Kevin Snow McCurley is a mathematician, computer scientist, and cryptographer, currently a research scientist at Google. He received his Ph.D. inâ€¦Â (More)

Semantic Scholar uses AI to extract papers important to this topic.

2012

2012

- Timothy Trudgian
- Math. Comput.
- 2012

This paper concerns the function S(t), the argument of the Riemann zeta-function along the critical line. Improving on the methodâ€¦Â (More)

Is this relevant?

2009

2009

Let C( -d) denote the Gauss Class Group of quadratic forms of<lb>a negative discriminant -d (or equivalently, the class group ofâ€¦Â (More)

Is this relevant?

2009

2009

- Lein Harn
- 2009

Most existing cryptosystem designs incorporate just one cryptographic assumption, such as factoring or discrete logarithms. Theseâ€¦Â (More)

Is this relevant?

Highly Cited

2008

Highly Cited

2008

- Christopher B. Jones, Ross Purves
- Encyclopedia of Database Systems
- 2008

Geographical information is recorded in a wide variety of media and document types. There are innumerable paper-based booksâ€¦Â (More)

Is this relevant?

Highly Cited

2003

Highly Cited

2003

We present minimally supervised methods for training and testing geographic name disambiguation (GND) systems. We train dataâ€¦Â (More)

Is this relevant?

1998

1998

- Damian Weber, Thomas F. Denny
- CRYPTO
- 1998

We provide the secret Diffie-Hellman-Key which is requested by Kevin McCurleyâ€™s challenge of 1989. The DH-protocol in questionâ€¦Â (More)

Is this relevant?

1996

1996

- Arne Storjohann, George Labahn
- ISSAC
- 1996

This paper presents a new algorithm for computing the Hermite normal form H of an A c Z â€œm of rank m together with a unimodularâ€¦Â (More)

Is this relevant?

1996

1996

- Olivier RamarÃ©, Robert Rumely
- Math. Comput.
- 1996

Strengthening work of Rosser, Schoenfeld, and McCurley, we establish explicit Chebyshev-type estimates in the prime numberâ€¦Â (More)

Is this relevant?

1995

1995

- Mark Giesbrecht
- ISSAC
- 1995

We present two new probabilistic algorithms for computing the Smith normal form of an A 2 Z mn. The rst requires an expectedâ€¦Â (More)

Is this relevant?

1993

1993

- Peter de Rooij
- Journal of Cryptology
- 1993

Schnorrâ€™s identification and signature schemes [10], [11] are efficient, discrete log-based protocols. Moreover, preprocessingâ€¦Â (More)

Is this relevant?