The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Michael J. Jacobson Jr.: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Mark Giesbrecht, Michael J. Jacobson Jr., Arne Storjohann
    Algorithms for Large Integer Matrix Problems. [Citation Graph (0, 0)][DBLP]
    AAECC, 2001, pp:297-307 [Conf]
  2. Michael J. Jacobson Jr.
    The Security of Cryptosystems Based on Class Semigroups of Imaginary Quadratic Non-maximal Orders. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:149-156 [Conf]
  3. Rennie deGraaf, John Aycock, Michael J. Jacobson Jr.
    Improved Port Knocking with Strong Authentication. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:451-462 [Conf]
  4. Michael J. Jacobson Jr.
    Experimental Results on Class Groups of Real Quadratic Fields. [Citation Graph (0, 0)][DBLP]
    ANTS, 1998, pp:463-474 [Conf]
  5. Michael J. Jacobson Jr., Alfred J. van der Poorten
    Computational Aspects of NUCOMP. [Citation Graph (0, 0)][DBLP]
    ANTS, 2002, pp:120-133 [Conf]
  6. Michael J. Jacobson Jr., Shantha Ramachandran, Hugh C. Williams
    Numerical Results on Class Groups of Imaginary Quadratic Fields. [Citation Graph (0, 0)][DBLP]
    ANTS, 2006, pp:87-101 [Conf]
  7. Michael J. Jacobson Jr., Hugh C. Williams, Kjell Wooding
    Imaginary Cyclic Quartic Fields with Large Minus Class Numbers. [Citation Graph (0, 0)][DBLP]
    ANTS, 2004, pp:280-292 [Conf]
  8. Detlef Hühnlein, Michael J. Jacobson Jr., Sachar Paulus, Tsuyoshi Takagi
    A Cryptosystem Based on Non-maximal Imaginary Quadratic Orders with Fast Decryption. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:294-307 [Conf]
  9. Andreas Hirt, Michael J. Jacobson Jr., Carey L. Williamson
    A Practical Buses Protocol for Anonymous Internet Communication. [Citation Graph (0, 0)][DBLP]
    PST, 2005, pp:- [Conf]
  10. Detlef Hühnlein, Michael J. Jacobson Jr., Damian Weber
    Towards Practical Non-interactive Public Key Cryptosystems Using Non-maximal Imaginary Quadratic Orders. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2000, pp:275-287 [Conf]
  11. Michael J. Jacobson Jr., Neal Koblitz, Joseph H. Silverman, Andreas Stein, Edlyn Teske
    Analysis of the Xedni Calculus Attack. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2000, v:20, n:1, pp:1-64 [Journal]
  12. Michael J. Jacobson Jr., Hugh C. Williams
    Modular Arithmetic on Elements of Small Norm in Quadratic Fields. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2002, v:27, n:1-2, pp:111-117 [Journal]
  13. Detlef Hühnlein, Michael J. Jacobson Jr., Damian Weber
    Towards Practical Non-Interactive Public-Key Cryptosystems Using Non-Maximal Imaginary Quadratic Orders. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2003, v:30, n:3, pp:281-299 [Journal]
  14. Michael J. Jacobson Jr., Renate Scheidler, Hugh C. Williams
    An Improved Real-Quadratic-Field-Based Key Exchange Procedure. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2006, v:19, n:2, pp:211-239 [Journal]
  15. Michael J. Jacobson Jr.
    Computing Discrete Logarithms in Quadratic Orders. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2000, v:13, n:4, pp:473-492 [Journal]
  16. Johannes Buchmann, Michael J. Jacobson Jr., Edlyn Teske
    On some computational problems in finite abelian groups. [Citation Graph (0, 0)][DBLP]
    Math. Comput., 1997, v:66, n:220, pp:1663-1687 [Journal]
  17. Michael J. Jacobson Jr.
    Applying sieving to the computation of quadratic class groups. [Citation Graph (0, 0)][DBLP]
    Math. Comput., 1999, v:68, n:226, pp:859-867 [Journal]
  18. Michael J. Jacobson Jr., Á. Pintér, P. G. Walsh
    A computational approach for solving y2 =1k + 2k + ... + xk. [Citation Graph (0, 0)][DBLP]
    Math. Comput., 2003, v:72, n:244, pp:2099-2110 [Journal]
  19. Michael J. Jacobson Jr., Hugh C. Williams
    New quadratic polynomials with high densities of prime values. [Citation Graph (0, 0)][DBLP]
    Math. Comput., 2003, v:72, n:241, pp:499-519 [Journal]
  20. John Aycock, Rennie deGraaf, Michael J. Jacobson Jr.
    Anti-disassembly using Cryptographic Hash Functions. [Citation Graph (0, 0)][DBLP]
    Journal in Computer Virology, 2006, v:2, n:1, pp:79-85 [Journal]
  21. Stefan Erickson, Michael J. Jacobson, Ning Shang, Shuo Shen, Andreas Stein
    Explicit Formulas for Real Hyperelliptic Curves of Genus 2 in Affine Representation. [Citation Graph (0, 0)][DBLP]
    WAIFI, 2007, pp:202-218 [Conf]

  22. Taxis: Scalable Strong Anonymous Communication. [Citation Graph (, )][DBLP]


  23. Army of Botnets. [Citation Graph (, )][DBLP]


  24. An Adaptation of the NICE Cryptosystem to Real Quadratic Orders. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002