Srinivasan, Chungath; Pillai, Utkarsh Umesan; Lakshmy, K. V.; Sethumadhavan, M. Cube attack on stream ciphers using a modified linearity test. (English) Zbl 1495.94070 J. Discrete Math. Sci. Cryptography 18, No. 3, 301-311 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{C. Srinivasan} et al., J. Discrete Math. Sci. Cryptography 18, No. 3, 301--311 (2015; Zbl 1495.94070) Full Text: DOI OpenURL
Lokeshwari, G.; Susarla, Sreevidya; Kumar, S. Udaya A modified technique for reliable image encryption method using Merkle-Hellman cryptosystem and RSA algorithm. (English) Zbl 1495.94006 J. Discrete Math. Sci. Cryptography 18, No. 3, 293-300 (2015). MSC: 94A08 94A60 PDF BibTeX XML Cite \textit{G. Lokeshwari} et al., J. Discrete Math. Sci. Cryptography 18, No. 3, 293--300 (2015; Zbl 1495.94006) Full Text: DOI OpenURL
Susarla, Lakshmi Bhavani Madhuri; Kumar, S. Udaya A block cipher using an iterative method involving a permutation. (English) Zbl 1495.94038 J. Discrete Math. Sci. Cryptography 18, No. 3, 275-292 (2015). MSC: 94A55 05A05 PDF BibTeX XML Cite \textit{L. B. M. Susarla} and \textit{S. U. Kumar}, J. Discrete Math. Sci. Cryptography 18, No. 3, 275--292 (2015; Zbl 1495.94038) Full Text: DOI OpenURL
Ramachandran, V.; Sekar, C. One modulo \(N\) gracefulness of supersubdivision of ladder. (English) Zbl 1495.05300 J. Discrete Math. Sci. Cryptography 18, No. 3, 265-274 (2015). MSC: 05C78 PDF BibTeX XML Cite \textit{V. Ramachandran} and \textit{C. Sekar}, J. Discrete Math. Sci. Cryptography 18, No. 3, 265--274 (2015; Zbl 1495.05300) Full Text: DOI OpenURL
Saravanan, K.; Senthilkumar, A. An insight review on Bloom filter and its variants with applications: an emerging hash based membership querying technique. (English) Zbl 1487.68085 J. Discrete Math. Sci. Cryptography 18, No. 3, 247-263 (2015). MSC: 68P05 68M18 PDF BibTeX XML Cite \textit{K. Saravanan} and \textit{A. Senthilkumar}, J. Discrete Math. Sci. Cryptography 18, No. 3, 247--263 (2015; Zbl 1487.68085) Full Text: DOI OpenURL
Khadir, Omar Insecure primitive elements in an ElGamal signature protocol. (English) Zbl 1495.94083 J. Discrete Math. Sci. Cryptography 18, No. 3, 237-245 (2015). MSC: 94A62 94A60 PDF BibTeX XML Cite \textit{O. Khadir}, J. Discrete Math. Sci. Cryptography 18, No. 3, 237--245 (2015; Zbl 1495.94083) Full Text: DOI arXiv OpenURL
Mehan, Vineet; Dhir, Renu; Brar, Yadwinder Singh A novel elliptic curve cryptography based approach of re-watermarking for cheque truncation system. (English) Zbl 1495.94061 J. Discrete Math. Sci. Cryptography 18, No. 3, 219-235 (2015). MSC: 94A60 14G50 PDF BibTeX XML Cite \textit{V. Mehan} et al., J. Discrete Math. Sci. Cryptography 18, No. 3, 219--235 (2015; Zbl 1495.94061) Full Text: DOI OpenURL
Priyadarsini, P. L. K. A survey on some applications of graph theory in cryptography. (English) Zbl 1495.94067 J. Discrete Math. Sci. Cryptography 18, No. 3, 209-217 (2015). MSC: 94A60 05C48 PDF BibTeX XML Cite \textit{P. L. K. Priyadarsini}, J. Discrete Math. Sci. Cryptography 18, No. 3, 209--217 (2015; Zbl 1495.94067) Full Text: DOI OpenURL
Mahalanobis, Ayan The MOR cryptosystem and extra-special \(p\)-groups. (English) Zbl 1495.94059 J. Discrete Math. Sci. Cryptography 18, No. 3, 201-208 (2015). MSC: 94A60 20D15 20D45 PDF BibTeX XML Cite \textit{A. Mahalanobis}, J. Discrete Math. Sci. Cryptography 18, No. 3, 201--208 (2015; Zbl 1495.94059) Full Text: DOI arXiv OpenURL
Feng, Yuming; Li, Benxiu Generalized hyperoperations defined on topological space. (English) Zbl 07509018 J. Discrete Math. Sci. Cryptography 18, No. 3, 195-200 (2015). MSC: 54A05 54H11 PDF BibTeX XML Cite \textit{Y. Feng} and \textit{B. Li}, J. Discrete Math. Sci. Cryptography 18, No. 3, 195--200 (2015; Zbl 07509018) Full Text: DOI OpenURL