Skip to search formSkip to main content

You are currently offline. Some features of the site may not work correctly.

Semantic Scholar uses AI to extract papers important to this topic.

2016

2016

Abstract Building on work of Hardy and Ramanujan, Rademacher proved a well-known formula for the values of the ordinary partition… Expand

Is this relevant?

2014

2014

For $m\ge 2$, let $\pi$ be an irreducible cuspidal automorphic representation of $GL_m(\mathbb{A}_{\mathbb{Q}})$ with unitary… Expand

Is this relevant?

2009

2009

The Anshel-Anshel-Goldfeld-Lemieux (abbreviated AAGL) key agreement protocol [Contemp. Math. 418: 1–34, 2006] is proposed to be… Expand

Is this relevant?

Highly Cited

2007

Highly Cited

2007

The length based attack on Anshel-Anshel-Goldfeld commutator key-exchange protocol [1] was initially proposed by Hughes and… Expand

Is this relevant?

2007

2007

Cryptography based on noncommutative algebra still suffers from lack of schemes and lack of interest. In this work, we show new… Expand

Is this relevant?

Highly Cited

2005

Highly Cited

2005

Recently, several public key exchange protocols based on symbolic computation in non-commutative (semi)groups were proposed as a… Expand

Is this relevant?

Highly Cited

2003

Highly Cited

2003

The classical class number problem of Gauss asks for a classification of all imaginary quadratic fields with a given class number… Expand

Is this relevant?

2000

2000

In this work a new kind of non-holomorphic Eisenstein series, first introduced by Goldfeld, is studied. For an arbitrary Fuchsian… Expand

Is this relevant?

1985

1985

Many — conjecturally all — elliptic curves E/Q have a "modular parametrization," i.e. for some N there is a map tp from the… Expand

Is this relevant?

1982

1982

Economic theory suggests that demand be- occurred within the period. If the structure has havior is time variant, but does not… Expand

Is this relevant?