|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 639 occurrences of 431 keywords
|
|
|
Results
Found 1230 publication records. Showing 1230 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
28 | Paul S. Wang |
Parallel Univariate Polynomial Factorization on Shared-Memory Multiprocessors. |
ISSAC |
1990 |
DBLP DOI BibTeX RDF |
|
28 | Ivan Damgård |
Collision Free Hash Functions and Public Key Signature Schemes. |
EUROCRYPT |
1987 |
DBLP DOI BibTeX RDF |
|
28 | Melvin A. Breuer |
Generation of optimal code for expressions via factorization. |
Commun. ACM |
1969 |
DBLP DOI BibTeX RDF |
detection of common subexpressions, factorization of Boolean expressions, sequencing of operations, code optimization, factorization algorithms |
27 | Alexey S. Rodionov, Olga K. Rodionova, Hyunseung Choo |
Using Meaning of Coefficients of the Reliability Polynomial for Their Faster Calculation. |
ICCSA (2) |
2009 |
DBLP DOI BibTeX RDF |
reliability polynomial, factoring method |
27 | Zhonggang Zeng |
The approximate irreducible factorization of a univariate polynomial: revisited. |
ISSAC |
2009 |
DBLP DOI BibTeX RDF |
multiplicity, polynomial factoring, ill-posed problems |
27 | David A. Holland |
Using Data Mining to Build Integrated Discrete Event Simulations. |
ICDM |
2008 |
DBLP DOI BibTeX RDF |
code re-factoring, minimum description length, subgraph isomorphism, discrete event modeling |
27 | Takato Hirano, Koichiro Wada, Keisuke Tanaka |
Public-Key Cryptosystems with Primitive Power Roots of Unity. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
Paillier encryption scheme, factoring assumption, power roots of unity, homomorphism |
27 | Zhenchuan Chai, Zhenfu Cao, Xiaolei Dong |
Identity-based signature scheme based on quadratic residues. |
Sci. China Ser. F Inf. Sci. |
2007 |
DBLP DOI BibTeX RDF |
proven security, factoring, random oracle, ID-based signature, quadratic residue |
27 | Ajay Kumar Verma, Paolo Ienne |
Improving XOR-Dominated Circuits by Exploiting Dependencies between Operands. |
ASP-DAC |
2007 |
DBLP DOI BibTeX RDF |
multiplier-like circuits, XOR-dominated circuits, datapath design, netlist optimization, carry-save form, column compressors, XOR operations, logic synthesizers, algebraic factoring, computer arithmetic, logic synthesis, digital design, parallel multipliers |
27 | Tsung-Lin Lee, Chun-Yao Wang |
Recognition of Fanout-free Functions. |
ASP-DAC |
2007 |
DBLP DOI BibTeX RDF |
state of the art method, fanout free functions, equivalent function, Boolean function, factoring, logic minimization |
27 | Kazumaro Aoki, Takeshi Shimoyama, Hiroki Ueda |
Experiments on the Linear Algebra Step in the Number Field Sieve. |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
block Lanczos, parallel computation, ethernet, integer factoring, number field sieve |
27 | Zhenfu Cao, Haojin Zhu, Rongxing Lu |
Provably secure robust threshold partial blind signature. |
Sci. China Ser. F Inf. Sci. |
2006 |
DBLP DOI BibTeX RDF |
improved RSA cryptosystem, factoring problem, blind signature, electronic cash, threshold signature |
27 | Michael J. Wiener |
The Full Cost of Cryptanalytic Attacks. |
J. Cryptol. |
2004 |
DBLP DOI BibTeX RDF |
Parallel collision search, Double encryption, Triple encryption, Cryptanalysis, Factoring, Discrete logarithm, Number field sieve, Meet-in-the-middle attack, Hash collision |
27 | Moni Naor, Omer Reingold |
Number-theoretic constructions of efficient pseudo-random functions. |
J. ACM |
2004 |
DBLP DOI BibTeX RDF |
constant-depth threshold circuits, decision Diffie-Hellman, natural proofs, factoring, learning theory, Pseudo-random functions |
27 | Katsuyuki Okeya, Tsuyoshi Takagi |
Security Analysis of CRT-Based Cryptosystems. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
Multi-Prime RSA, PKCS #1, RSA, Side Channel Attacks, Factoring, Chinese Remainder Theorem |
27 | Giuliano Antoniol, Massimiliano Di Penta, Markus Neteler |
Moving to Smaller Libraries via Clustering and Genetic Algorithms. |
CSMR |
2003 |
DBLP DOI BibTeX RDF |
library re-factoring, genetic algorithms, clustering |
27 | Nicolas T. Courtois, Willi Meier |
Algebraic Attacks on Stream Ciphers with Linear Feedback. |
EUROCRYPT |
2003 |
DBLP DOI BibTeX RDF |
Algebraic attacks on stream ciphers, factoring multivariate polynomials, overdefined problems, ciphertext-only attacks, Toyocrypt, Cryptrec, LILI-128, Boolean functions, nonlinear filtering, pseudo-random generators, Nessie, XL algorithm, multivariate equations |
27 | Johannes Buchmann 0001, Kouichi Sakurai, Tsuyoshi Takagi |
An IND-CCA2 Public-Key Cryptosystem with Fast Decryption. |
ICISC |
2001 |
DBLP DOI BibTeX RDF |
NICE cryptosystem, fast decryption, Public-key cryptosystem, Chosen ciphertext attack, factoring algorithm |
27 | Chin-Chen Chang 0001, Chao-Wen Chan |
Detecting Dealer Cheating in Secret Sharing Systems. |
COMPSAC |
2000 |
DBLP DOI BibTeX RDF |
Factoring and discrete logarithms, Network security, Signature verification, Secret-sharing scheme, Authenticated encryption, Message recovery |
27 | Jian-Zhu Lu, Huo Yan Chen |
Improvement of authenticated encryption scheme with (t, n) shared verification. |
COMPSAC |
2000 |
DBLP DOI BibTeX RDF |
Factoring and discrete logarithms, Network security, Signature verification, Secret-sharing scheme, Authenticated encryption, Message recovery |
27 | Johannes Buchmann 0001, Harald Baier |
Efficient Construction of Cryptographically Strong Elliptic Curves. |
INDOCRYPT |
2000 |
DBLP DOI BibTeX RDF |
class field theory, factoring polynomials, cryptography, finite field, elliptic curve, complex multiplication |
27 | Claus-Peter Schnorr |
Security of 2^t-Root Identification and Signatures. |
CRYPTO |
1996 |
DBLP DOI BibTeX RDF |
Fiat-Shamir scheme, active/passive impersonation attacks, adaptive chosen-message attack, factoring of integers, Identification, signature, random oracle model |
27 | Kelvin K. Yue, David J. Lilja |
Parameter estimation for a generalized parallel loop scheduling algorithm. |
HICSS (2) |
1995 |
DBLP DOI BibTeX RDF |
generalized parallel loop scheduling algorithm, strategy evolution, CS-2, FS-alt, chunk scheduling, genetic algorithms, genetic algorithm, scheduling, parallel algorithms, virtual machines, parameter estimation, parameter estimation, shared-memory multiprocessor, shared memory systems, factoring, program control structures, multiprocessor simulator |
27 | Louis C. Guillou, Jean-Jacques Quisquater |
A "Paradoxical" Indentity-Based Signature Scheme Resulting from Zero-Knowledge. |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
zero-knowledge interactive proofs, identity-based system, public key system, complexity, authentication, integrity, digital signature, randomization, identification, factoring, cryptology |
25 | Vadim Lyubashevsky |
Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Mark Whitney, Nemanja Isailovic, Yatish Patel, John Kubiatowicz |
A fault tolerant, area efficient architecture for Shor's factoring algorithm. |
ISCA |
2009 |
DBLP DOI BibTeX RDF |
ion trap, control, quantum computing, layout, cad |
25 | Wei Gao 0007, Xueli Wang, Dongqing Xie |
Chameleon Hashes Without Key Exposure Based on Factoring. |
J. Comput. Sci. Technol. |
2007 |
DBLP DOI BibTeX RDF |
chameleon signature, key-exposure, chameleon hash |
25 | Yvo Desmedt, Kaoru Kurosawa |
A Generalization and a Variant of Two Threshold Cryptosystems Based on Factoring. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
threshold decryption, Goldwasser- Micali, Rabin, cryptography, Threshold signatures |
25 | George B. Davis, Michael Benisch, Kathleen M. Carley, Norman M. Sadeh |
Factoring games to isolate strategic interactions. |
AAMAS |
2007 |
DBLP DOI BibTeX RDF |
compact forms, finding structure, game theory |
25 | Kevin Kahley, Manigandan Radhakrishnan, Jon A. Solworth |
Factoring High Level Information Flow Specifications into Low Level Access Controls. |
IWIA |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Michael L. Collard, Huzefa H. Kagdi, Jonathan I. Maletic |
Factoring Differences for Iterative Change Management. |
SCAM |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Dario Catalano, Rosario Gennaro |
Cramer-Damgård Signatures Revisited: Efficient Flat-Tree Signatures Based on Factoring. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Anna Morajko, Paola Caymes-Scutari, Tomàs Margalef, Emilio Luque |
Automatic Tuning of Data Distribution Using Factoring in Master/Worker Applications. |
International Conference on Computational Science (2) |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Jens Franke, Thorsten Kleinjung, Christof Paar, Jan Pelzl, Christine Priplata, Colin Stahlke |
SHARK: A Realizable Special Hardware Sieving Device for Factoring 1024-Bit Integers. |
CHES |
2005 |
DBLP DOI BibTeX RDF |
GNFS, lattice sieving, RSA 1024 bit, Integer factorization, special hardware |
25 | Weng-Long Chang, Michael (Shan-Hui) Ho, Minyi Guo |
Fast Parallel Molecular Algorithms for DNA-based Computation: Factoring Integers. |
BIBE |
2004 |
DBLP DOI BibTeX RDF |
Biological Parallel Computing, DNA-based Supercomputing, the RSA Public-key cryptosystem |
25 | Anup Hosangadi, Farzan Fallah, Ryan Kastner |
Factoring and eliminating common subexpressions in polynomial expressions. |
ICCAD |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Junghyun Nam, Seokhyang Cho, Seungjoo Kim, Dongho Won |
Simple and Efficient Group Key Agreement Based on Factoring. |
ICCSA (1) |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Zhenchuan Chai, Zhenfu Cao |
Factoring-Based Proxy Signature Schemes with Forward-Security. |
CIS |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Fatima Abu Salem, Shuhong Gao, Alan G. B. Lauder |
Factoring polynomials via polytopes. |
ISSAC |
2004 |
DBLP DOI BibTeX RDF |
Newton polytope, factorisation, multivariate polynomial |
25 | Charles Zhang, Hans-Arno Jacobsen |
Re-factoring Middleware Systems: A Case Study. |
OTM |
2003 |
DBLP DOI BibTeX RDF |
|
25 | Jim Hamilton, Eric W. Olsen |
Design and Implementation of a Storage Repository Using Commonality Factoring. |
IEEE Symposium on Mass Storage Systems |
2003 |
DBLP DOI BibTeX RDF |
|
25 | Manfred Minimair |
Factoring sparse resultants of linearly combined polynomials. |
ISSAC |
2003 |
DBLP DOI BibTeX RDF |
composition, resultant, linear combination |
25 | Peter Ebinger, Edlyn Teske |
Factoring N = pq with the Elliptic Curve Method. |
ANTS |
2002 |
DBLP DOI BibTeX RDF |
|
25 | Massimiliano Di Penta, Markus Neteler, Giuliano Antoniol, Ettore Merlo |
Knowledge-Based Library Re-Factoring for an Open Source Project. |
WCRE |
2002 |
DBLP DOI BibTeX RDF |
|
25 | Pascual Julián Iranzo |
On the Correctness of the Factoring Transformation. |
FLOPS |
2002 |
DBLP DOI BibTeX RDF |
|
25 | Nenad Dedic, Leonid Reyzin, Salil P. Vadhan |
An Improved Pseudorandom Generator Based on Hardness of Factoring. |
SCN |
2002 |
DBLP DOI BibTeX RDF |
|
25 | Kaoru Kurosawa, Wakaha Ogata, Toshihiko Matsuo, Shuichi Makishima |
IND-CCA Public Key Schemes Equivalent to Factoring n=pq. |
Public Key Cryptography |
2001 |
DBLP DOI BibTeX RDF |
|
25 | Mark van Hoeij |
Factoring Polynomials and 0-1 Vectors. |
CaLC |
2001 |
DBLP DOI BibTeX RDF |
|
25 | Robert M. Corless, Mark Giesbrecht, Mark van Hoeij, Ilias S. Kotsireas, Stephen M. Watt |
Towards factoring bivariate approximate polynomials. |
ISSAC |
2001 |
DBLP DOI BibTeX RDF |
Maple |
25 | Dan Boneh, Glenn Durfee, Nick Howgrave-Graham |
Factoring N = prq for Large r. |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
|
25 | Tatsuaki Okamoto, Shigenori Uchiyama |
A New Public-Key Cryptosystem as Secure as Factoring. |
EUROCRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
25 | Noboru Kunihiro, Kenji Koyama |
Equivalence of Counting the Number of Points on Elliptic Curve over the Ring Zn and Factoring n. |
EUROCRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
25 | Arjen K. Lenstra |
Factoring. |
WDAG |
1994 |
DBLP DOI BibTeX RDF |
|
25 | Donald Beaver |
Factoring: The DNA Solution. |
ASIACRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
25 | Brandon Dixon, Arjen K. Lenstra |
Factoring Integers Using SIMD Sieves. |
EUROCRYPT |
1993 |
DBLP DOI BibTeX RDF |
|
25 | Victor S. Miller |
Factoring Polynomials via Relation-Finding. |
ISTCS |
1992 |
DBLP DOI BibTeX RDF |
|
25 | Michel Cosnard, Jean-Laurent Philippe |
Achieving Superlinear Speedups for the Multiple Polynomial Quadratic Sieve Factoring Algorithm on a Distributed Memory Multiprocessor. |
CONPAR |
1990 |
DBLP DOI BibTeX RDF |
|
25 | Ernest F. Brickell, Kevin S. McCurley |
An Interactive Identification Scheme Based on Discrete Logarithms and Factoring. |
EUROCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
25 | Donald M. Chiarulli, Walter G. Rudd, Duncan A. Buell |
DRAFT (abstract only): Dynamically Reconfigurable Architecture for Factoring Tests. |
ACM Conference on Computer Science |
1985 |
DBLP DOI BibTeX RDF |
|
25 | Ronald L. Rivest, Adi Shamir |
Efficient Factoring Based on Partial Information. |
EUROCRYPT |
1985 |
DBLP DOI BibTeX RDF |
|
25 | Jeffrey W. Smith, Samuel S. Wagstaff Jr. |
An extended-precision operand computer for integer factoring. |
AFIPS National Computer Conference |
1984 |
DBLP DOI BibTeX RDF |
|
18 | László Babai, Robert Beals, Ákos Seress |
Polynomial-time theory of matrix groups. |
STOC |
2009 |
DBLP DOI BibTeX RDF |
computational group theory, matrix groups, discrete log |
18 | Tzvetan S. Metodi, Darshan D. Thaker, Andrew W. Cross, Isaac L. Chuang, Frederic T. Chong |
High-level interconnect model for the quantum logic array architecture. |
ACM J. Emerg. Technol. Comput. Syst. |
2008 |
DBLP DOI BibTeX RDF |
QLA, Quantum computer architecture design, teleportation, fault tolerance, large scale, quantum |
18 | Rodney Van Meter, W. J. Munro, Kae Nemoto |
Architecture of a Quantum Multicomputer Implementing Shor's Algorithm. |
TQC |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Christopher Umans |
Fast polynomial factorization and modular composition in small characteristic. |
STOC |
2008 |
DBLP DOI BibTeX RDF |
modular composition, multipoint evaluation, polynomial factorization |
18 | Tetsuya Izu, Jun Kogure, Takeshi Shimoyama |
CAIRN 2: An FPGA Implementation of the Sieving Step in the Number Field Sieve Method. |
CHES |
2007 |
DBLP DOI BibTeX RDF |
the number field sieve method (NFS), the sieving step, FPGA, implementation, Integer factorization |
18 | Ridya C. Vidya, H. D. Phaneendra, M. S. Shivakumar |
Quantum Algorithms and Hard Problems. |
IEEE ICCI |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Mackale Joyner, Bradford L. Chamberlain, Steven J. Deitz |
Iterators in Chapel. |
IPDPS |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Laurence Tianruo Yang, Li Xu, Man Lin, John P. Quinn |
A Parallel GNFS Algorithm with the Biorthogonal Block Lanczos Method for Integer Factorization. |
ATC |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Masayuki Abe, Yang Cui 0001, Hideki Imai, Kaoru Kurosawa |
Tag-KEM from Set Partial Domain One-Way Permutations. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Laurence Tianruo Yang, Li Xu, Man Lin, John P. Quinn |
A Parallel GNFS Algorithm Based on a Reliable Look-Ahead Block Lanczos Method for Integer Factorization. |
EUC |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Bagus Santoso, Noboru Kunihiro, Naoki Kanayama, Kazuo Ohta |
Factorization of Square-Free Integers with High Bits Known. |
VIETCRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Na Guo, Laurence Tianruo Yang, Man Lin, John P. Quinn |
A Parallel GNFS Integrated with the Block Wiedemann's Algorithm for Integer Factorization. |
DASC |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Mihir Bellare, Gregory Neven |
Transitive signatures: new schemes and proofs. |
IEEE Trans. Inf. Theory |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Katja Schmidt-Samoa, Tsuyoshi Takagi |
Paillier's Cryptosystem Modulo p2q and Its Applications to Trapdoor Commitment Schemes. |
Mycrypt |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Hyuncheol Kim |
A New Carried-Dependence Self-scheduling Algorithm. |
ICCSA (1) |
2005 |
DBLP DOI BibTeX RDF |
|
18 | In-Bok Choi, Jae-dong Lee |
An Efficient Load-Sharing and Fault-Tolerance Algorithm in Internet-Based Clustering Systems. |
International Conference on Computational Science |
2004 |
DBLP DOI BibTeX RDF |
|
18 | David Galindo, Sebastià Martín Molleví, Tsuyoshi Takagi, Jorge Luis Villar |
A Provably Secure Elliptic Curve Scheme with Fast Encryption. |
INDOCRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Scott Aaronson |
Multilinear formulas and skepticism of quantum computing. |
STOC |
2004 |
DBLP DOI BibTeX RDF |
matrix rank, multilinear formula size, error-correcting codes, quantum computing |
18 | Willi Geiselmann, Rainer Steinwandt |
A Dedicated Sieving Hardware. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
RSA, factorization, number field sieve |
18 | Neil V. Murray, Erik Rosenthal |
Tableaux, Path Dissolution, and Decomposable Negation Normal Form for Knowledge Compilation. |
TABLEAUX |
2003 |
DBLP DOI BibTeX RDF |
|
18 | Charles Zhang, Hans-Arno Jacobsen |
Quantifying aspects in middleware platforms. |
AOSD |
2003 |
DBLP DOI BibTeX RDF |
evaluation and metrics, distributed systems, software architecture, middleware, aspect oriented programming, CORBA, aspect mining |
18 | Erich L. Kaltofen |
Polynomial factorization: a success story. |
ISSAC |
2003 |
DBLP DOI BibTeX RDF |
black box polynomial, randomized algorithm, polynomial factorization, lattice basis reduction, symbolic/numeric hybrid method, straight line program |
18 | Thomas Cluzeau |
Factorization of differential systems in characteristic p. |
ISSAC |
2003 |
DBLP DOI BibTeX RDF |
characteristic p, differential systems, eigenring, p-curvature, factorization |
18 | Mototsugu Nishioka, Hisayoshi Satoh, Kouichi Sakurai |
Design and Analysis of Fast Provably Secure Public-Key Cryptosystems Based on a Modular Squaring. |
ICISC |
2001 |
DBLP DOI BibTeX RDF |
|
18 | Jean-Sébastien Coron, David Naccache, Julien P. Stern |
On the Security of RSA Padding. |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
|
18 | Phong Q. Nguyen |
A Montgomery-Like Square Root for the Number Field Sieve. |
ANTS |
1998 |
DBLP DOI BibTeX RDF |
|
18 | Wenbo Mao, Chae Hoon Lim |
Cryptanalysis in Prime Order Subgroups of Z*n. |
ASIACRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
18 | Leo Bachmair, Harald Ganzinger |
Strict Basic Superposition. |
CADE |
1998 |
DBLP DOI BibTeX RDF |
|
18 | Siguna Müller, Winfried B. Müller |
The Security of Public Key Cryptosystems Based on Integer Factorization. |
ACISP |
1998 |
DBLP DOI BibTeX RDF |
factorization problem, Dickson cryptosystem, LUC cryptosystem, Williams cryptosystem, ElGamal cryptosystem, secure keys, cryptanalysis, Public-key cryptography, RSA cryptosystem, discrete logarithm problem |
18 | Tatsuaki Okamoto, Shigenori Uchiyama |
Security of an Identity-Based Cryptosystem and the Related Reductions. |
EUROCRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
18 | Eiichiro Fujisaki, Tatsuaki Okamoto |
A Practical and Provably Secure Scheme for Publicly Verifiable Secret Sharing and Its Applications. |
EUROCRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
18 | Thomas F. Denny, Bruce Dodson, Arjen K. Lenstra, Mark S. Manasse |
On the Factorization of RSA-120. |
CRYPTO |
1993 |
DBLP DOI BibTeX RDF |
|
18 | Tatsuaki Okamoto |
Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes. |
CRYPTO |
1992 |
DBLP DOI BibTeX RDF |
|
18 | Kenji Koyama, Ueli M. Maurer, Tatsuaki Okamoto, Scott A. Vanstone |
New Public-Key Schemes Based on Elliptic Curves over the Ring Zn. |
CRYPTO |
1991 |
DBLP DOI BibTeX RDF |
|
18 | Edward Rothberg, Anoop Gupta |
Techniques for improving the performance of sparse matrix factorization on multiprocessor workstations. |
SC |
1990 |
DBLP DOI BibTeX RDF |
|
18 | Shimon Even, Oded Goldreich 0001, Silvio Micali |
On-Line/Off-Line Digital Schemes. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
18 | Preda Mihailescu |
A Primality Test Using Cyclotomic Extensions. |
AAECC |
1988 |
DBLP DOI BibTeX RDF |
|
18 | Ivan Damgård |
On the Randomness of Legendre and Jacobi Sequences. |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
|
18 | Oded Goldreich 0001 |
Two Remarks Concerning the Goldwasser-Micali-Rivest Signature Scheme. |
CRYPTO |
1986 |
DBLP DOI BibTeX RDF |
|
Displaying result #101 - #200 of 1230 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ >>] |
|