


default search action
International Journal of Computer Mathematics: Computer Systems Theory, Volume 6
Volume 6, Number 1, 2021
- Dima Grigoriev, Vladimir Shpilrain:

RSA and redactable blockchains. 1-6
- Abiodun Kazeem Moses

, Joseph Bamidele Awotunde
, Roseline Oluwaseun Ogundokun
, Sanjay Misra
, Emmanuel Abidemi Adeniyi
:
Applicability of MMRR load balancing algorithm in cloud computing. 7-20 - Farshad Safaei, F. Kashkooei Jahromi, S. Fathi:

Graphlets importance ranking in complex networks based on the spectral energy contribution. 21-36 - Kiran R. Bhutani, Ravi Kalpathy

, Hosam M. Mahmoud:
Average measures in polymer graphs. 37-53 - Osman Asif Malik

, Stephen Becker
:
Randomization of approximate bilinear computation for matrix multiplication. 54-93 - Yuriy Stoyan

, Georgiy Yaskov
:
Optimized packing unequal spheres into a multiconnected domain: mixed-integer non-linear programming approach. 94-111
Volume 6, Number 2, 2021
- Arsalan Rahmani

:
A new closed-open vehicle routing approach in stochastic environments. 113-129 - Amir Mesrikhani, Mohammad Farshi, Behnam Iranfar:

A progressive algorithm for the closest pair problem. 130-136 - Steve Isaac, Delaram Kahrobaei

:
A closer look at the tropical cryptography. 137-142 - S. Maria Jesu Raja, Indra Rajasingh

, Antony Xavier:
Induced H-packing k-partition of graphs. 143-158 - Hongyan Cai, Qiang Sun

:
A note on improper DP-colouring of planar graphs. 159-166 - Chunhua Cao, Haiyan Liu, Di Yang:

Some properties of d-codes. 167-177 - Ali Gholami Rudi:

Approximate curve-restricted simplification of polygonal curves. 178-187
Volume 6, Number 3, 2021
- Ke Wang, Jiannan Zhou, Dong He, Qinghe Tong:

Note on the three-coloured bipartite Ramsey numbers for paths. 189-193 - Khadija Achkoun, Charifa Hanin, Anas Sadak

, Fatima Ezzahra Ziani
, Fouzia Omary:
SPF-CA-1.2: an enhanced version of cellular automata-based block cipher system. 194-208 - R. Stalin Mary

, N. Parthiban, Indra Rajasingh
, Paul D. Manuel
:
Optimal layout of recursive circulant graphs. 209-219 - Saulius Minkevicius, Leonidas Sakalauskas:

On the law of iterated logarithm for extreme queue length in an open queueing network. 220-235 - Kijung Kim

:
Restrained Italian domination in trees. 236-242
Volume 6, Number 4, October 2021
- Markus Grassl

:
Algebraic quantum codes: linking quantum mechanics and discrete mathematics. 243-259 - Iris Anshel, Derek Atkins

, Dorian Goldfeld, Paul E. Gunnells
:
WalnutDSA™: a group theoretic digital signature algorithm. 260-284 - Mariya Bessonov, Dima Grigoriev, Vladimir Shpilrain:

Probability theory and public-key cryptography. 285-290 - Julian Danner

, Martin Kreuzer
:
A fault attack on KCipher-2. 291-312 - Suvradip Chakraborty

, Y. Sreenivasa Rao
, C. Pandu Rangan:
Efficient single round attribute-based authenticated key exchange protocol. 313-336 - Reza Azarderakhsh

, Jean-François Biasse
, Rami El Khatib
, Brandon Langenberg
, Benjamin Pring
:
Parallelism strategies for the tuneable golden-claw finding problem. 337-363 - Nir Drucker

, Shay Gueron, Dusan Kostic, Edoardo Persichetti
:
On the applicability of the Fujisaki-Okamoto transformation to the BIKE KEM. 364-374 - Benjamin Fine, Martin Kreuzer

, Gerhard Rosenberger:
Further potential applications of group theory in information security. 375-380 - Delaram Kahrobaei

, Vladimir Shpilrain:
A note on fully homomorphic encryption of real-life data. 381-385 - Correction. 386

- Samuel Dobson

, Steven D. Galbraith
, Jason T. LeGrow
, Yan Bo Ti, Lukas Zobernig
:
An adaptive attack on 2-SIDH. 387-404

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














