×

Cryptologia

Short Title: Cryptologia
Publisher: Taylor & Francis, Philadelphia, PA; Rose-Hulman Institute of Technology, Terre Haute, IN
ISSN: 0161-1194; 1558-1586/e
Online: http://www.tandfonline.com/loi/ucry20
Comments: Journal; No longer indexed
Documents Indexed: 217 Publications (1978–2012)
References Indexed: 72 Publications with 1,127 References.
all top 5

Authors

7 Levine, Jack
6 van der Meulen, Michael
5 Christensen, Chris
5 Phan, Raphael Chung-Wei
5 Rubin, Frank
4 Hartwig, Robert E.
4 Hwang, Tzonelih
4 Kak, Subhash
3 Alvarez, David
3 Blakley, Bob
3 Blakley, G. R.
3 Buonafalce, Augusto
3 Dawson, Edward
3 Erskine, Ralph
3 Kahn, David M.
3 Lee, Narn-Yih
3 Parakh, Abhishek
3 Sherman, Alan T.
3 Stallings, William
2 Bauer, Craig P.
2 Bury, Jan
2 Carroll, John M.
2 de Leeuw, Karl
2 Deavours, Cipher A.
2 Faurholt, Niels
2 Gillogly, James J.
2 Griffing, Alexander R.
2 Heys, Howard M.
2 Koblitz, Neal I.
2 Li, Chuan-Ming
2 López-Brea Espiau, Francisco Javier
2 Moldovyan, Aleksandr Andreevich
2 Moldovyan, Nikolaĭ Andreevich
2 Reeds, James A.
2 Schaefer, Edward F.
2 Schmeh, Klaus
2 Shepherd, Simon J.
2 Sibert, Olin
2 Soler Fuensanta, José Ramón
2 von zur Gathen, Joachim
2 Wayner, Peter C. jun.
2 Willet, Michael
1 Abe, Takahiro
1 Adler, Jeffrey D.
1 Agard, David
1 Al-Kadi, Ibrahim A.
1 Al-Ubaidy, Mahmood Khalel Ibrahem
1 Albrecht, Martin R.
1 Angelis, Lefteris
1 Assarpour, Ali
1 August, David I.
1 Aumasson, Jean-Philippe
1 Azizi, Abdelmalek
1 Azizi, Mostafa
1 Baldwin, Robert W.
1 Bauer, Friedrich Ludwig
1 Bellovin, Steven M.
1 Bergen, Helen
1 Berkovits, Shimshon
1 Bleris, George L.
1 Boklan, Kent D.
1 Brandstrom, Hugo
1 Brawley, Joel Vincent jun.
1 Brumen, Boštjan
1 Buck, Robert Creighton
1 Burke, Colin
1 Cain, Thomas R.
1 Carter, Frank
1 Carvalho, Carlos André
1 Chan, Wayne S.
1 Chan, Wing On
1 Chandler, Richard Edward
1 Chang, Chin-Chen
1 Chaudhary, Roopika
1 Chin, Yuan-Chung
1 Comstock, I. W.
1 Cooper, Rodney
1 Coppersmith, Don
1 Corcoran, William J.
1 Cowan, Michael J.
1 Das, Manik Lal
1 David, Charles
1 Davies, Donald W.
1 Drea, Edward J.
1 Driskell, Lisa
1 Ertel, Wolfgang
1 Fessler, Joachim
1 Floyd, Denis R.
1 Forsyth, W. S.
1 Foster, Caxton C.
1 Fuoss, Ryan W.
1 Gaddy, David W.
1 Ganesan, Ravi
1 Gladfelter, Suzanne
1 Gladwin, Lee A.
1 Golomb, Solomon Wolf
1 Greenfield, Gary R.
1 Greenough, H. Paul
1 Gu, Dawu
1 Gu, Haihua
...and 133 more Authors

Publications by Year

Citations contained in zbMATH Open

82 Publications have been cited 221 times in 186 Documents Cited by Year
Applications of the Drazin inverse to the Hill cryptographic system. III. Zbl 0491.94015
Hartwig, Robert E.; Levine, Jack
29
1981
On the keyspace of the Hill cipher. Zbl 1325.94133
Overbey, Jeffrey; Traves, William; Wojdylo, Jerzy
12
2005
Applications of the Drazin inverse to the Hill cryptographic system. I. Zbl 0427.94015
Levine, Jack; Hartwig, Robert E.
12
1980
A tutorial on linear and differential cryptanalysis. Zbl 1325.94122
Heys, Howard M.
11
2002
Chosen-key attacks on a block cipher. Zbl 0654.94008
Winternitz, Robert; Hellman, Martin
10
1987
Frank Miller: inventor of the one-time pad. Zbl 1248.94007
Bellovin, Steven M.
8
2011
Origins of cryptology: the Arab contributions. Zbl 0756.01011
Al-Kadi, Ibrahim A.
7
1992
A simplified aes algorithm and its linear and differential cryptanalyses. Zbl 1325.94131
Musa, Mohammad A.; Schaefer, Edward F.; Wedig, Stephen
7
2003
Cryptographic aspects of data compression codes. Zbl 0416.94014
Rubin, Frank
7
1979
A quick glance at quantum cryptography. Zbl 1325.81067
Lomonaco, Samuel J.
4
1999
A self-study course in block-cipher cryptanalysis. Zbl 1325.94002
Schneier, Bruce
4
2000
Some public-key crypto-functions as intractable as factorization. Zbl 0652.94012
Williams, H. C.
4
1985
An extension of Hill cipher using generalised inverses and \(m\)th residue modulo \(n\). Zbl 1325.94142
Thilaka, B.; Rajalakshmi, K.
3
2005
Security of number theoretic public key cryptosystems against random attack. I. Zbl 0432.94014
Blakley, Bob; Blakley, G. R.
3
1978
Security of number theoretic public key cryptosystems against random attack. III. Zbl 0432.94016
Blakley, Bob; Blakley, G. R.
3
1979
Applications of the Drazin inverse to the Hill cryptographic system. IV. Zbl 0491.94016
Hartwig, Robert E.; Levine, Jack
3
1981
Algebraic attacks on the Courtois toy cipher. Zbl 1248.94049
Albrecht, Martin
3
2008
Advanced differential-style cryptanalysis of the NSA’s Skipjack block cipher. Zbl 1216.94047
Kim, Jongsung; Phan, Raphael C.-W.
3
2009
A simplified data encryption standard algorithm. Zbl 0853.94002
Schaefer, Edward F.
3
1996
Public key cryptosystem using a reciprocal number with the same intractability as factoring a large number. Zbl 0654.94010
Kurosawa, Kaoru; Ito, Toshiya; Takeuchi, Masashi
3
1988
A public-key cryptosystem based upon equations over a finite field. Zbl 0537.94014
Brandstrom, Hugo
3
1983
A public key cryptosystem based on complementing sets. Zbl 0752.94010
Webb, William A.
2
1992
Ciphertext-only attack on Akelarre. Zbl 1325.94124
Knudsen, Lars R.; Rijmen, Vincent
2
2000
The whirlpool secure hash function. Zbl 1325.94138
Stallings, William
2
2006
One-time pad cryptography. Zbl 0863.94012
Rubin, Frank
2
1996
Cryptanalysis of knapsack ciphers using genetic algorithms. Zbl 0836.94021
Spillman, Richard
2
1993
A fast method for cryptanalysis of substitution ciphers. Zbl 0833.94016
Jakobsen, Thomas
2
1995
Automated cryptanalysis of XOR plaintext strings. Zbl 0853.94020
Dawson, E.; Nielsen, L.
2
1996
Cryptography as a teaching tool. Zbl 0960.94001
Koblitz, Neal
2
1997
François Viète, father of modern cryptanalysis – two new manuscripts. Zbl 0866.94015
Pesic, Peter
2
1997
Applications of the Drazin inverse to the Hill cryptographic system. II. Zbl 0444.94012
Levine, Jack; Hartwig, Robert E.
2
1980
Factoring via superencryption. Zbl 0503.94020
Berkovits, Shimshon
2
1982
Cryptanalysis of an extension of the Hill cipher. Zbl 1134.94005
Gupta, Indivar; Singh, Jasbir; Chaudhary, Roopika
2
2007
The Voynich manuscript: evidence of the hoax hypothesis. Zbl 1177.94007
Schinner, Andreas
2
2007
Wilhelm Fenner and the development of the German cipher bureau 1922–1939. Zbl 1177.94002
Alvarez, David
2
2007
Instances of Arabic cryptography in Morocco. Zbl 1208.94004
Azizi, Abdelmalek; Azizi, Mostafa
2
2011
Internet voting protocol based on improved implicit security. Zbl 1194.68079
Parakh, Abhishek; Kak, Subhash
2
2010
A ”weak” privacy protocol using the RSA crypto algorithm. Zbl 0537.94013
Simmons, Gustavus J.
2
1983
DES-generated checksums for electronic signatures. Zbl 0512.94006
Mueller-Schloer, Christian
2
1983
Chaos in cryptography: The escape from the strange attractor. Zbl 0746.94012
Carroll, John M.; Verhagen, Jeff; Wong, Perry T.
1
1992
A statistical attack on the running key cipher. Zbl 1325.94114
Bauer, Craig; Tate, Christian N. S.
1
2002
Claude Comiers: the first arithmetical cryptography. Zbl 1325.94007
von zur Gathen, Joachim
1
2003
Watermarking using decimal sequences. Zbl 1325.94127
Mandhani, Navneet; Kak, Subhash
1
2005
Alexis Køhl: a Danish inventor of cryptosystems. Zbl 1325.94006
Faurholt, Niels
1
2006
In memory of Jack Levine (1907-2005). Zbl 1325.94003
Brawley, Joel V.
1
2006
The cycle structure and order of the rail fence cipher. Zbl 1325.94141
Talbert, Robert
1
2006
Solving XOR plaintext strings with the Viterbi algorithm. Zbl 1325.94119
Griffing, Alexander
1
2006
William F. Friedman’s transcription of the Voynich manuscript. Zbl 0816.94001
Reeds, Jim
1
1995
The story of the Hagelin cryptos (edited by David Kahn). Zbl 0831.94002
Hagelin, Boris C. W.
1
1994
Ciphertext-only cryptanalysis of Enigma. Zbl 0853.94007
Gillogly, James J.
1
1995
The two-message problem in the Hill cryptographic system with unknown cipher alphabet. Zbl 0825.94170
Levine, Jack; Chandler, Richard
1
1993
A nonlinear random number generator with known, long cycle length. Zbl 0850.65005
Mitchell, Douglas W.
1
1993
The inclusion-exclusion principle and its applications to cryptography. Zbl 0765.94008
O’Connor, Luke
1
1993
Cobra and other bombes. Zbl 0863.94014
Whitehead, David
1
1996
On factoring Jevons’ number. Zbl 0877.94032
Golomb, Solomon W.
1
1996
The Lorenz cipher machine SZ42. Zbl 0830.94011
Davies, Donald W.
1
1995
Statistical techniques for language recognition: an introduction and guide for cryptanalysts. Zbl 0833.94012
Ganesan, Ravi; Sherman, Alan T.
1
1993
Automated cryptanalysis of substitution ciphers. Zbl 0833.94013
Forsyth, W. S.; Safavi-Naini, R.
1
1993
Divide and conquer attacks on certain classes of stream ciphers. Zbl 0833.94014
Dawson, Ed; Clark, Andrew
1
1994
Enemy codes and their solution. From the archives. Zbl 0834.94003
1
1995
Faded lustre: Vatican cryptography, 1815-1920. Zbl 0853.94003
Alvarez, David
1
1996
Security of number theoretic public key cryptosystems against random attack. II. Zbl 0432.94015
Blakley, Bob; Blakley, G. R.
1
1979
Error-correcting codes and cryptography. I. II. Zbl 0486.94002
Sloane, N. J. A.
1
1982
A generalization of the knapsack algorithm using Galois fields. Zbl 0553.94007
Cooper, Rodney; Patterson, Wayne
1
1984
Cryptanalysis of a hash function based on norm form equations. Zbl 1165.94315
Aumasson, Jean-Philippe
1
2009
Improved related-key attacks on DESX and DESX+. Zbl 1156.94374
Phan, Raphael C.-W.; Shamir, Adi
1
2008
Oblivious transfer based on key exchange. Zbl 1156.94371
Parakh, Abhishek
1
2008
The two-message problem in cipher text autokey. I. Zbl 0416.94012
Levine, Jack; Willet, Michael
1
1979
The two-message problem in cipher text autokey. II. Zbl 0416.94013
Levine, Jack; Willet, Michael
1
1979
Sherlock Holmes in Babylon. Zbl 0502.01002
Buck, R. Creighton
1
1981
Language redundancy and the unicity point. Zbl 0503.94019
Jurgensen, H.
1
1983
SIGABA: Cryptanalysis of the full keyspace. Zbl 1155.94017
Stamp, Mark; Chan, Wing On
1
2007
The multics encipher_algorithm. Zbl 1177.94173
Sibert, Olin; Baldwin, Robert W.
1
2007
Oblivious transfer using elliptic curves. Zbl 1177.94169
Parakh, Abhishek
1
2007
A simplified IDEA algorithm. Zbl 1177.94150
Hoffman, Nick
1
2007
William Dean Wray (1910-1962) the evolution of a cryptanalyst. Zbl 1208.94005
Christensen, Chris; Agard, David
1
2011
Spanish Enigma: A history of the Enigma in Spain. Zbl 1215.01016
Soler Fuensanta, José Ramón; López-Brea Espiau, Francisco Javier; Weierud, Frode
1
2010
Cracking matrix encryption row by row. Zbl 1178.94182
Bauer, Craig; Millward, Katherine
1
2007
On integral distinguishers of Rijndael family of ciphers. Zbl 1312.94080
Minier, Marine; Phan, Raphael C.-W.; Pousse, Benjamin
1
2012
“I shall love you until death” (Marie-Antoinette to Axel von Fersen). Zbl 1193.94061
Patarin, Jacques; Nachef, Valérie
1
2010
Secret codes and online security: a seminar for entering students. Zbl 1193.00026
Koblitz, Neal
1
2010
NIST block cipher modes of operation for confidentiality. Zbl 1193.94066
Stallings, William
1
2010
On integral distinguishers of Rijndael family of ciphers. Zbl 1312.94080
Minier, Marine; Phan, Raphael C.-W.; Pousse, Benjamin
1
2012
Frank Miller: inventor of the one-time pad. Zbl 1248.94007
Bellovin, Steven M.
8
2011
Instances of Arabic cryptography in Morocco. Zbl 1208.94004
Azizi, Abdelmalek; Azizi, Mostafa
2
2011
William Dean Wray (1910-1962) the evolution of a cryptanalyst. Zbl 1208.94005
Christensen, Chris; Agard, David
1
2011
Internet voting protocol based on improved implicit security. Zbl 1194.68079
Parakh, Abhishek; Kak, Subhash
2
2010
Spanish Enigma: A history of the Enigma in Spain. Zbl 1215.01016
Soler Fuensanta, José Ramón; López-Brea Espiau, Francisco Javier; Weierud, Frode
1
2010
“I shall love you until death” (Marie-Antoinette to Axel von Fersen). Zbl 1193.94061
Patarin, Jacques; Nachef, Valérie
1
2010
Secret codes and online security: a seminar for entering students. Zbl 1193.00026
Koblitz, Neal
1
2010
NIST block cipher modes of operation for confidentiality. Zbl 1193.94066
Stallings, William
1
2010
Advanced differential-style cryptanalysis of the NSA’s Skipjack block cipher. Zbl 1216.94047
Kim, Jongsung; Phan, Raphael C.-W.
3
2009
Cryptanalysis of a hash function based on norm form equations. Zbl 1165.94315
Aumasson, Jean-Philippe
1
2009
Algebraic attacks on the Courtois toy cipher. Zbl 1248.94049
Albrecht, Martin
3
2008
Improved related-key attacks on DESX and DESX+. Zbl 1156.94374
Phan, Raphael C.-W.; Shamir, Adi
1
2008
Oblivious transfer based on key exchange. Zbl 1156.94371
Parakh, Abhishek
1
2008
Cryptanalysis of an extension of the Hill cipher. Zbl 1134.94005
Gupta, Indivar; Singh, Jasbir; Chaudhary, Roopika
2
2007
The Voynich manuscript: evidence of the hoax hypothesis. Zbl 1177.94007
Schinner, Andreas
2
2007
Wilhelm Fenner and the development of the German cipher bureau 1922–1939. Zbl 1177.94002
Alvarez, David
2
2007
SIGABA: Cryptanalysis of the full keyspace. Zbl 1155.94017
Stamp, Mark; Chan, Wing On
1
2007
The multics encipher_algorithm. Zbl 1177.94173
Sibert, Olin; Baldwin, Robert W.
1
2007
Oblivious transfer using elliptic curves. Zbl 1177.94169
Parakh, Abhishek
1
2007
A simplified IDEA algorithm. Zbl 1177.94150
Hoffman, Nick
1
2007
Cracking matrix encryption row by row. Zbl 1178.94182
Bauer, Craig; Millward, Katherine
1
2007
The whirlpool secure hash function. Zbl 1325.94138
Stallings, William
2
2006
Alexis Køhl: a Danish inventor of cryptosystems. Zbl 1325.94006
Faurholt, Niels
1
2006
In memory of Jack Levine (1907-2005). Zbl 1325.94003
Brawley, Joel V.
1
2006
The cycle structure and order of the rail fence cipher. Zbl 1325.94141
Talbert, Robert
1
2006
Solving XOR plaintext strings with the Viterbi algorithm. Zbl 1325.94119
Griffing, Alexander
1
2006
On the keyspace of the Hill cipher. Zbl 1325.94133
Overbey, Jeffrey; Traves, William; Wojdylo, Jerzy
12
2005
An extension of Hill cipher using generalised inverses and \(m\)th residue modulo \(n\). Zbl 1325.94142
Thilaka, B.; Rajalakshmi, K.
3
2005
Watermarking using decimal sequences. Zbl 1325.94127
Mandhani, Navneet; Kak, Subhash
1
2005
A simplified aes algorithm and its linear and differential cryptanalyses. Zbl 1325.94131
Musa, Mohammad A.; Schaefer, Edward F.; Wedig, Stephen
7
2003
Claude Comiers: the first arithmetical cryptography. Zbl 1325.94007
von zur Gathen, Joachim
1
2003
A tutorial on linear and differential cryptanalysis. Zbl 1325.94122
Heys, Howard M.
11
2002
A statistical attack on the running key cipher. Zbl 1325.94114
Bauer, Craig; Tate, Christian N. S.
1
2002
A self-study course in block-cipher cryptanalysis. Zbl 1325.94002
Schneier, Bruce
4
2000
Ciphertext-only attack on Akelarre. Zbl 1325.94124
Knudsen, Lars R.; Rijmen, Vincent
2
2000
A quick glance at quantum cryptography. Zbl 1325.81067
Lomonaco, Samuel J.
4
1999
Cryptography as a teaching tool. Zbl 0960.94001
Koblitz, Neal
2
1997
François Viète, father of modern cryptanalysis – two new manuscripts. Zbl 0866.94015
Pesic, Peter
2
1997
A simplified data encryption standard algorithm. Zbl 0853.94002
Schaefer, Edward F.
3
1996
One-time pad cryptography. Zbl 0863.94012
Rubin, Frank
2
1996
Automated cryptanalysis of XOR plaintext strings. Zbl 0853.94020
Dawson, E.; Nielsen, L.
2
1996
Cobra and other bombes. Zbl 0863.94014
Whitehead, David
1
1996
On factoring Jevons’ number. Zbl 0877.94032
Golomb, Solomon W.
1
1996
Faded lustre: Vatican cryptography, 1815-1920. Zbl 0853.94003
Alvarez, David
1
1996
A fast method for cryptanalysis of substitution ciphers. Zbl 0833.94016
Jakobsen, Thomas
2
1995
William F. Friedman’s transcription of the Voynich manuscript. Zbl 0816.94001
Reeds, Jim
1
1995
Ciphertext-only cryptanalysis of Enigma. Zbl 0853.94007
Gillogly, James J.
1
1995
The Lorenz cipher machine SZ42. Zbl 0830.94011
Davies, Donald W.
1
1995
Enemy codes and their solution. From the archives. Zbl 0834.94003
1
1995
The story of the Hagelin cryptos (edited by David Kahn). Zbl 0831.94002
Hagelin, Boris C. W.
1
1994
Divide and conquer attacks on certain classes of stream ciphers. Zbl 0833.94014
Dawson, Ed; Clark, Andrew
1
1994
Cryptanalysis of knapsack ciphers using genetic algorithms. Zbl 0836.94021
Spillman, Richard
2
1993
The two-message problem in the Hill cryptographic system with unknown cipher alphabet. Zbl 0825.94170
Levine, Jack; Chandler, Richard
1
1993
A nonlinear random number generator with known, long cycle length. Zbl 0850.65005
Mitchell, Douglas W.
1
1993
The inclusion-exclusion principle and its applications to cryptography. Zbl 0765.94008
O’Connor, Luke
1
1993
Statistical techniques for language recognition: an introduction and guide for cryptanalysts. Zbl 0833.94012
Ganesan, Ravi; Sherman, Alan T.
1
1993
Automated cryptanalysis of substitution ciphers. Zbl 0833.94013
Forsyth, W. S.; Safavi-Naini, R.
1
1993
Origins of cryptology: the Arab contributions. Zbl 0756.01011
Al-Kadi, Ibrahim A.
7
1992
A public key cryptosystem based on complementing sets. Zbl 0752.94010
Webb, William A.
2
1992
Chaos in cryptography: The escape from the strange attractor. Zbl 0746.94012
Carroll, John M.; Verhagen, Jeff; Wong, Perry T.
1
1992
Public key cryptosystem using a reciprocal number with the same intractability as factoring a large number. Zbl 0654.94010
Kurosawa, Kaoru; Ito, Toshiya; Takeuchi, Masashi
3
1988
Chosen-key attacks on a block cipher. Zbl 0654.94008
Winternitz, Robert; Hellman, Martin
10
1987
Some public-key crypto-functions as intractable as factorization. Zbl 0652.94012
Williams, H. C.
4
1985
A generalization of the knapsack algorithm using Galois fields. Zbl 0553.94007
Cooper, Rodney; Patterson, Wayne
1
1984
A public-key cryptosystem based upon equations over a finite field. Zbl 0537.94014
Brandstrom, Hugo
3
1983
A ”weak” privacy protocol using the RSA crypto algorithm. Zbl 0537.94013
Simmons, Gustavus J.
2
1983
DES-generated checksums for electronic signatures. Zbl 0512.94006
Mueller-Schloer, Christian
2
1983
Language redundancy and the unicity point. Zbl 0503.94019
Jurgensen, H.
1
1983
Factoring via superencryption. Zbl 0503.94020
Berkovits, Shimshon
2
1982
Error-correcting codes and cryptography. I. II. Zbl 0486.94002
Sloane, N. J. A.
1
1982
Applications of the Drazin inverse to the Hill cryptographic system. III. Zbl 0491.94015
Hartwig, Robert E.; Levine, Jack
29
1981
Applications of the Drazin inverse to the Hill cryptographic system. IV. Zbl 0491.94016
Hartwig, Robert E.; Levine, Jack
3
1981
Sherlock Holmes in Babylon. Zbl 0502.01002
Buck, R. Creighton
1
1981
Applications of the Drazin inverse to the Hill cryptographic system. I. Zbl 0427.94015
Levine, Jack; Hartwig, Robert E.
12
1980
Applications of the Drazin inverse to the Hill cryptographic system. II. Zbl 0444.94012
Levine, Jack; Hartwig, Robert E.
2
1980
Cryptographic aspects of data compression codes. Zbl 0416.94014
Rubin, Frank
7
1979
Security of number theoretic public key cryptosystems against random attack. III. Zbl 0432.94016
Blakley, Bob; Blakley, G. R.
3
1979
Security of number theoretic public key cryptosystems against random attack. II. Zbl 0432.94015
Blakley, Bob; Blakley, G. R.
1
1979
The two-message problem in cipher text autokey. I. Zbl 0416.94012
Levine, Jack; Willet, Michael
1
1979
The two-message problem in cipher text autokey. II. Zbl 0416.94013
Levine, Jack; Willet, Michael
1
1979
Security of number theoretic public key cryptosystems against random attack. I. Zbl 0432.94014
Blakley, Bob; Blakley, G. R.
3
1978
all top 5

Cited by 349 Authors

8 Mosić, Dijana
8 Wei, Yimin
5 Stanimirović, Predrag S.
4 Hartwig, Robert E.
3 Azizi, Abdelmalek
3 Fomin, D. B.
3 Jürgensen, Helmut
3 Kak, Subhash
3 Katsikis, Vasilios N.
3 Long, Dongyang
3 Marovt, Janko
3 Phan, Raphael Chung-Wei
3 Salmasizadeh, Mahmoud
2 Aref, Mohammad Reza
2 Azimi, Seyyed Arash
2 Blakley, G. R.
2 Brawley, Joel Vincent jun.
2 Bu, Changjiang
2 Chen, Jianbiao
2 Chen, Jianlong
2 Christensen, Chris
2 Dawson, Edward
2 de Andrade, Antonio Aparecido
2 Deng, Chunyuan
2 Guo, Li
2 Hu, Yupu
2 Jia, Weijia
2 Joye, Marc
2 Kim, Jongsung
2 Koblitz, Neal I.
2 Külekci, Muhammed Oğuzhan
2 Kumar, Manoj
2 Kunze, Michael Hanns Heinrich
2 Kyrchei, Ivan I.
2 Li, Ming
2 Moh, Tzuong-Tsieng
2 Mohajeri, Javad
2 Nishimura, Kazuo
2 Parakh, Abhishek
2 Ranea, Adrián H.
2 Rastëgin, Alekseĭ Èduardovich
2 Razali, Ermaliza
2 Rijmen, Vincent
2 Shah, Tariq
2 Sibuya, Masaaki
2 Wang, Baocang
2 Wang, Zhuo
2 Xu, Zhaoliang
2 Yadav, Tarun
2 Zhang, Daochang
1 Abbas, Mustafa S.
1 Abbasi, Ahmad
1 Abdullah, Rosni
1 Acoltzi-Cervantes, D.
1 Ahmadi, Siavash
1 Akcengiz, Ziya
1 Al-Salih, Ahmed M.
1 Alhamdan, Ali
1 Alkhazragi, Omar
1 Almaymoni, Nawal
1 Almazrooie, Mishal
1 Amandeep
1 Amin, Mohammed Elmustafa
1 Areces, Carlos
1 Azizi, Mostafa
1 Bahar, H. B.
1 Baliarsingh, Alekha Kumar
1 Barrón-Vidales, J.
1 Bartlett, Harry
1 Bauer, Craig P.
1 Bednáriková, Alena
1 Behera, Ratikanta
1 Bellini, Emanuele
1 Bellovin, Steven M.
1 Bérczes, Attila
1 Bevis, Jean H.
1 Bhat, Archana
1 Billore, Vaishali
1 Bjorkman, Beth
1 Bonnetain, Xavier
1 Borges-Quintana, Mijail
1 Borges Trenard, Miguel Ángel
1 Borosh, Itshak
1 Brickenstein, Michael
1 Bruen, Aiden A.
1 Buonafalce, Augusto
1 Burcsi, Péter
1 Burke, Colin
1 Bury, Jan
1 Buzhabadi, Reza
1 Cao, Zhenfu
1 Cassano, Valentín
1 Chan, Wing On
1 Chandrasekhar, C. K.
1 Chaudhary, Roopika
1 Che, Fanting
1 Chen, Guanrong
1 Chen, Shihua
1 Chen, Xiu-Bo
1 Cheng, Leixiao
...and 249 more Authors
all top 5

Cited in 73 Journals

27 Cryptologia
8 Linear Algebra and its Applications
8 Quantum Information Processing
6 Linear and Multilinear Algebra
6 Journal of Discrete Mathematical Sciences & Cryptography
5 Applied Mathematics and Computation
4 Information Sciences
4 Designs, Codes and Cryptography
4 Matematicheskie Voprosy Kriptografii
3 Computers & Mathematics with Applications
3 International Journal of Theoretical Physics
3 Journal of Computational and Applied Mathematics
3 International Journal of Computer Mathematics
3 Rad Hrvatske Akademije Znanosti i Umjetnosti. Matematičke Znanosti
3 Journal of Zhejiang University. Science A
3 Prikladnaya Diskretnaya Matematika
2 Information Processing Letters
2 Journal of Mathematical Analysis and Applications
2 Mathematica Slovaca
2 Acta Applicandae Mathematicae
2 Journal of Cryptology
2 International Journal of Bifurcation and Chaos in Applied Sciences and Engineering
2 Tatra Mountains Mathematical Publications
2 Computational and Applied Mathematics
2 Science in China. Series E
2 Journal of Algebra and its Applications
1 The American Statistician
1 Communications in Algebra
1 Discrete Applied Mathematics
1 Journal of the Franklin Institute
1 Problems of Information Transmission
1 The Mathematical Intelligencer
1 Annals of the Institute of Statistical Mathematics
1 Computing
1 Kybernetika
1 Numerical Functional Analysis and Optimization
1 RAIRO, Informatique Théorique
1 Results in Mathematics
1 Zeitschrift für Wahrscheinlichkeitstheorie und Verwandte Gebiete
1 SIAM Journal on Algebraic and Discrete Methods
1 Bulletin of the Iranian Mathematical Society
1 Journal of the Nigerian Mathematical Society
1 Journal of Symbolic Computation
1 Statistical Science
1 Journal of Computer Science and Technology
1 New Generation Computing
1 Algorithmica
1 Revista Matemática Iberoamericana
1 Applied Mathematics Letters
1 Aequationes Mathematicae
1 RAIRO. Informatique Théorique et Applications
1 Applicable Algebra in Engineering, Communication and Computing
1 The Journal of Analysis
1 Numerical Linear Algebra with Applications
1 The Bulletin of Symbolic Logic
1 Revista Investigación Operacional
1 Mathematical Problems in Engineering
1 Optimization Methods & Software
1 Chaos
1 Lobachevskii Journal of Mathematics
1 Journal of Applied Mathematics and Computing
1 Bulletin of the American Mathematical Society
1 Frontiers of Mathematics in China
1 Journal of Mathematical Cryptology
1 European Journal of Pure and Applied Mathematics
1 Advances and Applications in Discrete Mathematics
1 Algorithms
1 Cryptography and Communications
1 International Journal of Group Theory
1 Annalen der Physik
1 Electronic Journal of Mathematical Analysis and Applications EJMAA
1 Journal of Mathematical Modeling
1 International Journal of Applied and Computational Mathematics

Citations by Year