From post

The Bit Security of Modular Squaring Given Partial Factorization of the Modulos.

, , и . CRYPTO, том 218 из Lecture Notes in Computer Science, стр. 448-457. Springer, (1985)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

From Quartets to Phylogenetic Trees.. SOFSEM, том 1521 из Lecture Notes in Computer Science, стр. 36-53. Springer, (1998)Adding Hidden Nodes to Gene Networks (Extended Abstract)., и . WABI, том 3240 из Lecture Notes in Computer Science, стр. 123-134. Springer, (2004)Interaction in Key Distribution Schemes (Extended Abstract)., и . CRYPTO, том 773 из Lecture Notes in Computer Science, стр. 444-455. Springer, (1993)Biological Networks: Comparison, Conservation, and Evolution via Relative Description Length., и . J. Comput. Biol., 14 (6): 817-838 (2007)A Knapsack Type Public Key Cryptosystem Based On Arithmetic in Finite Fields., и . CRYPTO, том 196 из Lecture Notes in Computer Science, стр. 54-65. Springer, (1984)CRISPR Detection from Short Reads Using Partial Overlap Graphs., и . RECOMB, том 9029 из Lecture Notes in Computer Science, стр. 16-27. Springer, (2015)On constructing radiation hybrid maps (extended abstract)., и . RECOMB, стр. 17-26. ACM, (1997)Ancestral Maximum Likelihood of Evolutionary Trees Is Hard., , , , , и . WABI, том 2812 из Lecture Notes in Computer Science, стр. 202-215. Springer, (2003)Linear Kernels in Linear Time, or How to Save k Colors in O(n2) Steps., , и . WG, том 3353 из Lecture Notes in Computer Science, стр. 257-269. Springer, (2004)CS1001.py: a topic-based introduction to computer science., и . ITiCSE, стр. 215-220. ACM, (2012)