Search the dblp DataBase
Michael J. Jacobson Jr. :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Mark Giesbrecht , Michael J. Jacobson Jr. , Arne Storjohann Algorithms for Large Integer Matrix Problems. [Citation Graph (0, 0)][DBLP ] AAECC, 2001, pp:297-307 [Conf ] Michael J. Jacobson Jr. The Security of Cryptosystems Based on Class Semigroups of Imaginary Quadratic Non-maximal Orders. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:149-156 [Conf ] Rennie deGraaf , John Aycock , Michael J. Jacobson Jr. Improved Port Knocking with Strong Authentication. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:451-462 [Conf ] Michael J. Jacobson Jr. Experimental Results on Class Groups of Real Quadratic Fields. [Citation Graph (0, 0)][DBLP ] ANTS, 1998, pp:463-474 [Conf ] Michael J. Jacobson Jr. , Alfred J. van der Poorten Computational Aspects of NUCOMP. [Citation Graph (0, 0)][DBLP ] ANTS, 2002, pp:120-133 [Conf ] Michael J. Jacobson Jr. , Shantha Ramachandran , Hugh C. Williams Numerical Results on Class Groups of Imaginary Quadratic Fields. [Citation Graph (0, 0)][DBLP ] ANTS, 2006, pp:87-101 [Conf ] Michael J. Jacobson Jr. , Hugh C. Williams , Kjell Wooding Imaginary Cyclic Quartic Fields with Large Minus Class Numbers. [Citation Graph (0, 0)][DBLP ] ANTS, 2004, pp:280-292 [Conf ] Detlef Hühnlein , Michael J. Jacobson Jr. , Sachar Paulus , Tsuyoshi Takagi A Cryptosystem Based on Non-maximal Imaginary Quadratic Orders with Fast Decryption. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1998, pp:294-307 [Conf ] Andreas Hirt , Michael J. Jacobson Jr. , Carey L. Williamson A Practical Buses Protocol for Anonymous Internet Communication. [Citation Graph (0, 0)][DBLP ] PST, 2005, pp:- [Conf ] Detlef Hühnlein , Michael J. Jacobson Jr. , Damian Weber Towards Practical Non-interactive Public Key Cryptosystems Using Non-maximal Imaginary Quadratic Orders. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2000, pp:275-287 [Conf ] Michael J. Jacobson Jr. , Neal Koblitz , Joseph H. Silverman , Andreas Stein , Edlyn Teske Analysis of the Xedni Calculus Attack. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 2000, v:20, n:1, pp:1-64 [Journal ] Michael J. Jacobson Jr. , Hugh C. Williams Modular Arithmetic on Elements of Small Norm in Quadratic Fields. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 2002, v:27, n:1-2, pp:111-117 [Journal ] Detlef Hühnlein , Michael J. Jacobson Jr. , Damian Weber Towards Practical Non-Interactive Public-Key Cryptosystems Using Non-Maximal Imaginary Quadratic Orders. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 2003, v:30, n:3, pp:281-299 [Journal ] Michael J. Jacobson Jr. , Renate Scheidler , Hugh C. Williams An Improved Real-Quadratic-Field-Based Key Exchange Procedure. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 2006, v:19, n:2, pp:211-239 [Journal ] Michael J. Jacobson Jr. Computing Discrete Logarithms in Quadratic Orders. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 2000, v:13, n:4, pp:473-492 [Journal ] Johannes Buchmann , Michael J. Jacobson Jr. , Edlyn Teske On some computational problems in finite abelian groups. [Citation Graph (0, 0)][DBLP ] Math. Comput., 1997, v:66, n:220, pp:1663-1687 [Journal ] Michael J. Jacobson Jr. Applying sieving to the computation of quadratic class groups. [Citation Graph (0, 0)][DBLP ] Math. Comput., 1999, v:68, n:226, pp:859-867 [Journal ] Michael J. Jacobson Jr. , Á. Pintér , P. G. Walsh A computational approach for solving y2 =1k + 2k + ... + xk . [Citation Graph (0, 0)][DBLP ] Math. Comput., 2003, v:72, n:244, pp:2099-2110 [Journal ] Michael J. Jacobson Jr. , Hugh C. Williams New quadratic polynomials with high densities of prime values. [Citation Graph (0, 0)][DBLP ] Math. Comput., 2003, v:72, n:241, pp:499-519 [Journal ] John Aycock , Rennie deGraaf , Michael J. Jacobson Jr. Anti-disassembly using Cryptographic Hash Functions. [Citation Graph (0, 0)][DBLP ] Journal in Computer Virology, 2006, v:2, n:1, pp:79-85 [Journal ] Stefan Erickson , Michael J. Jacobson , Ning Shang , Shuo Shen , Andreas Stein Explicit Formulas for Real Hyperelliptic Curves of Genus 2 in Affine Representation. [Citation Graph (0, 0)][DBLP ] WAIFI, 2007, pp:202-218 [Conf ] Taxis: Scalable Strong Anonymous Communication. [Citation Graph (, )][DBLP ] Army of Botnets. [Citation Graph (, )][DBLP ] An Adaptation of the NICE Cryptosystem to Real Quadratic Orders. [Citation Graph (, )][DBLP ] Search in 0.005secs, Finished in 0.006secs