Neal Koblitz

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Concrete analysis of approximate ideal-SIVP to decision ring-LWE reduction
Advances in Mathematics of Communications
2024-08-06Paper
Cryptanalysis of ``MAKE''
Journal of Mathematical Cryptology
2022-03-15Paper
Critical perspectives on provable security: fifteen years of ``another look'' papers
Advances in Mathematics of Communications
2019-09-19Paper
One bad formula can spoil everything: a simple adjustment that would improve the UN's gender inequality index
The Mathematical Intelligencer
2019-07-26Paper
Another look at tightness. II: Practical issues in cryptography2017-10-23Paper
Cryptocash, cryptocurrencies, and cryptocontracts
Designs, Codes and Cryptography
2016-02-02Paper
The random oracle model: a twenty-year retrospective
Designs, Codes and Cryptography
2015-10-26Paper
Another Look at Security Theorems for 1-Key Nested MACs
Open Problems in Mathematics and Computational Science
2015-06-22Paper
Another look at non-uniformity
Groups - Complexity - Cryptology
2014-05-02Paper
Grothendieck's 1967 lectures in the forest in Vietnam
The Mathematical Intelligencer
2013-11-27Paper
Another look at HMAC
Journal of Mathematical Cryptology
2013-11-12Paper
Another look at security definitions
Advances in Mathematics of Communications
2013-05-06Paper
Crypto galore!
The Multivariate Algorithmic Revolution and Beyond
2012-09-05Paper
Discrete logarithms, Diffie-Hellman, and reductions
Vietnam Journal of Mathematics
2012-03-29Paper
Another look at automated theorem-proving. II
Journal of Mathematical Cryptology
2012-03-22Paper
``The word for world is forest'': a long-range funding source for women in math in developing countries
The Mathematical Intelligencer
2012-01-29Paper
Interview with Professor Ngô Báo Châu
The Mathematical Intelligencer
2011-05-19Paper
Elliptic curve cryptography: the serpentine course of a paradigm shift
Journal of Number Theory
2011-04-08Paper
Intractable problems in cryptography2011-01-03Paper
Getting a Few Things Right and Many Things Wrong
Progress in Cryptology - INDOCRYPT 2010
2010-12-07Paper
scientific article; zbMATH DE number 5783623 (Why is no real title available?)2010-09-10Paper
Secret Codes and Online Security: A Seminar for Entering Students
Cryptologia
2010-08-17Paper
The brave new world of bodacious assumptions in cryptography2010-05-25Paper
Another look at non-standard discrete log and Diffie-Hellman problems
Journal of Mathematical Cryptology
2009-03-03Paper
Another Look at “Provable Security”. II
Progress in Cryptology - INDOCRYPT 2006
2008-04-11Paper
scientific article; zbMATH DE number 5251082 (Why is no real title available?)2008-03-19Paper
Another look at automated theorem-proving
Journal of Mathematical Cryptology
2008-02-21Paper
Random Curves2007-09-11Paper
Another look at ``provable security''
Journal of Cryptology
2007-05-24Paper
Another look at generic groups
Advances in Mathematics of Communications
2007-04-05Paper
Cryptography and Coding
Lecture Notes in Computer Science
2006-11-01Paper
Algebraic aspects of cryptography. With an appendix on hyperelliptic curves by Alfred J. Menezes, Yi-Hong Wu, and Robert J. Zuccherato
Algorithms and Computation in Mathematics
2005-09-12Paper
A Survey of Public-Key Cryptosystems
SIAM Review
2005-02-25Paper
Obstacles to the torsion-subgroup attack on the decision Diffie-Hellman Problem
Mathematics of Computation
2004-08-13Paper
scientific article; zbMATH DE number 1687033 (Why is no real title available?)2003-03-08Paper
The state of elliptic curve cryptography
Designs, Codes and Cryptography
2002-10-22Paper
Almost Primality of Group Orders of Elliptic Curves Defined over Small Finite Fields
Experimental Mathematics
2002-09-12Paper
Almost Primality of Group Orders of Elliptic Curves Defined over Small Finite Fields
Experimental Mathematics
2002-09-12Paper
scientific article; zbMATH DE number 1532364 (Why is no real title available?)2002-07-09Paper
scientific article; zbMATH DE number 1916825 (Why is no real title available?)2002-01-01Paper
scientific article; zbMATH DE number 1302857 (Why is no real title available?)2001-11-02Paper
Analysis of the Xedni calculus attack
Designs, Codes and Cryptography
2000-11-20Paper
scientific article; zbMATH DE number 708819 (Why is no real title available?)1999-08-30Paper
Lattice basis reduction, Jacobi sums and hyperelliptic cryptosystems
Bulletin of the Australian Mathematical Society
1999-06-23Paper
The improbability that an elliptic curve has subexponential discrete log problem under the Menezes-Okamoto-Vanstone algorithm
Journal of Cryptology
1998-10-25Paper
CRYPTOGRAPHY AS A TEACHING TOOL
Cryptologia
1998-04-02Paper
Algebraic aspects of cryptography. With an appendix on hyperelliptic curves by Alfred J. Menezes, Yi-Hong Wu, and Robert J. Zuccherato
Algorithms and Computation in Mathematics
1998-02-08Paper
The case against computers in K-13 math education (Kindergarten through calculus)
The Mathematical Intelligencer
1996-10-21Paper
scientific article; zbMATH DE number 687687 (Why is no real title available?)1995-09-06Paper
scientific article; zbMATH DE number 729316 (Why is no real title available?)1995-03-02Paper
scientific article; zbMATH DE number 691465 (Why is no real title available?)1995-02-19Paper
scientific article; zbMATH DE number 707175 (Why is no real title available?)1995-01-02Paper
scientific article; zbMATH DE number 682387 (Why is no real title available?)1994-11-06Paper
scientific article; zbMATH DE number 503190 (Why is no real title available?)1994-02-17Paper
scientific article; zbMATH DE number 503248 (Why is no real title available?)1994-02-17Paper
scientific article; zbMATH DE number 203646 (Why is no real title available?)1993-06-14Paper
scientific article; zbMATH DE number 176613 (Why is no real title available?)1993-05-18Paper
Self-witnessing polynomial-time complexity and prime factorization
Designs, Codes and Cryptography
1993-01-16Paper
Elliptic curve implementation of zero-knowledge blobs
Journal of Cryptology
1992-06-27Paper
Jacobi Sums, Irreducible Zeta-Polynomials, and Cryptography
Canadian Mathematical Bulletin
1991-01-01Paper
scientific article; zbMATH DE number 4185800 (Why is no real title available?)1990-01-01Paper
Recollections of mathematics in a country under siege
The Mathematical Intelligencer
1990-01-01Paper
scientific article; zbMATH DE number 4158557 (Why is no real title available?)1989-01-01Paper
Hyperelliptic cryptosystems
Journal of Cryptology
1989-01-01Paper
Primality of the number of points on an elliptic curve over a finite field
Pacific Journal of Mathematics
1988-01-01Paper
Elliptic Curve Cryptosystems1987-01-01Paper
scientific article; zbMATH DE number 4057589 (Why is no real title available?)1987-01-01Paper
scientific article; zbMATH DE number 4021047 (Why is no real title available?)1987-01-01Paper
Congruences for periods of modular forms
Duke Mathematical Journal
1987-01-01Paper
p-adic congruences and modular forms of half integer weight
Mathematische Annalen
1986-01-01Paper
Mathematics and the external world: an interview with Prof. A. T. Fomenko
The Mathematical Intelligencer
1986-01-01Paper
p-adic integral transforms on compact subgroups of \({\mathbb{C}}_ p\)
Pacific Journal of Mathematics
1985-01-01Paper
scientific article; zbMATH DE number 3880803 (Why is no real title available?)1984-01-01Paper
scientific article; zbMATH DE number 3803623 (Why is no real title available?)1983-01-01Paper
scientific article; zbMATH DE number 3803623 (Why is no real title available?)1983-01-01Paper
p-Adic Eigen-Eunctions for Kubert Distributions
Canadian Journal of Mathematics
1983-01-01Paper
scientific article; zbMATH DE number 3845710 (Why is no real title available?)1982-01-01Paper
Why Study Equations over Finite Fields?1982-01-01Paper
On Carlitz's \(q\)-Bernoulli numbers
Journal of Number Theory
1982-01-01Paper
q-Extension of the p-Adic Gamma Function. II
Transactions of the American Mathematical Society
1982-01-01Paper
p-adic analog of Heine's hypergeometric q-series
Pacific Journal of Mathematics
1982-01-01Paper
scientific article; zbMATH DE number 3685609 (Why is no real title available?)1980-01-01Paper
scientific article; zbMATH DE number 3702808 (Why is no real title available?)1980-01-01Paper
q-Extension of the p-Adic Gamma Function
Transactions of the American Mathematical Society
1980-01-01Paper
The p-Adic Approach to Solutions of Equations Over Finite Fields
The American Mathematical Monthly
1980-01-01Paper
scientific article; zbMATH DE number 3702784 (Why is no real title available?)1979-01-01Paper
Gauss sums and the p-adic \(\Gamma\)-function
Annals of Mathematics. Second Series
1979-01-01Paper
A new proof of certain formulas for p-adic L-functions
Duke Mathematical Journal
1979-01-01Paper
Simple Factors in the Jacobian of a Fermat Curve
Canadian Journal of Mathematics
1978-01-01Paper
Gamma function identities and elliptic differentials on Fermat curves
Duke Mathematical Journal
1978-01-01Paper
Interpretation of the p-Adic Log Gamma Function and Euler Constants Using the Bernoulli Measure
Transactions of the American Mathematical Society
1978-01-01Paper
scientific article; zbMATH DE number 3566956 (Why is no real title available?)1977-01-01Paper
2-Adic and 3-Adic Ordinals of (1/<i>j</i> )-Expansion Coefficients for the Weight 2 Eisenstein Series
Bulletin of the London Mathematical Society
1977-01-01Paper
Non-integrality of the periods of cusp forms outside the critical strip
Functional Analysis and Its Applications
1976-01-01Paper
scientific article; zbMATH DE number 3518938 (Why is no real title available?)1975-01-01Paper
scientific article; zbMATH DE number 3518938 (Why is no real title available?)1975-01-01Paper


Research outcomes over time


This page was built for person: Neal Koblitz