×

zbMATH — the first resource for mathematics

Gentry, Craig

Compute Distance To:
Author ID: gentry.craig Recent zbMATH articles by "Gentry, Craig"
Published as: Gentry, Craig
External Links: MGP · Wikidata · dblp
Documents Indexed: 66 Publications since 2001

Publications by Year

Citations contained in zbMATH Open

59 Publications have been cited 2,063 times in 931 Documents Cited by Year
Fully homomorphic encryption using ideal lattices. Zbl 1304.94059
Gentry, Craig
257
2009
Trapdoors for hard lattices and new cryptographic constructions. Zbl 1231.68124
Gentry, Craig; Peikert, Chris; Vaikuntanainan, Vinod
205
2008
Candidate indistinguishability obfuscation and functional encryption for all circuits. Zbl 1348.94048
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Raykova, Mariana; Sahai, Amit; Waters, Brent
142
2016
(Leveled) fully homomorphic encryption without bootstrapping. Zbl 1347.68120
Brakerski, Zvika; Gentry, Craig; Vaikuntanathan, Vinod
108
2012
Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based. Zbl 1310.94148
Gentry, Craig; Sahai, Amit; Waters, Brent
105
2013
Candidate multilinear maps from ideal lattices. Zbl 1300.94055
Garg, Sanjam; Gentry, Craig; Halevi, Shai
100
2013
Collusion resistant broadcast encryption with short ciphertexts and private keys. Zbl 1145.94434
Boneh, Dan; Gentry, Craig; Waters, Brent
82
2005
Practical identity-based encryption without random oracles. Zbl 1140.94340
Gentry, Craig
81
2006
Aggregate and verifiably encrypted signatures from bilinear maps. Zbl 1038.94553
Boneh, Dan; Gentry, Craig; Lynn, Ben; Shacham, Hovav
81
2003
Fully homomorphic encryption over the integers. Zbl 1279.94130
van Dijk, Marten; Gentry, Craig; Halevi, Shai; Vaikuntanathan, Vinod
73
2010
Hierarchical ID-based cryptography. Zbl 1065.94547
Gentry, Craig; Silverberg, Alice
70
2002
Toward basing fully homomorphic encryption on worst-case hardness. Zbl 1280.94059
Gentry, Craig
54
2010
Non-interactive verifiable computing: outsourcing computation to untrusted workers. Zbl 1284.68065
Gennaro, Rosario; Gentry, Craig; Parno, Bryan
51
2010
Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits. Zbl 1327.94035
Boneh, Dan; Gentry, Craig; Gorbunov, Sergey; Halevi, Shai; Nikolaenko, Valeria; Segev, Gil; Vaikuntanathan, Vinod; Vinayagamurthy, Dhinakaran
42
2014
Implementing Gentry’s fully-homomorphic encryption scheme. Zbl 1281.94026
Gentry, Craig; Halevi, Shai
38
2011
Zeroizing without low-level zeroes: new MMAP attacks and their limitations. Zbl 1375.94114
Coron, Jean-Sébastien; Gentry, Craig; Halevi, Shai; Lepoint, Tancrède; Maji, Hemanta K.; Miles, Eric; Raykova, Mariana; Sahai, Amit; Tibouchi, Mehdi
36
2015
Attribute-based encryption for circuits from multilinear maps. Zbl 1311.94080
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Sahai, Amit; Waters, Brent
36
2013
Functional encryption without obfuscation. Zbl 1382.94107
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Zhandry, Mark
31
2016
Separating succinct non-interactive arguments from all falsifiable assumptions. Zbl 1288.94063
Gentry, Craig; Wichs, Daniel
30
2011
Graph-induced multilinear maps from lattices. Zbl 1315.94076
Gentry, Craig; Gorbunov, Sergey; Halevi, Shai
29
2015
Witness encryption and its applications. Zbl 1293.94066
Garg, Sanjam; Gentry, Craig; Sahai, Amit; Waters, Brent
29
2013
Adaptive security in broadcast encryption systems (with short ciphertexts). Zbl 1239.94073
Gentry, Craig; Waters, Brent
29
2009
Homomorphic evaluation of the AES circuit. Zbl 1296.94117
Gentry, Craig; Halevi, Shai; Smart, Nigel P.
25
2012
Certificate-based encryption and the certificate revocation problem. Zbl 1037.68533
Gentry, Craig
25
2003
On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input. Zbl 1336.94048
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Wichs, Daniel
20
2014
Two-round secure MPC from indistinguishability obfuscation. Zbl 1317.94109
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Raykova, Mariana
20
2014
Quadratic span programs and succinct NIZKs without PCPs. Zbl 1300.94056
Gennaro, Rosario; Gentry, Craig; Parno, Bryan; Raykova, Mariana
20
2013
Fully homomorphic encryption with polylog overhead. Zbl 1297.94071
Gentry, Craig; Halevi, Shai; Smart, Nigel P.
19
2012
Hierarchical identity based encryption with polynomially many levels. Zbl 1213.94102
Gentry, Craig; Halevi, Shai
18
2009
Garbled RAM revisited. Zbl 1332.94067
Gentry, Craig; Halevi, Shai; Lu, Steve; Ostrovsky, Rafail; Raykova, Mariana; Wichs, Daniel
16
2014
\(i\)-hop homomorphic encryption and rerandomizable Yao circuits. Zbl 1280.94061
Gentry, Craig; Halevi, Shai; Vaikuntanathan, Vinod
16
2010
Cryptanalysis of the revised NTRU signature scheme. Zbl 1055.94015
Gentry, Craig; Szydlo, Mike
16
2002
Fully homomorphic encryption without squashing using depth-3 arithmetic circuits. Zbl 1292.94066
Gentry, Craig; Halevi, Shai
14
2011
Single-database private information retrieval with constant communication rate. Zbl 1084.68043
Gentry, Craig; Ramzan, Zulfikar
14
2005
(Leveled) fully homomorphic encryption without bootstrapping. Zbl 1347.68121
Brakerski, Zvika; Gentry, Craig; Vaikuntanathan, Vinod
13
2014
Witness encryption from instance independent assumptions. Zbl 1345.94064
Gentry, Craig; Lewko, Allison; Waters, Brent
11
2014
Better bootstrapping in fully homomorphic encryption. Zbl 1290.94077
Gentry, Craig; Halevi, Shai; Smart, Nigel P.
11
2012
Optimizing ORAM and using it efficiently for secure computation. Zbl 1315.94075
Gentry, Craig; Goldman, Kenny A.; Halevi, Shai; Julta, Charanjit; Raykova, Mariana; Wichs, Daniel
9
2013
A simple BGN-type cryptosystem from LWE. Zbl 1280.94060
Gentry, Craig; Halevi, Shai; Vaikuntanathan, Vinod
9
2010
Identity-based aggregate signatures. Zbl 1151.94511
Gentry, Craig; Ramzan, Zulfikar
8
2006
Packed ciphertexts in LWE-based homomorphic encryption. Zbl 1314.94058
Brakerski, Zvika; Gentry, Craig; Halevi, Shai
7
2013
Computing arbitrary functions of encrypted data. Zbl 1315.94074
Gentry, Craig
7
2010
Cryptanalyses of candidate branching program obfuscators. Zbl 1415.94418
Chen, Yilei; Gentry, Craig; Halevi, Shai
6
2017
Private database access with HE-over-ORAM architecture. Zbl 1459.68057
Gentry, Craig; Halevi, Shai; Jutla, Charanjit; Raykova, Mariana
6
2015
Cryptanalysis of the NTRU signature scheme (NSS) from EUROCRYPT 2001. Zbl 1062.94547
Gentry, Craig; Jonsson, Jakob; Stern, Jacques; Szydlo, Michael
6
2001
Key recovery and message attacks on NTRU-composite. Zbl 0981.94013
Gentry, Craig
6
2001
Private database queries using somewhat homomorphic encryption. Zbl 1330.94037
Boneh, Dan; Gentry, Craig; Halevi, Shai; Wang, Frank; Wu, David J.
5
2013
Ring switching in BGV-style homomorphic encryption. Zbl 1310.94147
Gentry, Craig; Halevi, Shai; Peikert, Chris; Smart, Nigel P.
5
2012
Discrete Gaussian leftover hash lemma over infinite domains. Zbl 1320.94059
Agrawal, Shweta; Gentry, Craig; Halevi, Shai; Sahai, Amit
4
2013
Efficient designated confirmer signatures without random oracles or general zero-knowledge proofs. Zbl 1154.94454
Gentry, Craig; Molnar, David; Ramzan, Zulfikar
4
2005
How to compress Rabin ciphertexts and signatures (and more). Zbl 1104.68045
Gentry, Craig
3
2004
Using fully homomorphic hybrid encryption to minimize non-interative zero-knowledge proofs. Zbl 1332.94066
Gentry, Craig; Groth, Jens; Ishai, Yuval; Peikert, Chris; Sahai, Amit; Smith, Adam
2
2015
A method for making password-based key exchange resilient to server compromise. Zbl 1161.68440
Gentry, Craig; MacKenzie, Philip; Ramzan, Zulfikar
2
2006
RSA accumulator based broadcast encryption. Zbl 1109.68453
Gentry, Craig; Ramzan, Zulfikar
2
2004
A unified framework for trapdoor-permutation-based sequential aggregate signatures. Zbl 1406.94058
Gentry, Craig; O’Neill, Adam; Reyzin, Leonid
1
2018
Computing on the edge of chaos: structure and randomness in encrypted computation. Zbl 1373.68225
Gentry, Craig
1
2014
Computing on encrypted data. (Abstract). Zbl 1287.94068
Gentry, Craig
1
2009
QuasiModo: Efficient certificate validation and revocation. Zbl 1198.94147
Elwailly, Farid F.; Gentry, Craig; Ramzan, Zulfikar
1
2004
Eliminating random permutation oracles in the Even-Mansour cipher. Zbl 1094.94030
Gentry, Craig; Ramzan, Zulfikar
1
2004
A unified framework for trapdoor-permutation-based sequential aggregate signatures. Zbl 1406.94058
Gentry, Craig; O’Neill, Adam; Reyzin, Leonid
1
2018
Cryptanalyses of candidate branching program obfuscators. Zbl 1415.94418
Chen, Yilei; Gentry, Craig; Halevi, Shai
6
2017
Candidate indistinguishability obfuscation and functional encryption for all circuits. Zbl 1348.94048
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Raykova, Mariana; Sahai, Amit; Waters, Brent
142
2016
Functional encryption without obfuscation. Zbl 1382.94107
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Zhandry, Mark
31
2016
Zeroizing without low-level zeroes: new MMAP attacks and their limitations. Zbl 1375.94114
Coron, Jean-Sébastien; Gentry, Craig; Halevi, Shai; Lepoint, Tancrède; Maji, Hemanta K.; Miles, Eric; Raykova, Mariana; Sahai, Amit; Tibouchi, Mehdi
36
2015
Graph-induced multilinear maps from lattices. Zbl 1315.94076
Gentry, Craig; Gorbunov, Sergey; Halevi, Shai
29
2015
Private database access with HE-over-ORAM architecture. Zbl 1459.68057
Gentry, Craig; Halevi, Shai; Jutla, Charanjit; Raykova, Mariana
6
2015
Using fully homomorphic hybrid encryption to minimize non-interative zero-knowledge proofs. Zbl 1332.94066
Gentry, Craig; Groth, Jens; Ishai, Yuval; Peikert, Chris; Sahai, Amit; Smith, Adam
2
2015
Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits. Zbl 1327.94035
Boneh, Dan; Gentry, Craig; Gorbunov, Sergey; Halevi, Shai; Nikolaenko, Valeria; Segev, Gil; Vaikuntanathan, Vinod; Vinayagamurthy, Dhinakaran
42
2014
On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input. Zbl 1336.94048
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Wichs, Daniel
20
2014
Two-round secure MPC from indistinguishability obfuscation. Zbl 1317.94109
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Raykova, Mariana
20
2014
Garbled RAM revisited. Zbl 1332.94067
Gentry, Craig; Halevi, Shai; Lu, Steve; Ostrovsky, Rafail; Raykova, Mariana; Wichs, Daniel
16
2014
(Leveled) fully homomorphic encryption without bootstrapping. Zbl 1347.68121
Brakerski, Zvika; Gentry, Craig; Vaikuntanathan, Vinod
13
2014
Witness encryption from instance independent assumptions. Zbl 1345.94064
Gentry, Craig; Lewko, Allison; Waters, Brent
11
2014
Computing on the edge of chaos: structure and randomness in encrypted computation. Zbl 1373.68225
Gentry, Craig
1
2014
Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based. Zbl 1310.94148
Gentry, Craig; Sahai, Amit; Waters, Brent
105
2013
Candidate multilinear maps from ideal lattices. Zbl 1300.94055
Garg, Sanjam; Gentry, Craig; Halevi, Shai
100
2013
Attribute-based encryption for circuits from multilinear maps. Zbl 1311.94080
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Sahai, Amit; Waters, Brent
36
2013
Witness encryption and its applications. Zbl 1293.94066
Garg, Sanjam; Gentry, Craig; Sahai, Amit; Waters, Brent
29
2013
Quadratic span programs and succinct NIZKs without PCPs. Zbl 1300.94056
Gennaro, Rosario; Gentry, Craig; Parno, Bryan; Raykova, Mariana
20
2013
Optimizing ORAM and using it efficiently for secure computation. Zbl 1315.94075
Gentry, Craig; Goldman, Kenny A.; Halevi, Shai; Julta, Charanjit; Raykova, Mariana; Wichs, Daniel
9
2013
Packed ciphertexts in LWE-based homomorphic encryption. Zbl 1314.94058
Brakerski, Zvika; Gentry, Craig; Halevi, Shai
7
2013
Private database queries using somewhat homomorphic encryption. Zbl 1330.94037
Boneh, Dan; Gentry, Craig; Halevi, Shai; Wang, Frank; Wu, David J.
5
2013
Discrete Gaussian leftover hash lemma over infinite domains. Zbl 1320.94059
Agrawal, Shweta; Gentry, Craig; Halevi, Shai; Sahai, Amit
4
2013
(Leveled) fully homomorphic encryption without bootstrapping. Zbl 1347.68120
Brakerski, Zvika; Gentry, Craig; Vaikuntanathan, Vinod
108
2012
Homomorphic evaluation of the AES circuit. Zbl 1296.94117
Gentry, Craig; Halevi, Shai; Smart, Nigel P.
25
2012
Fully homomorphic encryption with polylog overhead. Zbl 1297.94071
Gentry, Craig; Halevi, Shai; Smart, Nigel P.
19
2012
Better bootstrapping in fully homomorphic encryption. Zbl 1290.94077
Gentry, Craig; Halevi, Shai; Smart, Nigel P.
11
2012
Ring switching in BGV-style homomorphic encryption. Zbl 1310.94147
Gentry, Craig; Halevi, Shai; Peikert, Chris; Smart, Nigel P.
5
2012
Implementing Gentry’s fully-homomorphic encryption scheme. Zbl 1281.94026
Gentry, Craig; Halevi, Shai
38
2011
Separating succinct non-interactive arguments from all falsifiable assumptions. Zbl 1288.94063
Gentry, Craig; Wichs, Daniel
30
2011
Fully homomorphic encryption without squashing using depth-3 arithmetic circuits. Zbl 1292.94066
Gentry, Craig; Halevi, Shai
14
2011
Fully homomorphic encryption over the integers. Zbl 1279.94130
van Dijk, Marten; Gentry, Craig; Halevi, Shai; Vaikuntanathan, Vinod
73
2010
Toward basing fully homomorphic encryption on worst-case hardness. Zbl 1280.94059
Gentry, Craig
54
2010
Non-interactive verifiable computing: outsourcing computation to untrusted workers. Zbl 1284.68065
Gennaro, Rosario; Gentry, Craig; Parno, Bryan
51
2010
\(i\)-hop homomorphic encryption and rerandomizable Yao circuits. Zbl 1280.94061
Gentry, Craig; Halevi, Shai; Vaikuntanathan, Vinod
16
2010
A simple BGN-type cryptosystem from LWE. Zbl 1280.94060
Gentry, Craig; Halevi, Shai; Vaikuntanathan, Vinod
9
2010
Computing arbitrary functions of encrypted data. Zbl 1315.94074
Gentry, Craig
7
2010
Fully homomorphic encryption using ideal lattices. Zbl 1304.94059
Gentry, Craig
257
2009
Adaptive security in broadcast encryption systems (with short ciphertexts). Zbl 1239.94073
Gentry, Craig; Waters, Brent
29
2009
Hierarchical identity based encryption with polynomially many levels. Zbl 1213.94102
Gentry, Craig; Halevi, Shai
18
2009
Computing on encrypted data. (Abstract). Zbl 1287.94068
Gentry, Craig
1
2009
Trapdoors for hard lattices and new cryptographic constructions. Zbl 1231.68124
Gentry, Craig; Peikert, Chris; Vaikuntanainan, Vinod
205
2008
Practical identity-based encryption without random oracles. Zbl 1140.94340
Gentry, Craig
81
2006
Identity-based aggregate signatures. Zbl 1151.94511
Gentry, Craig; Ramzan, Zulfikar
8
2006
A method for making password-based key exchange resilient to server compromise. Zbl 1161.68440
Gentry, Craig; MacKenzie, Philip; Ramzan, Zulfikar
2
2006
Collusion resistant broadcast encryption with short ciphertexts and private keys. Zbl 1145.94434
Boneh, Dan; Gentry, Craig; Waters, Brent
82
2005
Single-database private information retrieval with constant communication rate. Zbl 1084.68043
Gentry, Craig; Ramzan, Zulfikar
14
2005
Efficient designated confirmer signatures without random oracles or general zero-knowledge proofs. Zbl 1154.94454
Gentry, Craig; Molnar, David; Ramzan, Zulfikar
4
2005
How to compress Rabin ciphertexts and signatures (and more). Zbl 1104.68045
Gentry, Craig
3
2004
RSA accumulator based broadcast encryption. Zbl 1109.68453
Gentry, Craig; Ramzan, Zulfikar
2
2004
QuasiModo: Efficient certificate validation and revocation. Zbl 1198.94147
Elwailly, Farid F.; Gentry, Craig; Ramzan, Zulfikar
1
2004
Eliminating random permutation oracles in the Even-Mansour cipher. Zbl 1094.94030
Gentry, Craig; Ramzan, Zulfikar
1
2004
Aggregate and verifiably encrypted signatures from bilinear maps. Zbl 1038.94553
Boneh, Dan; Gentry, Craig; Lynn, Ben; Shacham, Hovav
81
2003
Certificate-based encryption and the certificate revocation problem. Zbl 1037.68533
Gentry, Craig
25
2003
Hierarchical ID-based cryptography. Zbl 1065.94547
Gentry, Craig; Silverberg, Alice
70
2002
Cryptanalysis of the revised NTRU signature scheme. Zbl 1055.94015
Gentry, Craig; Szydlo, Mike
16
2002
Cryptanalysis of the NTRU signature scheme (NSS) from EUROCRYPT 2001. Zbl 1062.94547
Gentry, Craig; Jonsson, Jakob; Stern, Jacques; Szydlo, Michael
6
2001
Key recovery and message attacks on NTRU-composite. Zbl 0981.94013
Gentry, Craig
6
2001
all top 5

Cited by 1,580 Authors

31 Susilo, Willy
24 Mu, Yi
19 Sahai, Amit
18 Waters, Brent
16 Vaikuntanathan, Vinod
15 Brakerski, Zvika
15 Zhandry, Mark
14 Libert, Benoît
14 Wang, Huaxiong
13 Segev, Gil
12 Bitansky, Nir
12 Guo, Fuchun
12 Hu, Yupu
11 Wichs, Daniel
10 Canetti, Ran
10 Cheon, Jung Hee
10 Garg, Sanjam
10 Hanaoka, Goichiro
10 Hofheinz, Dennis
10 Lee, Kwangsu
10 Ling, San
10 Park, Jonghwan
9 Abdalla, Michel
9 Gentry, Craig
9 Ishai, Yuval
9 Lepoint, Tancrède
9 Pass, Rafael
9 Peikert, Chris
9 Smart, Nigel P.
9 Weng, Jian
9 Wu, Qianhong
8 Ananth, Prabhanjan Vijendra
8 Boneh, Dan
8 Cao, Zhenfu
8 Catalano, Dario
8 Farshim, Pooya
8 Fouque, Pierre-Alain
8 Kiltz, Eike
8 Tibouchi, Mehdi
8 Wee, Hoeteck
8 Yang, Bo
7 Au, Man Ho
7 Bellare, Mihir
7 Chen, Jie
7 Chen, Kefei
7 Domingo-Ferrer, Josep
7 Dutta, Ratna
7 Fiore, Dario
7 Gu, Dawu
7 Halevi, Shai
7 Komargodski, Ilan
7 Lee, Donghoon
7 Li, Jiguo
7 Liu, Shengli
7 Mohassel, Payman
7 Nguyen, Khoa
7 Paneth, Omer
7 Pointcheval, David
7 Seo, Jae Hong
7 Stehlé, Damien
7 Yamada, Shota
7 Yu, Jia
6 Albrecht, Martin R.
6 Attrapadung, Nuttapong
6 Chen, Yu
6 Hazay, Carmit
6 Herranz, Javier
6 Huang, Xinyi
6 Koppula, Venkata
6 Kunihiro, Noboru
6 Li, Bao
6 Lin, Huijia
6 Liu, Joseph K. K.
6 Lu, Yang
6 Lyubashevsky, Vadim
6 Neven, Gregory
6 Ostrovsky, Rafail
6 Qin, Bo
6 Vercauteren, Frederik
6 Wang, Baocang
6 Watanabe, Yodai
6 Wen, Qiaoyan
6 Wong, Duncan S.
6 Yang, Guomin
6 Yung, Moti
6 Zhang, Zhenfeng
5 Boyen, Xavier
5 Chiesa, Alessandro
5 Chung, Kai-Min
5 Coron, Jean-Sébastien
5 Emura, Keita
5 Fuchsbauer, Georg
5 Gilboa, Niv
5 Hao, Rong
5 Izabachène, Malika
5 Jain, Aayush
5 Kirchner, Paul
5 Lai, Jianchang
5 Lee, Changmin
5 Lee, Moon Sung
...and 1,480 more Authors
all top 5

Cited in 73 Serials

88 Information Sciences
67 Journal of Cryptology
61 Theoretical Computer Science
58 Designs, Codes and Cryptography
18 SIAM Journal on Computing
16 Journal of Mathematical Cryptology
12 Information Processing Letters
12 International Journal of Foundations of Computer Science
10 Journal of Computer and System Sciences
9 Mathematical Problems in Engineering
8 Soft Computing
7 Algorithmica
6 Applicable Algebra in Engineering, Communication and Computing
6 Wuhan University Journal of Natural Sciences (WUJNS)
6 Cryptography and Communications
6 Frontiers of Computer Science
5 Computing
5 Information and Computation
5 Computer Science Review
4 International Journal of Computer Mathematics
4 Cybernetics and Systems Analysis
4 Computational Complexity
4 LMS Journal of Computation and Mathematics
4 Journal of Applied Mathematics
4 Quantum Information Processing
4 Advances in Mathematics of Communications
4 Science China. Information Sciences
4 Symmetry
3 Computers & Mathematics with Applications
3 Discrete Applied Mathematics
3 Moscow University Computational Mathematics and Cybernetics
3 Mathematical and Computer Modelling
3 SIAM Journal on Discrete Mathematics
3 Science in China. Series F
3 Journal of Shanghai Jiaotong University (Science)
2 Mathematics of Computation
2 Applied Mathematics and Computation
2 Journal of Number Theory
2 Journal of Symbolic Computation
2 Journal of Computer Science and Technology
2 Japan Journal of Industrial and Applied Mathematics
2 Journal of Mathematical Sciences (New York)
2 Finite Fields and their Applications
2 Theory of Computing Systems
2 Mathematics in Computer Science
2 ACM Transactions on Computation Theory
2 SIAM Journal on Applied Algebra and Geometry
1 Discrete Mathematics
1 International Journal of Theoretical Physics
1 Journal of the Franklin Institute
1 Automatica
1 Journal of Computational and Applied Mathematics
1 Programming and Computer Software
1 Transactions of the American Mathematical Society
1 Chinese Annals of Mathematics. Series B
1 Formal Aspects of Computing
1 Journal of Parallel and Distributed Computing
1 Journal of Global Optimization
1 Journal of Statistical Computation and Simulation
1 Distributed Computing
1 Tatra Mountains Mathematical Publications
1 Complexity
1 Interdisciplinary Information Sciences (IIS)
1 Fundamenta Informaticae
1 Journal of Systems Science and Complexity
1 JP Journal of Algebra, Number Theory and Applications
1 Journal of Discrete Algorithms
1 International Journal of Number Theory
1 Optimization Letters
1 Groups, Complexity, Cryptology
1 Science China. Mathematics
1 Pacific Journal of Mathematics for Industry
1 Open Mathematics

Citations by Year

Wikidata Timeline

The data are displayed as stored in Wikidata under a Creative Commons CC0 License. Updates and corrections should be made in Wikidata.