Neal Koblitz
#4,790
Most Influential Person Now
American mathematician and cryptographer
Neal Koblitz's AcademicInfluence.com Rankings
Neal Koblitzmathematics Degrees
Mathematics
#300
World Rank
#649
Historical Rank
#144
USA Rank
Measure Theory
#386
World Rank
#566
Historical Rank
#164
USA Rank
Download Badge
Mathematics Computer Science
Neal Koblitz's Degrees
- PhD Mathematics Princeton University
Why Is Neal Koblitz Influential?
(Suggest an Edit or Addition)According to Wikipedia, Neal I. Koblitz is a Professor of Mathematics at the University of Washington. He is also an adjunct professor with the Centre for Applied Cryptographic Research at the University of Waterloo. He is the creator of hyperelliptic curve cryptography and the independent co-creator of elliptic curve cryptography.
Neal Koblitz's Published Works
Published Works
- Elliptic curve cryptosystems (1987) (5472)
- A Course in Number Theory and Cryptography (1987) (1226)
- p-adic Numbers, p-adic Analysis, and Zeta-Functions (1977) (1152)
- Advances in Cryptology — CRYPTO ’96 (2001) (735)
- Introduction to Elliptic Curves and Modular Forms (1984) (727)
- The State of Elliptic Curve Cryptography (2000) (657)
- Radical Equations : Math Literacy and Civil Rights (2002) (509)
- Algebraic aspects of cryptography (1998) (495)
- CM-Curves with Good Cryptographic Properties (1991) (446)
- Hyperelliptic cryptosystems (1989) (370)
- Pairing-Based Cryptography at High Security Levels (2005) (332)
- Another Look at "Provable Security" (2005) (268)
- The Improbability That an Elliptic Curve Has Subexponential Discrete Log Problem under the Menezes—Okamoto—Vanstone Algorithm (1998) (241)
- P-adic analysis : a short course on recent work (1980) (183)
- Gauss sums and the p-adic F-function (1979) (175)
- p-adic numbers (1977) (129)
- a course in number theory (1987) (118)
- A Family of Jacobians Suitable for Discrete Log Cryptosystems (1988) (112)
- Modular Forms and Hecke Operators (1995) (109)
- An Elliptic Curve Implementation of the Finite Field Digital Signature Algorithm (1998) (108)
- P-adic variation of the zeta-function over families of varieties defined over finite fields (1975) (107)
- Elliptic Curve Cryptography: The Serpentine Course of a Paradigm Shift (2011) (103)
- The random oracle model: a twenty-year retrospective (2015) (101)
- Another Look at "Provable Security". II (2006) (98)
- PRIMALITY OF THE NUMBER OF POINTS ON AN ELLIPTIC CURVE OVER A FINITE FIELD (1988) (95)
- Analysis of the Xedni Calculus Attack (2000) (78)
- Simple Factors in the Jacobian of a Fermat Curve (1978) (78)
- A Survey of Public-Key Cryptosystems (2004) (76)
- Constructing Elliptic Curve Cryptosystems in Characteristic 2 (1990) (74)
- A new proof of certain formulas for $p$-adic $L$-functions (1979) (72)
- On Carlitz's q-Bernoulli numbers (1982) (70)
- A Riddle Wrapped in an Enigma (2016) (59)
- A course in number theory and cryptography, Second Edition (1994) (56)
- Self-witnessing polynomial-time complexity and prime factorization (1992) (54)
- Lattice basis reduction, Jacobi sums and hyperelliptic cryptosystems (1998) (52)
- Fixed-Parameter Complexity and Cryptography (1993) (51)
- The number of points on certain families of hypersurfaces over finite fields (1983) (46)
- Another look at generic groups (2007) (44)
- Another look at security definitions (2013) (38)
- Another look at non-standard discrete log and Diffie-Hellman problems (2008) (36)
- p-Adic congruences and modular forms of half integer weight (1986) (35)
- Cryptocash, cryptocurrencies, and cryptocontracts (2016) (35)
- The Brave New World of Bodacious Assumptions in Cryptography (2010) (35)
- Another Look at Tightness II: Practical Issues in Cryptography (2016) (34)
- The Uneasy Relationship Between Mathematics and Cryptography (2007) (33)
- Towards a Quarter-Century of Public Key Cryptography (2000) (29)
- Mathematics as Propaganda (1981) (28)
- Another look at HMAC (2013) (26)
- Cryptography as a Teaching Tool (1997) (23)
- Number Theory Related to Fermat’s Last Theorem: Proceedings of the conference sponsored by the Vaughn Foundation (1982) (22)
- q-EXTENSION OF THE p-ADIC GAMMA FUNCTION. II (1980) (22)
- Another look at non-uniformity (2013) (21)
- Explaining cryptographic systems (2003) (21)
- A tale of three equations; or the emperors have no clothes (1988) (20)
- A Fast Software Implementation for Arithmetic Operations in Gf(2 N ) (preprint) (1996) (20)
- Intractable Problems in Cryptography (2010) (20)
- Kid Krypto (1992) (19)
- Interpretation of the $p$-adic log gamma function and Euler constants using the Bernoulli measure (1978) (18)
- Gamma function identities and elliptic differentials on Fermat curves (1978) (16)
- Critical perspectives on provable security: Fifteen years of "another look" papers (2019) (13)
- Another Look at Security Theorems for 1-Key Nested MACs (2014) (13)
- A Survey of Number Theory and Cryptography (2000) (13)
- Good and Bad Uses of Elliptic Curves in Cryptography (2002) (13)
- p-adic Analysis: GAUSS SUMS AND THE p-ADIC GAMMA FUNCTION (1980) (11)
- Advances in Cryptology - CRYPTO '92, 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings (1993) (11)
- Another look at automated theorem-proving (2007) (11)
- Elliptic curve implementation of zero-knowledge blobs (2004) (10)
- Explaining cryptographic systems to the general public (1999) (10)
- Combinatorially Based Cryptography for Children (and Adults) (1993) (9)
- Cryptanalysis of “MAKE” (2022) (8)
- Almost Primality of Group Orders of Elliptic Curves Defined over Small Finite Fields (2001) (8)
- Why Study Equations over Finite Fields (1982) (6)
- 2‐Adic and 3‐Adic Ordinals of (1/j)‐Expansion Coefficients for the Weight 2 Eisenstein Series (1977) (6)
- Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology (1996) (6)
- A Security Weakness in Composite-Order Pairing-Based Protocols with Imbedding Degree k>2 (2010) (6)
- Jacobi Sums, Irreducible Zeta-Polynomials, and Cryptography (1991) (6)
- Non-integrality of the periods of cusp forms outside the critical strip (1975) (6)
- Hidden Monomial Cryptosystems (1998) (5)
- Secret Codes and Online Security: A Seminar for Entering Students (2010) (5)
- Congruences for periods of modular forms (1987) (5)
- Introduction to elliptic curves and modular forms / Neal Koblitz (1984) (5)
- p-adic interpolation of the Riemann zeta-function (1977) (5)
- Mathematics and the external world: An interview with prof. A. T. Fomenko (1986) (5)
- Discrete Logarithms, Diffie-Hellman, and Reductions (2010) (4)
- Reply to unclad emperors (1988) (4)
- Random Curves: Journeys of a Mathematician (2007) (4)
- Modular Forms of Half Integer Weight (1993) (4)
- Recollections of mathematics in a country under siege (1990) (4)
- A Mathematical Visit to Hanoi (1979) (3)
- Number Theory and Cryptography (1994) (3)
- Obstacles to the torsion-subgroup attack on the decision Diffie-Hellman Problem (2004) (3)
- -extension of the -adic gamma function. II (1982) (3)
- Grothendieck’s 1967 Lectures in the Forest in Vietnam (2013) (3)
- Problems that Teach the Obvious but Difficult. (1988) (3)
- p -adic power series (1977) (2)
- Cryptography during the French and American Wars in Vietnam (2017) (2)
- Another look at automated theorem-proving II (2012) (2)
- Crypto Galore! (2012) (2)
- A Hardware Accelerator for Elliptic Curve Cryptography over Gf(2 M ) X.1. Introduction (2004) (2)
- $p$-adic integral transforms on compact subgroups of ${\bf C}_p$. (1985) (2)
- Introduction to Cryptography@@@Identification Numbers and Check Digit Schemes@@@Cryptological Mathematics (2001) (2)
- Interview with Professor Ngô Ba̓o Châu (2011) (2)
- Concrete Analysis of Approximate Ideal-SIVP to Decision Ring-LWE Reduction (2022) (1)
- One Bad Formula Can Spoil Everything: A Simple Adjustment That Would Improve the UN’s Gender Inequality Index (2019) (1)
- Explaining cryptosystems to the general public (2001) (1)
- The p-Adic Approach to Solutions of Equations over Finite Fields (1980) (1)
- p-adic analog of Heine’s hypergeometric q-series (1982) (1)
- The Profit Motive: The Bane of Mathematics Education. (1992) (1)
- Racism and Apartheid (2008) (1)
- Elliptic and Hyperelliptic Cryptosystems (1998) (1)
- Théorie des nombres et applications à la cryptographie (2013) (1)
- p-Adic Eigen-Eunctions for Kubert Distributions (1983) (1)
- Spring of 1972 (2008) (1)
- El Salvador and Peru (2008) (1)
- Hype! An Exchange of Views (2014) (1)
- The Kovalevskaia fund (2000) (1)
- The Hasse—Weil L-Function of an Elliptic Curve (1984) (1)
- Book Review: Discrete Mathematics in the Schools. Ed. by Joseph G. Rosenstein, Deborah S. Franzblau, and Fred S. Roberts (American Mathematical Society) (1998) (1)
- Primality and Factoring (1994) (1)
- Some Topics in Elementary Number Theory (1994) (0)
- p-adic Analysis: Preface (1980) (0)
- Guest Editorial (2000) (0)
- Grothendieck’s 1967 Lectures in the Forest in Vietnam (2013) (0)
- Mathematics under hardship conditions in the third world (1992) (0)
- The random oracle model: a twenty-year retrospective (2015) (0)
- Mathematical Cryptology for Computer Scientists and Mathematicians.@@@A Course in Number Theory and Cryptography. (1989) (0)
- Finite Fields and Quadratic Residues (1987) (0)
- “The Word for World Is Forest”: A Long-Range Funding Source for Women in Math in Developing Countries (2011) (0)
- From Congruent Numbers to Elliptic Curves (1984) (0)
- The Soviet Union (2008) (0)
- One Bad Formula Can Spoil Everything: A Simple Adjustment That Would Improve the UN’s Gender Inequality Index (2019) (0)
- p-adic Analysis: APPENDIX (1980) (0)
- Combinatorial-Algebraic Cryptosystems (1998) (0)
- Building up Ω (1977) (0)
- Letters to the Editor (1989) (0)
- Letters to the editor (1988) (0)
- Vietnam Part II (2008) (0)
- Viewpoint Hype ! An Exchange of Views (2014) (0)
- Letters to the editor (0)
- Fixed-Parameter Compl ex i t y and Cryptography (0)
- Time for a Paradigm Shift in Our Disciplinary Culture? (2016) (0)
- Reviews (2001) (0)
- Rationality of the zeta-function of a set of equations over a finite field (1977) (0)
- p-ADIC REGULATORS (1980) (0)
- Getting a Few Things Right and Many Things Wrong (2010) (0)
- Discrete Logarithms and discreet Curves (1989) (0)
- p-adic Analysis: BASICS (1980) (0)
- Cryptocash, cryptocurrencies, and cryptocontracts (2015) (0)
- Book-Review - Mathematics and Physics (1987) (0)
- Hype! An Exchange of Views (2014) (0)
- Nicaragua and Cuba (2008) (0)
- Complexity of Computations (1998) (0)
- p-adic Analysis: p-ADIC ζ-FUNCTIONS, L-FUNCTIONS, AND Γ-FUNCTIONS (1980) (0)
This paper list is powered by the following services:
Other Resources About Neal Koblitz
What Schools Are Affiliated With Neal Koblitz?
Neal Koblitz is affiliated with the following schools: