Search Results - Symbolic Computing in Algebraic Geometry and Cryptography

  • Showing 1 - 12 results of 12
Refine Results
  1. 1

    Canonical Polymorphisms of Ramsey Structures and the Unique Interpolation Property by Bodirsky, Manuel, Bodor, Bertalan

    Published: IEEE 29.06.2021
    “…Constraint satisfaction problems for first-order reducts of finitely bounded homogeneous structures form a large class of computational problems that might…”
    Get full text
    Conference Proceeding
  2. 2

    A new two-round certificateless authenticated key agreement protocol without bilinear pairings by He, Debiao, Chen, Yitao, Chen, Jianhua, Zhang, Rui, Han, Weiwei

    ISSN: 0895-7177, 1872-9479
    Published: Kidlington Elsevier Ltd 01.12.2011
    Published in Mathematical and computer modelling (01.12.2011)
    “…Certificateless public key cryptography (CLPKC), which can simplify the complex certificate management in the traditional public key cryptography and resolve the key escrow problem in identity-based cryptography, has been widely studied…”
    Get full text
    Journal Article
  3. 3

    A Note on the Complexity of Classical and Intuitionistic Proofs by Baaz, Matthias, Leitsch, Alexander, Reis, Giselle

    ISSN: 1043-6871
    Published: IEEE 01.07.2015
    “…We show an effective cut-free variant of Glivenko's theorem extended to formulas with weak quantifiers (those without eigenvariable conditions): "There is an…”
    Get full text
    Conference Proceeding
  4. 4
  5. 5
  6. 6
  7. 7

    Assessing the effectiveness of artificial neural networks on problems related to elliptic curve cryptography by Laskari, E.C., Meletiou, G.C., Stamatiou, Y.C., Tasoulis, D.K., Vrahatis, M.N.

    ISSN: 0895-7177, 1872-9479
    Published: Oxford Elsevier Ltd 01.07.2007
    Published in Mathematical and computer modelling (01.07.2007)
    “…Cryptographic systems based on elliptic curves have been introduced as an alternative to conventional public key cryptosystems. The security of both kinds of…”
    Get full text
    Journal Article Conference Proceeding
  8. 8

    Explicit bounds of polynomial coefficients and counting points on Picard curves over finite fields by Sohn, Gyoyong, Kim, Hoil

    ISSN: 0895-7177, 1872-9479
    Published: Kidlington Elsevier Ltd 2009
    “…In this paper, we describe an algorithm for computing the order of the Jacobian varieties of Picard curves over finite fields…”
    Get full text
    Journal Article
  9. 9

    Discrete Gaussian measures and new bounds of the smoothing parameter for lattices by Zheng, Zhongxiang, Zhao, Chunhuan, Xu, Guangwu

    ISSN: 0938-1279, 1432-0622
    Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.11.2021
    “…In this paper, we start with a discussion of discrete Gaussian measures on lattices. Several results of Banaszczyk are analyzed, a simple form of uncertainty…”
    Get full text
    Journal Article
  10. 10

    A new construction of two-, three- and few-weight codes via our GU codes and their applications by Eddie, Arrieta A, Janwa, Heeralal

    ISSN: 0938-1279, 1432-0622
    Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.12.2022
    “…Linear codes with few weights have applications in cryptography, association schemes, designs, strongly regular graphs, finite group theory, finite geometries, and secret sharing schemes, among other disciplines…”
    Get full text
    Journal Article
  11. 11

    Solving sparse polynomial systems using Groebner bases and resultants by Bender, Matías R

    ISSN: 2331-8422
    Published: Ithaca Cornell University Library, arXiv.org 19.05.2022
    Published in arXiv.org (19.05.2022)
    “… Since Buchberger's algorithm for computing Gr\"obner bases in the 60s, there has been a lot of progress in this domain…”
    Get full text
    Paper
  12. 12

    Quantum-Resistant Key Generation Using QBLH Geometric Structures and Tetrahedral Trinary Encoding: A Novel Approach in Post-Quantum Cryptography by Andris lukss

    ISSN: 2581-9615, 2581-9615
    Published: 30.08.2025
    “…The dawn of the disruptive quantum computing scenario marks a serious threat to the existence of traditional cryptosystems…”
    Get full text
    Journal Article