Bodur, Şeyma; Martínez-Moro, Edgar; Ruano, Diego Private information retrieval schemes using cyclic codes. (English) Zbl 07724818 Mesnager, Sihem (ed.) et al., Arithmetic of finite fields. 9th international workshop, WAIFI 2022, Chengdu, China, August 29 – September 2, 2022. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13638, 194-207 (2023). MSC: 94B15 11T71 68P20 PDFBibTeX XMLCite \textit{Ş. Bodur} et al., Lect. Notes Comput. Sci. 13638, 194--207 (2023; Zbl 07724818) Full Text: DOI arXiv
Giulietti, Massimo; Sabatini, Arianna; Timpanella, Marco PIR codes from combinatorial structures. (English) Zbl 07724816 Mesnager, Sihem (ed.) et al., Arithmetic of finite fields. 9th international workshop, WAIFI 2022, Chengdu, China, August 29 – September 2, 2022. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13638, 169-182 (2023). MSC: 94B05 11T71 68P27 PDFBibTeX XMLCite \textit{M. Giulietti} et al., Lect. Notes Comput. Sci. 13638, 169--182 (2023; Zbl 07724816) Full Text: DOI arXiv
Zhang, Wenqin; Zhou, Zhengchun; Parampalli, Udaya; Sidorenko, Vladimir Capacity-achieving private information retrieval scheme with a smaller sub-packetization. (English) Zbl 1512.68083 Adv. Math. Commun. 15, No. 2, 347-363 (2021). MSC: 68P20 11T71 68P27 94A60 PDFBibTeX XMLCite \textit{W. Zhang} et al., Adv. Math. Commun. 15, No. 2, 347--363 (2021; Zbl 1512.68083) Full Text: DOI
Lavauzelle, Julien; Levy-dit-Vehel, Françoise Generic constructions of PoRs from codes and instantiations. (English) Zbl 1443.94106 J. Math. Cryptol. 13, No. 2, 81-106 (2019). MSC: 94B05 11T71 68P20 68P25 PDFBibTeX XMLCite \textit{J. Lavauzelle} and \textit{F. Levy-dit-Vehel}, J. Math. Cryptol. 13, No. 2, 81--106 (2019; Zbl 1443.94106) Full Text: DOI HAL
Murtagh, Fionn Thinking ultrametrically, thinking \(p\)-adically. (English) Zbl 1365.68232 Aleskerov, Fuad (ed.) et al., Clusters, orders, and trees: methods and applications. In honor of Boris Mirkin’s 70th birthday. Collected papers based on the presentations at the international workshop, Moscow, Russia, December 12–13, 2012. New York, NY: Springer (ISBN 978-1-4939-0741-0/hbk; 978-1-4939-0742-7/ebook). Springer Optimization and Its Applications 92, 249-272 (2014). MSC: 68P20 11Z05 54E35 62H30 68T10 PDFBibTeX XMLCite \textit{F. Murtagh}, Springer Optim. Appl. 92, 249--272 (2014; Zbl 1365.68232) Full Text: DOI
Yamamura, Akihiro; Saito, Taiichi Subgroup membership problem and its applications to information security. (English) Zbl 1032.94006 Sci. Math. Jpn. 57, No. 1, 25-41 (2003). Reviewer: Wilfried Meidl (Singapore) MSC: 94A60 68Q17 11Y16 PDFBibTeX XMLCite \textit{A. Yamamura} and \textit{T. Saito}, Sci. Math. Jpn. 57, No. 1, 25--41 (2003; Zbl 1032.94006)
Lempel, Abraham; Seroussi, Gadiel Application of finite fields to memory interleaving. (English) Zbl 0801.68043 Cohen, Gérard (ed.) et al., Applied algebra, algebraic algorithms and error-correcting codes. 10th International symposium, AAECC-10, San Juan de Puerto Rico, Puerto Rico, May 10-14, 1993. Proceedings. Berlin: Springer-Verlag. Lect. Notes Comput. Sci. 673, 244-256 (1993). MSC: 68P20 11T71 94C10 PDFBibTeX XMLCite \textit{A. Lempel} and \textit{G. Seroussi}, Lect. Notes Comput. Sci. 673, 244--256 (1993; Zbl 0801.68043)
LaPaugh, Andrea S.; Lipton, Richard J.; Sandberg, Jonathan S. How to store a triangular matrix. (English) Zbl 1395.68112 IEEE Trans. Comput. 41, No. 7, 896-899 (1992). MSC: 68P20 11B25 PDFBibTeX XMLCite \textit{A. S. LaPaugh} et al., IEEE Trans. Comput. 41, No. 7, 896--899 (1992; Zbl 1395.68112) Full Text: DOI
Abbott, John Some ideas about fault-tolerant Chinese remaindering. (English) Zbl 0761.11001 Applied algebra, algebraic algorithms and error-correcting codes, Proc. 8th Int. Conf., AAECC-8, Tokyo/Jap. 1990, Lect. Notes Comput. Sci. 508, 155-163 (1991). Reviewer: Harvey Cohn (New York) MSC: 11A05 68P20 94B60 PDFBibTeX XMLCite \textit{J. Abbott}, Lect. Notes Comput. Sci. None, 155--163 (1991; Zbl 0761.11001)
Chang, C. C. An information protection scheme based upon number theory. (English) Zbl 0653.68111 Comput. J. 30, 249-253 (1987). MSC: 68P20 11A99 94A60 68P05 PDFBibTeX XMLCite \textit{C. C. Chang}, Comput. J. 30, 249--253 (1987; Zbl 0653.68111) Full Text: DOI
Akritas, A. G.; Iyengar, S. S.; Rampuria, A. A. Computationally efficient algorithms for a one-time pad scheme. (English) Zbl 0525.68063 Int. J. Comput. Inform. Sci. 12, 285-316 (1983). MSC: 68P20 11B39 94A99 68Q25 68P05 PDFBibTeX XMLCite \textit{A. G. Akritas} et al., Int. J. Comput. Inform. Sci. 12, 285--316 (1983; Zbl 0525.68063) Full Text: DOI
Blakley, G. R.; Borosh, I. Rivest-Shamir-Adleman public key crytosystems do not always conceal messages. (English) Zbl 0411.94010 Comput. Math. Appl. 5, 169-178 (1979). MSC: 94A99 68P20 68Q99 11A99 PDFBibTeX XMLCite \textit{G. R. Blakley} and \textit{I. Borosh}, Comput. Math. Appl. 5, 169--178 (1979; Zbl 0411.94010) Full Text: DOI
Knoble, H. D.; Forney, C. jun.; Bader, F. S. An efficient one-way enciphering algorithm. (English) Zbl 0398.68020 ACM Trans. Math. Softw. 5, 97-107 (1979). MSC: 68Q25 11A25 11A41 11-04 68N25 12-04 11T06 11T55 68P20 PDFBibTeX XMLCite \textit{H. D. Knoble} et al., ACM Trans. Math. Softw. 5, 97--107 (1979; Zbl 0398.68020) Full Text: DOI
van de Lune, J. On the asymptotic behaviour of a sequence arising in computer science. (English) Zbl 0301.68102 Math. Centrum, Amsterdam, Afd. zuivere Wisk. ZW 31/74, 17 p. (1974). MSC: 68P20 40A05 11M06 94A05 PDFBibTeX XML