Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Charles C. Y. Lam
@article{DBLP:journals/arscom/LamL14, author = {Charles C. Y. Lam and Alan C. H. Ling}, title = {A Construction of Modular Generalized Sidon Sets}, journal = {Ars Comb.}, volume = {114}, pages = {65--71}, year = {2014}, timestamp = {Fri, 05 Sep 2014 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/arscom/LamL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/HinekL10, author = {M. Jason Hinek and Charles C. Y. Lam}, title = {Common modulus attacks on small private exponent {RSA} and some fast variants (in practice)}, journal = {J. Math. Cryptol.}, volume = {4}, number = {1}, pages = {58--93}, year = {2010}, url = {https://doi.org/10.1515/jmc.2010.003}, doi = {10.1515/JMC.2010.003}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/HinekL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/HinekL09, author = {M. Jason Hinek and Charles C. Y. Lam}, title = {Another look at some fast modular arithmetic methods}, journal = {J. Math. Cryptol.}, volume = {3}, number = {2}, pages = {165--174}, year = {2009}, url = {https://doi.org/10.1515/JMC.2009.008}, doi = {10.1515/JMC.2009.008}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/HinekL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HinekL09, author = {M. Jason Hinek and Charles C. Y. Lam}, title = {Common Modulus Attacks on Small Private Exponent {RSA} and Some Fast Variants (in Practice)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {37}, year = {2009}, url = {http://eprint.iacr.org/2009/037}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HinekL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/LamGV02, author = {Charles C. Y. Lam and Guang Gong and Scott A. Vanstone}, editor = {Robert H. Deng and Sihan Qing and Feng Bao and Jianying Zhou}, title = {Message Authentication Codes with Error Correcting Capabilities}, booktitle = {Information and Communications Security, 4th International Conference, {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2513}, pages = {354--366}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36159-6\_30}, doi = {10.1007/3-540-36159-6\_30}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/icics/LamGV02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/seta/GongL01, author = {Guang Gong and Charles C. Y. Lam}, editor = {Tor Helleseth and P. Vijay Kumar and Kyeongcheol Yang}, title = {Linear Recursive Sequences over Elliptic Curves}, booktitle = {Sequences and their Applications - Proceedings of {SETA} 2001, Bergen, Norway, May 13-17, 2001}, series = {Discrete Mathematics and Theoretical Computer Science}, pages = {182--196}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/978-1-4471-0673-9\_13}, doi = {10.1007/978-1-4471-0673-9\_13}, timestamp = {Tue, 25 Jun 2019 15:57:55 +0200}, biburl = {https://dblp.org/rec/conf/seta/GongL01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.