Permutation

Results: 881



#Item
151

Published in Designs, Codes and Cryptography 60(1):15–35, Notions and Relations for RKA-Secure Permutation and Function Families Jongsung Kim · Jaechul Sung · Ermaliza Razali · Raphael C.-W. Phan · Marc Joye

Add to Reading List

Source URL: joye.site88.net

Language: English - Date: 2015-09-04 19:44:07
    152Mathematics / Logic / Mathematical logic / Type theory / Automated theorem proving / Logic programming / Models of computation / Logic in computer science / Substitution / Structure / Model theory / Parity of a permutation

    A type system for Continuation Calculus Herman Geuvers Radboud University Nijmegen, Technical University Eindhoven, the Netherlands

    Add to Reading List

    Source URL: www.cs.ru.nl

    Language: English - Date: 2014-05-12 17:56:59
    153Mathematical analysis / Mathematics / Number theory / Continued fractions / Algebra / Distribution / Logarithm / Random permutation statistics / Argument principle

    Approximation by Mediants Wieb Bosma Mathematics of Computation, Vol. 54, NoJan., 1990), ppStable URL: http://links.jstor.org/sici?sici=%%2954%3A189%3C421%3AABM%3E2.0.CO%3B2-3 Mathemat

    Add to Reading List

    Source URL: www.math.ru.nl

    Language: English - Date: 2008-03-28 07:27:54
    154

    Introduction Proof of Knowledge of Permutation Matrix Restricted Permutations Proofs of Restricted Shuffles Björn Terelius and Douglas Wikström

    Add to Reading List

    Source URL: 2010.africacrypt.com

    Language: English - Date: 2010-05-02 14:18:00
      155Cryptography / Cryptographic hash functions / Hashing / NIST hash function competition / SHA-3 / Secure Hash Algorithm / SHA-2 / SHA-1 / Hash-based message authentication code / Secure Hash Standard / Sponge function / Hash function

      SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions

      Add to Reading List

      Source URL: nvlpubs.nist.gov

      Language: English - Date: 2015-08-04 11:34:10
      156

      On Some Permutation Binomials of the Form x2n-1k+1 +ax over F2n : Existence and Count

      Add to Reading List

      Source URL: www5.rz.rub.de

      Language: English - Date: 2012-07-23 07:42:05
        157Advantage / XTR / Permutation / Mathematics

        Cascade Encryption Revisited Peter Gaˇzi1,2 and Ueli Maurer1 2 1

        Add to Reading List

        Source URL: pub.ist.ac.at

        Language: English - Date: 2014-06-19 17:30:22
        158Coding theory / Mathematics / Discrete mathematics / Erasure code / Permutation / MDS matrix / Linear subspace / Hamming code / ReedSolomon error correction

        1 Zigzag Codes: MDS Array Codes with Optimal Rebuilding Itzhak Tamo∗ † , Zhiying Wang∗ , and Jehoshua Bruck∗ Engineering Department, California Institute of Technology, Pasadena, CA 91125, USA

        Add to Reading List

        Source URL: paradise.caltech.edu

        Language: English - Date: 2012-01-09 16:57:54
        159Polynomials / Algebra / Field theory / XTR / Cyclotomic polynomial / Minimal polynomial / Field extension / Elementary symmetric polynomial / Elliptic curve / Irreducible polynomial / Permutation polynomial

        Looking beyond XTR Wieb Bosma1 , James Hutton2 , and Eric R. Verheul3 1 Mathematisch Instituut, Universiteit Nijmegen, Postbus 9010, 6500 GL Nijmegen, The Netherlands,

        Add to Reading List

        Source URL: www.math.ru.nl

        Language: English - Date: 2003-03-04 03:36:09
        160Cryptography / Block cipher / Advantage / Pseudorandom permutation / Data Encryption Standard / Feistel cipher / Stream ciphers / Distinguishing attack / Exclusive or / Advanced Encryption Standard / Running key cipher / One-way compression function

        Plain versus Randomized Cascading-Based Key-Length Extension for Block Ciphers Peter Gaˇzi ETH Zurich, Switzerland Department of Computer Science

        Add to Reading List

        Source URL: pub.ist.ac.at

        Language: English - Date: 2014-06-19 16:51:50
        UPDATE