|
Journals in DBLP
- Eric Bach
How to Generate Factored Random Numbers. [Citation Graph (0, 0)][DBLP] SIAM J. Comput., 1988, v:17, n:2, pp:179-193 [Journal]
- Werner Alexi, Benny Chor, Oded Goldreich, Claus-Peter Schnorr
RSA and Rabin Functions: Certain Parts are as Hard as the Whole. [Citation Graph (0, 0)][DBLP] SIAM J. Comput., 1988, v:17, n:2, pp:194-209 [Journal]
- Charles H. Bennett, Gilles Brassard, Jean-Marc Robert
Privacy Amplification by Public Discussion. [Citation Graph (0, 0)][DBLP] SIAM J. Comput., 1988, v:17, n:2, pp:210-229 [Journal]
- Benny Chor, Oded Goldreich
Unbiased Bits from Sources of Weak Randomness and Probabilistic Communication Complexity. [Citation Graph (0, 0)][DBLP] SIAM J. Comput., 1988, v:17, n:2, pp:230-261 [Journal]
- Alan M. Frieze, Johan Håstad, Ravi Kannan, J. C. Lagarias, Adi Shamir
Reconstructing Truncated Integer Variables Satisfying Linear Congruences. [Citation Graph (0, 0)][DBLP] SIAM J. Comput., 1988, v:17, n:2, pp:262-280 [Journal]
- Shafi Goldwasser, Silvio Micali, Ronald L. Rivest
A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks. [Citation Graph (0, 0)][DBLP] SIAM J. Comput., 1988, v:17, n:2, pp:281-308 [Journal]
- Joachim Grollmann, Alan L. Selman
Complexity Measures for Public-Key Cryptosystems. [Citation Graph (0, 0)][DBLP] SIAM J. Comput., 1988, v:17, n:2, pp:309-335 [Journal]
- Johan Håstad
Solving Simultaneous Modular Equations of Low Degree. [Citation Graph (0, 0)][DBLP] SIAM J. Comput., 1988, v:17, n:2, pp:336-341 [Journal]
- J. C. Lagarias, James A. Reeds
Unique Extrapolation of Polynomial Recurrences. [Citation Graph (0, 0)][DBLP] SIAM J. Comput., 1988, v:17, n:2, pp:342-362 [Journal]
- Douglas L. Long, Avi Wigderson
The Discrete Logarithm Hides O(log n) Bits. [Citation Graph (0, 0)][DBLP] SIAM J. Comput., 1988, v:17, n:2, pp:363-372 [Journal]
- Michael Luby, Charles Rackoff
How to Construct Pseudorandom Permutations from Pseudorandom Functions. [Citation Graph (0, 0)][DBLP] SIAM J. Comput., 1988, v:17, n:2, pp:373-386 [Journal]
- Carl Pomerance, J. W. Smith, Randy Tuler
A Pipeline Architecture for Factoring Large Integers with the Quadratic Sieve Algorithm. [Citation Graph (0, 0)][DBLP] SIAM J. Comput., 1988, v:17, n:2, pp:387-403 [Journal]
- John H. Reif, J. D. Tygar
Efficient Parallel Pseudorandom Number Generation. [Citation Graph (0, 0)][DBLP] SIAM J. Comput., 1988, v:17, n:2, pp:404-411 [Journal]
- Silvio Micali, Charles Rackoff, Bob Sloan
The Notion of Security for Probabilistic Cryptosystems. [Citation Graph (0, 0)][DBLP] SIAM J. Comput., 1988, v:17, n:2, pp:412-426 [Journal]
|