Arjen K. Lenstra
Affiliations:- Swiss Federal Institute of Technology in Lausanne, Switzerland
According to our database1,
Arjen K. Lenstra
authored at least 105 papers
between 1981 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on id.loc.gov
-
on d-nb.info
-
on isni.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
IACR Cryptol. ePrint Arch., 2024
2021
2018
IEEE Trans. Inf. Theory, 2018
IACR Cryptol. ePrint Arch., 2018
2017
Int. J. Appl. Cryptogr., 2017
IACR Cryptol. ePrint Arch., 2017
2016
IACR Cryptol. ePrint Arch., 2016
2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the IEEE International Symposium on Information Theory, 2015
2014
2013
IACR Cryptol. ePrint Arch., 2013
2012
Solving a 112-bit prime elliptic curve discrete logarithm problem on game consoles using sloppy reduction.
Int. J. Appl. Cryptogr., 2012
Clust. Comput., 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
2010
Proceedings of the LLL Algorithm - Survey and Applications, 2010
Proceedings of the Fourth International Conference on Emerging Security Information Systems and Technologies, 2010
Proceedings of the Algorithmic Number Theory, 9th International Symposium, 2010
2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
2008
IACR Cryptol. ePrint Arch., 2008
Security Observance throughout the Life-Cycle of Embedded Systems.
Proceedings of the 2008 International Conference on Embedded Systems & Applications, 2008
2007
Chosen-Prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities.
Proceedings of the Advances in Cryptology, 2007
2006
IACR Cryptol. ePrint Arch., 2006
2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005
2004
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004
2003
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003
2002
Proceedings of the Public Key Cryptography, 2002
Proceedings of the Cryptographic Hardware and Embedded Systems, 2002
Proceedings of the Advances in Cryptology, 2002
Proceedings of the Algorithmic Number Theory, 5th International Symposium, 2002
2001
Proceedings of the Public Key Cryptography, 2001
Proceedings of the Public Key Cryptography, 2001
Proceedings of the Advances in Cryptology, 2001
2000
Solving a System of Linear Diophantine Equations with Lower and Upper Bounds on the Variables.
Math. Oper. Res., 2000
Market Split and Basis Reduction: Towards a Solution of the Cornue'jols-Dawande Instances.
INFORMS J. Comput., 2000
Proceedings of the Advances in Cryptology, 2000
Proceedings of the Advances in Cryptology, 2000
1999
J. Cryptol., 1999
Market Split and Basis Reduction: Towards a Solution of the Cornuéjols-Dawande Instances.
Proceedings of the Integer Programming and Combinatorial Optimization, 1999
Proceedings of the Advances in Cryptology, 1999
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999
1998
Proceedings of the Integer Programming and Combinatorial Optimization, 1998
Proceedings of the Advances in Cryptology, 1998
1997
Using Cyclotomic Polynomials to Construct Efficient Discrete Logarithm Cryptosystems Over Finite Fields.
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997
1996
Proceedings of the Advances in Cryptology, 1996
Proceedings of the Advances in Cryptology, 1996
1995
Proceedings of the Advances in Cryptology, 1995
Proceedings of the Advances in Cryptology, 1995
Proceedings of the Advances in Cryptology, 1995
1994
Proceedings of the Distributed Algorithms, 8th International Workshop, 1994
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994
Proceedings of the Algorithmic Number Theory, First International Symposium, 1994
1993
Proceedings of the Advances in Cryptology, 1993
1992
Proceedings of the Advances in Cryptology, 1992
Proceedings of the Advances in Cryptology, 1992
1990
Proceedings of the 22nd Annual ACM Symposium on Theory of Computing, 1990
Algorithms in Number Theory.
Proceedings of the Handbook of Theoretical Computer Science, 1990
1989
1987
SIAM J. Comput., 1987
1985
Proceedings of the EUROCAL '85, 1985
1984
Polynomial - time algorithms for the factorization of polynomials.
Bull. EATCS, 1984
Polynomial Factorization and Nonrandomness of Bits of Algebraic and Some Transcendental Numbers
Proceedings of the 16th Annual ACM Symposium on Theory of Computing, April 30, 1984
1983
Proceedings of the 15th Annual ACM Symposium on Theory of Computing, 1983
Proceedings of the Computer Algebra, 1983
1982
Proceedings of the Computer Algebra, 1982
1981