The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for logarithm with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1960-1975 (16) 1977-1985 (16) 1986-1989 (17) 1990-1991 (24) 1992-1993 (18) 1994-1995 (21) 1996-1997 (32) 1998 (31) 1999 (26) 2000 (42) 2001 (46) 2002 (36) 2003 (58) 2004 (81) 2005 (77) 2006 (81) 2007 (90) 2008 (103) 2009 (63) 2010 (40) 2011 (26) 2012 (35) 2013 (30) 2014 (32) 2015 (28) 2016 (41) 2017 (31) 2018 (34) 2019 (32) 2020 (36) 2021 (47) 2022 (42) 2023 (35) 2024 (9)
Publication types (Num. hits)
article(656) incollection(11) inproceedings(696) phdthesis(13)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 737 occurrences of 433 keywords

Results
Found 1376 publication records. Showing 1376 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
25Mark G. Arnold, Thomas A. Bailey, John R. Cowles Error Analysis of the Kmetz/Maenner Algorithm. Search on Bibsonomy J. VLSI Signal Process. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF approximation, computer arithmetic, table lookup, hardware design, logarithmic number system, logarithm
25Shahrokh Saeednia, Steve Kremer, Olivier Markowitch An Efficient Strong Designated Verifier Signature Scheme. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Designated verifier, Signature, Discrete logarithm, Signcryption
25Christophe Clavier, Marc Joye Universal Exponentiation Algorithm. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Implementation, smart-cards, provable security, side-channel attacks, discrete logarithm, exponentiation, simple power analysis (SPA), RSA cryptosystem, addition chains
25Detlef Hühnlein, Michael J. Jacobson Jr., Damian Weber Towards Practical Non-interactive Public Key Cryptosystems Using Non-maximal Imaginary Quadratic Orders. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF non-maximal imaginary quadratic order, non-interactive cryptography, discrete logarithm, identity based cryptosystem
25Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Distributed Key Generation, Discrete Logarithm, Threshold Cryptography, VSS
25Siguna Müller, Winfried B. Müller The Security of Public Key Cryptosystems Based on Integer Factorization. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF factorization problem, Dickson cryptosystem, LUC cryptosystem, Williams cryptosystem, ElGamal cryptosystem, secure keys, cryptanalysis, Public-key cryptography, RSA cryptosystem, discrete logarithm problem
25Guillaume Poupard, Jacques Stern Security Analysis of a Practical "on the fly" Authentication and Signature Generation. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF general discrete logarithm problem, minimal on-line computation, low cost smart cards, digital signature, security analysis, Identification scheme
25C. C. Lin, Daniel Pease, Rajeev R. Raje An Efficient Block Matching Algorithm Based on a Valid Assumption of the Convex Distortion. Search on Bibsonomy ICIP (2) The full citation details ... 1997 DBLP  DOI  BibTeX  RDF efficient block matching algorithm, convex distortion, optimal joint coordinate search method, motion-compensated coding, mean absolute error distortion measure, logarithm steps, local optimum points, shrinked search quadrant, optimal motion estimator, convergence efficiency, high motion accuracy, low information overhead, simulation, performance, motion estimation
25Valeriu Beiu Enhanced lower entropy bounds with application to constructive learning. Search on Bibsonomy EUROMICRO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF enhanced lower entropy bounds, IR/sup n/, constructive learning algorithms, n dimensional ball, integer weights, maximum volume, n dimensional cones, neural networks, neural nets, upper bounding, polyhedron, logarithm, classification problems, quotient
25Ali Skaf, Alain Guyot SAGA: the first general-purpose on-line arithmetic co-processor. Search on Bibsonomy VLSI Design The full citation details ... 1995 DBLP  DOI  BibTeX  RDF general-purpose co-processor, online arithmetic coprocessor, VLSI realisation, BKM algorithm, complex logarithm function, complex exponential function, VLSI, arithmetic, coprocessors, CMOS digital integrated circuits, redundant number systems, CMOS IC, SAGA
24Ali Bagherzandi, Jung Hee Cheon, Stanislaw Jarecki Multisignatures secure under the discrete logarithm assumption and a generalized forking lemma. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF concurrent proofs of knowledge, equiocable homomorphic commitment, forking lemma, multisignatures
24Benjamin A. Smith Isogenies and the Discrete Logarithm Problem in Jacobians of Genus 3 Hyperelliptic Curves. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Michael Vielhaber 0001 Continued Fraction Expansion as Isometry - The Law of the Iterated Logarithm for Linear, Jump, and 2-Adic Complexity. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Ning Ding 0001, Dawu Gu A Discrete-Logarithm Based Non-interactive Non-malleable Commitment Scheme with an Online Knowledge Extractor. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Nick A. Moldovyan New Public Key Cryptosystems Based on Difficulty of Factorization and Discrete Logarithm Problems. Search on Bibsonomy IF&GIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF public encryption, Digital signature, public key cryptosystem, key agreement protocol
24Guerric Meurice de Dormale, Philippe Bulens, Jean-Jacques Quisquater Collision Search for Elliptic Curve Discrete Logarithm over GF(2 m ) with FPGA. Search on Bibsonomy CHES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24W. Chen, Meng Joo Er, Shiqian Wu Illumination Compensation and Normalization for Robust Face Recognition Using Discrete Cosine Transform in Logarithm Domain. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Part B The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Ming-Deh A. Huang, Wayne Raskind Signature Calculus and Discrete Logarithm Problems. Search on Bibsonomy ANTS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Ilya Mironov, Anton Mityagin, Kobbi Nissim Hard Instances of the Constrained Discrete Logarithm Problem. Search on Bibsonomy ANTS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Zhixiong Chen 0002, Shengqiang Li, Guozhen Xiao Construction of Pseudo-random Binary Sequences from Elliptic Curves by Using Discrete Logarithm. Search on Bibsonomy SETA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Kilian M. Pohl, John W. Fisher III, Martha Elizabeth Shenton, Robert W. McCarley, W. Eric L. Grimson, Ron Kikinis, William M. Wells III Logarithm Odds Maps for Shape Representation. Search on Bibsonomy MICCAI (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Robert Granger, Frederik Vercauteren On the Discrete Logarithm Problem on Algebraic Tori. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Dang-Khoa Do Spigot Algorithm and Reliable Computation of Natural Logarithm. Search on Bibsonomy Reliab. Comput. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24Sebastian Pauli, Florence Soriano-Gafiuk The Discrete Logarithm in Logarithmic -Class Groups and Its Applications in K-theory. Search on Bibsonomy ANTS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24Marios Savvides, B. V. K. Vijaya Kumar Illumination Normalization Using Logarithm Transforms for Face Authentication. Search on Bibsonomy AVBPA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
24Rui Zhang 0002, Hideki Imai Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
24Maria V. Kulikova On Effective Computation of the Logarithm of the Likelihood Ratio Function for Gaussian Signals. Search on Bibsonomy International Conference on Computational Science The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
24Joshua Holden Fixed Points and Two-Cycles of the Discrete Logarithm. Search on Bibsonomy ANTS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
24José-Alejandro Piñeiro, Milos D. Ercegovac, Javier D. Bruguera Analysis of the Tradeoffs for the Implementation of a High-Radix Logarithm. Search on Bibsonomy ICCD The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
24José-Alejandro Piñeiro, Milos D. Ercegovac, Javier D. Bruguera High-Radix Logarithm with Selection by Rounding. Search on Bibsonomy ASAP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
24Reihaneh Safavi-Naini, Willy Susilo Threshold Fail-Stop Signature Schemes Based on Discrete Logarithm and Factorization. Search on Bibsonomy ISW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
24Nigel P. Smart The Discrete Logarithm Problem on Elliptic Curves of Trace One. Search on Bibsonomy J. Cryptol. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF 2pt
24Shingo Miyazaki, Kouichi Sakurai A More Efficient Untraceable E-Cash System with Partially Blind Signatures Based on the Discrete Logarithm Problem. Search on Bibsonomy Financial Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
24Patrick Horster, Markus Michels, Holger Petersen 0002 Meta-Message Recovery and Meta-Blind Signature Schemes Based on the Discrete Logarithm Problem and Their Applications. Search on Bibsonomy ASIACRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
24Jan Camenisch, Jean-Marc Piveteau, Markus Stadler Blind Signatures Based on the Discrete Logarithm Problem. Search on Bibsonomy EUROCRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
24Kaisa Nyberg, Rainer A. Rueppel Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem. Search on Bibsonomy EUROCRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
24Tatsuaki Okamoto, Kouichi Sakurai, Hiroki Shizuya How Intractable Is the Discrete Logarithm for a General Finite Group? Search on Bibsonomy EUROCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
24Yvo Desmedt, Mike Burmester An Efficient Zero-Knowledge Scheme for the Discrete Logarithm Based on Smooth Numbers. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
24Ping Tak Peter Tang Table-driven implementation of the logarithm function in IEEE floating-point arithmetic. Search on Bibsonomy ACM Trans. Math. Softw. The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
24Robert W. Bemer A note on range transformations for square root and logarithm. Search on Bibsonomy Commun. ACM The full citation details ... 1963 DBLP  DOI  BibTeX  RDF
17Santiago Garrido, Luis Moreno 0001, Dolores Blanco Exploration of 2D and 3D Environments using Voronoi Transform and Fast Marching Method. Search on Bibsonomy J. Intell. Robotic Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Mobile robots, Exploration, Motion planning, SLAM, Robot mapping
17Lee C. Klingler, Spyros S. Magliveras, Fred Richman, Michal Sramka Discrete logarithms for finite groups. Search on Bibsonomy Computing The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Mathematics Subject Classification (2000) 94A60, 20G40
17Guomin Zhang, En Zhu, Ling Mao, Ming Yin A Bit-Parallel Exact String Matching Algorithm for Small Alphabet. Search on Bibsonomy FAW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF matching table, matching matrix, String matching, bit-parallel
17Minkyu Kim, Atsushi Fujioka, Berkant Ustaoglu Strongly Secure Authenticated Key Exchange without NAXOS' Approach. Search on Bibsonomy IWSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF AKE, eCK model, NAXOS’ approach, trapdoor test
17Karshi F. Hasanov, Angela W. Ma, Adrian I. Nachman, Michael L. G. Joy Current Density Impedance Imaging. Search on Bibsonomy IEEE Trans. Medical Imaging The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Dongning Guo, Shlomo Shamai, Sergio Verdú Mutual Information and Conditional Mean Estimation in Poisson Channels. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Dimitrios E. Maroulis, Dimitrios K. Iakovidis, Dimitris G. Bariamis FPGA-based System for Real-Time Video Texture Analysis. Search on Bibsonomy J. Signal Process. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Field programmable gate arrays, Pattern recognition, Real-time system, Parallel architectures, Video signal processing
17Chong Hee Kim, Philippe Bulens, Christophe Petit 0001, Jean-Jacques Quisquater Fault Attacks on Public Key Elements: Application to DLP-Based Schemes. Search on Bibsonomy EuroPKI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Smart cards, fault injection, faults attacks, DSA, ElGamal, side channel
17Reinier Bröker, Denis Xavier Charles, Kristin E. Lauter Evaluating Large Degree Isogenies and Applications to Pairing Based Cryptography. Search on Bibsonomy Pairing The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Yingpeng Sang, Hong Shen 0001 Privacy preserving set intersection based on bilinear groups. Search on Bibsonomy ACSC The full citation details ... 2008 DBLP  BibTeX  RDF non interactive zero-knowledge proof, cryptographic protocol, privacy preservation, set intersection, bilinear groups
17Hui Tong, Seyed A. Zekavat Asymptotic Outage Analysis of Large Size Correlated MIMO Systems. Search on Bibsonomy WCNC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Eu-Jin Goh, Stanislaw Jarecki, Jonathan Katz, Nan Wang 0001 Efficient Signature Schemes with Tight Reductions to the Diffie-Hellman Problems. Search on Bibsonomy J. Cryptol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Emmanuel Bresson, Dario Catalano, Rosario Gennaro Improved On-Line/Off-Line Threshold Signatures. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Guilhem Castagnos, Benoît Chevallier-Mames Towards a DL-Based Additively Homomorphic Encryption Scheme. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF ElGamal encryption scheme, Naccache-Stern cryptosystem, DL-based homomorphic scheme, public-key cryptography, standard model
17Matías N. Bossa, Monica Hernandez, Salvador Olmos Contributions to 3D Diffeomorphic Atlas Estimation: Application to Brain Images. Search on Bibsonomy MICCAI (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Daniel R. L. Brown, Kristian Gjøsteen A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Elliptic Curve Cryptography, Random Number Generation
17Alfred Menezes, Edlyn Teske Cryptographic implications of Hess' generalized GHS attack. Search on Bibsonomy Appl. Algebra Eng. Commun. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Mathematics Subject Classification (1991) 94A60
17Amos Lapidoth, Stefan M. Moser The fading number of single-input multiple-output fading channels with memory. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Santiago Garrido, Luis Moreno 0001, Dolores Blanco, Fernando Martín Monar Log of the inverse of the Distance Transform and Fast Marching applied to Path Planning. Search on Bibsonomy IROS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Alexander W. Dent, Steven D. Galbraith Hidden Pairings and Trapdoor DDH Groups. Search on Bibsonomy ANTS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17H. V. Jagadish, Beng Chin Ooi, Kian-Lee Tan, Quang Hieu Vu, Rong Zhang 0002 Speeding up search in peer-to-peer networks with a multi-way tree structure. Search on Bibsonomy SIGMOD Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF multi-way tree structure, peer-to-peer, system architecture
17Vincent Arsigny, Olivier Commowick, Xavier Pennec, Nicholas Ayache A Log-Euclidean Framework for Statistics on Diffeomorphisms. Search on Bibsonomy MICCAI (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Amos Lapidoth On the asymptotic capacity of stationary Gaussian fading channels. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Tracey Ho, Muriel Médard, Ralf Koetter An information-theoretic view of network management. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Craig Gentry, Philip D. MacKenzie, Zulfikar Ramzan Password authenticated key exchange using hidden smooth subgroups. Search on Bibsonomy CCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF authentication, cryptography, password, key exchange
17Philip D. MacKenzie, Sarvar Patel Hard Bits of the Discrete Log with Applications to Password Authentication. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Javier Herranz, Germán Sáez Ring Signature Schemes for General Ad-Hoc Access Structures. Search on Bibsonomy ESAS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Ka-Lok Ng, Chien-Hung Huang A Cross-species Study of the Protein-protein Interaction Networks via the Random Graph Approach. Search on Bibsonomy BIBE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Zhide Chen, Hong Zhu 0004 Quantum m-out-of-n oblivious transfer. Search on Bibsonomy ISCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Giuseppe Ateniese, Breno de Medeiros On the Key Exposure Problem in Chameleon Hashes. Search on Bibsonomy SCN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Adam L. Young, Moti Yung Relationships Between Diffie-Hellman and "Index Oracles". Search on Bibsonomy SCN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Diffie-Hellman (DH), Computational Diffie-Hellman, Decision Diffie-Hellman, JDL, LDL, Public Key Cryptography, Oracles, Black-Box Reductions, Discrete-Log
17Wilfried Meidl, Arne Winterhof On the Autocorrelation of Cyclotomic Generators. Search on Bibsonomy International Conference on Finite Fields and Applications The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Ching-Te Wang, Chu-Hsing Lin, Chin-Chen Chang 0001 Signature Schemes Based on Two Hard Problems Simultaneously. Search on Bibsonomy AINA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Signature, factorization, discrete logarithms
17Peter J. Tan, David L. Dowe MML Inference of Decision Graphs with Multi-way Joins and Dynamic Attributes. Search on Bibsonomy Australian Conference on Artificial Intelligence The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Christian Cachin, Klaus Kursawe, Anna Lysyanskaya, Reto Strobl Asynchronous verifiable secret sharing and proactive cryptosystems. Search on Bibsonomy CCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF model, secret sharing, asynchronous, proactive
17Steven D. Galbraith, Florian Hess, Nigel P. Smart Extending the GHS Weil Descent Attack. Search on Bibsonomy EUROCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
17Don Johnson, Alfred Menezes, Scott A. Vanstone The Elliptic Curve Digital Signature Algorithm (ECDSA). Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
17Akihiro Yamamura, Kaoru Kurosawa Generic Algorithms and Key Agreement Protocols Based on Group Actions. Search on Bibsonomy ISAAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
17Fabian Kuhn, René Struik Random Walks Revisited: Extensions of Pollard's Rho Algorithm for Computing Multiple Discrete Logarithms. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
17Hongjun Wu 0001, Feng Bao 0001, Robert H. Deng Cryptanalysis of a Digital Signature Scheme on ID-Based Key-Sharing Infrastructures. Search on Bibsonomy Public Key Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
17Chik How Tan, Xun Yi, Chee Kheong Siew Signature Schemes Based on 3rd Order Shift Registers. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
17Guilin Wang, Sihan Qing, Mingsheng Wang, Zhanfei Zhou Threshold Undeniable RSA Signature Scheme. Search on Bibsonomy ICICS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
17Fu-Chiung Cheng, Stephen H. Unger, Michael Theobald Self-Timed Carry-Lookahead Adders. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2000 DBLP  DOI  BibTeX  RDF delay-insenstive circuits, tree iterative circuits, CMOS, Self-timed circuits, carry-lookahead adders
17Francisco M. de Assis, Carlos Eduardo Pedreira An Architecture for Computing Zech's Logarithms in GF(2m). Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Zech logarithms, discrete neural networks, finite fields
17Atsuko Miyaji, Masaki Nakabayashi, Shunzo Takano Characterization of Elliptic Curve Traces under FR-Reduction. Search on Bibsonomy ICISC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF FR-reduction, trace, elliptic curve cryptosystems, number theory
17Ronald de Wolf Characterization of Non-Deterministic Quantum Query and Quantum Communication Complexity. Search on Bibsonomy CCC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF non-deterministic computation, Quantum computing, communication complexity, query complexity
17Luis Hernández 0003, Susana Patón A continuous-time noise-shaping modulator for logarithmic A/D conversion. Search on Bibsonomy ISCAS (2) The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
17Robert J. Zuccherato The Equivalence Between Elliptic Curve and Quadratic Function Field Discrete Logarithms in Characteristic 2. Search on Bibsonomy ANTS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
17Tatsuaki Okamoto, Shigenori Uchiyama Security of an Identity-Based Cryptosystem and the Related Reductions. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
17Ueli M. Maurer, Stefan Wolf 0001 Lower Bounds on Generic Algorithms in Groups. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Diffie-Hellman protocol, roots in finite groups, complexity, lower bounds, discrete logarithms, generic algorithms
17Adam L. Young, Moti Yung Kleptography: Using Cryptography Against Cryptography. Search on Bibsonomy EUROCRYPT The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Cryptanalytic attacks, leakage bandwidth, design and manufacturing of cryptographic devices and software, black-box devices, SETUP mechanisms, RSA, randomness, information hiding, pseudorandomness, Diffie-Hellman, subliminal channels, kleptography, Discrete Log
17Fu-Chiung Cheng, Stephen H. Unger, Michael Theobald, Wen-Chung Cho Delay-Insensitive Carry-Lookahead Adders. Search on Bibsonomy VLSI Design The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
17Kouichi Sakurai, Hiroki Shizuya Relationships Among the Computational Powers of Breaking Discrete Log Cryptosystems. Search on Bibsonomy EUROCRYPT The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
17Damian Weber An Implementation of the General Number Field Sieve to Compute Discrete Logarithms mod p. Search on Bibsonomy EUROCRYPT The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
17Tatsuaki Okamoto Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes. Search on Bibsonomy CRYPTO The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
17Atsuko Miyaji On Ordinary Elliptic Curve Cryptosystems. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
17Thomas Beth, F. Schaefer Non Supersingular Elliptic Curves for Public Key Cryptosystems. Search on Bibsonomy EUROCRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
17David Chaum, Eugène van Heijst, Birgit Pfitzmann Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer. Search on Bibsonomy CRYPTO The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
17Claus-Peter Schnorr Efficient Identification and Signatures for Smart Cards (Abstract). Search on Bibsonomy EUROCRYPT The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
17Ketan Mulmuley An efficient algorithm for hidden surface removal. Search on Bibsonomy SIGGRAPH The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 1376 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license