Cryptography based on transcendental numbers
From MaRDI portal
Publication:6570949
Recommendations
Cites work
- scientific article; zbMATH DE number 3872537 (Why is no real title available?)
- scientific article; zbMATH DE number 3750146 (Why is no real title available?)
- scientific article; zbMATH DE number 3465382 (Why is no real title available?)
- scientific article; zbMATH DE number 3639144 (Why is no real title available?)
- scientific article; zbMATH DE number 486633 (Why is no real title available?)
- Factoring polynomials with rational coefficients
- How to Generate Cryptographically Strong Sequences of Pseudorandom Bits
- Leçons sur la théorie des fonctions. Deuxième édition.
- Polynomial Factorization and Nonrandomness of Bits of Algebraic and Some Transcendental Numbers
This page was built for publication: Cryptography based on transcendental numbers
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6570949)