2008 |
9 | EE | Joshua Holden:
Review of Complexity and Cryptography: An Introduction by John Talbot and Dominic Welsh.
Cryptologia 32(1): 92-97 (2008) |
2006 |
8 | EE | Joshua Holden,
Richard Layton,
Laurence D. Merkle,
Tina A. Hudson:
Underwater Hacker Missile Wars: A Cryptography and Engineering Contest.
Cryptologia 30(1): 69-77 (2006) |
2005 |
7 | EE | Joshua Holden,
Richard Layton,
Laurence D. Merkle,
Tina A. Hudson:
Underwater Hacker Missile Wars: A Cryptography and Engineering Contest
CoRR abs/cs/0509053: (2005) |
2004 |
6 | EE | Paul De Palma,
Charles Frank,
Suzanne E. Gladfelter,
Joshua Holden:
Cryptography and computer security for undergraduates.
SIGCSE 2004: 94-95 |
5 | EE | Joshua Holden:
A Comparison of Cryptography Courses
CoRR cs.CR/0401002: (2004) |
4 | | Joshua Holden:
First-hit analysis of algorithms for computing quadratic irregularity.
Math. Comput. 73(246): 939-948 (2004) |
2002 |
3 | EE | Joshua Holden:
Fixed Points and Two-Cycles of the Discrete Logarithm.
ANTS 2002: 405-415 |
2 | | Joshua Holden:
Comparison of algorithms to calculate quadratic irregularity of prime numbers.
Math. Comput. 71(238): 863-871 (2002) |
1998 |
1 | EE | Joshua Holden:
Irregularity of Prime Numbers over Real Quadratic Fields.
ANTS 1998: 454-462 |