Search results

(1 - 5 of 5)
Noncommutative Grobner basis cryptosystems
Contributions to multiple comparisons procedures
Relationships between graph polynomials
Key mismatch attacks on RLWE encryption schemes
On the Grundy numbers of oriented graphs