Simple constructions of almost k‐wise independent random variables N Alon, O Goldreich, J Håstad, R Peralta Random Structures & Algorithms 3 (3), 289-304, 1992 | 690 | 1992 |

Computation in networks of passively mobile finite-state sensors D Angluin, J Aspnes, Z Diamadi, MJ Fischer, R Peralta Distributed computing 18 (4), 235-253, 2006 | 539 | 2006 |

Report on post-quantum cryptography L Chen, L Chen, S Jordan, YK Liu, D Moody, R Peralta, R Perlner, ... US Department of Commerce, National Institute of Standards and Technology, 2016 | 243 | 2016 |

Demonstrating possession of a discrete logarithm without revealing it D Chaum, JH Evertse, J van de Graaf, R Peralta Conference on the Theory and Application of Cryptographic Techniques, 200-212, 1986 | 180 | 1986 |

On the relation of error correction and cryptography to an online biometric based identification scheme GI Davida, Y Frankel, B Matt, R Peralta Workshop on coding and cryptography, 1999 | 175 | 1999 |

A new combinational logic minimization technique with applications to cryptology J Boyar, R Peralta International Symposium on Experimental Algorithms, 178-189, 2010 | 123 | 2010 |

On the multiplicative complexity of boolean functions over the basis (∧,⊕, 1) J Boyar, R Peralta, D Pochuev Theoretical Computer Science 235 (1), 43-57, 2000 | 109 | 2000 |

A simple and secure way to show the validity of your public key J Van De Graaf, R Peralta Conference on the Theory and Application of Cryptographic Techniques, 128-134, 1987 | 107 | 1987 |

Stably computable properties of network graphs D Angluin, J Aspnes, M Chan, MJ Fischer, H Jiang, R Peralta International Conference on Distributed Computing in Sensor Systems, 63-74, 2005 | 99 | 2005 |

A simple and fast probabilistic algorithm for computing square roots modulo a prime number (Corresp.) R Peralta IEEE transactions on information theory 32 (6), 846-847, 1986 | 95 | 1986 |

Logic minimization techniques with applications to cryptology J Boyar, P Matthews, R Peralta Journal of Cryptology 26 (2), 280-312, 2013 | 89 | 2013 |

Simultaneous security of bits in the discrete log R Peralta Workshop on the Theory and Application of of Cryptographic Techniques, 62-72, 1985 | 70 | 1985 |

A small depth-16 circuit for the AES S-Box J Boyar, R Peralta IFIP International Information Security Conference, 287-298, 2012 | 69 | 2012 |

On the distribution of quadratic residues and nonresidues modulo a prime number R Peralta Mathematics of Computation 58 (197), 433-440, 1992 | 65 | 1992 |

Asymptotic semismoothness probabilities E Bach, R Peralta Mathematics of computation 65 (216), 1701-1715, 1996 | 63 | 1996 |

Faster factoring of integers of a special form R Peralta, E Okamoto IEICE Transactions on Fundamentals of Electronics, Communications and …, 1996 | 51 | 1996 |

Implementation of Virtual Private Networks at the Transport Layer J Davila, J Lopez, R Peralta International Workshop on Information Security, 85-102, 1999 | 42 | 1999 |

Short non-interactive cryptographic proofs J Boyar, I Damgård, R Peralta Journal of Cryptology 13 (4), 449-472, 2000 | 41 | 2000 |

A provably secure oblivious transfer protocol R Berger, R Peralta, T Tedrick Workshop on the Theory and Application of of Cryptographic Techniques, 379-386, 1984 | 39 | 1984 |

A depth-16 circuit for the AES S-box. J Boyar, R Peralta IACR Cryptology ePrint Archive 2011 (IACR Cryptology ePrint Archive), 2011 | 34 | 2011 |