×

zbMATH — the first resource for mathematics

Gentry, Craig

Compute Distance To:
Author ID: gentry.craig Recent zbMATH articles by "Gentry, Craig"
Published as: Gentry, Craig
External Links: Google Scholar · MGP · Wikidata · dblp
Documents Indexed: 66 Publications since 2001

Publications by Year

Citations contained in zbMATH Open

59 Publications have been cited 2,103 times in 957 Documents Cited by Year
Fully homomorphic encryption using ideal lattices. Zbl 1304.94059
Gentry, Craig
256
2009
Trapdoors for hard lattices and new cryptographic constructions. Zbl 1231.68124
Gentry, Craig; Peikert, Chris; Vaikuntanainan, Vinod
210
2008
Candidate indistinguishability obfuscation and functional encryption for all circuits. Zbl 1348.94048
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Raykova, Mariana; Sahai, Amit; Waters, Brent
146
2016
(Leveled) fully homomorphic encryption without bootstrapping. Zbl 1347.68120
Brakerski, Zvika; Gentry, Craig; Vaikuntanathan, Vinod
109
2012
Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based. Zbl 1310.94148
Gentry, Craig; Sahai, Amit; Waters, Brent
108
2013
Candidate multilinear maps from ideal lattices. Zbl 1300.94055
Garg, Sanjam; Gentry, Craig; Halevi, Shai
103
2013
Practical identity-based encryption without random oracles. Zbl 1140.94340
Gentry, Craig
82
2006
Collusion resistant broadcast encryption with short ciphertexts and private keys. Zbl 1145.94434
Boneh, Dan; Gentry, Craig; Waters, Brent
82
2005
Aggregate and verifiably encrypted signatures from bilinear maps. Zbl 1038.94553
Boneh, Dan; Gentry, Craig; Lynn, Ben; Shacham, Hovav
82
2003
Fully homomorphic encryption over the integers. Zbl 1279.94130
van Dijk, Marten; Gentry, Craig; Halevi, Shai; Vaikuntanathan, Vinod
74
2010
Hierarchical ID-based cryptography. Zbl 1065.94547
Gentry, Craig; Silverberg, Alice
72
2002
Toward basing fully homomorphic encryption on worst-case hardness. Zbl 1280.94059
Gentry, Craig
54
2010
Non-interactive verifiable computing: outsourcing computation to untrusted workers. Zbl 1284.68065
Gennaro, Rosario; Gentry, Craig; Parno, Bryan
54
2010
Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits. Zbl 1327.94035
Boneh, Dan; Gentry, Craig; Gorbunov, Sergey; Halevi, Shai; Nikolaenko, Valeria; Segev, Gil; Vaikuntanathan, Vinod; Vinayagamurthy, Dhinakaran
45
2014
Implementing Gentry’s fully-homomorphic encryption scheme. Zbl 1281.94026
Gentry, Craig; Halevi, Shai
37
2011
Zeroizing without low-level zeroes: new MMAP attacks and their limitations. Zbl 1375.94114
Coron, Jean-Sébastien; Gentry, Craig; Halevi, Shai; Lepoint, Tancrède; Maji, Hemanta K.; Miles, Eric; Raykova, Mariana; Sahai, Amit; Tibouchi, Mehdi
36
2015
Attribute-based encryption for circuits from multilinear maps. Zbl 1311.94080
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Sahai, Amit; Waters, Brent
36
2013
Separating succinct non-interactive arguments from all falsifiable assumptions. Zbl 1288.94063
Gentry, Craig; Wichs, Daniel
32
2011
Functional encryption without obfuscation. Zbl 1382.94107
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Zhandry, Mark
32
2016
Witness encryption and its applications. Zbl 1293.94066
Garg, Sanjam; Gentry, Craig; Sahai, Amit; Waters, Brent
30
2013
Graph-induced multilinear maps from lattices. Zbl 1315.94076
Gentry, Craig; Gorbunov, Sergey; Halevi, Shai
30
2015
Adaptive security in broadcast encryption systems (with short ciphertexts). Zbl 1239.94073
Gentry, Craig; Waters, Brent
29
2009
Certificate-based encryption and the certificate revocation problem. Zbl 1037.68533
Gentry, Craig
25
2003
Homomorphic evaluation of the AES circuit. Zbl 1296.94117
Gentry, Craig; Halevi, Shai; Smart, Nigel P.
25
2012
Two-round secure MPC from indistinguishability obfuscation. Zbl 1317.94109
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Raykova, Mariana
24
2014
Quadratic span programs and succinct NIZKs without PCPs. Zbl 1300.94056
Gennaro, Rosario; Gentry, Craig; Parno, Bryan; Raykova, Mariana
22
2013
On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input. Zbl 1336.94048
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Wichs, Daniel
20
2014
Fully homomorphic encryption with polylog overhead. Zbl 1297.94071
Gentry, Craig; Halevi, Shai; Smart, Nigel P.
19
2012
Hierarchical identity based encryption with polynomially many levels. Zbl 1213.94102
Gentry, Craig; Halevi, Shai
18
2009
Cryptanalysis of the revised NTRU signature scheme. Zbl 1055.94015
Gentry, Craig; Szydlo, Mike
17
2002
\(i\)-hop homomorphic encryption and rerandomizable Yao circuits. Zbl 1280.94061
Gentry, Craig; Halevi, Shai; Vaikuntanathan, Vinod
16
2010
Garbled RAM revisited. Zbl 1332.94067
Gentry, Craig; Halevi, Shai; Lu, Steve; Ostrovsky, Rafail; Raykova, Mariana; Wichs, Daniel
16
2014
Single-database private information retrieval with constant communication rate. Zbl 1084.68043
Gentry, Craig; Ramzan, Zulfikar
14
2005
Fully homomorphic encryption without squashing using depth-3 arithmetic circuits. Zbl 1292.94066
Gentry, Craig; Halevi, Shai
14
2011
Witness encryption from instance independent assumptions. Zbl 1345.94064
Gentry, Craig; Lewko, Allison; Waters, Brent
12
2014
(Leveled) fully homomorphic encryption without bootstrapping. Zbl 1347.68121
Brakerski, Zvika; Gentry, Craig; Vaikuntanathan, Vinod
12
2014
Better bootstrapping in fully homomorphic encryption. Zbl 1290.94077
Gentry, Craig; Halevi, Shai; Smart, Nigel P.
11
2012
A simple BGN-type cryptosystem from LWE. Zbl 1280.94060
Gentry, Craig; Halevi, Shai; Vaikuntanathan, Vinod
10
2010
Optimizing ORAM and using it efficiently for secure computation. Zbl 1315.94075
Gentry, Craig; Goldman, Kenny A.; Halevi, Shai; Julta, Charanjit; Raykova, Mariana; Wichs, Daniel
10
2013
Identity-based aggregate signatures. Zbl 1151.94511
Gentry, Craig; Ramzan, Zulfikar
8
2006
Computing arbitrary functions of encrypted data. Zbl 1315.94074
Gentry, Craig
7
2010
Packed ciphertexts in LWE-based homomorphic encryption. Zbl 1314.94058
Brakerski, Zvika; Gentry, Craig; Halevi, Shai
7
2013
Private database access with HE-over-ORAM architecture. Zbl 1459.68057
Gentry, Craig; Halevi, Shai; Jutla, Charanjit; Raykova, Mariana
7
2015
Key recovery and message attacks on NTRU-composite. Zbl 0981.94013
Gentry, Craig
6
2001
Cryptanalysis of the NTRU signature scheme (NSS) from EUROCRYPT 2001. Zbl 1062.94547
Gentry, Craig; Jonsson, Jakob; Stern, Jacques; Szydlo, Michael
6
2001
Cryptanalyses of candidate branching program obfuscators. Zbl 1415.94418
Chen, Yilei; Gentry, Craig; Halevi, Shai
6
2017
Ring switching in BGV-style homomorphic encryption. Zbl 1310.94147
Gentry, Craig; Halevi, Shai; Peikert, Chris; Smart, Nigel P.
5
2012
Private database queries using somewhat homomorphic encryption. Zbl 1330.94037
Boneh, Dan; Gentry, Craig; Halevi, Shai; Wang, Frank; Wu, David J.
5
2013
Efficient designated confirmer signatures without random oracles or general zero-knowledge proofs. Zbl 1154.94454
Gentry, Craig; Molnar, David; Ramzan, Zulfikar
4
2005
Discrete Gaussian leftover hash lemma over infinite domains. Zbl 1320.94059
Agrawal, Shweta; Gentry, Craig; Halevi, Shai; Sahai, Amit
4
2013
How to compress Rabin ciphertexts and signatures (and more). Zbl 1104.68045
Gentry, Craig
3
2004
RSA accumulator based broadcast encryption. Zbl 1109.68453
Gentry, Craig; Ramzan, Zulfikar
2
2004
A method for making password-based key exchange resilient to server compromise. Zbl 1161.68440
Gentry, Craig; MacKenzie, Philip; Ramzan, Zulfikar
2
2006
Using fully homomorphic hybrid encryption to minimize non-interative zero-knowledge proofs. Zbl 1332.94066
Gentry, Craig; Groth, Jens; Ishai, Yuval; Peikert, Chris; Sahai, Amit; Smith, Adam
2
2015
Computing on encrypted data. (Abstract). Zbl 1287.94068
Gentry, Craig
1
2009
Eliminating random permutation oracles in the Even-Mansour cipher. Zbl 1094.94030
Gentry, Craig; Ramzan, Zulfikar
1
2004
Computing on the edge of chaos: structure and randomness in encrypted computation. Zbl 1373.68225
Gentry, Craig
1
2014
QuasiModo: Efficient certificate validation and revocation. Zbl 1198.94147
Elwailly, Farid F.; Gentry, Craig; Ramzan, Zulfikar
1
2004
A unified framework for trapdoor-permutation-based sequential aggregate signatures. Zbl 1406.94058
Gentry, Craig; O’Neill, Adam; Reyzin, Leonid
1
2018
A unified framework for trapdoor-permutation-based sequential aggregate signatures. Zbl 1406.94058
Gentry, Craig; O’Neill, Adam; Reyzin, Leonid
1
2018
Cryptanalyses of candidate branching program obfuscators. Zbl 1415.94418
Chen, Yilei; Gentry, Craig; Halevi, Shai
6
2017
Candidate indistinguishability obfuscation and functional encryption for all circuits. Zbl 1348.94048
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Raykova, Mariana; Sahai, Amit; Waters, Brent
146
2016
Functional encryption without obfuscation. Zbl 1382.94107
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Zhandry, Mark
32
2016
Zeroizing without low-level zeroes: new MMAP attacks and their limitations. Zbl 1375.94114
Coron, Jean-Sébastien; Gentry, Craig; Halevi, Shai; Lepoint, Tancrède; Maji, Hemanta K.; Miles, Eric; Raykova, Mariana; Sahai, Amit; Tibouchi, Mehdi
36
2015
Graph-induced multilinear maps from lattices. Zbl 1315.94076
Gentry, Craig; Gorbunov, Sergey; Halevi, Shai
30
2015
Private database access with HE-over-ORAM architecture. Zbl 1459.68057
Gentry, Craig; Halevi, Shai; Jutla, Charanjit; Raykova, Mariana
7
2015
Using fully homomorphic hybrid encryption to minimize non-interative zero-knowledge proofs. Zbl 1332.94066
Gentry, Craig; Groth, Jens; Ishai, Yuval; Peikert, Chris; Sahai, Amit; Smith, Adam
2
2015
Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits. Zbl 1327.94035
Boneh, Dan; Gentry, Craig; Gorbunov, Sergey; Halevi, Shai; Nikolaenko, Valeria; Segev, Gil; Vaikuntanathan, Vinod; Vinayagamurthy, Dhinakaran
45
2014
Two-round secure MPC from indistinguishability obfuscation. Zbl 1317.94109
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Raykova, Mariana
24
2014
On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input. Zbl 1336.94048
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Wichs, Daniel
20
2014
Garbled RAM revisited. Zbl 1332.94067
Gentry, Craig; Halevi, Shai; Lu, Steve; Ostrovsky, Rafail; Raykova, Mariana; Wichs, Daniel
16
2014
Witness encryption from instance independent assumptions. Zbl 1345.94064
Gentry, Craig; Lewko, Allison; Waters, Brent
12
2014
(Leveled) fully homomorphic encryption without bootstrapping. Zbl 1347.68121
Brakerski, Zvika; Gentry, Craig; Vaikuntanathan, Vinod
12
2014
Computing on the edge of chaos: structure and randomness in encrypted computation. Zbl 1373.68225
Gentry, Craig
1
2014
Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based. Zbl 1310.94148
Gentry, Craig; Sahai, Amit; Waters, Brent
108
2013
Candidate multilinear maps from ideal lattices. Zbl 1300.94055
Garg, Sanjam; Gentry, Craig; Halevi, Shai
103
2013
Attribute-based encryption for circuits from multilinear maps. Zbl 1311.94080
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Sahai, Amit; Waters, Brent
36
2013
Witness encryption and its applications. Zbl 1293.94066
Garg, Sanjam; Gentry, Craig; Sahai, Amit; Waters, Brent
30
2013
Quadratic span programs and succinct NIZKs without PCPs. Zbl 1300.94056
Gennaro, Rosario; Gentry, Craig; Parno, Bryan; Raykova, Mariana
22
2013
Optimizing ORAM and using it efficiently for secure computation. Zbl 1315.94075
Gentry, Craig; Goldman, Kenny A.; Halevi, Shai; Julta, Charanjit; Raykova, Mariana; Wichs, Daniel
10
2013
Packed ciphertexts in LWE-based homomorphic encryption. Zbl 1314.94058
Brakerski, Zvika; Gentry, Craig; Halevi, Shai
7
2013
Private database queries using somewhat homomorphic encryption. Zbl 1330.94037
Boneh, Dan; Gentry, Craig; Halevi, Shai; Wang, Frank; Wu, David J.
5
2013
Discrete Gaussian leftover hash lemma over infinite domains. Zbl 1320.94059
Agrawal, Shweta; Gentry, Craig; Halevi, Shai; Sahai, Amit
4
2013
(Leveled) fully homomorphic encryption without bootstrapping. Zbl 1347.68120
Brakerski, Zvika; Gentry, Craig; Vaikuntanathan, Vinod
109
2012
Homomorphic evaluation of the AES circuit. Zbl 1296.94117
Gentry, Craig; Halevi, Shai; Smart, Nigel P.
25
2012
Fully homomorphic encryption with polylog overhead. Zbl 1297.94071
Gentry, Craig; Halevi, Shai; Smart, Nigel P.
19
2012
Better bootstrapping in fully homomorphic encryption. Zbl 1290.94077
Gentry, Craig; Halevi, Shai; Smart, Nigel P.
11
2012
Ring switching in BGV-style homomorphic encryption. Zbl 1310.94147
Gentry, Craig; Halevi, Shai; Peikert, Chris; Smart, Nigel P.
5
2012
Implementing Gentry’s fully-homomorphic encryption scheme. Zbl 1281.94026
Gentry, Craig; Halevi, Shai
37
2011
Separating succinct non-interactive arguments from all falsifiable assumptions. Zbl 1288.94063
Gentry, Craig; Wichs, Daniel
32
2011
Fully homomorphic encryption without squashing using depth-3 arithmetic circuits. Zbl 1292.94066
Gentry, Craig; Halevi, Shai
14
2011
Fully homomorphic encryption over the integers. Zbl 1279.94130
van Dijk, Marten; Gentry, Craig; Halevi, Shai; Vaikuntanathan, Vinod
74
2010
Toward basing fully homomorphic encryption on worst-case hardness. Zbl 1280.94059
Gentry, Craig
54
2010
Non-interactive verifiable computing: outsourcing computation to untrusted workers. Zbl 1284.68065
Gennaro, Rosario; Gentry, Craig; Parno, Bryan
54
2010
\(i\)-hop homomorphic encryption and rerandomizable Yao circuits. Zbl 1280.94061
Gentry, Craig; Halevi, Shai; Vaikuntanathan, Vinod
16
2010
A simple BGN-type cryptosystem from LWE. Zbl 1280.94060
Gentry, Craig; Halevi, Shai; Vaikuntanathan, Vinod
10
2010
Computing arbitrary functions of encrypted data. Zbl 1315.94074
Gentry, Craig
7
2010
Fully homomorphic encryption using ideal lattices. Zbl 1304.94059
Gentry, Craig
256
2009
Adaptive security in broadcast encryption systems (with short ciphertexts). Zbl 1239.94073
Gentry, Craig; Waters, Brent
29
2009
Hierarchical identity based encryption with polynomially many levels. Zbl 1213.94102
Gentry, Craig; Halevi, Shai
18
2009
Computing on encrypted data. (Abstract). Zbl 1287.94068
Gentry, Craig
1
2009
Trapdoors for hard lattices and new cryptographic constructions. Zbl 1231.68124
Gentry, Craig; Peikert, Chris; Vaikuntanainan, Vinod
210
2008
Practical identity-based encryption without random oracles. Zbl 1140.94340
Gentry, Craig
82
2006
Identity-based aggregate signatures. Zbl 1151.94511
Gentry, Craig; Ramzan, Zulfikar
8
2006
A method for making password-based key exchange resilient to server compromise. Zbl 1161.68440
Gentry, Craig; MacKenzie, Philip; Ramzan, Zulfikar
2
2006
Collusion resistant broadcast encryption with short ciphertexts and private keys. Zbl 1145.94434
Boneh, Dan; Gentry, Craig; Waters, Brent
82
2005
Single-database private information retrieval with constant communication rate. Zbl 1084.68043
Gentry, Craig; Ramzan, Zulfikar
14
2005
Efficient designated confirmer signatures without random oracles or general zero-knowledge proofs. Zbl 1154.94454
Gentry, Craig; Molnar, David; Ramzan, Zulfikar
4
2005
How to compress Rabin ciphertexts and signatures (and more). Zbl 1104.68045
Gentry, Craig
3
2004
RSA accumulator based broadcast encryption. Zbl 1109.68453
Gentry, Craig; Ramzan, Zulfikar
2
2004
Eliminating random permutation oracles in the Even-Mansour cipher. Zbl 1094.94030
Gentry, Craig; Ramzan, Zulfikar
1
2004
QuasiModo: Efficient certificate validation and revocation. Zbl 1198.94147
Elwailly, Farid F.; Gentry, Craig; Ramzan, Zulfikar
1
2004
Aggregate and verifiably encrypted signatures from bilinear maps. Zbl 1038.94553
Boneh, Dan; Gentry, Craig; Lynn, Ben; Shacham, Hovav
82
2003
Certificate-based encryption and the certificate revocation problem. Zbl 1037.68533
Gentry, Craig
25
2003
Hierarchical ID-based cryptography. Zbl 1065.94547
Gentry, Craig; Silverberg, Alice
72
2002
Cryptanalysis of the revised NTRU signature scheme. Zbl 1055.94015
Gentry, Craig; Szydlo, Mike
17
2002
Key recovery and message attacks on NTRU-composite. Zbl 0981.94013
Gentry, Craig
6
2001
Cryptanalysis of the NTRU signature scheme (NSS) from EUROCRYPT 2001. Zbl 1062.94547
Gentry, Craig; Jonsson, Jakob; Stern, Jacques; Szydlo, Michael
6
2001
all top 5

Cited by 1,541 Authors

31 Susilo, Willy
25 Mu, Yi
19 Sahai, Amit
18 Waters, Brent
16 Brakerski, Zvika
16 Vaikuntanathan, Vinod
16 Zhandry, Mark
15 Libert, Benoît
14 Segev, Gil
14 Wang, Huaxiong
12 Bitansky, Nir
12 Guo, Fuchun
12 Wichs, Daniel
11 Hu, Yupu
11 Lee, Kwangsu
10 Canetti, Ran
10 Cheon, Jung Hee
10 Garg, Sanjam
10 Hanaoka, Goichiro
10 Hofheinz, Dennis
10 Ishai, Yuval
10 Ling, San
10 Park, Jonghwan
9 Abdalla, Michel
9 Gentry, Craig
9 Lepoint, Tancrède
9 Pass, Rafael
9 Peikert, Chris
9 Smart, Nigel P.
9 Weng, Jian
9 Wu, Qianhong
9 Yang, Bo
8 Ananth, Prabhanjan Vijendra
8 Boneh, Dan
8 Cao, Zhenfu
8 Catalano, Dario
8 Farshim, Pooya
8 Fouque, Pierre-Alain
8 Halevi, Shai
8 Kiltz, Eike
8 Stehlé, Damien
8 Tibouchi, Mehdi
8 Wee, Hoeteck
8 Yu, Jia
7 Au, Man Ho
7 Bellare, Mihir
7 Chen, Jie
7 Chen, Kefei
7 Domingo-Ferrer, Josep
7 Dutta, Ratna
7 Fiore, Dario
7 Gu, Dawu
7 Hazay, Carmit
7 Komargodski, Ilan
7 Li, Jiguo
7 Lin, Huijia
7 Liu, Shengli
7 Mohassel, Payman
7 Nguyen, Khoa
7 Paneth, Omer
7 Pointcheval, David
7 Seo, Jae Hong
7 Yamada, Shota
6 Albrecht, Martin R.
6 Attrapadung, Nuttapong
6 Boyen, Xavier
6 Chen, Yu
6 Gilboa, Niv
6 Herranz, Javier
6 Huang, Xinyi
6 Koppula, Venkata
6 Kunihiro, Noboru
6 Li, Bao
6 Liu, Joseph K. K.
6 Lu, Yang
6 Lyubashevsky, Vadim
6 Neven, Gregory
6 Nishimaki, Ryo
6 Ostrovsky, Rafail
6 Qin, Bo
6 Rothblum, Guy N.
6 Vercauteren, Frederik
6 Wang, Baocang
6 Watanabe, Yodai
6 Wen, Qiaoyan
6 Wong, Duncan S.
6 Wu, David J.
6 Yang, Guomin
6 Yung, Moti
6 Zhang, Mingwu
6 Zhang, Zhenfeng
5 Applebaum, Benny
5 Boyle, Elette
5 Chiesa, Alessandro
5 Chung, Kai-Min
5 Coron, Jean-Sébastien
5 Emura, Keita
5 Fuchsbauer, Georg
5 Garay, Juan A.
5 Gong, Junqing
...and 1,441 more Authors
all top 5

Cited in 74 Serials

88 Information Sciences
80 Journal of Cryptology
64 Theoretical Computer Science
62 Designs, Codes and Cryptography
19 SIAM Journal on Computing
17 Journal of Mathematical Cryptology
12 Information Processing Letters
12 International Journal of Foundations of Computer Science
11 Journal of Computer and System Sciences
9 Mathematical Problems in Engineering
8 Soft Computing
7 Algorithmica
7 Cryptography and Communications
6 Applicable Algebra in Engineering, Communication and Computing
6 Wuhan University Journal of Natural Sciences (WUJNS)
6 Frontiers of Computer Science
5 Computing
5 Information and Computation
5 Cybernetics and Systems Analysis
4 International Journal of Computer Mathematics
4 Computational Complexity
4 LMS Journal of Computation and Mathematics
4 Journal of Applied Mathematics
4 Quantum Information Processing
4 Advances in Mathematics of Communications
4 Symmetry
4 Computer Science Review
3 Computers & Mathematics with Applications
3 Discrete Applied Mathematics
3 Moscow University Computational Mathematics and Cybernetics
3 Mathematical and Computer Modelling
3 SIAM Journal on Discrete Mathematics
3 Science in China. Series F
3 Journal of Shanghai Jiaotong University (Science)
3 Science China. Information Sciences
3 SIAM Journal on Applied Algebra and Geometry
2 Mathematics of Computation
2 Applied Mathematics and Computation
2 Journal of Number Theory
2 Journal of Symbolic Computation
2 Journal of Computer Science and Technology
2 Japan Journal of Industrial and Applied Mathematics
2 Journal of Mathematical Sciences (New York)
2 Theory of Computing Systems
2 Mathematical Biosciences and Engineering
2 Mathematics in Computer Science
2 ACM Transactions on Computation Theory
1 Discrete Mathematics
1 International Journal of Theoretical Physics
1 Journal of the Franklin Institute
1 Automatica
1 Journal of Computational and Applied Mathematics
1 Programming and Computer Software
1 Transactions of the American Mathematical Society
1 Chinese Annals of Mathematics. Series B
1 Formal Aspects of Computing
1 Journal of Parallel and Distributed Computing
1 Journal of Global Optimization
1 Journal of Statistical Computation and Simulation
1 Distributed Computing
1 Tatra Mountains Mathematical Publications
1 Finite Fields and their Applications
1 Complexity
1 Interdisciplinary Information Sciences (IIS)
1 Fundamenta Informaticae
1 Journal of Systems Science and Complexity
1 JP Journal of Algebra, Number Theory and Applications
1 Journal of Discrete Algorithms
1 International Journal of Number Theory
1 Optimization Letters
1 Groups, Complexity, Cryptology
1 Science China. Mathematics
1 Pacific Journal of Mathematics for Industry
1 Open Mathematics

Citations by Year

Wikidata Timeline

The data are displayed as stored in Wikidata under a Creative Commons CC0 License. Updates and corrections should be made in Wikidata.