
- Determining whether a given cryptographic function is a permutation of another given cryptographic function -- a problem in intellectual property
- Bézier Coefficients Matrix for ElGamal Elliptic Curve Cryptosystem
- Centralized key distribution protocol using the greatest common divisor method
- Hadamard matrices: insights into their growth factor and determinant computations
- Introduction to cryptography with mathematical foundations and computer implementations.
- New Classes of Codes for Cryptologists and Computer Scientists
- Secure electronic bills of lading: Blind counts and digital signatures
- A Go-Up code construction from linear codes yielding additive codes for quantum stabilizer codes
- Title not available (Why is that?)
- An introduction to cryptography.
- Title not available (Why is that?)
- A POLYNOMIAL DESCRIPTION OF THE RIJNDAEL ADVANCED ENCRYPTION STANDARD
- Title not available (Why is that?)
- Algorithmic Cryptanalysis
- Title not available (Why is that?)
- Public key cryptography and coding theory
- A Simplified IDEA Algorithm
- Basics of secrecy coding
- Coding and cryptography. Synergy for a robust communication
- Coding theory and cryptography
- New directions of modern cryptography
- Comments on: ``How to repair the Hill cipher
- Deciphering an Undergraduate Cryptology Course
- Title not available (Why is that?)
- Title not available (Why is that?)
- EXPLICITLY SIMPLIFYING EVOLVED GENETIC PROGRAMS DURING EVOLUTION
- Fundamentals of cryptology. A professional reference and interactive tutorial. Incl. 1 CD-ROM
- A blind signature-based protocol for tracing traitors
- Semantically restricted argument dependencies
- Introduction to cryptography with Maple
Uses Software
This page was built for publication: Introduction to cryptography with coding theory.
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5459264)