Voir la notice de l'article provenant de la source Math-Net.Ru
[1] Belyavskaya G. B., Tabarov A. Kh., “Identities with permutations leading to linearity of quasigroups”, Discrete Math. Appl., 19:2 (2009), 173–190 | DOI | MR | Zbl
[2] Babenko L. K., Byrtika F.B., Makarevitch O.B., Trapacheva A.V., “A fully homomorphic encoding (review)”, Problems of information security, 3 (2016), 3–25 (in Russian) | Zbl
[3] Baryshnikov A.V., Katyshev S.Yu., “Key agreement schemes based on linear groupoids”, Matematicheskie Voprosy Kriptografii, 8:1 (2017), 7–12 | DOI | MR
[4] Baryshnikov A.V., Katyshev S.Yu., “Application of non-associative structures for the construction of public key distribution algorithms”, Matematicheskie Voprosy Kriptografii, 9:4 (2018), 5–30 (in Russian) | DOI | MR
[5] Boneh D., Goh E.-J., Nissim K., “Evaluating 2-DNF formulas on ciphertexts”, Theory of Cryptography, TCC'05, Lect. Notes Comput. Sci., 3378, 2005, 325–341 | DOI | MR | Zbl
[6] Gentry C., A Fully Homomorphic Encryption Scheme, Ph.D. Thesis, Stanford Univ., 2009 | Zbl
[7] Goldwasser S., Micali S., “Probabilistic encryption”, J. Comput. System Sci., 28:2 (1984), 270–299 | DOI | MR | Zbl
[8] Gribov A.V., “Some homomorphic cryptosystem based on nonassociative structures”, J. Math. Sci., 223:5 (2017), 581–586 | DOI | MR | Zbl
[9] El-Gamal T., “A public-key cryptosystem and a signature scheme based on discrete logarithms”, IEEE Trans. Inform. Theory, 31 (1985), 469–472 | DOI | MR
[10] Katyshev S. Yu., Markov V. T., Nechaev A. A., “Application of non-associative groupoids to the realization of an open key distribution procedure”, Discrete Math. Appl., 25:1 (2015), 9–24 | DOI | MR | Zbl
[11] Katyshev S. Yu., “Discrete logarithm problem in finite dimensional algebras over field”, Prikladnaya diskretnaya matematika, 26:4 (2014), 21–28 (in Russian) | DOI
[12] Rivest R., Adleman L., Dertouzos M., “On data banks and privacy homomorphisms”, Foundations of Secure Computation, Academic Press, 1978, 169–177 | MR
[13] Varnovsky N. P., Shokurov A.V., “Homomorphic Encryption”, Trudy ISP RAN, 12 (2006), 27–36 (in Russian)