Author:
Kamal Abdel Alim,Youssef Amr M.
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Algebra and Number Theory
Reference15 articles.
1. Climent J.J., Navarro P.R., Tortosa L.: On the arithmetic of the endomorphisms ring $${End(\mathbb{Z}_p \times Z_p^2)}$$ . Appl. Algebra Eng. Commun. Comput. 22, 91–108 (2011)
2. Bergman G.M.: Examples in PI ring theory. Israel J. Math. 18, 257–277 (1974)
3. Myasnikov A., Shpilrain V., Ushakov A.: Non-Commutative Cryptography and Complexity of Group-Theoretic Problems in Mathematical, Surveys and Monographs. Vol. 177, American Mathematical Society, Providence (2011)
4. Tsaban, B.: Combinatorial Group Theory and Cryptography Bulletin (CGC Bulletin). http://u.cs.biu.ac.il/~tsaban/CGC/cgc.html
5. Stickel, E.: A new method for exchanging secret keys. In: Proceedings of the thrid International Conference on Information Technology and Applications (ICITA’05), pp. 426–430. Sidney (2005)
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献