Author:
Baumslag Gilbert,Fazio Nelly,Nicolosi Antonio R.,Shpilrain Vladimir,Skeith William E.
Publisher
Springer Berlin Heidelberg
Reference39 articles.
1. Ajtai, M.: Generating hard instances of lattice problems (extended abstract). In: Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, pp. 99–108. ACM, New York (1996)
2. Ajtai, M., Dwork, C.: A public-key cryptosystem with worst-case/average-case equivalence. In: STOC 1997, pp. 284–293 (1997)
3. Angluin, D., Laird, P.: Learning from noisy examples. Machine Learning 2(4), 343–370 (1988)
4. Anshel, I., Anshel, M., Goldfeld, D.: Non-abelian key agreement protocols. Discrete Applied Mathematics 130(1), 3–12 (2003)
5. Lecture Notes in Computer Science;B. Applebaum,2009
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献