Incidence structures applied to cryptography

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Applied Batch Cryptography

. In S. Goldwasser, editor, Advances in Cryptology − CRYPTO ‘88, Springer-Verlag, Vol. 403, LNCS, pp.319-327, 1988.[CP92] D. Chaum and T. Pedersen. Wallet databases with observers (extendedabstract). In E. Brickell, editor, Advances in Cryptology − CRYPTO ‘92, Springer-Verlag, Vol. 740, LNCS, pp.89-105, 1992.[CH91] D. Chaum, and E. Van Heyst. Group Signatures. In D. Davies, editor,<...

متن کامل

N - structures Applied to Graphs

In this paper, we introduce the notion of N -graphs and describe methods of their construction. We prove that the isomorphism between N -graphs is an equivalence relation (resp. partial order relation). We then introduce the concept of N -line graphs and discuss some of their fundamental properties.

متن کامل

Three Novel Theorems for Applied Cryptography

With advancements in computing capabilities public key cryptosystems are going to be more complex yet vulnerable over the modern day‟s computer networks and associated security mechanism, especially those based on novel approaches of applied mathematics. This paper explores three novel theorems derived while studying and implementing RSA algorithm, one of the strongest public key cryptosystem. ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Discrete Mathematics

سال: 1992

ISSN: 0012-365X

DOI: 10.1016/0012-365x(92)90568-z