![]() | ![]() |
2005 | ||
---|---|---|
12 | EE | Anton Stiglic: Certificate of Primality. Encyclopedia of Cryptography and Security 2005 |
11 | EE | Anton Stiglic: Primality Proving Algorithm. Encyclopedia of Cryptography and Security 2005 |
10 | EE | Anton Stiglic: Primality Test. Encyclopedia of Cryptography and Security 2005 |
9 | EE | Anton Stiglic: Prime Generation. Encyclopedia of Cryptography and Security 2005 |
8 | EE | Anton Stiglic: Prime number. Encyclopedia of Cryptography and Security 2005 |
7 | EE | Anton Stiglic: Probabilistic Primality Test. Encyclopedia of Cryptography and Security 2005 |
6 | EE | Anton Stiglic: Pseudoprime. Encyclopedia of Cryptography and Security 2005 |
5 | EE | Anton Stiglic: Safe Prime. Encyclopedia of Cryptography and Security 2005 |
4 | EE | Anton Stiglic: Strong Prime. Encyclopedia of Cryptography and Security 2005 |
2001 | ||
3 | EE | Adam Back, Ulf Möller, Anton Stiglic: Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems. Information Hiding 2001: 245-257 |
2 | EE | Anton Stiglic: Computations with a deck of cards. Theor. Comput. Sci. 259(1-2): 671-678 (2001) |
1999 | ||
1 | EE | Adam Smith, Anton Stiglic: Multiparty computation unconditionally secure against Q^2 adversary structures CoRR cs.CR/9902010: (1999) |
1 | Adam Back | [3] |
2 | Ulf Möller | [3] |
3 | Adam Smith | [1] |