Works matching IS 18622976 AND DT 2009 AND VI 3 AND IP 3
Results: 9
On the density of some special primes.
- Published in:
- Journal of Mathematical Cryptology, 2009, v. 3, n. 3, p. 265, doi. 10.1515/JMC.2009.016
- By:
- Publication type:
- Article
Foreword. Second Workshop on Mathematical Cryptology.
- Published in:
- Journal of Mathematical Cryptology, 2009, v. 3, n. 3, p. 175, doi. 10.1515/JMC.2009.008a
- By:
- Publication type:
- Article
On solving norm equations in global function fields.
- Published in:
- Journal of Mathematical Cryptology, 2009, v. 3, n. 3, p. 237, doi. 10.1515/JMC.2009.014
- By:
- Publication type:
- Article
Numerical solvers and cryptanalysis.
- Published in:
- Journal of Mathematical Cryptology, 2009, v. 3, n. 3, p. 249, doi. 10.1515/JMC.2009.015
- By:
- Publication type:
- Article
Cryptanalysing the critical group: efficiently solving Biggs's discrete logarithm problem.
- Published in:
- Journal of Mathematical Cryptology, 2009, v. 3, n. 3, p. 199, doi. 10.1515/JMC.2009.010
- By:
- Publication type:
- Article
𝑘-error linear complexity over <sub> p</sub> of subsequences of Sidelnikov sequences of period ( p<sup>r</sup> - 1)/3.
- Published in:
- Journal of Mathematical Cryptology, 2009, v. 3, n. 3, p. 215, doi. 10.1515/JMC.2009.012
- By:
- Publication type:
- Article
Some remarks on FCSRs and implications for stream ciphers.
- Published in:
- Journal of Mathematical Cryptology, 2009, v. 3, n. 3, p. 227, doi. 10.1515/JMC.2009.013
- By:
- Publication type:
- Article
Hybrid approach for solving multivariate systems over finite fields.
- Published in:
- Journal of Mathematical Cryptology, 2009, v. 3, n. 3, p. 177, doi. 10.1515/JMC.2009.009
- By:
- Publication type:
- Article
Algebraic attack on NTRU using Witt vectors and Gröbner bases.
- Published in:
- Journal of Mathematical Cryptology, 2009, v. 3, n. 3, p. 205, doi. 10.1515/JMC.2009.011
- By:
- Publication type:
- Article