Entity usage

From MaRDI portal

This page lists pages that use the given entity (e.g. Q42). The list is sorted by descending page ID, so that newer pages are listed first.

List of pages that use a given entity

Showing below up to 50 results in range #1 to #50.

View (previous 50 | ) (20 | 50 | 100 | 250 | 500)

  1. Use of the ‘Signature Token’ to Create a Negotiable Document: Label: en
  2. RSA bits are .732 + ε secure: Label: en
  3. Improving the Security of Exponential Key Exchange: Label: en
  4. Some Results on the Information Theoretic Analysis of Cryptosystems: Label: en
  5. Permutation Polynomials in RSA-Cryptosystems: Label: en
  6. A Subexponential-Time Algorithm for Computing Discrete Logarithms over GF(p 2): Label: en
  7. Probabilistic Analysis and Performance Modelling of the ‘Swedish’ Algorithm and Modifications: Label: en
  8. Field Encryption and Authentication: Label: en
  9. On the Security of Compressed Encodings: Label: en
  10. Producing a One-Way Hash Function from DES: Label: en
  11. Analytical Characteristics of the DES: Label: en
  12. A Layered Broadcast Cryptographic System: Label: en
  13. Blind Signature System: Label: en
  14. How to Exchange Half a Bit: Label: en
  15. Reducibility Among Protocols: Label: en
  16. A Simple Protocol for Signing Contracts: Label: en
  17. Signatures Through Approximate Representations by Quadratic Forms: Label: en
  18. Factorization Using the Quadratic Sieve Algorithm: Label: en
  19. Factoring Numbers on the Massively Parallel Computer: Label: en
  20. New Ideas for Factoring Large Integers: Label: en
  21. An Overview of Factoring: Label: en
  22. The Prisoners’ Problem and the Subliminal Channel: Label: en
  23. On the Power of Cascade Ciphers: Label: en
  24. Evaluation of the Adleman Attack on Multiply Iterated Knapsack Cryptosystems: Label: en
  25. Solving Low Density Knapsacks: Label: en
  26. Knapsack Public Key Cryptosystems and Diophantine Approximation: Label: en
  27. RSA Chips (Past/Present/Future) (Extended abstract): Label: en
  28. A New Trapdoor Knapsack Public Key Cryptosystem: Label: en
  29. Non Linear Non Commutative Functions for Data Integrity: Label: en
  30. An Efficient Probabilistic Public-Key Encryption Scheme Which Hides All Partial Information: Label: en
  31. Some Public-Key Crypto-Functions as Intractable as Factorization: Label: en
  32. On Cryptosystems Based on Polynomials and Finite Fields: Label: en
  33. Strong Primes are Easy to Find: Label: en
  34. Algebraical Structures of Cryptographic Transformations: Label: en
  35. Time-Division Multiplexing Scramblers: Selecting Permutations and Testing the System: Label: en
  36. Propagation Characteristics of the DES: Label: en
  37. Fast Cryptanalysis of the Matsumoto-Imai Public Key Scheme: Label: en
  38. RSA-bits are 0.5 + ε secure: Label: en
  39. Linear Ciphers and Random Sequence Generators with Multiple Clocks: Label: en
  40. On the Use of the Binary Multiplying Channel in a Private Communication System: Label: en
  41. Equivocations for Homophonic Ciphers: Label: en
  42. Wire-Tap Channel II: Label: en
  43. Authentication Theory/Coding Theory: Label: en
  44. A Knapsack Type Public Key Cryptosystem Based On Arithmetic in Finite Fields (preliminary draft): Label: en
  45. Security of a Keystream Cipher with Secret Initial Value: Label: en
  46. Fast Computation of Discrete Logarithms in GF (q): Label: en
  47. On the Security of Ping-Pong Protocols: Label: en
  48. A Public-Key Cryptosystem Based on the Matrix Cover NP-Complete Problem: Label: en
  49. On Breaking the Iterated Merkle-Hellman Public-Key Cryptosystem: Label: en
  50. How to Keep a Secret Alive: Label: en

View (previous 50 | ) (20 | 50 | 100 | 250 | 500)