Rene Peralta
TitleCited byYear
Simple constructions of almost k‐wise independent random variables
N Alon, O Goldreich, J Håstad, R Peralta
Random Structures & Algorithms 3 (3), 289-304, 1992
6901992
Computation in networks of passively mobile finite-state sensors
D Angluin, J Aspnes, Z Diamadi, MJ Fischer, R Peralta
Distributed computing 18 (4), 235-253, 2006
5392006
Report on post-quantum cryptography
L Chen, L Chen, S Jordan, YK Liu, D Moody, R Peralta, R Perlner, ...
US Department of Commerce, National Institute of Standards and Technology, 2016
2432016
Demonstrating possession of a discrete logarithm without revealing it
D Chaum, JH Evertse, J van de Graaf, R Peralta
Conference on the Theory and Application of Cryptographic Techniques, 200-212, 1986
1801986
On the relation of error correction and cryptography to an online biometric based identification scheme
GI Davida, Y Frankel, B Matt, R Peralta
Workshop on coding and cryptography, 1999
1751999
A new combinational logic minimization technique with applications to cryptology
J Boyar, R Peralta
International Symposium on Experimental Algorithms, 178-189, 2010
1232010
On the multiplicative complexity of boolean functions over the basis (∧,⊕, 1)
J Boyar, R Peralta, D Pochuev
Theoretical Computer Science 235 (1), 43-57, 2000
1092000
A simple and secure way to show the validity of your public key
J Van De Graaf, R Peralta
Conference on the Theory and Application of Cryptographic Techniques, 128-134, 1987
1071987
Stably computable properties of network graphs
D Angluin, J Aspnes, M Chan, MJ Fischer, H Jiang, R Peralta
International Conference on Distributed Computing in Sensor Systems, 63-74, 2005
992005
A simple and fast probabilistic algorithm for computing square roots modulo a prime number (Corresp.)
R Peralta
IEEE transactions on information theory 32 (6), 846-847, 1986
951986
Logic minimization techniques with applications to cryptology
J Boyar, P Matthews, R Peralta
Journal of Cryptology 26 (2), 280-312, 2013
892013
Simultaneous security of bits in the discrete log
R Peralta
Workshop on the Theory and Application of of Cryptographic Techniques, 62-72, 1985
701985
A small depth-16 circuit for the AES S-Box
J Boyar, R Peralta
IFIP International Information Security Conference, 287-298, 2012
692012
On the distribution of quadratic residues and nonresidues modulo a prime number
R Peralta
Mathematics of Computation 58 (197), 433-440, 1992
651992
Asymptotic semismoothness probabilities
E Bach, R Peralta
Mathematics of computation 65 (216), 1701-1715, 1996
631996
Faster factoring of integers of a special form
R Peralta, E Okamoto
IEICE Transactions on Fundamentals of Electronics, Communications and …, 1996
511996
Implementation of Virtual Private Networks at the Transport Layer
J Davila, J Lopez, R Peralta
International Workshop on Information Security, 85-102, 1999
421999
Short non-interactive cryptographic proofs
J Boyar, I Damgård, R Peralta
Journal of Cryptology 13 (4), 449-472, 2000
412000
A provably secure oblivious transfer protocol
R Berger, R Peralta, T Tedrick
Workshop on the Theory and Application of of Cryptographic Techniques, 379-386, 1984
391984
A depth-16 circuit for the AES S-box.
J Boyar, R Peralta
IACR Cryptology ePrint Archive 2011 (IACR Cryptology ePrint Archive), 2011
342011
The system can't perform the operation now. Try again later.
Articles 1–20