The SCEAS System
Navigation Menu

Journals in DBLP

SIAM J. Comput.
1988, volume: 17, number: 2

  1. Eric Bach
    How to Generate Factored Random Numbers. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 1988, v:17, n:2, pp:179-193 [Journal]
  2. Werner Alexi, Benny Chor, Oded Goldreich, Claus-Peter Schnorr
    RSA and Rabin Functions: Certain Parts are as Hard as the Whole. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 1988, v:17, n:2, pp:194-209 [Journal]
  3. Charles H. Bennett, Gilles Brassard, Jean-Marc Robert
    Privacy Amplification by Public Discussion. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 1988, v:17, n:2, pp:210-229 [Journal]
  4. Benny Chor, Oded Goldreich
    Unbiased Bits from Sources of Weak Randomness and Probabilistic Communication Complexity. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 1988, v:17, n:2, pp:230-261 [Journal]
  5. Alan M. Frieze, Johan Håstad, Ravi Kannan, J. C. Lagarias, Adi Shamir
    Reconstructing Truncated Integer Variables Satisfying Linear Congruences. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 1988, v:17, n:2, pp:262-280 [Journal]
  6. Shafi Goldwasser, Silvio Micali, Ronald L. Rivest
    A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 1988, v:17, n:2, pp:281-308 [Journal]
  7. Joachim Grollmann, Alan L. Selman
    Complexity Measures for Public-Key Cryptosystems. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 1988, v:17, n:2, pp:309-335 [Journal]
  8. Johan Håstad
    Solving Simultaneous Modular Equations of Low Degree. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 1988, v:17, n:2, pp:336-341 [Journal]
  9. J. C. Lagarias, James A. Reeds
    Unique Extrapolation of Polynomial Recurrences. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 1988, v:17, n:2, pp:342-362 [Journal]
  10. Douglas L. Long, Avi Wigderson
    The Discrete Logarithm Hides O(log n) Bits. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 1988, v:17, n:2, pp:363-372 [Journal]
  11. Michael Luby, Charles Rackoff
    How to Construct Pseudorandom Permutations from Pseudorandom Functions. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 1988, v:17, n:2, pp:373-386 [Journal]
  12. Carl Pomerance, J. W. Smith, Randy Tuler
    A Pipeline Architecture for Factoring Large Integers with the Quadratic Sieve Algorithm. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 1988, v:17, n:2, pp:387-403 [Journal]
  13. John H. Reif, J. D. Tygar
    Efficient Parallel Pseudorandom Number Generation. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 1988, v:17, n:2, pp:404-411 [Journal]
  14. Silvio Micali, Charles Rackoff, Bob Sloan
    The Notion of Security for Probabilistic Cryptosystems. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 1988, v:17, n:2, pp:412-426 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002