Home Advanced Search

Advanced Search - Page 1

The development of the number field sieve
  • DJVU
  • English
  • Year: 1993
  • Author: H. W. Lenstra Jr. (auth.), Arjen K. Lenstra, Hendrik W. Lenstra Jr. (eds.)
Theory of Cryptography: First Theory of Cryptography Conference, TCC 2004, Cambridge, MA, USA, February 19-21, 2004. Proceedings
  • PDF
  • English
  • Year: 2004
  • Author: Omer Reingold, Luca Trevisan, Salil Vadhan (auth.), Moni Naor (eds.)
Theory of Cryptography: 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings
  • PDF
  • English
  • Year: 2009
  • Author: Tal Moran, Moni Naor, Gil Segev (auth.), Omer Reingold (eds.)
Trust Management VII: 7th IFIP WG 11.11 International Conference, IFIPTM 2013, Malaga, Spain, June 3-7, 2013. Proceedings
  • PDF
  • English
  • Year: 2013
  • Author: Meilof Veeningen, Benne de Weger, Nicola Zannone (auth.), Carmen Fernández-Gago, Fabio Martinelli, Siani Pearson, Isaac Agudo (eds.)
The LLL Algorithm: Survey and Applications
  • PDF
  • English
  • Year: 2010
  • Author: Ionica Smeets, Arjen Lenstra, Hendrik Lenstra, László Lovász (auth.), Phong Q. Nguyen, Brigitte Vallée (eds.)
The LLL Algorithm: Survey and Applications
  • PDF
  • English
  • Year: 2010
  • Author: Ionica Smeets, Arjen Lenstra, Hendrik Lenstra, László Lovász (auth.), Phong Q. Nguyen, Brigitte Vallée (eds.)
Advances in Cryptology – ASIACRYPT 2007: 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007. Proceedings
  • PDF
  • English
  • Year: 2007
  • Author: Kazumaro Aoki, Jens Franke, Thorsten Kleinjung, Arjen K. Lenstra, Dag Arne Osvik (auth.), Kaoru Kurosawa (eds.)