Crea il mio profilo
Accesso pubblico
Visualizza tutto56 articoli
8 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
Igor ShparlinskiUNSWEmail verificata su unsw.edu.au
Zhixiong Chen (陈智雄)Putian Univ. (Fujian, P. R. China) 莆田学院Email verificata su ptu.edu.cn
Domingo GómezProfesor de Informática (Unican)Email verificata su unican.es
Tanja LangeProfessor Cryptology, Technische Universiteit Eindhoven, the NetherlandsEmail verificata su tue.nl
László MéraiEötvös Loránd UniversityEmail verificata su inf.elte.hu
Hassan AlyAssoc. Prof. of Computer ScienceEmail verificata su sci.cu.edu.eg
Alev TopuzogluProfessor of Mathematics, Sabanci UniversityEmail verificata su sabanciuniv.edu
Alina OstafeUniversity of New South WalesEmail verificata su unsw.edu.au
Ming SuNankai UniversityEmail verificata su nankai.edu.cn
Leyla Işıkİstinye UniversityEmail verificata su sabanciuniv.edu
Eike KiltzProfessor of Computer Science, Ruhr-Universität BochumEmail verificata su rub.de
Friedrich PillichshammerJohannes Kepler University LinzEmail verificata su jku.at
Alexander PottOtto von Guericke University, Faculty of MathematicsEmail verificata su ovgu.de
Oliver Roche-NewtonRICAMEmail verificata su ricam.oeaw.ac.at
Martin RoettelerIonQEmail verificata su ionq.co
Andreas KlappeneckerProfessor of Computer Science and Engineering, Texas A&M UniversityEmail verificata su cse.tamu.edu
Oğuz YaylaDepartment of Cryptography, Middle East Technical UniversityEmail verificata su metu.edu.tr
Ilya ShkredovSteklov Mathematical InstituteEmail verificata su mi.ras.ru
Florian LucaProfessor, Stellenbosch UniversityEmail verificata su sun.ac.za
Bruno CodenottiIIT-CNREmail verificata su iit.cnr.it