Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

NP-Complete Decision Problems for Quadratic Polynomials, and . STOC, page 23-29. ACM, (1976)Efficient checking of computations in number theory., , and . ANTS, volume 877 of Lecture Notes in Computer Science, page 249. Springer, (1994)Primality Testing.. CRYPTO, page 10. U. C. Santa Barbara, Dept. of Elec. and Computer Eng., ECE Report No 82-04, (1981)A Subexponential Algorithm for Discrete Logarithms over Hyperelliptic Curves of Large Genus over GF(q)., , and . Theor. Comput. Sci., 226 (1-2): 7-18 (1999)On Applying Molecular Computation to the Data Encryption Standard., , , and . J. Comput. Biol., 6 (1): 53-63 (1999)Using Smoothness to Achieve Parallelism (Abstract), and . STOC, page 528-538. ACM, (1988)A Method for Obtaining Digital Signatures and Public-Key Cryptosystems (Reprint)., , and . Commun. ACM, 26 (1): 96-99 (1983)Improved Time and Space Bounds for Boolean Matrix Multiplication., , , and . Acta Inf., (1978)Implementing an Electronic Notary Public.. CRYPTO, page 259-265. Plenum Press, New York, (1982)An Abstract Theory of Computer Viruses.. CRYPTO, volume 403 of Lecture Notes in Computer Science, page 354-374. Springer, (1988)