Cited By
View all- Chevardin VLavryk I(2024)Cryptosystems based on isomorphic transformations of elliptic curve points.Communication, informatization and cybersecurity systems and technologies10.58254/viti.5.2024.19.215(215-226)Online publication date: 1-Jun-2024
- Fagin B(2024)Minimal idempotency, partial idempotency, search heuristics and constructive algorithms for idempotent integersPublications mathématiques de Besançon. Algèbre et théorie des nombres10.5802/pmb.53(7-21)Online publication date: 22-Apr-2024
- Pakhomchik AVinokur V(2024)Potential Vulnerabilities of Cryptoalgorithms in the World of Ideal Quantum AnnealersThe Role of Cybersecurity in the Industry 5.0 Era [Working Title]10.5772/intechopen.114973Online publication date: 21-May-2024
- Show More Cited By