Incidence structures applied to cryptography
نویسندگان
چکیده
منابع مشابه
Applied Batch Cryptography
. In S. Goldwasser, editor, Advances in Cryptology − CRYPTO ‘88, Springer-Verlag, Vol. 403, LNCS, pp.319-327, 1988.[CP92] D. Chaum and T. Pedersen. Wallet databases with observers (extendedabstract). In E. Brickell, editor, Advances in Cryptology − CRYPTO ‘92, Springer-Verlag, Vol. 740, LNCS, pp.89-105, 1992.[CH91] D. Chaum, and E. Van Heyst. Group Signatures. In D. Davies, editor,<...
متن کاملN - structures Applied to Graphs
In this paper, we introduce the notion of N -graphs and describe methods of their construction. We prove that the isomorphism between N -graphs is an equivalence relation (resp. partial order relation). We then introduce the concept of N -line graphs and discuss some of their fundamental properties.
متن کاملThree Novel Theorems for Applied Cryptography
With advancements in computing capabilities public key cryptosystems are going to be more complex yet vulnerable over the modern day‟s computer networks and associated security mechanism, especially those based on novel approaches of applied mathematics. This paper explores three novel theorems derived while studying and implementing RSA algorithm, one of the strongest public key cryptosystem. ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Discrete Mathematics
سال: 1992
ISSN: 0012-365X
DOI: 10.1016/0012-365x(92)90568-z