Author of the publication

A Knapsack Type Public Key Cryptosystem Based On Arithmetic in Finite Fields.

, and . CRYPTO, volume 196 of Lecture Notes in Computer Science, page 54-65. Springer, (1984)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Privacy of Dense Symmetric Functions., and . Comput. Complex., 5 (1): 43-59 (1995)Communication in key distribution schemes., and . IEEE Trans. Inf. Theory, 42 (1): 19-28 (1996)Biological Networks: Comparison, Conservation, and Evolution via Relative Description Length., and . J. Comput. Biol., 14 (6): 817-838 (2007)Detecting Phylogenetic Signals in Eukaryotic Whole Genome Sequences., and . J. Comput. Biol., 19 (8): 945-956 (2012)On Constructing Radiation Hybrid Maps., and . J. Comput. Biol., 4 (4): 517-533 (1997)Universally ideal secret-sharing schemes., and . IEEE Trans. Inf. Theory, 40 (3): 786-794 (1994)Unbiased Bits from Sources of Weak Randomness and Probabilistic Communication Complexity., and . SIAM J. Comput., 17 (2): 230-261 (1988)From Quartets to Phylogenetic Trees.. SOFSEM, volume 1521 of Lecture Notes in Computer Science, page 36-53. Springer, (1998)On constructing radiation hybrid maps (extended abstract)., and . RECOMB, page 17-26. ACM, (1997)CRISPR Detection from Short Reads Using Partial Overlap Graphs., and . RECOMB, volume 9029 of Lecture Notes in Computer Science, page 16-27. Springer, (2015)