Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the existence of doubly resolvable Kirkman systems and equidistant permutation arrays., and . Discret. Math., 30 (2): 157-172 (1980)Subgroup Refinement Algorithms for Root Finding in GF(q)., , and . SIAM J. Comput., 21 (2): 228-239 (1992)Elliptic curve cryptosystem - The answer to strong, fast public-key cryptography for securing constrained environments.. Inf. Secur. Tech. Rep., 2 (2): 78-87 (1997)The Implementation of Elliptic Curve Cryptosystems., and . AUSCRYPT, volume 453 of Lecture Notes in Computer Science, page 2-13. Springer, (1990)Some Computational Aspects of Root Finding in GF(qm)., , and . ISSAC, volume 358 of Lecture Notes in Computer Science, page 259-270. Springer, (1988)Short RSA Keys and Their Generation., and . J. Cryptol., 8 (2): 101-114 (1995)On strong starters in cyclic groups., , and . Discret. Math., 56 (1): 45-60 (1985)Factorizations in the Elementary Abelian p-Group and Their Cryptographic Significance., and . J. Cryptol., 7 (4): 201-212 (1994)On designs (22, 33, 12, 8, 4)., , , and . J. Comb. Theory, Ser. A, 47 (2): 157-175 (1988)Isomorphism of strong starters in cyclic groups., and . J. Comb. Theory, Ser. A, 57 (2): 287-293 (1991)