Calculated based on number of publications stored in Pure and citations from Scopus
1996 …2022

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2021

    Generating Cryptographically-Strong Random Lattice Bases and Recognizing Rotations of Zn

    Blanks, T. L. & Miller, S. D., 2021, Post-Quantum Cryptography - 12th International Workshop, PQCrypto 2021, Proceedings. Cheon, J. H. & Tillich, J-P. (eds.). Springer Science and Business Media Deutschland GmbH, p. 319-338 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12841 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • 2007

    MV3: A new word based stream cipher using rapid mixing and revolving buffers

    Keller, N., Miller, S. D., Mironov, I. & Venkatesan, R., 2007, Topics in Cryptology: CT-RSA 2007 - The Cryptographers Track at the RSA Conference 2007, Proceedings. Abe, M. (ed.). Springer Verlag, p. 1-19 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4377 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • 2006

    Spectral analysis of Pollard Rho collisions

    Miller, S. D. & Venkatesan, R., 2006, Algorithmic Number Theory - 7th International Symposium, ANTS-VII, Proceedings. Springer Verlag, p. 573-581 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4076 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Scopus citations
  • 2005

    Do all elliptic curves of the same order have the same difficulty of discrete log?

    Jao, D., Miller, S. D. & Venkatesan, R., 2005, Advances in Cryptology - ASIACRYPT 2005 - 11th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. p. 21-40 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3788 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    29 Scopus citations