Reseñas especializadas

Las siguientes son reseñas solicitadas por “Zentralblatt MATH”. En cada una aparece el identificador de la reseña, de acuerdo con el catálogo de “Zentralblatt MATH” (European Mathematical Society, FIZ Karlsruhe, Heidelberg Academy of Sciences), la fecha de la reseña, la referencia del texto reseñado y el URL donde se puede consultar la reseña.



1. Zbl 07056604 Xie, Huiqin; Yang, Li Using Bernstein-Vazirani algorithm to attack block ciphers Des. Codes Cryptography 87, No. 5, 1161-1182 (2019).
https://zbmath.org/?q=07056604



2. Zbl 07136847 Ding, Jintai; Deaton, Joshua; Schmidt, Kurt Giophantus distinguishing attack is a low dimensional learning with errors Adv. Math. Commun. 14, No. 1, 171-175 (2020).
https://zbmath.org/?q=07136847



3. Zbl 1408.68057 Derler, David; Slamanig, Daniel Practical witness encryption foralgebraiclanguagesor how to encrypt under Groth- Sahai proofs Des. Codes Cryptography 86, No. 11, 2525-2547 (2018).
https://zbmath.org/?q=1408.68057



4. Zbl 06864547 Rösnick-Neugebauer, Carsten Closed sets and operators thereon: representations, computability and complexity Log. Methods Comput. Sci. 14, No. 2, Paper No. 1, 41 p. (2018).
https://zbmath.org/?q=06864547



5. Zbl pre06894023 Ernvall-Hytönen, Anne-Maria; Vesalainen, Esa V. On the secrecy gain of $\ell$-modular lattices SIAM J. Discrete Math. 32, No. 2, 1441-1457 (2018).
https://zbmath.org/?q=an:06894023



6. Zbl 1390.94001 El Aimani, Laila Verifiable composition of signature and encryption. A comprehensive study of the design paradigms Cham: Springer (ISBN 978-3-319-68111-5/hbk; 978-3-319-68112-2/ebook). xx, 145 p. (2017).
https://zbmath.org/?q=an:1390.94001



7. Zbl 1270.94001 Batten, Lynn Margaret Public key cryptography. Applications and attacks IEEE Press Series on Information and Communication Networks Security. Hoboken, NJ: John Wiley & Sons; Piscataway, NJ: IEEE Press (ISBN 978-1-118-31712-9/hbk; 978-1-118-48226-1/ebook). xvii, 201 p. EUR 64.20; sterling 53.50/hbk (2013).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:1270.94001



8. Zbl 1267.94043 Bracken, Carl; Tan, Chik How; Tan, Yin Binomial differentially 4 uniform permutations with high nonlinearity Finite Fields Appl. 18, No. 3, 537-546 (2012).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:1267.94043



9. Zbl 1262.14025 Chinburg, Ted; Zhang, Ying Every binary self-dual code arises from Hilbert symbols Homology Homotopy Appl. 14, No. 2, 189-196 (2012).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:1262.14025



10. Zbl 1262.68041 Kasher, Roy; Kempe, Julia Two-source extractors secure against quantum adversaries Theory Comput. 8, Paper No. 21, 461-486, electronic only (2012).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:1262.68041



11. Zbl 1248.94006 Myasnikov, Alexei; Shpilrain, Vladimir; Ushakov, Alexander Non-commutative cryptography and complexity of group-theoretic problems. With an appendix by Natalia Mosina Mathematical Surveys and Monographs 177. Providence, RI: American Mathematical Society (AMS) (ISBN 978-0-8218-5360-3/hbk). xiv, 385 p. $ 105.00 (2011).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:1248.94006



12. Zbl 1248.03060 Buss, Sam; Chen, Yijia; Flum, Jörg; Friedman, Sy-David; Müller, Moritz Strong isomorphism reductions in complexity theory J. Symb. Log. 76, No. 4, 1381-1402 (2011).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:1248.03060



13. Zbl 1228.94030, 2011-11-24, Yue, Zhihong; Xu, Maozhi. Hierarchical management scheme by local fields. (English). Acta Math. Sin., Engl. Ser. 27, No. 1, 155-168 (2011).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:05912876



14. Zbl 1230.68077, 2011-11-09, Bonfante, G.; Marion, J.-Y.; Moyen, J.-Y. Quasi-interpretations a way to control resources. Theor. Comput. Sci. 412, No. 25, 2776-2796 (2011).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:05904446



15. Zbl 1229.94041, 2011-11-07, Carlet, Claude. Relating three nonlinearity parameters of vectorial functions and building APN functions from bent functions. Des. Codes Cryptography 59, No. 1-3, 89-109 (2011).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:05876227



16. Zbl 1218.14017, 2011-08-05, Joshua, Roy; Akhtar, Reza. Toric residue codes. I. Finite Fields Appl. 17, No. 1, 15-50 (2011).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:1218.14017



17. Zbl 1228.11002, 2011-06-24, Meunier, Pierre. Arithmétique modulaire et cryptologie (Modular arithmetic and cryptology). Toulouse: Cépaduès-Éditions (ISBN 978-2-85428-954-1/pbk). 179 p. EUR 20.00 (2010).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:05837622



18. Zbl 1209.13037, 2011-03-23, Rentería-Márquez, Carlos; Simis, Aron; Villarreal, Rafael H. Algebraic methods for parameterized codes and invariants of vanishing ideals over finite fields. Finite Fields Appl. 17, No. 1, 81-104 (2011).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:1209.13037



19. Zbl 1209.94054, 2011-03-21, Schinzel, Andrzej; Spieź, Stanisław; Urbanowicz, Jerzy. Admissible tracks in Shamir's scheme Finite Fields Appl. 16, No. 6, 449-462 (2010).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:1209.94054



20. Zbl 1175.11028, 2010-11-18, Satoh, Takakazu Closed formulae for the Weil pairing inversion Finite Fields Appl. 14, No. 3, 743-765 (2008).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:1175.11028



21. Zbl 1201.94096, 2010-11-18, Shi, Hongsong; Jiang, Shaoquan; Qin, Zhiguang More efficient DDH pseudorandom generators Des. Codes Cryptography 55, No. 1, 45-64 (2010).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:pre05686955



22. Zbl 1200.94043 Farashahi, Reza R.; Shparlinski, Igor E.; Voloch, José Felipe On hashing into elliptic curves J. Math. Cryptol. 3, No. 4, 353-360 (2009).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:pre05704450



23. Zbl 1202.68164, 2010-11-17, Beiter, Bernd Michael Secret sharing schemes on general access structures. Berichte aus der Informatik. Aachen: Shaker Verlag; Tübingen: Univ. Tübingen, Fakultät für Informations- und Kognitionswissenschaften (Diss.) (ISBN 978-3-8322-7866-3/pbk). xiii, 187 p. EUR 48.80 (2008).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:pre05651257



24. Zbl 1188.68149, 2010-05-17, Sherstov, Alexander A. Separating AC$^0$ from depth-2 majority circuits. (English) SIAM J. Comput. 38, No. 6, 2113-2129 (2009). ISSN 0097-5397; ISSN 1095-7111.
http://www.zentralblatt-math.org/zmath/en/search/?q=an:1188.68149



25. Zbl 1185.14020, , 2010-04-17, Romanczuk, Urszula A new encryption and signing algorithm. (English) [J] Albanian J. Math. 2, No. 3, 215-220, electronic only (2008). ISSN 1930-1235.
http://www.zentralblatt-math.org/zmath/en/search/?q=an:1185.14020



26. Zbl 1174.03017, 2009-10-23, Mycka, Jerzy, A simple observation regarding iterations of finite-valued polynomial-time functions, Rep. Math. Logic 44, 19-29 (2009).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:1174.03017



27. Zbl 1171.11062, 2009-08-21, Charpin, Pascale; Kyureghyan, Gohar M., Cubic monomial bent functions: a subclass of $\cal{M}$, SIAM J. Discrete Math. 22, No. 2, 650-665 (2008).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:1171.11062



28. Zbl 1163.11027, 2009-06-04, Hartung, Rupert J.; Schnorr, Claus-Peter, Identification and signatures based on NP-hard problems of indefinite quadratic forms, J. Math. Cryptol. 2, No. 4, 327-341 (2008).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:1163.11027



29. Zbl 1160.03020, 2009-04-21, Poizat, Bruno, On the search for the definition of the space complexity for the calculation of polynomials using Valiant's method, J. Symb. Log. 73, No. 4, 1179-1201 (2008).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:1160.03020



30. Zbl 1155.03023, 2009-02-17, Montoya, Juan Andrés On parameterized counting, Freiburg im Breisgau: Univ. Freiburg, Fakultät für Mathematik und Physik (Dissertation). 111 p. (2008).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:1155.03023



31. Zbl 1154.11045, 2009-02-17, Sathyanarayana, S.V.; Ashwatha Kumar, M.; Hari Bhat, K.N., Generation of pseudorandom sequence over elliptic curve group and their properties, J. Discrete Math. Sci. Cryptography 10, No. 6, 731-747 (2007).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:1154.11045



32. Zbl 1154.68056, 2009-01-22, Goldreich, Oded, Computational complexity. A conceptual perspective. Cambridge: Cambridge University Press (ISBN 978-0-521-88473-0/hbk). xxiv, 606 p. ${\cal L}$ 40.00; $ 70.00 (2008).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:1154.68056



33. Zbl 1154.94008, 2008-10-17, Boyd, Colin, Applications of elliptic curve pairings in cryptography Dorfer, G. (ed.) et al., Proceedings of the 73rd workshop on general algebra “73. Arbeitstagung Allgemeine Algebra", 22nd conference of young algebraists, Alps-Adriatic-University of Klagenfurt, Austria, February 1–4, 2007. Klagenfurt: Verlag Johannes Heyn (ISBN 978-3-7084-0303-8/pbk). Contributions to General Algebra 18, 5-16 (2008).
http://www.zentralblatt-math.org/zmath/en/advanced/?q=an:pre05301966&format=complete



34. Zbl 1145.94022, 2008-10-16, Park, Kyoung Ho; Uehara, Tsuyoshi, Construction of evaluation codes from Hermitian curves, Kyushu J. Math. 61, No. 2, 415-429 (2007).
http://www.zentralblatt-math.org/zmath/en/advanced/?q=an:pre05247346&format=complete



35. Zbl 1143.94001, 2008-07-29, Katz, Jonathan; Lindell, Yehuda, Introduction to modern cryptography. Chapman & Hall/CRC Cryptography and Network Security. Boca Raton, FL: Chapman & Hall/CRC (ISBN 978-1-58488-551-1/hbk). xviii, 534 p. $ 79.95 (2008).
http://www.zentralblatt-math.org/zmath/en/advanced/?q=an:1143.94001&format=complete



36. Zbl 1143.94016, 2008-06-24, Huang, Hui-Feng; Chang, Chin-Chen, A new $t$-out-$n$ oblivious transfer with low bandwidth, Appl. Math. Sci., Ruse 1, No. 5-8, 311-320 (2007).
http://www.zentralblatt-math.org/zmath/en/advanced/?q=an:1143.94016&format=complete



37. Zbl 1138.03034, 2008-06-24, Chen, Yijia; Flum, Jörg, The parameterized complexity of maximality and minimality problems, Ann. Pure Appl. Logic 151, No. 1, 22-61 (2008).
http://www.zentralblatt-math.org/zmath/en/advanced/?q=an:1138.03034&format=complete



38. Zbl 1133.94017, 2008-02-12, Tso, Raylin; Miao, Ying; Okamoto, Eiji, On algorithms for searching a consistent set of shares in a threshold scheme and the related covering problem, J. Comb. Math. Comb. Comput. 60, 47-63 (2007).
http://www.zentralblatt-math.org/zmath/en/advanced/?q=an:1133.94017&format=complete

Otras reseñas son las siguientes:



39. G. Morales-Luna, “Variedades diferenciales: O. A. Biberstein”, Carta Informativa, Sociedad Matemática Mexicana. No. 51, pp: 5-6. Enero 2007.



40. G. Morales-Luna, “Geometría Diferencial: O. A. Biberstein”, Carta Informativa, Sociedad Matemática Mexicana. No. 48, pp: 5-6. Octubre 2006.



41. Reseña del libro Foundations of Inductive Logic Programming, S. H. N. Cheng , R. de Wolf, (Erasmus University of Rotterdam), Lecture Notes in Artificial Intelligence 1228 (Subseries of LNCS), Springer-Verlag, 1997, ISBN 3-540-62927-0. “Computación y sistemas: Revista Iberoamericana de Computación”, ISSN 1405-5546, Vol: II, No. 1.



42. Reseña del libro Un curso de lógica matemática, de Carlos Videla, editado en la serie “Aportaciones matemáticas” de la Sociedad Matemática Mexicana. La reseña se publicó en el “Miscelánea matemática”.