A factoring algorithm in F2[x]
SAC '98 Proceedings of the 1998 ACM symposium on Applied Computing
How to Choose Secret Parameters for RSA-Type Cryptosystems over Elliptic Curves
Designs, Codes and Cryptography
Some Parallel Algorithms for Integer Factorisation
Euro-Par '99 Proceedings of the 5th International Euro-Par Conference on Parallel Processing
Recent Progress and Prospects for Integer Factorisation Algorithms
COCOON '00 Proceedings of the 6th Annual International Conference on Computing and Combinatorics
A Probable Prime Test with Very High Confidence for n equiv 1 mod 4
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Side-Channel Attacks on Textbook RSA and ElGamal Encryption
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
A New Distributed Primality Test for Shared RSA Keys Using Quadratic Fields
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
The twenty-fourth fermat number is composite
Mathematics of Computation
On the Computation of Square Roots in Finite Fields
Designs, Codes and Cryptography
A basic characteristic of twin primes and its generalization
Smarandache Notions Journal
Hexagonal stratification of numbers
MATH'08 Proceedings of the 13th WSEAS international conference on Applied mathematics
MATH'08 Proceedings of the 13th WSEAS international conference on Applied mathematics
MATH'08 Proceedings of the 13th WSEAS international conference on Applied mathematics
Algorithms and theory of computation handbook
Efficient computer search of large-order multiple recursive pseudo-random number generators
Journal of Computational and Applied Mathematics
Large-Order Multiple Recursive Generators with Modulus 231-1
INFORMS Journal on Computing
Hi-index | 0.00 |