94 Information and communication, circuits
94Axx Communication, information
94A60 Cryptography (19 articles)
-
Muanalifah, Any; Sergeev, Sergei:
Modifying the tropical version of Stickel's key exchange protocol.
(English).
Applications of Mathematics,
vol. 65
(2020),
issue 6,
pp. 727-753
-
Farràs, Oriol:
Secret sharing schemes for ports of matroids of rank 3.
(English).
Kybernetika,
vol. 56
(2020),
issue 5,
pp. 903-915
-
Gadiyar, Gopalakrishna Hejmadi; Padma, Ramanathan:
The discrete logarithm problem over prime fields: the safe prime case. The Smart attack, non-canonical lifts and logarithmic derivatives.
(English).
Czechoslovak Mathematical Journal,
vol. 68
(2018),
issue 4,
pp. 1115-1124
-
Kárná, Lucie; Klapka, Štěpán:
Bezpečnostní kódy v železničních zabezpečovacích zařízeních.
(Czech) [Security codes in railway interlocking systems].
Pokroky matematiky, fyziky a astronomie,
vol. 58
(2013),
issue 2,
pp. 100-106
-
Lynnyk, Volodymyr; Čelikovský, Sergej:
On the anti–synchronization detection for the generalized Lorenz system and its applications to secure encryption.
(English).
Kybernetika,
vol. 46
(2010),
issue 1,
pp. 1-18
-
Nan, Jizhu; Qin, Yufang:
Structure of unitary groups over finite group rings and its application.
(English).
Czechoslovak Mathematical Journal,
vol. 60
(2010),
issue 2,
pp. 495-512
-
Fang, Qian; Liu, Ying; Zhao, Xiaoqun:
A chaos-based secure cluster protocol for wireless sensor networks.
(English).
Kybernetika,
vol. 44
(2008),
issue 4,
pp. 522-533
-
Gligoroski, Danilo; Knapskog, Svein Johan:
Edon-$\Cal R (256,384,512)$ -- an efficient implementation of Edon-$\Cal R$ family of cryptographic hash functions.
(English).
Commentationes Mathematicae Universitatis Carolinae,
vol. 49
(2008),
issue 2,
pp. 219-239
-
Yang, Yang; Jin, Chenhui:
A related-key attack on iterated chaotic ciphers.
(English).
Kybernetika,
vol. 44
(2008),
issue 4,
pp. 501-510
-
Mlýnek, Jaroslav:
Informační bezpečnost.
(Czech) [Information security].
Pokroky matematiky, fyziky a astronomie,
vol. 51
(2006),
issue 2,
pp. 89-98
-
Brandstätter, Nina; Winterhof, Arne:
Approximation of the discrete logarithm in finite fields of even characteristic by real polynomials.
(English).
Archivum Mathematicum,
vol. 42
(2006),
issue 1,
pp. 43-50
-
Strauch, Oto:
On distribution functions of sequences generated by scalar and mixed product.
(English).
Mathematica Slovaca,
vol. 53
(2003),
issue 5,
pp. 467-478
-
Zanechal, Marcel:
An algebraic approach to fix points of GOST-algorithm.
(English).
Mathematica Slovaca,
vol. 51
(2001),
issue 5,
pp. 583-591
-
Keedwell, A. D.:
Construction, properties and applications of finite neofields.
(English).
Commentationes Mathematicae Universitatis Carolinae,
vol. 41
(2000),
issue 2,
pp. 283-297
-
Grošek, Otokar:
Remarks concerning RSA-cryptosystem exponents.
(English).
Mathematica Slovaca,
vol. 44
(1994),
issue 2,
pp. 279-285
-
Meletiou, Gerasimos C.:
Explicit form for the discrete logarithm over the field ${\rm GF}(p,k)$.
(English).
Archivum Mathematicum,
vol. 29
(1993),
issue 1,
pp. 25-28
-
Nöbauer, Rupert:
Cryptanalysis of a public-key cryptosystem based on Dickson-polynomials.
(English).
Mathematica Slovaca,
vol. 38
(1988),
issue 4,
pp. 309-323
-
Sahoo, Prasanna K.:
On a generalization of Shannon's random cipher result.
(English).
Kybernetika,
vol. 22
(1986),
issue 5,
pp. 385-392
-
Gabriel, Richard:
Verschlüsselungsabbildungen mit Pseudo-Inversen, Zufallsgeneratoren und Täfelungen.
(German) [Cryptographic mappings with pseudo-inverses, random-number generators and tessellations].
Kybernetika,
vol. 18
(1982),
issue 6,
pp. 485-504