Author of the publication

On applying molecular computation to the data encryption standard.

, , , and . DNA Based Computers, volume 44 of DIMACS Series in Discrete Mathematics and Theoretical Computer Science, page 31-44. DIMACS/AMS, (1996)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Primality Testing.. CRYPTO, page 10. U. C. Santa Barbara, Dept. of Elec. and Computer Eng., ECE Report No 82-04, (1981)NP-Complete Decision Problems for Quadratic Polynomials, and . STOC, page 23-29. ACM, (1976)Efficient checking of computations in number theory., , and . ANTS, volume 877 of Lecture Notes in Computer Science, page 249. Springer, (1994)A Subexponential Algorithm for Discrete Logarithms over Hyperelliptic Curves of Large Genus over GF(q)., , and . Theor. Comput. Sci., 226 (1-2): 7-18 (1999)On applying molecular computation to the data encryption standard., , , and . DNA Based Computers, volume 44 of DIMACS Series in Discrete Mathematics and Theoretical Computer Science, page 31-44. DIMACS/AMS, (1996)An Abstract Theory of Computer Viruses.. CRYPTO, volume 403 of Lecture Notes in Computer Science, page 354-374. Springer, (1988)On Distinguishing Prime Numbers from Composite Numbers (Abstract). FOCS, page 387-406. IEEE Computer Society, (1980)Irreducibility Testing and Factorization of Polynomials (Extended Abstract), and . FOCS, page 409-418. IEEE Computer Society, (1981)Combinatorial optimization problems in self-assembly., , , , , , and . STOC, page 23-32. ACM, (2002)On Taking Roots in Finite Fields, , and . FOCS, page 175-178. IEEE Computer Society, (1977)