Intractable problems in number theory (invited talk)
CRYPTO '88 Proceedings on Advances in cryptology
Cryptanalysis and protocol failures
Communications of the ACM
On the Security of an RSA Based Encryption Scheme
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
Proceedings of the 8th IMA International Conference on Cryptography and Coding
Efficient algorithms for the gcd and cubic residuosity in the ring of Eisenstein integers
Journal of Symbolic Computation
On the elliptic curves y2=x3-c with embedding degree one
Journal of Computational and Applied Mathematics
Hi-index | 0.02 |