414 results on '"Shpilrain, Vladimir"'
Search Results
2. Growth in products of matrices: fastest, average, and generic
3. Cayley hashing with cookies
4. MOBS: Matrices Over Bit Strings Public Key Exchange
5. Tropical cryptography III: digital signatures
6. On isomorphisms to a free group and beyond
7. BASS: Boolean Automorphisms Signature Scheme
8. Digital signature schemes using non-square matrices or scrap automorphisms
9. BASS: Boolean Automorphisms Signature Scheme
10. BASS: Boolean Automorphisms Signature Scheme
11. Linear average-case complexity of algorithmic problems in groups
12. MOBS (Matrices Over Bit Strings) public key exchange
13. Average-case complexity of the Whitehead problem for a free group
14. On Single-Server Delegation of RSA
15. MAKE: a Matrix Action Key Exchange
16. Probability theory and public-key cryptography
17. RSA and redactable blockchains
18. Algebraic and quantum attacks on two digital signature schemes
19. On Single-Server Delegation of RSA
20. Tropical cryptography II: extensions by homomorphisms
21. A Survey on Delegated Computation
22. Problems in group theory motivated by cryptography
23. Probabilistic solution of Yao's millionaires' problem
24. MAKE: A matrix action key exchange
25. Secure and Efficient Delegation of Pairings with Online Inputs
26. A Survey on Delegated Computation
27. Digital signature schemes using non-square matrices or scrap automorphisms
28. Probabilistic Solution of Yao’s Millionaires’ Problem
29. Secure and Efficient Delegation of Elliptic-Curve Pairing
30. On two-generator subgroups in SL_2(Z), SL_2(Q), and SL_2(R)
31. Using semidirect product of (semi)groups in public key cryptography
32. Medical Diagnostics Based on Encrypted Medical Data
33. Delegating a Product of Group Exponentiations with Application to Signature Schemes (Submission to Special NutMiC 2019 Issue of JMC)
34. Navigating in the Cayley graph of $SL_2(F_p)$ and applications to hashing
35. A CCA secure cryptosystem using matrices over group rings
36. Yao's millionaires' problem and decoy-based public key encryption by classical physics
37. Secure and Efficient Delegation of Pairings with Online Inputs
38. Efficient and Secure Delegation of Exponentiation in General Groups to a Single Malicious Server
39. Public key exchange using semidirect product of (semi)groups
40. Public Key Exchange Using Matrices Over Group Rings
41. Secrecy without one-way functions
42. Tropical cryptography
43. A Framework for Unconditionally Secure Public-Key Encryption (with Possible Decryption Errors)
44. Private-Key Fully Homomorphic Encryption for Private Classification
45. Efficient and Secure Delegation to a Single Malicious Server: Exponentiation over Non-abelian Groups
46. Private naive bayes classification of personal biomedical data: Application in cancer data analysis
47. A Secret Sharing Scheme Based on Group Presentations and the Word Problem
48. Sublinear time algorithms in the theory of groups and semigroups
49. Authentication from matrix conjugation
50. Search and witness problems in group theory
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.