Report on post-quantum cryptography L Chen, L Chen, S Jordan, YK Liu, D Moody, R Peralta, RA Perlner, ... US Department of Commerce, National Institute of Standards and Technology, 2016 | 840 | 2016 |
Simple constructions of almost k‐wise independent random variables N Alon, O Goldreich, J Håstad, R Peralta Random Structures & Algorithms 3 (3), 289-304, 1992 | 839 | 1992 |
Computation in networks of passively mobile finite-state sensors D Angluin, J Aspnes, Z Diamadi, MJ Fischer, R Peralta Proceedings of the twenty-third annual ACM symposium on Principles of …, 2004 | 769 | 2004 |
Status report on the third round of the NIST post-quantum cryptography standardization process G Alagic, G Alagic, D Apon, D Cooper, Q Dang, T Dang, J Kelsey, ... US Department of Commerce, National Institute of Standards and Technology 4, 07, 2022 | 555 | 2022 |
Status report on the second round of the NIST post-quantum cryptography standardization process G Alagic, J Alperin-Sheriff, D Apon, D Cooper, Q Dang, J Kelsey, YK Liu, ... US Department of Commerce, NIST 2, 69, 2020 | 378 | 2020 |
A new combinational logic minimization technique with applications to cryptology J Boyar, R Peralta Experimental Algorithms: 9th International Symposium, SEA 2010, Ischia …, 2010 | 214 | 2010 |
On the relation of error correction and cryptography to an online biometric based identification scheme GI Davida, Y Frankel, B Matt, R Peralta Workshop on coding and cryptography, 1999 | 199 | 1999 |
Demonstrating possession of a discrete logarithm without revealing it D Chaum, JH Evertse, J van de Graaf, R Peralta Advances in Cryptology—CRYPTO’86: Proceedings 6, 200-212, 1987 | 182 | 1987 |
Logic minimization techniques with applications to cryptology J Boyar, P Matthews, R Peralta Journal of Cryptology 26, 280-312, 2013 | 177 | 2013 |
A small depth-16 circuit for the AES S-box J Boyar, R Peralta IFIP International Information Security Conference, 287-298, 2012 | 128 | 2012 |
On the multiplicative complexity of boolean functions over the basis (∧,⊕, 1) J Boyar, R Peralta, D Pochuev Theoretical Computer Science 235 (1), 43-57, 2000 | 127 | 2000 |
A simple and secure way to show the validity of your public key J Van De Graaf, R Peralta Conference on the Theory and Application of Cryptographic Techniques, 128-134, 1987 | 119 | 1987 |
A simple and fast probabilistic algorithm for computing square roots modulo a prime number (Corresp.) R Peralta IEEE transactions on information theory 32 (6), 846-847, 1986 | 109 | 1986 |
Stably computable properties of network graphs D Angluin, J Aspnes, M Chan, MJ Fischer, H Jiang, R Peralta Distributed Computing in Sensor Systems: First IEEE International Conference …, 2005 | 104 | 2005 |
On the distribution of quadratic residues and nonresidues modulo a prime number R Peralta Mathematics of Computation 58 (197), 433-440, 1992 | 92 | 1992 |
Status report on the second round of the NIST post-quantum cryptography standardization process D Moody, G Alagic, DC Apon, DA Cooper, QH Dang, JM Kelsey, YK Liu, ... Dustin Moody, Gorjan Alagic, Daniel C. Apon, David A. Cooper, Quynh H. Dang …, 2020 | 80 | 2020 |
Asymptotic semismoothness probabilities E Bach, R Peralta Mathematics of computation 65 (216), 1701-1715, 1996 | 80 | 1996 |
Faster factoring of integers of a special form R Peralta, E Okamoto IEICE transactions on fundamentals of electronics, communications and …, 1996 | 70 | 1996 |
Simultaneous security of bits in the discrete log R Peralta Workshop on the Theory and Application of of Cryptographic Techniques, 62-72, 1985 | 69 | 1985 |
Report on pairing-based cryptography D Moody, R Peralta, R Perlner, A Regenscheid, A Roginsky, L Chen Journal of research of the National Institute of Standards and Technology …, 2015 | 65 | 2015 |