default search action
International Journal of Computer Mathematics: Computer Systems Theory, Volume 6
Volume 6, Number 1, 2021
- Dima Grigoriev, Vladimir Shpilrain:
RSA and redactable blockchains. 1-6
- Abiodun Kazeem Moses, Joseph Bamidele Awotunde, Roseline Oluwaseun Ogundokun, Sanjay Misra, Emmanuel Abidemi Adeniyi:
Applicability of MMRR load balancing algorithm in cloud computing. 7-20 - Farshad Safaei, F. Kashkooei Jahromi, S. Fathi:
Graphlets importance ranking in complex networks based on the spectral energy contribution. 21-36 - Kiran R. Bhutani, Ravi Kalpathy, Hosam M. Mahmoud:
Average measures in polymer graphs. 37-53 - Osman Asif Malik, Stephen Becker:
Randomization of approximate bilinear computation for matrix multiplication. 54-93 - Yuriy Stoyan, Georgiy Yaskov:
Optimized packing unequal spheres into a multiconnected domain: mixed-integer non-linear programming approach. 94-111
Volume 6, Number 2, 2021
- Arsalan Rahmani:
A new closed-open vehicle routing approach in stochastic environments. 113-129 - Amir Mesrikhani, Mohammad Farshi, Behnam Iranfar:
A progressive algorithm for the closest pair problem. 130-136 - Steve Isaac, Delaram Kahrobaei:
A closer look at the tropical cryptography. 137-142 - S. Maria Jesu Raja, Indra Rajasingh, Antony Xavier:
Induced H-packing k-partition of graphs. 143-158 - Hongyan Cai, Qiang Sun:
A note on improper DP-colouring of planar graphs. 159-166 - Chunhua Cao, Haiyan Liu, Di Yang:
Some properties of d-codes. 167-177 - Ali Gholami Rudi:
Approximate curve-restricted simplification of polygonal curves. 178-187
Volume 6, Number 3, 2021
- Ke Wang, Jiannan Zhou, Dong He, Qinghe Tong:
Note on the three-coloured bipartite Ramsey numbers for paths. 189-193 - Khadija Achkoun, Charifa Hanin, Anas Sadak, Fatima Ezzahra Ziani, Fouzia Omary:
SPF-CA-1.2: an enhanced version of cellular automata-based block cipher system. 194-208 - R. Stalin Mary, N. Parthiban, Indra Rajasingh, Paul D. Manuel:
Optimal layout of recursive circulant graphs. 209-219 - Saulius Minkevicius, Leonidas Sakalauskas:
On the law of iterated logarithm for extreme queue length in an open queueing network. 220-235 - Kijung Kim:
Restrained Italian domination in trees. 236-242
Volume 6, Number 4, October 2021
- Markus Grassl:
Algebraic quantum codes: linking quantum mechanics and discrete mathematics. 243-259 - Iris Anshel, Derek Atkins, Dorian Goldfeld, Paul E. Gunnells:
WalnutDSA™: a group theoretic digital signature algorithm. 260-284 - Mariya Bessonov, Dima Grigoriev, Vladimir Shpilrain:
Probability theory and public-key cryptography. 285-290 - Julian Danner, Martin Kreuzer:
A fault attack on KCipher-2. 291-312 - Suvradip Chakraborty, Y. Sreenivasa Rao, C. Pandu Rangan:
Efficient single round attribute-based authenticated key exchange protocol. 313-336 - Reza Azarderakhsh, Jean-François Biasse, Rami El Khatib, Brandon Langenberg, Benjamin Pring:
Parallelism strategies for the tuneable golden-claw finding problem. 337-363 - Nir Drucker, Shay Gueron, Dusan Kostic, Edoardo Persichetti:
On the applicability of the Fujisaki-Okamoto transformation to the BIKE KEM. 364-374 - Benjamin Fine, Martin Kreuzer, Gerhard Rosenberger:
Further potential applications of group theory in information security. 375-380 - Delaram Kahrobaei, Vladimir Shpilrain:
A note on fully homomorphic encryption of real-life data. 381-385 - Correction. 386
- Samuel Dobson, Steven D. Galbraith, Jason T. LeGrow, Yan Bo Ti, Lukas Zobernig:
An adaptive attack on 2-SIDH. 387-404
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.