Journal articles on the topic 'Schnorr'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Schnorr.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Franklin, Johanna N. Y. "Hyperimmune-free degrees and Schnorr triviality." Journal of Symbolic Logic 73, no. 3 (September 2008): 999–1008. http://dx.doi.org/10.2178/jsl/1230396761.
Full textDowney, Rodney G., and Evan J. Griffiths. "Schnorr randomness." Journal of Symbolic Logic 69, no. 2 (June 2004): 533–54. http://dx.doi.org/10.2178/jsl/1082418542.
Full textFranklin, Johanna N. Y. "Schnorr triviality and genericity." Journal of Symbolic Logic 75, no. 1 (March 2010): 191–207. http://dx.doi.org/10.2178/jsl/1264433915.
Full textDOWNEY, RODNEY, WOLFGANG MERKLE, and JAN REIMANN. "Schnorr dimension." Mathematical Structures in Computer Science 16, no. 05 (October 2006): 789. http://dx.doi.org/10.1017/s0960129506005469.
Full textFranklin, Johanna N. Y., and Frank Stephan. "Schnorr trivial sets and truth-table reducibility." Journal of Symbolic Logic 75, no. 2 (June 2010): 501–21. http://dx.doi.org/10.2178/jsl/1268917492.
Full textIsnaini, Herdita Fajar, and Karyati Karyati. "Penerapan skema tanda tangan Schnorr pada pembuatan tanda tangan digital." PYTHAGORAS: Jurnal Pendidikan Matematika 12, no. 1 (June 4, 2017): 57. http://dx.doi.org/10.21831/pg.v12i1.11631.
Full textChin, Ji-Jian, Syh-Yuan Tan, Swee-Huay Heng, and Raphael Chung-Wei Phan. "Twin-Schnorr: A Security Upgrade for the Schnorr Identity-Based Identification Scheme." Scientific World Journal 2015 (2015): 1–9. http://dx.doi.org/10.1155/2015/237514.
Full textSaputra, Robi Adi, and Agus Sidiq Purnomo. "Implementasi Algoritma Schnorr Untuk Tanda Tangan Digital." JMAI (Jurnal Multimedia & Artificial Intelligence) 2, no. 1 (February 19, 2018): 21–26. http://dx.doi.org/10.26486/jmai.v2i1.69.
Full textMiyabe, Kenshi. "Reducibilities Relating to Schnorr Randomness." Theory of Computing Systems 58, no. 3 (October 2, 2014): 441–62. http://dx.doi.org/10.1007/s00224-014-9583-3.
Full textFranklin, Johanna N. Y. "Schnorr Trivial Reals: A construction." Electronic Notes in Theoretical Computer Science 167 (January 2007): 79–93. http://dx.doi.org/10.1016/j.entcs.2006.08.008.
Full textFranklin, Johanna N. Y. "Schnorr trivial reals: a construction." Archive for Mathematical Logic 46, no. 7-8 (November 27, 2007): 665–78. http://dx.doi.org/10.1007/s00153-007-0061-3.
Full textRute, Jason. "Schnorr randomness for noncomputable measures." Information and Computation 258 (February 2018): 50–78. http://dx.doi.org/10.1016/j.ic.2017.10.001.
Full textSchiemann, Gottfried. "Ludwig Schnorr von Carolsfeld 1903–1989." Zeitschrift der Savigny-Stiftung für Rechtsgeschichte. Romanistische Abteilung 108, no. 1 (August 1, 1991): 677–79. http://dx.doi.org/10.7767/zrgra.1991.108.1.677.
Full textMiyabe, Kenshi. "Schnorr Triviality and Its Equivalent Notions." Theory of Computing Systems 56, no. 3 (September 29, 2013): 465–86. http://dx.doi.org/10.1007/s00224-013-9506-8.
Full textRupprecht, Nicholas. "Relativized Schnorr tests with universal behavior." Archive for Mathematical Logic 49, no. 5 (May 12, 2010): 555–70. http://dx.doi.org/10.1007/s00153-010-0187-6.
Full textDas, Amitabh, Jean Da Rolt, Santosh Ghosh, Stefaan Seys, Sophie Dupuis, Giorgio Di Natale, Marie-Lise Flottes, Bruno Rouzeyre, and Ingrid Verbauwhede. "Secure JTAG Implementation Using Schnorr Protocol." Journal of Electronic Testing 29, no. 2 (March 24, 2013): 193–209. http://dx.doi.org/10.1007/s10836-013-5369-9.
Full textMuthurajan, Vinothkumar, and Balaji Narayanasamy. "An Elliptic Curve Based Schnorr Cloud Security Model in Distributed Environment." Scientific World Journal 2016 (2016): 1–8. http://dx.doi.org/10.1155/2016/4913015.
Full textGreenberg, Noam, and Joseph S. Miller. "Lowness for Kurtz randomness." Journal of Symbolic Logic 74, no. 2 (June 2009): 665–78. http://dx.doi.org/10.2178/jsl/1243948333.
Full textSavu, Laura. "Signcryption Scheme Based on SCHNORR Digital Signature." International Journal of Peer to Peer Networks 3, no. 1 (January 31, 2012): 139–10. http://dx.doi.org/10.5121/ijp2p.2012.3101.
Full textMao, Xinyu, Jianjun Wu, and Haige Xiang. "Pipeline structure Schnorr-Euchner Sphere Decoding Algorithm." Communications and Network 05, no. 03 (2013): 108–12. http://dx.doi.org/10.4236/cn.2013.53b2021.
Full textElshobaky, Aya, Mohamed Rasslan, and Shawkat Guirguis. "Implementation of Schnorr Signcryption Algorithm on DSP." International Journal of Security and Its Applications 9, no. 11 (November 30, 2015): 217–30. http://dx.doi.org/10.14257/ijsia.2015.9.11.21.
Full textLv, Xin, Zhijian Wang, Feng Qian, and Feng Xu. "Schnorr Ring Signature Scheme with Designated Revocability." Intelligent Automation & Soft Computing 18, no. 6 (January 2012): 739–49. http://dx.doi.org/10.1080/10798587.2012.10643284.
Full textPathak, Noopur, Cristóbal Rojas, and Stephen G. Simpson. "Schnorr randomness and the Lebesgue differentiation theorem." Proceedings of the American Mathematical Society 142, no. 1 (August 27, 2013): 335–49. http://dx.doi.org/10.1090/s0002-9939-2013-11710-7.
Full textFleischhacker, Nils, Tibor Jager, and Dominique Schröder. "On Tight Security Proofs for Schnorr Signatures." Journal of Cryptology 32, no. 2 (February 6, 2019): 566–99. http://dx.doi.org/10.1007/s00145-019-09311-5.
Full textHerranz, Javier. "Attribute-based versions of Schnorr and ElGamal." Applicable Algebra in Engineering, Communication and Computing 27, no. 1 (July 26, 2015): 17–57. http://dx.doi.org/10.1007/s00200-015-0270-7.
Full textNIES, ANDRÉ, and PAUL SHAFER. "RANDOMNESS NOTIONS AND REVERSE MATHEMATICS." Journal of Symbolic Logic 85, no. 1 (September 9, 2019): 271–99. http://dx.doi.org/10.1017/jsl.2019.50.
Full textОнацкий, Алексей Витальевич. "Modification protocols schnorr and okamoto on elliptic curves." Eastern-European Journal of Enterprise Technologies 6, no. 9(66) (December 12, 2013): 14. http://dx.doi.org/10.15587/1729-4061.2013.18734.
Full textKjos-Hanssen, Bjorn, André Nies, and Frank Stephan. "Lowness for the Class of Schnorr Random Reals." SIAM Journal on Computing 35, no. 3 (January 2005): 647–57. http://dx.doi.org/10.1137/s0097539704446323.
Full textWahyudi, Erfan, Muhammad Masjun Efendi, Moh Subli, Ahmad Subki, and Muhammad Rijal Alfian. "PENERAPAN DIGITAL SIGNATURE SCHEME DENGAN METODE SCHNORR AUTHENTICATION." EXPLORE 10, no. 1 (January 10, 2020): 23. http://dx.doi.org/10.35200/explore.v10i1.360.
Full textSavu, Laura. "Combining Public Key Encryption with Schnorr Digital Signature." Journal of Software Engineering and Applications 05, no. 02 (2012): 102–8. http://dx.doi.org/10.4236/jsea.2012.52016.
Full textDowney, Rod, Evan Griffiths, and Geoffrey Laforte. "On Schnorr and computable randomness, martingales, and machines." MLQ 50, no. 6 (October 2004): 613–27. http://dx.doi.org/10.1002/malq.200310121.
Full textMaxwell, Gregory, Andrew Poelstra, Yannick Seurin, and Pieter Wuille. "Simple Schnorr multi-signatures with applications to Bitcoin." Designs, Codes and Cryptography 87, no. 9 (February 2, 2019): 2139–64. http://dx.doi.org/10.1007/s10623-019-00608-x.
Full textK, Kavitha. "Ephemeral Schnorr Signcryption for Secure Data Transaction in Cloud." International Journal of Advanced Trends in Computer Science and Engineering 9, no. 4 (August 25, 2020): 6812–20. http://dx.doi.org/10.30534/ijatcse/2020/381942020.
Full textAl-Zubi, Moath, and Ahmad Adel Abu-Shareha. "Efficient signcryption scheme based on El-Gamal and Schnorr." Multimedia Tools and Applications 78, no. 9 (September 19, 2018): 11091–104. http://dx.doi.org/10.1007/s11042-018-6636-7.
Full textGuo, Z., and P. Nilsson. "Reduced Complexity Schnorr–Euchner Decoding Algorithms for MIMO Systems." IEEE Communications Letters 8, no. 5 (May 2004): 286–88. http://dx.doi.org/10.1109/lcomm.2004.827376.
Full textGhaderipoor, A., and C. Tellambura. "A Statistical Pruning Strategy for Schnorr-Euchner Sphere Decoding." IEEE Communications Letters 12, no. 2 (February 2008): 121–23. http://dx.doi.org/10.1109/lcomm.2008.071518.
Full textSamuel, Michael, and Michael Fitz. "Iterative Sphere Detectors Based on the Schnorr-Euchner Enumeration." IEEE Transactions on Wireless Communications 9, no. 7 (July 2010): 2137–44. http://dx.doi.org/10.1109/twc.2010.07.100258.
Full textBaldus, Christian. "Randolf Schnorr, Die Gemeinschaft nach Bruchteilen (§§ 741-758 BGB)." Zeitschrift der Savigny-Stiftung für Rechtsgeschichte: Germanistische Abteilung 123, no. 1 (August 1, 2006): 831–35. http://dx.doi.org/10.7767/zrgga.2006.123.1.831.
Full textMiyabe, Kenshi. "Truth-table Schnorr randomness and truth-table reducible randomness." Mathematical Logic Quarterly 57, no. 3 (March 7, 2011): 323–38. http://dx.doi.org/10.1002/malq.200910128.
Full textGao, Wei, Fei Li, and Xueli Wang. "Chameleon hash without key exposure based on Schnorr signature." Computer Standards & Interfaces 31, no. 2 (February 2009): 282–85. http://dx.doi.org/10.1016/j.csi.2007.12.001.
Full textKuznetsov, Grigory A. "From Rienzi to Siegfried: Richard Wagner in Search of the Perfect Heldentenor." Observatory of Culture, no. 1 (February 28, 2015): 69–76. http://dx.doi.org/10.25281/2072-3156-2015-0-1-69-76.
Full textLemmermeyer, F. "Václav Šimerka: quadratic forms and factorization." LMS Journal of Computation and Mathematics 16 (2013): 118–29. http://dx.doi.org/10.1112/s1461157013000065.
Full textTerwijn, Sebastiaan A., and Domenico Zambella. "Computational randomness and lowness." Journal of Symbolic Logic 66, no. 3 (September 2001): 1199–205. http://dx.doi.org/10.2307/2695101.
Full textRoddam, Andrew W., and Naomi E. Allen. "Reply to C. Stephan, D. Schnorr, S.A. Loening, K. Jung." European Urology 48, no. 6 (December 2005): 1060–61. http://dx.doi.org/10.1016/j.eururo.2005.08.012.
Full textShao, Zuhua. "Fair exchange protocol of Schnorr signatures with semi-trusted adjudicator." Computers & Electrical Engineering 36, no. 6 (November 2010): 1035–45. http://dx.doi.org/10.1016/j.compeleceng.2010.03.005.
Full textBuss, Sam, and Mia Minnes. "Probabilistic Algorithmic Randomness." Journal of Symbolic Logic 78, no. 2 (June 2013): 579–601. http://dx.doi.org/10.2178/jsl.7802130.
Full textMiller, Joseph S. "Every 2-random real is Kolmogorov random." Journal of Symbolic Logic 69, no. 3 (September 2004): 907–13. http://dx.doi.org/10.2178/jsl/1096901774.
Full textDowney, Rodney G., and Evan J. Griffiths. "Schnorr Randomness1 1Research supported by the Marsden Fund of New Zealand." Electronic Notes in Theoretical Computer Science 66, no. 1 (July 2002): 25–35. http://dx.doi.org/10.1016/s1571-0661(04)80376-1.
Full textKarthikeyan, Madurakavi, and Djagadeesan Saraswady. "Reduced complexity sphere decoding using probabilistic threshold based Schnorr–Euchner enumeration." AEU - International Journal of Electronics and Communications 70, no. 4 (April 2016): 449–55. http://dx.doi.org/10.1016/j.aeue.2016.01.007.
Full textChen, Chin-Ling, and Yong-Yuan Deng. "A secure mobile group buying system based on the concept of spontaneity." Engineering Computations 33, no. 7 (October 3, 2016): 2198–215. http://dx.doi.org/10.1108/ec-08-2015-0228.
Full text