BibTeX records: Alice Silverberg

download as .bib file

@article{DBLP:journals/corr/abs-2109-12643,
  author       = {Daniel M. Kane and
                  Shahed Sharif and
                  Alice Silverberg},
  title        = {Quantum Money from Quaternion Algebras},
  journal      = {CoRR},
  volume       = {abs/2109.12643},
  year         = {2021},
  url          = {https://arxiv.org/abs/2109.12643},
  eprinttype    = {arXiv},
  eprint       = {2109.12643},
  timestamp    = {Mon, 04 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2109-12643.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KaneSS21,
  author       = {Daniel M. Kane and
                  Shahed Sharif and
                  Alice Silverberg},
  title        = {Quantum Money from Quaternion Algebras},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1294},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1294},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KaneSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/BonehGKLSSTZ20,
  author       = {Dan Boneh and
                  Darren B. Glass and
                  Daniel Krashen and
                  Kristin E. Lauter and
                  Shahed Sharif and
                  Alice Silverberg and
                  Mehdi Tibouchi and
                  Mark Zhandry},
  title        = {Multiparty Non-Interactive Key Exchange and More From Isogenies on
                  Elliptic Curves},
  journal      = {J. Math. Cryptol.},
  volume       = {14},
  number       = {1},
  pages        = {5--14},
  year         = {2020},
  url          = {https://doi.org/10.1515/jmc-2015-0047},
  doi          = {10.1515/JMC-2015-0047},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/BonehGKLSSTZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Silverberg20,
  author       = {Alice Silverberg},
  editor       = {Anne Canteaut and
                  Yuval Ishai},
  title        = {Mathematics and Cryptography: {A} Marriage of Convenience? - Invited
                  Talk},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12105},
  pages        = {3--9},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45721-1\_1},
  doi          = {10.1007/978-3-030-45721-1\_1},
  timestamp    = {Mon, 04 May 2020 14:27:11 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Silverberg20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Silverberg20,
  author       = {Alice Silverberg},
  title        = {Mathematics and Cryptography: {A} Marriage of Convenience?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {429},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/429},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Silverberg20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/LenstraS19,
  author       = {Hendrik W. Lenstra Jr. and
                  Alice Silverberg},
  title        = {Testing Isomorphism of Lattices over CM-Orders},
  journal      = {{SIAM} J. Comput.},
  volume       = {48},
  number       = {4},
  pages        = {1300--1334},
  year         = {2019},
  url          = {https://doi.org/10.1137/17M115390X},
  doi          = {10.1137/17M115390X},
  timestamp    = {Fri, 25 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/siamcomp/LenstraS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/focm/LenstraS18,
  author       = {Hendrik W. Lenstra Jr. and
                  Alice Silverberg},
  title        = {Algorithms for Commutative Algebras Over the Rational Numbers},
  journal      = {Found. Comput. Math.},
  volume       = {18},
  number       = {1},
  pages        = {159--180},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10208-016-9336-6},
  doi          = {10.1007/S10208-016-9336-6},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/focm/LenstraS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1807-03038,
  author       = {Dan Boneh and
                  Darren B. Glass and
                  Daniel Krashen and
                  Kristin E. Lauter and
                  Shahed Sharif and
                  Alice Silverberg and
                  Mehdi Tibouchi and
                  Mark Zhandry},
  title        = {Multiparty Non-Interactive Key Exchange and More From Isogenies on
                  Elliptic Curves},
  journal      = {CoRR},
  volume       = {abs/1807.03038},
  year         = {2018},
  url          = {http://arxiv.org/abs/1807.03038},
  eprinttype    = {arXiv},
  eprint       = {1807.03038},
  timestamp    = {Tue, 10 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1807-03038.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehGKLSSTZ18,
  author       = {Dan Boneh and
                  Darren B. Glass and
                  Daniel Krashen and
                  Kristin E. Lauter and
                  Shahed Sharif and
                  Alice Silverberg and
                  Mehdi Tibouchi and
                  Mark Zhandry},
  title        = {Multiparty Non-Interactive Key Exchange and More From Isogenies on
                  Elliptic Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {665},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/665},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehGKLSSTZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/focm/LenstraS17,
  author       = {Hendrik W. Lenstra Jr. and
                  Alice Silverberg},
  title        = {Roots of Unity in Orders},
  journal      = {Found. Comput. Math.},
  volume       = {17},
  number       = {3},
  pages        = {851--877},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10208-016-9304-1},
  doi          = {10.1007/S10208-016-9304-1},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/focm/LenstraS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/LenstraS17,
  author       = {Hendrik W. Lenstra Jr. and
                  Alice Silverberg},
  title        = {Lattices with Symmetry},
  journal      = {J. Cryptol.},
  volume       = {30},
  number       = {3},
  pages        = {760--804},
  year         = {2017},
  url          = {https://doi.org/10.1007/s00145-016-9235-7},
  doi          = {10.1007/S00145-016-9235-7},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/LenstraS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/LenstraS17,
  author       = {Hendrik W. Lenstra Jr. and
                  Alice Silverberg},
  title        = {Testing isomorphism of lattices over CM-orders},
  journal      = {CoRR},
  volume       = {abs/1706.07373},
  year         = {2017},
  url          = {http://arxiv.org/abs/1706.07373},
  eprinttype    = {arXiv},
  eprint       = {1706.07373},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/LenstraS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsc/LenstraS16,
  author       = {Hendrik W. Lenstra Jr. and
                  Alice Silverberg},
  title        = {Determining cyclicity of finite modules},
  journal      = {J. Symb. Comput.},
  volume       = {73},
  pages        = {153--156},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jsc.2015.06.002},
  doi          = {10.1016/J.JSC.2015.06.002},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsc/LenstraS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/moc/AbatzoglouSSW16,
  author       = {Alexander Abatzoglou and
                  Alice Silverberg and
                  Andrew V. Sutherland and
                  Angela Wong},
  title        = {A framework for deterministic primality proving using elliptic curves
                  with complex multiplication},
  journal      = {Math. Comput.},
  volume       = {85},
  number       = {299},
  pages        = {1461--1483},
  year         = {2016},
  url          = {https://doi.org/10.1090/mcom/3001},
  doi          = {10.1090/MCOM/3001},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/moc/AbatzoglouSSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SilverbergZ15,
  author       = {Alice Silverberg and
                  Yuri G. Zarhin},
  title        = {Isogenies of abelian varieties over finite fields},
  journal      = {Des. Codes Cryptogr.},
  volume       = {77},
  number       = {2-3},
  pages        = {427--439},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10623-015-0078-2},
  doi          = {10.1007/S10623-015-0078-2},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/SilverbergZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/LenstraS15a,
  author       = {Hendrik W. Lenstra Jr. and
                  Alice Silverberg},
  title        = {Lattices with Symmetry},
  journal      = {CoRR},
  volume       = {abs/1501.00178},
  year         = {2015},
  url          = {http://arxiv.org/abs/1501.00178},
  eprinttype    = {arXiv},
  eprint       = {1501.00178},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/LenstraS15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/LenstraS15,
  author       = {Hendrik W. Lenstra Jr. and
                  Alice Silverberg},
  title        = {Roots of unity in orders},
  journal      = {CoRR},
  volume       = {abs/1509.02612},
  year         = {2015},
  url          = {http://arxiv.org/abs/1509.02612},
  eprinttype    = {arXiv},
  eprint       = {1509.02612},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/LenstraS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amco/Silverberg14,
  author       = {Alice Silverberg},
  title        = {Some remarks on primality proving and elliptic curves},
  journal      = {Adv. Math. Commun.},
  volume       = {8},
  number       = {4},
  pages        = {427--436},
  year         = {2014},
  url          = {https://doi.org/10.3934/amc.2014.8.427},
  doi          = {10.3934/AMC.2014.8.427},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amco/Silverberg14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LenstraS14,
  author       = {Hendrik W. Lenstra Jr. and
                  Alice Silverberg},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Revisiting the Gentry-Szydlo Algorithm},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8616},
  pages        = {280--296},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44371-2\_16},
  doi          = {10.1007/978-3-662-44371-2\_16},
  timestamp    = {Fri, 12 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LenstraS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LenstraS14,
  author       = {Hendrik W. Lenstra Jr. and
                  Alice Silverberg},
  title        = {Revisiting the Gentry-Szydlo Algorithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {430},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/430},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LenstraS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LenstraLS14,
  author       = {Hendrik W. Lenstra Jr. and
                  Alice Silverberg},
  title        = {Lattices with Symmetry},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1026},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/1026},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LenstraLS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Silverberg13,
  author       = {Alice Silverberg},
  title        = {Fully Homomorphic Encryption for Mathematicians},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {250},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/250},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Silverberg13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/moc/RubinS10,
  author       = {Karl Rubin and
                  Alice Silverberg},
  title        = {Choosing the correct elliptic curve in the {CM} method},
  journal      = {Math. Comput.},
  volume       = {79},
  number       = {269},
  pages        = {545--561},
  year         = {2010},
  url          = {https://doi.org/10.1090/S0025-5718-09-02266-2},
  doi          = {10.1090/S0025-5718-09-02266-2},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/moc/RubinS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/RubinS09,
  author       = {Karl Rubin and
                  Alice Silverberg},
  title        = {Using Abelian Varieties to Improve Pairing-Based Cryptography},
  journal      = {J. Cryptol.},
  volume       = {22},
  number       = {3},
  pages        = {330--364},
  year         = {2009},
  url          = {https://doi.org/10.1007/s00145-008-9022-1},
  doi          = {10.1007/S00145-008-9022-1},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/RubinS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehRS09,
  author       = {Dan Boneh and
                  Karl Rubin and
                  Alice Silverberg},
  title        = {Finding composite order ordinary elliptic curves using the Cocks-Pinch
                  method},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {533},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/533},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehRS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dam/Silverberg08,
  author       = {Alice Silverberg},
  title        = {Applications to cryptography of twisting commutative algebraic groups},
  journal      = {Discret. Appl. Math.},
  volume       = {156},
  number       = {16},
  pages        = {3122--3138},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.dam.2008.01.024},
  doi          = {10.1016/J.DAM.2008.01.024},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dam/Silverberg08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/RubinS08,
  author       = {Karl Rubin and
                  Alice Silverberg},
  title        = {Compression in Finite Fields and Torus-Based Cryptography},
  journal      = {{SIAM} J. Comput.},
  volume       = {37},
  number       = {5},
  pages        = {1401--1428},
  year         = {2008},
  url          = {https://doi.org/10.1137/060676155},
  doi          = {10.1137/060676155},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/RubinS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RubinS07,
  author       = {Karl Rubin and
                  Alice Silverberg},
  title        = {Choosing the correct elliptic curve in the {CM} method},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {253},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/253},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RubinS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DijkGPRSSW05,
  author       = {Marten van Dijk and
                  Robert Granger and
                  Dan Page and
                  Karl Rubin and
                  Alice Silverberg and
                  Martijn Stam and
                  David P. Woodruff},
  editor       = {Ronald Cramer},
  title        = {Practical Cryptography in High Dimensional Tori},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {234--250},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11426639\_14},
  doi          = {10.1007/11426639\_14},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DijkGPRSSW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ants/RubinS04,
  author       = {Karl Rubin and
                  Alice Silverberg},
  editor       = {Duncan A. Buell},
  title        = {Using Primitive Subgroups to Do More with Fewer Bits},
  booktitle    = {Algorithmic Number Theory, 6th International Symposium, ANTS-VI, Burlington,
                  VT, USA, June 13-18, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3076},
  pages        = {18--41},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24847-7\_2},
  doi          = {10.1007/978-3-540-24847-7\_2},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ants/RubinS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RubinS04,
  author       = {Karl Rubin and
                  Alice Silverberg},
  title        = {Using primitive subgroups to do more with fewer bits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {87},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/087},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RubinS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DijkGPRSSW04,
  author       = {Marten van Dijk and
                  Robert Granger and
                  Dan Page and
                  Karl Rubin and
                  Alice Silverberg and
                  Martijn Stam and
                  David P. Woodruff},
  title        = {Practical Cryptography in High Dimensional Tori},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {352},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/352},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DijkGPRSSW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/SilverbergSW03,
  author       = {Alice Silverberg and
                  Jessica Staddon and
                  Judy L. Walker},
  title        = {Applications of list decoding to tracing traitors},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {49},
  number       = {5},
  pages        = {1312--1318},
  year         = {2003},
  url          = {https://doi.org/10.1109/TIT.2003.810630},
  doi          = {10.1109/TIT.2003.810630},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/SilverbergSW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/RubinS03,
  author       = {Karl Rubin and
                  Alice Silverberg},
  editor       = {Dan Boneh},
  title        = {Torus-Based Cryptography},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2003, 23rd Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 17-21,
                  2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2729},
  pages        = {349--365},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45146-4\_21},
  doi          = {10.1007/978-3-540-45146-4\_21},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/RubinS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RubinS03,
  author       = {Karl Rubin and
                  Alice Silverberg},
  title        = {Torus-based cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {39},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/039},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RubinS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/GentryS02,
  author       = {Craig Gentry and
                  Alice Silverberg},
  editor       = {Yuliang Zheng},
  title        = {Hierarchical ID-Based Cryptography},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2002, 8th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Queenstown, New Zealand, December 1-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2501},
  pages        = {548--566},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36178-2\_34},
  doi          = {10.1007/3-540-36178-2\_34},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/GentryS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/RubinS02,
  author       = {Karl Rubin and
                  Alice Silverberg},
  editor       = {Moti Yung},
  title        = {Supersingular Abelian Varieties in Cryptology},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2002, 22nd Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 18-22,
                  2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2442},
  pages        = {336--353},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45708-9\_22},
  doi          = {10.1007/3-540-45708-9\_22},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/RubinS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RubinS02,
  author       = {Karl Rubin and
                  Alice Silverberg},
  title        = {The best and worst of supersingular abelian varieties in cryptology},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {6},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/006},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RubinS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GentryS02,
  author       = {Craig Gentry and
                  Alice Silverberg},
  title        = {Hierarchical ID-Based Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {56},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/056},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GentryS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehS02,
  author       = {Dan Boneh and
                  Alice Silverberg},
  title        = {Applications of Multilinear Forms to Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {80},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/080},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/em/RubinS01,
  author       = {Karl Rubin and
                  Alice Silverberg},
  title        = {Rank Frequencies for Quadratic Twists of Elliptic Curves},
  journal      = {Exp. Math.},
  volume       = {10},
  number       = {4},
  pages        = {559--569},
  year         = {2001},
  url          = {https://doi.org/10.1080/10586458.2001.10504676},
  doi          = {10.1080/10586458.2001.10504676},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/em/RubinS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/SilverbergSW01,
  author       = {Alice Silverberg and
                  Jessica Staddon and
                  Judy L. Walker},
  editor       = {Colin Boyd},
  title        = {Efficient Traitor Tracing Algorithms Using List Decoding},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2001, 7th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Gold Coast, Australia, December 9-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2248},
  pages        = {175--192},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45682-1\_11},
  doi          = {10.1007/3-540-45682-1\_11},
  timestamp    = {Tue, 01 Jun 2021 15:22:33 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/SilverbergSW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SilverbergSW01,
  author       = {Alice Silverberg and
                  Jessica Staddon and
                  Judy L. Walker},
  title        = {Efficient Traitor Tracing Algorithms using List Decoding},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {16},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/016},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SilverbergSW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/em/RubinS00,
  author       = {Karl Rubin and
                  Alice Silverberg},
  title        = {Ranks of Elliptic Curves in Families of Quadratic Twists},
  journal      = {Exp. Math.},
  volume       = {9},
  number       = {4},
  pages        = {583--590},
  year         = {2000},
  url          = {https://doi.org/10.1080/10586458.2000.10504661},
  doi          = {10.1080/10586458.2000.10504661},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/em/RubinS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics