Citation Impact
Citing Papers
Encrypted key exchange: password-based protocols secure against dictionary attacks
2003 Standout
Practical Byzantine fault tolerance
1999 Standout
f(T) teleparallel gravity and cosmology
2016 Standout
Multiplication of signed-digit numbers
1994 StandoutNobel
Lie and Noether symmetries of geodesic equations and collineations
2010
How to share a secret
1979 Standout
A Survey of SIP Authentication and Key Agreement Schemes
2013 Standout
Secure spread spectrum watermarking for multimedia
1997 Standout
How to Generate Cryptographically Strong Sequences of Pseudorandom Bits
1984 Standout
The Arithmetic of Elliptic Curves
1986 Standout
IoT security: Review, blockchain solutions, and open challenges
2017 Standout
A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
1988 Standout
Study of Certain Aspects of Anharmonic, Time-Dependent and Damped Harmonic Oscillator Systems
1989
Common randomness in information theory and cryptography. I. Secret sharing
1993 Standout
A logic of authentication
1990 Standout
Variational contact symmetries of constrained Lagrangians
2015
Guide to Elliptic Curve Cryptography
2004 Standout
The Elliptic Curve Digital Signature Algorithm (ECDSA)
2001 Standout
Efficient signature generation by smart cards
1991 Standout
Clohessy-Wiltshire Equations Modified to Include Quadratic Drag
2002
A public key cryptosystem and a signature scheme based on discrete logarithms
1985 Standout
A Review on the Use of Blockchain for the Internet of Things
2018 Standout
The Byzantine Generals Problem
1982 Standout
Gaussian quantum information
2012 Standout
A method for obtaining digital signatures and public-key cryptosystems
1983 Standout
Secure communications over insecure channels
1978 Standout
A method for obtaining digital signatures and public-key cryptosystems
1978 Standout
Terminal Guidance System for Satellite Rendezvous
1960 Standout
Kerberos: an authentication service for computer networks
1994 Standout
High-order harmonic generation processes in classical and quantum anharmonic oscillators
1996 StandoutNobel
Demonstration of a Fundamental Quantum Logic Gate
1995 StandoutNobel
Introduction to Finite Fields and their Applications
1994 Standout
Random key predistribution schemes for sensor networks
2004 Standout
Quantum cryptography
2002 Standout
Security Arguments for Digital Signatures and Blind Signatures
2000 Standout
Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
1999 Standout
On the security of public key protocols
1983 Standout
Probabilistic encryption
1984 Standout
SPINS: Security Protocols for Sensor Networks
2002 Standout
Untraceable electronic mail, return addresses, and digital pseudonyms
1981 Standout
How to construct random functions
1986 Standout
Modular multiplication without trial division
1985 Standout
Secret key agreement by public discussion from common information
1993 Standout
Works of Jack Levine being referenced
SOME CRYPTOGRAPHIC APPLICATIONS OF PERMUTATION POLYNOMIALS
1977
Applications of Lie derivatives to symmetries, geodesic mappings, and first integrals in Riemannian spaces
1972
Geodesic first integrals with explicit path-parameter dependence in Riemannian space–times
1981
Dynamical symmetries and constants of the motion for classical particle systems
1974
Time-dependent quadratic constants of motion, symmetries, and orbit equations for classical particle dynamical systems with time-dependent Kepler potentials
1982
Time-dependent vector constants of motion, symmetries, and orbit equations for the dynamical system r=ir{[U(t)/U(t)]r −[μ/U(t)]r−2}
1983
Characteristic functional structure of infinitesimal symmetry mappings of classical dynamical systems. I. Velocity-dependent mappings of second-order differential equations
1985
A gauge invariant formulation of time-dependent dynamical symmetry mappings and associated constants of motion for Lagrangian particle mechanics. I
1976