Edit Profile Johnston, Anna M. Compute Distance To: Compute Author ID: johnston.anna-m Published as: Johnston, Anna M. Documents Indexed: 5 Publications since 1999 Co-Authors 3 single-authored 2 Gemmell, Peter S. 1 Beaver, Cheryl L. 1 Neumann, William Serials 1 Journal of Cryptology 1 Finite Fields and their Applications Fields 3 Number theory (11-XX) 3 Information and communication theory, circuits (94-XX) 1 Field theory and polynomials (12-XX) 1 Numerical analysis (65-XX) Publications by Year Citations contained in zbMATH 3 Publications have been cited 4 times in 3 Documents Cited by ▼ Year ▼ Authenticated key exchange provably secure against the man-in-the-middle attack. Zbl 0994.94027Johnston, Anna M.; Gemmell, Peter S. 2 2002 On the cryptographic value of the \(q^{th}\) root problem. Zbl 1014.94553Beaver, Cheryl L.; Gemmell, Peter S.; Johnston, Anna M.; Neumann, William 1 1999 A generalized \(q^{th}\) root algorithm. Zbl 1052.65512Johnston, Anna M. 1 1999 Authenticated key exchange provably secure against the man-in-the-middle attack. Zbl 0994.94027Johnston, Anna M.; Gemmell, Peter S. 2 2002 On the cryptographic value of the \(q^{th}\) root problem. Zbl 1014.94553Beaver, Cheryl L.; Gemmell, Peter S.; Johnston, Anna M.; Neumann, William 1 1999 A generalized \(q^{th}\) root algorithm. Zbl 1052.65512Johnston, Anna M. 1 1999 all top 5 Cited by 10 Authors 1 Cho, Gook Hwa 1 Go, Byeonghwan 1 Guo, Hua 1 Johnston, Anna M. 1 Kim, Chang Heon 1 Koo, Namhun 1 Kwon, Soonhak 1 Li, Zhoujun 1 Mu, Yi 1 Zhang, Xiyong Cited in 3 Serials 1 Information Sciences 1 Applicable Algebra in Engineering, Communication and Computing 1 Finite Fields and their Applications Cited in 2 Fields 2 Number theory (11-XX) 1 Information and communication theory, circuits (94-XX) Citations by Year