Sledovať
Rene Peralta
Rene Peralta
Overená e-mailová adresa na: nist.gov
Názov
Citované v
Citované v
Rok
Report on post-quantum cryptography
L Chen, L Chen, S Jordan, YK Liu, D Moody, R Peralta, RA Perlner, ...
US Department of Commerce, National Institute of Standards and Technology, 2016
8852016
Simple constructions of almost k‐wise independent random variables
N Alon, O Goldreich, J Håstad, R Peralta
Random Structures & Algorithms 3 (3), 289-304, 1992
8411992
Computation in networks of passively mobile finite-state sensors
D Angluin, J Aspnes, Z Diamadi, MJ Fischer, R Peralta
Proceedings of the twenty-third annual ACM symposium on Principles of …, 2004
7802004
Status report on the third round of the NIST post-quantum cryptography standardization process
G Alagic, G Alagic, D Apon, D Cooper, Q Dang, T Dang, J Kelsey, ...
US Department of Commerce, National Institute of Standards and Technology 4, 07, 2022
6112022
Status report on the second round of the NIST post-quantum cryptography standardization process
G Alagic, J Alperin-Sheriff, D Apon, D Cooper, Q Dang, J Kelsey, YK Liu, ...
US Department of Commerce, NIST 2, 69, 2020
3902020
A new combinational logic minimization technique with applications to cryptology
J Boyar, R Peralta
Experimental Algorithms: 9th International Symposium, SEA 2010, Ischia …, 2010
2172010
On the relation of error correction and cryptography to an online biometric based identification scheme
GI Davida, Y Frankel, B Matt, R Peralta
Workshop on coding and cryptography, 1999
2001999
Demonstrating possession of a discrete logarithm without revealing it
D Chaum, JH Evertse, J van de Graaf, R Peralta
Advances in Cryptology—CRYPTO’86: Proceedings 6, 200-212, 1987
1831987
Logic minimization techniques with applications to cryptology
J Boyar, P Matthews, R Peralta
Journal of Cryptology 26, 280-312, 2013
1812013
A small depth-16 circuit for the AES S-box
J Boyar, R Peralta
IFIP International Information Security Conference, 287-298, 2012
1342012
On the multiplicative complexity of boolean functions over the basis (∧,⊕, 1)
J Boyar, R Peralta, D Pochuev
Theoretical Computer Science 235 (1), 43-57, 2000
1282000
A simple and secure way to show the validity of your public key
J Van De Graaf, R Peralta
Conference on the Theory and Application of Cryptographic Techniques, 128-134, 1987
1221987
A simple and fast probabilistic algorithm for computing square roots modulo a prime number (Corresp.)
R Peralta
IEEE transactions on information theory 32 (6), 846-847, 1986
1121986
Stably computable properties of network graphs
D Angluin, J Aspnes, M Chan, MJ Fischer, H Jiang, R Peralta
Distributed Computing in Sensor Systems: First IEEE International Conference …, 2005
1082005
On the distribution of quadratic residues and nonresidues modulo a prime number
R Peralta
Mathematics of Computation 58 (197), 433-440, 1992
951992
Status report on the second round of the NIST post-quantum cryptography standardization process
D Moody, G Alagic, DC Apon, DA Cooper, QH Dang, JM Kelsey, YK Liu, ...
Dustin Moody, Gorjan Alagic, Daniel C. Apon, David A. Cooper, Quynh H. Dang …, 2020
842020
Asymptotic semismoothness probabilities
E Bach, R Peralta
Mathematics of computation 65 (216), 1701-1715, 1996
801996
Report on pairing-based cryptography
D Moody, R Peralta, R Perlner, A Regenscheid, A Roginsky, L Chen
Journal of research of the National Institute of Standards and Technology …, 2015
722015
Faster factoring of integers of a special form
R Peralta, E Okamoto
IEICE transactions on fundamentals of electronics, communications and …, 1996
711996
Simultaneous security of bits in the discrete log
R Peralta
Workshop on the Theory and Application of of Cryptographic Techniques, 62-72, 1985
701985
Systém momentálne nemôže vykonať operáciu. Skúste to neskôr.
Články 1–20