Seguir
Rene Peralta
Rene Peralta
Dirección de correo verificada de nist.gov
Título
Citado por
Citado por
Año
Simple constructions of almost k‐wise independent random variables
N Alon, O Goldreich, J Håstad, R Peralta
Random Structures & Algorithms 3 (3), 289-304, 1992
8401992
Report on post-quantum cryptography
L Chen, L Chen, S Jordan, YK Liu, D Moody, R Peralta, RA Perlner, ...
US Department of Commerce, National Institute of Standards and Technology, 2016
8172016
Computation in networks of passively mobile finite-state sensors
D Angluin, J Aspnes, Z Diamadi, MJ Fischer, R Peralta
Proceedings of the twenty-third annual ACM symposium on Principles of …, 2004
7712004
Status report on the third round of the NIST post-quantum cryptography standardization process
G Alagic, G Alagic, D Apon, D Cooper, Q Dang, T Dang, J Kelsey, ...
US Department of Commerce, National Institute of Standards and Technology 4, 07, 2022
4992022
Status report on the second round of the NIST post-quantum cryptography standardization process
G Alagic, J Alperin-Sheriff, D Apon, D Cooper, Q Dang, J Kelsey, YK Liu, ...
US Department of Commerce, NIST 2, 69, 2020
3652020
A new combinational logic minimization technique with applications to cryptology
J Boyar, R Peralta
Experimental Algorithms: 9th International Symposium, SEA 2010, Ischia …, 2010
2102010
On the relation of error correction and cryptography to an online biometric based identification scheme
GI Davida, Y Frankel, B Matt, R Peralta
Workshop on coding and cryptography, 1999
2021999
Demonstrating possession of a discrete logarithm without revealing it
D Chaum, JH Evertse, J van de Graaf, R Peralta
Advances in Cryptology—CRYPTO’86: Proceedings 6, 200-212, 1987
1861987
Logic minimization techniques with applications to cryptology
J Boyar, P Matthews, R Peralta
Journal of Cryptology 26, 280-312, 2013
1722013
A small depth-16 circuit for the AES S-box
J Boyar, R Peralta
IFIP International Information Security Conference, 287-298, 2012
1282012
On the multiplicative complexity of boolean functions over the basis (∧,⊕, 1)
J Boyar, R Peralta, D Pochuev
Theoretical Computer Science 235 (1), 43-57, 2000
1252000
A simple and secure way to show the validity of your public key
J Van De Graaf, R Peralta
Conference on the Theory and Application of Cryptographic Techniques, 128-134, 1987
1211987
A simple and fast probabilistic algorithm for computing square roots modulo a prime number (Corresp.)
R Peralta
IEEE transactions on information theory 32 (6), 846-847, 1986
1071986
Stably computable properties of network graphs
D Angluin, J Aspnes, M Chan, MJ Fischer, H Jiang, R Peralta
Distributed Computing in Sensor Systems: First IEEE International Conference …, 2005
1052005
On the distribution of quadratic residues and nonresidues modulo a prime number
R Peralta
Mathematics of Computation 58 (197), 433-440, 1992
921992
Status report on the second round of the NIST post-quantum cryptography standardization process
D Moody, G Alagic, DC Apon, DA Cooper, QH Dang, JM Kelsey, YK Liu, ...
Dustin Moody, Gorjan Alagic, Daniel C. Apon, David A. Cooper, Quynh H. Dang …, 2020
822020
Asymptotic semismoothness probabilities
E Bach, R Peralta
Mathematics of computation 65 (216), 1701-1715, 1996
781996
Simultaneous security of bits in the discrete log
R Peralta
Workshop on the Theory and Application of of Cryptographic Techniques, 62-72, 1985
731985
Faster factoring of integers of a special form
R Peralta, E Okamoto
IEICE transactions on fundamentals of electronics, communications and …, 1996
681996
Report on pairing-based cryptography
D Moody, R Peralta, R Perlner, A Regenscheid, A Roginsky, L Chen
Journal of research of the National Institute of Standards and Technology …, 2015
652015
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20