Comparison of algorithms to calculate quadratic irregularity of prime numbers
Mathematics of Computation
A Signature Scheme Based on the Intractability of Computing Roots
Designs, Codes and Cryptography
First Implementation of Cryptographic Protocols Based on Algebraic Number Fields
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Security of Cryptosystems Based on Class Groups of Imaginary Quadratic Orders
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Public-key cryptosystems based on class semigroups of imaginary quadratic non-maximal orders
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Hi-index | 0.00 |