Academic literature on the topic 'Cryptography Algebraic fields'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cryptography Algebraic fields.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cryptography Algebraic fields"
Huque, Md Sirajul, Sk Bhadar Saheb, and Jayaram Boga. "An Approach to Secure Data Aggregation in Wireless Sensor Networks (WSN) using Asymmetric Homomorphic Encryption (Elliptic Curve Cryptography) Scheme." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (2017): 263. http://dx.doi.org/10.23956/ijarcsse/v7i7/0162.
Full textLiu, Qian, and Yujuan Sun. "Several classes of permutation trinomials from Niho exponents over finite fields of characteristic 3." Journal of Algebra and Its Applications 18, no. 04 (2019): 1950069. http://dx.doi.org/10.1142/s0219498819500695.
Full textPing, Yuan, Baocang Wang, Yuehua Yang, and Shengli Tian. "Building Secure Public Key Encryption Scheme from Hidden Field Equations." Security and Communication Networks 2017 (2017): 1–6. http://dx.doi.org/10.1155/2017/9289410.
Full textSokolov, A. V., and O. N. Zhdanov. "THE CLASS OF PERFECT TERNARY ARRAYS." «System analysis and applied information science», no. 2 (August 7, 2018): 47–54. http://dx.doi.org/10.21122/2309-4923-2018-2-47-54.
Full textBuchmann, Johannes, Markus Maurer, and Bodo Möller. "Cryptography based on number fields with large regulator." Journal de Théorie des Nombres de Bordeaux 12, no. 2 (2000): 293–307. http://dx.doi.org/10.5802/jtnb.281.
Full textAbduldaim, Areej M. "Algebraic Verification Algorithm." International Journal of System Modeling and Simulation 3, no. 1 (2018): 7. http://dx.doi.org/10.24178/ijsms.2018.3.1.07.
Full textAwasthi, Ambrish, and Rajendra K. Sharma. "Primitive transformation shift registers over finite fields." Journal of Algebra and Its Applications 18, no. 09 (2019): 1950171. http://dx.doi.org/10.1142/s0219498819501718.
Full textYi, Hai-Bo, Zhe Nie, and Bin Li. "Efficient implementations of Gaussian elimination in finite fields on ASICs for MQ cryptographic systems." Journal of Discrete Mathematical Sciences and Cryptography 21, no. 3 (2018): 797–802. http://dx.doi.org/10.1080/09720529.2018.1449354.
Full textCARANAY, PERLAS C., and RENATE SCHEIDLER. "AN EFFICIENT SEVENTH POWER RESIDUE SYMBOL ALGORITHM." International Journal of Number Theory 06, no. 08 (2010): 1831–53. http://dx.doi.org/10.1142/s1793042110003770.
Full textA. A., Ibrahim. "GCD of Aunu Binary Polynomials of Cardinality Seven Using Extended Euclidean Algorithm." International Journal of Mathematics and Computer Research 09, no. 09 (2021). http://dx.doi.org/10.47191/ijmcr/v9i9.02.
Full textDissertations / Theses on the topic "Cryptography Algebraic fields"
Wilcox, Nicholas. "A Computational Introduction to Elliptic and Hyperelliptic Curve Cryptography." Oberlin College Honors Theses / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=oberlin1528649455201473.
Full textWong, Kenneth Koon-Ho. "Applications of finite field computation to cryptology : extension field arithmetic in public key systems and algebraic attacks on stream ciphers." Queensland University of Technology, 2008. http://eprints.qut.edu.au/17570/.
Full textFerreira, Jamil 1956. "Sobre corpos de funções algébricas e algumas relações com a criptografia." [s.n.], 2013. http://repositorio.unicamp.br/jspui/handle/REPOSIP/306598.
Full textAlexander, Nicholas Charles. "Algebraic Tori in Cryptography." Thesis, University of Waterloo, 2005. http://hdl.handle.net/10012/1154.
Full textCaullery, Florian. "Polynomes sur les corps finis pour la cryptographie." Thesis, Aix-Marseille, 2014. http://www.theses.fr/2014AIXM4013/document.
Full textBaktir, Selcuk. "Efficient algorithms for finite fields, with applications in elliptic curve cryptography." Link to electronic thesis, 2003. http://www.wpi.edu/Pubs/ETD/Available/etd-0501103-132249.
Full textBriggs, Matthew Edward. "An Introduction to the General Number Field Sieve." Thesis, Virginia Tech, 1998. http://hdl.handle.net/10919/36618.
Full textAkleylek, Sedat. "On The Representation Of Finite Fields." Phd thesis, METU, 2010. http://etd.lib.metu.edu.tr/upload/12612727/index.pdf.
Full textAngulo, Rigo Julian Osorio. "Criptografia de curvas elípticas." Universidade Federal de Goiás, 2017. http://repositorio.bc.ufg.br/tede/handle/tede/6976.
Full textFujdiak, Radek. "Analýza a optimalizace datové komunikace pro telemetrické systémy v energetice." Doctoral thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-358408.
Full textBooks on the topic "Cryptography Algebraic fields"
Winterhof, Arne, Harald Niederreiter, Alina Ostafe, and Daniel Panario. Algebraic curves and finite fields: Cryptography and other applications. De Gruyter, 2014.
Find full text1965-, Aubry Yves, Ritzenthaler Christophe 1976-, Zykin Alexey 1984-, and Geocrypt Conference (2011 : Bastia, France), eds. Arithmetic, geometry, cryptography and coding theory: 13th Conference on Arithmetic, Geometry, Cryptography and Coding Theory, March 14-18, 2011, CIRM, Marseille, France : Geocrypt 2011, June 19-24, 2011, Bastia, France. American Mathematical Society, 2012.
Find full textInternational Conference Arithmetic, Geometry, Cryptography and Coding Theory (14th 2013 Marseille, France). Algorithmic arithmetic, geometry, and coding theory: 14th International Conference, Arithmetic, Geometry, Cryptography, and Coding Theory, June 3-7 2013, CIRM, Marseille, France. Edited by Ballet Stéphane 1971 editor, Perret, M. (Marc), 1963- editor, and Zaytsev, Alexey (Alexey I.), 1976- editor. American Mathematical Society, 2015.
Find full textLahyane, Mustapha. Algbra for secure and reliable communication modeling: CIMPA Research School and Conference Algebra for Secure and Reliable Communication Modeling, October 1-13, 2012, Morelia, State of Michoaczn, Mexico. Edited by Martínez-Moro Edgar editor. American Mathematical Society, 2015.
Find full textMyasnikov, Alexei G. Non-commutative cryptography and complexity of group-theoretic problems. American Mathematical Society, 2011.
Find full textShparlinski, Igor E. Finite fields: Theory and computation : the meeting point of number theory, computer science, coding theory, and cryptography. Kluwer Academic Publishers, 1999.
Find full textL, Mullen Gary, Panario Daniel, and Shparlinski Igor E, eds. Finite fields and applications: Eighth International Conference on Finite Fields and Applications, July 9-13, 2007, Melbourne, Australia. American Mathematical Society, 2008.
Find full textL, Mullen Gary, Stichtenoth H. 1944-, and Tapia-Recillas Horacio 1945-, eds. Finite fields with applications to coding theory, cryptography, and related areas: Proceedings of the Sixth International Conference on Finite Fields and Applications, held at Oaxaca, México, May 21-25, 2001. Springer, 2002.
Find full textAlta.) WIN (Conference) (2nd 2011 Banff. Women in Numbers 2: Research directions in number theory : BIRS Workshop, WIN2 - Women in Numbers 2, November 6-11, 2011, Banff International Research Station, Banff, Alberta, Canada. Edited by David Chantal 1964-, Lalín Matilde 1977-, and Manes Michelle 1970-. American Mathematical Society, 2013.
Find full textBook chapters on the topic "Cryptography Algebraic fields"
Petit, Christophe, Michiel Kosters, and Ange Messeng. "Algebraic Approaches for the Elliptic Curve Discrete Logarithm Problem over Prime Fields." In Public-Key Cryptography – PKC 2016. Springer Berlin Heidelberg, 2016. http://dx.doi.org/10.1007/978-3-662-49387-8_1.
Full textAvanzi, Roberto Maria, and Preda Mihăilescu. "Generic Efficient Arithmetic Algorithms for PAFFs (Processor Adequate Finite Fields) and Related Algebraic Structures." In Selected Areas in Cryptography. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24654-1_23.
Full textLasjaunias, Alain. "Continued Fractions for Certain Algebraic Power Series over a Finite Field." In Finite Fields with Applications to Coding Theory, Cryptography and Related Areas. Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/978-3-642-59435-9_17.
Full textLloris Ruiz, Antonio, Encarnación Castillo Morales, Luis Parrilla Roure, Antonio García Ríos, and María José Lloris Meseguer. "Two Galois Fields Cryptographic Applications." In Arithmetic and Algebraic Circuits. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-67266-9_12.
Full textMeyer, Andreas, Stefan Neis, and Thomas Pfahler. "First Implementation of Cryptographic Protocols Based on Algebraic Number Fields." In Information Security and Privacy. Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-47719-5_9.
Full text"Finite Fields and Function Fields." In Algebraic Geometry in Coding Theory and Cryptography. Princeton University Press, 2009. http://dx.doi.org/10.2307/j.ctvdtphcs.4.
Full text"1. Finite Fields and Function Fields." In Algebraic Geometry in Coding Theory and Cryptography. Princeton University Press, 2010. http://dx.doi.org/10.1515/9781400831302-002.
Full textHiggins, Peter M. "6. Algebra and the arithmetic of remainders." In Algebra: A Very Short Introduction. Oxford University Press, 2015. http://dx.doi.org/10.1093/actrade/9780198732822.003.0006.
Full textBolfing, Andreas. "Preliminaries." In Cryptographic Primitives in Blockchain Technology. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780198862840.003.0002.
Full text"Algebraic Number Field." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_1135.
Full text