Factoring N = pq with the Elliptic Curve Method
ANTS-V Proceedings of the 5th International Symposium on Algorithmic Number Theory
On the Optimality of the Binary Algorithm for the Jacobi Symbol
Fundamenta Informaticae
Single-bit re-encryption with applications to distributed proof systems
Proceedings of the 2007 ACM workshop on Privacy in electronic society
On the Validity of the Φ-Hiding Assumption in Cryptographic Protocols
ASIACRYPT '08 Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Efficient algorithms for the gcd and cubic residuosity in the ring of Eisenstein integers
Journal of Symbolic Computation
Optimization of the MOVA undeniable signature scheme
Mycrypt'05 Proceedings of the 1st international conference on Progress in Cryptology in Malaysia
On the Optimality of the Binary Algorithm for the Jacobi Symbol
Fundamenta Informaticae
A Complete Generalization of Atkin's Square Root Algorithm
Fundamenta Informaticae
Hi-index | 0.00 |