Sign in
Author

Conference

Journal

Organization

Year

DOI
Look for results that meet for the following criteria:
since
equal to
before
between
and
Search in all fields of study
Limit my searches in the following fields of study
Agriculture Science
Arts & Humanities
Biology
Chemistry
Computer Science
Economics & Business
Engineering
Environmental Sciences
Geosciences
Material Science
Mathematics
Medicine
Physics
Social Science
Multidisciplinary
Coauthors
(19)
Karl Rubin
22
Yu. G. Zarhin
16
Karl Rubin
5
Y. U. G. ZARHIN
3
Judy L. Walker
2
Conferences
(4)
ASIACRYPT
3
CRYPTO
2
EUROCRYPT
1
ANTS
1
Journals
(16)
EXP MATH
4
J ALGEBRA
4
J PURE APPL ALG
4
J NUMBER THEOR
3
BULL AMER MATH SOC
2
Keywords
(68)
Embed
Subscribe
Academic
Authors
Alice Silverberg
Alice Silverberg,University of California Irvine,Algebra,Security & Privacy,Number Theory
Edit
Alice Silverberg
University of California Irvine
Publications:
63

Citations:
861
Fields:
Algebra
,
Security & Privacy
,
Number Theory
View FAQ about top research areas and Fields of study
Collaborated with
19 coauthors
from 1992 to 2011

Cited by
905 authors
Cumulative
Annual
Sort by:
Publications
(63)
BibTeX

RIS

RefWorks
Download
Finding composite order ordinary elliptic curves using the Cocks–Pinch method
(
Citations: 3
)
D. Boneh
,
K. Rubin
,
A. Silverberg
Journal:
Journal of Number Theory  J NUMBER THEOR
, vol. 131, no. 5, pp. 832841, 2011
Choosing the correct elliptic curve in the CM method
(
Citations: 9
)
Karl Rubin
,
Alice Silverberg
Journal:
Mathematics of Computation  Math. Comput.
, vol. 79, no. 269, pp. 545561, 2010
On elliptic curves with an isogeny of degree 7
(
Citations: 1
)
R. Greenberg
,
K. Rubin
,
A. Silverberg
,
M. Stoll
Published in 2010.
Using Abelian Varieties to Improve PairingBased Cryptography
(
Citations: 8
)
Karl Rubin
,
Alice Silverberg
Journal:
Journal of Cryptology  JOC
, vol. 22, no. 3, pp. 330364, 2009
Point counting on reductions of CM elliptic curves
(
Citations: 4
)
K. Rubin
,
A. Silverberg
Journal:
Journal of Number Theory  J NUMBER THEOR
, vol. 129, no. 12, pp. 29032923, 2009
Sort by:
Citations
(861 times by 715 publications)
A Local Version of Szpiro's Conjecture
Michael A. Bennett
,
Soroosh Yazdani
Journal:
Experimental Mathematics  EXP MATH
, vol. 21, no. 2, pp. 103116, 2012
CiphertextPolicy AttributeBased Encryption: An Expressive, Efficient, and Provably Secure Realization
(
Citations: 36
)
Brent Waters
Published in 2011.
Decentralizing AttributeBased Encryption
(
Citations: 6
)
Allison Lewkoand
,
Brent Waters
Conference:
Theory and Application of Cryptographic Techniques  EUROCRYPT
, pp. 568588, 2011
Functional Encryption: Definitions and Challenges
(
Citations: 6
)
Dan Boneh
,
Amit Sahai
,
Brent Waters
Conference:
Theory of Cryptography
, pp. 253273, 2011
Unbounded HIBE and AttributeBased Encryption
(
Citations: 2
)
Allison Lewkoand
,
Brent Waters
Conference:
Theory and Application of Cryptographic Techniques  EUROCRYPT
, pp. 547567, 2011
Comments