21![Main text appears in T. Okamoto (Ed.): Advances in Cryptology – ASIACRYPT 2000, Springer-Verlag LNCS 1976, pp, ISBNAddendum does not appear in proceedings. Security of Cryptosystems Based on Cl Main text appears in T. Okamoto (Ed.): Advances in Cryptology – ASIACRYPT 2000, Springer-Verlag LNCS 1976, pp, ISBNAddendum does not appear in proceedings. Security of Cryptosystems Based on Cl](https://www.pdfsearch.io/img/5d0f42481a9ccca93405d77005acc0da.jpg) | Add to Reading ListSource URL: www.bmoeller.deLanguage: English - Date: 2006-01-02 00:24:48
|
---|
22![VersionePagina 1 di 27 ON SOME EQUATIONS CONCERNING THE RIEMANN’S PRIME NUMBER FORMULA AND ON A SECURE AND EFFICIENT PRIMALITY TEST. VersionePagina 1 di 27 ON SOME EQUATIONS CONCERNING THE RIEMANN’S PRIME NUMBER FORMULA AND ON A SECURE AND EFFICIENT PRIMALITY TEST.](https://www.pdfsearch.io/img/dc22077f3de482970bb333d2698ce029.jpg) | Add to Reading ListSource URL: empslocal.ex.ac.ukLanguage: English - Date: 2014-10-15 04:06:56
|
---|
23![CAM Centre for Applied Microeconometrics Department of Economics University of Copenhagen http://www.econ.ku.dk/CAM/ CAM Centre for Applied Microeconometrics Department of Economics University of Copenhagen http://www.econ.ku.dk/CAM/](https://www.pdfsearch.io/img/37a046f5b81838558c1049ba629e5608.jpg) | Add to Reading ListSource URL: www.econ.ku.dkLanguage: English - Date: 2011-10-17 22:28:39
|
---|
24![Some experiments investigating a possible L(1/4) algorithm for the discrete logarithm problem in algebraic curves Maike Massierer∗ LORIA, Campus Scientifique, BP 239, 54506 Vandœuvre-l`es-Nancy Cedex, France maike.mas Some experiments investigating a possible L(1/4) algorithm for the discrete logarithm problem in algebraic curves Maike Massierer∗ LORIA, Campus Scientifique, BP 239, 54506 Vandœuvre-l`es-Nancy Cedex, France maike.mas](https://www.pdfsearch.io/img/2938139006c3f93032e110fcfa17286c.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2014-12-13 07:45:36
|
---|
25![Security of Cryptosystems Based on Class Groups of Imaginary Quadratic Orders Safuat Hamdy Bodo Möller Security of Cryptosystems Based on Class Groups of Imaginary Quadratic Orders Safuat Hamdy Bodo Möller](https://www.pdfsearch.io/img/54073c54db6133ac4920751ee4dd1bd9.jpg) | Add to Reading ListSource URL: www.bmoeller.deLanguage: English - Date: 2006-01-02 00:23:19
|
---|
26![Improved Nguyen-Vidick Heuristic Sieve Algorithm for Shortest Vector Problem ? Xiaoyun Wang1,2 , Mingjie Liu1 , Chengliang Tian2 and Jingguo Bi2 1 Institute for Advanced Study, Tsinghua University, Beijing, China Improved Nguyen-Vidick Heuristic Sieve Algorithm for Shortest Vector Problem ? Xiaoyun Wang1,2 , Mingjie Liu1 , Chengliang Tian2 and Jingguo Bi2 1 Institute for Advanced Study, Tsinghua University, Beijing, China](https://www.pdfsearch.io/img/991c4b7096f00f664f746ff94b565111.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2011-08-28 09:14:48
|
---|
27![arXiv:1408.4505v1 [math.NT] 20 AugLARGE GAPS BETWEEN CONSECUTIVE PRIME NUMBERS KEVIN FORD, BEN GREEN, SERGEI KONYAGIN, AND TERENCE TAO A BSTRACT. Let G(X) denote the size of the largest gap between consecutive pri arXiv:1408.4505v1 [math.NT] 20 AugLARGE GAPS BETWEEN CONSECUTIVE PRIME NUMBERS KEVIN FORD, BEN GREEN, SERGEI KONYAGIN, AND TERENCE TAO A BSTRACT. Let G(X) denote the size of the largest gap between consecutive pri](https://www.pdfsearch.io/img/1ff17e7fc08753ec1615c9cd1ece03ae.jpg) | Add to Reading ListSource URL: arxiv.orgLanguage: English - Date: 2014-08-20 20:20:51
|
---|
28![Seminar Report on Riemann hypothesis and its Impact on RSA - Chauthaiwale Atharva Shriram (2008H103422) Seminar Report on Riemann hypothesis and its Impact on RSA - Chauthaiwale Atharva Shriram (2008H103422)](https://www.pdfsearch.io/img/a716b8a058f4a8baafae853835e7863e.jpg) | Add to Reading ListSource URL: csis.bits-pilani.ac.inLanguage: English - Date: 2009-02-20 05:41:14
|
---|
29![arXiv:1008.1284v1 [math.NT] 6 AugIdeal forms of Coppersmith’s theorem and Guruswami-Sudan list decoding Henry Cohn arXiv:1008.1284v1 [math.NT] 6 AugIdeal forms of Coppersmith’s theorem and Guruswami-Sudan list decoding Henry Cohn](https://www.pdfsearch.io/img/ce3efed57335a08d6b8bd5ffda525a65.jpg) | Add to Reading ListSource URL: arxiv.orgLanguage: English - Date: 2010-08-09 20:26:12
|
---|
30![Factorization of a 768-bit RSA modulus version 1.4, February 18, 2010 Thorsten Kleinjung1 , Kazumaro Jens Franke3 , Arjen K. Lenstra1 , Emmanuel Thomé4 , Factorization of a 768-bit RSA modulus version 1.4, February 18, 2010 Thorsten Kleinjung1 , Kazumaro Jens Franke3 , Arjen K. Lenstra1 , Emmanuel Thomé4 ,](https://www.pdfsearch.io/img/192ab17757c013310c425849fcd4bde2.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2010-02-18 11:19:25
|
---|