Skip to search formSkip to main content>Semantic Scholar Semantic Scholar's Logo

Search

You are currently offline. Some features of the site may not work correctly.

Semantic Scholar uses AI to extract papers important to this topic.

2016

2016

Abstract Building on work of Hardy and Ramanujan, Rademacher proved a well-known formula for the values of the ordinary partition… Expand

2014

2014

For $m\ge 2$, let $\pi$ be an irreducible cuspidal automorphic representation of $GL_m(\mathbb{A}_{\mathbb{Q}})$ with unitary… Expand

2011

2011

Early (2 weeks) vs. late (8 weeks) initiation of highly active antiretroviral treatment (HAART) significantly enhance survival of… Expand

2009

2009

The Anshel-Anshel-Goldfeld-Lemieux (abbreviated AAGL) key agreement protocol [Contemp. Math. 418: 1–34, 2006] is proposed to be… Expand

Highly Cited

2007

Highly Cited

2007

The length based attack on Anshel-Anshel-Goldfeld commutator key-exchange protocol [1] was initially proposed by Hughes and… Expand

2007

2007

Cryptography based on noncommutative algebra still suffers from lack of schemes and lack of interest. In this work, we show new… Expand

2005

2005

Abstract The initial version of the Birch and Swinnerton-Dyer conjecture concerned asymptotics for partial Euler products for an… Expand

Highly Cited

2004

Highly Cited

2004

The classical class number problem of Gauss asks for a classification of all imaginary quadratic fields with a given class number… Expand

Highly Cited

2003

Highly Cited

2003

In this note, we describe a probabilistic attack on public key cryptosystems based on the word/conjugacy problems for finitely… Expand

1982

1982

Economic theory suggests that demand be- occurred within the period. If the structure has havior is time variant, but does not… Expand