A comment on Neiderreiter's public key cryptosystem
Proc. of a workshop on the theory and application of cryptographic techniques on Advances in cryptology---EUROCRYPT '85
Factoring polynomials using fewer random bits
Journal of Symbolic Computation - Special issue on computational algebraic complexity
Models of Computation, Riemann Hypothesis, and Classical Mathematics
SOFSEM '98 Proceedings of the 25th Conference on Current Trends in Theory and Practice of Informatics: Theory and Practice of Informatics
Cryptanalysis of MOR and Discrete Logarithms in Inner Automorphism Groups
Research in Cryptology
Public key encryption and signature schemes based on polynomials over Zn
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Cryptographic primitives enforcing communication and storage complexity
FC'02 Proceedings of the 6th international conference on Financial cryptography
Secure key management scheme for dynamic hierarchical access control based on ECC
Journal of Systems and Software
Efficient software implementations of large finite fields GF(2n) for secure storage applications
ACM Transactions on Storage (TOS)
Information Sciences: an International Journal
Secure Communication of Medical Information Using Mobile Agents
Journal of Medical Systems
Secure Transmission of Mobile Agent in Dynamic Distributed Environments
Wireless Personal Communications: An International Journal
Improved migration for mobile computing in distributed networks
Computer Standards & Interfaces
International Journal of Communication Networks and Distributed Systems
Hi-index | 0.00 |