What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Arjen K. Lenstra
Google Scholar
45
publications in security and cryptology related venues
Year
Venue
Title
2017
conf/eurocrypt
Computation of a 768-Bit Prime Field Discrete Logarithm.
Thorsten Kleinjung
Claus Diem
Arjen K. Lenstra
Christine Priplata
Colin Stahlke
2014
conf/ches
Cofactorization on Graphics Processing Units.
Andrea Miele
Joppe W. Bos
Thorsten Kleinjung
Arjen K. Lenstra
2014
conf/asiacrypt
Mersenne Factorization Factory.
Thorsten Kleinjung
Joppe W. Bos
Arjen K. Lenstra
2012
conf/crypto
Public Keys.
Arjen K. Lenstra
James P. Hughes
Maxime Augier
Joppe W. Bos
Thorsten Kleinjung
Christophe Wachter
2010
conf/crypto
Factorization of a 768-Bit RSA Modulus.
Thorsten Kleinjung
Kazumaro Aoki
Jens Franke
Arjen K. Lenstra
Emmanuel Thomé
Joppe W. Bos
Pierrick Gaudry
Alexander Kruppa
Peter L. Montgomery
Dag Arne Osvik
Herman J. J. te Riele
Andrey Timofeev
Paul Zimmermann
2009
conf/crypto
Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate.
Marc Stevens
Alexander Sotirov
Jacob Appelbaum
Arjen K. Lenstra
David Molnar
Dag Arne Osvik
Benne de Weger
2009
conf/pkc
Improving the Boneh-Franklin Traitor Tracing Scheme.
Pascal Junod
Alexandre Karlov
Arjen K. Lenstra
2007
conf/eurocrypt
Chosen-Prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities.
Marc Stevens
Arjen K. Lenstra
Benne de Weger
2007
conf/asiacrypt
A Kilobit Special Number Field Sieve Factorization.
Kazumaro Aoki
Jens Franke
Thorsten Kleinjung
Arjen K. Lenstra
Dag Arne Osvik
2006
conf/eurocrypt
VSH, an Efficient and Provable Collision-Resistant Hash Function.
Scott Contini
Arjen K. Lenstra
Ron Steinfeld
2005
conf/acisp
On the Possibility of Constructing Meaningful Hash Collisions for Public Keys.
Arjen K. Lenstra
Benne de Weger
2004
journals/joc
Preface.
Arjen K. Lenstra
2004
conf/acisp
Information Security Risk Assessment, Aggregation, and Mitigation.
Arjen K. Lenstra
Tim Voss
2003
conf/asiacrypt
Factoring Estimates for a 1024-Bit RSA Modulus.
Arjen K. Lenstra
Eran Tromer
Adi Shamir
Wil Kortsmit
Bruce Dodson
James P. Hughes
Paul C. Leyland
2002
conf/ches
Efficient Subgroup Exponentiation in Quadratic and Sixth Degree Extensions.
Martijn Stam
Arjen K. Lenstra
2002
conf/pkc
Selective Forgery of RSA Signatures with Fixed-Pattern Padding.
Arjen K. Lenstra
Igor E. Shparlinski
2002
conf/asiacrypt
Analysis of Bernstein's Factorization Circuit.
Arjen K. Lenstra
Adi Shamir
Jim Tomlinson
Eran Tromer
2001
journals/joc
Selecting Cryptographic Key Sizes.
Arjen K. Lenstra
Eric R. Verheul
2001
conf/pkc
On the Security of Lenstra's Variant of DSA without Long Inversions.
Arjen K. Lenstra
Igor E. Shparlinski
2001
conf/pkc
Fast Irreducibility and Subgroup Membership Testing in XTR.
Arjen K. Lenstra
Eric R. Verheul
2001
conf/asiacrypt
Unbelievable Security. Matching AES Security Using Public Key Systems.
Arjen K. Lenstra
2001
conf/asiacrypt
Speeding Up XTR.
Martijn Stam
Arjen K. Lenstra
2000
conf/crypto
The XTR Public Key System.
Arjen K. Lenstra
Eric R. Verheul
2000
conf/pkc
Selecting Cryptographic Key Sizes.
Arjen K. Lenstra
Eric R. Verheul
2000
conf/eurocrypt
Analysis and Optimization of the TWINKLE Factoring Device.
Arjen K. Lenstra
Adi Shamir
2000
conf/eurocrypt
Factorization of a 512-Bit RSA Modulus.
Stefania Cavallar
Bruce Dodson
Arjen K. Lenstra
Walter M. Lioen
Peter L. Montgomery
Brian Murphy
Herman J. J. te Riele
Karen I. Aardal
Jeff Gilchrist
Gérard Guillerm
Paul C. Leyland
Joël Marchand
François Morain
Alec Muffett
Chris Putnam
Craig Putnam
Paul Zimmermann
2000
conf/asiacrypt
Key Improvements to XTR.
Arjen K. Lenstra
Eric R. Verheul
1999
journals/joc
Chinese Remaindering Based Cryptosystems in the Presence of Faults.
Marc Joye
Arjen K. Lenstra
Jean-Jacques Quisquater
1999
conf/acisp
Efficient Identity Based Parameter Selection for Elliptic Curve Cryptosystems.
Arjen K. Lenstra
1999
conf/asiacrypt
Factorization of RSA-140 Using the Number Field Sieve.
Stefania Cavallar
Bruce Dodson
Arjen K. Lenstra
Paul C. Leyland
Walter M. Lioen
Peter L. Montgomery
Brian Murphy
Herman J. J. te Riele
Paul Zimmermann
1998
conf/asiacrypt
Generating RSA Moduli with a Predetermined Portion.
Arjen K. Lenstra
1997
conf/acisp
Using Cyclotomic Polynomials to Construct Efficient Discrete Logarithm Cryptosystems Over Finite Fields.
Arjen K. Lenstra
1996
conf/asiacrypt
Generating Standard DSA Signatures Without Long Inversion.
Arjen K. Lenstra
1996
conf/asiacrypt
A World Wide Number Field Sieve Factoring Record: On to 512 Bits.
James Cowie
Bruce Dodson
R. Marije Elkenbracht-Huizing
Arjen K. Lenstra
Peter L. Montgomery
Jörg Zayer
1995
conf/crypto
A Key Escrow System with Warrant Bounds.
Arjen K. Lenstra
Peter Winkler
Yacov Yacobi
1995
conf/crypto
NFS with Four Large Primes: An Explosive Experiment.
Bruce Dodson
Arjen K. Lenstra
1995
conf/crypto
Some Remarks on Lucas-Based Cryptosystems.
Daniel Bleichenbacher
Wieb Bosma
Arjen K. Lenstra
1994
conf/asiacrypt
The Magic Words are Squeamish Ossifrage.
Derek Atkins
Michael Graff
Arjen K. Lenstra
Paul C. Leyland
1993
journals/joc
User Impersonation in Key Certification Schemes.
Arjen K. Lenstra
Yacov Yacobi
1993
conf/crypto
On the Factorization of RSA-120.
Thomas F. Denny
Bruce Dodson
Arjen K. Lenstra
Mark S. Manasse
1993
conf/eurocrypt
Factoring Integers Using SIMD Sieves.
Brandon Dixon
Arjen K. Lenstra
1992
conf/eurocrypt
The Eurocrypt '92 Controversial Issue: Trapdoor Primes and Moduli (Panel).
Yvo Desmedt
Peter Landrock
Arjen K. Lenstra
Kevin S. McCurley
Andrew M. Odlyzko
Rainer A. Rueppel
Miles E. Smid
1992
conf/eurocrypt
Massively Parallel Elliptic Curve Factorin.
Brandon Dixon
Arjen K. Lenstra
1990
conf/eurocrypt
Factoring With Two Large Primes.
Arjen K. Lenstra
Mark S. Manasse
1989
conf/eurocrypt
Factoring by Electronic Mail.
Arjen K. Lenstra
Mark S. Manasse
Coauthors
Adi Shamir
(3)
Alec Muffett
(1)
Alexander Kruppa
(1)
Alexander Sotirov
(1)
Alexandre Karlov
(1)
Andrea Miele
(1)
Andrew M. Odlyzko
(1)
Andrey Timofeev
(1)
Arjen K. Lenstra
(45)
Benne de Weger
(3)
Brandon Dixon
(2)
Brian Murphy
(2)
Bruce Dodson
(6)
Chris Putnam
(1)
Christine Priplata
(1)
Christophe Wachter
(1)
Claus Diem
(1)
Colin Stahlke
(1)
Craig Putnam
(1)
Dag Arne Osvik
(3)
Daniel Bleichenbacher
(1)
David Molnar
(1)
Derek Atkins
(1)
Emmanuel Thomé
(1)
Eran Tromer
(2)
Eric R. Verheul
(5)
François Morain
(1)
Gérard Guillerm
(1)
Herman J. J. te Riele
(3)
Igor E. Shparlinski
(2)
Jacob Appelbaum
(1)
James Cowie
(1)
James P. Hughes
(2)
Jean-Jacques Quisquater
(1)
Jeff Gilchrist
(1)
Jens Franke
(2)
Jim Tomlinson
(1)
Joël Marchand
(1)
Joppe W. Bos
(4)
Jörg Zayer
(1)
Karen I. Aardal
(1)
Kazumaro Aoki
(2)
Kevin S. McCurley
(1)
Marc Joye
(1)
Marc Stevens
(2)
Mark S. Manasse
(3)
Martijn Stam
(2)
Maxime Augier
(1)
Michael Graff
(1)
Miles E. Smid
(1)
Pascal Junod
(1)
Paul C. Leyland
(4)
Paul Zimmermann
(3)
Peter L. Montgomery
(4)
Peter Landrock
(1)
Peter Winkler
(1)
Pierrick Gaudry
(1)
R. Marije Elkenbracht-Huizing
(1)
Rainer A. Rueppel
(1)
Ron Steinfeld
(1)
Scott Contini
(1)
Stefania Cavallar
(2)
Thomas F. Denny
(1)
Thorsten Kleinjung
(6)
Tim Voss
(1)
Walter M. Lioen
(2)
Wieb Bosma
(1)
Wil Kortsmit
(1)
Yacov Yacobi
(2)
Yvo Desmedt
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to