A Family of Optimal Packings in Grassmannian Manifolds
Journal of Algebraic Combinatorics: An International Journal
Advanced notations in mathematica
ISSAC '00 Proceedings of the 2000 international symposium on Symbolic and algebraic computation
On Liouvillian solutions of linear differential equations of order 4 and 5
Proceedings of the 2001 international symposium on Symbolic and algebraic computation
On the computation of elementary divisors of integer matrices
Journal of Symbolic Computation
Computing Riemann---Roch spaces in algebraic function fields and related topics
Journal of Symbolic Computation
On the combinatorial structure of the approval-voting polytope
Journal of Mathematical Psychology
Jacobi Polynomials, Type II Codes, and Designs
Designs, Codes and Cryptography
Constructions for Octonion and Exceptional Jordan Algebras
Designs, Codes and Cryptography
Homogeneous Bent Functions, Invariants, and Designs
Designs, Codes and Cryptography
Efficient collection in infinite polycyclic groups
Journal of Symbolic Computation
The calculation of radical ideals in positive characteristic
Journal of Symbolic Computation
IEEE Transactions on Computers
Equality in computer algebra and beyond
Journal of Symbolic Computation - Integrated reasoning and algebra systems
Computing modular invariants of p-groups
Journal of Symbolic Computation
Abstract Data Types in Computer Algebra
MFCS '00 Proceedings of the 25th International Symposium on Mathematical Foundations of Computer Science
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Attacking the Affine Parts of SFLASH
Proceedings of the 8th IMA International Conference on Cryptography and Coding
Loopholes in Two Public Key Cryptosystems Using the Modular Group
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
An Algorithm for Computing Weierstrass Points
ANTS-V Proceedings of the 5th International Symposium on Algorithmic Number Theory
Trinomials ax and ax with Galois Groups of Order 168 and 8·168
ANTS-V Proceedings of the 5th International Symposium on Algorithmic Number Theory
Transportable Modular Symbols and the Intersection Pairing
ANTS-V Proceedings of the 5th International Symposium on Algorithmic Number Theory
A New Scheme for Computing with Algebraically Closed Fields
ANTS-V Proceedings of the 5th International Symposium on Algorithmic Number Theory
AAECC-14 Proceedings of the 14th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
On 2-arc-transitivity of Cayley graphs
Journal of Combinatorial Theory Series B
Automorphism group computation and isomorphism testing in finite groups
Journal of Symbolic Computation
A New Class of Designs Which Protect against Quantum Jumps
Designs, Codes and Cryptography
The Residually Weakly Primitive Geometries of M22
Designs, Codes and Cryptography
Geometries for the group PSL(3,4)
European Journal of Combinatorics
A tetravalent half-arc-transitive graph with non-abelian vertex stabilizer
Journal of Combinatorial Theory Series B
Memory-based and disk-based algorithms for very high degree permutation groups
ISSAC '03 Proceedings of the 2003 international symposium on Symbolic and algebraic computation
The affine primitive permutation groups of degree less than 1000
Journal of Symbolic Computation
An algorithm for computing invariants of linear actions of algebraic groups up to a given degree
Journal of Symbolic Computation
A Redundant Representation of GF(q^n) for Designing Arithmetic Circuits
IEEE Transactions on Computers
Computer algebra handbook
An efficient algorithm for the computation of Galois automorphisms
Mathematics of Computation
Elementary Abelian Covers of Graphs
Journal of Algebraic Combinatorics: An International Journal
ANTS VI: algorithmic number theory symposium poster abstracts
ACM SIGSAM Bulletin
Elements of prescribed order, prescribed traces and systems of rational functions over finite fields
Designs, Codes and Cryptography
Designs, Codes and Cryptography
GUAVA: an error-correcting codes package
ACM SIGSAM Bulletin
The Polynomial Degree of the Grassmannian $${\mathcal G_{\bf 1,}{\bf n,}{\bf 2}}$$
Designs, Codes and Cryptography
A census of semisymmetric cubic graphs on up to 768 vertices
Journal of Algebraic Combinatorics: An International Journal
Succinct representation of finite abelian groups
Proceedings of the 2006 international symposium on Symbolic and algebraic computation
A data structure for a uniform approach to computations with finite groups
Proceedings of the 2006 international symposium on Symbolic and algebraic computation
Computation of the splitting field of a dihedral polynomial
Proceedings of the 2006 international symposium on Symbolic and algebraic computation
Proceedings of the 2006 international symposium on Symbolic and algebraic computation
Invariant subspaces, duality, and covers of the Petersen graph
European Journal of Combinatorics
An explicit class of codes with good parameters and their duals
Discrete Applied Mathematics - Special issue: Coding and cryptography
Semisymmetric cubic graphs of twice odd order
European Journal of Combinatorics
On strongly regular bicirculants
European Journal of Combinatorics
The linear programming bound for codes over finite Frobenius rings
Designs, Codes and Cryptography
Regular Cayley maps for finite abelian groups
Journal of Algebraic Combinatorics: An International Journal
Computing with toric varieties
Journal of Symbolic Computation
Trivializing a central simple algebra of degree 4 over the rational numbers
Journal of Symbolic Computation
Generation of groups of square-free order
Journal of Symbolic Computation
Nonbinary Quantum Goppa Codes Exceeding the Quantum Gilbert-Varshamov Bound
Quantum Information Processing
Differential equations for algebraic functions
Proceedings of the 2007 international symposium on Symbolic and algebraic computation
The isomorphism problem for cyclic algebras and an application
Proceedings of the 2007 international symposium on Symbolic and algebraic computation
Fast arithmetic for triangular sets: from theory to practice
Proceedings of the 2007 international symposium on Symbolic and algebraic computation
A disk-based parallel implementation for direct condensation of large permutation modules
Proceedings of the 2007 international symposium on Symbolic and algebraic computation
Symmetric cubic graphs of small girth
Journal of Combinatorial Theory Series B
Fast computation of power series solutions of systems of differential equations
SODA '07 Proceedings of the eighteenth annual ACM-SIAM symposium on Discrete algorithms
Planar polynomials for commutative semifields with specified nuclei
Designs, Codes and Cryptography
Constructing even radius tightly attached half-arc-transitive graphs of valency four
Journal of Algebraic Combinatorics: An International Journal
F-actions and parallel-product decomposition of reflexible maps
Journal of Algebraic Combinatorics: An International Journal
Homogeneous factorisations of Johnson graphs
Designs, Codes and Cryptography
Hamiltonicity of vertex-transitive graphs of order 4p
European Journal of Combinatorics
Journal of Combinatorial Theory Series B
Primitive decompositions of Johnson graphs
Journal of Combinatorial Theory Series A
Gröbner bases and Diophantine analysis
Journal of Symbolic Computation
Multi-modular algorithm for computing the splitting field of a polynomial
Proceedings of the twenty-first international symposium on Symbolic and algebraic computation
Bundles, presemifields and nonlinear functions
Designs, Codes and Cryptography
A one-time signature using run-length encoding
Information Processing Letters
Non-wafer-Scale Sieving Hardware for the NFS: Another Attempt to Cope with 1024-Bit
EUROCRYPT '07 Proceedings of the 26th annual international conference on Advances in Cryptology
The GPS Identification Scheme Using Frobenius Expansions
Research in Cryptology
An Algebraic Approach for Proving Data Correctness in Arithmetic Data Paths
CAV '08 Proceedings of the 20th international conference on Computer Aided Verification
On the Connection between Kloosterman Sums and Elliptic Curves
SETA '08 Proceedings of the 5th international conference on Sequences and Their Applications
Pairings on Hyperelliptic Curves with a Real Model
Pairing '08 Proceedings of the 2nd international conference on Pairing-Based Cryptography
Classic and Quantum Error Correcting Codes
ICMCTA '08 Proceedings of the 2nd international Castle meeting on Coding Theory and Applications
Combinatorial method in the coset enumeration of symmetrically generated groups
International Journal of Computer Mathematics
Algebraic Attacks on the Courtois Toy Cipher
Cryptologia
An upper bound for the minimum weight of the dual codes of desarguesian planes
European Journal of Combinatorics
Parametrizing Del Pezzo surfaces of degree 8 using Lie algebras
Journal of Symbolic Computation
Regular maps and hypermaps of Euler characteristic -1 to -200
Journal of Combinatorial Theory Series B
Formal desingularization of surfaces: The Jung method revisited
Journal of Symbolic Computation
Computing pairings using x-coordinates only
Designs, Codes and Cryptography
Skew codes of prescribed distance or rank
Designs, Codes and Cryptography
The modpn library: bringing fast polynomial arithmetic into MAPLE
ACM Communications in Computer Algebra
Computing Equiangular Lines in Complex Space
Mathematical Methods in Computer Science
Strongly regular tri-Cayley graphs
European Journal of Combinatorics
Finite field elements of high order arising from modular curves
Designs, Codes and Cryptography
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Hexavalent half-arc-transitive graphs of order 4p
European Journal of Combinatorics
On circulant self-dual codes over small fields
Designs, Codes and Cryptography
Non-associative Gröbner bases, finitely-presented Lie rings and the Engel condition, II
Journal of Symbolic Computation
Fast arithmetic for triangular sets: From theory to practice
Journal of Symbolic Computation
On deciding finiteness of matrix groups
Journal of Symbolic Computation
A cache-friendly truncated FFT
Theoretical Computer Science
Cryptanalysis of an authentication scheme using truncated polynomials
Information Processing Letters
Constructing algebraic groups from their Lie algebras
Journal of Symbolic Computation
PolyBoRi: A framework for Gröbner-basis computations with Boolean polynomials
Journal of Symbolic Computation
Tetravalent one-regular graphs of order 2pq
Journal of Algebraic Combinatorics: An International Journal
Broadcast Attacks against Lattice-Based Cryptosystems
ACNS '09 Proceedings of the 7th International Conference on Applied Cryptography and Network Security
Noether normalization guided by monomial cone decompositions
Journal of Symbolic Computation
Letterplace ideals and non-commutative Gröbner bases
Journal of Symbolic Computation
Faster polynomial multiplication via multipoint Kronecker substitution
Journal of Symbolic Computation
Fast arithmetics in artin-schreier towers over finite fields
Proceedings of the 2009 international symposium on Symbolic and algebraic computation
Parallel sparse polynomial multiplication using heaps
Proceedings of the 2009 international symposium on Symbolic and algebraic computation
Computation schemes for splitting fields of polynomials
Proceedings of the 2009 international symposium on Symbolic and algebraic computation
AMS special session on SAGE and mathematical research using open source software
ACM Communications in Computer Algebra
Coding with skew polynomial rings
Journal of Symbolic Computation
Generating Pairing-Friendly Curves with the CM Equation of Degree 1
Pairing '09 Proceedings of the 3rd International Conference Palo Alto on Pairing-Based Cryptography
Some graphs related to the small Mathieu groups
European Journal of Combinatorics
Algorithm 898: Efficient multiplication of dense matrices over GF(2)
ACM Transactions on Mathematical Software (TOMS)
Efficient and generalized pairing computation on Abelian varieties
IEEE Transactions on Information Theory
Code Generation for Polynomial Multiplication
CASC '09 Proceedings of the 11th International Workshop on Computer Algebra in Scientific Computing
Computing Gröbner Bases within Linear Algebra
CASC '09 Proceedings of the 11th International Workshop on Computer Algebra in Scientific Computing
Cryptanalysis of the Square Cryptosystems
ASIACRYPT '09 Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Codes as Modules over Skew Polynomial Rings
Cryptography and Coding '09 Proceedings of the 12th IMA International Conference on Cryptography and Coding
On Designs and Multiplier Groups Constructed from Almost Perfect Nonlinear Functions
Cryptography and Coding '09 Proceedings of the 12th IMA International Conference on Cryptography and Coding
Computing with algebraically closed fields
Journal of Symbolic Computation
Computing automorphisms of semigroups
Journal of Symbolic Computation
An explicit class of codes with good parameters and their duals
Discrete Applied Mathematics - Special issue: Coding and cryptography
$${{{\mathbb Z}_2}{{\mathbb Z}_4}}$$ -linear codes: generator matrices and duality
Designs, Codes and Cryptography
Constructing transitive permutation groups
Journal of Symbolic Computation
Computing subgroups of bounded index in a finite group
Journal of Symbolic Computation
Brauer groups of diagonal quartic surfaces
Journal of Symbolic Computation
Computing restrictions of ideals in finitely generated k-algebras by means of Buchberger's algorithm
Journal of Symbolic Computation
Map operations and k-orbit maps
Journal of Combinatorial Theory Series A
On multiplication in finite fields
Journal of Complexity
Codes associated with triangular graphs and permutation decoding
International Journal of Information and Coding Theory
Unitary error bases: constructions, equivalence, and applications
AAECC'03 Proceedings of the 15th international conference on Applied algebra, algebraic algorithms and error-correcting codes
Datagraphs in algebraic geometry and K3 surfaces
SNSC'01 Proceedings of the 2nd international conference on Symbolic and numerical scientific computation
Cryptanalysis of a hash function proposed at ICISC 2006
ICISC'07 Proceedings of the 10th international conference on Information security and cryptology
Constructing pairing-friendly elliptic curves using Gröbner basis reduction
Cryptography and Coding'07 Proceedings of the 11th IMA international conference on Cryptography and coding
Another look at square roots (and other less common operations) in fields of even characteristic
SAC'07 Proceedings of the 14th international conference on Selected areas in cryptography
Some improvements to 4-descent on an elliptic curve
ANTS-VIII'08 Proceedings of the 8th international conference on Algorithmic number theory
Efficient hyperelliptic arithmetic using balanced representation for divisors
ANTS-VIII'08 Proceedings of the 8th international conference on Algorithmic number theory
Computing Hilbert modular forms over fields with nontrivial class group
ANTS-VIII'08 Proceedings of the 8th international conference on Algorithmic number theory
On the diophantine equation x2 + 2α5β13γ = yn
ANTS-VIII'08 Proceedings of the 8th international conference on Algorithmic number theory
Speeding-up lattice reduction with random projections
LATIN'08 Proceedings of the 8th Latin American conference on Theoretical informatics
Algebraic geometry codes from polyhedral divisors
Journal of Symbolic Computation
Binary codes from the line graph of the n-cube
Journal of Symbolic Computation
The weight distributions of cyclic codes with two zeros and zeta functions
Journal of Symbolic Computation
Strongly regular graphs associated with ternary bent functions
Journal of Combinatorial Theory Series A
IEEE Transactions on Information Theory
On the construction of skew quasi-cyclic codes
IEEE Transactions on Information Theory
Computing gröbner bases within linear algebra and its implementation
ACM Communications in Computer Algebra
Journal of Symbolic Computation
Looking for Gröbner basis theory for (almost) skew 2-nomial algebras
Journal of Symbolic Computation
Parallel sparse polynomial division using heaps
Proceedings of the 4th International Workshop on Parallel and Symbolic Computation
An infinite family of half-arc-transitive graphs with universal reachability relation
European Journal of Combinatorics
On the limitations of the use of solvable groups in Cayley graph cage constructions
European Journal of Combinatorics
Isometries and construction of permutation arrays
IEEE Transactions on Information Theory
Codes from lattice and related graphs, and permutation decoding
Discrete Applied Mathematics
Some REALLY beautiful Hadamard matrices
Cryptography and Communications
An analysis of the RC4 family of stream ciphers against algebraic attacks
AISC '10 Proceedings of the Eighth Australasian Conference on Information Security - Volume 105
Journal of Symbolic Computation
Modular Las Vegas algorithms for polynomial absolute factorization
Journal of Symbolic Computation
Non-abelian skew Hadamard difference sets fixed by a prescribed automorphism
Journal of Combinatorial Theory Series A
Algebraic cryptanalysis of SMS4: gröbner basis attack and SAT attack compared
ICISC'09 Proceedings of the 12th international conference on Information security and cryptology
Magma: a tool for number theory
ICMS'10 Proceedings of the Third international congress conference on Mathematical software
Almost p-ary perfect sequences
SETA'10 Proceedings of the 6th international conference on Sequences and their applications
Optimal hash functions for approximate matches on the n-cube
IEEE Transactions on Information Theory
Switching construction of planar functions on finite fields
WAIFI'10 Proceedings of the Third international conference on Arithmetic of finite fields
ACISP'10 Proceedings of the 15th Australasian conference on Information security and privacy
Unifying some known infinite families of combinatorial 3-designs
Journal of Combinatorial Theory Series A
Point regular groups of automorphisms of generalised quadrangles
Journal of Combinatorial Theory Series A
Stable decompositions for some symmetric group characters arising in braid group cohomology
Journal of Combinatorial Theory Series A
Computing representatives of nilpotent orbits of θ-groups
Journal of Symbolic Computation
Classification of regular embeddings of n-dimensional cubes
Journal of Algebraic Combinatorics: An International Journal
Equivalence classes of multiplicative central (pn, pn, pn, 1)-relative difference sets
Cryptography and Communications
Computing bilinear pairings on elliptic curves with automorphisms
Designs, Codes and Cryptography
The cocyclic Hadamard matrices of order less than 40
Designs, Codes and Cryptography
Sparse polynomial multiplication and division in Maple 14
ACM Communications in Computer Algebra
Encoding points on hyperelliptic curves over finite fields in deterministic polynomial time
Pairing'10 Proceedings of the 4th international conference on Pairing-based cryptography
Generating more Kawazoe-Takahashi genus 2 pairing-friendly hyperelliptic curves
Pairing'10 Proceedings of the 4th international conference on Pairing-based cryptography
Journal of Symbolic Computation
Algorithmic Enumeration of Ideal Classes for Quaternion Orders
SIAM Journal on Computing
Bringing Toric Codes to the Next Dimension
SIAM Journal on Discrete Mathematics
Faster pairing computation on genus 2 hyperelliptic curves
Information Processing Letters
CT-RSA'11 Proceedings of the 11th international conference on Topics in cryptology: CT-RSA 2011
Linear recurring sequences for the UOV key generation
PKC'11 Proceedings of the 14th international conference on Practice and theory in public key cryptography conference on Public key cryptography
Cryptanalysis of multivariate and odd-characteristic HFE variants
PKC'11 Proceedings of the 14th international conference on Practice and theory in public key cryptography conference on Public key cryptography
PKC'11 Proceedings of the 14th international conference on Practice and theory in public key cryptography conference on Public key cryptography
Optimization techniques for small matrix multiplication
Theoretical Computer Science
Designs, Codes and Cryptography
Association schemes arising from bent functions
Designs, Codes and Cryptography
The modpn library: Bringing fast polynomial arithmetic into Maple
Journal of Symbolic Computation
Sparse polynomial division using a heap
Journal of Symbolic Computation
PET SNAKE: a special purpose architecture to implement an algebraic attack in hardware
Transactions on computational science X
Toric forms of elliptic curves and their arithmetic
Journal of Symbolic Computation
Linear algebra to compute syzygies and Gröbner bases
Proceedings of the 36th international symposium on Symbolic and algebraic computation
A family of implementation-friendly BN elliptic curves
Journal of Systems and Software
Universal simulation of Hamiltonians using a finite set of control operations
Quantum Information & Computation
On the structure of nonstabilizer clifford codes
Quantum Information & Computation
A comparative code study for quantum fault tolerance
Quantum Information & Computation
Modifying Faugère's F5 algorithm to ensure termination
ACM Communications in Computer Algebra
Algorithms for the shortest and closest lattice vector problems
IWCC'11 Proceedings of the Third international conference on Coding and cryptology
The PHOTON family of lightweight Hash functions
CRYPTO'11 Proceedings of the 31st annual conference on Advances in cryptology
Polytopes of high rank for the alternating groups
Journal of Combinatorial Theory Series A
To infinity and beyond: combined attack on ECC using points of low order
CHES'11 Proceedings of the 13th international conference on Cryptographic hardware and embedded systems
Can homomorphic encryption be practical?
Proceedings of the 3rd ACM workshop on Cloud computing security workshop
How to implement a modular form
Journal of Symbolic Computation
Homotopy techniques for multiplication modulo triangular sets
Journal of Symbolic Computation
Edge-transitive cyclic regular covers of the Möbius-Kantor graph
European Journal of Combinatorics
Good reduction of Puiseux series and applications
Journal of Symbolic Computation
The Product Replacement Prospector
Journal of Symbolic Computation
An extension of Kedlaya's algorithm for hyperelliptic curves
Journal of Symbolic Computation
Algebraic analysis of the SSS stream cipher
Proceedings of the 4th international conference on Security of information and networks
Bit-size estimates for triangular sets in positive dimension
Journal of Complexity
Invariants for the computation of intransitive and transitive Galois groups
Journal of Symbolic Computation
Algorithms for Del Pezzo surfaces of degree 5 (construction, parametrization)
Journal of Symbolic Computation
ICMS'06 Proceedings of the Second international conference on Mathematical Software
Testing equivalence of ternary cubics
ANTS'06 Proceedings of the 7th international conference on Algorithmic Number Theory
An infinite family of biquasiprimitive 2-arc transitive cubic graphs
Journal of Algebraic Combinatorics: An International Journal
Aspects of the Segre variety $${\mathcal{S}_{1,1,1}(2)}$$
Designs, Codes and Cryptography
A new construction of highly nonlinear S-boxes
Cryptography and Communications
On graph-restrictive permutation groups
Journal of Combinatorial Theory Series B
Implicit factoring with shared most significant and middle bits
PKC'10 Proceedings of the 13th international conference on Practice and Theory in Public Key Cryptography
Key exchange and encryption schemes based on non-commutative skew polynomials
PQCrypto'10 Proceedings of the Third international conference on Post-Quantum Cryptography
CT-RSA'10 Proceedings of the 2010 international conference on Topics in Cryptology
Fast arithmetics in Artin-Schreier towers over finite fields
Journal of Symbolic Computation
Counting points on genus 2 curves with real multiplication
ASIACRYPT'11 Proceedings of the 17th international conference on The Theory and Application of Cryptology and Information Security
Practical key-recovery for all possible parameters of SFLASH
ASIACRYPT'11 Proceedings of the 17th international conference on The Theory and Application of Cryptology and Information Security
On the relation between the MXL family of algorithms and Gröbner basis algorithms
Journal of Symbolic Computation
The cryptographic power of random selection
SAC'11 Proceedings of the 18th international conference on Selected Areas in Cryptography
Breaking an identity-based encryption scheme based on DHIES
IMACC'11 Proceedings of the 13th IMA international conference on Cryptography and Coding
Phylogenetic toric varieties on graphs
Journal of Algebraic Combinatorics: An International Journal
Newton polygons and curve gonalities
Journal of Algebraic Combinatorics: An International Journal
Gossiping and routing in second-kind Frobenius graphs
European Journal of Combinatorics
Hamilton paths in vertex-transitive graphs of order 10p
European Journal of Combinatorics
Difference sets and doubly transitive actions on Hadamard matrices
Journal of Combinatorial Theory Series A
The monomial representations of the Clifford group
Quantum Information & Computation
Half-Edge-Transitive Graphs and Non-Normal Cayley Graphs
Journal of Graph Theory
Characterization of Edge-Transitive 4-Valent Bicirculants
Journal of Graph Theory
EUROCRYPT'12 Proceedings of the 31st Annual international conference on Theory and Applications of Cryptographic Techniques
Classification of regular maps of Euler characteristic -3p
Journal of Combinatorial Theory Series B
Ordinary abelian varieties having small embedding degree
Finite Fields and Their Applications
Fq-pseudoreguli of PG(3,q3) and scattered semifields of order q6
Finite Fields and Their Applications
Dembowski-Ostrom polynomials from Dickson polynomials
Finite Fields and Their Applications
A mass formula for self-dual permutation codes
Finite Fields and Their Applications
Halving for the 2-Sylow subgroup of genus 2 curves over binary fields
Finite Fields and Their Applications
Cyclic codes and minimal strong Gröbner bases over a principal ideal ring
Finite Fields and Their Applications
Self-dual codes from circulant matrices
Designs, Codes and Cryptography
Arc-regular cubic graphs of order four times an odd integer
Journal of Algebraic Combinatorics: An International Journal
Dickson polynomials, hyperelliptic curves and hyper-bent functions
SETA'12 Proceedings of the 7th international conference on Sequences and Their Applications
Journal of Combinatorial Theory Series A
Computing growth functions of braid monoids and counting vertex-labelled bipartite graphs
Journal of Combinatorial Theory Series A
Minimal generating sets of non-modular invariant rings of finite groups
Journal of Symbolic Computation
Tetravalent vertex-transitive graphs of order 4p
Journal of Graph Theory
Classification of cubic symmetric tetracirculants and pentacirculants
European Journal of Combinatorics
Journal of Algebraic Combinatorics: An International Journal
Toric complete intersection codes
Journal of Symbolic Computation
Cubic vertex-transitive graphs on up to 1280 vertices
Journal of Symbolic Computation
Recognizing finite matrix groups over infinite fields
Journal of Symbolic Computation
Implicit polynomial recovery and cryptanalysis of a combinatorial key cryptosystem
ICICS'12 Proceedings of the 14th international conference on Information and Communications Security
Explicit solution by radicals, gonal maps and plane models of algebraic curves of genus 5 or 6
Journal of Symbolic Computation
Small polygons and toric codes
Journal of Symbolic Computation
Parallel algorithms for normalization
Journal of Symbolic Computation
The decoding Library for list decoding
ACM Communications in Computer Algebra
New ring-linear codes from dualization in projective Hjelmslev geometries
Designs, Codes and Cryptography
Evaluation codes from smooth quadric surfaces and twisted Segre varieties
Designs, Codes and Cryptography
On the number of lattice points in a small sphere and a recursive lattice decoding algorithm
Designs, Codes and Cryptography
Binary codes of some strongly regular subgraphs of the McLaughlin graph
Designs, Codes and Cryptography
Multivariate public key cryptosystems from diophantine equations
Designs, Codes and Cryptography
The M4RIE library for dense linear algebra over small fields with even characteristic
Proceedings of the 37th International Symposium on Symbolic and Algebraic Computation
Parallel sparse polynomial multiplication on modern hardware architectures
Proceedings of the 37th International Symposium on Symbolic and Algebraic Computation
Fast computation of common left multiples of linear ordinary differential operators
Proceedings of the 37th International Symposium on Symbolic and Algebraic Computation
Pairing'12 Proceedings of the 5th international conference on Pairing-Based Cryptography
Generating pairing-friendly parameters for the CM construction of genus 2 curves over prime fields
Designs, Codes and Cryptography
Interfacing mathemagix with C++
Proceedings of the 38th international symposium on International symposium on symbolic and algebraic computation
On the complexity of computing gröbner bases for quasi-homogeneous systems
Proceedings of the 38th international symposium on International symposium on symbolic and algebraic computation
Proceedings of the 38th international symposium on International symposium on symbolic and algebraic computation
Fast algorithms for l-adic towers over finite fields
Proceedings of the 38th international symposium on International symposium on symbolic and algebraic computation
Quantum binary field inversion: improved circuit depth via choice of basis representation
Quantum Information & Computation
ML confidential: machine learning on encrypted data
ICISC'12 Proceedings of the 15th international conference on Information Security and Cryptology
Linear recurring sequences for the UOV key generation revisited
ICISC'12 Proceedings of the 15th international conference on Information Security and Cryptology
A variant of rainbow with shorter secret key and faster signature generation
Proceedings of the first ACM workshop on Asia public-key cryptography
Super-cyclically edge-connected regular graphs
Journal of Combinatorial Optimization
GBRDs over supersolvable groups and solvable groups of order prime to 3
Designs, Codes and Cryptography
Unitary graphs and classification of a family of symmetric graphs with complete quotients
Journal of Algebraic Combinatorics: An International Journal
Self-dual skew codes and factorization of skew polynomials
Journal of Symbolic Computation
European Journal of Combinatorics
Cubic bi-Cayley graphs over abelian groups
European Journal of Combinatorics
On the arithmetic operations over finite fields of characteristic three with low complexity
Journal of Computational and Applied Mathematics
Fast matrix decomposition in F2
Journal of Computational and Applied Mathematics
The new group theory package in Maple 17
ACM Communications in Computer Algebra
Constructing formally self-dual codes over Rk
Discrete Applied Mathematics
New binary codes from extended Goppa codes
Designs, Codes and Cryptography
Designs, Codes and Cryptography
Hulls of codes from incidence matrices of connected regular graphs
Designs, Codes and Cryptography
Systems of imprimitivity for the clifford group
Quantum Information & Computation
Hi-index | 0.31 |