Search results

(1 - 5 of 5)
On the Grundy numbers of oriented graphs
Key mismatch attacks on RLWE encryption schemes
Contributions to multiple comparisons procedures
Noncommutative Grobner basis cryptosystems
Relationships between graph polynomials