The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for logarithms with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1958-1984 (21) 1985-1988 (17) 1989-1990 (18) 1991-1992 (19) 1993-1994 (20) 1995-1996 (17) 1997-1998 (22) 1999-2000 (37) 2001-2002 (16) 2003 (16) 2004 (19) 2005 (34) 2006 (18) 2007 (22) 2008 (16) 2009-2010 (21) 2011-2012 (16) 2013 (15) 2014-2015 (23) 2016 (17) 2017 (17) 2018-2019 (20) 2020-2021 (15) 2022-2024 (14)
Publication types (Num. hits)
article(239) incollection(5) inproceedings(224) phdthesis(2)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 222 occurrences of 152 keywords

Results
Found 470 publication records. Showing 470 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
12Dang-Khoa Do Spigot Algorithm and Reliable Computation of Natural Logarithm. Search on Bibsonomy Reliab. Comput. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Rostislav S. Protassov EM-based maximum likelihood parameter estimation for multivariate generalized hyperbolic distributions with fixed lambda. Search on Bibsonomy Stat. Comput. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Generalized Hyperbolic distribution, Normal Inverse Gaussian distribution, multivariate modeling, parameter estimation, EM-algorithm
12Michael J. Wiener The Full Cost of Cryptanalytic Attacks. Search on Bibsonomy J. Cryptol. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Parallel collision search, Double encryption, Triple encryption, Cryptanalysis, Factoring, Discrete logarithm, Number field sieve, Meet-in-the-middle attack, Hash collision
12Ronald L. Rivest On the Notion of Pseudo-Free Groups. Search on Bibsonomy TCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Ronald Cramer, Ivan Damgård Secret-Key Zero-Knowlegde and Non-interactive Verifiable Exponentiation. Search on Bibsonomy TCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Robert Granger, Andrew J. Holt, Dan Page, Nigel P. Smart, Frederik Vercauteren Function Field Sieve in Characteristic Three. Search on Bibsonomy ANTS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Dmitry Pavlov, Ramnath Balasubramanyan, Byron Dom, Shyam Kapur, Jignashu Parikh Document preprocessing for naive Bayes classification and clustering with mixture of multinomials. Search on Bibsonomy KDD The full citation details ... 2004 DBLP  DOI  BibTeX  RDF mixture of multinomials, clustering, performance, classification, Naive Bayes, data transformations
12Sangjin Kim, Heekuck Oh Fair Offline Payment Using Verifiable Encryption. Search on Bibsonomy WISA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Youngjoo Cho, ChangKyun Chi, Ilyong Chung An Efficient Conference Key Distribution System Based on Symmetric Balanced Incomplete Block Design. Search on Bibsonomy ICCSA (4) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Chin-Chen Chang 0001, Iuon-Chang Lin, Hui-Min Tsai, Hsiao-Hsi Wang A Key Assignment Scheme for Controlling Access in Partially Ordered User Hierarchies. Search on Bibsonomy AINA (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Gadiel Seroussi Universal Types and Simulation of Individual Sequences. Search on Bibsonomy LATIN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Alfred Ultsch Improving the Identification of Differentially Expressed Genes in cDNA Microarray Experiments. Search on Bibsonomy GfKl The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Mark G. Arnold, Thomas A. Bailey, John R. Cowles Error Analysis of the Kmetz/Maenner Algorithm. Search on Bibsonomy J. VLSI Signal Process. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF approximation, computer arithmetic, table lookup, hardware design, logarithmic number system, logarithm
12Christoph Ludwig A Faster Lattice Reduction Method Using Quantum Search. Search on Bibsonomy ISAAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF GGH, Quantum Computers, Lattice Reduction, NTRU
12Gerhard J. Woeginger Seventeen Lines and One-Hundred-and-One Points. Search on Bibsonomy ESA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
12Chung Keung Poon Optimal Range Max Datacube for Fixed Dimensions. Search on Bibsonomy ICDT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
12Antoine Joux, Reynald Lercier The Function Field Sieve Is Quite Special. Search on Bibsonomy ANTS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
12Antoine Joux The Weil and Tate Pairings as Building Blocks for Public Key Cryptosystems. Search on Bibsonomy ANTS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
12Elad Barkan, Eli Biham In How Many Ways Can You Write Rijndael? Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
12Jean-Guillaume Dumas, Thierry Gautier, Clément Pernet Finite field linear algebra subroutines. Search on Bibsonomy ISSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF BLAS level 1-2-3, Galois finite fields, Winograd's symbolic matrix multiplication
12Umesh V. Vazirani Quantum Algorithms. Search on Bibsonomy FCT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
12Laurence Tianruo Yang, Richard P. Brent The Parallel Improved Lanczos Method for Integer Factorization over Finite Fields for Public Key Cryptosystems. Search on Bibsonomy ICPP Workshops The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
12George Marsaglia, Wai Wan Tsang A simple method for generating gamma variables. Search on Bibsonomy ACM Trans. Math. Softw. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF ziggurat method, random number generation, gamma distribution
12Shahrokh Saeednia How to Maintain both Privacy and Authentication in Digital Libraries. Search on Bibsonomy Int. J. Digit. Libr. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Privacy, Authentication, Digital library, Key exchange, Identity-based
12Laurent Imbert, Jean-Michel Muller, F. Rico A Radix-10 BKM Algorithm for Computing Transcendentals on Pocket Computers. Search on Bibsonomy J. VLSI Signal Process. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
12Daniel Richardson The Uniformity Conjecture. Search on Bibsonomy CCA The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
12Jeff Berens, Graham D. Finlayson Log-Opponent Chromaticity Coding of Color Space. Search on Bibsonomy ICPR The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
12Marc Fischlin A Note on Security Proofs in the Generic Model. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
12Safuat Hamdy, Bodo Möller Security of Cryptosystems Based on Class Groups of Imaginary Quadratic Orders. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
12Pierrick Gaudry An Algorithm for Solving the Discrete Log Problem on Hyperelliptic Curves. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
12Stephen Lin, Sang Wook Lee A Representation of Specular Appearance. Search on Bibsonomy ICCV The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
12Jinn-ke Jan, Yuh-Min Tseng New Digital Signature with Subliminal Channels Based on the Discrete Logarithm Problem. Search on Bibsonomy ICPP Workshops The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Cryptography, Digital signature, Discrete logarithm, Subliminal channel
12Mark Ettinger, Peter Høyer On Quantum Algorithms for Noncommutative Hidden Subgroups. Search on Bibsonomy STACS The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
12Donald Beaver Adaptively Secure Oblivious Transfer. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
12Siguna Müller, Winfried B. Müller The Security of Public Key Cryptosystems Based on Integer Factorization. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF factorization problem, Dickson cryptosystem, LUC cryptosystem, Williams cryptosystem, ElGamal cryptosystem, secure keys, cryptanalysis, Public-key cryptography, RSA cryptosystem, discrete logarithm problem
12Detlef Hühnlein, Michael J. Jacobson Jr., Sachar Paulus, Tsuyoshi Takagi A Cryptosystem Based on Non-maximal Imaginary Quadratic Orders with Fast Decryption. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF imaginary quadratic order, trapdoor decryption, factorization, Public key cryptosystem, key escrow
12Guillaume Poupard, Jacques Stern Security Analysis of a Practical "on the fly" Authentication and Signature Generation. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF general discrete logarithm problem, minimal on-line computation, low cost smart cards, digital signature, security analysis, Identification scheme
12John R. Sacha, Mary Jane Irwin The logarithmic number system for strength reduction in adaptive filtering. Search on Bibsonomy ISLPED The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
12David Garrett, Mircea R. Stan Low power architecture of the soft-output Viterbi algorithm. Search on Bibsonomy ISLPED The full citation details ... 1998 DBLP  DOI  BibTeX  RDF SOVA, VA, low power, turbo codes
12Michele Mosca, Artur Ekert The Hidden Subgroup Problem and Eigenvalue Estimation on a Quantum Computer. Search on Bibsonomy QCQC The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
12László Csirmaz The Size of a Share Must Be Large. Search on Bibsonomy J. Cryptol. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Polymatroid structures, Polymatroid structures, Secret sharing, Secret sharing, Key words, Ideal secret sharing schemes, Ideal secret sharing schemes, Perfect security, Perfect security
12Pascal Véron Improved identification schemes based on error-correcting codes. Search on Bibsonomy Appl. Algebra Eng. Commun. Comput. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF SD problem, Zeroknowledge, NP-complete problem, Identification scheme
12Ross J. Anderson, Serge Vaudenay Minding your p's and q's. Search on Bibsonomy ASIACRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
12Ronald Cramer, Ivan Damgård New Generation of Secure and Practical RSA-Based Signatures. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
12V. Anantharam, A. Ganesh Optimal buffer allocation in tandems of last come first served queues. Search on Bibsonomy Queueing Syst. Theory Appl. The full citation details ... 1995 DBLP  DOI  BibTeX  RDF LCFS queues, queueing networks, tandem queues, Buffer allocation
12Hannes Hassler, Naofumi Takagi Function Evaluation by Table Look-up and Addition. Search on Bibsonomy IEEE Symposium on Computer Arithmetic The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
12Joe Kilian Improved Efficient Arguments (Preliminary Version). Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
12Jean-Dominique Gascuel, Christophe Lyon A new set of tools to describe and tune trajectories. Search on Bibsonomy CA The full citation details ... 1995 DBLP  DOI  BibTeX  RDF Hermite splines, simplified tangents edition, unified simple interface, articulated structures, interactivity, computer animation, translations, orientations, trajectories, splines (mathematics), key-framed animation
12Jim Gray 0001, Prakash Sundaresan, Susanne Englert, Kenneth Baclawski, Peter J. Weinberger Quickly Generating Billion-Record Synthetic Databases. Search on Bibsonomy SIGMOD Conference The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
12Michael R. Fellows, Neal Koblitz Fixed-Parameter Complexity and Cryptography. Search on Bibsonomy AAECC The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
12Jean-Claude Bajard, Sylvanus Kla, Jean-Michel Muller BKM: A new hardware algorithm for complex elementary functions. Search on Bibsonomy IEEE Symposium on Computer Arithmetic The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
12Ivan Damgård Non-Interactive Circuit Based Proofs and Non-Interactive Perfect Zero-knowledge with Proprocessing. Search on Bibsonomy EUROCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
12Ueli M. Maurer, Yacov Yacobi A Remark on a Non-interactive Public-Key Distribution System. Search on Bibsonomy EUROCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
12Rafi Heiman A Note on Discrete Logorithms with Special Structure. Search on Bibsonomy EUROCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
12Daniel M. Gordon Designing and Detecting Trapdoors for Discrete Log Cryptosystems. Search on Bibsonomy CRYPTO The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
12Yuliang Zheng 0001, Jennifer Seberry Practical Approaches to Attaining Security Against Adaptively Chosen Ciphertext Attacks (Extended Abstract). Search on Bibsonomy CRYPTO The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
12François Morain Building Elliptic Curves Modulo Large Primes. Search on Bibsonomy EUROCRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
12Tatsuaki Okamoto, Kouichi Sakurai Efficient Algorithms for the Construction of Hyperelliptic Cryptosystems. Search on Bibsonomy CRYPTO The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
12Brian A. LaMacchia, Andrew M. Odlyzko Solving Large Sparse Linear Systems over Finite Fields. Search on Bibsonomy CRYPTO The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
12Gilles Brassard, Claude Crépeau, Moti Yung Everything in NP can be Argued in Perfect Zero-Knowledge in a Bounded Number of Rounds. Search on Bibsonomy ICALP The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
12Johannes Buchmann 0001, Hugh C. Williams A Key Exchange System Based on Real Quadratic Fields. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
12Manuel Bronstein Simplification of Real Elementary Functions. Search on Bibsonomy ISSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
12Jean Vuillemin Exact Real Computer Arithmetic with Continued Fractions. Search on Bibsonomy LISP and Functional Programming The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
12Gordon B. Agnew, Ronald C. Mullin, Scott A. Vanstone An Interactive Data Exchange Protocol Based on Discrete Exponentiation. Search on Bibsonomy EUROCRYPT The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
12Bert den Boer Diffie-Hellman is as Strong as Discrete Log for Certain Primes. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
12Eric Bach 0001 Intractable Problems in Number Theory. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
12Kenji Koyama, Kazuo Ohta Identity-based Conference Key Distribution Systems. Search on Bibsonomy CRYPTO The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
12James H. Davenport, Barry M. Trager On the Parallel Risch Algorithm (II). Search on Bibsonomy ACM Trans. Math. Softw. The full citation details ... 1985 DBLP  DOI  BibTeX  RDF
12Bernhard Smeets A Comment on Niederreiter's Public Key Cryptosystem. Search on Bibsonomy EUROCRYPT The full citation details ... 1985 DBLP  DOI  BibTeX  RDF
12Gustavus J. Simmons The Subliminal Channel and Digital Signature. Search on Bibsonomy EUROCRYPT The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
Displaying result #401 - #470 of 470 (100 per page; Change: )
Pages: [<<][1][2][3][4][5]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license