The art of computer programming, volume 2 (3rd ed.): seminumerical algorithms
The art of computer programming, volume 2 (3rd ed.): seminumerical algorithms
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Secure communications over insecure channels
Communications of the ACM
Communications of the ACM
Encyclopedia of Mathematics and Its Applications: The Theory of Information and Coding: A Mathematical Framework for Communication
The Design and Analysis of Computer Algorithms
The Design and Analysis of Computer Algorithms
Riemann's Hypothesis and tests for primality
STOC '75 Proceedings of seventh annual ACM symposium on Theory of computing
Solving low-density subset sum problems
Journal of the ACM (JACM)
Modeling the storage architectures of commercial database systems
ACM Transactions on Database Systems (TODS)
Cryptology and complexity theories
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
A model to order the encryption algorithms according to their quality
ACM SIGCOMM Computer Communication Review
ACM Computing Surveys (CSUR)
Symmetric and Asymmetric Encryption
ACM Computing Surveys (CSUR)
Encryption and Secure Computer Networks
ACM Computing Surveys (CSUR)
Hardware protection against software piracy
Communications of the ACM
On the cryptocomplexity of knapsack systems
STOC '79 Proceedings of the eleventh annual ACM symposium on Theory of computing
An overview of computer security
IBM Systems Journal
Hi-index | 0.02 |