Search Results - "Encinas, L. H."
-
1
Cryptanalysis of two combinatorial public key cryptosystems
Published in Logic journal of the IGPL (01-02-2015)Get full text
Journal Article -
2
Analysis of the efficiency of the Chor–Rivest cryptosystem implementation in a safe-parameter range
Published in Information sciences (15-12-2009)“…The Chor–Rivest cryptosystem, based on a high-density knapsack problem on a finite field F q h , was broken by Vaudenay for q ≈ 200 , h ≈ 24 , and h admitting…”
Get full text
Journal Article -
3
Known-Plaintext Attack to Two Cryptosystems Based on the BB Equation
Published in IEEE transactions on circuits and systems. II, Express briefs (01-05-2008)“…Recently, Rama Murthy and Swamy proposed a symmetric cryptosystem based on the Brahmagupta-Bhaskara (BB) equation. The BB equation is the quadratic Diophantine…”
Get full text
Journal Article -
4
A short proof of the generalized Faà di bruno's formula
Published in Applied mathematics letters (01-08-2003)“…A short proof of the generalized Faa di Bruno formula is given and an explicit parametrization of the set of indices involved in the coefficient of a specific…”
Get full text
Journal Article -
5
A secure scheme to share secret color images
Published in Computer physics communications (01-12-2005)“…The main goal of this work is to study how discrete dynamical systems can be used to design secret sharing schemes. Specifically, the proposed scheme permits…”
Get full text
Journal Article -
6
Faà di Bruno's formula, lattices, and partitions
Published in Discrete Applied Mathematics (15-06-2005)“…The coefficients of g ( s ) in expanding the rth derivative of the composite function g ∘ f by Faà di Bruno's formula, is determined by a Diophantine linear…”
Get full text
Journal Article -
7
Cryptanalysis of a novel cryptosystem based on chaotic oscillators and feedback inversion
Published in Journal of sound and vibration (06-08-2004)“…In recent years, a growing number of cryptosystems based on chaos have been proposed [1], many of them fundamentally flawed by a lack of robustness and…”
Get full text
Journal Article -
8
Non-degenerate bilinear alternating maps f : V x V → v, dim(v) = 3, over an algebraically closed field
Published in Linear algebra and its applications (01-08-2004)Get full text
Journal Article -
9
Total curvatures of a closed curve in Euclidean n-space
Published in Proceedings of the American Mathematical Society (01-07-2004)“…A classical result by J. W. Milnor states that the total curvature of a closed curve C in the Euclidean n-space is the limit of the total curvatures of…”
Get full text
Journal Article -
10
Designing hypermedia tools for solving problems in mathematics
Published in Computers and education (01-05-2002)“…This article presents the design and preparation using hypermedia tools of an interactive CD-ROM for the active teaching and learning of diverse…”
Get full text
Journal Article -
11
Large decryption exponents in RSA
Published in Applied mathematics letters (01-04-2003)“…A class of RSA encryption exponents whose corresponding decryption exponents have a bitlength almost equal to the bitlength of the RSA modulus is analysed. In…”
Get full text
Journal Article -
12
Isomorphism Classes of Genus-2 Hyperelliptic Curves Over Finite Fields
Published in Applicable algebra in engineering, communication and computing (01-04-2002)“…We propose a reduced equation for hyperelliptic curves of genus 2 over finite fields F sub(q) of q elements with characteristic different from 2 and 5. We…”
Get full text
Journal Article -
13
Elliptic curve cryptography: Java implementation issues
Published in Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology (2005)“…Elliptic curve cryptography (ECC) is based in one of the hardest arithmetic problems, the elliptic curve discrete logarithm problem, making ECC a reliable…”
Get full text
Conference Proceeding