Algorithmica
Solving sparse linear equations over finite fields
IEEE Transactions on Information Theory
EUROCRYPT '89 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Handbook of theoretical computer science (vol. A)
The art of computer programming, volume 2 (3rd ed.): seminumerical algorithms
The art of computer programming, volume 2 (3rd ed.): seminumerical algorithms
Factoring numbers using singular integers
STOC '91 Proceedings of the twenty-third annual ACM symposium on Theory of computing
An interactive identification scheme based on discrete logarithms and factoring (extended abstract)
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
A polynomial factorization challenge
ACM SIGSAM Bulletin
Algorithm 719: Multiprecision translation and execution of FORTRAN programs
ACM Transactions on Mathematical Software (TOMS)
A Non-interactive Public-Key Distribution System
Designs, Codes and Cryptography
Low power scalable encryption for wireless systems
Wireless Networks - Special issue VLSI in wireless networks
Factoring large numbers with programmable hardware
FPGA '00 Proceedings of the 2000 ACM/SIGDA eighth international symposium on Field programmable gate arrays
Quantum Algorithms for Highly Structured Search Problems
Quantum Information Processing
Some Parallel Algorithms for Integer Factorisation
Euro-Par '99 Proceedings of the 5th International Euro-Par Conference on Parallel Processing
Recent Progress and Prospects for Integer Factorisation Algorithms
COCOON '00 Proceedings of the 6th Annual International Conference on Computing and Combinatorics
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
New Public-Key Schemes Based on Elliptic Curves over the Ring Zn
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Designing and Detecting Trapdoors for Discrete Log Cryptosystems
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
A Quadratic Sieve on the n-Dimensional Cube
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
A Subexponential Algorithm for Discrete Logarithms over All Finite Fields
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
An Implementation of the General Number Field Sieve
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
Algorithms for Black-Box Fields and their Application to Cryptography (Extended Abstract)
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
Efficient "on the Fly" Signature Schemes Based on Integer Factoring
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
Informatics - 10 Years Back. 10 Years Ahead.
Using HDLs for describing quantum circuits: a framework for efficient quantum algorithm simulation
Proceedings of the 1st conference on Computing frontiers
Parallel Computing - Algorithmic skeletons
Can quantum mechanics help distributed computing?
ACM SIGACT News
CAIRN 2: An FPGA Implementation of the Sieving Step in the Number Field Sieve Method
CHES '07 Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems
A low-resource public-key identification scheme for RFID tags and sensor nodes
Proceedings of the second ACM conference on Wireless network security
New NP-Complete Problems Associated with Lattices
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Cryptanalysis of RSA Using the Ratio of the Primes
AFRICACRYPT '09 Proceedings of the 2nd International Conference on Cryptology in Africa: Progress in Cryptology
An implementation of the general number field sieve to compute discrete logarithms mod p
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Factorization of a 512-bit RSA modulus
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Analysis and optimization of the TWINKLE factoring device
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Another generalization of Wiener's attack on RSA
AFRICACRYPT'08 Proceedings of the Cryptology in Africa 1st international conference on Progress in cryptology
Running time predictions for factoring algorithms
ANTS-VIII'08 Proceedings of the 8th international conference on Algorithmic number theory
Predicting the sieving effort for the number field sieve
ANTS-VIII'08 Proceedings of the 8th international conference on Algorithmic number theory
Enhancement of Multispectral Ikonos Satellite Image Using Quantum Information Processing
Fundamenta Informaticae
A Novel Combinatorial Public Key Cryptosystem
Informatica
Preimage attacks against variants of very smooth hash
IWSEC'10 Proceedings of the 5th international conference on Advances in information and computer security
Load balanced block lanczos algorithm over GF(2) for factorization of large keys
HiPC'06 Proceedings of the 13th international conference on High Performance Computing
Integer factorization by a parallel GNFS algorithm for public key cryptosystems
ICESS'05 Proceedings of the Second international conference on Embedded Software and Systems
Automorphisms of finite rings and applications to complexity of problems
STACS'05 Proceedings of the 22nd annual conference on Theoretical Aspects of Computer Science
Chosen ciphertext attack on a new class of self-synchronizing stream ciphers
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
Analysis on the clockwise transposition routing for dedicated factoring devices
WISA'05 Proceedings of the 6th international conference on Information Security Applications
Parallelization of Pollard's Rho Integer factorization algorithm
Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
On the strength comparison of the ECDLP and the IFP
SCN'12 Proceedings of the 8th international conference on Security and Cryptography for Networks
Resource-based corruptions and the combinatorics of hidden diversity
Proceedings of the 4th conference on Innovations in Theoretical Computer Science
Hi-index | 0.00 |