


default search action
Applicable Algebra in Engineering, Communication and Computing, Volume 17
Volume 17, Number 1, April 2006
- Conchita Martínez-Pérez, Wolfgang Willems:

Self-dual extended cyclic codes. 1-16 - Carlisle M. Adams:

Designing against a class of algebraic attacks on symmetric block ciphers. 17-27 - Wilfried Meidl:

Continued fraction for formal laurent series and the lattice structure of sequences. 29-39 - Tony C. Scott

, Robert Mann, Roberto E. Martinez II:
General relativity and quantum mechanics: towards a generalization of the Lambert W function A Generalization of the Lambert W Function. 41-47 - Salvador Lucas

:
On the relative power of polynomials with real, rational, and integer coefficients in proofs of termination of rewriting. 49-73 - Nadia Ben Atti, Gema M. Diaz-Toca, Henri Lombardi:

The Berlekamp-Massey Algorithm revisited. 75-82
Volume 17, Number 2, June 2006
- Thomas Cluzeau, Mark van Hoeij:

Computing Hypergeometric Solutions of Linear Recurrence Equations. 83-115 - Sergei A. Abramov

, Moulay A. Barkatou, Mark van Hoeij:
Apparent singularities of linear difference equations with polynomial coefficients. 117-133 - Edoardo Ballico, Claudio Fontanari:

The Horace Method for Error-Correcting Codes. 135-139 - Trond Stølen Gustavsen, Kristian Ranestad:

A Simple Point Counting Algorithm for Hessian Elliptic Curves in Characteristic Three. 141-150 - Heide Gluesing-Luerssen, Wiland Schmale:

On Doubly-Cyclic Convolutional Codes. 151-170
Volume 17, Numbers 3-4, August 2006
- Foreword. 171

- Peter Ackermann, Martin Kreuzer

:
Gröbner Basis Cryptosystems. 173-194 - Iris Anshel, Michael Anshel, Dorian Goldfeld:

A Linear Time Matrix Key Agreement Protocol Over Small Finite Fields. 195-203 - Gilbert Baumslag, Benjamin Fine, Xiaowei Xu:

Cryptosystems using Linear Groups. 205-217 - Volker Gebhardt

:
Conjugacy Search in Braid Groups. 219-238 - Dima Grigoriev, Ilia N. Ponomarenko

:
Homomorphic Public-Key Cryptosystems and Encrypting Boolean Circuits. 239-255 - Arkadius G. Kalka:

Representation Attacks on the Braid Diffie-Hellman Public Key Encryption. 257-266 - Van-Ly Le:

Polly Two : A New Algebraic Polynomial-based Public-Key Scheme. 267-283 - Vladimir Shpilrain, Alexander Ushakov

:
The Conjugacy Search Problem in Public Key Cryptography: Unnecessary and Insufficient. 285-289 - Vladimir Shpilrain, Gabriel Zapata:

Combinatorial Group Theory and Public Key Cryptography. 291-302
Volume 17, Number 6, December 2006
- Laurent Busé, Carlos D'Andrea

:
A matrix-based approach to properness and inversion problems for rational surfaces. 393-407 - Maria Emilia Alonso

, Maria Grazia Marinari, Teo Mora:
The big Mother of all dualities 2: Macaulay bases. 409-451 - Solange Coupet-Grimal, William Delobel:

An effective proof of the well-foundedness of the multiset path ordering. 453-469 - Jérôme Lebrun

, Pierre Comon:
Blind algebraic identification of communication channels: symbolic solution algorithms. 471-485

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














