ORCID as entered in ROS

Select Publications
2003, 'Congruences and exponential sums with the Euler function', in VanDerPoorten A; Stein A (ed.), HIGH PRIMES AND MISDEMEANOURS: LECTURES IN HONOUR OF THE 60TH BIRTHDAY OF HUGH COWIE WILLIAMS, AMER MATHEMATICAL SOC, CANADA, Banff, pp. 49 - 59, presented at Conference in Number Theory in Honour of Hugh C Williams, CANADA, Banff, 24 May 2003 - 30 May 2003, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000223282500004&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,2003, 'Multiplicative structure of values of the Euler function', in VanDerPoorten A; Stein A (ed.), HIGH PRIMES AND MISDEMEANOURS: LECTURES IN HONOUR OF THE 60TH BIRTHDAY OF HUGH COWIE WILLIAMS, AMER MATHEMATICAL SOC, CANADA, Banff, pp. 29 - 47, presented at Conference in Number Theory in Honour of Hugh C Williams, CANADA, Banff, 24 May 2003 - 30 May 2003, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000223282500003&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,2003, 'Playing "hide-and-seek" with numbers: The hidden number problem, lattices and exponential sums', in Garret P; Lieman D (ed.), PUBLIC-KEY CRYPTOGRAPHY, AMER MATHEMATICAL SOC, MD, Baltimore, pp. 153 - 177, presented at Joint Annual Meeting of the American-Mathematical-Society/Mathematical-Association-of-America, MD, Baltimore, 17 January 2003, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000235211700007&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,2003, 'An authentication scheme based on roots of sparse polynomials', in Proceedings 2003 IEEE Information Theory Workshop Itw 2003, pp. 159 - 162, http://dx.doi.org/10.1109/ITW.2003.1216719
,2002, 'A variant of NTRU with non-invertible polynomials', in Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, pp. 62 - 70, http://dx.doi.org/10.1007/3-540-36231-2_6
,2002, 'Chinese remaindering for algebraic numbers in a hidden field', in Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, pp. 349 - 356, http://dx.doi.org/10.1007/3-540-45455-1_28
,2002, 'Hidden number problem with the trace and bit security of XTR and LUC', in Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, pp. 433 - 448, http://dx.doi.org/10.1007/3-540-45708-9_28
,2002, 'Selective forgery of rsa signatures with fixed-pattern padding', in Lecture Notes in Computer Science, pp. 228 - 236, http://dx.doi.org/10.1007/3-540-45664-3_16
,2002, 'Smooth orders and cryptographic applications', in Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, pp. 338 - 348, http://dx.doi.org/10.1007/3-540-45455-1_27
,2002, 'The hidden number problem in extension fields and its applications', in Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, pp. 105 - 117
,2001, 'Exponential sums and lattice reduction: Applications to cryptography', in Mullen GL; Stichtenoth H; TapiaRecillas H (eds.), FINITE FIELDS WITH APPLICATIONS TO CODING THEORY, CRYPTOGRAPHY AND RELATED AREAS, SPRINGER-VERLAG BERLIN, MEXICO, OAXACA, pp. 286 - 298, presented at 6th International Conference on Finite Fields and Applications (Fq6), MEXICO, OAXACA, 21 May 2001 - 26 May 2001, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000179469500023&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,2001, 'On the uniformity of distribution of congruential generators over elliptic curves', in Helleseth T; Kumar PV; Yang K (eds.), SEQUENCES AND THEIR APPLICATIONS, PROCEEDINGS, SPRINGER-VERLAG LONDON LTD, NORWAY, BERGEN, pp. 257 - 264, presented at International Conference on Sequences and their Applications (SETA 01), NORWAY, BERGEN, 13 May 2001 - 17 May 2001, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000174706300019&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,2001, 'A lower bound for primality', in Journal of Computer and System Sciences, pp. 356 - 366, http://dx.doi.org/10.1006/jcss.2000.1725
,2001, 'Cryptographic applications of sparse Polynomials over Finite Rings', in Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, pp. 206 - 220, http://dx.doi.org/10.1007/3-540-45247-8_17
,2001, 'On polynomial representations of boolean functions related to some number theoretic problems', in Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, pp. 305 - 316, http://dx.doi.org/10.1007/3-540-45294-x_26
,2001, 'On the generalised hidden number problem and bit security of XTR', in Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, pp. 268 - 277, http://dx.doi.org/10.1007/3-540-45624-4_28
,2001, 'On the insecurity of a server-aided RSA protocol', in Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, pp. 21 - 35, http://dx.doi.org/10.1007/3-540-45682-1_2
,2001, 'On the security of Lenstra’s variant of DSA without long inversions', in Lecture Notes in Computer Science, pp. 64 - 72, http://dx.doi.org/10.1007/3-540-44586-2_5
,2001, 'The insecurity of nyberg–rueppel and other DSA-like signature schemes with partially known nonces', in Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, pp. 97 - 109, http://dx.doi.org/10.1007/3-540-44670-2_9
,2000, 'Recent advances in the theory of nonlinear pseudorandom number generators', in Fang KT; Hickernell FJ; Niederreiter H (eds.), MONTE CARLO AND QUASI-MONTE CARLO METHODS 2000, SPRINGER-VERLAG BERLIN, PEOPLES R CHINA, HONG KONG BAPTIST UNIV, HONG KONG, pp. 86 - 102, presented at 4th International Conference on Monte Carlo and Quasi-Monte Carlo Methods in Scientific Computing (MCQMC 2000), PEOPLES R CHINA, HONG KONG BAPTIST UNIV, HONG KONG, 27 November 2000 - 01 December 2000, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000175526000006&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,2000, 'On the distribution of the power generator modulo a prime power', in Nathanson MB (ed.), UNUSUAL APPLICATIONS OF NUMBER THEORY, AMER MATHEMATICAL SOC, NJ, Piscataway, pp. 71 - 79, presented at DIMACS Workshop on Unusual Applications of Number Theory, NJ, Piscataway, 10 January 2000 - 14 January 2000, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000224833300008&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,2000, 'An Extremely Small and Efficient identification scheme', in Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, pp. 378 - 384, http://dx.doi.org/10.1007/10718964_31
,2000, 'An identification scheme based on sparse polynomials', in Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, pp. 68 - 74, http://dx.doi.org/10.1007/978-3-540-46588-1_6
,2000, 'Non-linear complexity of the naor-reingold pseudo-random function', in Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, pp. 53 - 59, http://dx.doi.org/10.1007/10719994_5
,2000, 'On exponential sums and group generators for elliptic curves over finite fields', in Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, pp. 395 - 404, http://dx.doi.org/10.1007/10722028_24
,1999, 'Effective determination of the proportion of split primes in number fields', in Lam KY; Shparlinski I; Wang H; Xing CP (eds.), CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, BIRKHAUSER VERLAG AG, SINGAPORE, SINGAPORE, pp. 81 - 92, presented at Workshop on Cryptography and Computational Number Theory (CCNT 99), SINGAPORE, SINGAPORE, 22 November 1999 - 26 November 1999
,1999, 'New results on the randomness of visual cryptography schemes', in Lam KY; Shparlinski I; Wang H; Xing CP (eds.), CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, BIRKHAUSER VERLAG AG, SINGAPORE, SINGAPORE, pp. 187 - 201, presented at Workshop on Cryptography and Computational Number Theory (CCNT 99), SINGAPORE, SINGAPORE, 22 November 1999 - 26 November 1999
,1999, 'On elements of high order in finite fields', in Lam KY; Shparlinski I; Wang H; Xing CP (eds.), CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, BIRKHAUSER VERLAG AG, SINGAPORE, SINGAPORE, pp. 11 - 14, presented at Workshop on Cryptography and Computational Number Theory (CCNT 99), SINGAPORE, SINGAPORE, 22 November 1999 - 26 November 1999
,1999, 'The dark side of the hidden number problem: Lattice attacks on DSA', in Lam KY; Shparlinski I; Wang H; Xing CP (eds.), CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, BIRKHAUSER VERLAG AG, SINGAPORE, SINGAPORE, pp. 321 - 330, presented at Workshop on Cryptography and Computational Number Theory (CCNT 99), SINGAPORE, SINGAPORE, 22 November 1999 - 26 November 1999
,1999, 'A general construction for fail-stop signature using authentication codes', in Lam KY; Shparlinski I; Wang H; Xing CP (eds.), CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, BIRKHAUSER VERLAG AG, SINGAPORE, SINGAPORE, pp. 343 - 356, presented at Workshop on Cryptography and Computational Number Theory (CCNT 99), SINGAPORE, SINGAPORE, 22 November 1999 - 26 November 1999, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000169016800025&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,1999, 'A survey of divide and conquer attacks on certain irregularly clocked stream ciphers', in Lam KY; Shparlinski I; Wang H; Xing CP (eds.), CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, BIRKHAUSER VERLAG AG, SINGAPORE, SINGAPORE, pp. 165 - 185, presented at Workshop on Cryptography and Computational Number Theory (CCNT 99), SINGAPORE, SINGAPORE, 22 November 1999 - 26 November 1999, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000169016800015&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,1999, 'A survey of hard core functions', in Lam KY; Shparlinski I; Wang H; Xing CP (eds.), CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, BIRKHAUSER VERLAG AG, SINGAPORE, SINGAPORE, pp. 227 - 255, presented at Workshop on Cryptography and Computational Number Theory (CCNT 99), SINGAPORE, SINGAPORE, 22 November 1999 - 26 November 1999, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000169016800018&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,1999, 'Achieving optimal fairness from biased coinflips', in Lam KY; Shparlinski I; Wang H; Xing CP (eds.), CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, BIRKHAUSER VERLAG AG, SINGAPORE, SINGAPORE, pp. 303 - 319, presented at Workshop on Cryptography and Computational Number Theory (CCNT 99), SINGAPORE, SINGAPORE, 22 November 1999 - 26 November 1999, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000169016800022&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,1999, 'Algorithms for generating, testing and proving primes: A survey', in Lam KY; Shparlinski I; Wang H; Xing CP (eds.), CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, BIRKHAUSER VERLAG AG, SINGAPORE, SINGAPORE, pp. 93 - 122, presented at Workshop on Cryptography and Computational Number Theory (CCNT 99), SINGAPORE, SINGAPORE, 22 November 1999 - 26 November 1999, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000169016800010&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,1999, 'Applications of algebraic curves to constructions of sequences', in Lam KY; Shparlinski I; Wang H; Xing CP (eds.), CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, BIRKHAUSER VERLAG AG, SINGAPORE, SINGAPORE, pp. 137 - 146, presented at Workshop on Cryptography and Computational Number Theory (CCNT 99), SINGAPORE, SINGAPORE, 22 November 1999 - 26 November 1999, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000169016800013&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,1999, 'Authentication - Myths and misconceptions', in Lam KY; Shparlinski I; Wang H; Xing CP (eds.), CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, BIRKHAUSER VERLAG AG, SINGAPORE, SINGAPORE, pp. 203 - 225, presented at Workshop on Cryptography and Computational Number Theory (CCNT 99), SINGAPORE, SINGAPORE, 22 November 1999 - 26 November 1999, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000169016800017&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,1999, 'Counting the number of points on affine diagonal curves', in Lam KY; Shparlinski I; Wang H; Xing CP (eds.), CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, BIRKHAUSER VERLAG AG, SINGAPORE, SINGAPORE, pp. 15 - 24, presented at Workshop on Cryptography and Computational Number Theory (CCNT 99), SINGAPORE, SINGAPORE, 22 November 1999 - 26 November 1999, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000169016800003&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,1999, 'Density estimates related to Gauss periods', in Lam KY; Shparlinski I; Wang H; Xing CP (eds.), CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, BIRKHAUSER VERLAG AG, SINGAPORE, SINGAPORE, pp. 33 - 41, presented at Workshop on Cryptography and Computational Number Theory (CCNT 99), SINGAPORE, SINGAPORE, 22 November 1999 - 26 November 1999, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000169016800005&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,1999, 'Designated 2-verifier proofs and their application to electronic commerce', in Lam KY; Shparlinski I; Wang H; Xing CP (eds.), CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, BIRKHAUSER VERLAG AG, SINGAPORE, SINGAPORE, pp. 149 - 163, presented at Workshop on Cryptography and Computational Number Theory (CCNT 99), SINGAPORE, SINGAPORE, 22 November 1999 - 26 November 1999, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000169016800014&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,1999, 'Distribution of modular sums and the security of the server aided exponentiation', in Lam KY; Shparlinski I; Wang H; Xing CP (eds.), CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, BIRKHAUSER VERLAG AG, SINGAPORE, SINGAPORE, pp. 331 - 342, presented at Workshop on Cryptography and Computational Number Theory (CCNT 99), SINGAPORE, SINGAPORE, 22 November 1999 - 26 November 1999, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000169016800024&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,1999, 'Elliptic curve factorization using a "partially oblivious" function', in Lam KY; Shparlinski I; Wang H; Xing CP (eds.), CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, BIRKHAUSER VERLAG AG, SINGAPORE, SINGAPORE, pp. 123 - 128, presented at Workshop on Cryptography and Computational Number Theory (CCNT 99), SINGAPORE, SINGAPORE, 22 November 1999 - 26 November 1999, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000169016800011&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,1999, 'On the dimension and the number of parameters of a unirational variety', in Lam KY; Shparlinski I; Wang H; Xing CP (eds.), CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, BIRKHAUSER VERLAG AG, SINGAPORE, SINGAPORE, pp. 3 - 9, presented at Workshop on Cryptography and Computational Number Theory (CCNT 99), SINGAPORE, SINGAPORE, 22 November 1999 - 26 November 1999, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000169016800001&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,1999, 'On the security of Diffie-Hellman bits', in Lam KY; Shparlinski I; Wang H; Xing CP (eds.), CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, BIRKHAUSER VERLAG AG, SINGAPORE, SINGAPORE, pp. 257 - 268, presented at Workshop on Cryptography and Computational Number Theory (CCNT 99), SINGAPORE, SINGAPORE, 22 November 1999 - 26 November 1999, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000169016800019&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,1999, 'Polynomial rings and efficient public key authentication II', in Lam KY; Shparlinski I; Wang H; Xing CP (eds.), CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, BIRKHAUSER VERLAG AG, SINGAPORE, SINGAPORE, pp. 269 - 286, presented at Workshop on Cryptography and Computational Number Theory (CCNT 99), SINGAPORE, SINGAPORE, 22 November 1999 - 26 November 1999, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000169016800020&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,1999, 'Rational groups of elliptic curves suitable for cryptography', in Lam KY; Shparlinski I; Wang H; Xing CP (eds.), CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, BIRKHAUSER VERLAG AG, SINGAPORE, SINGAPORE, pp. 69 - 80, presented at Workshop on Cryptography and Computational Number Theory (CCNT 99), SINGAPORE, SINGAPORE, 22 November 1999 - 26 November 1999, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000169016800008&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,1999, 'Robust additive secret sharing schemes over Z(m)', in Lam KY; Shparlinski I; Wang H; Xing CP (eds.), CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, BIRKHAUSER VERLAG AG, SINGAPORE, SINGAPORE, pp. 357 - 368, presented at Workshop on Cryptography and Computational Number Theory (CCNT 99), SINGAPORE, SINGAPORE, 22 November 1999 - 26 November 1999, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000169016800026&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,1999, 'RSA public key validation', in Lam KY; Shparlinski I; Wang H; Xing CP (eds.), CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, BIRKHAUSER VERLAG AG, SINGAPORE, SINGAPORE, pp. 369 - 378, presented at Workshop on Cryptography and Computational Number Theory (CCNT 99), SINGAPORE, SINGAPORE, 22 November 1999 - 26 November 1999, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000169016800027&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,1999, 'Security of biased sources for cryptographic keys', in Lam KY; Shparlinski I; Wang H; Xing CP (eds.), CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, BIRKHAUSER VERLAG AG, SINGAPORE, SINGAPORE, pp. 287 - 302, presented at Workshop on Cryptography and Computational Number Theory (CCNT 99), SINGAPORE, SINGAPORE, 22 November 1999 - 26 November 1999, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000169016800021&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,1999, 'Small values of the Carmichael function and cryptographic applications', in Lam KY; Shparlinski I; Wang H; Xing CP (eds.), CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, BIRKHAUSER VERLAG AG, SINGAPORE, SINGAPORE, pp. 25 - 32, presented at Workshop on Cryptography and Computational Number Theory (CCNT 99), SINGAPORE, SINGAPORE, 22 November 1999 - 26 November 1999, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000169016800004&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,1999, 'The distribution of the coefficients of primitive polynomials over finite fields', in Lam KY; Shparlinski I; Wang H; Xing CP (eds.), CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, BIRKHAUSER VERLAG AG, SINGAPORE, SINGAPORE, pp. 43 - 57, presented at Workshop on Cryptography and Computational Number Theory (CCNT 99), SINGAPORE, SINGAPORE, 22 November 1999 - 26 November 1999, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000169016800006&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,