Login
|
New Account
AAAAAA
ITA
ENG
Results:
1-5
|
Results: 5
Clouds over a public key cryptosystem based on Lyndon words
Authors:
Vasco, MIG Steinwandt, R
Citation:
Mig. Vasco et R. Steinwandt, Clouds over a public key cryptosystem based on Lyndon words, INF PROCESS, 80(5), 2001, pp. 239-242
Recognizing simple subextensions of purely transcendental field extensions
Authors:
Muller-Quade, J Steinwandt, R
Citation:
J. Muller-quade et R. Steinwandt, Recognizing simple subextensions of purely transcendental field extensions, APPL ALG EN, 11(1), 2000, pp. 35-41
Grobner bases applied to finitely generated field extensions
Authors:
Muller-Quade, J Steinwandt, R
Citation:
J. Muller-quade et R. Steinwandt, Grobner bases applied to finitely generated field extensions, J SYMB COMP, 30(4), 2000, pp. 469-490
Decomposing a matrix into circulant and diagonal factors
Authors:
Schmid, M Steinwandt, R Muller-Quade, J Rotteler, M Beth, T
Citation:
M. Schmid et al., Decomposing a matrix into circulant and diagonal factors, LIN ALG APP, 306(1-3), 2000, pp. 131-143
Basic algorithms for rational function fields
Authors:
Muller-Quade, J Steinwandt, R
Citation:
J. Muller-quade et R. Steinwandt, Basic algorithms for rational function fields, J SYMB COMP, 27(2), 1999, pp. 143-170
Risultati:
1-5
|