On a modular algorithm for computing GCDs of polynomials over algebraic number fields
ISSAC '94 Proceedings of the international symposium on Symbolic and algebraic computation
An algorithm for computing the Weierstrass normal form
ISSAC '95 Proceedings of the 1995 international symposium on Symbolic and algebraic computation
Key-Exchange in Real Quadratic Congruence Function Fields
Designs, Codes and Cryptography - Special issue dedicated to Gustavus J. Simmons
Computing radical expressions for roots of unity
ACM SIGSAM Bulletin
Integral closure of Noetherian rings
ISSAC '97 Proceedings of the 1997 international symposium on Symbolic and algebraic computation
On the importance of securing your bins: the garbage-man-in-the-middle attack
Proceedings of the 4th ACM conference on Computer and communications security
Efficient parallel solution of sparse systems of linear diophantine equations
PASCO '97 Proceedings of the second international symposium on Parallel symbolic computation
Decoding algebraic-geometric codes beyond the error-correction bound
STOC '98 Proceedings of the thirtieth annual ACM symposium on Theory of computing
On the complexity of diophantine geometry in low dimensions (extended abstract)
STOC '99 Proceedings of the thirty-first annual ACM symposium on Theory of computing
How fast can we compute products?
ISSAC '99 Proceedings of the 1999 international symposium on Symbolic and algebraic computation
Multiplicative equations over commuting matrices
Proceedings of the seventh annual ACM-SIAM symposium on Discrete algorithms
A group theoretic approach to data and code partitioning
SAC '98 Proceedings of the 1998 ACM symposium on Applied Computing
Design concepts for matrices and lattices in LiDIA
SAC '97 Proceedings of the 1997 ACM symposium on Applied computing
Designs, Codes and Cryptography - Special issue on towards a quarter-century of public key cryptography
Optimal Left-to-Right Binary Signed-Digit Recoding
IEEE Transactions on Computers - Special issue on computer arithmetic
Cryptography in Quadratic Function Fields
Designs, Codes and Cryptography
The Xedni Calculus and the Elliptic Curve Discrete LogarithmProblem
Designs, Codes and Cryptography
Solving alignment using elementary linear algebra
Compiler optimizations for scalable parallel systems
Quantum algorithms for solvable groups
STOC '01 Proceedings of the thirty-third annual ACM symposium on Theory of computing
Solvability by radicals from an algorithmic point of view
Proceedings of the 2001 international symposium on Symbolic and algebraic computation
Computing Local Integral Closures
Journal of Symbolic Computation
Learning algebraic structures from text
Theoretical Computer Science - Algorithmic learning theory
Gröbner bases in orders of algebraic number fields
Journal of Symbolic Computation
Factoring polynomials over local fields
Journal of Symbolic Computation
Solving genus zero diophantine equations with at most two infinite valuations
Journal of Symbolic Computation
Polynomial-time quantum algorithms for Pell's equation and the principal ideal problem
STOC '02 Proceedings of the thiry-fourth annual ACM symposium on Theory of computing
Designs, Codes and Cryptography
Verifiable Partial Escrow of Integer Factors
Designs, Codes and Cryptography
Computing discrete logarithms in high-genus hyperelliptic Jacobians in provably subexponential time
Mathematics of Computation
Some computations on the spectra of Pisot and Salem numbers
Mathematics of Computation
A Signature Scheme Based on the Intractability of Computing Roots
Designs, Codes and Cryptography
Modular Arithmetic on Elements of Small Norm in Quadratic Fields
Designs, Codes and Cryptography
Short Polynomial Representations for Square Roots Modulo p
Designs, Codes and Cryptography
Orbit-stabilizer problems and computing normalizers for polycyclic groups
Journal of Symbolic Computation
Computing the primary decomposition of zero-dimensional ideals
Journal of Symbolic Computation
Satoh's algorithm in characteristic 2
Mathematics of Computation
On the Separation of Maximally Violated mod-k Cuts
Proceedings of the 7th International IPCO Conference on Integer Programming and Combinatorial Optimization
A Functional Cryptosystem Using a Group Action
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
First Implementation of Cryptographic Protocols Based on Algebraic Number Fields
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Faster Generation of NICE-Schnorr-Type Signatures
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
ISAAC '99 Proceedings of the 10th International Symposium on Algorithms and Computation
A Deterministic Polynomial Time Algorithm for Heilbronn's Problem in Dimension Three
LATIN '02 Proceedings of the 5th Latin American Symposium on Theoretical Informatics
Verifiable Partial Sharing of Integer Fractions
SAC '98 Proceedings of the Selected Areas in Cryptography
Efficient Implementation of Cryptosystems Based on Non-maximal Imaginary Quadratic Orders
SAC '99 Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography
On the Implementation of Cryptosystems Based on Real Quadratic Number Fields
SAC '00 Proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
Some Parallel Algorithms for Integer Factorisation
Euro-Par '99 Proceedings of the 5th International Euro-Par Conference on Parallel Processing
Recent Progress and Prospects for Integer Factorisation Algorithms
COCOON '00 Proceedings of the 6th Annual International Conference on Computing and Combinatorics
Cryptanalysis of the Goldreich-Goldwasser-Halevi Cryptosystem from Crypto '97
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Quantum Public-Key Cryptosystems
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
Faster Point Multiplication on Elliptic Curves with Efficient Endomorphisms
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Efficient Algorithms for Pairing-Based Cryptosystems
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Algorithms for Black-Box Fields and their Application to Cryptography (Extended Abstract)
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
Cryptanalysis of the Revised NTRU Signature Scheme
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Extending the GHS Weil Descent Attack
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Efficient Construction of Cryptographically Strong Elliptic Curves
INDOCRYPT '00 Proceedings of the First International Conference on Progress in Cryptology
Elliptic Curves of Prime Order over Optimal Extension Fields for Use in Cryptography
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
Cryptoanalysis in Prime Order Subgroups of Z*n
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Construction of Secure Elliptic Cryptosystems Using CM Tests and Liftings
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Efficient Elliptic Curve Exponentiation Using Mixed Coordinates
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Security of Cryptosystems Based on Class Groups of Imaginary Quadratic Orders
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Construction of Hyperelliptic Curves with CM and Its Application to Cryptosystems
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Supersingular Curves in Cryptography
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
The Hardness of Hensel Lifting: The Case of RSA and Discrete Logarithm
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
A New Concept in Protocols: Verifiable Computational Delegation (Position Paper)
Proceedings of the 6th International Workshop on Security Protocols
Lattice Basis Reduction with Dynamic Approximation
WAE '00 Proceedings of the 4th International Workshop on Algorithm Engineering
Efficient Trace and Revoke Schemes
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
Learning Algebraic Structures from Text Using Semantical Knowledge
ALT '98 Proceedings of the 9th International Conference on Algorithmic Learning Theory
An Identity Based Encryption Scheme Based on Quadratic Residues
Proceedings of the 8th IMA International Conference on Cryptography and Coding
Proceedings of the 8th IMA International Conference on Cryptography and Coding
ISC '01 Proceedings of the 4th International Conference on Information Security
New Minimal Modified Radix-r Representation with Applications to Smart Cards
PKC '02 Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems: Public Key Cryptography
Gauss Composition and Generalizations
ANTS-V Proceedings of the 5th International Symposium on Algorithmic Number Theory
Periodic Continued Fractions in Elliptic Function Fields
ANTS-V Proceedings of the 5th International Symposium on Algorithmic Number Theory
Trinomials ax and ax with Galois Groups of Order 168 and 8·168
ANTS-V Proceedings of the 5th International Symposium on Algorithmic Number Theory
Chinese Remaindering for Algebraic Numbers in a Hidden Field
ANTS-V Proceedings of the 5th International Symposium on Algorithmic Number Theory
Computational Aspects of NUCOMP
ANTS-V Proceedings of the 5th International Symposium on Algorithmic Number Theory
An Accelerated Buchmann Algorithm for Regulator Computation in Real Quadratic Fields
ANTS-V Proceedings of the 5th International Symposium on Algorithmic Number Theory
On p-adic Point Counting Algorithms for Elliptic Curves over Finite Fields
ANTS-V Proceedings of the 5th International Symposium on Algorithmic Number Theory
Factoring N = pq with the Elliptic Curve Method
ANTS-V Proceedings of the 5th International Symposium on Algorithmic Number Theory
ANTS-V Proceedings of the 5th International Symposium on Algorithmic Number Theory
Fast Multiplication in Finite Fields GF(2N)
CHES '99 Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems
Fast Implementation of Elliptic Curve Defined over GF(pm) on CalmRISC with MAC2424 Coprocessor
CHES '00 Proceedings of the Second International Workshop on Cryptographic Hardware and Embedded Systems
Hessian Elliptic Curves and Side-Channel Attacks
CHES '01 Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems
Protections against Differential Analysis for Elliptic Curve Cryptography
CHES '01 Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems
CHES '01 Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems
Generating Elliptic Curves of Prime Order
CHES '01 Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
A 3-Dimensional Lattice Reduction Algorithm
CaLC '01 Revised Papers from the International Conference on Cryptography and Lattices
Low Secret Exponent RSA Revisited
CaLC '01 Revised Papers from the International Conference on Cryptography and Lattices
Cryptographic Applications of Sparse Polynomials over Finite Rings
ICISC '00 Proceedings of the Third International Conference on Information Security and Cryptology
SAC '00 Proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography
Constructing complete tables of quartic fields using Kummer theory
Mathematics of Computation
Non-standard approaches to integer programming
Discrete Applied Mathematics
Declarative definition of group indexed data structures and approximation of their domains
Proceedings of the 3rd ACM SIGPLAN international conference on Principles and practice of declarative programming
A one-parameter quadratic-base version of the Baillie-PSW probable prime test
Mathematics of Computation
Computation of class numbers of quadratic number fields
Mathematics of Computation
Arithmetic on superelliptic curves
Mathematics of Computation
On the primality of n! ± 1 and 2×3×5×...× p±1
Mathematics of Computation
Finding smooth integers in short intervals using CRT decoding
Journal of Computer and System Sciences - Special issue on STOC 2000
On the normalization of numbers and functions defined by radicals
Journal of Symbolic Computation
Efficient solution of rational conics
Mathematics of Computation
On the orbit-stabilizer problem for integral matrix actions of polycyclic groups
Mathematics of Computation
Computing the multiplicative group of residue class rings
Mathematics of Computation
Computer algebra handbook
Designs, Codes and Cryptography
Heuristics on lattice basis reduction in practice
Journal of Experimental Algorithmics (JEA)
Random small hamming weight products with applications to cryptography
Discrete Applied Mathematics - Special issue on the 2000 com2MaC workshop on cryptography
How to fake an RSA signature by encoding modular root finding as a SAT problem
Discrete Applied Mathematics - The renesse issue on satisfiability
Mathematics of Computation
Factoring polynomials over finite fields with drinfeld modules
Mathematics of Computation
An efficient algorithm for the computation of Galois automorphisms
Mathematics of Computation
An Average-Case Analysis of the Gaussian Algorithm for Lattice Reduction
Combinatorics, Probability and Computing
Computing the sign or the value of the determinant of an integer matrix, a complexity survey
Journal of Computational and Applied Mathematics - Special issue: Proceedings of the international conference on linear algebra and arithmetic, Rabat, Morocco, 28-31 May 2001
Elliptic and hyperelliptic curves on embedded μP
ACM Transactions on Embedded Computing Systems (TECS)
Complexity of some arithmetic problems for binary polynomials
Computational Complexity
Exploiting self-similarities to defeat digital watermarking systems: a case study on still images
Proceedings of the 2004 workshop on Multimedia and security
Fast quantum algorithms for computing the unit group and class group of a number field
Proceedings of the thirty-seventh annual ACM symposium on Theory of computing
IEEE Transactions on Computers
Deterministic equation solving over finite fields
Proceedings of the 2005 international symposium on Symbolic and algebraic computation
A Low-Memory Algorithm for Point Counting on Picard Curves
Designs, Codes and Cryptography
Journal of Algorithms
Improving secure server performance by re-balancing SSL/TLS handshakes
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Improved generalized Atkin algorithm for computing square roots in finite fields
Information Processing Letters
Implementing exact real arithmetic in python, C++ and C
Theoretical Computer Science - Real numbers and computers
Fast component-by-component construction of rank-1 lattice rules with a non-prime number of points
Journal of Complexity - Special issue: Algorithms and complexity for continuous problems Schloss Dagstuhl, Germany, September 2004
Exact, efficient, and complete arrangement computation for cubic curves
Computational Geometry: Theory and Applications
A sufficient condition for a family of graphs being determined by their generalized spectra
European Journal of Combinatorics
Algebraic number theory and code design for Rayleigh fading channels
Communications and Information Theory
Polynomial-time quantum algorithms for Pell's equation and the principal ideal problem
Journal of the ACM (JACM)
Tensor-based hardness of the shortest vector problem to within almost polynomial factors
Proceedings of the thirty-ninth annual ACM symposium on Theory of computing
Lattices that admit logarithmic worst-case to average-case connection factors
Proceedings of the thirty-ninth annual ACM symposium on Theory of computing
Double Point Compression with Applications to Speeding Up Random Point Multiplication
IEEE Transactions on Computers
General Secret Sharing Based on the Chinese Remainder Theorem with Applications in E-Voting
Electronic Notes in Theoretical Computer Science (ENTCS)
Certification of the QR factor R and of lattice basis reducedness
Proceedings of the 2007 international symposium on Symbolic and algebraic computation
Quantum algorithm for a generalized hidden shift problem
SODA '07 Proceedings of the eighteenth annual ACM-SIAM symposium on Discrete algorithms
Bottleneck discovery and overlay management in network coded peer-to-peer systems
Proceedings of the 2007 SIGCOMM workshop on Internet network management
Efficient reductions among lattice problems
Proceedings of the nineteenth annual ACM-SIAM symposium on Discrete algorithms
A new idea in digital signature schemes
ISP'06 Proceedings of the 5th WSEAS International Conference on Information Security and Privacy
Finding short lattice vectors within mordell's inequality
STOC '08 Proceedings of the fortieth annual ACM symposium on Theory of computing
System architecture and implementation of MIMO sphere decoders on FPGA
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Computing the algebraic relations of C-finite sequences and multisequences
Journal of Symbolic Computation
Good reduction of puiseux series and complexity of the Newton-Puiseux algorithm over finite fields
Proceedings of the twenty-first international symposium on Symbolic and algebraic computation
Analysis on the strip-based projection model for discrete tomography
Discrete Applied Mathematics
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
Highly Regular Right-to-Left Algorithms for Scalar Multiplication
CHES '07 Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems
Collision Search for Elliptic Curve Discrete Logarithm over GF(2m) with FPGA
CHES '07 Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems
Efficient Modular Arithmetic in Adapted Modular Number System Using Lagrange Representation
ACISP '08 Proceedings of the 13th Australasian conference on Information Security and Privacy
Fast Point Multiplication on Elliptic Curves without Precomputation
WAIFI '08 Proceedings of the 2nd international workshop on Arithmetic of Finite Fields
Computing Omega-Limit Sets in Linear Dynamical Systems
UC '08 Proceedings of the 7th international conference on Unconventional Computing
Evaluating Large Degree Isogenies and Applications to Pairing Based Cryptography
Pairing '08 Proceedings of the 2nd international conference on Pairing-Based Cryptography
Efficient lattice-based signature scheme
International Journal of Applied Cryptography
Decidable Compositions of O-Minimal Automata
ATVA '08 Proceedings of the 6th International Symposium on Automated Technology for Verification and Analysis
New left-to-right minimal weight signed-digit radix-r representation
Computers and Electrical Engineering
Generating a Large Prime Factor of p4 ± p2 + 1 in Polynomial Time
OTM '08 Proceedings of the OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008. Part II on On the Move to Meaningful Internet Systems
On Generating Elements of Orders Dividing p2k±pk + 1
IWSEC '08 Proceedings of the 3rd International Workshop on Security: Advances in Information and Computer Security
Rigorous and Efficient Short Lattice Vectors Enumeration
ASIACRYPT '08 Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
From an LLL-reduced basis to another
ACM Communications in Computer Algebra
Sampling methods for shortest vectors, closest vectors and successive minima
Theoretical Computer Science
The Vanstone-Zuccherato Schemes Revisited
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
A More Compact Representation of XTR Cryptosystem
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Improving the Boneh-Franklin Traitor Tracing Scheme
Irvine Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09
On the Security of Cryptosystems with Quadratic Decryption: The Nicest Cryptanalysis
EUROCRYPT '09 Proceedings of the 28th Annual International Conference on Advances in Cryptology: the Theory and Applications of Cryptographic Techniques
Fault Attacks on RSA Public Keys: Left-To-Right Implementations Are Also Vulnerable
CT-RSA '09 Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology
A Variant of Boneh-Gentry-Hamburg's Pairing-Free Identity Based Encryption Scheme
Information Security and Cryptology
Broadcast Attacks against Lattice-Based Cryptosystems
ACNS '09 Proceedings of the 7th International Conference on Applied Cryptography and Network Security
Partial Key Exposure Attack on CRT-RSA
ACNS '09 Proceedings of the 7th International Conference on Applied Cryptography and Network Security
Exponent Recoding and Regular Exponentiation Algorithms
AFRICACRYPT '09 Proceedings of the 2nd International Conference on Cryptology in Africa: Progress in Cryptology
Reducing the Complexity in the Distributed Computation of Private RSA Keys
ACISP '09 Proceedings of the 14th Australasian Conference on Information Security and Privacy
Cuts from Proofs: A Complete and Practical Technique for Solving Linear Inequalities over Integers
CAV '09 Proceedings of the 21st International Conference on Computer Aided Verification
Lower bounds for zero-dimensional projections
Proceedings of the 2009 international symposium on Symbolic and algebraic computation
H-LLL: using householder inside LLL
Proceedings of the 2009 international symposium on Symbolic and algebraic computation
Exact numerical computation in algebra and geometry
Proceedings of the 2009 international symposium on Symbolic and algebraic computation
Parallel Lattice Basis Reduction Using a Multi-threaded Schnorr-Euchner LLL Algorithm
Euro-Par '09 Proceedings of the 15th International Euro-Par Conference on Parallel Processing
Exact, efficient, and complete arrangement computation for cubic curves
Computational Geometry: Theory and Applications
Complex lattice reduction algorithm for low-complexity full-diversity MIMO detection
IEEE Transactions on Signal Processing
IEEE Transactions on Circuits and Systems Part I: Regular Papers
Echo: A peer-to-peer clustering framework for improving communication in DHTs
Journal of Parallel and Distributed Computing
Factoring pq2 with Quadratic Forms: Nice Cryptanalyses
ASIACRYPT '09 Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Cross twisted Xate pairing with Barreto-Naehrig curve for multi-pairing technique
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
Improved generalized Atkin algorithm for computing square roots in finite fields
Information Processing Letters
Journal of Algorithms
Fast component-by-component construction of rank-1 lattice rules with a non-prime number of points
Journal of Complexity - Special issue: Algorithms and complexity for continuous problems Schloss Dagstuhl, Germany, September 2004
Computing polycyclic presentations for polycyclic rational matrix groups
Journal of Symbolic Computation
Proving in zero-knowledge that a number is the product of two safe primes
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
On the performance of hyperelliptic cryptosystems
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Cryptanalysis of countermeasures proposed for repairing ISO 9796-1
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Delaying and merging operations in scalar multiplication: applications to curve-based cryptosystems
SAC'06 Proceedings of the 13th international conference on Selected areas in cryptography
Fast point multiplication on elliptic curves through isogenies
AAECC'03 Proceedings of the 15th international conference on Applied algebra, algebraic algorithms and error-correcting codes
Public-key cryptosystems based on class semigroups of imaginary quadratic non-maximal orders
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Composing semi-algebraic O-minimal automata
HSCC'07 Proceedings of the 10th international conference on Hybrid systems: computation and control
Cryptocomputing with rationals
FC'02 Proceedings of the 6th international conference on Financial cryptography
Improved algorithms for efficient arithmetic on elliptic curves using fast endomorphisms
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Hypercubic lattice reduction and analysis of GGH and NTRU signatures
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
About the XL algorithm over GF(2)
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
Public key encryption with searchable keywords based on Jacobi symbols
INDOCRYPT'07 Proceedings of the cryptology 8th international conference on Progress in cryptology
SAC'07 Proceedings of the 14th international conference on Selected areas in cryptography
Computing a lower bound for the canonical height on elliptic curves over totally real number fields
ANTS-VIII'08 Proceedings of the 8th international conference on Algorithmic number theory
Computing Hilbert class polynomials
ANTS-VIII'08 Proceedings of the 8th international conference on Algorithmic number theory
Computing L-series of hyperelliptic curves
ANTS-VIII'08 Proceedings of the 8th international conference on Algorithmic number theory
Speeding-up lattice reduction with random projections
LATIN'08 Proceedings of the 8th Latin American conference on Theoretical informatics
A digital signature scheme based on CV P∞
PKC'08 Proceedings of the Practice and theory in public key cryptography, 11th international conference on Public key cryptography
A decomposition of the cyclic groups of order p and p 2, where p is a prime number
Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology
Randomized NP-completeness for p-adic rational roots of sparse polynomials in one variable
Proceedings of the 2010 International Symposium on Symbolic and Algebraic Computation
About a decomposition of the group Zpq, where p and q are distinct odd primes
European Journal of Combinatorics
Elliptic curves cryptosystems for ecommerce applications
MCBE'10/MCBC'10 Proceedings of the 11th WSEAS international conference on mathematics and computers in business and economics and 11th WSEAS international conference on Biology and chemistry
Efficient 3-dimensional GLV method for faster point multiplication on some GLS elliptic curves
Information Processing Letters
Augmented lattice reduction for MIMO decoding
IEEE Transactions on Wireless Communications
Lower bounds for testing triangle-freeness in Boolean functions
SODA '10 Proceedings of the twenty-first annual ACM-SIAM symposium on Discrete Algorithms
Algorithms for ray class groups and Hilbert class fields
SODA '10 Proceedings of the twenty-first annual ACM-SIAM symposium on Discrete Algorithms
Algorithms and theory of computation handbook
Accelerating twisted ate pairing with frobenius map, small scalar multiplication, and multi-pairing
ICISC'09 Proceedings of the 12th international conference on Information security and cryptology
SCN'10 Proceedings of the 7th international conference on Security and cryptography for networks
The design of core 2: a library for exact numeric computation in geometry and algebra
ICMS'10 Proceedings of the Third international congress conference on Mathematical software
Computational investigations of scrambled Faure sequences
Mathematics and Computers in Simulation
Solving Very Sparse Rational Systems of Equations
ACM Transactions on Mathematical Software (TOMS)
Secure key management scheme for dynamic hierarchical access control based on ECC
Journal of Systems and Software
Algorithmic Enumeration of Ideal Classes for Quaternion Orders
SIAM Journal on Computing
Improved Nguyen-Vidick heuristic sieve algorithm for shortest vector problem
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Computing hermite forms of polynomial matrices
Proceedings of the 36th international symposium on Symbolic and algebraic computation
Unique factorization domains in the java computer algebra system
ADG'08 Proceedings of the 7th international conference on Automated deduction in geometry
Improving BDD cryptosystems in general lattices
ISPEC'11 Proceedings of the 7th international conference on Information security practice and experience
Decomposing finite Abelian groups
Quantum Information & Computation
Shor's discrete logarithm quantum algorithm for elliptic curves
Quantum Information & Computation
An experiment of number field sieve over GF(p) of low hamming weight characteristic
IWCC'11 Proceedings of the Third international conference on Coding and cryptology
A generalization of Verheul's theorem for some ordinary curves
Inscrypt'10 Proceedings of the 6th international conference on Information security and cryptology
Cyclotomic constructions of skew Hadamard difference sets
Journal of Combinatorial Theory Series A
Good reduction of Puiseux series and applications
Journal of Symbolic Computation
Communications of the ACM
Rate estimation in partially observed Markov jump processes with measurement errors
Statistics and Computing
Cuts from proofs: a complete and practical technique for solving linear inequalities over integers
Formal Methods in System Design
Optimization of the MOVA undeniable signature scheme
Mycrypt'05 Proceedings of the 1st international conference on Progress in Cryptology in Malaysia
New key management systems for multilevel security
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
ICALP'05 Proceedings of the 32nd international conference on Automata, Languages and Programming
EuroPKI 2006 Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice
ICMS'06 Proceedings of the Second international conference on Mathematical Software
Scalar multiplication on elliptic curves defined over fields of small odd characteristic
INDOCRYPT'05 Proceedings of the 6th international conference on Cryptology in India
A note on signed binary window algorithm for elliptic curve cryptosystems
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
Computation of locally free class groups
ANTS'06 Proceedings of the 7th international conference on Algorithmic Number Theory
Numerical results on class groups of imaginary quadratic fields
ANTS'06 Proceedings of the 7th international conference on Algorithmic Number Theory
The totally real primitive number fields of discriminant at most 109
ANTS'06 Proceedings of the 7th international conference on Algorithmic Number Theory
Computing a lower bound for the canonical height on elliptic curves over ℚ
ANTS'06 Proceedings of the 7th international conference on Algorithmic Number Theory
Computing CM points on shimura curves arising from cocompact arithmetic triangle groups
ANTS'06 Proceedings of the 7th international conference on Algorithmic Number Theory
Construction of rational points on elliptic curves over finite fields
ANTS'06 Proceedings of the 7th international conference on Algorithmic Number Theory
Differential cryptanalysis for multivariate schemes
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
A new baby-step giant-step algorithm and some applications to cryptanalysis
CHES'05 Proceedings of the 7th international conference on Cryptographic hardware and embedded systems
A non-redundant and efficient architecture for karatsuba-ofman algorithm
ISC'05 Proceedings of the 8th international conference on Information Security
On the use of gröbner bases for computing the structure of finite abelian groups
CASC'05 Proceedings of the 8th international conference on Computer Algebra in Scientific Computing
Generating prime order elliptic curves: difficulties and efficiency considerations
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
A public key cryptosystem based on three new provable problems
Theoretical Computer Science
Fully homomorphic encryption with relatively small key and ciphertext sizes
PKC'10 Proceedings of the 13th international conference on Practice and Theory in Public Key Cryptography
On ideal lattices and learning with errors over rings
EUROCRYPT'10 Proceedings of the 29th Annual international conference on Theory and Applications of Cryptographic Techniques
Server-aided RSA key generation against collusion attack
MADNES'05 Proceedings of the First international conference on Secure Mobile Ad-hoc Networks and Sensors
The number field sieve in the medium prime case
CRYPTO'06 Proceedings of the 26th annual international conference on Advances in Cryptology
Factoring RSA modulus using prime reconstruction from random known bits
AFRICACRYPT'10 Proceedings of the Third international conference on Cryptology in Africa
Computing elliptic curve discrete logarithms with the negation map
Information Sciences: an International Journal
Symplectic lattice reduction and NTRU
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
The polynomial composition problem in (Z/nZ)[X]
CARDIS'10 Proceedings of the 9th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Application
Pairing-Based cryptography at high security levels
IMA'05 Proceedings of the 10th international conference on Cryptography and Coding
IMA'05 Proceedings of the 10th international conference on Cryptography and Coding
Secret key leakage from public key perturbation of DLP-Based cryptosystems
Cryptography and Security
Improved key generation for gentry's fully homomorphic encryption scheme
IMACC'11 Proceedings of the 13th IMA international conference on Cryptography and Coding
Binary kloosterman sums with value 4
IMACC'11 Proceedings of the 13th IMA international conference on Cryptography and Coding
Improved precomputation scheme for scalar multiplication on elliptic curves
IMACC'11 Proceedings of the 13th IMA international conference on Cryptography and Coding
Testing nilpotence of galois groups in polynomial time
ACM Transactions on Algorithms (TALG)
Strongly regular graphs from unions of cyclotomic classes
Journal of Combinatorial Theory Series B
Counting points on Cab curves using Monsky--Washnitzer cohomology
Finite Fields and Their Applications
Some computational aspects of Jacobians of curves in the family y3=γx5+δ over Fp
Finite Fields and Their Applications
Finite group algebras of nilpotent groups: A complete set of orthogonal primitive idempotents
Finite Fields and Their Applications
Parallel computation skeletons with premature termination property
FLOPS'12 Proceedings of the 11th international conference on Functional and Logic Programming
IJCAR'12 Proceedings of the 6th international joint conference on Automated Reasoning
A new attack on RSA and CRT-RSA
AFRICACRYPT'12 Proceedings of the 5th international conference on Cryptology in Africa
M.C. escher wrap artist: aesthetic coloring of ribbon patterns
FUN'12 Proceedings of the 6th international conference on Fun with Algorithms
Secure Communication of Medical Information Using Mobile Agents
Journal of Medical Systems
Public key identification based on the equivalence of quadratic forms
MFCS'07 Proceedings of the 32nd international conference on Mathematical Foundations of Computer Science
An efficient LLL gram using buffered transformations
CASC'07 Proceedings of the 10th international conference on Computer Algebra in Scientific Computing
Computing hypercircles by moving hyperplanes
Journal of Symbolic Computation
Limits of quotients of bivariate real analytic functions
Journal of Symbolic Computation
Decision problems for linear recurrence sequences
RP'12 Proceedings of the 6th international conference on Reachability Problems
Four-Dimensional gallant-lambert-vanstone scalar multiplication
ASIACRYPT'12 Proceedings of the 18th international conference on The Theory and Application of Cryptology and Information Security
Speeding up elliptic curve discrete logarithm computations with point halving
Designs, Codes and Cryptography
A polynomial-time algorithm to check closedness of simple second order mixed-integer sets
IPCO'13 Proceedings of the 16th international conference on Integer Programming and Combinatorial Optimization
Secure Transmission of Mobile Agent in Dynamic Distributed Environments
Wireless Personal Communications: An International Journal
The orbit problem in higher dimensions
Proceedings of the forty-fifth annual ACM symposium on Theory of computing
On Ideal Lattices and Learning with Errors over Rings
Journal of the ACM (JACM)
Improved migration for mobile computing in distributed networks
Computer Standards & Interfaces
The relation and transformation between hierarchical inner product encryption and spatial encryption
Designs, Codes and Cryptography
Hi-index | 0.03 |