Arjen K. Lenstra incorporates Applied mathematics and Discrete mathematics in his research. His study deals with a combination of Discrete mathematics and Applied mathematics. His Combinatorics study frequently intersects with other fields, such as Sieve (category theory). He frequently studies issues relating to Combinatorics and Sieve (category theory). In his study, Arjen K. Lenstra carries out multidisciplinary Algorithm and Upper and lower bounds research. Arjen K. Lenstra connects Upper and lower bounds with Algorithm in his study. His research links Mathematical analysis with Linear equation. His Mathematical analysis study frequently links to adjacent areas such as Linear equation. His research ties Geometry and Reduction (mathematics) together.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Factoring Polynomials with Rational Coefficients
Arjen K. Lenstra;H. W. Lenstra;L. Lovasz.
Mathematische Annalen (1982)
Selecting Cryptographic Key Sizes
Arjen K. Lenstra;Eric R. Verheul.
Journal of Cryptology (2001)
The XTR public key system
A. K. Lenstra;E. R. Verheul.
Lecture Notes in Computer Science (2000)
Factorization of a 768-bit RSA modulus.
Thorsten Kleinjung;Kazumaro Aoki;Jens Franke;Arjen K. Lenstra.
IACR Cryptology ePrint Archive (2010)
The Development of the Number Field Sieve
Arjen K. Lenstra;Hendrik W. Lenstra.
(1993)
Factorization of a 768-bit RSA modulus
Thorsten Kleinjung;Kazumaro Aoki;Jens Franke;Arjen K. Lenstra.
international cryptology conference (2010)
The number field sieve
A. K. Lenstra;H. W. Lenstra;M. S. Manasse;J. M. Pollard.
symposium on the theory of computing (1990)
Algorithms in number theory
A. K. Lenstra;H. W. Lenstra.
Handbook of theoretical computer science (vol. A) (1991)
Short chosen-prefix collisions for MD5 and the creation of a rogue CA certificate
Marc Stevens;Alexander Sotirov;Jacob Appelbaum;Arjen K. Lenstra.
IACR Cryptology ePrint Archive (2009)
Chosen-Prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities
Marc Stevens;Arjen Lenstra;Benne Weger.
international cryptology conference (2007)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Leiden University
Microsoft (United States)
KU Leuven
Weizmann Institute of Science
Microsoft (United States)
Eötvös Loránd University
Tel Aviv University
Dartmouth College
University of New South Wales
University of Haifa
French Institute for Research in Computer Science and Automation - INRIA
Publications: 47
University of Colorado Boulder
Tilburg University
Queen's University
Centre national de la recherche scientifique, CNRS
University of Liverpool
Xiamen University
Oak Ridge National Laboratory
University of Malaya
University of Giessen
Karolinska Institute
Tokyo Institute of Technology
University of Southern California
Basque Center on Cognition, Brain and Language
University of Michigan–Ann Arbor
University of Utah
University of California, Irvine