-
Cryptanalysis
of
a
Public
Key
Cryptosystem
Using
Matrices
Over
a
Ring
(PDF)
CORR 2000-60
A.M. Youssef and G. Gong
-
Ternary
Ideal
2-level
Autocorrelation
Sequences
(PDF)
CORR 2000-59
Michael Ludkovski and Guang Gong
-
The
Decimation-Hadamard
Transform
of
Two-level
Autocorrelation
Sequences
(PDF)
CORR 2000-58
Guang Gong and Solomon W. Golomb
-
n
Attractor-Repeller
Approach
to
Floorplanning
(PDF)
CORR 2000-57
Miguel F. Anjos
-
Software
Implementation
of
the
NIST
Elliptic
Curves
Over
Prime
Fields
(PDF)
CORR 2000-56
M. Brown, D. Hankerson, J. López, and A. Menezes
-
Provably
Secure
Implicit
Certificate
Schemes
(PDF)
CORR 2000-55
D.R.L. Brown, R. Gallant, and S.A. Vanstone
-
The
Exact
Security
of
ECDSA
(PDF)
CORR 2000-54
Daniel R.L. Brown
-
Faster
Point
Multiplication
on
Elliptic
Curves
with
Efficient
Endomorphisms
(PDF)
CORR 2000-53
R. Gallant, R. Lambert, and S. Vanstone
-
The
Quadrangulation
Conjecture
for
Orientable
Surfaces
(PDF)
CORR 2000-52
D.R.L. Brown and D.M. Jackson
-
The
Critical
Group
of
a
Directed
Graph
(PDF)
CORR 2000-51
David G. Wagner
-
Spectral
Domain
analysis
of
Correlation
Immune
and
Resilient
Boolean
Functions
(PDF)
CORR 2000-50
Palash Sarkar
-
New
approaches
to
designing
public
key
cryptosystems
using
one-way
funcitons
and
trap-doors
in
finite
groups
(PDF)
CORR 2000-49
S.S. Magliveras, D.R. Stinson, and Tran van Trung
-
Analysis
of
the
Weil
Descent
Attack
of
Gaudry,
Hess
and
Smart
(PDF)
CORR 2000-48
Alfred Menezes and Minghua Qu
-
Embedding
Grids
in
Surfaces
(PDF)
CORR 2000-47
J.F. Geelen, R.B. Richter, and G. Salazar
-
Constructions
and
Bounds
for
Unconditionally
Secure
Commitment
Schemes
(PDF)
CORR 2000-46
C. Blundo, B. Masucci, D.R. Stinson, and R. Wei
-
Self-Testing
of
Universal
and
Fault-Tolerant
Sets
of
Quantum
Gates
(PDF)
CORR 2000-45
Wim van Dam, Frédéric Magniez, Michele Mosca, and Miklos Santha
-
Quantum
Amplitude
Amplification
and
Estimation
(PDF)
CORR 2000-44
Gilles Brassard, Peter Høyer, Michele Mosca, and Alain Tapp
-
Postal
Revenue
Collection
in
the
Digital
Age
(PDF)
CORR 2000-43
Leon A. Pintsov, and Scott A. Vanstone
-
Software
Implementation
of
Elliptic
Curve
Cryptography
Over
Binary
Fields
(PDF)
CORR 2000-42
Darrel Hankerson, Julio López Hernandez, and Alfred Menezes
-
Quadratic
Expansions
of
Spectral
Functions
(PDF)
CORR 2000-41
Adrian S. Lewis and Hristo S. Sendov
-
The
Radius
of
Metric
Regularity
(PDF)
CORR 2000-40
A.L. Dontchev and A.S. Lewis, R.T. Rockafellar
-
Formal
Security
Proofs
for
a
Signature
Scheme
with
Partial
Message
Recovery
(PDF)
CORR 2000-39
Daniel R.L. Brown and Don B. Johnson
-
Semindefinite
Programming
for
Discrete
Optimization
and
Matrix
Completion
Problems
(PDF)
CORR 2000-38
Miguel F. Anjos and Henry Wolkowicz
-
TBA
CORR 2000-37
Henry Wolkowicz
-
On
Modular
Reduction
(PDF)
CORR 2000-36
Huapeng Wu
-
The
Parallelized
Pollard
Kangaroo
Method
in
Real
Quadratic
Function
Fields
(PDF)
CORR 2000-35
Andreas Stein and Edlyn Teske
-
Portfolio
Selection
and
Transactions
Costs
(PDF)
CORR 2000-34
M.J. Best and J. Hlouskova
-
Reconciliation
of
Various
Complexity
and
Condition
Measures
For
Linear
Programming
Problems
and
a
Generalization
of
Tardos'
Theorem
(PDF)
CORR 2000-33
Jackie C.K. Ho and Levent Tunçel
-
New
Designs
for
Signal
Sets
with
Low
Cross-correlation,
Balance
Property
and
Large
Linear
Span:
$GF(p)$
Case
(PDF)
CORR 2000-32
Guang Gong
-
Efficient
Algorithm
for
Polynomial
Modular
Reduction
(PDF)
CORR 2000-31
Huapeng Wu
-
On
Welch-Gong
Transformation
Sequence
Generators
(PDF)
CORR 2000-30
G. Gong and A.M. Youssef
-
Cryptanalysis
of
Imai
and
Matsumoto
scheme
B
asymmetric
cryptosystem
(PDF)
CORR 2000-29
A.M. Youssef
-
Montgomery
Multiplier
and
Squarer
in
$GF(2^m)$
(PDF)
CORR 2000-28
Huapeng Wu
-
On
Complexity
of
Squaring
using
Polynomial
Basis
in
$GF(2^m)$
(PDF)
CORR 2000-27
Huapeng Wu
-
Reduction
in
Purely
Cubic
Function
Fields
of
Unit
Rank
One
(PDF)
CORR 2000-26
R. Scheidler
-
Stirling
Numbers
for
Complex
Arguments:
Asymptotics
and
Identities
(PDF)
CORR 2000-25
Chiu Fan Lee and Bruce Richmond, Donatella Merlini
-
A
Non-Interior
Path
Following
Method
for
Convex
Quadratic
Programming
Problems
with
Bound
Constraints
(PDF)
CORR 2000-24
Song Xu
-
Convergence of an infeasible short-step path-following algorithm based on the Gauss-Newton direction (PDF)
CORR 2000-23Serge Kruk and Henry Wolkowicz
-
Cryptanalysis
of
the
"Augmented
Family
of
Cryptographic
Parity
Circuits"
proposed
at
ISW'97
(PDF)
CORR 2000-22
A.M. Youssef
-
Metering
Schemes
for
General
Access
Structures
(PDF)
CORR 2000-21
Barbara Masucci and Douglas R. Stinson
-
On
the
Quadratic
Span
of
Binary
Sequences
(PDF)
CORR 2000-20
A.M. Youssef and G. Gong
-
A
Tight
Semidefinite
Relaxation
of
the
Cut
Polytope
(PDF)
CORR 2000-19
Miguel F. Anjos and Henry Wolkowicz
-
Dynamic
Multi-Threshold
Metering
Schemes
(PDF)
CORR 2000-18
Carlo Blundo, Annalisa De Bonis, Barbara Masucci, and Douglas R. Stinson
-
Delsarte
systems:
combinaotrial
characterizations
of
Delsarte
$\cal
T$-designs
via
partially
ordered
sets
(PDF)
CORR 2000-17
William J. Martin
-
Combinatorial
properties
of
frameproof
and
traceability
codes
(PDF)
CORR 2000-16
J.N. Staddon, D.R. Stinson, and R. Wei
-
Twice
Differentiable
Spectral
Functions
(PDF)
CORR 2000-15
Adrian S. Lewis and Hristo S. Sendov
-
Chain
Polynomials
and
Link
Polynomials
(PDF)
CORR 2000-14
Ronald C. Read
-
On
the
Slater
condition
for
the
SDP
Relaxations
of
Nonconvex
Sets
(PDF)
CORR 2000-13
Levent Tunçel
-
A
Comparison
of
Two
Approaches
to
Pseudorandomness
(PDF)
CORR 2000-12
Yongge Wang
-
Using
Mobile
Agent
Results
to
Create
Hard-To-Detect
Computer
Viruses
(PDF)
CORR 2000-11
Yongge Wang
-
Exact
largest
and
smallest
size
of
components
in
decomposable
structures
(PDF)
CORR 2000-10
Daniel Panario and L. Bruce Richmond
-
Asymptotics
for
the
Probability
of
Connectedness
and
the
Distribution
of
Number
of
Components
(PDF)
CORR 2000-09
Jason P. Bell, Edward A. Bender, Peter J. Cameron, and L. Bruce Richmond
-
Smooth
Ideals
in
Hyperelliptic
Function
Fields
(PDF)
CORR 2000-08
Andreas Enge and Andreas Stein
-
Inequivalent
Transitive
Factorizations
into
Transpositions
(PDF)
CORR 2000-07
I.P. Goulden, D.M. Jackson, and F.G. Latour
-
Efficient
Metering
Schemes
with
Pricing
(PDF)
CORR 2000-06
Barbara Masucci and Douglas R. Stinson
-
On
the
Security
of
Williams
Based
Public
Key
Encryption
Scheme
(PDF)
CORR 2000-05
Signua Muller
-
Speeding
up
the
Arithmetic
on
Koblitz
Curves
of
Genus
Two
(PDF)
CORR 2000-04
Christian Gunther, Tanja Lange, and Andreas Stein
-
A
Note
on
Shanks's
Chains
of
Primes
(PDF)
CORR 2000-03
E. Teske and H.C. Williams
-
Baby-Step
Giant-Step
algorithms
for
Non-uniform
Distributions
(PDF)
CORR 2000-02
Simon R. Blackburn and Edlyn Teske
-
When
does
the
Positive
Semidefiniteness
Constraint
Help
in
Lifting
Procedures
(PDF)
CORR 2000-01
Michel X. Goemans and Levent Tunçel