Author:
Climent Joan-Josep,Navarro Pedro R.,Tortosa Leandro
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Algebra and Number Theory
Reference12 articles.
1. Anshel I., Anshel M., Goldfeld D.: An algebraic method for public-key cryptography. Math. Res. Lett. 6, 1–5 (1999)
2. Bergman G.M.: examples in PI ring theory. Israel J. Math. 18, 257–277 (1974)
3. Boneh D., Lipton R.J.: Quantum cryptanalysis of hidden linear functions. In: Coppersmith, D. (eds) Advances in Cryptology—CRYPT0 ’95 volume 963 Lecture Notes in Computer Science, pp. 424–437. Springer, Berlin (1995)
4. Ko K.H., Lee S.J., Cheon J.H., Han J.W., Kang J.-s., Park C.: New public-key cryptosystem using braid groups. In: Bellare, M. Advances in Cryptology—CRYPTO 2000 volume 1880 of Lecture Notes in Computer Science, pp. 166–183. Springer, Berlin (2000)
5. Lam T.-Y.: A First Curs in Noncommutative Rings Number 131 in Graduate Texts in Mathematics. Springer, New York, NY (2001)
Cited by
15 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献