Keywords: لگاریتم گسسته; 12Y05; 11T71; 11T55; 12E05; 68Q25Parity check; Correlation attack; Stream cipher; Discrete logarithm
مقالات ISI لگاریتم گسسته (ترجمه نشده)
مقالات زیر هنوز به فارسی ترجمه نشده اند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
Keywords: لگاریتم گسسته; Certificateless signcryption; Leakage-resilient; Computational Diffie-Hellman; Discrete logarithm; IND-KL-CCA2; EUF-KL-CMA;
Keywords: لگاریتم گسسته; BhBh sequences; Discrete logarithm; Probabilistic method; Sidon sets
Carlitz rank and index of permutation polynomials
Keywords: لگاریتم گسسته; 11T06; 11T24; 11T41; 11T71; Carlitz rank; Character sums; Cryptography; Finite fields; Index; Invertibility; Linearity; Permutation polynomials; Cyclotomic mappings; Discrete logarithm;
Baby-step giant-step algorithms for the symmetric group
Keywords: لگاریتم گسسته; Symmetric group; Group actions; Discrete logarithm; Collision algorithm; Computational group theory;
Classifying and generating exact coset representatives of PGL2(Fq)PGL2(Fq) in PGL2(Fq2)PGL2(Fq2)
Keywords: لگاریتم گسسته; 11Y16; 15A33Projective general linear groups; Cosets; Discrete logarithm; Primitive elements
Weakness of F36â
1429 and F24â
3041 for discrete logarithm cryptography
Keywords: لگاریتم گسسته; 11Y16; 11T06; 11T71; Discrete logarithm; Discrete logarithm computation; Bilinear pairings;
A novel proxy signature scheme based on user hierarchical access control policy
Keywords: لگاریتم گسسته; Proxy signature; Hierarchical access control; Polynomial interpolation; Security; Discrete logarithm; Hash function
Improved Pollard rho method for computing discrete logarithms over finite extension fields
Keywords: لگاریتم گسسته; Pollard rho method; Normal basis representation; Discrete logarithm
Provably convertible multi-authenticated encryption scheme for generalized group communications
Keywords: لگاریتم گسسته; Multi-authenticated encryption; Discrete logarithm; Group-oriented encryption; Message recovery signature
A new untraceable off-line electronic cash system
Keywords: لگاریتم گسسته; Electronic cash; Payment system; Blind signature; ElGamal signature scheme; Cryptography; Discrete logarithm
Fair exchange protocol of Schnorr signatures with semi-trusted adjudicator
Keywords: لگاریتم گسسته; Fair exchange protocol; Schnorr signatures; Discrete logarithm; Random oracle model
A new algorithm for encryption/decryption for field applications
Keywords: لگاریتم گسسته; Prime modulo; Base value; Discrete logarithm; ASCII; UNICODE
Aitken and Neville inverse interpolation methods for the Lucas logarithm problem
Keywords: لگاریتم گسسته; Lucas function; Lucas logarithm problem; Inverse interpolation; Aitken interpolation; Neville interpolation; Discrete logarithm
New efficient and practical verifiable multi-secret sharing schemes
Keywords: لگاریتم گسسته; Multi-secret sharing; RSA cryptosystem; Discrete logarithm; Homogeneous linear recursion; Public value; Secure channel
Assessing the effectiveness of artificial neural networks on problems related to elliptic curve cryptography
Keywords: لگاریتم گسسته; Artificial neural networks; Boolean functions; Elliptic curves; Discrete logarithm
A provably secure short signature scheme based on discrete logarithms
Keywords: لگاریتم گسسته; Short signature; Discrete logarithm; Random oracle model; Reductionist security proof
Studying the performance of artificial neural networks on problems related to cryptography
Keywords: لگاریتم گسسته; Artificial neural networks; Discrete logarithm; Diffie–Hellman problem; Factorization; Approximation
Polynomial interpolation of cryptographic functions related to Diffie–Hellman and discrete logarithm problem
Keywords: لگاریتم گسسته; Diffie–Hellman; Discrete logarithm; Polynomial interpolation; Lower bounds
A novel efficient (t, n) threshold proxy signature scheme
Keywords: لگاریتم گسسته; Proxy signature; Threshold proxy signature scheme; Discrete logarithm; Lagrange interpolation
Cryptanalysis of Xia-You group signature scheme
Keywords: لگاریتم گسسته; Security; Cryptography; Group signature; Discrete logarithm; Factoring;
An efficient undeniable group-oriented signature scheme
Keywords: لگاریتم گسسته; Undeniable signature scheme; Integer factorization; Discrete logarithm; Elliptic curve cryptosystem; Cryptography;
Virtual logarithms
Keywords: لگاریتم گسسته; Finite field; Discrete logarithm; Number field sieve;
Privacy preserving electronic data gathering
Keywords: لگاریتم گسسته; Privacy; Electronic data gathering; E-voting protocols; Discrete logarithm;
Group signature schemes with forward secure properties
Keywords: لگاریتم گسسته; Security; Cryptography; Group signature; Discrete logarithm;
Security of meta-He digital signature scheme based on factoring and discrete logarithms
Keywords: لگاریتم گسسته; Cryptography; Digital signature; Factoring; Discrete logarithm;
Proxy blind multi-signature scheme without a secure channel
Keywords: لگاریتم گسسته; Proxy signature; Proxy multi-signature; Blind signature; Discrete logarithm;
Improvement of Tseng et al.'s authenticated encryption scheme with message linkages
Keywords: لگاریتم گسسته; Cryptography; Authenticated encryption; Message recovery signature; Message linkage; Discrete logarithm;
Weakness and solution of Yang et al.'s protected password changing scheme
Keywords: لگاریتم گسسته; Cryptography; Password; Authentication; Discrete logarithm; Hash function;
A research on new public-key encryption schemes
Keywords: لگاریتم گسسته; Probabilistic public-key encryption scheme; Lucas sequence; Discrete logarithm; Integer factorization;