The SCEAS System
| |||||||

## Search the dblp DataBase
Joseph H. Silverman:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
## Publications of Author- Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman
**NTRU: A Ring-Based Public Key Cryptosystem.**[Citation Graph (0, 0)][DBLP] ANTS, 1998, pp:267-288 [Conf] - Joseph H. Silverman, Joe Suzuki
**Elliptic Curve Discrete Logarithms and the Index Calculus.**[Citation Graph (0, 0)][DBLP] ASIACRYPT, 1998, pp:110-125 [Conf] - Alexander May, Joseph H. Silverman
**Dimension Reduction Methods for Convolution Modular Lattices.**[Citation Graph (0, 0)][DBLP] CaLC, 2001, pp:110-125 [Conf] - Daniel V. Bailey, Daniel Coffin, Adam J. Elbirt, Joseph H. Silverman, Adam D. Woodbury
**NTRU in Constrained Devices.**[Citation Graph (0, 0)][DBLP] CHES, 2001, pp:262-272 [Conf] - Jeffrey Hoffstein, Joseph H. Silverman
**MiniPASS: Authentication and Digital Signatures in a Constrained Environment.**[Citation Graph (0, 0)][DBLP] CHES, 2000, pp:328-339 [Conf] - Joseph H. Silverman
**Fast Multiplication in Finite Fields GF(2**[Citation Graph (0, 0)][DBLP]^{N}). CHES, 1999, pp:122-134 [Conf] - Nick Howgrave-Graham, Phong Q. Nguyen, David Pointcheval, John Proos, Joseph H. Silverman, Ari Singer, William Whyte
**The Impact of Decryption Failures on the Security of NTRU Encryption.**[Citation Graph (0, 0)][DBLP] CRYPTO, 2003, pp:226-246 [Conf] - Jeffrey Hoffstein, Nick Howgrave-Graham, Jill Pipher, Joseph H. Silverman, William Whyte
**NTRUSIGN: Digital Signatures Using the NTRU Lattice.**[Citation Graph (0, 0)][DBLP] CT-RSA, 2003, pp:122-140 [Conf] - Nick Howgrave-Graham, Joseph H. Silverman, William Whyte
**Choosing Parameter Sets forwithand.**[Citation Graph (0, 0)][DBLP] CT-RSA, 2005, pp:118-135 [Conf] - Joseph H. Silverman, William Whyte
**Timing Attacks on NTRUEncrypt Via Variation in the Number of Hash Calls.**[Citation Graph (0, 0)][DBLP] CT-RSA, 2007, pp:208-224 [Conf] - Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman
**NSS: An NTRU Lattice-Based Signature Scheme.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 2001, pp:211-228 [Conf] - Joseph H. Silverman, Nigel P. Smart, Frederik Vercauteren
**An Algebraic Approach to NTRU (q = 2n) via Witt Vectors and Overdetermined Systems of Nonlinear Equations.**[Citation Graph (0, 0)][DBLP] SCN, 2004, pp:278-293 [Conf] - Jeffrey Hoffstein, Joseph H. Silverman
**Random small Hamming weight products with applications to cryptography.**[Citation Graph (0, 0)][DBLP] Discrete Applied Mathematics, 2003, v:130, n:1, pp:37-49 [Journal] - Michael J. Jacobson Jr., Neal Koblitz, Joseph H. Silverman, Andreas Stein, Edlyn Teske
**Analysis of the Xedni Calculus Attack.**[Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 2000, v:20, n:1, pp:1-64 [Journal] - Igor Shparlinski, Joseph H. Silverman
**On the Linear Complexity of the Naor-Reingold Pseudo-random Function from Elliptic Curves.**[Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 2001, v:24, n:3, pp:279-289 [Journal] - Joseph H. Silverman
**The Xedni Calculus and the Elliptic Curve Discrete Logarithm Problem.**[Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 2000, v:20, n:1, pp:5-40 [Journal] - Gregory S. Call, Joseph H. Silverman
**Computing the canonical height on K3 surfaces.**[Citation Graph (0, 0)][DBLP] Math. Comput., 1996, v:65, n:213, pp:259-290 [Journal] - Joseph H. Silverman
**Computing canonical heights with little (or no) factorization.**[Citation Graph (0, 0)][DBLP] Math. Comput., 1997, v:66, n:218, pp:787-805 [Journal] - Joseph H. Silverman
**Computing rational points on rank 1 elliptic curves via $L$-series and canonical heights.**[Citation Graph (0, 0)][DBLP] Math. Comput., 1999, v:68, n:226, pp:835-858 [Journal] - Joseph H. Silverman
**On the distribution of integer points on curves of genus zero.**[Citation Graph (0, 0)][DBLP] Theor. Comput. Sci., 2000, v:235, n:1, pp:163-170 [Journal] **Lifting and Elliptic Curve Discrete Logarithms.**[Citation Graph (, )][DBLP]
Search in 0.005secs, Finished in 0.005secs | |||||||

| |||||||

| |||||||

System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002 for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002 |