Las siguientes son reseñas solicitadas por “Zentralblatt MATH”. En cada una aparece el identificador de la reseña, de acuerdo con el catálogo de “Zentralblatt MATH” (European Mathematical Society, FIZ Karlsruhe, Heidelberg Academy of Sciences), la fecha de la reseña, la referencia del texto reseñado y el URL donde se puede consultar la reseña.
1. Zbl 07056604
Xie, Huiqin; Yang, Li
Using Bernstein-Vazirani algorithm to attack block ciphers
Des. Codes Cryptography 87, No. 5, 1161-1182 (2019).
https://zbmath.org/?q=07056604
2. Zbl 07136847
Ding, Jintai; Deaton, Joshua; Schmidt, Kurt
Giophantus distinguishing attack is a low dimensional learning with errors
Adv. Math. Commun. 14, No. 1, 171-175 (2020).
https://zbmath.org/?q=07136847
3. Zbl 1408.68057
Derler, David; Slamanig, Daniel
Practical witness encryption foralgebraiclanguagesor how to encrypt under Groth- Sahai proofs
Des. Codes Cryptography 86, No. 11, 2525-2547 (2018).
https://zbmath.org/?q=1408.68057
4. Zbl 06864547
Rösnick-Neugebauer, Carsten
Closed sets and operators thereon: representations, computability and complexity
Log. Methods Comput. Sci. 14, No. 2, Paper No. 1, 41 p. (2018).
https://zbmath.org/?q=06864547
5. Zbl pre06894023
Ernvall-Hytönen, Anne-Maria; Vesalainen, Esa V.
On the secrecy gain of -modular lattices
SIAM J. Discrete Math. 32, No. 2, 1441-1457 (2018).
https://zbmath.org/?q=an:06894023
6. Zbl 1390.94001
El Aimani, Laila
Verifiable composition of signature and encryption. A comprehensive study of the design paradigms
Cham: Springer (ISBN 978-3-319-68111-5/hbk; 978-3-319-68112-2/ebook). xx, 145 p. (2017).
https://zbmath.org/?q=an:1390.94001
7. Zbl 1270.94001
Batten, Lynn Margaret
Public key cryptography. Applications and attacks
IEEE Press Series on Information and Communication Networks Security. Hoboken, NJ: John Wiley & Sons; Piscataway, NJ: IEEE Press (ISBN 978-1-118-31712-9/hbk; 978-1-118-48226-1/ebook). xvii, 201 p. EUR 64.20; sterling 53.50/hbk (2013).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:1270.94001
8. Zbl 1267.94043
Bracken, Carl; Tan, Chik How; Tan, Yin
Binomial differentially 4 uniform permutations with high nonlinearity
Finite Fields Appl. 18, No. 3, 537-546 (2012).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:1267.94043
9. Zbl 1262.14025
Chinburg, Ted; Zhang, Ying
Every binary self-dual code arises from Hilbert symbols
Homology Homotopy Appl. 14, No. 2, 189-196 (2012).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:1262.14025
10. Zbl 1262.68041
Kasher, Roy; Kempe, Julia
Two-source extractors secure against quantum adversaries
Theory Comput. 8, Paper No. 21, 461-486, electronic only (2012).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:1262.68041
11. Zbl 1248.94006
Myasnikov, Alexei; Shpilrain, Vladimir; Ushakov, Alexander
Non-commutative cryptography and complexity of group-theoretic problems. With an appendix by Natalia Mosina
Mathematical Surveys and Monographs 177. Providence, RI: American Mathematical Society (AMS) (ISBN 978-0-8218-5360-3/hbk). xiv, 385 p. $ 105.00 (2011).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:1248.94006
12. Zbl 1248.03060
Buss, Sam; Chen, Yijia; Flum, Jörg; Friedman, Sy-David; Müller, Moritz
Strong isomorphism reductions in complexity theory
J. Symb. Log. 76, No. 4, 1381-1402 (2011).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:1248.03060
13. Zbl 1228.94030, 2011-11-24,
Yue, Zhihong; Xu, Maozhi.
Hierarchical management scheme by local fields. (English).
Acta Math. Sin., Engl. Ser. 27, No. 1, 155-168 (2011).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:05912876
14. Zbl 1230.68077, 2011-11-09,
Bonfante, G.; Marion, J.-Y.; Moyen, J.-Y.
Quasi-interpretations a way to control resources.
Theor. Comput. Sci. 412, No. 25, 2776-2796 (2011).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:05904446
15. Zbl 1229.94041, 2011-11-07,
Carlet, Claude.
Relating three nonlinearity parameters of vectorial functions and building APN functions from bent functions.
Des. Codes Cryptography 59, No. 1-3, 89-109 (2011).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:05876227
16. Zbl 1218.14017, 2011-08-05,
Joshua, Roy; Akhtar, Reza.
Toric residue codes. I.
Finite Fields Appl. 17, No. 1, 15-50 (2011).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:1218.14017
17. Zbl 1228.11002, 2011-06-24,
Meunier, Pierre.
Arithmétique modulaire et cryptologie (Modular arithmetic and cryptology).
Toulouse: Cépaduès-Éditions (ISBN 978-2-85428-954-1/pbk). 179 p. EUR 20.00 (2010).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:05837622
18. Zbl 1209.13037, 2011-03-23,
Rentería-Márquez, Carlos; Simis, Aron; Villarreal, Rafael H.
Algebraic methods for parameterized codes and invariants of vanishing ideals over finite fields.
Finite Fields Appl. 17, No. 1, 81-104 (2011).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:1209.13037
19. Zbl 1209.94054, 2011-03-21,
Schinzel, Andrzej; Spieź, Stanisław; Urbanowicz, Jerzy.
Admissible tracks in Shamir's scheme
Finite Fields Appl. 16, No. 6, 449-462 (2010).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:1209.94054
20. Zbl 1175.11028, 2010-11-18,
Satoh, Takakazu
Closed formulae for the Weil pairing inversion
Finite Fields Appl. 14, No. 3, 743-765 (2008).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:1175.11028
21. Zbl 1201.94096, 2010-11-18,
Shi, Hongsong; Jiang, Shaoquan; Qin, Zhiguang
More efficient DDH pseudorandom generators
Des. Codes Cryptography 55, No. 1, 45-64 (2010).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:pre05686955
22. Zbl 1200.94043
Farashahi, Reza R.; Shparlinski, Igor E.; Voloch, José Felipe
On hashing into elliptic curves
J. Math. Cryptol. 3, No. 4, 353-360 (2009).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:pre05704450
23. Zbl 1202.68164, 2010-11-17,
Beiter, Bernd Michael
Secret sharing schemes on general access structures.
Berichte aus der Informatik. Aachen: Shaker Verlag; Tübingen: Univ. Tübingen, Fakultät für Informations- und Kognitionswissenschaften (Diss.) (ISBN 978-3-8322-7866-3/pbk). xiii, 187 p. EUR 48.80 (2008).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:pre05651257
24. Zbl 1188.68149, 2010-05-17,
Sherstov, Alexander A.
Separating AC from depth-2 majority circuits. (English)
SIAM J. Comput. 38, No. 6, 2113-2129 (2009). ISSN 0097-5397; ISSN 1095-7111.
http://www.zentralblatt-math.org/zmath/en/search/?q=an:1188.68149
25. Zbl 1185.14020, , 2010-04-17,
Romanczuk, Urszula
A new encryption and signing algorithm. (English)
[J] Albanian J. Math. 2, No. 3, 215-220, electronic only (2008). ISSN 1930-1235.
http://www.zentralblatt-math.org/zmath/en/search/?q=an:1185.14020
26. Zbl 1174.03017, 2009-10-23, Mycka, Jerzy, A simple observation regarding iterations of finite-valued polynomial-time functions, Rep. Math. Logic 44, 19-29 (2009).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:1174.03017
27. Zbl 1171.11062, 2009-08-21, Charpin, Pascale; Kyureghyan, Gohar M., Cubic monomial bent functions: a subclass of , SIAM J. Discrete Math. 22, No. 2, 650-665 (2008).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:1171.11062
28. Zbl 1163.11027, 2009-06-04, Hartung, Rupert J.; Schnorr, Claus-Peter, Identification and signatures based on NP-hard problems of indefinite quadratic forms, J. Math. Cryptol. 2, No. 4, 327-341 (2008).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:1163.11027
29. Zbl 1160.03020, 2009-04-21, Poizat, Bruno, On the search for the definition of the space complexity for the calculation of polynomials using Valiant's method, J. Symb. Log. 73, No. 4, 1179-1201 (2008).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:1160.03020
30. Zbl 1155.03023, 2009-02-17, Montoya, Juan Andrés
On parameterized counting, Freiburg im Breisgau: Univ. Freiburg, Fakultät für Mathematik und Physik (Dissertation). 111 p. (2008).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:1155.03023
31. Zbl 1154.11045, 2009-02-17, Sathyanarayana, S.V.; Ashwatha Kumar, M.; Hari Bhat, K.N., Generation of pseudorandom sequence over elliptic curve group and their properties, J. Discrete Math. Sci. Cryptography 10, No. 6, 731-747 (2007).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:1154.11045
32. Zbl 1154.68056, 2009-01-22, Goldreich, Oded, Computational complexity. A conceptual perspective. Cambridge: Cambridge University Press (ISBN 978-0-521-88473-0/hbk). xxiv, 606 p. 40.00; $ 70.00 (2008).
http://www.zentralblatt-math.org/zmath/en/search/?q=an:1154.68056
33. Zbl 1154.94008, 2008-10-17, Boyd, Colin, Applications of elliptic curve pairings in cryptography
Dorfer, G. (ed.) et al., Proceedings of the 73rd workshop on general algebra “73. Arbeitstagung Allgemeine Algebra", 22nd conference of young algebraists, Alps-Adriatic-University of Klagenfurt, Austria, February 1–4, 2007. Klagenfurt: Verlag Johannes Heyn (ISBN 978-3-7084-0303-8/pbk). Contributions to General Algebra 18, 5-16 (2008).
http://www.zentralblatt-math.org/zmath/en/advanced/?q=an:pre05301966&format=complete
34. Zbl 1145.94022, 2008-10-16, Park, Kyoung Ho; Uehara, Tsuyoshi, Construction of evaluation codes from Hermitian curves, Kyushu J. Math. 61, No. 2, 415-429 (2007).
http://www.zentralblatt-math.org/zmath/en/advanced/?q=an:pre05247346&format=complete
35. Zbl 1143.94001, 2008-07-29, Katz, Jonathan; Lindell, Yehuda, Introduction to modern cryptography.
Chapman & Hall/CRC Cryptography and Network Security. Boca Raton, FL: Chapman & Hall/CRC (ISBN 978-1-58488-551-1/hbk). xviii, 534 p. $ 79.95 (2008).
http://www.zentralblatt-math.org/zmath/en/advanced/?q=an:1143.94001&format=complete
36. Zbl 1143.94016, 2008-06-24, Huang, Hui-Feng; Chang, Chin-Chen, A new -out- oblivious transfer with low bandwidth, Appl. Math. Sci., Ruse 1, No. 5-8, 311-320 (2007).
http://www.zentralblatt-math.org/zmath/en/advanced/?q=an:1143.94016&format=complete
37. Zbl 1138.03034, 2008-06-24, Chen, Yijia; Flum, Jörg, The parameterized complexity of maximality and minimality problems, Ann. Pure Appl. Logic 151, No. 1, 22-61 (2008).
http://www.zentralblatt-math.org/zmath/en/advanced/?q=an:1138.03034&format=complete
38. Zbl 1133.94017, 2008-02-12, Tso, Raylin; Miao, Ying; Okamoto, Eiji, On algorithms for searching a consistent set of shares in a threshold scheme and the related covering problem, J. Comb. Math. Comb. Comput. 60, 47-63 (2007).
http://www.zentralblatt-math.org/zmath/en/advanced/?q=an:1133.94017&format=complete
Otras reseñas son las siguientes:
39. G. Morales-Luna, “Variedades diferenciales: O. A. Biberstein”, Carta Informativa, Sociedad Matemática Mexicana. No. 51, pp: 5-6. Enero 2007.
40. G. Morales-Luna, “Geometría Diferencial: O. A. Biberstein”, Carta Informativa, Sociedad Matemática Mexicana. No. 48, pp: 5-6. Octubre 2006.
41. Reseña del libro Foundations of Inductive Logic Programming, S. H. N. Cheng , R. de Wolf, (Erasmus University of Rotterdam), Lecture Notes in Artificial Intelligence 1228 (Subseries of LNCS), Springer-Verlag, 1997, ISBN 3-540-62927-0. “Computación y sistemas: Revista Iberoamericana de Computación”, ISSN 1405-5546, Vol: II, No. 1.
42. Reseña del libro Un curso de lógica matemática, de Carlos Videla, editado en la serie “Aportaciones matemáticas” de la Sociedad Matemática Mexicana. La reseña se publicó en el “Miscelánea matemática”.