We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 302 results
  1. Using General Large Language Models to Classify Mathematical Documents

    In this article we report on an initial exploration to assess the viability of using the general large language models (LLMs), recently made public,...
    Patrick D. F. Ion, Stephen M. Watt in Intelligent Computer Mathematics
    Conference paper 2024
  2. On One-Way Ring Homomorphisms

    In this paper, we propose a new candidate for a one-way ring homomorphism induced by a one-way (non-Abelian) group homomorphism. A multi-party...

    N. Inassaridze, M. Khazaradze, ... B. Mesablishvili in Journal of Mathematical Sciences
    Article 17 October 2023
  3. Lattice-Based Cryptography: A Survey

    Most of current public key cryptosystems would be vulnerable to the attacks of the future quantum computers. Post-quantum cryptography offers...

    Xiaoyun Wang, Guangwu Xu, Yang Yu in Chinese Annals of Mathematics, Series B
    Article 30 November 2023
  4. A novel threshold changeable secret sharing scheme

    A ( t, n ) threshold secret sharing scheme is a fundamental tool in many security applications such as cloud computing and multiparty computing. In...

    Lein Harn, Chingfang Hsu, Zhe Xia in Frontiers of Computer Science
    Article 08 October 2021
  5. On those Boolean functions that are coset leaders of first order Reed-Muller codes

    In this paper, we study the class of those Boolean functions that are coset leaders of first order Reed-Muller codes. We study their properties and...

    Claude Carlet, Serge Feukoua in Annals of Mathematics and Artificial Intelligence
    Article 25 April 2023
  6. New Constructions of Orbit Codes Based on the Operations of Orbit Codes

    An orbit code is a special constant dimension subspace code, which is an orbit of a subgroup of a general linear group acting on the set of all...

    Shang-di Chen, Jun-ying Liang in Acta Mathematicae Applicatae Sinica, English Series
    Article 01 October 2020
  7. A New Encoding Algorithm for a Multidimensional Version of the Montgomery Ladder

    We propose a new encoding algorithm for the simultaneous differential multidimensional scalar point multiplication algorithm d-MUL. Previous...
    Aaron Hutchinson, Koray Karabina in Progress in Cryptology - AFRICACRYPT 2020
    Conference paper 2020
  8. Modifying the Tropical Version of Stickel’s Key Exchange Protocol

    A tropical version of Stickel’s key exchange protocol was suggested by Grigoriev and Shpilrain (2014) and successfully attacked by Kotov and Ushakov...

    Any Muanalifah, Sergeĭ Sergeev in Applications of Mathematics
    Article 27 October 2020
  9. Enhancing an Attack to DSA Schemes

    In this paper, we improve the theoretical background of the attacks on the DSA schemes of a previous paper, and we present some new more practical...
    Marios Adamoudis, Konstantinos A. Draziotis, Dimitrios Poulakis in Algebraic Informatics
    Conference paper 2019
  10. Expander-Based Cryptography Meets Natural Proofs

    We introduce new forms of attack on expander-based cryptography , and in particular on Goldreich’s pseudorandom generator and one-way function. Our...

    Igor C. Oliveira, Rahul Santhanam, Roei Tell in computational complexity
    Article 16 March 2022
  11. On Time-Space Tradeoffs for Bounded-Length Collisions in Merkle-Damgård Hashing

    We study the power of preprocessing adversaries in finding bounded-length collisions in the widely used Merkle-Damgård (MD) hashing in the random...

    Ashrujit Ghoshal, Ilan Komargodski in computational complexity
    Article 13 September 2023
  12. Pairing-Based Cryptography on Elliptic Curves

    We give a brief overview of a recent branch of Public Key Cryptography, the so called Pairing-based Cryptography or Identity-based Cryptography. We...

    Josep M. Miret, Daniel Sadornil, Juan G. Tena in Mathematics in Computer Science
    Article 27 June 2018
  13. The Discrete Logarithm Problem Over Prime Fields: The Safe Prime Case. The Smart Attack, Non-Canonical Lifts and Logarithmic Derivatives

    We connect the discrete logarithm problem over prime fields in the safe prime case to the logarithmic derivative.

    Hejmadi Gopalakrishna Gadiyar, Ramanathan Padma in Czechoslovak Mathematical Journal
    Article 14 February 2018
  14. Boolean Functions: Degree and Support

    In this paper we establish some properties about Boolean functions that allow us to relate their degree and their support. These properties allow us...

    Joan-Josep Climent, Francisco J. García, Verónica Requena in Mathematics in Computer Science
    Article 27 June 2018
  15. On the Relationship Between Statistical Zero-Knowledge and Statistical Randomized Encodings

    Statistical Zero-knowledge proofs (Goldwasser et al . in SICOMP: SIAM J Comput, 1989 ) allow a computationally unbounded server to convince a...

    Benny Applebaum, Pavel Raykov in computational complexity
    Article 20 August 2018
  16. Constructions for key distribution patterns

    Key distribution patterns (KDPs) are finite incidence structures satisfying a certain property which makes them widely used in minimizing the key...

    Shangdi Chen, Huihui Wei in Frontiers of Mathematics in China
    Article 23 November 2016
  17. On the GF(p) linear complexity of Hall’s sextic sequences and some cyclotomic-set-based sequences

    Klapper (1994) showed that there exists a class of geometric sequences with the maximal possible linear complexity when considered as sequences over GF ...

    Xianmang He, Liqin Hu, Dong Li in Chinese Annals of Mathematics, Series B
    Article 29 June 2016
  18. Construction of balanced Boolean functions with high nonlinearity, good local and global avalanche characteristics

    Boolean functions possessing multiple cryptographic criteria play an important role in the design of symmetric cryptosystems. The following criteria...

    Luyang Li, Yujuan Sun, Weiguo Zhang in Frontiers of Mathematics in China
    Article 07 March 2016
  19. Scientometric dimensions of cryptographic research

    Information security has been a crucial issue in modern information management; thus cryptographic techniques have become inevitable to safeguard...

    Jiban K. Pal in Scientometrics
    Article 23 August 2015
Did you find what you were looking for? Share feedback.