Author of the publication

Improved Routing-Based Linear Algebra for the Number Field Sieve.

, , , and . ITCC (1), page 636-641. IEEE Computer Society, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mathematical Techniques in Cryptology-Editorial., , and . Appl. Algebra Eng. Commun. Comput., 16 (6): 377-378 (2006)On Ä New Representation of Elements of Finite Fields GF (2m) Yielding Small Complexity Arithmetic Circuits"., , and . IEEE Trans. Computers, 51 (12): 1460-1461 (2002)Attacks on a Secure Group Communication Scheme With Hierarchical Access Control., and . IACR Cryptology ePrint Archive, (2003)A short comment on the affine parts of SFLASHv3., and . IACR Cryptology ePrint Archive, (2003)VLSI Design for Exponentiation in GF (2n)., and . AUSCRYPT, volume 453 of Lecture Notes in Computer Science, page 398-405. Springer, (1990)Redundant Representation of Finite Fields., and . Public Key Cryptography, volume 1992 of Lecture Notes in Computer Science, page 339-352. Springer, (2001)Hardware to Solve Sparse Systems of Linear Equations over GF(2)., and . CHES, volume 2779 of Lecture Notes in Computer Science, page 51-61. Springer, (2003)Scalable Hardware for Sparse Systems of Linear Equations, with Applications to Integer Factorization., , , and . CHES, volume 3659 of Lecture Notes in Computer Science, page 131-146. Springer, (2005)Finding (good) Normal Bases in Finite Fields., , and . ISSAC, page 173-178. ACM, (1991)Über Quantencomputer und Quantenkryptographie., , , and . Datenschutz und Datensicherheit, (2002)