Cite

[1] CHARKANI,M. E.-SAHMOUDI,M.: Sextic extension with cubic subfield, JP J.Algebra, Number Theory Appl. 34 (2014), 139-150.Search in Google Scholar

[2] CHILLALI, A.-SAHMOUDI, M.: Cryptography over sextic extension with cubic subfield, World Academy Sci. Engrg. Technol. 9 (2015), 246-249.Search in Google Scholar

[3] COHEN, H.: A Course in Computational Algebraic Number theory. GTM Springer-Verlag, Berlin, 1996.Search in Google Scholar

[4] DIFFIE, W.-HELLMAN,M. E.: New directions in cryptography, IEEE Trans. Inf. Theory 22 (1976), 644-654.10.1109/TIT.1976.1055638Search in Google Scholar

[5] MENEZES, A. J.: Elliptic Curve Public key Cryptosystems. Foreword by Neal Koblitz. In: Kluwer Internat. Ser. Engrg. Comput. Sci., Vol. 234, Kluwer Acad. Publ., Boston, MA, 1993.Search in Google Scholar

[6] RIVEST, R. L.-ADLEMAN, L.-DERTOUZOS, M. L.: On data banks and privacy homomorphisms. Foundations of Secure Computation 11, (1978) no. 4, 169-180.Search in Google Scholar

[7] SAHMOUDI, M.: Explicit integral basis for a family of sextic field, Gulf J. Math. 4 (2016), 217-222.10.56947/gjom.v4i4.280Search in Google Scholar

[8] MILLER, V. S.: Use of elliptic curves in cryptography. In: Advances in Cryptology- -CRYPTO ’85 (H. C. Williams, ed.), Proc. Conf., Santa Barbara/Calif. 1985, Lect. Notes Comput. Sci., Vol. 218, Springer, Berlin, 1986, pp. 417-426.Search in Google Scholar

eISSN:
1210-3195
Language:
English
Publication timeframe:
3 times per year
Journal Subjects:
Mathematics, General Mathematics