Travis, Betty Breaking the ”Zip Code” code. (English) Zbl 1097.94521 Missouri J. Math. Sci. 1, No. 2, 9 p. (1989). MSC: 94A60 PDFBibTeX XMLCite \textit{B. Travis}, Missouri J. Math. Sci. 1, No. 2, 9 p. (1989; Zbl 1097.94521)
Seberry, Jennifer; Pieprzyk, Josef Cryptography: an introduction to computer security. (English) Zbl 0716.94008 Advances in Computer Science Series. New York etc.: Prentice Hall. viii, 375 p. £37.95 (1989). Reviewer: M.De Soete (Brussels) MSC: 94A60 94-02 PDFBibTeX XMLCite \textit{J. Seberry} and \textit{J. Pieprzyk}, Cryptography: an introduction to computer security. New York etc.: Prentice Hall (1989; Zbl 0716.94008)
Deavours, Cipher (ed.); Kahn, David (ed.); Kruh, Louis (ed.); Mellen, Greg (ed.); Winkel, Brian (ed.) Cryptology: Machines, history, and methods. Articles selected from the journal Cryptologia. (English) Zbl 0697.94002 Norwood: Artech House, Inc. x, 508 p. £48.00 (1989). MSC: 94-06 00Bxx 94-03 94A60 PDFBibTeX XMLCite \textit{C. Deavours} (ed.) et al., Cryptology: Machines, history, and methods. Articles selected from the journal Cryptologia. Norwood: Artech House, Inc. (1989; Zbl 0697.94002)
Bressoud, David M. Factorization and primality testing. (English) Zbl 0707.11001 Undergraduate Texts in Mathematics. New York etc.: Springer-Verlag. xiii, 237 p. DM 98.00 (1989). Reviewer: H.J.J.te Riele MSC: 11-01 11Y05 11Y11 11A41 11Axx 94A60 68W30 PDFBibTeX XMLCite \textit{D. M. Bressoud}, Factorization and primality testing. New York etc.: Springer-Verlag (1989; Zbl 0707.11001)
Brawley, Joel V.; Schnibben, George E. Infinite algebraic extensions of finite fields. (English) Zbl 0674.12009 Contemporary Mathematics, 95. Providence, RI: American Mathematical Society (AMS). xv, 104 p. $ 24.00 (1989). Reviewer: David Kirby (Southampton) MSC: 12E20 11T06 12E05 12F05 12-01 11T71 PDFBibTeX XMLCite \textit{J. V. Brawley} and \textit{G. E. Schnibben}, Infinite algebraic extensions of finite fields. Providence, RI: American Mathematical Society (1989; Zbl 0674.12009) Full Text: DOI
Horster, Patrick; Schade, Marion Das Kryptosystem von Lu und Lee. Ein Public-Key-Kryptosystem, Attacken und Modifikationen. (German) Zbl 0686.94005 Hochschultexte Informatik, 14. Heidelberg: Hüthig. VIII, 113 p. DM 38.00 (1989). Reviewer: Herman J. Tiersma (Den Haag) MSC: 94A60 94-01 PDFBibTeX XMLCite \textit{P. Horster} and \textit{M. Schade}, Das Kryptosystem von Lu und Lee. Ein Public-Key-Kryptosystem, Attacken und Modifikationen. Heidelberg: Hüthig (1989; Zbl 0686.94005)
Beker, Henry J. (ed.); Piper, F. C. (ed.) Cryptography and coding. Based on the proceedings of a conference organized by the Institute of Mathematics and its Applications on cryptography and coding, held at the Royal Agricultural College, Cirencester/UK, on 15th-17th December 1986. (English) Zbl 0678.94002 The Institute of Mathematics and its Applications Conference Series, New Series, 20. Oxford: Clarendon Press. x, 297 p. £35.00 (1989). Reviewer: I.Wende MSC: 94-06 00B25 68-06 94Axx 94Bxx PDFBibTeX XMLCite \textit{H. J. Beker} (ed.) and \textit{F. C. Piper} (ed.), Cryptography and coding. Based on the proceedings of a conference organized by the Institute of Mathematics and its Applications on cryptography and coding, held at the Royal Agricultural College, Cirencester/UK, on 15th-17th December 1986. Oxford: Clarendon Press (1989; Zbl 0678.94002)
Horster, Patrick; Isselhorst, Hartmut Approximative Public-Key-Kryptosysteme. (German) Zbl 0753.94011 Informatik-Fachberichte. 206. Berlin: Springer-Verlag. vii, 174 S. (1989). Reviewer: W.Meier (Brugg) MSC: 94A60 PDFBibTeX XMLCite \textit{P. Horster} and \textit{H. Isselhorst}, Approximative Public-Key-Kryptosysteme. Berlin: Springer-Verlag (1989; Zbl 0753.94011)
Narasimhan, R. (ed.) A perspective in theoretical computer science. Commemorative volume for Gift Siromoney. (English) Zbl 0744.68026 Series in Computer Science 16. Singapore etc.: World Scientific (ISBN 9971-50-925-3/hbk; 978-981-4368-45-2/ebook). XVIII, 438 p. (1989). Reviewer: P.van Emde Boas (Amsterdam) MSC: 68-06 68Q42 68Q55 68Q45 94A60 PDFBibTeX XMLCite \textit{R. Narasimhan} (ed.), A perspective in theoretical computer science. Commemorative volume for Gift Siromoney. Singapore etc.: World Scientific (1989; Zbl 0744.68026) Full Text: DOI
Rivero, Francisco \(\mathrm{GL}_n\)-orbits of minimal functions over finite fields. (English) Zbl 0725.43009 Notas Mat., Merida 100, 121-129 (1989). Reviewer: E.Płonka (Wodzisław) MSC: 43A60 43A40 12E20 11T71 PDFBibTeX XML
Nechaev, A. A. The Kerdok code in cyclic form. (Russian) Zbl 0718.94012 Diskretn. Mat. 1, No. 4, 123-139 (1989). Reviewer: L.Staiger (Pulheim) MSC: 94B15 11T71 PDFBibTeX XMLCite \textit{A. A. Nechaev}, Diskretn. Mat. 1, No. 4, 123--139 (1989; Zbl 0718.94012)
Cohen, Stephen D. Windmill polynomials over fields of characteristic two. (English) Zbl 0716.94007 Monatsh. Math. 107, No. 4, 291-301 (1989). Reviewer: Stephen D.Cohen MSC: 94A55 11T06 11T71 PDFBibTeX XMLCite \textit{S. D. Cohen}, Monatsh. Math. 107, No. 4, 291--301 (1989; Zbl 0716.94007) Full Text: DOI EuDML
Brynielsson, Lennart A short proof of the Xiao-Massey lemma. (English) Zbl 0715.60022 IEEE Trans. Inf. Theory 35, No. 6, 1344 (1989). MSC: 60E99 94A60 PDFBibTeX XMLCite \textit{L. Brynielsson}, IEEE Trans. Inf. Theory 35, No. 6, 1344 (1989; Zbl 0715.60022) Full Text: DOI
McCurley, Kevin S. Cryptographic key distribution and computation in class groups. (English) Zbl 0712.11076 Number theory and applications, Proc. NATO ASI, Banff/Can. 1988, NATO ASI Ser., Ser. C 265, 459-479 (1989). Reviewer: Hugh C. Williams (Winnipeg) MSC: 11Y16 11Y40 94A60 11R11 11R29 11T71 PDFBibTeX XML
Ash, David W.; Blake, Ian F.; Vanstone, Scott A. Low complexity normal bases. (English) Zbl 0712.11073 Discrete Appl. Math. 25, No. 3, 191-210 (1989). Reviewer: Joseph Liang (Tampa) MSC: 11T30 12E20 11T71 11Y16 PDFBibTeX XMLCite \textit{D. W. Ash} et al., Discrete Appl. Math. 25, No. 3, 191--210 (1989; Zbl 0712.11073) Full Text: DOI
Sgarro, Andrea Are keys best chosen at random? (English) Zbl 0709.94021 Riv. Mat. pura Appl. 4, 73-77 (1989). MSC: 94A60 PDFBibTeX XML
Koblitz, Neal Three practical applications of algebraic curves over finite fields. (English) Zbl 0705.94018 J. Sichuan Univ., Nat. Sci. Ed. 26, Spec. Issue, 28-35 (1989). Reviewer: H.J.Tiersma MSC: 94B60 94A60 14H52 14H99 11T71 PDFBibTeX XML
Wood, Jay A. Spinor groups and algebraic coding theory. (English) Zbl 0704.22010 J. Comb. Theory, Ser. A 51, No. 2, 277-313 (1989). Reviewer: H.J.Tiersma MSC: 22E40 20E07 94B60 11T71 PDFBibTeX XMLCite \textit{J. A. Wood}, J. Comb. Theory, Ser. A 51, No. 2, 277--313 (1989; Zbl 0704.22010) Full Text: DOI
Martin, Clyde F.; Stamp, Mark Constructing polynomials over finite fields. (English) Zbl 0702.11087 Computation and control, Proc. Conf., Bozeman/MT 1988, Prog. Syst. Control Theory 1, 233-252 (1989). Reviewer: H.J.Tiersma MSC: 11T71 65C10 94A55 05C20 PDFBibTeX XML
Katz, Nicholas; Livné, Ron Sommes de Kloosterman et courbes elliptiques universelles en caractéristiques 2 et 3. (Kloosterman sums and universal elliptic curves in characteristics 2 and 3). (French) Zbl 0701.14033 C. R. Acad. Sci., Paris, Sér. I 309, No. 11, 723-726 (1989). Reviewer: G.van der Geer MSC: 14H52 94B27 11T71 11R29 14K02 PDFBibTeX XMLCite \textit{N. Katz} and \textit{R. Livné}, C. R. Acad. Sci., Paris, Sér. I 309, No. 11, 723--726 (1989; Zbl 0701.14033)
Xiang, Zhaohong A problem about the DFT in Z[i]. (Chinese. English summary) Zbl 0701.11074 J. Sichuan Univ., Nat. Sci. Ed. 26, No. 4, 416-423 (1989). Reviewer: Ke Zhao MSC: 11T71 65T50 11A07 PDFBibTeX XMLCite \textit{Z. Xiang}, J. Sichuan Univ., Nat. Sci. Ed. 26, No. 4, 416--423 (1989; Zbl 0701.11074)
Shen, Zhongqi On the CRT over residue class ring \({\mathbb{F}}[x]/(f(x))\). (Chinese. English summary) Zbl 0698.12014 J. Sichuan Univ., Nat. Sci. Ed. 26, Spec. Issue, 160-163 (1989). MSC: 11T99 94A60 PDFBibTeX XML
Hilton, Peter Reminiscences of Bletchley Park, 1942-1945. (English) Zbl 0695.01016 A century of mathematics in America, Pt. I, Hist. Math. 1, 291-301 (1989). Reviewer: E.R.Unger MSC: 01A70 01A60 01A80 94-03 94A60 PDFBibTeX XML
Vallée, B.; Girault, M.; Toffin, P. Comment deviner les racines \(\ell\)-ièmes modulo n en réduisant des réseaux. (How to guess the \(\ell th\) roots modulo n by lattice reduction). (French) Zbl 0692.10006 Publ. Math. Orsay 89/01, 109-133 (1989). MSC: 11A15 94A60 68Q25 11T99 11A41 11H55 11H06 PDFBibTeX XMLCite \textit{B. Vallée} et al., Publ. Math. Orsay 89/01, 109--133 (1989; Zbl 0692.10006)
Vallée, Brigitte; Girault, Marc; Toffin, Philippe How to guess \(\ell\)-th roots modulo n by reducing lattice bases. (English) Zbl 0692.10005 Applied algebra, algebraic algorithms and error-correcting codes, Proc. 6th Int. Conference, AAECC-6, Rome/Italy 1988, Lect. Notes Comput. Sci. 357, 427-442 (1989). Reviewer: M.Pohst MSC: 11A15 94A60 68Q25 11H55 11H06 11T99 11A41 PDFBibTeX XML
Vanden Eynden, Charles Flipping a coin over the telephone. (English) Zbl 0689.10016 Math. Mag. 62, No. 3, 167-172 (1989). Reviewer: H. J. Godwin (Egham) MSC: 94A60 PDFBibTeX XMLCite \textit{C. Vanden Eynden}, Math. Mag. 62, No. 3, 167--172 (1989; Zbl 0689.10016) Full Text: DOI
Abadi, Martín; Feigenbaum, Joan; Kilian, Joe On hiding information from an oracle. (English) Zbl 0687.68016 J. Comput. Syst. Sci. 39, No. 1, 21-50 (1989). MSC: 68Q25 94A60 PDFBibTeX XMLCite \textit{M. Abadi} et al., J. Comput. Syst. Sci. 39, No. 1, 21--50 (1989; Zbl 0687.68016) Full Text: DOI
Burrows, M.; Abadi, Martin; Needham, R. M. A logic of authentication. (English) Zbl 0687.68007 Proc. R. Soc. Lond., Ser. A 426, No. 1871, 233-271 (1989). MSC: 68N25 68M12 68M14 94A60 PDFBibTeX XMLCite \textit{M. Burrows} et al., Proc. R. Soc. Lond., Ser. A 426, No. 1871, 233--271 (1989; Zbl 0687.68007) Full Text: DOI
Harn, L.; Kiesler, T. Public-key encryption algorithm incorporating error detection. (English) Zbl 0686.94006 Electron. Lett. 25, No. 6, 389-390 (1989). MSC: 94A60 94B99 PDFBibTeX XMLCite \textit{L. Harn} and \textit{T. Kiesler}, Electron. Lett. 25, No. 6, 389--390 (1989; Zbl 0686.94006) Full Text: DOI
Burmester, M. V. D.; Desmedt, Y. G. Remarks on soundness of proofs. (English) Zbl 0685.94005 Electron. Lett. 25, No. 22, 1509-1511 (1989). MSC: 94A60 PDFBibTeX XMLCite \textit{M. V. D. Burmester} and \textit{Y. G. Desmedt}, Electron. Lett. 25, No. 22, 1509--1511 (1989; Zbl 0685.94005) Full Text: DOI
Brickell, Ernest F. Some ideal secret shearing schemes. (English) Zbl 0685.94003 J. Comb. Math. Comb. Comput. 6, 105-113 (1989). MSC: 94A60 PDFBibTeX XMLCite \textit{E. F. Brickell}, J. Comb. Math. Comb. Comput. 6, 105--113 (1989; Zbl 0685.94003)
Harn, L.; Huang, D.; Laih, C. S. Password authentication using public-key cryptography. (English) Zbl 0685.68030 Comput. Math. Appl. 18, No. 12, 1001-1017 (1989). MSC: 68N25 94A60 PDFBibTeX XMLCite \textit{L. Harn} et al., Comput. Math. Appl. 18, No. 12, 1001--1017 (1989; Zbl 0685.68030) Full Text: DOI
Kurosawa, K.; Matsu, K. M mod 3 security of RSA. (English) Zbl 0684.94011 Electron. Lett. 25, No. 7, 445-446 (1989). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Kurosawa} and \textit{K. Matsu}, Electron. Lett. 25, No. 7, 445--446 (1989; Zbl 0684.94011) Full Text: DOI
Harn, L.; Kiesler, T. Improved Rabin’s scheme with high efficiency. (English) Zbl 0684.94010 Electron. Lett. 25, No. 11, 726-728 (1989). MSC: 94A60 PDFBibTeX XMLCite \textit{L. Harn} and \textit{T. Kiesler}, Electron. Lett. 25, No. 11, 726--728 (1989; Zbl 0684.94010) Full Text: DOI
Rao, T. R. N.; Nam, Kil-Hyun Private-key algebraic-code encryptions. (English) Zbl 0684.94009 IEEE Trans. Inf. Theory 35, No. 4, 829-833 (1989). MSC: 94A60 PDFBibTeX XMLCite \textit{T. R. N. Rao} and \textit{K.-H. Nam}, IEEE Trans. Inf. Theory 35, No. 4, 829--833 (1989; Zbl 0684.94009) Full Text: DOI
Kotelya, V. V. On the question of generation of possible keys. (Russian) Zbl 0682.68066 Mat. Issled. 107, 86-99 (1989). MSC: 68Q99 94A60 PDFBibTeX XMLCite \textit{V. V. Kotelya}, Mat. Issled. 107, 86--99 (1989; Zbl 0682.68066)
Galil, Zvi; Haber, Stuart; Yung, Moti Minimum-knowledge interactive proofs for decision problems. (English) Zbl 0678.94007 SIAM J. Comput. 18, No. 4, 711-739 (1989). Reviewer: J.Vyskoc MSC: 94A60 PDFBibTeX XMLCite \textit{Z. Galil} et al., SIAM J. Comput. 18, No. 4, 711--739 (1989; Zbl 0678.94007) Full Text: DOI DOI
Stern, Jacques A method for finding codewords of small weight. (English) Zbl 0678.94006 Coding theory and applications, Proc. 3rd Int. Colloq., Toulon/France 1988, Lect. Notes Comput. Sci. 388, 106-113 (1989). MSC: 94A60 PDFBibTeX XML
Harari, Sami A new authentication algorithm. (English) Zbl 0678.94005 Coding theory and applications, Proc. 3rd Int. Colloq., Toulon/France 1988, Lect. Notes Comput. Sci. 388, 91-105 (1989). MSC: 94A60 PDFBibTeX XML
Sun, Qi; Xiao, Rong Two kinds of elliptic curves over \(F_ q\) used to set up cryptosystems. (Chinese. English summary) Zbl 0678.94004 J. Sichuan Univ., Nat. Sci. Ed. 26, No. 1, 39-43 (1989). MSC: 94A60 11T55 14H52 PDFBibTeX XMLCite \textit{Q. Sun} and \textit{R. Xiao}, J. Sichuan Univ., Nat. Sci. Ed. 26, No. 1, 39--43 (1989; Zbl 0678.94004)
Homer, Steven; Wang, Jie Absolute results concerning one-way functions and their applications. (English) Zbl 0677.94008 Math. Syst. Theory 22, No. 1, 21-35 (1989). MSC: 94A60 68Q25 PDFBibTeX XMLCite \textit{S. Homer} and \textit{J. Wang}, Math. Syst. Theory 22, No. 1, 21--35 (1989; Zbl 0677.94008) Full Text: DOI
Goldwasser, Shafi; Micali, Silvio; Rackoff, Charles The knowledge complexity of interactive proof systems. (English) Zbl 0677.68062 SIAM J. Comput. 18, No. 1, 186-208 (1989). Reviewer: Heinrich Guggenheimer MSC: 68T15 03F07 68Q15 94A60 PDFBibTeX XMLCite \textit{S. Goldwasser} et al., SIAM J. Comput. 18, No. 1, 186--208 (1989; Zbl 0677.68062) Full Text: DOI Link
Niemi, Valtteri One-way functions. (French) Zbl 0676.94010 Arkhimedes 41, No. 3, 232-239 (1989). MSC: 94A60 PDFBibTeX XMLCite \textit{V. Niemi}, Arkhimedes 41, No. 3, 232--239 (1989; Zbl 0676.94010)
Selman, Alan L. Complexity issues in cryptography. (English) Zbl 0675.94008 Computational complexity theory, Proc. Short Course, Atlanta, Georgia/USA 1988, Proc. Symp. Appl. Math. 38, 92-107 (1989). Reviewer: C.Calude MSC: 94A60 68W30 03D15 PDFBibTeX XML
Chor, Benny; Merritt, Michael; Shmoys, David B. Simple constant-time consensus protocols in realistic failure models. (English) Zbl 0675.90038 J. Assoc. Comput. Mach. 36, No. 3, 591-614 (1989). MSC: 90B25 PDFBibTeX XMLCite \textit{B. Chor} et al., J. Assoc. Comput. Mach. 36, No. 3, 591--614 (1989; Zbl 0675.90038) Full Text: DOI
Koblitz, Neal Hyperelliptic cryptosystems. (English) Zbl 0674.94010 J. Cryptology 1, No. 3, 139-150 (1989). MSC: 94A60 14H40 14G15 PDFBibTeX XMLCite \textit{N. Koblitz}, J. Cryptology 1, No. 3, 139--150 (1989; Zbl 0674.94010) Full Text: DOI
Kari, Jarkko Observations concerning a public-key cryptosystem based on iterated morphisms. (English) Zbl 0674.94009 Theor. Comput. Sci. 66, No. 1, 45-53 (1989). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Kari}, Theor. Comput. Sci. 66, No. 1, 45--53 (1989; Zbl 0674.94009) Full Text: DOI
Schellenberg, P. J.; Stinson, D. R. Threshold schemes from combinatorial designs. (English) Zbl 0674.94008 J. Comb. Math. Comb. Comput. 5, 143-160 (1989). Reviewer: D.Jungnickel MSC: 94A60 05B30 05C65 PDFBibTeX XMLCite \textit{P. J. Schellenberg} and \textit{D. R. Stinson}, J. Comb. Math. Comb. Comput. 5, 143--160 (1989; Zbl 0674.94008)
Jammalamadaka, S. Rao; Uppuluri, V. R. R. Is p a prime number? Some probabilistic tests for primality. (English) Zbl 0674.10004 Math. Sci. 14, No. 1, 55-61 (1989). MSC: 11A41 94A60 11-01 PDFBibTeX XMLCite \textit{S. R. Jammalamadaka} and \textit{V. R. R. Uppuluri}, Math. Sci. 14, No. 1, 55--61 (1989; Zbl 0674.10004)
Pintz, János; Steiger, William L.; Szemerédi, Endre Infinite sets of primes with fast primality tests and quick generation of large primes. (English) Zbl 0674.10001 Math. Comput. 53, No. 187, 399-406 (1989). Reviewer: F.van der Linden MSC: 11-04 68Q25 11A41 94A60 PDFBibTeX XMLCite \textit{J. Pintz} et al., Math. Comput. 53, No. 187, 399--406 (1989; Zbl 0674.10001) Full Text: DOI
Luby, Michael; Rackoff, Charles A study of password security. (English) Zbl 0673.94012 J. Cryptology 1, No. 3, 151-158 (1989). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Luby} and \textit{C. Rackoff}, J. Cryptology 1, No. 3, 151--158 (1989; Zbl 0673.94012) Full Text: DOI
Piper, Fred; Walker, Michael Linear ciphers and spreads. (English) Zbl 0673.94011 J. Cryptology 1, No. 3, 185-188 (1989). MSC: 94A60 51E15 PDFBibTeX XMLCite \textit{F. Piper} and \textit{M. Walker}, J. Cryptology 1, No. 3, 185--188 (1989; Zbl 0673.94011) Full Text: DOI
Meier, Willi; Staffelbach, Othmar Fast correlation attacks on certain stream ciphers. (English) Zbl 0673.94010 J. Cryptology 1, No. 3, 159-176 (1989). MSC: 94A60 PDFBibTeX XMLCite \textit{W. Meier} and \textit{O. Staffelbach}, J. Cryptology 1, No. 3, 159--176 (1989; Zbl 0673.94010) Full Text: DOI
Boyar, Joan Inferring sequences produced by a linear congruential generator missing low-order bits. (English) Zbl 0673.94009 J. Cryptology 1, No. 3, 177-184 (1989). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Boyar}, J. Cryptology 1, No. 3, 177--184 (1989; Zbl 0673.94009) Full Text: DOI
Leclerc, Matthias A linear algorithm for breaking periodic Vernam ciphers. (English) Zbl 0672.94006 Ars Comb. 27, 177-180 (1989). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Leclerc}, Ars Comb. 27, 177--180 (1989; Zbl 0672.94006)
Salomaa, Arto The formal language theory column. (English) Zbl 0671.68017 Bull. EATCS 38, 107-123 (1989). Reviewer: J.Vyskoč MSC: 68Q25 94A60 PDFBibTeX XMLCite \textit{A. Salomaa}, Bull. EATCS 38, 107--123 (1989; Zbl 0671.68017)
Meadows, Catherine; Purdy, George Summing over a network without revealing summands. (English) Zbl 0669.94024 BIT 29, No. 1, 110-125 (1989). MSC: 94C15 94A60 PDFBibTeX XMLCite \textit{C. Meadows} and \textit{G. Purdy}, BIT 29, No. 1, 110--125 (1989; Zbl 0669.94024) Full Text: DOI
Cohen, Robert; Girault, Marc; Campana, Mireille Une formule de dénombrement servant en cryptographie. (French) Zbl 0669.60020 Ann. Télécommun. 44, No. 7-8, 405-411 (1989). MSC: 60C05 94A60 PDFBibTeX XMLCite \textit{R. Cohen} et al., Ann. Télécommun. 44, No. 7--8, 405--411 (1989; Zbl 0669.60020)
Boyar, Joan Inferring sequences produced by pseudo-random number generators. (English) Zbl 0667.94006 J. Assoc. Comput. Mach. 36, No. 1, 129-141 (1989). MSC: 94A60 65C10 PDFBibTeX XMLCite \textit{J. Boyar}, J. Assoc. Comput. Mach. 36, No. 1, 129--141 (1989; Zbl 0667.94006) Full Text: DOI
Chor, Benny; Rivest, Ronald L. A knapsack-type public key cryptosystem based on arithmetic in finite fields. (English) Zbl 0664.94011 IEEE Trans. Inf. Theory 34, No. 5, Part I, 901-909 (1989). MSC: 94A60 PDFBibTeX XMLCite \textit{B. Chor} and \textit{R. L. Rivest}, IEEE Trans. Inf. Theory 34, No. 5, Part I, 901--909 (1989; Zbl 0664.94011) Full Text: DOI
Leclerc, Matthias Chinesische Reste und moderne Kryptographie. (German) Zbl 0747.94013 Math. Semesterber. 36, No. 2, 257-267 (1989). Reviewer: W.Meier (Brugg) MSC: 94A60 11A07 PDFBibTeX XMLCite \textit{M. Leclerc}, Math. Semesterber. 36, No. 2, 257--267 (1989; Zbl 0747.94013)
Alexandris, N.; Burmester, M.; Chrissikopoulos, V. The structure and complexity of interactive zero-knowledge proofs. (English) Zbl 0735.68026 Bull. Greek Math. Soc. 30, 1-20 (1989). MSC: 68P25 68Q25 94A60 PDFBibTeX XMLCite \textit{N. Alexandris} et al., Bull. Greek Math. Soc. 30, 1--20 (1989; Zbl 0735.68026) Full Text: EuDML
Cao, Jie A simple and practical public key cryptosystem. (Chinese. English summary) Zbl 0737.94007 J. Nanjing Aeronaut. Inst. 21, No. 3, 70-76 (1989). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Cao}, J. Nanjing Aeronaut. Inst. 21, No. 3, 70--76 (1989; Zbl 0737.94007)
Kak, Subhash C. Some early codes and ciphers. (English) Zbl 0742.01010 Indian J. Hist. Sci. 24, No. 1, 1-7 (1989). Reviewer: C.J.Scriba (Hamburg) MSC: 01A32 PDFBibTeX XMLCite \textit{S. C. Kak}, Indian J. Hist. Sci. 24, No. 1, 1--7 (1989; Zbl 0742.01010)
Xu, Dazhuan; Zou, Shenchang A fast algorithm for multiplication and division and its application. (English) Zbl 0737.68026 J. Nanjing Aeronaut. Inst., Engl. Ed. 6, No. 1, 125-133 (1989). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{D. Xu} and \textit{S. Zou}, J. Nanjing Aeronaut. Inst., Engl. Ed. 6, No. 1, 125--133 (1989; Zbl 0737.68026)
Tiersma, H. J. Constructing codes. (English) Zbl 0726.94008 Eindhoven: TU Eindhoven, Thesis. 119 p. (1989). MSC: 94B05 11T71 14G15 PDFBibTeX XMLCite \textit{H. J. Tiersma}, Constructing codes. Eindhoven: TU Eindhoven, Thesis (1989; Zbl 0726.94008)
Mollin, Richard A. (ed.) Number theory and applications. Proceedings of the NATO Advanced Study Institute held at Banff Centre, Canada, 27 April - 5 May 1988. (English) Zbl 0676.00005 NATO Scientific Affairs Division. NATO ASI Series, Series C: Mathematical and Physical Sciences, 265. Dordrecht etc.: Kluwer Academic Publishers. xviii, 616 p. Dfl. 280.00; $ 149.00; £89.00 (1989). MSC: 00B25 11-06 12-06 14-06 68Q25 94A60 PDFBibTeX XML
Cao, Zhenfu; Liu, Rui A new knapsack cryptosystem. (Chinese. English summary) Zbl 0758.94005 Appl. Math., J. Chin. Univ. 4, No. 1, 1-5 (1989). MSC: 94A60 PDFBibTeX XMLCite \textit{Z. Cao} and \textit{R. Liu}, Appl. Math., J. Chin. Univ. 4, No. 1, 1--5 (1989; Zbl 0758.94005)