Sciweavers

Share
2967 search results - page 1 / 594
» Cryptology
Sort
View
CORR
2010
Springer
368views Education» more  CORR 2010»
10 years 6 months ago
Quasigroups in cryptology
It is surveyed known (published) possible application of binary and n-ary quasigroups in cryptology. Mathematics Subject Classification: 20N05, 94A60. Key words and phrases: Crypto...
V. A. Shcherbacov
CRYPTO
2000
Springer
277views Cryptology» more  CRYPTO 2000»
10 years 10 months ago
Almost Independent and Weakly Biased Arrays: Efficient Constructions and Cryptologic Applications
The best known constructions for arrays with low bias are those from [1] and the exponential sum method based on the WeilCarlitz-Uchiyama bound. They all yield essentially the same...
Jürgen Bierbrauer, Holger Schellwat
STACS
2010
Springer
11 years 1 months ago
Mathematics, Cryptology, Security
Abstract. In this talk, I will review some of the work performed by the research community in cryptology and security since the invention of public key cryptography by Diffie and H...
Jacques Stern
WEA
2010
Springer
397views Algorithms» more  WEA 2010»
11 years 24 days ago
A New Combinational Logic Minimization Technique with Applications to Cryptology
Abstract. A new technique for combinational logic optimization is described. The technique is a two-step process. In the first step, the nonlinearity of a circuit – as measured ...
Joan Boyar, René Peralta
books