Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Polynomially Uncomputable Number-Theoretic Problems in Cryptography and Network Security., , and . FCS, page 195-199. CSREA Press, (2006)Quantum Computational Number Theory. Springer, (2015)Two general constructive methods for amicable numbers., and . Int. J. Comput. Math., 59 (3-4): 165-175 (1996)Can Integer Factorization be in P?, and . CIMCA/IAWTIC, page 266. IEEE Computer Society, (2006)Grid Services Mediation., , , , , and . AINA, page 879-884. IEEE Computer Society, (2005)Testing Mersenne Primes with Elliptic Curves., and . CASC, volume 4194 of Lecture Notes in Computer Science, page 303-312. Springer, (2006)Cryptanalytic attacks on RSA.. Springer, (2008)Computing Prime Factorization and Discrete Logarithms: From Index Calculus to Xedni Calculus.. Int. J. Comput. Math., 80 (5): 573-590 (2003)Cybercryptography: Applicable Cryptography for Cyberspace Security. Springer, (2019)Number theory for computing. Springer, (2002)