Ugolini, S. Sequences of irreducible polynomials over odd prime fields via elliptic curve endomorphisms. (English) Zbl 1393.11083 J. Number Theory 152, 21-37 (2015). MSC: 11T06 11G20 PDFBibTeX XMLCite \textit{S. Ugolini}, J. Number Theory 152, 21--37 (2015; Zbl 1393.11083) Full Text: DOI arXiv
Rahimipour, A. R.; Ashrafi, A. R.; Gholami, A. The existence of minimal logarithmic signatures for the sporadic Suzuki and simple Suzuki groups. (English) Zbl 1343.94078 Cryptogr. Commun. 7, No. 4, 535-542 (2015). MSC: 94A60 20D06 20G40 05E15 11T71 PDFBibTeX XMLCite \textit{A. R. Rahimipour} et al., Cryptogr. Commun. 7, No. 4, 535--542 (2015; Zbl 1343.94078) Full Text: DOI
Slinko, Arkadii Algebra for applications. Cryptography, secret sharing, error-correcting, fingerprinting, compression. (English) Zbl 1345.94002 Springer Undergraduate Mathematics Series. Cham: Springer (ISBN 978-3-319-21950-9/pbk; 978-3-319-21951-6/ebook). xiv, 328 p. (2015). Reviewer: Juan Tena Ayuso (Valladolid) MSC: 94-01 00A06 11-01 12-01 20-01 94A60 94Bxx PDFBibTeX XMLCite \textit{A. Slinko}, Algebra for applications. Cryptography, secret sharing, error-correcting, fingerprinting, com\-pression. Cham: Springer (2015; Zbl 1345.94002) Full Text: DOI
Mahalanobis, Ayan Are matrices useful in public-key cryptography? (English) Zbl 1298.94097 Int. Math. Forum 8, No. 37-40, 1939-1953 (2013). MSC: 94A60 15B05 14G50 PDFBibTeX XMLCite \textit{A. Mahalanobis}, Int. Math. Forum 8, No. 37--40, 1939--1953 (2013; Zbl 1298.94097) Full Text: DOI
Korchmáros, Gábor; Nagy, Gábor Péter Lower bounds on the minimum distance in Hermitian one-point differential codes. (English) Zbl 1312.14074 Sci. China, Math. 56, No. 7, 1449-1455 (2013). Reviewer: Marco Calderini (Povo) MSC: 14G50 14H55 11T71 11G20 94B27 PDFBibTeX XMLCite \textit{G. Korchmáros} and \textit{G. P. Nagy}, Sci. China, Math. 56, No. 7, 1449--1455 (2013; Zbl 1312.14074) Full Text: DOI
Korchmáros, Gabor; Nagy, G. P. Hermitian codes from higher degree places. (English) Zbl 1282.14057 J. Pure Appl. Algebra 217, No. 12, 2371-2381 (2013). Reviewer: Marco Calderini (Povo) MSC: 14H55 11T71 11G20 94B27 PDFBibTeX XMLCite \textit{G. Korchmáros} and \textit{G. P. Nagy}, J. Pure Appl. Algebra 217, No. 12, 2371--2381 (2013; Zbl 1282.14057) Full Text: DOI arXiv
Topalova, Svetlana; Zhelezova, Stela On transitive parallelisms of \(\mathrm{PG}(3,4)\). (English) Zbl 1280.51005 Appl. Algebra Eng. Commun. Comput. 24, No. 3-4, 159-164 (2013). MSC: 51E23 05B05 11T71 PDFBibTeX XMLCite \textit{S. Topalova} and \textit{S. Zhelezova}, Appl. Algebra Eng. Commun. Comput. 24, No. 3--4, 159--164 (2013; Zbl 1280.51005) Full Text: DOI
Ugolini, S. Graphs associated with the map \(x\mapsto x+x^{-1}\) in finite fields of characteristic three and five. (English) Zbl 1306.37102 J. Number Theory 133, No. 4, 1207-1228 (2013). MSC: 37P55 05C20 05C25 11T30 37P35 11G20 PDFBibTeX XMLCite \textit{S. Ugolini}, J. Number Theory 133, No. 4, 1207--1228 (2013; Zbl 1306.37102) Full Text: DOI arXiv arXiv
Mahalanobis, Ayan A simple generalization of the ElGamal cryptosystem to non-abelian groups. II. (English) Zbl 1259.94052 Commun. Algebra 40, No. 9, 3583-3596 (2012). MSC: 94A60 20G40 PDFBibTeX XMLCite \textit{A. Mahalanobis}, Commun. Algebra 40, No. 9, 3583--3596 (2012; Zbl 1259.94052) Full Text: DOI arXiv
Kalka, Arkadius; Teicher, Mina; Tsaban, Boaz Short expressions of permutations as products and cryptanalysis of the algebraic eraser. (English) Zbl 1272.94040 Adv. Appl. Math. 49, No. 1, 57-76 (2012). MSC: 94A60 20B30 20B40 PDFBibTeX XMLCite \textit{A. Kalka} et al., Adv. Appl. Math. 49, No. 1, 57--76 (2012; Zbl 1272.94040) Full Text: DOI arXiv
Joyner, David; Kim, Jon-Lark Selected unsolved problems in coding theory. (English) Zbl 1239.94001 Applied and Numerical Harmonic Analysis. Boston, MA: Birkhäuser (ISBN 978-0-8176-8255-2/hbk; 978-0-8176-8256-9/ebook). xi, 200 p. (2011). Reviewer: Carlos Munuera (Valladolid) MSC: 94-02 94B05 94B27 11T71 14G50 PDFBibTeX XMLCite \textit{D. Joyner} and \textit{J.-L. Kim}, Selected unsolved problems in coding theory. Boston, MA: Birkhäuser (2011; Zbl 1239.94001) Full Text: DOI
Gribov, A. B.; Zolotykh, P. A.; Mikhalëv, A. V. A construction of algebraic cryptosystem over the quasigroup ring. (Russian. English summary) Zbl 1469.94100 Mat. Vopr. Kriptografii 1, No. 4, 23-32 (2010). MSC: 94A60 17D99 20N05 PDFBibTeX XMLCite \textit{A. B. Gribov} et al., Mat. Vopr. Kriptografii 1, No. 4, 23--32 (2010; Zbl 1469.94100) Full Text: DOI MNR
Horadam, K. J. Hadamard matrices and their applications: progress 2007–2010. (English) Zbl 1198.15001 Cryptogr. Commun. 2, No. 2, 129-154 (2010). MSC: 15-02 15B34 94A60 PDFBibTeX XMLCite \textit{K. J. Horadam}, Cryptogr. Commun. 2, No. 2, 129--154 (2010; Zbl 1198.15001) Full Text: DOI
González Vasco, María Isabel; Pérez del Pozo, Angel L.; Taborda Duarte, Pedro A note on the security of \(\text{MST} _{3}\). (English) Zbl 1210.94090 Des. Codes Cryptography 55, No. 2-3, 189-200 (2010). MSC: 94A60 20F10 68P25 PDFBibTeX XMLCite \textit{M. I. González Vasco} et al., Des. Codes Cryptography 55, No. 2--3, 189--200 (2010; Zbl 1210.94090) Full Text: DOI
Freyre, P.; Díaz, N.; Morgado, E. R. Fast algorithm for the multiplication of a row vector by a randomly selected matrix \(A\). (English) Zbl 1192.65047 J. Discrete Math. Sci. Cryptography 12, No. 5, 533-549 (2009). Reviewer: Rózsa Horvàth-Bokor (Budapest) MSC: 65F30 15B52 65Y20 94A60 15B33 PDFBibTeX XMLCite \textit{P. Freyre} et al., J. Discrete Math. Sci. Cryptography 12, No. 5, 533--549 (2009; Zbl 1192.65047) Full Text: DOI
Caranti, A.; Dalla Volta, Francesca; Sala, M. An application of the O’Nan-Scott theorem to the group generated by the round functions of an AES-like cipher. (English) Zbl 1174.94011 Des. Codes Cryptography 52, No. 3, 293-301 (2009). Reviewer: Jaak Henno (Tallinn) MSC: 94A60 20B15 20E22 PDFBibTeX XMLCite \textit{A. Caranti} et al., Des. Codes Cryptography 52, No. 3, 293--301 (2009; Zbl 1174.94011) Full Text: DOI arXiv
Cao, Wei Smith normal form of augmented degree matrix and its applications. (English) Zbl 1184.15012 Linear Algebra Appl. 431, No. 10, 1778-1784 (2009). Reviewer: Manouchehr Misaghian (Prairie View) MSC: 15A21 11T24 11C20 15B33 PDFBibTeX XMLCite \textit{W. Cao}, Linear Algebra Appl. 431, No. 10, 1778--1784 (2009; Zbl 1184.15012) Full Text: DOI
Albrecht, Martin Algebraic attacks on the Courtois toy cipher. (English) Zbl 1248.94049 Cryptologia 32, No. 3, 220-276 (2008). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Albrecht}, Cryptologia 32, No. 3, 220--276 (2008; Zbl 1248.94049) Full Text: DOI
Carlip, Walter; Mincheva, Martina Symmetry of iteration graphs. (English) Zbl 1174.05048 Czech. Math. J. 58, No. 1, 131-145 (2008). MSC: 05C20 11T99 PDFBibTeX XMLCite \textit{W. Carlip} and \textit{M. Mincheva}, Czech. Math. J. 58, No. 1, 131--145 (2008; Zbl 1174.05048) Full Text: DOI EuDML Link
Mahalanobis, Ayan A simple generalization of the ElGamal cryptosystem to non-abelian groups. (English) Zbl 1163.94006 Commun. Algebra 36, No. 10, 3878-3889 (2008). MSC: 94A60 20G40 PDFBibTeX XMLCite \textit{A. Mahalanobis}, Commun. Algebra 36, No. 10, 3878--3889 (2008; Zbl 1163.94006) Full Text: DOI arXiv
Charnes, C.; Dempwolff, U.; Pieprzyk, J. The eight variable homogeneous degree three bent functions. (English) Zbl 1147.94010 J. Discrete Algorithms 6, No. 1, 66-72 (2008). MSC: 94A60 PDFBibTeX XMLCite \textit{C. Charnes} et al., J. Discrete Algorithms 6, No. 1, 66--72 (2008; Zbl 1147.94010) Full Text: DOI
Mahalanobis, Ayan The Diffie-Hellman key exchange protocol and non-Abelian nilpotent groups. (English) Zbl 1189.94045 Isr. J. Math. 165, 161-187 (2008). MSC: 94A60 20D15 20D45 PDFBibTeX XMLCite \textit{A. Mahalanobis}, Isr. J. Math. 165, 161--187 (2008; Zbl 1189.94045) Full Text: DOI arXiv
Miri, Ali; Nevins, Monica; Niyomsataya, Terasan Applications of representation theory to wireless communications. (English) Zbl 1148.94006 Des. Codes Cryptography 41, No. 3, 307-318 (2006). MSC: 94A40 PDFBibTeX XMLCite \textit{A. Miri} et al., Des. Codes Cryptography 41, No. 3, 307--318 (2006; Zbl 1148.94006) Full Text: DOI
Heath, Lenwood S.; Loehr, Nicholas A. New algorithms for generating Conway polynomials over finite fields. (English) Zbl 1137.11356 J. Symb. Comput. 38, No. 2, 1003-1024 (2004). MSC: 11T06 11Y16 68W30 PDFBibTeX XMLCite \textit{L. S. Heath} and \textit{N. A. Loehr}, J. Symb. Comput. 38, No. 2, 1003--1024 (2005; Zbl 1137.11356) Full Text: DOI
Bohli, Jens-Matthias; Steinwandt, Rainer; González Vasco, María Isabel; Martínez, Consuelo Weak keys in MST\(_{1}\). (English) Zbl 1114.94006 Des. Codes Cryptography 37, No. 3, 509-524 (2005). MSC: 94A60 20B40 PDFBibTeX XMLCite \textit{J.-M. Bohli} et al., Des. Codes Cryptography 37, No. 3, 509--524 (2005; Zbl 1114.94006) Full Text: DOI
Chen, William Y.-C.; Torney, David C. Equivalence classes of matchings and lattice-square designs. (English) Zbl 1056.05007 Discrete Appl. Math. 145, No. 3, 349-357 (2005). MSC: 05A15 05B30 11T99 20B99 PDFBibTeX XMLCite \textit{W. Y. C. Chen} and \textit{D. C. Torney}, Discrete Appl. Math. 145, No. 3, 349--357 (2005; Zbl 1056.05007) Full Text: DOI
Holmes, P. E. On minimal factorisations of sporadic groups. (English) Zbl 1071.20020 Exp. Math. 13, No. 4, 435-440 (2004). Reviewer: Robert Wilson (London) MSC: 20D08 94A60 20D60 20D40 PDFBibTeX XMLCite \textit{P. E. Holmes}, Exp. Math. 13, No. 4, 435--440 (2004; Zbl 1071.20020) Full Text: DOI Euclid EuDML
González Vasco, María Isabel; Rötteler, Martin; Steinwandt, Rainer On minimal length factorizations of finite groups. (English) Zbl 1047.94014 Exp. Math. 12, No. 1, 1-12 (2003). MSC: 94A62 20D60 20D40 20E32 94A60 PDFBibTeX XMLCite \textit{M. I. González Vasco} et al., Exp. Math. 12, No. 1, 1--12 (2003; Zbl 1047.94014) Full Text: DOI Euclid EuDML
Egner, Sebastian; Johnson, Jeremy; Padua, David; Püschel, Markus; Xiong, Jianxin Automatic derivation and implementation of signal processing algorithms. (English) Zbl 1061.68592 SIGSAM Bull. 35, No. 2, 1-19 (2001). MSC: 68W30 94A12 PDFBibTeX XMLCite \textit{S. Egner} et al., SIGSAM Bull. 35, No. 2, 1--19 (2001; Zbl 1061.68592) Full Text: DOI