2008 | ||
---|---|---|
9 | EE | Joshua Holden: Review of Complexity and Cryptography: An Introduction by John Talbot and Dominic Welsh. Cryptologia 32(1): 92-97 (2008) |
2006 | ||
8 | EE | Joshua Holden, Richard Layton, Laurence D. Merkle, Tina A. Hudson: Underwater Hacker Missile Wars: A Cryptography and Engineering Contest. Cryptologia 30(1): 69-77 (2006) |
2005 | ||
7 | EE | Joshua Holden, Richard Layton, Laurence D. Merkle, Tina A. Hudson: Underwater Hacker Missile Wars: A Cryptography and Engineering Contest CoRR abs/cs/0509053: (2005) |
2004 | ||
6 | EE | Paul De Palma, Charles Frank, Suzanne E. Gladfelter, Joshua Holden: Cryptography and computer security for undergraduates. SIGCSE 2004: 94-95 |
5 | EE | Joshua Holden: A Comparison of Cryptography Courses CoRR cs.CR/0401002: (2004) |
4 | Joshua Holden: First-hit analysis of algorithms for computing quadratic irregularity. Math. Comput. 73(246): 939-948 (2004) | |
2002 | ||
3 | EE | Joshua Holden: Fixed Points and Two-Cycles of the Discrete Logarithm. ANTS 2002: 405-415 |
2 | Joshua Holden: Comparison of algorithms to calculate quadratic irregularity of prime numbers. Math. Comput. 71(238): 863-871 (2002) | |
1998 | ||
1 | EE | Joshua Holden: Irregularity of Prime Numbers over Real Quadratic Fields. ANTS 1998: 454-462 |
1 | Charles Frank | [6] |
2 | Suzanne E. Gladfelter | [6] |
3 | Tina A. Hudson | [7] [8] |
4 | Richard Layton | [7] [8] |
5 | Laurence D. Merkle | [7] [8] |
6 | Paul De Palma | [6] |