×
Compute Distance To:
Author ID: gentry.craig Recent zbMATH articles by "Gentry, Craig"
Published as: Gentry, Craig
Homepage: https://simons.berkeley.edu/people/craig-gentry
External Links: MGP · Wikidata · Google Scholar · ResearchGate · dblp
Documents Indexed: 69 Publications since 2001
Co-Authors: 61 Co-Authors with 58 Joint Publications
1,262 Co-Co-Authors

Publications by Year

Citations contained in zbMATH Open

63 Publications have been cited 2,841 times in 1,325 Documents Cited by Year
Fully homomorphic encryption using ideal lattices. Zbl 1304.94059
Gentry, Craig
348
2009
Trapdoors for hard lattices and new cryptographic constructions. Zbl 1231.68124
Gentry, Craig; Peikert, Chris; Vaikuntanainan, Vinod
299
2008
Candidate indistinguishability obfuscation and functional encryption for all circuits. Zbl 1348.94048
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Raykova, Mariana; Sahai, Amit; Waters, Brent
208
2016
(Leveled) fully homomorphic encryption without bootstrapping. Zbl 1347.68120
Brakerski, Zvika; Gentry, Craig; Vaikuntanathan, Vinod
150
2012
Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based. Zbl 1310.94148
Gentry, Craig; Sahai, Amit; Waters, Brent
148
2013
Candidate multilinear maps from ideal lattices. Zbl 1300.94055
Garg, Sanjam; Gentry, Craig; Halevi, Shai
124
2013
Practical identity-based encryption without random oracles. Zbl 1140.94340
Gentry, Craig
95
2006
Collusion resistant broadcast encryption with short ciphertexts and private keys. Zbl 1145.94434
Boneh, Dan; Gentry, Craig; Waters, Brent
95
2005
Fully homomorphic encryption over the integers. Zbl 1279.94130
van Dijk, Marten; Gentry, Craig; Halevi, Shai; Vaikuntanathan, Vinod
94
2010
Aggregate and verifiably encrypted signatures from bilinear maps. Zbl 1038.94553
Boneh, Dan; Gentry, Craig; Lynn, Ben; Shacham, Hovav
93
2003
Hierarchical ID-based cryptography. Zbl 1065.94547
Gentry, Craig; Silverberg, Alice
84
2002
Non-interactive verifiable computing: outsourcing computation to untrusted workers. Zbl 1284.68065
Gennaro, Rosario; Gentry, Craig; Parno, Bryan
70
2010
Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits. Zbl 1327.94035
Boneh, Dan; Gentry, Craig; Gorbunov, Sergey; Halevi, Shai; Nikolaenko, Valeria; Segev, Gil; Vaikuntanathan, Vinod; Vinayagamurthy, Dhinakaran
65
2014
Quadratic span programs and succinct NIZKs without PCPs. Zbl 1300.94056
Gennaro, Rosario; Gentry, Craig; Parno, Bryan; Raykova, Mariana
55
2013
Toward basing fully homomorphic encryption on worst-case hardness. Zbl 1280.94059
Gentry, Craig
54
2010
Separating succinct non-interactive arguments from all falsifiable assumptions. Zbl 1288.94063
Gentry, Craig; Wichs, Daniel
53
2011
Witness encryption and its applications. Zbl 1293.94066
Garg, Sanjam; Gentry, Craig; Sahai, Amit; Waters, Brent
49
2013
Graph-induced multilinear maps from lattices. Zbl 1315.94076
Gentry, Craig; Gorbunov, Sergey; Halevi, Shai
47
2015
Attribute-based encryption for circuits from multilinear maps. Zbl 1311.94080
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Sahai, Amit; Waters, Brent
42
2013
Functional encryption without obfuscation. Zbl 1382.94107
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Zhandry, Mark
41
2016
Implementing Gentry’s fully-homomorphic encryption scheme. Zbl 1281.94026
Gentry, Craig; Halevi, Shai
40
2011
Homomorphic evaluation of the AES circuit. Zbl 1296.94117
Gentry, Craig; Halevi, Shai; Smart, Nigel P.
40
2012
Zeroizing without low-level zeroes: new MMAP attacks and their limitations. Zbl 1375.94114
Coron, Jean-Sébastien; Gentry, Craig; Halevi, Shai; Lepoint, Tancrède; Maji, Hemanta K.; Miles, Eric; Raykova, Mariana; Sahai, Amit; Tibouchi, Mehdi
39
2015
Two-round secure MPC from indistinguishability obfuscation. Zbl 1317.94109
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Raykova, Mariana
35
2014
Adaptive security in broadcast encryption systems (with short ciphertexts). Zbl 1239.94073
Gentry, Craig; Waters, Brent
34
2009
Certificate-based encryption and the certificate revocation problem. Zbl 1037.68533
Gentry, Craig
32
2003
(Leveled) fully homomorphic encryption without bootstrapping. Zbl 1347.68121
Brakerski, Zvika; Gentry, Craig; Vaikuntanathan, Vinod
30
2014
Fully homomorphic encryption with polylog overhead. Zbl 1297.94071
Gentry, Craig; Halevi, Shai; Smart, Nigel P.
28
2012
Garbled RAM revisited. Zbl 1332.94067
Gentry, Craig; Halevi, Shai; Lu, Steve; Ostrovsky, Rafail; Raykova, Mariana; Wichs, Daniel
25
2014
On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input. Zbl 1336.94048
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Wichs, Daniel
25
2014
Cryptanalysis of the revised NTRU signature scheme. Zbl 1055.94015
Gentry, Craig; Szydlo, Mike
23
2002
\(i\)-hop homomorphic encryption and rerandomizable Yao circuits. Zbl 1280.94061
Gentry, Craig; Halevi, Shai; Vaikuntanathan, Vinod
23
2010
Single-database private information retrieval with constant communication rate. Zbl 1084.68043
Gentry, Craig; Ramzan, Zulfikar
21
2005
Fully homomorphic encryption without squashing using depth-3 arithmetic circuits. Zbl 1292.94066
Gentry, Craig; Halevi, Shai
19
2011
Hierarchical identity based encryption with polynomially many levels. Zbl 1213.94102
Gentry, Craig; Halevi, Shai
18
2009
Better bootstrapping in fully homomorphic encryption. Zbl 1290.94077
Gentry, Craig; Halevi, Shai; Smart, Nigel P.
17
2012
Witness encryption from instance independent assumptions. Zbl 1345.94064
Gentry, Craig; Lewko, Allison; Waters, Brent
17
2014
Optimizing ORAM and using it efficiently for secure computation. Zbl 1315.94075
Gentry, Craig; Goldman, Kenny A.; Halevi, Shai; Julta, Charanjit; Raykova, Mariana; Wichs, Daniel
16
2013
Cryptanalyses of candidate branching program obfuscators. Zbl 1415.94418
Chen, Yilei; Gentry, Craig; Halevi, Shai
15
2017
A simple BGN-type cryptosystem from LWE. Zbl 1280.94060
Gentry, Craig; Halevi, Shai; Vaikuntanathan, Vinod
14
2010
Private database access with HE-over-ORAM architecture. Zbl 1459.68057
Gentry, Craig; Halevi, Shai; Jutla, Charanjit; Raykova, Mariana
12
2015
Key recovery and message attacks on NTRU-composite. Zbl 0981.94013
Gentry, Craig
10
2001
Identity-based aggregate signatures. Zbl 1151.94511
Gentry, Craig; Ramzan, Zulfikar
9
2006
Cryptanalysis of the NTRU signature scheme (NSS) from EUROCRYPT 2001. Zbl 1062.94547
Gentry, Craig; Jonsson, Jakob; Stern, Jacques; Szydlo, Michael
8
2001
Packed ciphertexts in LWE-based homomorphic encryption. Zbl 1314.94058
Brakerski, Zvika; Gentry, Craig; Halevi, Shai
8
2013
Computing arbitrary functions of encrypted data. Zbl 1315.94074
Gentry, Craig
8
2010
Ring switching in BGV-style homomorphic encryption. Zbl 1310.94147
Gentry, Craig; Halevi, Shai; Peikert, Chris; Smart, Nigel P.
7
2012
Compressible FHE with applications to PIR. Zbl 1455.94158
Gentry, Craig; Halevi, Shai
7
2019
Private database queries using somewhat homomorphic encryption. Zbl 1330.94037
Boneh, Dan; Gentry, Craig; Halevi, Shai; Wang, Frank; Wu, David J.
6
2013
Discrete Gaussian leftover hash lemma over infinite domains. Zbl 1320.94059
Agrawal, Shweta; Gentry, Craig; Halevi, Shai; Sahai, Amit
6
2013
A method for making password-based key exchange resilient to server compromise. Zbl 1161.68440
Gentry, Craig; MacKenzie, Philip; Ramzan, Zulfikar
5
2006
Can a public blockchain keep a secret? Zbl 1479.94293
Benhamouda, Fabrice; Gentry, Craig; Gorbunov, Sergey; Halevi, Shai; Krawczyk, Hugo; Lin, Chengyu; Rabin, Tal; Reyzin, Leonid
5
2020
Using fully homomorphic hybrid encryption to minimize non-interative zero-knowledge proofs. Zbl 1332.94066
Gentry, Craig; Groth, Jens; Ishai, Yuval; Peikert, Chris; Sahai, Amit; Smith, Adam
4
2015
Efficient designated confirmer signatures without random oracles or general zero-knowledge proofs. Zbl 1154.94454
Gentry, Craig; Molnar, David; Ramzan, Zulfikar
4
2005
Homomorphic encryption for finite automata. Zbl 1455.94157
Genise, Nicholas; Gentry, Craig; Halevi, Shai; Li, Baiyu; Micciancio, Daniele
4
2019
How to compress Rabin ciphertexts and signatures (and more). Zbl 1104.68045
Gentry, Craig
3
2004
Eliminating random permutation oracles in the Even-Mansour cipher. Zbl 1094.94030
Gentry, Craig; Ramzan, Zulfikar
2
2004
QuasiModo: Efficient certificate validation and revocation. Zbl 1198.94147
Elwailly, Farid F.; Gentry, Craig; Ramzan, Zulfikar
2
2004
RSA accumulator based broadcast encryption. Zbl 1109.68453
Gentry, Craig; Ramzan, Zulfikar
2
2004
A unified framework for trapdoor-permutation-based sequential aggregate signatures. Zbl 1406.94058
Gentry, Craig; O’Neill, Adam; Reyzin, Leonid
1
2018
Computing on encrypted data. (Abstract). Zbl 1287.94068
Gentry, Craig
1
2009
On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input. Zbl 1405.94064
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Wichs, Daniel
1
2017
Computing on the edge of chaos: structure and randomness in encrypted computation. Zbl 1373.68225
Gentry, Craig
1
2014
Can a public blockchain keep a secret? Zbl 1479.94293
Benhamouda, Fabrice; Gentry, Craig; Gorbunov, Sergey; Halevi, Shai; Krawczyk, Hugo; Lin, Chengyu; Rabin, Tal; Reyzin, Leonid
5
2020
Compressible FHE with applications to PIR. Zbl 1455.94158
Gentry, Craig; Halevi, Shai
7
2019
Homomorphic encryption for finite automata. Zbl 1455.94157
Genise, Nicholas; Gentry, Craig; Halevi, Shai; Li, Baiyu; Micciancio, Daniele
4
2019
A unified framework for trapdoor-permutation-based sequential aggregate signatures. Zbl 1406.94058
Gentry, Craig; O’Neill, Adam; Reyzin, Leonid
1
2018
Cryptanalyses of candidate branching program obfuscators. Zbl 1415.94418
Chen, Yilei; Gentry, Craig; Halevi, Shai
15
2017
On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input. Zbl 1405.94064
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Wichs, Daniel
1
2017
Candidate indistinguishability obfuscation and functional encryption for all circuits. Zbl 1348.94048
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Raykova, Mariana; Sahai, Amit; Waters, Brent
208
2016
Functional encryption without obfuscation. Zbl 1382.94107
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Zhandry, Mark
41
2016
Graph-induced multilinear maps from lattices. Zbl 1315.94076
Gentry, Craig; Gorbunov, Sergey; Halevi, Shai
47
2015
Zeroizing without low-level zeroes: new MMAP attacks and their limitations. Zbl 1375.94114
Coron, Jean-Sébastien; Gentry, Craig; Halevi, Shai; Lepoint, Tancrède; Maji, Hemanta K.; Miles, Eric; Raykova, Mariana; Sahai, Amit; Tibouchi, Mehdi
39
2015
Private database access with HE-over-ORAM architecture. Zbl 1459.68057
Gentry, Craig; Halevi, Shai; Jutla, Charanjit; Raykova, Mariana
12
2015
Using fully homomorphic hybrid encryption to minimize non-interative zero-knowledge proofs. Zbl 1332.94066
Gentry, Craig; Groth, Jens; Ishai, Yuval; Peikert, Chris; Sahai, Amit; Smith, Adam
4
2015
Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits. Zbl 1327.94035
Boneh, Dan; Gentry, Craig; Gorbunov, Sergey; Halevi, Shai; Nikolaenko, Valeria; Segev, Gil; Vaikuntanathan, Vinod; Vinayagamurthy, Dhinakaran
65
2014
Two-round secure MPC from indistinguishability obfuscation. Zbl 1317.94109
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Raykova, Mariana
35
2014
(Leveled) fully homomorphic encryption without bootstrapping. Zbl 1347.68121
Brakerski, Zvika; Gentry, Craig; Vaikuntanathan, Vinod
30
2014
Garbled RAM revisited. Zbl 1332.94067
Gentry, Craig; Halevi, Shai; Lu, Steve; Ostrovsky, Rafail; Raykova, Mariana; Wichs, Daniel
25
2014
On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input. Zbl 1336.94048
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Wichs, Daniel
25
2014
Witness encryption from instance independent assumptions. Zbl 1345.94064
Gentry, Craig; Lewko, Allison; Waters, Brent
17
2014
Computing on the edge of chaos: structure and randomness in encrypted computation. Zbl 1373.68225
Gentry, Craig
1
2014
Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based. Zbl 1310.94148
Gentry, Craig; Sahai, Amit; Waters, Brent
148
2013
Candidate multilinear maps from ideal lattices. Zbl 1300.94055
Garg, Sanjam; Gentry, Craig; Halevi, Shai
124
2013
Quadratic span programs and succinct NIZKs without PCPs. Zbl 1300.94056
Gennaro, Rosario; Gentry, Craig; Parno, Bryan; Raykova, Mariana
55
2013
Witness encryption and its applications. Zbl 1293.94066
Garg, Sanjam; Gentry, Craig; Sahai, Amit; Waters, Brent
49
2013
Attribute-based encryption for circuits from multilinear maps. Zbl 1311.94080
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Sahai, Amit; Waters, Brent
42
2013
Optimizing ORAM and using it efficiently for secure computation. Zbl 1315.94075
Gentry, Craig; Goldman, Kenny A.; Halevi, Shai; Julta, Charanjit; Raykova, Mariana; Wichs, Daniel
16
2013
Packed ciphertexts in LWE-based homomorphic encryption. Zbl 1314.94058
Brakerski, Zvika; Gentry, Craig; Halevi, Shai
8
2013
Private database queries using somewhat homomorphic encryption. Zbl 1330.94037
Boneh, Dan; Gentry, Craig; Halevi, Shai; Wang, Frank; Wu, David J.
6
2013
Discrete Gaussian leftover hash lemma over infinite domains. Zbl 1320.94059
Agrawal, Shweta; Gentry, Craig; Halevi, Shai; Sahai, Amit
6
2013
(Leveled) fully homomorphic encryption without bootstrapping. Zbl 1347.68120
Brakerski, Zvika; Gentry, Craig; Vaikuntanathan, Vinod
150
2012
Homomorphic evaluation of the AES circuit. Zbl 1296.94117
Gentry, Craig; Halevi, Shai; Smart, Nigel P.
40
2012
Fully homomorphic encryption with polylog overhead. Zbl 1297.94071
Gentry, Craig; Halevi, Shai; Smart, Nigel P.
28
2012
Better bootstrapping in fully homomorphic encryption. Zbl 1290.94077
Gentry, Craig; Halevi, Shai; Smart, Nigel P.
17
2012
Ring switching in BGV-style homomorphic encryption. Zbl 1310.94147
Gentry, Craig; Halevi, Shai; Peikert, Chris; Smart, Nigel P.
7
2012
Separating succinct non-interactive arguments from all falsifiable assumptions. Zbl 1288.94063
Gentry, Craig; Wichs, Daniel
53
2011
Implementing Gentry’s fully-homomorphic encryption scheme. Zbl 1281.94026
Gentry, Craig; Halevi, Shai
40
2011
Fully homomorphic encryption without squashing using depth-3 arithmetic circuits. Zbl 1292.94066
Gentry, Craig; Halevi, Shai
19
2011
Fully homomorphic encryption over the integers. Zbl 1279.94130
van Dijk, Marten; Gentry, Craig; Halevi, Shai; Vaikuntanathan, Vinod
94
2010
Non-interactive verifiable computing: outsourcing computation to untrusted workers. Zbl 1284.68065
Gennaro, Rosario; Gentry, Craig; Parno, Bryan
70
2010
Toward basing fully homomorphic encryption on worst-case hardness. Zbl 1280.94059
Gentry, Craig
54
2010
\(i\)-hop homomorphic encryption and rerandomizable Yao circuits. Zbl 1280.94061
Gentry, Craig; Halevi, Shai; Vaikuntanathan, Vinod
23
2010
A simple BGN-type cryptosystem from LWE. Zbl 1280.94060
Gentry, Craig; Halevi, Shai; Vaikuntanathan, Vinod
14
2010
Computing arbitrary functions of encrypted data. Zbl 1315.94074
Gentry, Craig
8
2010
Fully homomorphic encryption using ideal lattices. Zbl 1304.94059
Gentry, Craig
348
2009
Adaptive security in broadcast encryption systems (with short ciphertexts). Zbl 1239.94073
Gentry, Craig; Waters, Brent
34
2009
Hierarchical identity based encryption with polynomially many levels. Zbl 1213.94102
Gentry, Craig; Halevi, Shai
18
2009
Computing on encrypted data. (Abstract). Zbl 1287.94068
Gentry, Craig
1
2009
Trapdoors for hard lattices and new cryptographic constructions. Zbl 1231.68124
Gentry, Craig; Peikert, Chris; Vaikuntanainan, Vinod
299
2008
Practical identity-based encryption without random oracles. Zbl 1140.94340
Gentry, Craig
95
2006
Identity-based aggregate signatures. Zbl 1151.94511
Gentry, Craig; Ramzan, Zulfikar
9
2006
A method for making password-based key exchange resilient to server compromise. Zbl 1161.68440
Gentry, Craig; MacKenzie, Philip; Ramzan, Zulfikar
5
2006
Collusion resistant broadcast encryption with short ciphertexts and private keys. Zbl 1145.94434
Boneh, Dan; Gentry, Craig; Waters, Brent
95
2005
Single-database private information retrieval with constant communication rate. Zbl 1084.68043
Gentry, Craig; Ramzan, Zulfikar
21
2005
Efficient designated confirmer signatures without random oracles or general zero-knowledge proofs. Zbl 1154.94454
Gentry, Craig; Molnar, David; Ramzan, Zulfikar
4
2005
How to compress Rabin ciphertexts and signatures (and more). Zbl 1104.68045
Gentry, Craig
3
2004
Eliminating random permutation oracles in the Even-Mansour cipher. Zbl 1094.94030
Gentry, Craig; Ramzan, Zulfikar
2
2004
QuasiModo: Efficient certificate validation and revocation. Zbl 1198.94147
Elwailly, Farid F.; Gentry, Craig; Ramzan, Zulfikar
2
2004
RSA accumulator based broadcast encryption. Zbl 1109.68453
Gentry, Craig; Ramzan, Zulfikar
2
2004
Aggregate and verifiably encrypted signatures from bilinear maps. Zbl 1038.94553
Boneh, Dan; Gentry, Craig; Lynn, Ben; Shacham, Hovav
93
2003
Certificate-based encryption and the certificate revocation problem. Zbl 1037.68533
Gentry, Craig
32
2003
Hierarchical ID-based cryptography. Zbl 1065.94547
Gentry, Craig; Silverberg, Alice
84
2002
Cryptanalysis of the revised NTRU signature scheme. Zbl 1055.94015
Gentry, Craig; Szydlo, Mike
23
2002
Key recovery and message attacks on NTRU-composite. Zbl 0981.94013
Gentry, Craig
10
2001
Cryptanalysis of the NTRU signature scheme (NSS) from EUROCRYPT 2001. Zbl 1062.94547
Gentry, Craig; Jonsson, Jakob; Stern, Jacques; Szydlo, Michael
8
2001
all top 5

Cited by 2,007 Authors

41 Susilo, Willy
25 Mu, Yi
24 Waters, Brent
24 Zhandry, Mark
23 Sahai, Amit
22 Brakerski, Zvika
21 Libert, Benoît
20 Wang, Huaxiong
19 Vaikuntanathan, Vinod
18 Wichs, Daniel
17 Ishai, Yuval
17 Segev, Gil
15 Garg, Sanjam
15 Hanaoka, Goichiro
14 Bitansky, Nir
14 Cheon, Jung Hee
14 Komargodski, Ilan
13 Canetti, Ran
13 Gentry, Craig
13 Guo, Fuchun
13 Halevi, Shai
13 Lee, Kwangsu
13 Ling, San
13 Nguyen, Khoa
13 Smart, Nigel P.
13 Wee, Hoeteck
12 Ananth, Prabhanjan Vijendra
12 Hu, Yupu
12 Lin, Huijia
12 Stehlé, Damien
12 Tibouchi, Mehdi
11 Fiore, Dario
11 Fouque, Pierre-Alain
11 Hofheinz, Dennis
11 Khurana, Dakshita
11 Nishimaki, Ryo
11 Pass, Rafael
11 Srinivasan, Akshayaram
11 Yung, Moti
10 Chen, Yilei
10 Chiesa, Alessandro
10 Emura, Keita
10 Farshim, Pooya
10 Ostrovsky, Rafail
10 Park, Jonghwan
10 Peikert, Chris
10 Tanaka, Keisuke
10 Weng, Jian
10 Yamada, Shota
9 Abdalla, Michel
9 Albrecht, Martin R.
9 Attrapadung, Nuttapong
9 Boneh, Dan
9 Catalano, Dario
9 Gu, Dawu
9 Hazay, Carmit
9 Jain, Aayush
9 Lepoint, Tancrède
9 Paneth, Omer
9 Pointcheval, David
9 Rosen, Alon
9 Seo, Jae Hong
9 Watanabe, Yodai
9 Wu, Qianhong
9 Yang, Bo
8 Boyen, Xavier
8 Chen, Jie
8 Chen, Kefei
8 Dutta, Ratna
8 Huang, Xinyi
8 Kiltz, Eike
8 Li, Jiguo
8 Liu, Shengli
8 Mohassel, Payman
8 Vercauteren, Frederik
8 Yu, Jia
8 Zhang, Jiang
8 Zhang, Zhenfeng
7 Asharov, Gilad
7 Au, Man Ho
7 Bellare, Mihir
7 Cao, Zhenfu
7 Domingo-Ferrer, Josep
7 Gilboa, Niv
7 Jager, Tibor
7 Jain, Abhishek
7 Katsumata, Shuichi
7 Lu, Yang
7 Lyubashevsky, Vadim
7 Matsuda, Takahiro
7 Neven, Gregory
7 Orlandi, Claudio
7 Roux-Langlois, Adeline
7 Wang, Baocang
7 Xagawa, Keita
7 Yogev, Eylon
6 Agrawal, Shweta
6 Applebaum, Benny
6 Boyle, Elette
6 Chen, Yu
...and 1,907 more Authors
all top 5

Cited in 86 Serials

94 Information Sciences
88 Journal of Cryptology
81 Theoretical Computer Science
70 Designs, Codes and Cryptography
20 SIAM Journal on Computing
20 Journal of Mathematical Cryptology
13 Information Processing Letters
12 Journal of Computer and System Sciences
12 International Journal of Foundations of Computer Science
9 Mathematical Problems in Engineering
8 Soft Computing
8 Cryptography and Communications
7 Algorithmica
7 Information and Computation
6 Applicable Algebra in Engineering, Communication and Computing
6 Wuhan University Journal of Natural Sciences (WUJNS)
6 Frontiers of Computer Science
6 Computer Science Review
5 Computing
5 Cybernetics and Systems Analysis
5 Advances in Mathematics of Communications
4 International Journal of Computer Mathematics
4 Computational Complexity
4 LMS Journal of Computation and Mathematics
4 Journal of Applied Mathematics
4 Quantum Information Processing
4 Mathematical Biosciences and Engineering
4 Science China. Information Sciences
4 Symmetry
3 Computers & Mathematics with Applications
3 Discrete Applied Mathematics
3 International Journal of Theoretical Physics
3 Moscow University Computational Mathematics and Cybernetics
3 Mathematical and Computer Modelling
3 SIAM Journal on Discrete Mathematics
3 Journal of Mathematical Sciences (New York)
3 Journal of Shanghai Jiaotong University (Science)
3 SIAM Journal on Applied Algebra and Geometry
2 Mathematics of Computation
2 Applied Mathematics and Computation
2 Journal of Number Theory
2 Journal of Symbolic Computation
2 Journal of Computer Science and Technology
2 Japan Journal of Industrial and Applied Mathematics
2 The Journal of Artificial Intelligence Research (JAIR)
2 Theory of Computing Systems
2 Informatica (Vilnius)
2 Journal of Discrete Mathematical Sciences & Cryptography
2 Journal of Systems Science and Complexity
2 Science in China. Series F
2 Mathematics in Computer Science
2 ACM Transactions on Computation Theory
2 Matematicheskie Voprosy Kriptografii
1 Discrete Mathematics
1 IEEE Transactions on Information Theory
1 Journal of the Franklin Institute
1 Automatica
1 Journal of Computational and Applied Mathematics
1 Journal of Functional Analysis
1 Journal of the Korean Mathematical Society
1 Programming and Computer Software
1 Transactions of the American Mathematical Society
1 Chinese Annals of Mathematics. Series B
1 Formal Aspects of Computing
1 Journal of Parallel and Distributed Computing
1 Machine Learning
1 Journal of Global Optimization
1 Computational Statistics
1 Journal of Statistical Computation and Simulation
1 Distributed Computing
1 Tatra Mountains Mathematical Publications
1 Rad Hrvatske Akademije Znanosti i Umjetnosti. Matematičke Znanosti
1 Turkish Journal of Mathematics
1 Finite Fields and their Applications
1 Complexity
1 Interdisciplinary Information Sciences (IIS)
1 Fundamenta Informaticae
1 JP Journal of Algebra, Number Theory and Applications
1 Journal of Discrete Algorithms
1 International Journal of Number Theory
1 Optimization Letters
1 Groups, Complexity, Cryptology
1 Science China. Mathematics
1 Pacific Journal of Mathematics for Industry
1 Open Mathematics
1 Mathematical Foundations of Computing

Citations by Year

The data are displayed as stored in Wikidata under a Creative Commons CC0 License. Updates and corrections should be made in Wikidata.