| Publication | Date of Publication | Type |
|---|
| Security proofs for key-alternating ciphers with non-independent round permutations | 2024-08-01 | Paper |
LMCLAEKS: LWE-assisted multi-recipient certificateless authenticated encryption with keyword search Information Sciences | 2023-09-22 | Paper |
Lighter is better: a lighter multi-client verifiable outsourced computation with hybrid homomorphic encryption Computer Security – ESORICS 2022 | 2023-07-28 | Paper |
| Anonymous IBE from Quadratic Residuosity with Fast Encryption | 2023-03-21 | Paper |
| Tight security analysis of 3-round key-alternating cipher with a single permutation | 2023-03-21 | Paper |
Conjugate adjoining problem in braid groups and new design of braid-based signatures Science China Information Sciences | 2022-10-28 | Paper |
| scientific article; zbMATH DE number 7478099 (Why is no real title available?) | 2022-02-22 | Paper |
| New assumptions and efficient cryptosystems from the \(e\)-th power residue symbol | 2021-06-08 | Paper |
Extended Galbraith's test on the anonymity of IBE schemes from higher residuosity Designs, Codes and Cryptography | 2021-02-10 | Paper |
| Efficient multi-keyword searchable encryption based on multi-input inner-product functional encryption | 2021-01-18 | Paper |
Server-aided directly revocable ciphertext-policy attribute-based encryption with verifiable delegation Information and Communications Security | 2020-07-20 | Paper |
| Efficient collision attack frameworks for RIPEMD-160 | 2020-03-09 | Paper |
DMU-ABSE: dynamic multi-user attribute-based searchable encryption with file deletion and user revocation Communications in Computer and Information Science | 2020-02-20 | Paper |
Proof of Multicopy via Proof of File Position in Cloud Fundamenta Informaticae | 2018-05-03 | Paper |
Accountable CP-ABE with Public Verifiability: How to Effectively Protect the Outsourced Data in Cloud International Journal of Foundations of Computer Science | 2018-02-23 | Paper |
Another generalization of Menon’s identity International Journal of Number Theory | 2017-11-28 | Paper |
Efficient IBE with tight reduction to standard assumption in the multi-challenge setting Advances in Cryptology – ASIACRYPT 2016 | 2017-01-06 | Paper |
Accountable ciphertext-policy attribute-based encryption scheme supporting public verifiability and nonrepudiation Provable Security | 2017-01-06 | Paper |
Efficient Asymmetric Index Encapsulation Scheme for Named Data Provable Security | 2017-01-06 | Paper |
Extended dual system group and shorter unbounded hierarchical identity based encryption Designs, Codes and Cryptography | 2016-07-21 | Paper |
Extended Nested Dual System Groups, Revisited Public-Key Cryptography – PKC 2016 | 2016-04-13 | Paper |
Black-box separations of hash-and-sign signatures in the non-programmable random oracle model Provable Security | 2016-01-27 | Paper |
Constant-round adaptive zero-knowledge proofs for NP Information Sciences | 2016-01-14 | Paper |
Fully collusion-resistant traceable key-policy attribute-based encryption with sub-linear size ciphertexts Information Security and Cryptology | 2015-11-25 | Paper |
Certificate-based proxy decryption systems with revocability in the standard model Information Sciences | 2015-09-24 | Paper |
Large universe ciphertext-policy attribute-based encryption with white-box traceability Computer Security - ESORICS 2014 | 2015-07-27 | Paper |
Post-challenge leakage in public-key encryption Theoretical Computer Science | 2015-02-24 | Paper |
A comment on ``An efficient common-multiplicand-multiplication method to the Montgomery algorithm for speeding up exponentiation Information Sciences | 2014-08-01 | Paper |
All-but-one dual projective hashing and its applications Applied Cryptography and Network Security | 2014-07-07 | Paper |
Blake-Wilson, Johnson \& Menezes protocol revisited Science China Information Sciences | 2013-07-03 | Paper |
Identity based signature scheme based on cubic residues Science China Information Sciences | 2013-07-03 | Paper |
Fuzzy identity based signature with applications to biometric authentication Computers and Electrical Engineering | 2013-05-31 | Paper |
On constant-round concurrent non-malleable proof systems Information Processing Letters | 2013-04-04 | Paper |
Threshold proxy re-signature Journal of Systems Science and Complexity | 2013-01-31 | Paper |
| A short and stateless signature | 2013-01-24 | Paper |
Anonymous Identity-Based Hash Proof System and Its Applications Provable Security | 2012-11-06 | Paper |
Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption Information Sciences | 2012-10-29 | Paper |
Identity-based extractable hash proofs and their applications Applied Cryptography and Network Security | 2012-09-10 | Paper |
Concurrent non-malleable statistically hiding commitment Information Processing Letters | 2012-07-25 | Paper |
| New directions of modern cryptography | 2011-11-30 | Paper |
Fully secure multi-authority ciphertext-policy attribute-based encryption without random oracles Computer Security – ESORICS 2011 | 2011-11-22 | Paper |
New constructions of public-key encryption schemes from conjugacy search problems Information Security and Cryptology | 2011-07-29 | Paper |
| Identity-based proxy re-encryption with threshold multi-proxy | 2011-07-19 | Paper |
Efficient certificateless threshold signatures without random oracles Journal of Systems Science and Complexity | 2011-06-22 | Paper |
Efficient ID-based multi-receiver threshold decryption International Journal of Foundations of Computer Science | 2011-01-06 | Paper |
Multi-use and unidirectional identity-based proxy re-encryption schemes Information Sciences | 2010-09-15 | Paper |
Proxy re-encryption with keyword search Information Sciences | 2010-07-20 | Paper |
Secure threshold multi authority attribute based encryption without a central authority Information Sciences | 2010-07-20 | Paper |
How to Construct Interval Encryption from Binary Tree Encryption Applied Cryptography and Network Security | 2010-07-06 | Paper |
Constant-round concurrent non-malleable statistically binding commitments and decommitments Public Key Cryptography – PKC 2010 | 2010-05-28 | Paper |
An efficient anonymous authentication mechanism for delay tolerant networks Computers and Electrical Engineering | 2010-05-27 | Paper |
An ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key System Security and Privacy in Mobile Information and Communication Systems | 2010-04-24 | Paper |
A model of bilinear-pairings based designated-verifier proxy signatue scheme Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering | 2010-03-04 | Paper |
Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode Science in China. Series F | 2010-03-03 | Paper |
Non-malleable statistically hiding commitment from any one-way function Advances in Cryptology – ASIACRYPT 2009 | 2009-12-15 | Paper |
Spatial encryption under simpler assumption Provable Security | 2009-12-11 | Paper |
An Observation on Non-Malleable Witness-Indistinguishability and Non-Malleable Zero-Knowledge Lecture Notes in Computer Science | 2009-06-03 | Paper |
Chosen Ciphertext Secure Certificateless Threshold Encryption in the Standard Model Information Security and Cryptology | 2009-04-29 | Paper |
A secure identity-based multi-proxy signature scheme Computers and Electrical Engineering | 2009-04-17 | Paper |
A secure identity-based proxy multi-signature scheme Information Sciences | 2009-03-24 | Paper |
CCA-Secure Proxy Re-encryption without Pairings Public Key Cryptography – PKC 2009 | 2009-03-24 | Paper |
An improved identity-based key agreement protocol and its security proof Information Sciences | 2009-03-24 | Paper |
Non-interactive and non-malleable commitment scheme based on \(q\)-one way group homomorphisms Journal of Shanghai Jiaotong University (Science) | 2009-02-03 | Paper |
Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority Progress in Cryptology - INDOCRYPT 2008 | 2009-01-22 | Paper |
The exponential Diophantine equation \(AX^2+BY^2=\lambda k^Z\) and its applications Taiwanese Journal of Mathematics | 2009-01-15 | Paper |
Security Model of Proxy-Multi Signature Schemes Cryptology and Network Security | 2009-01-09 | Paper |
Efficient ID-Based One-Time Proxy Signature and Its Application in E-Cheque Cryptology and Network Security | 2009-01-09 | Paper |
New designing of cryptosystems based on quadratic fields Science in China. Series F | 2008-11-10 | Paper |
A simple deniable authentication protocol based on the Diffie–Hellman algorithm International Journal of Computer Mathematics | 2008-09-24 | Paper |
Designing efficient proxy signature schemes for mobile communication Science in China. Series F | 2008-04-15 | Paper |
Transitive Signatures from Braid Groups Lecture Notes in Computer Science | 2008-04-11 | Paper |
Proxy Re-signature Schemes Without Random Oracles Lecture Notes in Computer Science | 2008-04-11 | Paper |
A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power Lecture Notes in Computer Science | 2008-04-11 | Paper |
Short Group Signature Without Random Oracles Information and Communications Security | 2008-03-25 | Paper |
New \((t, n)\) threshold directed signature scheme with provable security Information Sciences | 2008-01-11 | Paper |
| scientific article; zbMATH DE number 5222384 (Why is no real title available?) | 2008-01-02 | Paper |
Identity-based signature scheme based on quadratic residues Science in China. Series F | 2007-10-12 | Paper |
Survey of information security Science in China. Series F | 2007-10-12 | Paper |
How to construct secure proxy cryptosystem Information Sciences | 2007-10-10 | Paper |
Efficient and Provably Secure Multi-receiver Identity-Based Signcryption Information Security and Privacy | 2007-09-07 | Paper |
| A new ID-based deniable authentication protocol | 2007-08-07 | Paper |
Developing semantic business model for VO construction on semantic grid Wuhan University Journal of Natural Sciences | 2007-06-08 | Paper |
A secure anonymous internet electronic voting scheme based on the polynomial Wuhan University Journal of Natural Sciences | 2007-06-01 | Paper |
Password-based group key agreement protocol for client-server application Wuhan University Journal of Natural Sciences | 2007-06-01 | Paper |
An identity-based strong designated verifier proxy signature scheme Wuhan University Journal of Natural Sciences | 2007-06-01 | Paper |
An efficient provable secure ID-based proxy signature scheme based on CDH assumption Journal of Shanghai Jiaotong University (Science) | 2007-05-09 | Paper |
Theory and Applications of Models of Computation Lecture Notes in Computer Science | 2007-04-30 | Paper |
Simulatability and security of certificateless threshold signatures Information Sciences | 2007-02-20 | Paper |
A new threshold proxy signature scheme from bilinear pairings Science in China. Series F | 2007-02-20 | Paper |
The simultaneous Pell equations y2-Dz2=1 and x2-2Dz2=1 Acta Arithmetica | 2007-02-06 | Paper |
| Cryptanalysis of two signature schemes based on two hard problems | 2007-02-02 | Paper |
An improved deniable authentication protocol Networks | 2007-02-02 | Paper |
| The identity-based authenticated blind signature protocol | 2007-02-02 | Paper |
Combinatorial characterizations of one-coincidence frequency-hopping sequences Designs, Codes and Cryptography | 2006-11-22 | Paper |
Proofs of security for improved Rabin signature scheme Journal of Shanghai Jiaotong University (Science) | 2006-11-15 | Paper |
The braid-based bit commitment protocol Journal of Shanghai Jiaotong University (Science) | 2006-11-15 | Paper |
An ID-based authenticated key agreement protocol for peer-to-peer computing Journal of Shanghai Jiaotong University (Science) | 2006-11-15 | Paper |
A self-encryption remote user anonymous authentication scheme using smart cards Journal of Shanghai Jiaotong University (Science) | 2006-11-15 | Paper |
Cryptology and Network Security Lecture Notes in Computer Science | 2006-11-14 | Paper |
Information Security and Cryptology Lecture Notes in Computer Science | 2006-11-14 | Paper |
Cryptology and Network Security Lecture Notes in Computer Science | 2006-11-14 | Paper |
Cryptology and Network Security Lecture Notes in Computer Science | 2006-11-14 | Paper |
Factoring-Based Proxy Signature Schemes with Forward-Security Computational and Information Science | 2006-10-10 | Paper |
| Existence of \(V(9,t)\) vectors | 2006-09-14 | Paper |
| A kind of signature scheme based on class groups of quadratic fields | 2006-08-28 | Paper |
| Embeddings of resolvable 4-cycle systems | 2006-08-23 | Paper |
Factoring based proxy signature schemes Journal of Computational and Applied Mathematics | 2006-08-04 | Paper |
How to compute modular exponentiation with large operators based on the right-to-left binary algorithm Applied Mathematics and Computation | 2006-06-16 | Paper |
| Robust ID-based threshold signcryption scheme from pairings | 2006-05-26 | Paper |
A dynamic threshold commercial key escrow scheme based on conic Applied Mathematics and Computation | 2006-05-18 | Paper |
| Minimal enclosing of an \(\mathrm{MPT}(v,\lambda)\) in a \(\mathrm{TS}(u,\lambda+1)\) | 2006-03-13 | Paper |
| scientific article; zbMATH DE number 2229691 (Why is no real title available?) | 2005-11-16 | Paper |
| scientific article; zbMATH DE number 2229781 (Why is no real title available?) | 2005-11-16 | Paper |
| scientific article; zbMATH DE number 2229782 (Why is no real title available?) | 2005-11-16 | Paper |
| scientific article; zbMATH DE number 2229817 (Why is no real title available?) | 2005-11-16 | Paper |
| scientific article; zbMATH DE number 2229743 (Why is no real title available?) | 2005-11-16 | Paper |
| scientific article; zbMATH DE number 2229674 (Why is no real title available?) | 2005-11-16 | Paper |
Designated verifier proxy signature scheme with message recovery Applied Mathematics and Computation | 2005-11-14 | Paper |
Improvement on Tzeng et al.'s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification Applied Mathematics and Computation | 2005-11-14 | Paper |
Proxy signature scheme using self-certified public keys Applied Mathematics and Computation | 2005-11-14 | Paper |
Security of Pon-Lu-Jeng's Meta-He digital signature schemes Applied Mathematics and Computation | 2005-11-14 | Paper |
A new efficient \((t,n)\) verifiable multi-secret sharing (VMSS) based on YCH scheme Applied Mathematics and Computation | 2005-11-04 | Paper |
A new deniable authentication protocol from bilinear pairings Applied Mathematics and Computation | 2005-11-04 | Paper |
Improved public key authentication scheme for non-repudiation Applied Mathematics and Computation | 2005-11-04 | Paper |
Remarks on a new key authentication scheme based on discrete logarithms Applied Mathematics and Computation | 2005-10-28 | Paper |
Efficient remote user authentication scheme using smart card Computer Networks | 2005-10-10 | Paper |
| scientific article; zbMATH DE number 2202168 (Why is no real title available?) | 2005-09-05 | Paper |
A robust \((k,n)+1\) threshold proxy signature scheme based on factoring Applied Mathematics and Computation | 2005-08-05 | Paper |
Cryptanalysis of Li-Tzeng-Hwang's improved signature schemes based on factoring and discrete logarithms Applied Mathematics and Computation | 2005-08-05 | Paper |
Super-simple balanced incomplete block designs with block size 4 and index 6 Journal of Statistical Planning and Inference | 2005-06-27 | Paper |
Comment: cryptanalysis of Lee-Hwang-Li's key authentication scheme Applied Mathematics and Computation | 2005-06-13 | Paper |
Proxy blind multi-signature scheme without a secure channel Applied Mathematics and Computation | 2005-05-04 | Paper |
Provably secure proxy-protected signature schemes based on factoring Applied Mathematics and Computation | 2005-05-04 | Paper |
| scientific article; zbMATH DE number 2154971 (Why is no real title available?) | 2005-04-11 | Paper |
Threshold undeniable signature scheme based on conic Applied Mathematics and Computation | 2005-02-22 | Paper |
| scientific article; zbMATH DE number 2112368 (Why is no real title available?) | 2004-10-28 | Paper |
| scientific article; zbMATH DE number 2109525 (Why is no real title available?) | 2004-10-25 | Paper |
Existence of APAV\((q,k)\) with \(q\) a prime power \(\equiv 5 \pmod 8\) and \(k\equiv 1 \pmod 4\). Discrete Mathematics | 2004-03-29 | Paper |
| scientific article; zbMATH DE number 2042810 (Why is no real title available?) | 2004-02-15 | Paper |
Nonrepudiable proxy multi-signature scheme Journal of Computer Science and Technology | 2003-12-09 | Paper |
A new conjecture concerning the Diophantine equation \(x^2+b^y=c^z\). Proceedings of the Japan Academy. Series A | 2003-10-14 | Paper |
An application of a lower bound for linear forms in two logarithms to the Terai–Jeśmanowicz conjecture Acta Arithmetica | 2003-09-28 | Paper |
| scientific article; zbMATH DE number 1895055 (Why is no real title available?) | 2003-09-20 | Paper |
| scientific article; zbMATH DE number 1912084 (Why is no real title available?) | 2003-05-18 | Paper |
On a kind of superelliptic Diophantine equations Journal of Harbin Institute of Technology | 2002-12-08 | Paper |
| scientific article; zbMATH DE number 1471766 (Why is no real title available?) | 2002-10-10 | Paper |
| scientific article; zbMATH DE number 1789813 (Why is no real title available?) | 2002-08-27 | Paper |
The Terai-Jeśmanowicz conjecture on the equation \(a^x+b^y=c^z\) Chinese Annals of Mathematics. Series A | 2002-06-27 | Paper |
On simple \(K_4\)-groups Journal of Algebra | 2002-04-22 | Paper |
On Whiteman's and Storer's difference sets Journal of Statistical Planning and Inference | 2002-02-21 | Paper |
Integral trees of diameter \(R\) \((3\leq R\leq 6)\) Journal of Natural Science of Heilongjiang University | 2002-02-19 | Paper |
Diophantine equations and class numbers of imaginary quadratic fields Discussiones Mathematicae. General Algebra and Applications | 2002-02-19 | Paper |
Some classes of Diophantine equations connected with McFarland's and Ma's conjectures Discussiones Mathematicae. General Algebra and Applications | 2002-02-19 | Paper |
Solutions of a class of Diophantine equations Journal of Natural Science of Heilongjiang University | 2002-02-19 | Paper |
The class numbers of some imaginary quadratic fields and a class of Diophantine equations Journal of Harbin Institute of Technology | 2001-09-20 | Paper |
An Erdős conjecture, Pell sequences and Diophantine equations Journal of Harbin Institute of Technology | 2001-09-20 | Paper |
A generalization of the Schinzel-Sierpiński system of equations Journal of Harbin Institute of Technology | 2001-09-20 | Paper |
Two new systems of decentralized management of cryptographic keys Journal of Harbin Institute of Technology | 2001-09-20 | Paper |
Exponential Diophantine equations of the form \(a^x+b^y=c^z\) Journal of Harbin Institute of Technology | 2001-09-20 | Paper |
A study of some Diophantine equations Journal of Harbin Institute of Technology | 2001-09-20 | Paper |
A discussion on knapsack cryptosystems concealed by a matrix cover Journal of Harbin Institute of Technology | 2001-09-20 | Paper |
On the Diophantine equation \((ax^m-4c)/(abx-4c)=by^2\) Journal of Harbin Institute of Technology | 2001-09-20 | Paper |
On the Diophantine equation \(ax^2+by^2=p^z\) Journal of Harbin Institute of Technology | 2001-09-20 | Paper |
On the Diophantine equation \(ax^m-by^n=4\) Journal of Harbin Institute of Technology | 2001-09-20 | Paper |
Fermat's Last Theorem: A proof of Abel's conjecture Journal of Harbin Institute of Technology | 2001-09-20 | Paper |
The Diophantine equation \(x^{2p}-Dy^2=1\) and the Fermat quotient \(Q_p(m)\) Journal of Harbin Institute of Technology | 2001-09-20 | Paper |
Very high speed deconvolution based on recursively computing discrete Fourier transforms Journal of Harbin Institute of Technology | 2001-09-20 | Paper |
On the number of solutions of Znám's problem Journal of Harbin Institute of Technology | 2001-09-20 | Paper |
\(MD\) error-correcting block cipher systems Journal of Harbin Institute of Technology | 2001-09-20 | Paper |
On the Diophantine equation \(x^3+z^3=Dy^2\) Journal of Harbin Institute of Technology | 2001-09-20 | Paper |
The Diophantine equation \(x^2+b^y=c^z\) Proceedings of the Japan Academy. Series A | 2001-07-22 | Paper |
Diophantine equations and class numbers of real quadratic fields Acta Arithmetica | 2001-06-17 | Paper |
Some remarks on Fermat's equation in the set of matrices Acta Academiae Paedagogicae Agriensis. Nova Series. Sectio Matematicae | 2001-06-12 | Paper |
A new proof of a conjecture of Antoniadis Journal of Number Theory | 2001-04-17 | Paper |
The multi-dimension RSA and its low exponent security Science in China. Series E | 2000-12-12 | Paper |
On the Diophantine equation $x^{p}+2^{2m}=py^{2}$ Proceedings of the American Mathematical Society | 2000-05-22 | Paper |
A note on the Diophantine equation $a^x + b^y = c^z$ Acta Arithmetica | 2000-01-05 | Paper |
On Terai's conjecture Proceedings of the Japan Academy. Series A | 1999-11-15 | Paper |
| scientific article; zbMATH DE number 1295226 (Why is no real title available?) | 1999-11-10 | Paper |
Fermat's type equations in the set of \(2\times 2\) integral matrices Tsukuba Journal of Mathematics | 1999-10-17 | Paper |
| scientific article; zbMATH DE number 1262612 (Why is no real title available?) | 1999-06-01 | Paper |
| scientific article; zbMATH DE number 842861 (Why is no real title available?) | 1997-03-11 | Paper |
Finite set theory and its application to cryptology Journal of Statistical Planning and Inference | 1996-07-18 | Paper |
| scientific article; zbMATH DE number 786244 (Why is no real title available?) | 1996-02-05 | Paper |
| scientific article; zbMATH DE number 810459 (Why is no real title available?) | 1995-11-26 | Paper |
| scientific article; zbMATH DE number 713438 (Why is no real title available?) | 1995-11-06 | Paper |
| scientific article; zbMATH DE number 613269 (Why is no real title available?) | 1994-09-27 | Paper |
| scientific article; zbMATH DE number 558921 (Why is no real title available?) | 1994-07-21 | Paper |
| scientific article; zbMATH DE number 496021 (Why is no real title available?) | 1994-02-07 | Paper |
| scientific article; zbMATH DE number 238384 (Why is no real title available?) | 1994-01-26 | Paper |
| scientific article; zbMATH DE number 169347 (Why is no real title available?) | 1993-05-16 | Paper |
| scientific article; zbMATH DE number 147689 (Why is no real title available?) | 1993-04-01 | Paper |
| scientific article; zbMATH DE number 123416 (Why is no real title available?) | 1993-02-18 | Paper |
| scientific article; zbMATH DE number 47263 (Why is no real title available?) | 1992-09-17 | Paper |
| scientific article; zbMATH DE number 24329 (Why is no real title available?) | 1992-06-26 | Paper |
On the diophantine equation \({(ax^ m-1) \over{} (abx-1)} = by^ 2\) Chinese Science Bulletin | 1992-06-26 | Paper |
| scientific article; zbMATH DE number 24317 (Why is no real title available?) | 1992-06-26 | Paper |
On the equation \(ax^ m - by^ n = 2\) Chinese Science Bulletin | 1992-06-25 | Paper |
| scientific article; zbMATH DE number 4208087 (Why is no real title available?) | 1991-01-01 | Paper |
| scientific article; zbMATH DE number 4173081 (Why is no real title available?) | 1989-01-01 | Paper |
| scientific article; zbMATH DE number 4122057 (Why is no real title available?) | 1988-01-01 | Paper |
| scientific article; zbMATH DE number 4091591 (Why is no real title available?) | 1988-01-01 | Paper |
| scientific article; zbMATH DE number 4043930 (Why is no real title available?) | 1987-01-01 | Paper |
On the equation \(\sum ^{s}_{j=1}(1/x_ j)+(1/(x_ 1\,\dots \,x_ s))=1\) and Znám's problem Journal of Number Theory | 1987-01-01 | Paper |
| scientific article; zbMATH DE number 4031785 (Why is no real title available?) | 1987-01-01 | Paper |
| scientific article; zbMATH DE number 4095567 (Why is no real title available?) | 1987-01-01 | Paper |
| scientific article; zbMATH DE number 4095575 (Why is no real title available?) | 1987-01-01 | Paper |
| scientific article; zbMATH DE number 4095571 (Why is no real title available?) | 1986-01-01 | Paper |
| scientific article; zbMATH DE number 4025506 (Why is no real title available?) | 1986-01-01 | Paper |
On the Diophantine Equation x 2n - y 2 = 1 Proceedings of the American Mathematical Society | 1986-01-01 | Paper |
| scientific article; zbMATH DE number 3859219 (Why is no real title available?) | 1983-01-01 | Paper |