Anton Stiglic

According to our database1, Anton Stiglic authored at least 21 papers between 1999 and 2011.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2011
Strong Prime.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Pseudoprime.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Probabilistic Primality Test.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Prime Number.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Prime Generation.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Primality Test.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Primality Proving Algorithm.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Certificate of Primality.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

2005
Strong Prime.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Safe Prime.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Pseudoprime.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Probabilistic Primality Test.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Prime number.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Prime Generation.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Primality Test.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Primality Proving Algorithm.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Certificate of Primality.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

2001
Computations with a deck of cards.
Theor. Comput. Sci., 2001

A Description of Protocols for Private Credentials.
IACR Cryptol. ePrint Arch., 2001

Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems.
Proceedings of the Information Hiding, 4th International Workshop, 2001

1999
Multiparty computation unconditionally secure against Q^2 adversary structures
CoRR, 1999


  Loading...