Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Alice Silverberg
@article{DBLP:journals/corr/abs-2109-12643, author = {Daniel M. Kane and Shahed Sharif and Alice Silverberg}, title = {Quantum Money from Quaternion Algebras}, journal = {CoRR}, volume = {abs/2109.12643}, year = {2021}, url = {https://arxiv.org/abs/2109.12643}, eprinttype = {arXiv}, eprint = {2109.12643}, timestamp = {Mon, 04 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2109-12643.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KaneSS21, author = {Daniel M. Kane and Shahed Sharif and Alice Silverberg}, title = {Quantum Money from Quaternion Algebras}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1294}, year = {2021}, url = {https://eprint.iacr.org/2021/1294}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KaneSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/BonehGKLSSTZ20, author = {Dan Boneh and Darren B. Glass and Daniel Krashen and Kristin E. Lauter and Shahed Sharif and Alice Silverberg and Mehdi Tibouchi and Mark Zhandry}, title = {Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves}, journal = {J. Math. Cryptol.}, volume = {14}, number = {1}, pages = {5--14}, year = {2020}, url = {https://doi.org/10.1515/jmc-2015-0047}, doi = {10.1515/JMC-2015-0047}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/BonehGKLSSTZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Silverberg20, author = {Alice Silverberg}, editor = {Anne Canteaut and Yuval Ishai}, title = {Mathematics and Cryptography: {A} Marriage of Convenience? - Invited Talk}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12105}, pages = {3--9}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45721-1\_1}, doi = {10.1007/978-3-030-45721-1\_1}, timestamp = {Mon, 04 May 2020 14:27:11 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Silverberg20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Silverberg20, author = {Alice Silverberg}, title = {Mathematics and Cryptography: {A} Marriage of Convenience?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {429}, year = {2020}, url = {https://eprint.iacr.org/2020/429}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Silverberg20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/LenstraS19, author = {Hendrik W. Lenstra Jr. and Alice Silverberg}, title = {Testing Isomorphism of Lattices over CM-Orders}, journal = {{SIAM} J. Comput.}, volume = {48}, number = {4}, pages = {1300--1334}, year = {2019}, url = {https://doi.org/10.1137/17M115390X}, doi = {10.1137/17M115390X}, timestamp = {Fri, 25 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/siamcomp/LenstraS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/focm/LenstraS18, author = {Hendrik W. Lenstra Jr. and Alice Silverberg}, title = {Algorithms for Commutative Algebras Over the Rational Numbers}, journal = {Found. Comput. Math.}, volume = {18}, number = {1}, pages = {159--180}, year = {2018}, url = {https://doi.org/10.1007/s10208-016-9336-6}, doi = {10.1007/S10208-016-9336-6}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/focm/LenstraS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1807-03038, author = {Dan Boneh and Darren B. Glass and Daniel Krashen and Kristin E. Lauter and Shahed Sharif and Alice Silverberg and Mehdi Tibouchi and Mark Zhandry}, title = {Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves}, journal = {CoRR}, volume = {abs/1807.03038}, year = {2018}, url = {http://arxiv.org/abs/1807.03038}, eprinttype = {arXiv}, eprint = {1807.03038}, timestamp = {Tue, 10 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1807-03038.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehGKLSSTZ18, author = {Dan Boneh and Darren B. Glass and Daniel Krashen and Kristin E. Lauter and Shahed Sharif and Alice Silverberg and Mehdi Tibouchi and Mark Zhandry}, title = {Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {665}, year = {2018}, url = {https://eprint.iacr.org/2018/665}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehGKLSSTZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/focm/LenstraS17, author = {Hendrik W. Lenstra Jr. and Alice Silverberg}, title = {Roots of Unity in Orders}, journal = {Found. Comput. Math.}, volume = {17}, number = {3}, pages = {851--877}, year = {2017}, url = {https://doi.org/10.1007/s10208-016-9304-1}, doi = {10.1007/S10208-016-9304-1}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/focm/LenstraS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/LenstraS17, author = {Hendrik W. Lenstra Jr. and Alice Silverberg}, title = {Lattices with Symmetry}, journal = {J. Cryptol.}, volume = {30}, number = {3}, pages = {760--804}, year = {2017}, url = {https://doi.org/10.1007/s00145-016-9235-7}, doi = {10.1007/S00145-016-9235-7}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/LenstraS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/LenstraS17, author = {Hendrik W. Lenstra Jr. and Alice Silverberg}, title = {Testing isomorphism of lattices over CM-orders}, journal = {CoRR}, volume = {abs/1706.07373}, year = {2017}, url = {http://arxiv.org/abs/1706.07373}, eprinttype = {arXiv}, eprint = {1706.07373}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/LenstraS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsc/LenstraS16, author = {Hendrik W. Lenstra Jr. and Alice Silverberg}, title = {Determining cyclicity of finite modules}, journal = {J. Symb. Comput.}, volume = {73}, pages = {153--156}, year = {2016}, url = {https://doi.org/10.1016/j.jsc.2015.06.002}, doi = {10.1016/J.JSC.2015.06.002}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsc/LenstraS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/moc/AbatzoglouSSW16, author = {Alexander Abatzoglou and Alice Silverberg and Andrew V. Sutherland and Angela Wong}, title = {A framework for deterministic primality proving using elliptic curves with complex multiplication}, journal = {Math. Comput.}, volume = {85}, number = {299}, pages = {1461--1483}, year = {2016}, url = {https://doi.org/10.1090/mcom/3001}, doi = {10.1090/MCOM/3001}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/moc/AbatzoglouSSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SilverbergZ15, author = {Alice Silverberg and Yuri G. Zarhin}, title = {Isogenies of abelian varieties over finite fields}, journal = {Des. Codes Cryptogr.}, volume = {77}, number = {2-3}, pages = {427--439}, year = {2015}, url = {https://doi.org/10.1007/s10623-015-0078-2}, doi = {10.1007/S10623-015-0078-2}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/SilverbergZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/LenstraS15a, author = {Hendrik W. Lenstra Jr. and Alice Silverberg}, title = {Lattices with Symmetry}, journal = {CoRR}, volume = {abs/1501.00178}, year = {2015}, url = {http://arxiv.org/abs/1501.00178}, eprinttype = {arXiv}, eprint = {1501.00178}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/LenstraS15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/LenstraS15, author = {Hendrik W. Lenstra Jr. and Alice Silverberg}, title = {Roots of unity in orders}, journal = {CoRR}, volume = {abs/1509.02612}, year = {2015}, url = {http://arxiv.org/abs/1509.02612}, eprinttype = {arXiv}, eprint = {1509.02612}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/LenstraS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amco/Silverberg14, author = {Alice Silverberg}, title = {Some remarks on primality proving and elliptic curves}, journal = {Adv. Math. Commun.}, volume = {8}, number = {4}, pages = {427--436}, year = {2014}, url = {https://doi.org/10.3934/amc.2014.8.427}, doi = {10.3934/AMC.2014.8.427}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/amco/Silverberg14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LenstraS14, author = {Hendrik W. Lenstra Jr. and Alice Silverberg}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Revisiting the Gentry-Szydlo Algorithm}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8616}, pages = {280--296}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44371-2\_16}, doi = {10.1007/978-3-662-44371-2\_16}, timestamp = {Fri, 12 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LenstraS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LenstraS14, author = {Hendrik W. Lenstra Jr. and Alice Silverberg}, title = {Revisiting the Gentry-Szydlo Algorithm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {430}, year = {2014}, url = {http://eprint.iacr.org/2014/430}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LenstraS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LenstraLS14, author = {Hendrik W. Lenstra Jr. and Alice Silverberg}, title = {Lattices with Symmetry}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1026}, year = {2014}, url = {http://eprint.iacr.org/2014/1026}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LenstraLS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Silverberg13, author = {Alice Silverberg}, title = {Fully Homomorphic Encryption for Mathematicians}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {250}, year = {2013}, url = {http://eprint.iacr.org/2013/250}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Silverberg13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/moc/RubinS10, author = {Karl Rubin and Alice Silverberg}, title = {Choosing the correct elliptic curve in the {CM} method}, journal = {Math. Comput.}, volume = {79}, number = {269}, pages = {545--561}, year = {2010}, url = {https://doi.org/10.1090/S0025-5718-09-02266-2}, doi = {10.1090/S0025-5718-09-02266-2}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/moc/RubinS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/RubinS09, author = {Karl Rubin and Alice Silverberg}, title = {Using Abelian Varieties to Improve Pairing-Based Cryptography}, journal = {J. Cryptol.}, volume = {22}, number = {3}, pages = {330--364}, year = {2009}, url = {https://doi.org/10.1007/s00145-008-9022-1}, doi = {10.1007/S00145-008-9022-1}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/RubinS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehRS09, author = {Dan Boneh and Karl Rubin and Alice Silverberg}, title = {Finding composite order ordinary elliptic curves using the Cocks-Pinch method}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {533}, year = {2009}, url = {http://eprint.iacr.org/2009/533}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehRS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dam/Silverberg08, author = {Alice Silverberg}, title = {Applications to cryptography of twisting commutative algebraic groups}, journal = {Discret. Appl. Math.}, volume = {156}, number = {16}, pages = {3122--3138}, year = {2008}, url = {https://doi.org/10.1016/j.dam.2008.01.024}, doi = {10.1016/J.DAM.2008.01.024}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dam/Silverberg08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/RubinS08, author = {Karl Rubin and Alice Silverberg}, title = {Compression in Finite Fields and Torus-Based Cryptography}, journal = {{SIAM} J. Comput.}, volume = {37}, number = {5}, pages = {1401--1428}, year = {2008}, url = {https://doi.org/10.1137/060676155}, doi = {10.1137/060676155}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/RubinS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RubinS07, author = {Karl Rubin and Alice Silverberg}, title = {Choosing the correct elliptic curve in the {CM} method}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {253}, year = {2007}, url = {http://eprint.iacr.org/2007/253}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RubinS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DijkGPRSSW05, author = {Marten van Dijk and Robert Granger and Dan Page and Karl Rubin and Alice Silverberg and Martijn Stam and David P. Woodruff}, editor = {Ronald Cramer}, title = {Practical Cryptography in High Dimensional Tori}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {234--250}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11426639\_14}, doi = {10.1007/11426639\_14}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DijkGPRSSW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ants/RubinS04, author = {Karl Rubin and Alice Silverberg}, editor = {Duncan A. Buell}, title = {Using Primitive Subgroups to Do More with Fewer Bits}, booktitle = {Algorithmic Number Theory, 6th International Symposium, ANTS-VI, Burlington, VT, USA, June 13-18, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3076}, pages = {18--41}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24847-7\_2}, doi = {10.1007/978-3-540-24847-7\_2}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ants/RubinS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RubinS04, author = {Karl Rubin and Alice Silverberg}, title = {Using primitive subgroups to do more with fewer bits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {87}, year = {2004}, url = {http://eprint.iacr.org/2004/087}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RubinS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DijkGPRSSW04, author = {Marten van Dijk and Robert Granger and Dan Page and Karl Rubin and Alice Silverberg and Martijn Stam and David P. Woodruff}, title = {Practical Cryptography in High Dimensional Tori}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {352}, year = {2004}, url = {http://eprint.iacr.org/2004/352}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DijkGPRSSW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/SilverbergSW03, author = {Alice Silverberg and Jessica Staddon and Judy L. Walker}, title = {Applications of list decoding to tracing traitors}, journal = {{IEEE} Trans. Inf. Theory}, volume = {49}, number = {5}, pages = {1312--1318}, year = {2003}, url = {https://doi.org/10.1109/TIT.2003.810630}, doi = {10.1109/TIT.2003.810630}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/SilverbergSW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/RubinS03, author = {Karl Rubin and Alice Silverberg}, editor = {Dan Boneh}, title = {Torus-Based Cryptography}, booktitle = {Advances in Cryptology - {CRYPTO} 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2729}, pages = {349--365}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45146-4\_21}, doi = {10.1007/978-3-540-45146-4\_21}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/RubinS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RubinS03, author = {Karl Rubin and Alice Silverberg}, title = {Torus-based cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {39}, year = {2003}, url = {http://eprint.iacr.org/2003/039}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RubinS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/GentryS02, author = {Craig Gentry and Alice Silverberg}, editor = {Yuliang Zheng}, title = {Hierarchical ID-Based Cryptography}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2501}, pages = {548--566}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36178-2\_34}, doi = {10.1007/3-540-36178-2\_34}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/GentryS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/RubinS02, author = {Karl Rubin and Alice Silverberg}, editor = {Moti Yung}, title = {Supersingular Abelian Varieties in Cryptology}, booktitle = {Advances in Cryptology - {CRYPTO} 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2442}, pages = {336--353}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45708-9\_22}, doi = {10.1007/3-540-45708-9\_22}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/RubinS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RubinS02, author = {Karl Rubin and Alice Silverberg}, title = {The best and worst of supersingular abelian varieties in cryptology}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {6}, year = {2002}, url = {http://eprint.iacr.org/2002/006}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RubinS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GentryS02, author = {Craig Gentry and Alice Silverberg}, title = {Hierarchical ID-Based Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {56}, year = {2002}, url = {http://eprint.iacr.org/2002/056}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GentryS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehS02, author = {Dan Boneh and Alice Silverberg}, title = {Applications of Multilinear Forms to Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {80}, year = {2002}, url = {http://eprint.iacr.org/2002/080}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/em/RubinS01, author = {Karl Rubin and Alice Silverberg}, title = {Rank Frequencies for Quadratic Twists of Elliptic Curves}, journal = {Exp. Math.}, volume = {10}, number = {4}, pages = {559--569}, year = {2001}, url = {https://doi.org/10.1080/10586458.2001.10504676}, doi = {10.1080/10586458.2001.10504676}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/em/RubinS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/SilverbergSW01, author = {Alice Silverberg and Jessica Staddon and Judy L. Walker}, editor = {Colin Boyd}, title = {Efficient Traitor Tracing Algorithms Using List Decoding}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2248}, pages = {175--192}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45682-1\_11}, doi = {10.1007/3-540-45682-1\_11}, timestamp = {Tue, 01 Jun 2021 15:22:33 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/SilverbergSW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SilverbergSW01, author = {Alice Silverberg and Jessica Staddon and Judy L. Walker}, title = {Efficient Traitor Tracing Algorithms using List Decoding}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {16}, year = {2001}, url = {http://eprint.iacr.org/2001/016}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SilverbergSW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/em/RubinS00, author = {Karl Rubin and Alice Silverberg}, title = {Ranks of Elliptic Curves in Families of Quadratic Twists}, journal = {Exp. Math.}, volume = {9}, number = {4}, pages = {583--590}, year = {2000}, url = {https://doi.org/10.1080/10586458.2000.10504661}, doi = {10.1080/10586458.2000.10504661}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/em/RubinS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.