Интернет магазин китайских планшетных компьютеров



Компьютеры - Ленстра, Арьен - Основные публикации

23 января 2011


Оглавление:
1. Ленстра, Арьен
2. Основные публикации
3. Текущие работы



  • Factoring polynomials with rational coefficients, A.K. Lenstra, H.W. Lenstra, L. Lovasz, Mathematische Annalen 261, 515—534
  • The factorization of the ninth Fermat number, A.K. Lenstra, H.W. Lenstra, M.S. Manasse, J.M. Pollard, Math. Comp. 61, 319—349.
  • The development of the number field sieve, A.K. Lenstra, H.W. Lenstra, Springer-Verlag LNM 1554, August 1993
  • Selecting cryptographic key sizes, A.K. Lenstra, E.R. Verheul, J. of Cryptology 14, 255—293.
  • The XTR public key system, A.K. Lenstra, E.R. Verheul, Proceedings Crypto 2000, Springer-Verlag LNCS 1880, 1-19.
  • Implementation of a new primality test, H, Cohen, A.K. Lenstra, Math. Comp. 48, 103—121.
  • Factoring by electronic mail, A.K. Lenstra, M.S. Manasse, proceedings Eurocrypt’89, Springer-Verlag LNCS 434, 355—371.
  • Factoring with two large primes, A.K. Lenstra, M.S. Manasse, Math. Comp. 63 785—798.
  • The number field sieve, A.K. Lenstra, H.W. Lenstra, M.S. Manasse, J.M. Pollard, Proceedings STOC 1990, 564—572.
  • Algorithms in number theory, A.K. Lenstra, H.W. Lenstra, Handbook of theoretical computer science, Volume A, Algorithms and complexity, Elsevier, Amsterdam, 1990, 673—715.
  • Lattice sieving and trial division, R. Golliver, A.K. Lenstra, K. McCurley, Proceedings ANTS’94, Springer-verlag LNCS 877, 18-27.
  • THE MAGIC WORDS ARE SQUEAMISH OSSIFRAGE, D. Atkins, M. Graff, A.K. Lenstra, P.C. Leyland, Proceedings Asiacrypt’94, Springer-Verlag LNCS 917, 263—277.
  • Using cyclotomic polynomials to construct efficient discrete logarithm cryptosystems over finite fields, A.K. Lenstra, Proceedings ACISP’97, Springer-Verlag LNCS 1270, 127—138.
  • Factoring a 512-bit RSA modulus, S. Cavallar, B, Dodson, A.K. Lenstra, P. Leyland, P.L Montgomery, B. Murphy, H. te Riele, P. Zimmermann, et al., Proceedings Eurocrypt 2000, Springer-Verlag LNCS 1807, 1-18.
  • Unbelievable security; matching AES security using public key systems, A.K. Lenstra, Proceedings Asiacrypt 2001, Springer-Verlag LNCS 2248, 67-86.
  • Information security risk assessment, aggregation, and mitigation, A.K. Lenstra, T. Voss, Proceedings ACISP 2004, Springer-Verlag LNCS 3108, 391—401


Просмотров: 2370


<<< Мэсси, Джеймс