Solving the Pell equation MJ Jacobson, HC Williams Springer, 2009 | 216 | 2009 |
Army of Botnets. R Vogt, J Aycock, MJ Jacobson Jr NDSS, 2007 | 173 | 2007 |
Analysis of the xedni calculus attack MJ Jacobson, N Koblitz, JH Silverman, A Stein, E Teske Designs, Codes and Cryptography 20 (1), 41-64, 2000 | 113 | 2000 |
Improved port knocking with strong authentication R Degraaf, J Aycock, M Jacobson 21st Annual Computer Security Applications Conference (ACSAC'05), 10 pp.-462, 2005 | 104 | 2005 |
Solving elliptic curve discrete logarithm problems using Weil descent M Jacobson, A Menezes, A Stein Cryptology ePrint Archive, 2001 | 81 | 2001 |
On some computational problems in finite abelian groups J Buchmann, M Jacobson Jr, E Teske Mathematics of Computation 66 (220), 1663-1687, 1997 | 76 | 1997 |
Subexponential class group computation in quadratic orders MJ Jacobson Shaker, 1999 | 71 | 1999 |
The eczema area and severity index—a practical guide JM Hanifin, W Baghoomian, E Grinich, YA Leshem, M Jacobson, ... Dermatitis 33 (3), 187-192, 2022 | 68 | 2022 |
Hyperelliptic curves and cryptography MJ Jacobson, A Menezes, A Stein Faculty of Mathematics, University of Waterloo, 2003 | 63 | 2003 |
A cryptosystem based on non-maximal imaginary quadratic orders with fast decryption D Hühnlein, MJ Jacobson, S Paulus, T Takagi Advances in Cryptology—EUROCRYPT'98: International Conference on the Theory …, 1998 | 59 | 1998 |
FPGA implementation of point multiplication on Koblitz curves using Kleinian integers VS Dimitrov, KU Järvinen, MJ Jacobson, WF Chan, Z Huang Cryptographic Hardware and Embedded Systems-CHES 2006: 8th International …, 2006 | 54 | 2006 |
Wiener, editor J Michael Advances in Cryptology-CRYPTO 99, 15-19, 1999 | 48 | 1999 |
Provably sublinear point multiplication on Koblitz curves and its hardware implementation VS Dimitrov, KU Järvinen, MJ Jacobson, WF Chan, Z Huang IEEE Transactions on Computers 57 (11), 1469-1481, 2008 | 44 | 2008 |
Computational aspects of NUCOMP MJ Jacobson Jr, AJ van der Poorten International Algorithmic Number Theory Symposium, 120-133, 2002 | 42 | 2002 |
Anti-disassembly using cryptographic hash functions J Aycock, R deGraaf, M Jacobson Journal in Computer Virology 2, 79-85, 2006 | 41 | 2006 |
Cryptographic protocols on real hyperelliptic curves MJ Jacobson, R Scheidler, A Stein Adv. Math. Commun. 1 (2), 197-221, 2007 | 40 | 2007 |
An investigation of bounds for the regulator of quadratic fields MJ Jacobson, RF Lukes, HC Williams Experimental Mathematics 4 (3), 211-225, 1995 | 40 | 1995 |
A computational approach for solving MJ Jacobson Jr, Á Pintér, PG Walsh Mathematics of computation 72 (244), 2099-2110, 2003 | 39 | 2003 |
Computing discrete logarithms in quadratic orders MJ Jacobson Journal of Cryptology 13, 473-492, 2000 | 37 | 2000 |
Numerical results on class groups of imaginary quadratic fields MJ Jacobson, S Ramachandran, HC Williams Algorithmic Number Theory: 7th International Symposium, ANTS-VII, Berlin …, 2006 | 36 | 2006 |