default search action
Hugh C. Williams
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [p2]Johannes Buchmann, Michael J. Jacobson Jr., Hugh C. Williams:
The Influence of Public-Key Cryptography on Mathematics. Democratizing Cryptography 2022: 77-156
2010 – 2019
- 2015
- [j32]Eric L. Roettger, Hugh C. Williams, Richard K. Guy:
Some primality tests that eluded Lucas. Des. Codes Cryptogr. 77(2-3): 515-539 (2015) - [j31]Hugh C. Williams, Richard K. Guy:
Odd and Even Linear Divisibility Sequences of Order 4. Integers 15: A33 (2015) - [j30]Eric L. Roettger, Hugh C. Williams:
Some Arithmetic Properties of Certain Sequences. J. Integer Seq. 18(6): 15.6.2 (2015) - 2013
- [c17]Hugh C. Williams:
Laudatio in Honour of Professor Dr. Johannes Buchmann on the Occasion of His 60th Birthday. Number Theory and Cryptography 2013: 1-2 - [c16]Alan K. Silvester, Michael J. Jacobson Jr., Hugh C. Williams:
Shorter Compact Representations in Real Quadratic Fields. Number Theory and Cryptography 2013: 50-72 - [p1]Eric L. Roettger, Hugh C. Williams, Richard K. Guy:
Some Extensions of the Lucas Functions. Number Theory and Related Fields 2013: 271-311 - 2012
- [j29]Eric L. Roettger, Hugh C. Williams:
Public-Key Cryptography Based on a Cubic Extension of the Lucas Functions. Fundam. Informaticae 114(3-4): 325-344 (2012) - [j28]Hugh C. Williams, Richard K. Guy:
Some Monoapparitic Fourth Order Linear Divisibility Sequences. Integers 12A: A17 (2012) - 2010
- [c15]Kjell Wooding, Hugh C. Williams:
Improved Primality Proving with Eisenstein Pseudocubes. ANTS 2010: 372-384
2000 – 2009
- 2008
- [c14]Reginald E. Sawilla, Alan K. Silvester, Hugh C. Williams:
A New Look at an Old Equation. ANTS 2008: 37-59 - 2007
- [j27]Pedro Berrizbeitia, Siguna Müller, Hugh C. Williams:
Pseudopowers and primality proving. Contributions Discret. Math. 2(2) (2007) - [j26]Robert de Haan, Michael J. Jacobson Jr., Hugh C. Williams:
A fast, rigorous technique for computing the regulator of a real quadratic field. Math. Comput. 76(260): 2139-2160 (2007) - 2006
- [j25]Michael J. Jacobson Jr., Renate Scheidler, Hugh C. Williams:
An Improved Real-Quadratic-Field-Based Key Exchange Procedure. J. Cryptol. 19(2): 211-239 (2006) - [c13]Michael J. Jacobson Jr., Shantha Ramachandran, Hugh C. Williams:
Numerical Results on Class Groups of Imaginary Quadratic Fields. ANTS 2006: 87-101 - [c12]Kjell Wooding, Hugh C. Williams:
Doubly-Focused Enumeration of Pseudosquares and Pseudocubes. ANTS 2006: 208-221 - 2004
- [c11]Pedro Berrizbeitia, Siguna Müller, Hugh C. Williams:
Pseudocubes and Primality Testing. ANTS 2004: 102-116 - [c10]Michael J. Jacobson Jr., Hugh C. Williams, Kjell Wooding:
Imaginary Cyclic Quartic Fields with Large Minus Class Numbers. ANTS 2004: 280-292 - 2003
- [j24]Herman te Riele, Hugh C. Williams:
New Computations Concerning the Cohen-Lenstra Heuristics. Exp. Math. 12(1): 99-113 (2003) - [j23]Michael J. Jacobson Jr., Hugh C. Williams:
New quadratic polynomials with high densities of prime values. Math. Comput. 72(241): 499-519 (2003) - [j22]Alfred J. van der Poorten, Herman J. J. te Riele, Hugh C. Williams:
Corrigenda and addition to "Computer verification of the Ankeny-Artin-Chowla conjecture for all primes less than 100 000 000 000". Math. Comput. 72(241): 521-523 (2003) - 2002
- [j21]Michael J. Jacobson Jr., Hugh C. Williams:
Modular Arithmetic on Elements of Small Norm in Quadratic Fields. Des. Codes Cryptogr. 27(1-2): 111-117 (2002) - 2001
- [j20]Alfred J. van der Poorten, Herman J. J. te Riele, Hugh C. Williams:
Computer verification of the Ankeny-Artin-Chowla Conjecture for all primes less than 100 000 000 000. Math. Comput. 70(235): 1311-1328 (2001) - 2000
- [j19]Michael J. Jacobson Jr., Hugh C. Williams:
The Size of the Fundamental Solutions of Consecutive Pell Equations. Exp. Math. 9(4): 631-640 (2000) - [j18]Andreas Stein, Hugh C. Williams:
Explicit primality criteria for (p-1)pn - 1. Math. Comput. 69(232): 1721-1734 (2000) - [c9]Edlyn Teske, Hugh C. Williams:
A Note on Shanks's Chains of Primes. ANTS 2000: 563-580
1990 – 1999
- 1999
- [j17]Edlyn Teske, Hugh C. Williams:
A Problem Concerning a Character Sum. Exp. Math. 8(1): 63-72 (1999) - [j16]Andreas Stein, Hugh C. Williams:
Some Methods for Evaluating the Regulator of a Real Quadratic Function Field. Exp. Math. 8(2): 119-133 (1999) - 1998
- [c8]Edlyn Teske, Hugh C. Williams:
A Problem Concerning a Character Sum - Extended Abstract. ANTS 1998: 351-357 - [c7]Andreas Stein, Hugh C. Williams:
An Improved Method of Computing the Regulator of a Real Quadratic Function Field. ANTS 1998: 607-620 - 1997
- [j15]Hugh C. Williams:
Daniel Shanks (1917-1996). Math. Comput. 66(219): 929-934 (1997) - [j14]Richard F. Lukes, Renate Scheidler, Hugh C. Williams:
Further tabulation of the Erdös-Selfridge function. Math. Comput. 66(220): 1709-1717 (1997) - 1996
- [j13]Renate Scheidler, Andreas Stein, Hugh C. Williams:
Key-Exchange in Real Quadratic Congruence Function Fields. Des. Codes Cryptogr. 7(1-2): 153-174 (1996) - [j12]Richard F. Lukes, C. D. Patterson, Hugh C. Williams:
Some results on pseudosquares. Math. Comput. 65(213): 361-372 (1996) - [j11]Eric Bach, Richard F. Lukes, Jeffrey O. Shallit, Hugh C. Williams:
Results and estimates on pseudopowers. Math. Comput. 65(216): 1737-1747 (1996) - 1995
- [j10]Renate Scheidler, Hugh C. Williams:
A Public-Key Cryptosystem Utilizing Cyclotomic Fields. Des. Codes Cryptogr. 6(2): 117-131 (1995) - [j9]Michael J. Jacobson Jr., Richard F. Lukes, Hugh C. Williams:
An Investigation of Bounds for the Regulator of Quadratic Fields. Exp. Math. 4(3): 211-225 (1995) - 1994
- [j8]Renate Scheidler, Johannes Buchmann, Hugh C. Williams:
A Key-Exchange Protocol Using Real Quadratic Fields. J. Cryptol. 7(3): 171-199 (1994) - 1991
- [j7]Hugh C. Williams:
Some formulas concerning the fundamental unit of a real quadratic field. Discret. Math. 92(1-3): 431-440 (1991) - [j6]Johannes Buchmann, Hugh C. Williams:
Some remarks concerning the complexity of computing class groups of quadratic fields. J. Complex. 7(3): 311-315 (1991) - 1990
- [c6]Renate Scheidler, Johannes Buchmann, Hugh C. Williams:
Implementation of a Key Exchange Protocol Using Some Real Quadratic Fields. EUROCRYPT 1990: 98-109
1980 – 1989
- 1989
- [c5]Johannes Buchmann, Hugh C. Williams:
A Key Exchange System Based on Real Quadratic Fields. CRYPTO 1989: 335-343 - [c4]Johannes Buchmann, Stephan Düllmann, Hugh C. Williams:
On the Complexity and Efficiency of a New Key Exchange System. EUROCRYPT 1989: 597-616 - 1988
- [j5]Johannes Buchmann, Hugh C. Williams:
A Key-Exchange System Based on Imaginary Quadratic Fields. J. Cryptol. 1(2): 107-118 (1988) - 1987
- [j4]Johannes Buchmann, Hugh C. Williams:
On Principal Ideal Testing in Algebraic Number Fields. J. Symb. Comput. 4(1): 11-19 (1987) - [j3]Marvin C. Wunderlich, Hugh C. Williams:
A parallel version of the continued fraction integer factoring algorithm. J. Supercomput. 1(2): 217-230 (1987) - 1986
- [e1]Hugh C. Williams:
Advances in Cryptology - CRYPTO '85, Santa Barbara, California, USA, August 18-22, 1985, Proceedings. Lecture Notes in Computer Science 218, Springer 1986, ISBN 3-540-16463-4 [contents] - 1985
- [j2]Hugh C. Williams:
Some Public-Key Crypto-Functions as Intractable as Factorization. Cryptologia 9(3): 223-237 (1985) - [c3]Hugh C. Williams:
An M³ Public-Key Encryption Scheme. CRYPTO 1985: 358-368 - 1984
- [c2]Hugh C. Williams:
Some Public Key Crypto-Functions as Intractable as Factorization. CRYPTO 1984: 66-70 - 1983
- [c1]Hugh C. Williams:
An Overview of Factoring. CRYPTO 1983: 71-80 - 1980
- [j1]Hugh C. Williams:
A modification of the RSA public-key encryption procedure (Corresp.). IEEE Trans. Inf. Theory 26(6): 726-729 (1980)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint