STOC '90 Proceedings of the twenty-second annual ACM symposium on Theory of computing
Factoring with two large primes (extended abstract)
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Fast reduction and composition of binary quadratic forms
ISSAC '91 Proceedings of the 1991 international symposium on Symbolic and algebraic computation
Factoring integers using SIMD sieves
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Factoring modular polynomials (extended abstract)
ISSAC '96 Proceedings of the 1996 international symposium on Symbolic and algebraic computation
Computing radical expressions for roots of unity
ACM SIGSAM Bulletin
Finding smooth integers in short intervals using CRT decoding
STOC '00 Proceedings of the thirty-second annual ACM symposium on Theory of computing
Designs, Codes and Cryptography - Special issue on towards a quarter-century of public key cryptography
Short vectors of planar lattices via continued fractions
Information Processing Letters
First Implementation of Cryptographic Protocols Based on Algebraic Number Fields
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
On the Ultimate Complexity of Factorials
STACS '03 Proceedings of the 20th Annual Symposium on Theoretical Aspects of Computer Science
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
CM-Curves with Good Cryptographic Properties
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
A Generalized Takagi-Cryptosystem with a modulus of the form prqs
INDOCRYPT '00 Proceedings of the First International Conference on Progress in Cryptology
Analysis of Bernstein's Factorization Circuit
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Action of Modular Correspondences around CM Points
ANTS-V Proceedings of the 5th International Symposium on Algorithmic Number Theory
Identification, Signature and Signcryption Using High Order Residues Modulo an RSA Composite
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Finding smooth integers in short intervals using CRT decoding
Journal of Computer and System Sciences - Special issue on STOC 2000
Computer algebra handbook
On the ultimate complexity of factorials
Theoretical Computer Science
Exploiting functional dependencies in declarative problem specifications
Artificial Intelligence
International Journal of Information and Coding Theory
A unifying framework for structural properties of CSPs: definitions, complexity, tractabilit
Journal of Artificial Intelligence Research
Discrete Applied Mathematics
Discrete Applied Mathematics - Special issue: Boolean and pseudo-boolean funtions
Discrete Applied Mathematics - Special issue: IWCIA 2003 - Ninth international workshop on combinatorial image analysis
Discrete Applied Mathematics
Discrete Applied Mathematics - Special issue: Advances in discrete geometry and topology (DGCI 2003)
Discrete Applied Mathematics
Discrete Applied Mathematics - Structural decompositions, width parameters, and graph labelings (DAS 5)
Discrete Applied Mathematics - Ordinal and symbolic data analysis (OSDA 2000)
Discrete Applied Mathematics
Discrete Applied Mathematics
Discrete Applied Mathematics
Discrete Applied Mathematics
Discrete Applied Mathematics
Discrete Applied Mathematics
Discrete Applied Mathematics
A secure and optimally efficient multi-authority election scheme
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Building cyclic elliptic curves modulo large primes
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Massively parallel elliptic curve factoring
EUROCRYPT'92 Proceedings of the 11th annual international conference on Theory and application of cryptographic techniques
A note on discrete logarithms with special structure
EUROCRYPT'92 Proceedings of the 11th annual international conference on Theory and application of cryptographic techniques
Secure hash-and-sign signatures without the random oracle
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Factorization of a 768-bit RSA modulus
CRYPTO'10 Proceedings of the 30th annual conference on Advances in cryptology
Discrete Optimization
A trust-centered approach for building e-voting systems
EGOV'07 Proceedings of the 6th international conference on Electronic Government
ASIACRYPT'12 Proceedings of the 18th international conference on The Theory and Application of Cryptology and Information Security
Attacking and fixing Helios: An analysis of ballot secrecy
Journal of Computer Security
Hi-index | 0.00 |