Образец цитирования:
С. Б. Гашков, И. С. Сергеев, “Сложность вычислений в конечных полях”, Фундамент. и прикл. матем., 17:4 (2012), 95–131; J. Math. Sci., 191:5 (2013), 661–685
Nasim Abdi Kourani, Hassan Khodaiemehr, Mohammad Javad Nikmehr, “Locally Recoverable Codes Over Z
p s”, IEEE Trans. Commun., 72:5 (2024), 2503
Piotr Mitosek, “Pauli Flow on Open Graphs with Unknown Measurement Labels”, Electron. Proc. Theor. Comput. Sci., 406 (2024), 117
Ismail Assoujaa, Siham Ezzouak, Proceedings of the 7th International Conference on Networking, Intelligent Systems and Security, 2024, 1
Weiqi Li, Zhiying Wang, Taiting Lu, Hamid Jafarkhani, “Storage Codes With Flexible Number of Nodes”, IEEE Trans. Inform. Theory, 69:1 (2023), 561
Dean Doron, Dana Moshkovitz, Justin Oh, David Zuckerman, “Nearly Optimal Pseudorandomness from Hardness”, J. ACM, 69:6 (2022), 1
Jing Zhang, Ya-Juan Yang, Yi-Peng Li, Xingsi Xue, “A New Key Exchange Protocol Based on Infinite Non-Abelian Groups”, Security and Communication Networks, 2022 (2022), 1
S. B. Balaji, Myna Vajha, P. Vijay Kumar, “Lower Bounds on the Sub-Packetization Level of MSR Codes and Characterizing Optimal-Access MSR Codes Achieving the Bound”, IEEE Trans. Inform. Theory, 68:10 (2022), 6452
Ismail Assoujaa, Siham Ezzouak, Hakima Mouanis, Communications in Computer and Information Science, 1747, Cryptography, Codes and Cyber Security, 2022, 104
Mahdi Cheraghchi, Shuichi Hirahara, Dimitrios Myrisiotis, Yuichi Yoshida, “One-Tape Turing Machine and Branching Program Lower Bounds for MCSP”, Theory Comput Syst, 2022
Wenkai Zhang, Zhen Chen, Zhiying Wang, ICC 2022 - IEEE International Conference on Communications, 2022, 3460
Jinhui Liu, Yong Yu, Bo Yang, Jianwei Jia, Qiqi Lai, “Cryptanalysis of Cramer-Shoup Like Cryptosystems Based on Index Exchangeable Family”, Int. J. Found. Comput. Sci., 32:01 (2021), 73
Weiqi Li, Zhen Chen, Zhiying Wang, Syed A. Jafar, Hamid Jafarkhani, 2021 IEEE International Symposium on Information Theory (ISIT), 2021, 1576
Mahdi Cheraghchi, Valentine Kabanets, Zhenjian Lu, Dimitrios Myrisiotis, “Circuit Lower Bounds for MCSP from Local Pseudorandom Generators”, ACM Trans. Comput. Theory, 12:3 (2020), 1
Rafael G. L. D'Oliveira, Salim El Rouayheb, Daniel Heinlein, David Karpuk, 2020 IEEE Conference on Communications and Network Security (CNS), 2020, 1
Weiqi Li, Zhiying Wang, Hamid Jafarkhani, “On the Sub-Packetization Size and the Repair Bandwidth of Reed-Solomon Codes”, IEEE Trans. Inform. Theory, 65:9 (2019), 5484
Yuyang Zhang, Ping Dong, Xiaojiang Du, Hongbin Luo, Tao Zheng, Mohsen Guizani, “BNNC: Improving Performance of Multipath Transmission in Heterogeneous Vehicular Networks”, IEEE Access, 7 (2019), 158113
Jianwei Jia, Houzhen Wang, Huanguo Zhang, Shijia Wang, Jinhui Liu, Communications in Computer and Information Science, 960, Trusted Computing and Information Security, 2019, 255
С. Б. Гашков, И. Б. Гашков, “Быстрый алгоритм извлечения квадратных корней в некоторых конечных полях нечетной характеристики”, Вестн. Моск. ун-та. Сер. 1. Матем., мех., 2018, № 5, 8–14; S. B. Gashkov, I. B. Gashkov, “Fast algorithm of square rooting in some odd characteгistic finite field”, Moscow University Mathematics Bulletin, Moscow University Mеchanics Bulletin, 73:5 (2018), 176–181
Jinhui Liu, Yong Yu, Bo Yang, Jianwei Jia, Shijia Wang, Houzhen Wang, Keith Martin, “Structural Key Recovery of Simple Matrix Encryption Scheme Family”, The Computer Journal, 61:12 (2018), 1880