default search action
Applicable Algebra in Engineering, Communication and Computing, Volume 17
Volume 17, Number 1, April 2006
- Conchita Martínez-Pérez, Wolfgang Willems:
Self-dual extended cyclic codes. 1-16 - Carlisle M. Adams:
Designing against a class of algebraic attacks on symmetric block ciphers. 17-27 - Wilfried Meidl:
Continued fraction for formal laurent series and the lattice structure of sequences. 29-39 - Tony C. Scott, Robert Mann, Roberto E. Martinez II:
General relativity and quantum mechanics: towards a generalization of the Lambert W function A Generalization of the Lambert W Function. 41-47 - Salvador Lucas:
On the relative power of polynomials with real, rational, and integer coefficients in proofs of termination of rewriting. 49-73 - Nadia Ben Atti, Gema M. Diaz-Toca, Henri Lombardi:
The Berlekamp-Massey Algorithm revisited. 75-82
Volume 17, Number 2, June 2006
- Thomas Cluzeau, Mark van Hoeij:
Computing Hypergeometric Solutions of Linear Recurrence Equations. 83-115 - Sergei A. Abramov, Moulay A. Barkatou, Mark van Hoeij:
Apparent singularities of linear difference equations with polynomial coefficients. 117-133 - Edoardo Ballico, Claudio Fontanari:
The Horace Method for Error-Correcting Codes. 135-139 - Trond Stølen Gustavsen, Kristian Ranestad:
A Simple Point Counting Algorithm for Hessian Elliptic Curves in Characteristic Three. 141-150 - Heide Gluesing-Luerssen, Wiland Schmale:
On Doubly-Cyclic Convolutional Codes. 151-170
Volume 17, Numbers 3-4, August 2006
- Foreword. 171
- Peter Ackermann, Martin Kreuzer:
Gröbner Basis Cryptosystems. 173-194 - Iris Anshel, Michael Anshel, Dorian Goldfeld:
A Linear Time Matrix Key Agreement Protocol Over Small Finite Fields. 195-203 - Gilbert Baumslag, Benjamin Fine, Xiaowei Xu:
Cryptosystems using Linear Groups. 205-217 - Volker Gebhardt:
Conjugacy Search in Braid Groups. 219-238 - Dima Grigoriev, Ilia N. Ponomarenko:
Homomorphic Public-Key Cryptosystems and Encrypting Boolean Circuits. 239-255 - Arkadius G. Kalka:
Representation Attacks on the Braid Diffie-Hellman Public Key Encryption. 257-266 - Van-Ly Le:
Polly Two : A New Algebraic Polynomial-based Public-Key Scheme. 267-283 - Vladimir Shpilrain, Alexander Ushakov:
The Conjugacy Search Problem in Public Key Cryptography: Unnecessary and Insufficient. 285-289 - Vladimir Shpilrain, Gabriel Zapata:
Combinatorial Group Theory and Public Key Cryptography. 291-302
Volume 17, Number 6, December 2006
- Laurent Busé, Carlos D'Andrea:
A matrix-based approach to properness and inversion problems for rational surfaces. 393-407 - Maria Emilia Alonso, Maria Grazia Marinari, Teo Mora:
The big Mother of all dualities 2: Macaulay bases. 409-451 - Solange Coupet-Grimal, William Delobel:
An effective proof of the well-foundedness of the multiset path ordering. 453-469 - Jérôme Lebrun, Pierre Comon:
Blind algebraic identification of communication channels: symbolic solution algorithms. 471-485
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.