×

zbMATH — the first resource for mathematics

Rogaway, Phillip

Compute Distance To:
Author ID: rogaway.phillip Recent zbMATH articles by "Rogaway, Phillip"
Published as: Rogaway, Phillip; Rogaway, P.; Rogaway, Philip
External Links: IdRef · MGP · Wikidata · dblp
Documents Indexed: 74 Publications since 1990, including 1 Book

Publications by Year

Citations contained in zbMATH Open

67 Publications have been cited 1,341 times in 728 Documents Cited by Year
Entity authentication and key distribution. Zbl 0870.94019
Bellare, Mihir; Rogaway, Phillip
105
1994
The security of triple encryption and a framework for code-based game-playing proofs. Zbl 1140.94321
Bellare, Mihir; Rogaway, Phillip
78
2006
Authenticated key exchange secure against dictionary attacks. Zbl 1082.94533
Bellare, Mihir; Pointcheval, David; Rogaway, Phillip
74
2000
The exact security of digital signatures – how to sign with RSA and Rabin. Zbl 1304.94094
Bellare, Mihir; Rogaway, Phillip
65
1996
Relations among notions of security for public-key encryption schemes. Zbl 0931.94014
Bellare, Mihir; Desai, Anand; Pointcheval, David; Rogaway, Phillip
61
1998
Optimal asymmetric encryption. Zbl 0881.94010
Bellare, Mihir; Rogaway, Phillip
58
1995
Provably secure session key distribution – The three party case. Zbl 0916.94006
Bellare, Mihir; Rogaway, Phillip
45
1995
Efficient instantiations of tweakable blockciphers and refinements to modes OCB and PMAC. Zbl 1094.94035
Rogaway, Phillip
42
2004
Cryptographic hash-function basics: definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. Zbl 1079.68560
Rogaway, Phillip; Shrimpton, Thomas
36
2004
Black-box analysis of the block-cipher-based hash-function constructions from PGV. Zbl 1026.94522
Black, John; Rogaway, Phillip; Shrimpton, Thomas
36
2002
The security of the cipher block chaining message authentication code. Zbl 0970.68054
Bellare, Mihir; Kilian, Joe; Rogaway, Phillip
30
2000
A provable-security treatment of the key-wrap problem. Zbl 1140.94369
Rogaway, Phillip; Shrimpton, Thomas
29
2006
The software performance of authenticated-encryption modes. Zbl 1307.94119
Krovetz, Ted; Rogaway, Phillip
27
2011
A tweakable enciphering mode. Zbl 1122.94374
Halevi, Shai; Rogaway, Phillip
27
2003
A parallelizable enciphering mode. Zbl 1196.94055
Halevi, Shai; Rogaway, Phillip
26
2004
The oracle Diffie-Hellman assumptions and an analysis of DHIES. Zbl 0991.94033
Abdalla, Michel; Bellare, Mihir; Rogaway, Phillip
25
2001
Reconciling two views of cryptography (The computational soundness of formal encryption). Zbl 0994.68066
Abadi, Martín; Rogaway, Phillip
25
2002
UMAC: Fast and secure message authentication. Zbl 0940.94020
Black, J.; Halevi, S.; Krawczyk, H.; Krovetz, T.; Rogaway, P.
25
1999
Encryption-scheme security in the presence of key-dependent messages. Zbl 1027.68594
Black, John; Rogaway, Phillip; Shrimpton, Thomas
25
2003
Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for efficient cryptography. Zbl 0974.94008
Bellare, Mihir; Rogaway, Phillip
24
2000
Collision-resistant hashing: Towards making UOWHFs practical. Zbl 0882.94015
Bellare, Mihir; Rogaway, Phillip
22
1997
Everything provable is provable in zero-knowledge. Zbl 0718.68033
Ben-Or, Michael; Goldreich, Oded; Goldwasser, Shafi; Håstad, Johan; Kilian, Joe; Micali, Silvio; Rogaway, Phillip
21
1990
Robust authenticated-encryption AEZ and the problem that it solves. Zbl 1365.94485
Hoang, Viet Tung; Krovetz, Ted; Rogaway, Phillip
21
2015
Nonce-based symmetric encryption. Zbl 1079.68559
Rogaway, Phillip
19
2004
Formalizing human ignorance. Zbl 1295.94138
Rogaway, Phillip
19
2006
Reconciling two views of cryptography (the computational soundness of formal encryption). Zbl 1008.68048
Abadi, Martín; Rogaway, Phillip
19
2000
A block-cipher mode of operation for parallelizable message authentication. Zbl 1056.94520
Black, John; Rogaway, Phillip
18
2002
The complexity of approximating a nonlinear program. Zbl 0968.90527
Bellare, Mihir; Rogaway, Phillip
17
1993
The security of cipher block chaining. Zbl 0939.94554
Bellare, Mihir; Kilian, Joe; Rogaway, Phillip
17
1994
Security of symmetric encryption against mass surveillance. Zbl 1317.94084
Bellare, Mihir; Paterson, Kenneth G.; Rogaway, Phillip
15
2014
The EAX mode of operation. Zbl 1079.68537
Bellare, Mihir; Rogaway, Phillip; Wagner, David
14
2004
How to protect DES against exhaustive key search (an analysis of DESX). Zbl 1068.94531
Kilian, Joe; Rogaway, Philip
14
2001
The complexity of approximating a nonlinear program. Zbl 0839.90104
Bellare, Mihir; Rogaway, Phillip
14
1995
Security/efficiency tradeoffs for permutation-based hashing. Zbl 1149.94328
Rogaway, Phillip; Steinberger, John
14
2008
Ciphers with arbitrary finite domains. Zbl 1045.68561
Black, John; Rogaway, Phillip
13
2002
Format-preserving encryption. Zbl 1267.94037
Bellare, Mihir; Ristenpart, Thomas; Rogaway, Phillip; Stegers, Till
13
2009
Constructing cryptographic hash functions from fixed-key blockciphers. Zbl 1183.94047
Rogaway, Phillip; Steinberger, John
13
2008
A software-optimised encryption algorithm. Zbl 0943.94519
Rogaway, Phillip; Coppersmith, Don
11
1994
Improved security analyses for CBC MACs. Zbl 1145.94432
Bellare, Mihir; Pietrzak, Krzysztof; Rogaway, Phillip
11
2005
CBC MACs for arbitrary-length messages: The three-key constructions. Zbl 0995.94545
Black, John; Rogaway, Phillip
10
2000
Bucket hashing and its application to fast message authentication. Zbl 0868.94026
Rogaway, Phillip
10
1995
Online ciphers from tweakable blockciphers. Zbl 1284.94106
Rogaway, Phillip; Zhang, Haibin
10
2011
How to encipher messages on a small domain. Deterministic encryption and the Thorp shuffle. Zbl 1252.94090
Morris, Ben; Rogaway, Phillip; Stegers, Till
10
2009
Reconsidering generic composition. Zbl 1332.94092
Namprempre, Chanathip; Rogaway, Phillip; Shrimpton, Thomas
9
2014
How to protect DES against exhaustive key search. Zbl 1329.94067
Kilian, Joe; Rogaway, Phillip
9
1996
Luby-Rackoff backwards: increasing security by making block ciphers non-invertible. Zbl 0994.94521
Bellare, Mihir; Krovetz, Ted; Rogaway, Phillip
9
1998
Adaptively secure garbling with applications to one-time programs and secure outsourcing. Zbl 1292.94027
Bellare, Mihir; Hoang, Viet Tung; Rogaway, Phillip
9
2012
On generalized Feistel networks. Zbl 1283.94068
Hoang, Viet Tung; Rogaway, Phillip
9
2010
XOR MACs: New methods for message authentication using finite pseudorandom functions. Zbl 0876.94020
Bellare, Mihir; Guérin, Roch; Rogaway, Phillip
8
1995
How to enrich the message space of a cipher. Zbl 1186.94468
Ristenpart, Thomas; Rogaway, Phillip
7
2007
Bucket hashing and its application to fast message authentication. Zbl 0937.94011
Rogaway, Phillip
7
1999
CBC MACs for arbitrary-length messages: The three-key constructions. Zbl 1084.68045
Black, John; Rogaway, Phillip
6
2005
Online authenticated-encryption and its nonce-reuse misuse-resistance. Zbl 1375.94167
Hoang, Viet Tung; Reyhanitabar, Reza; Rogaway, Phillip; Vizár, Damian
6
2015
Minimizing the use of random oracles in authenticated encryption schemes. Zbl 0888.94009
Bellare, Mihir; Rogaway, Phillip
6
1997
An analysis of the blockcipher-based hash functions from PGV. Zbl 1201.94077
Black, J.; Rogaway, P.; Shrimpton, T.; Stam, M.
6
2010
Security with low communication overhead. (Extended abstract). Zbl 0800.68416
Beaver, D.; Feigenbaum, J.; Kilian, J.; Rogaway, P.
5
1991
Fast universal hashing with small keys and no preprocessing: The PolyR construction. Zbl 1037.94543
Krovetz, Ted; Rogaway, Phillip
5
2001
Locally random reductions: Improvements and applications. Zbl 0873.94013
Beaver, D.; Feigenbaum, J.; Kilian, J.; Rogaway, P.
5
1997
An enciphering scheme based on a card shuffle. Zbl 1294.94052
Hoang, Viet Tung; Morris, Ben; Rogaway, Phillip
5
2012
Augmented secure channels and the goal of the TLS 1.3 record layer. Zbl 1388.94032
Badertscher, Christian; Matt, Christian; Maurer, Ueli; Rogaway, Phillip; Tackmann, Björn
4
2015
On the construction of variable-input-length ciphers. Zbl 0942.94012
Bellare, Mihir; Rogaway, Phillip
4
1999
On the role definitions in and beyond cryptography. Zbl 1115.94306
Rogaway, Phillip
3
2004
Advances in cryptology – CRYPTO 2011. 31st annual cryptology conference, Santa Barbara, CA, USA, August 14–18, 2011. Proceedings. Zbl 1219.94002
Rogaway, Phillip (ed.)
3
2011
Sometimes-recurse shuffle. Almost-random permutations in logarithmic expected time. Zbl 1332.94073
Morris, Ben; Rogaway, Phillip
3
2014
Big-key symmetric encryption: resisting key exfiltration. Zbl 1379.94030
Bellare, Mihir; Kane, Daniel; Rogaway, Phillip
2
2016
Robust authenticated encryption and the limits of symmetric cryptography. Zbl 1376.94025
Badertscher, Christian; Matt, Christian; Maurer, Ueli; Rogaway, Phillip; Tackmann, Björn
2
2015
A software-optimized encryption algorithm. Zbl 0921.94011
Rogaway, Phillip; Coppersmith, Don
1
1998
Big-key symmetric encryption: resisting key exfiltration. Zbl 1379.94030
Bellare, Mihir; Kane, Daniel; Rogaway, Phillip
2
2016
Robust authenticated-encryption AEZ and the problem that it solves. Zbl 1365.94485
Hoang, Viet Tung; Krovetz, Ted; Rogaway, Phillip
21
2015
Online authenticated-encryption and its nonce-reuse misuse-resistance. Zbl 1375.94167
Hoang, Viet Tung; Reyhanitabar, Reza; Rogaway, Phillip; Vizár, Damian
6
2015
Augmented secure channels and the goal of the TLS 1.3 record layer. Zbl 1388.94032
Badertscher, Christian; Matt, Christian; Maurer, Ueli; Rogaway, Phillip; Tackmann, Björn
4
2015
Robust authenticated encryption and the limits of symmetric cryptography. Zbl 1376.94025
Badertscher, Christian; Matt, Christian; Maurer, Ueli; Rogaway, Phillip; Tackmann, Björn
2
2015
Security of symmetric encryption against mass surveillance. Zbl 1317.94084
Bellare, Mihir; Paterson, Kenneth G.; Rogaway, Phillip
15
2014
Reconsidering generic composition. Zbl 1332.94092
Namprempre, Chanathip; Rogaway, Phillip; Shrimpton, Thomas
9
2014
Sometimes-recurse shuffle. Almost-random permutations in logarithmic expected time. Zbl 1332.94073
Morris, Ben; Rogaway, Phillip
3
2014
Adaptively secure garbling with applications to one-time programs and secure outsourcing. Zbl 1292.94027
Bellare, Mihir; Hoang, Viet Tung; Rogaway, Phillip
9
2012
An enciphering scheme based on a card shuffle. Zbl 1294.94052
Hoang, Viet Tung; Morris, Ben; Rogaway, Phillip
5
2012
The software performance of authenticated-encryption modes. Zbl 1307.94119
Krovetz, Ted; Rogaway, Phillip
27
2011
Online ciphers from tweakable blockciphers. Zbl 1284.94106
Rogaway, Phillip; Zhang, Haibin
10
2011
Advances in cryptology – CRYPTO 2011. 31st annual cryptology conference, Santa Barbara, CA, USA, August 14–18, 2011. Proceedings. Zbl 1219.94002
Rogaway, Phillip
3
2011
On generalized Feistel networks. Zbl 1283.94068
Hoang, Viet Tung; Rogaway, Phillip
9
2010
An analysis of the blockcipher-based hash functions from PGV. Zbl 1201.94077
Black, J.; Rogaway, P.; Shrimpton, T.; Stam, M.
6
2010
Format-preserving encryption. Zbl 1267.94037
Bellare, Mihir; Ristenpart, Thomas; Rogaway, Phillip; Stegers, Till
13
2009
How to encipher messages on a small domain. Deterministic encryption and the Thorp shuffle. Zbl 1252.94090
Morris, Ben; Rogaway, Phillip; Stegers, Till
10
2009
Security/efficiency tradeoffs for permutation-based hashing. Zbl 1149.94328
Rogaway, Phillip; Steinberger, John
14
2008
Constructing cryptographic hash functions from fixed-key blockciphers. Zbl 1183.94047
Rogaway, Phillip; Steinberger, John
13
2008
How to enrich the message space of a cipher. Zbl 1186.94468
Ristenpart, Thomas; Rogaway, Phillip
7
2007
The security of triple encryption and a framework for code-based game-playing proofs. Zbl 1140.94321
Bellare, Mihir; Rogaway, Phillip
78
2006
A provable-security treatment of the key-wrap problem. Zbl 1140.94369
Rogaway, Phillip; Shrimpton, Thomas
29
2006
Formalizing human ignorance. Zbl 1295.94138
Rogaway, Phillip
19
2006
Improved security analyses for CBC MACs. Zbl 1145.94432
Bellare, Mihir; Pietrzak, Krzysztof; Rogaway, Phillip
11
2005
CBC MACs for arbitrary-length messages: The three-key constructions. Zbl 1084.68045
Black, John; Rogaway, Phillip
6
2005
Efficient instantiations of tweakable blockciphers and refinements to modes OCB and PMAC. Zbl 1094.94035
Rogaway, Phillip
42
2004
Cryptographic hash-function basics: definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. Zbl 1079.68560
Rogaway, Phillip; Shrimpton, Thomas
36
2004
A parallelizable enciphering mode. Zbl 1196.94055
Halevi, Shai; Rogaway, Phillip
26
2004
Nonce-based symmetric encryption. Zbl 1079.68559
Rogaway, Phillip
19
2004
The EAX mode of operation. Zbl 1079.68537
Bellare, Mihir; Rogaway, Phillip; Wagner, David
14
2004
On the role definitions in and beyond cryptography. Zbl 1115.94306
Rogaway, Phillip
3
2004
A tweakable enciphering mode. Zbl 1122.94374
Halevi, Shai; Rogaway, Phillip
27
2003
Encryption-scheme security in the presence of key-dependent messages. Zbl 1027.68594
Black, John; Rogaway, Phillip; Shrimpton, Thomas
25
2003
Black-box analysis of the block-cipher-based hash-function constructions from PGV. Zbl 1026.94522
Black, John; Rogaway, Phillip; Shrimpton, Thomas
36
2002
Reconciling two views of cryptography (The computational soundness of formal encryption). Zbl 0994.68066
Abadi, Martín; Rogaway, Phillip
25
2002
A block-cipher mode of operation for parallelizable message authentication. Zbl 1056.94520
Black, John; Rogaway, Phillip
18
2002
Ciphers with arbitrary finite domains. Zbl 1045.68561
Black, John; Rogaway, Phillip
13
2002
The oracle Diffie-Hellman assumptions and an analysis of DHIES. Zbl 0991.94033
Abdalla, Michel; Bellare, Mihir; Rogaway, Phillip
25
2001
How to protect DES against exhaustive key search (an analysis of DESX). Zbl 1068.94531
Kilian, Joe; Rogaway, Philip
14
2001
Fast universal hashing with small keys and no preprocessing: The PolyR construction. Zbl 1037.94543
Krovetz, Ted; Rogaway, Phillip
5
2001
Authenticated key exchange secure against dictionary attacks. Zbl 1082.94533
Bellare, Mihir; Pointcheval, David; Rogaway, Phillip
74
2000
The security of the cipher block chaining message authentication code. Zbl 0970.68054
Bellare, Mihir; Kilian, Joe; Rogaway, Phillip
30
2000
Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for efficient cryptography. Zbl 0974.94008
Bellare, Mihir; Rogaway, Phillip
24
2000
Reconciling two views of cryptography (the computational soundness of formal encryption). Zbl 1008.68048
Abadi, Martín; Rogaway, Phillip
19
2000
CBC MACs for arbitrary-length messages: The three-key constructions. Zbl 0995.94545
Black, John; Rogaway, Phillip
10
2000
UMAC: Fast and secure message authentication. Zbl 0940.94020
Black, J.; Halevi, S.; Krawczyk, H.; Krovetz, T.; Rogaway, P.
25
1999
Bucket hashing and its application to fast message authentication. Zbl 0937.94011
Rogaway, Phillip
7
1999
On the construction of variable-input-length ciphers. Zbl 0942.94012
Bellare, Mihir; Rogaway, Phillip
4
1999
Relations among notions of security for public-key encryption schemes. Zbl 0931.94014
Bellare, Mihir; Desai, Anand; Pointcheval, David; Rogaway, Phillip
61
1998
Luby-Rackoff backwards: increasing security by making block ciphers non-invertible. Zbl 0994.94521
Bellare, Mihir; Krovetz, Ted; Rogaway, Phillip
9
1998
A software-optimized encryption algorithm. Zbl 0921.94011
Rogaway, Phillip; Coppersmith, Don
1
1998
Collision-resistant hashing: Towards making UOWHFs practical. Zbl 0882.94015
Bellare, Mihir; Rogaway, Phillip
22
1997
Minimizing the use of random oracles in authenticated encryption schemes. Zbl 0888.94009
Bellare, Mihir; Rogaway, Phillip
6
1997
Locally random reductions: Improvements and applications. Zbl 0873.94013
Beaver, D.; Feigenbaum, J.; Kilian, J.; Rogaway, P.
5
1997
The exact security of digital signatures – how to sign with RSA and Rabin. Zbl 1304.94094
Bellare, Mihir; Rogaway, Phillip
65
1996
How to protect DES against exhaustive key search. Zbl 1329.94067
Kilian, Joe; Rogaway, Phillip
9
1996
Optimal asymmetric encryption. Zbl 0881.94010
Bellare, Mihir; Rogaway, Phillip
58
1995
Provably secure session key distribution – The three party case. Zbl 0916.94006
Bellare, Mihir; Rogaway, Phillip
45
1995
The complexity of approximating a nonlinear program. Zbl 0839.90104
Bellare, Mihir; Rogaway, Phillip
14
1995
Bucket hashing and its application to fast message authentication. Zbl 0868.94026
Rogaway, Phillip
10
1995
XOR MACs: New methods for message authentication using finite pseudorandom functions. Zbl 0876.94020
Bellare, Mihir; Guérin, Roch; Rogaway, Phillip
8
1995
Entity authentication and key distribution. Zbl 0870.94019
Bellare, Mihir; Rogaway, Phillip
105
1994
The security of cipher block chaining. Zbl 0939.94554
Bellare, Mihir; Kilian, Joe; Rogaway, Phillip
17
1994
A software-optimised encryption algorithm. Zbl 0943.94519
Rogaway, Phillip; Coppersmith, Don
11
1994
The complexity of approximating a nonlinear program. Zbl 0968.90527
Bellare, Mihir; Rogaway, Phillip
17
1993
Security with low communication overhead. (Extended abstract). Zbl 0800.68416
Beaver, D.; Feigenbaum, J.; Kilian, J.; Rogaway, P.
5
1991
Everything provable is provable in zero-knowledge. Zbl 0718.68033
Ben-Or, Michael; Goldreich, Oded; Goldwasser, Shafi; Håstad, Johan; Kilian, Joe; Micali, Silvio; Rogaway, Phillip
21
1990
all top 5

Cited by 1,244 Authors

20 Bellare, Mihir
14 Kiltz, Eike
14 Nandi, Mridul
14 Rogaway, Phillip
13 Sarkar, Palash
11 Seurin, Yannick
10 Mu, Yi
10 Stebila, Douglas
9 Abdalla, Michel
9 Hofheinz, Dennis
9 Susilo, Willy
9 Yang, Guomin
8 Boyd, Colin A.
8 Cao, Zhenfu
8 Lee, Jooyoung
8 Lucks, Stefan
8 Mennink, Bart
8 Minematsu, Kazuhiko
8 Paterson, Kenneth G.
8 Tessaro, Stefano
8 Yasuda, Kan
7 Iwata, Tetsu
7 Jager, Tibor
7 List, Eik
7 Pass, Rafael
7 Stam, Martijn
7 Wu, Wenling
6 Canetti, Ran
6 Fischlin, Marc
6 González Nieto, Juan Manuel
6 Gu, Dawu
6 Lakhnech, Yassine
6 Pointcheval, David
6 Sasaki, Yu
6 Shrimpton, Thomas
6 Smart, Nigel P.
6 Vaikuntanathan, Vinod
6 Venturi, Daniele
6 Waters, Brent
5 Applebaum, Benny
5 Boldyreva, Alexandra
5 Chen, Rongmao
5 Choo, Kim-Kwang Raymond
5 Cogliati, Benoît
5 Coron, Jean-Sébastien
5 de Klerk, Etienne
5 Dodis, Yevgeniy
5 Farshim, Pooya
5 Fouque, Pierre-Alain
5 Guo, Fuchun
5 Håstad, Johan Torkel
5 Katz, Jonathan N.
5 Knudsen, Lars Ramkilde
5 Peyrin, Thomas
5 Shamir, Adi
5 Wong, Duncan S.
5 Yoneyama, Kazuki
5 Zhang, Liting
4 Andreeva, Elena Anatol’evna
4 Backes, Michael
4 Barthe, Gilles
4 Boneh, Dan
4 Chang, Donghoon
4 Chen, Kefei
4 Dunkelman, Orr
4 Forler, Christian
4 Gennaro, Rosario
4 He, Debiao
4 Herranz, Javier
4 Hwang, Tzonelih
4 Ishai, Yuval
4 Kushilevitz, Eyal
4 Lafourcade, Pascal
4 Li, Jin
4 Lin, Dongdai
4 Mitchell, John C.
4 Park, Jonghwan
4 Pietrzak, Krzysztof
4 Poettering, Bertram
4 Preneel, Bart
4 Safavi-Naini, Reihaneh
4 Scedrov, Andre
4 Steinfeld, Ron
4 Stinson, Douglas Robert
4 Wang, Huaxiong
4 Wang, Lei
4 Warinschi, Bogdan
4 Wenzel, Jakob
4 Wichs, Daniel
4 Yung, Moti
4 Zhang, Zhenfeng
4 Zhao, Yunlei
3 Abe, Masayuki
3 Ateniese, Giuseppe
3 Benhamouda, Fabrice
3 Bitansky, Nir
3 Buchmann, Johannes A.
3 Chen, Yu
3 Chevalier, Céline
3 Clapp, Craig S. K.
...and 1,144 more Authors
all top 5

Cited in 69 Serials

83 Journal of Cryptology
66 Designs, Codes and Cryptography
43 Information Sciences
32 Theoretical Computer Science
23 Information Processing Letters
16 Journal of Computer and System Sciences
15 Information and Computation
12 Journal of Mathematical Cryptology
9 Cryptography and Communications
6 Discrete Applied Mathematics
6 Applied Mathematics and Computation
6 SIAM Journal on Computing
6 Journal of Automated Reasoning
6 International Journal of Foundations of Computer Science
5 Mathematical Programming. Series A. Series B
5 Applicable Algebra in Engineering, Communication and Computing
5 Tatra Mountains Mathematical Publications
5 Wuhan University Journal of Natural Sciences (WUJNS)
4 Computers & Mathematics with Applications
4 Quantum Information Processing
4 Science in China. Series F
4 Science China. Information Sciences
4 Frontiers of Computer Science
4 Prikladnaya Diskretnaya Matematika
3 Algorithmica
3 Formal Aspects of Computing
3 European Journal of Operational Research
3 Distributed Computing
3 Cybernetics and Systems Analysis
3 Computational Complexity
3 Nonlinear Dynamics
2 International Journal of Theoretical Physics
2 Cryptologia
2 Japan Journal of Industrial and Applied Mathematics
2 Mathematical Problems in Engineering
2 The Journal of Logic and Algebraic Programming
2 Journal of Shanghai Jiaotong University (Science)
2 Advances in Mathematics of Communications
2 Discrete Mathematics, Algorithms and Applications
1 Acta Informatica
1 Journal of the Franklin Institute
1 Journal of Computational and Applied Mathematics
1 Journal of Optimization Theory and Applications
1 Synthese
1 Science of Computer Programming
1 Operations Research Letters
1 Annals of Pure and Applied Logic
1 Bulletin of the Iranian Mathematical Society
1 Mathematical and Computer Modelling
1 Random Structures & Algorithms
1 Journal of Global Optimization
1 Discrete Event Dynamic Systems
1 SIAM Journal on Optimization
1 Formal Methods in System Design
1 Finite Fields and their Applications
1 The Electronic Journal of Combinatorics
1 International Journal of Applied Mathematics and Computer Science
1 CEJOR. Central European Journal of Operations Research
1 Lobachevskii Journal of Mathematics
1 Entropy
1 Journal of Discrete Algorithms
1 Journal of Zhejiang University. Science A
1 Annales Universitatis Mariae Curie-Skłodowska. Sectio A1. Informatica
1 Optimization Letters
1 Science China. Mathematics
1 Symmetry
1 Arabian Journal for Science and Engineering
1 Frontiers of Computer Science in China
1 Journal of Logical and Algebraic Methods in Programming

Citations by Year

Wikidata Timeline

The data are displayed as stored in Wikidata under a Creative Commons CC0 License. Updates and corrections should be made in Wikidata.