Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Computing Prime Factorization and Discrete Logarithms: From Index Calculus to Xedni Calculus.. Int. J. Comput. Math., 80 (5): 573-590 (2003)Number theory for computing. Springer, (2002)Cybercryptography: Applicable Cryptography for Cyberspace Security. Springer, (2019)Testing Mersenne Primes with Elliptic Curves., and . CASC, volume 4194 of Lecture Notes in Computer Science, page 303-312. Springer, (2006)Cryptanalytic attacks on RSA.. Springer, (2008)Secure Electronic and Mobile Commerce., and . CIMCA/IAWTIC, page 692-697. IEEE Computer Society, (2005)Polynomially Uncomputable Number-Theoretic Problems in Cryptography and Network Security., , and . FCS, page 195-199. CSREA Press, (2006)Quantum Computational Number Theory. Springer, (2015)Two general constructive methods for amicable numbers., and . Int. J. Comput. Math., 59 (3-4): 165-175 (1996)Can Integer Factorization be in P?, and . CIMCA/IAWTIC, page 266. IEEE Computer Society, (2006)