Select Publications
Conference Papers
2001, 'On the security of Lenstra’s variant of DSA without long inversions', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 64 - 72, http://dx.doi.org/10.1007/3-540-44586-2_5
,2001, 'The insecurity of nyberg–rueppel and other DSA-like signature schemes with partially known nonces', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 97 - 109, http://dx.doi.org/10.1007/3-540-44670-2_9
,2000, 'Recent advances in the theory of nonlinear pseudorandom number generators', in Fang KT; Hickernell FJ; Niederreiter H (eds.), MONTE CARLO AND QUASI-MONTE CARLO METHODS 2000, SPRINGER-VERLAG BERLIN, PEOPLES R CHINA, HONG KONG BAPTIST UNIV, HONG KONG, pp. 86 - 102, presented at 4th International Conference on Monte Carlo and Quasi-Monte Carlo Methods in Scientific Computing (MCQMC 2000), PEOPLES R CHINA, HONG KONG BAPTIST UNIV, HONG KONG, 27 November 2000 - 01 December 2000, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000175526000006&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,2000, 'On the distribution of the power generator modulo a prime power', in Nathanson MB (ed.), UNUSUAL APPLICATIONS OF NUMBER THEORY, AMER MATHEMATICAL SOC, NJ, Piscataway, pp. 71 - 79, presented at DIMACS Workshop on Unusual Applications of Number Theory, NJ, Piscataway, 10 January 2000 - 14 January 2000, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000224833300008&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,2000, 'An Extremely Small and Efficient identification scheme', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 378 - 384, http://dx.doi.org/10.1007/10718964_31
,2000, 'An identification scheme based on sparse polynomials', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 68 - 74, http://dx.doi.org/10.1007/978-3-540-46588-1_6
,2000, 'Non-linear complexity of the naor-reingold pseudo-random function', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 53 - 59, http://dx.doi.org/10.1007/10719994_5
,2000, 'On exponential sums and group generators for elliptic curves over finite fields', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 395 - 404, http://dx.doi.org/10.1007/10722028_24
,1999, 'A general construction for fail-stop signature using authentication codes', in Lam KY; Shparlinski I; Wang H; Xing CP (eds.), CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, BIRKHAUSER VERLAG AG, SINGAPORE, SINGAPORE, pp. 343 - 356, presented at Workshop on Cryptography and Computational Number Theory (CCNT 99), SINGAPORE, SINGAPORE, 22 November 1999 - 26 November 1999, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000169016800025&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,1999, 'A survey of divide and conquer attacks on certain irregularly clocked stream ciphers', in Lam KY; Shparlinski I; Wang H; Xing CP (eds.), CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, BIRKHAUSER VERLAG AG, SINGAPORE, SINGAPORE, pp. 165 - 185, presented at Workshop on Cryptography and Computational Number Theory (CCNT 99), SINGAPORE, SINGAPORE, 22 November 1999 - 26 November 1999, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000169016800015&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,1999, 'A survey of hard core functions', in Lam KY; Shparlinski I; Wang H; Xing CP (eds.), CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, BIRKHAUSER VERLAG AG, SINGAPORE, SINGAPORE, pp. 227 - 255, presented at Workshop on Cryptography and Computational Number Theory (CCNT 99), SINGAPORE, SINGAPORE, 22 November 1999 - 26 November 1999, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000169016800018&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,1999, 'Achieving optimal fairness from biased coinflips', in Lam KY; Shparlinski I; Wang H; Xing CP (eds.), CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, BIRKHAUSER VERLAG AG, SINGAPORE, SINGAPORE, pp. 303 - 319, presented at Workshop on Cryptography and Computational Number Theory (CCNT 99), SINGAPORE, SINGAPORE, 22 November 1999 - 26 November 1999, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000169016800022&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,1999, 'Algorithms for generating, testing and proving primes: A survey', in Lam KY; Shparlinski I; Wang H; Xing CP (eds.), CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, BIRKHAUSER VERLAG AG, SINGAPORE, SINGAPORE, pp. 93 - 122, presented at Workshop on Cryptography and Computational Number Theory (CCNT 99), SINGAPORE, SINGAPORE, 22 November 1999 - 26 November 1999, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000169016800010&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,1999, 'Applications of algebraic curves to constructions of sequences', in Lam KY; Shparlinski I; Wang H; Xing CP (eds.), CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, BIRKHAUSER VERLAG AG, SINGAPORE, SINGAPORE, pp. 137 - 146, presented at Workshop on Cryptography and Computational Number Theory (CCNT 99), SINGAPORE, SINGAPORE, 22 November 1999 - 26 November 1999, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000169016800013&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,1999, 'Authentication - Myths and misconceptions', in Lam KY; Shparlinski I; Wang H; Xing CP (eds.), CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, BIRKHAUSER VERLAG AG, SINGAPORE, SINGAPORE, pp. 203 - 225, presented at Workshop on Cryptography and Computational Number Theory (CCNT 99), SINGAPORE, SINGAPORE, 22 November 1999 - 26 November 1999, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000169016800017&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,1999, 'Counting the number of points on affine diagonal curves', in Lam KY; Shparlinski I; Wang H; Xing CP (eds.), CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, BIRKHAUSER VERLAG AG, SINGAPORE, SINGAPORE, pp. 15 - 24, presented at Workshop on Cryptography and Computational Number Theory (CCNT 99), SINGAPORE, SINGAPORE, 22 November 1999 - 26 November 1999, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000169016800003&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,1999, 'Density estimates related to Gauss periods', in Lam KY; Shparlinski I; Wang H; Xing CP (eds.), CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, BIRKHAUSER VERLAG AG, SINGAPORE, SINGAPORE, pp. 33 - 41, presented at Workshop on Cryptography and Computational Number Theory (CCNT 99), SINGAPORE, SINGAPORE, 22 November 1999 - 26 November 1999, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000169016800005&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,1999, 'Designated 2-verifier proofs and their application to electronic commerce', in Lam KY; Shparlinski I; Wang H; Xing CP (eds.), CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, BIRKHAUSER VERLAG AG, SINGAPORE, SINGAPORE, pp. 149 - 163, presented at Workshop on Cryptography and Computational Number Theory (CCNT 99), SINGAPORE, SINGAPORE, 22 November 1999 - 26 November 1999, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000169016800014&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,1999, 'Distribution of modular sums and the security of the server aided exponentiation', in Lam KY; Shparlinski I; Wang H; Xing CP (eds.), CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, BIRKHAUSER VERLAG AG, SINGAPORE, SINGAPORE, pp. 331 - 342, presented at Workshop on Cryptography and Computational Number Theory (CCNT 99), SINGAPORE, SINGAPORE, 22 November 1999 - 26 November 1999, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000169016800024&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,1999, 'Effective determination of the proportion of split primes in number fields', in Lam KY; Shparlinski I; Wang H; Xing CP (eds.), CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, BIRKHAUSER VERLAG AG, SINGAPORE, SINGAPORE, pp. 81 - 92, presented at Workshop on Cryptography and Computational Number Theory (CCNT 99), SINGAPORE, SINGAPORE, 22 November 1999 - 26 November 1999, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000169016800009&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,1999, 'Elliptic curve factorization using a "partially oblivious" function', in Lam KY; Shparlinski I; Wang H; Xing CP (eds.), CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, BIRKHAUSER VERLAG AG, SINGAPORE, SINGAPORE, pp. 123 - 128, presented at Workshop on Cryptography and Computational Number Theory (CCNT 99), SINGAPORE, SINGAPORE, 22 November 1999 - 26 November 1999, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000169016800011&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,1999, 'New results on the randomness of visual cryptography schemes', in Lam KY; Shparlinski I; Wang H; Xing CP (eds.), CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, BIRKHAUSER VERLAG AG, SINGAPORE, SINGAPORE, pp. 187 - 201, presented at Workshop on Cryptography and Computational Number Theory (CCNT 99), SINGAPORE, SINGAPORE, 22 November 1999 - 26 November 1999, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000169016800016&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,1999, 'On elements of high order in finite fields', in Lam KY; Shparlinski I; Wang H; Xing CP (eds.), CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, BIRKHAUSER VERLAG AG, SINGAPORE, SINGAPORE, pp. 11 - 14, presented at Workshop on Cryptography and Computational Number Theory (CCNT 99), SINGAPORE, SINGAPORE, 22 November 1999 - 26 November 1999, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000169016800002&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,1999, 'On the dimension and the number of parameters of a unirational variety', in Lam KY; Shparlinski I; Wang H; Xing CP (eds.), CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, BIRKHAUSER VERLAG AG, SINGAPORE, SINGAPORE, pp. 3 - 9, presented at Workshop on Cryptography and Computational Number Theory (CCNT 99), SINGAPORE, SINGAPORE, 22 November 1999 - 26 November 1999, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000169016800001&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,1999, 'On the security of Diffie-Hellman bits', in Lam KY; Shparlinski I; Wang H; Xing CP (eds.), CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, BIRKHAUSER VERLAG AG, SINGAPORE, SINGAPORE, pp. 257 - 268, presented at Workshop on Cryptography and Computational Number Theory (CCNT 99), SINGAPORE, SINGAPORE, 22 November 1999 - 26 November 1999, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000169016800019&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,1999, 'Polynomial rings and efficient public key authentication II', in Lam KY; Shparlinski I; Wang H; Xing CP (eds.), CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, BIRKHAUSER VERLAG AG, SINGAPORE, SINGAPORE, pp. 269 - 286, presented at Workshop on Cryptography and Computational Number Theory (CCNT 99), SINGAPORE, SINGAPORE, 22 November 1999 - 26 November 1999, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000169016800020&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,1999, 'Rational groups of elliptic curves suitable for cryptography', in Lam KY; Shparlinski I; Wang H; Xing CP (eds.), CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, BIRKHAUSER VERLAG AG, SINGAPORE, SINGAPORE, pp. 69 - 80, presented at Workshop on Cryptography and Computational Number Theory (CCNT 99), SINGAPORE, SINGAPORE, 22 November 1999 - 26 November 1999, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000169016800008&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,1999, 'Robust additive secret sharing schemes over Z(m)', in Lam KY; Shparlinski I; Wang H; Xing CP (eds.), CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, BIRKHAUSER VERLAG AG, SINGAPORE, SINGAPORE, pp. 357 - 368, presented at Workshop on Cryptography and Computational Number Theory (CCNT 99), SINGAPORE, SINGAPORE, 22 November 1999 - 26 November 1999, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000169016800026&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,1999, 'RSA public key validation', in Lam KY; Shparlinski I; Wang H; Xing CP (eds.), CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, BIRKHAUSER VERLAG AG, SINGAPORE, SINGAPORE, pp. 369 - 378, presented at Workshop on Cryptography and Computational Number Theory (CCNT 99), SINGAPORE, SINGAPORE, 22 November 1999 - 26 November 1999, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000169016800027&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,1999, 'Security of biased sources for cryptographic keys', in Lam KY; Shparlinski I; Wang H; Xing CP (eds.), CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, BIRKHAUSER VERLAG AG, SINGAPORE, SINGAPORE, pp. 287 - 302, presented at Workshop on Cryptography and Computational Number Theory (CCNT 99), SINGAPORE, SINGAPORE, 22 November 1999 - 26 November 1999, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000169016800021&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,1999, 'Small values of the Carmichael function and cryptographic applications', in Lam KY; Shparlinski I; Wang H; Xing CP (eds.), CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, BIRKHAUSER VERLAG AG, SINGAPORE, SINGAPORE, pp. 25 - 32, presented at Workshop on Cryptography and Computational Number Theory (CCNT 99), SINGAPORE, SINGAPORE, 22 November 1999 - 26 November 1999, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000169016800004&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,1999, 'The dark side of the hidden number problem: Lattice attacks on DSA', in Lam KY; Shparlinski I; Wang H; Xing CP (eds.), CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, BIRKHAUSER VERLAG AG, SINGAPORE, SINGAPORE, pp. 321 - 330, presented at Workshop on Cryptography and Computational Number Theory (CCNT 99), SINGAPORE, SINGAPORE, 22 November 1999 - 26 November 1999, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000169016800023&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,1999, 'The distribution of the coefficients of primitive polynomials over finite fields', in Lam KY; Shparlinski I; Wang H; Xing CP (eds.), CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, BIRKHAUSER VERLAG AG, SINGAPORE, SINGAPORE, pp. 43 - 57, presented at Workshop on Cryptography and Computational Number Theory (CCNT 99), SINGAPORE, SINGAPORE, 22 November 1999 - 26 November 1999, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000169016800006&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,1999, 'The distribution of the quadratic symbol in function fields and a faster mathematical stream cipher', in Lam KY; Shparlinski I; Wang H; Xing CP (eds.), CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, BIRKHAUSER VERLAG AG, SINGAPORE, SINGAPORE, pp. 59 - 68, presented at Workshop on Cryptography and Computational Number Theory (CCNT 99), SINGAPORE, SINGAPORE, 22 November 1999 - 26 November 1999, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000169016800007&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,1999, 'The Hermite-Serret algorithm and 12(2)+33(2)', in Lam KY; Shparlinski I; Wang H; Xing CP (eds.), CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, BIRKHAUSER VERLAG AG, SINGAPORE, SINGAPORE, pp. 129 - 136, presented at Workshop on Cryptography and Computational Number Theory (CCNT 99), SINGAPORE, SINGAPORE, 22 November 1999 - 26 November 1999, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000169016800012&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,1999, 'Gauss periods in finite fields', in Jungnickel D; Niederreiter H (ed.), FINITE FIELDS AND APPLICATIONS, SPRINGER-VERLAG BERLIN, GERMANY, UNIV AUGSBURG, DEPT MATH, AUGSBURG, pp. 162 - 177, presented at 5th International Conference on Finite Fields and Applications, GERMANY, UNIV AUGSBURG, DEPT MATH, AUGSBURG, 02 August 1999 - 06 August 1999, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000169087900014&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,1999, 'Circuit complexity of testing square-free numbers', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 47 - 56, http://dx.doi.org/10.1007/3-540-49116-3_4
,1999, 'Constructing elements of large order in finite fields', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 404 - 409, http://dx.doi.org/10.1007/3-540-46796-3_38
,1999, 'Lower bound for primality', in Proceedings of the Annual IEEE Conference on Computational Complexity, pp. 10 - 14
,1999, 'On routing in circulant graphs', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 360 - 369, http://dx.doi.org/10.1007/3-540-48686-0_36
,1999, 'On the average sensitivity of testing square-free numbers', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 291 - 299, http://dx.doi.org/10.1007/3-540-48686-0_29
,1999, 'On the computational hardness of testing square-freeness of sparse polynomials', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 492 - 497, http://dx.doi.org/10.1007/3-540-46796-3_47
,1999, 'On the distribution of nonlinear recursive congruential pseudorandom numbers of higher orders', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 87 - 93, http://dx.doi.org/10.1007/3-540-46796-3_9
,1999, 'On the linear complexity of the naor—reingold pseudo-random function', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 301 - 308, http://dx.doi.org/10.1007/978-3-540-47942-0_25
,1998, 'A public key cryptosystem based on sparse polynomials', in Buchmann J; Hoholdt T; Stichtenoth H; TapiaRecillas H (eds.), CODING THEORY, CRYPTOGRAPHY AND RELATED AREAS, SPRINGER-VERLAG BERLIN, MEXICO, GUANAJUATO, pp. 114 - 121, presented at International Conference on Coding Theory, Cryptography and Related Areas, MEXICO, GUANAJUATO, 20 April 1998 - 24 April 1998, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000085321900010&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,1998, 'On the ádám conjecture on circulant graphs', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 251 - 260, http://dx.doi.org/10.1007/3-540-68535-9_29
,1998, 'The crew pram complexity of modular inversion', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 305 - 315
,1995, 'Finding points on curves over finite fields extended abstract', in Annual Symposium on Foundations of Computer Science - Proceedings, pp. 284 - 292
,1995, 'Finding points on curves over finite fields', in 36TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, I E E E, COMPUTER SOC PRESS, WI, MILWAUKEE, pp. 284 - 292, presented at 36th Annual Symposium on Foundations of Computer Science (FOCS 95), WI, MILWAUKEE, 23 October 1995 - 25 October 1995, http://dx.doi.org/10.1109/SFCS.1995.492484
,1995, 'Orders of gauss periods in finite fields', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 208 - 215, http://dx.doi.org/10.1007/bfb0015425
,