Reseñas especializadas

Las siguientes son reseñas solicitadas por ``Zentralblatt MATH''. En cada una aparece el identificador de la reseña, de acuerdo con el catálogo de ``Zentralblatt MATH'' (European Mathematical Society, FIZ Karlsruhe, Heidelberg Academy of Sciences), la fecha de la reseña, la referencia del texto reseñado y el URL donde se puede consultar la reseña.



1. Zbl pre06894023 Ernvall-Hytönen, Anne-Maria; Vesalainen, Esa V. On the secrecy gain of $\ell$-modular lattices SIAM J. Discrete Math. 32, No. 2, 1441-1457 (2018).
https://zbmath.org/?q=an:06894023



2. Zbl 1390.94001 El Aimani, Laila Verifiable composition of signature and encryption. A comprehensive study of the design paradigms Cham: Springer (ISBN 978-3-319-68111-5/hbk; 978-3-319-68112-2/ebook). xx, 145 p. (2017).
https://zbmath.org/?q=an:1390.94001



3. Zbl 1270.94001 Batten, Lynn Margaret Public key cryptography. Applications and attacks IEEE Press Series on Information and Communication Networks Security. Hoboken, NJ: John Wiley & Sons; Piscataway, NJ: IEEE Press (ISBN 978-1-118-31712-9/hbk; 978-1-118-48226-1/ebook). xvii, 201 p. EUR 64.20; sterling 53.50/hbk (2013).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:1270.94001



4. Zbl 1267.94043 Bracken, Carl; Tan, Chik How; Tan, Yin Binomial differentially 4 uniform permutations with high nonlinearity Finite Fields Appl. 18, No. 3, 537-546 (2012).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:1267.94043



5. Zbl 1262.14025 Chinburg, Ted; Zhang, Ying Every binary self-dual code arises from Hilbert symbols Homology Homotopy Appl. 14, No. 2, 189-196 (2012).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:1262.14025



6. Zbl 1262.68041 Kasher, Roy; Kempe, Julia Two-source extractors secure against quantum adversaries Theory Comput. 8, Paper No. 21, 461-486, electronic only (2012).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:1262.68041



7. Zbl 1248.94006 Myasnikov, Alexei; Shpilrain, Vladimir; Ushakov, Alexander Non-commutative cryptography and complexity of group-theoretic problems. With an appendix by Natalia Mosina Mathematical Surveys and Monographs 177. Providence, RI: American Mathematical Society (AMS) (ISBN 978-0-8218-5360-3/hbk). xiv, 385 p. $ 105.00 (2011).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:1248.94006



8. Zbl 1248.03060 Buss, Sam; Chen, Yijia; Flum, Jörg; Friedman, Sy-David; Müller, Moritz Strong isomorphism reductions in complexity theory J. Symb. Log. 76, No. 4, 1381-1402 (2011).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:1248.03060



9. Zbl 1228.94030, 2011-11-24, Yue, Zhihong; Xu, Maozhi. Hierarchical management scheme by local fields. (English). Acta Math. Sin., Engl. Ser. 27, No. 1, 155-168 (2011).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:05912876



10. Zbl 1230.68077, 2011-11-09, Bonfante, G.; Marion, J.-Y.; Moyen, J.-Y. Quasi-interpretations a way to control resources. Theor. Comput. Sci. 412, No. 25, 2776-2796 (2011).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:05904446



11. Zbl 1229.94041, 2011-11-07, Carlet, Claude. Relating three nonlinearity parameters of vectorial functions and building APN functions from bent functions. Des. Codes Cryptography 59, No. 1-3, 89-109 (2011).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:05876227



12. Zbl 1218.14017, 2011-08-05, Joshua, Roy; Akhtar, Reza. Toric residue codes. I. Finite Fields Appl. 17, No. 1, 15-50 (2011).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:1218.14017



13. Zbl 1228.11002, 2011-06-24, Meunier, Pierre. Arithmétique modulaire et cryptologie (Modular arithmetic and cryptology). Toulouse: Cépaduès-Éditions (ISBN 978-2-85428-954-1/pbk). 179 p. EUR 20.00 (2010).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:05837622



14. Zbl 1209.13037, 2011-03-23, Rentería-Márquez, Carlos; Simis, Aron; Villarreal, Rafael H. Algebraic methods for parameterized codes and invariants of vanishing ideals over finite fields. Finite Fields Appl. 17, No. 1, 81-104 (2011).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:1209.13037



15. Zbl 1209.94054, 2011-03-21, Schinzel, Andrzej; Spiez, Stanis\law; Urbanowicz, Jerzy. Admissible tracks in Shamir's scheme Finite Fields Appl. 16, No. 6, 449-462 (2010).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:1209.94054



16. Zbl 1175.11028, 2010-11-18, Satoh, Takakazu Closed formulae for the Weil pairing inversion Finite Fields Appl. 14, No. 3, 743-765 (2008).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:1175.11028



17. Zbl 1201.94096, 2010-11-18, Shi, Hongsong; Jiang, Shaoquan; Qin, Zhiguang More efficient DDH pseudorandom generators Des. Codes Cryptography 55, No. 1, 45-64 (2010).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:pre05686955



18. Zbl 1200.94043 Farashahi, Reza R.; Shparlinski, Igor E.; Voloch, José Felipe On hashing into elliptic curves J. Math. Cryptol. 3, No. 4, 353-360 (2009).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:pre05704450



19. Zbl 1202.68164, 2010-11-17, Beiter, Bernd Michael Secret sharing schemes on general access structures. Berichte aus der Informatik. Aachen: Shaker Verlag; Tübingen: Univ. Tübingen, Fakultät für Informations- und Kognitionswissenschaften (Diss.) (ISBN 978-3-8322-7866-3/pbk). xiii, 187 p. EUR 48.80 (2008).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:pre05651257



20. Zbl 1188.68149, 2010-05-17, Sherstov, Alexander A. Separating AC$^0$ from depth-2 majority circuits. (English) SIAM J. Comput. 38, No. 6, 2113-2129 (2009). ISSN 0097-5397; ISSN 1095-7111.
http://www.zentralblatt-math.org/zmath/en/search/?q=an:1188.68149



21. Zbl 1185.14020, , 2010-04-17, Romanczuk, Urszula A new encryption and signing algorithm. (English) [J] Albanian J. Math. 2, No. 3, 215-220, electronic only (2008). ISSN 1930-1235.
http://www.zentralblatt-math.org/zmath/en/search/?q=an:1185.14020



22. Zbl 1174.03017, 2009-10-23, Mycka, Jerzy, A simple observation regarding iterations of finite-valued polynomial-time functions, Rep. Math. Logic 44, 19-29 (2009).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:1174.03017



23. Zbl 1171.11062, 2009-08-21, Charpin, Pascale; Kyureghyan, Gohar M., Cubic monomial bent functions: a subclass of $\cal{M}$, SIAM J. Discrete Math. 22, No. 2, 650-665 (2008).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:1171.11062



24. Zbl 1163.11027, 2009-06-04, Hartung, Rupert J.; Schnorr, Claus-Peter, Identification and signatures based on NP-hard problems of indefinite quadratic forms, J. Math. Cryptol. 2, No. 4, 327-341 (2008).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:1163.11027



25. Zbl 1160.03020, 2009-04-21, Poizat, Bruno, On the search for the definition of the space complexity for the calculation of polynomials using Valiant's method, J. Symb. Log. 73, No. 4, 1179-1201 (2008).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:1160.03020



26. Zbl 1155.03023, 2009-02-17, Montoya, Juan Andrés On parameterized counting, Freiburg im Breisgau: Univ. Freiburg, Fakultät für Mathematik und Physik (Dissertation). 111 p. (2008).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:1155.03023



27. Zbl 1154.11045, 2009-02-17, Sathyanarayana, S.V.; Ashwatha Kumar, M.; Hari Bhat, K.N., Generation of pseudorandom sequence over elliptic curve group and their properties, J. Discrete Math. Sci. Cryptography 10, No. 6, 731-747 (2007).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:1154.11045



28. Zbl 1154.68056, 2009-01-22, Goldreich, Oded, Computational complexity. A conceptual perspective. Cambridge: Cambridge University Press (ISBN 978-0-521-88473-0/hbk). xxiv, 606 p. ${\cal L}$ 40.00; $ 70.00 (2008).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:1154.68056



29. Zbl 1154.94008, 2008-10-17, Boyd, Colin, Applications of elliptic curve pairings in cryptography Dorfer, G. (ed.) et al., Proceedings of the 73rd workshop on general algebra ``73. Arbeitstagung Allgemeine Algebra", 22nd conference of young algebraists, Alps-Adriatic-University of Klagenfurt, Austria, February 1-4, 2007. Klagenfurt: Verlag Johannes Heyn (ISBN 978-3-7084-0303-8/pbk). Contributions to General Algebra 18, 5-16 (2008).
http://www.zentralblatt-math.org/zmath/en/advanced/?q=an:pre05301966&format=complete



30. Zbl 1145.94022, 2008-10-16, Park, Kyoung Ho; Uehara, Tsuyoshi, Construction of evaluation codes from Hermitian curves, Kyushu J. Math. 61, No. 2, 415-429 (2007).
http://www.zentralblatt-math.org/zmath/en/advanced/?q=an:pre05247346&format=complete



31. Zbl 1143.94001, 2008-07-29, Katz, Jonathan; Lindell, Yehuda, Introduction to modern cryptography. Chapman & Hall/CRC Cryptography and Network Security. Boca Raton, FL: Chapman & Hall/CRC (ISBN 978-1-58488-551-1/hbk). xviii, 534 p. $ 79.95 (2008).
http://www.zentralblatt-math.org/zmath/en/advanced/?q=an:1143.94001&format=complete



32. Zbl 1143.94016, 2008-06-24, Huang, Hui-Feng; Chang, Chin-Chen, A new $t$-out-$n$ oblivious transfer with low bandwidth, Appl. Math. Sci., Ruse 1, No. 5-8, 311-320 (2007).
http://www.zentralblatt-math.org/zmath/en/advanced/?q=an:1143.94016&format=complete



33. Zbl 1138.03034, 2008-06-24, Chen, Yijia; Flum, Jörg, The parameterized complexity of maximality and minimality problems, Ann. Pure Appl. Logic 151, No. 1, 22-61 (2008).
http://www.zentralblatt-math.org/zmath/en/advanced/?q=an:1138.03034&format=complete



34. Zbl 1133.94017, 2008-02-12, Tso, Raylin; Miao, Ying; Okamoto, Eiji, On algorithms for searching a consistent set of shares in a threshold scheme and the related covering problem, J. Comb. Math. Comb. Comput. 60, 47-63 (2007).
http://www.zentralblatt-math.org/zmath/en/advanced/?q=an:1133.94017&format=complete

Otras reseñas son las siguientes:



35. G. Morales-Luna, ``Variedades diferenciales: O. A. Biberstein'', Carta Informativa, Sociedad Matemática Mexicana. No. 51, pp: 5-6. Enero 2007.



36. G. Morales-Luna, ``Geometría Diferencial: O. A. Biberstein'', Carta Informativa, Sociedad Matemática Mexicana. No. 48, pp: 5-6. Octubre 2006.



37. Reseña del libro Foundations of Inductive Logic Programming, S. H. N. Cheng , R. de Wolf, (Erasmus University of Rotterdam), Lecture Notes in Artificial Intelligence 1228 (Subseries of LNCS), Springer-Verlag, 1997, ISBN 3-540-62927-0. ``Computación y sistemas: Revista Iberoamericana de Computación'', ISSN 1405-5546, Vol: II, No. 1.



38. Reseña del libro Un curso de lógica matemática, de Carlos Videla, editado en la serie ``Aportaciones matemáticas'' de la Sociedad Matemática Mexicana. La reseña se publicó en el ``Miscelánea matemática''.

Guillermo Morales Luna 2018-10-28