References
- [1] Henri Cohen, Gerhard Frey, Handbook of Elliptic and Hyperelliptic Curve Cryptography, CRC 2006.10.1201/9781420034981
- [2] Jean Sebastien Coron, David Lefranc, Guillaume Poupard, A New Baby-Step Giant-Step Algorithm and Some Applications to Cryptanalysis, Cryptographic Hardware and Embedded Systems, CHES 2005, Springer Berlin/Heidelberg, 2005.
- [3] Antonescu Elisabeta, Bota Gabriela, Serb Bogdan, Duicau Lavinia, Study of the Total Serum Concentration of Serum Ionized Magnesium in Children and Adolescents from Sibiu Area, Revista de chimie, 69 (2018), no. 12, 3389–3392.10.37358/RC.18.12.6756
- [4] Duica Lavinia, Depression - multiple psychopathological faces (a case report), Proceedings of the International Conference on Mental Health -Psychology, Medicine and Anthropology for Life Quality, Romania, 2016, 59–62.
- [5] Silisteanu Sinziana, Antonescu, Elisabeta, Duica Lavinia, The importance of balance and postural control in the recovery of stroke patients, Balneo Research Journal, 11 (2020), no. 3, 372–378.10.12680/balneo.2020.365
- [6] Duica Lavinia, The use of the internet - professional development or internet addiction in medical students, Journal of Educational Sciences & Psychology, 7 (2017), no. 2, 59–64.
- [7] Mutica M., Ciubara Anamaria, Duica Lavinia, Alexandru D., Plesea Condratovici, Pirlog Mihail, Elderly schizophrenic patients - clinical and social correlations, European Neuropsychopharmacology, 26 (2016), no. 2, 5512-5512.10.1016/S0924-977X(16)31536-X
- [8] Constantinescu Nicolae, Security System Vulnerabilities, Proceedings of the Romanian Academy Series A-Mathematics Physics Technical Sciences, 13 (2012), no. 2, 175–179.
- [9] Stephanides George, Constantinescu Nicolae, Cosulschi Mirel, Gabroveanu Mihai, RSA-padding signatures with attack studies, WEBIST 2006, 97–1000.
- [10] Ticleanu Oana, Constantinescu Nicolae, Intelligent data retrieval with hierarchically structured information, KES IIMS 2013, 345–351.
- [11] Stephanides George, Constantinescu Nicolae, The GN-authenticated key agreement, Applied Mathematics and Computation, 170 2015, no. 1, 531–544.10.1016/j.amc.2004.12.013
- [12] Emil Simion, Nicolae Constantinescu, Complexity Computations in Code Cracking Problems, Concurrent Engineering in Electronic Packaging, IEEE Communication, ISSE 2001, 225–232.
- [13] Oana Ticleanu, Differential operators over particular elliptic curves spaces with cryptographic applications. E. Journal of Differential Equations, 2015, no.303, 1–5.
- [14] Oana Ticleanu, Endomorphisms on elliptic curves for optimal subspaces and applications to differential equations and nonlinear cryptography. E. Journal of Differential Equations, 2015, no. 214, 1–9.
- [15] Alin Golumbeanu, Oana Ticleanu, Elliptic Curves Differentiation with Application to Group Signature Scheme, E. Journal of Differential Equations, 2017, no. 237, 1–21.
- [16] Nicolae Constantinescu, Oana Ticleanu, Alin Golumbeanu, Nonliniearities on Cryptographic Shift Registers, Annals of the University of Craiova, Mathematics and Computer Science Series, 43 2016, no. 1, 27–32.
- [17] Chaum David, Ernest Van Heyst, Group signatures, Advances in Cryptology Eurocrypt ’91, 547, 257–265.10.1007/3-540-46416-6_22
- [18] Camenisch John, Stadler Michael, E cient group signatures schemes for large groups, Advances in Cryptology-Crypto 1997, 1294, 410–424.10.1007/BFb0052252