Sciweavers

Share
3269 search results - page 1 / 654
» Cryptology
Sort
View
CORR
2010
Springer
368views Education» more  CORR 2010»
8 years 7 days ago
Quasigroups in cryptology
It is surveyed known (published) possible application of binary and n-ary quasigroups in cryptology. Mathematics Subject Classification: 20N05, 94A60. Key words and phrases: Crypto...
V. A. Shcherbacov
CRYPTO
2000
Springer
277views Cryptology» more  CRYPTO 2000»
8 years 3 months ago
Almost Independent and Weakly Biased Arrays: Efficient Constructions and Cryptologic Applications
The best known constructions for arrays with low bias are those from [1] and the exponential sum method based on the WeilCarlitz-Uchiyama bound. They all yield essentially the same...
Jürgen Bierbrauer, Holger Schellwat
STACS
2010
Springer
8 years 7 months ago
Mathematics, Cryptology, Security
Abstract. In this talk, I will review some of the work performed by the research community in cryptology and security since the invention of public key cryptography by Diffie and H...
Jacques Stern
books