scispace - formally typeset
JournalISSN: 0097-5397

SIAM Journal on Computing 

About: SIAM Journal on Computing is an academic journal. The journal publishes majorly in the area(s): Time complexity & Approximation algorithm. It has an ISSN identifier of 0097-5397. Over the lifetime, 3514 publication(s) have been published receiving 307619 citation(s). The journal is also known as: SIAM J. Comput & SIAM J. Comput..

...read more

Papers
More filters

Journal ArticleDOI
Abstract: A digital computer is generally believed to be an efficient universal computing device; that is, it is believed able to simulate any physical computing device with an increase in computation time by at most a polynomial factor. This may not be true when quantum mechanics is taken into consideration. This paper considers factoring integers and finding discrete logarithms, two problems which are generally thought to be hard on a classical computer and which have been used as the basis of several proposed cryptosystems. Efficient randomized algorithms are given for these two problems on a hypothetical quantum computer. These algorithms take a number of steps polynomial in the input size, e.g., the number of digits of the integer to be factored.

...read more

7,427 citations


Journal ArticleDOI
TL;DR: The value of depth-first search or “backtracking” as a technique for solving problems is illustrated by two examples of an improved version of an algorithm for finding the strongly connected components of a directed graph.

...read more

Abstract: The value of depth-first search or “backtracking” as a technique for solving problems is illustrated by two examples. An improved version of an algorithm for finding the strongly connected componen...

...read more

5,156 citations


Journal ArticleDOI
Dan Boneh1, Matthew K. Franklin2Institutions (2)
TL;DR: This work proposes a fully functional identity-based encryption (IBE) scheme based on bilinear maps between groups and gives precise definitions for secure IBE schemes and gives several applications for such systems.

...read more

Abstract: We propose a fully functional identity-based encryption (IBE) scheme. The scheme has chosen ciphertext security in the random oracle model assuming a variant of the computational Diffie--Hellman problem. Our system is based on bilinear maps between groups. The Weil pairing on elliptic curves is an example of such a map. We give precise definitions for secure IBE schemes and give several applications for such systems.

...read more

5,046 citations


Journal ArticleDOI
TL;DR: An algorithm is presented which finds all occurrences of one given string within another, in running time proportional to the sum of the lengths of the strings, showing that the set of concatenations of even palindromes, i.e., the language $\{\alpha \alpha ^R\}^*$, can be recognized in linear time.

...read more

Abstract: An algorithm is presented which finds all occurrences of one given string within another, in running time proportional to the sum of the lengths of the strings. The constant of proportionality is low enough to make this algorithm of practical use, and the procedure can also be extended to deal with some more general pattern-matching problems. A theoretical application of the algorithm shows that the set of concatenations of even palindromes, i.e., the language $\{\alpha \alpha ^R\}^*$, can be recognized in linear time. Other algorithms which run even faster on the average are also considered.

...read more

3,023 citations


Journal ArticleDOI
TL;DR: A digital signature scheme based on the computational difficulty of integer factorization possesses the novel property of being robust against an adaptive chosen-message attack: an adversary who receives signatures for messages of his choice cannot later forge the signature of even a single additional message.

...read more

Abstract: We present a digital signature scheme based on the computational difficulty of integer factorization. The scheme possesses the novel property of being robust against an adaptive chosen-message attack: an adversary who receives signatures for messages of his choice (where each message may be chosen in a way that depends on the signatures of previously chosen messages) cannot later forge the signature of even a single additional message. This may be somewhat surprising, since in the folklore the properties of having forgery being equivalent to factoring and being invulnerable to an adaptive chosen-message attack were considered to be contradictory. More generally, we show how to construct a signature scheme with such properties based on the existence of a "claw-free" pair of permutations--a potentially weaker assumption than the intractibility of integer factorization. The new scheme is potentially practical: signing and verifying signatures are reasonably fast, and signatures are compact.

...read more

2,994 citations


Network Information
Related Journals (5)
Algorithmica

2.8K papers, 93.4K citations

94% related
arXiv: Data Structures and Algorithms

11.9K papers, 96K citations

93% related
Electronic Colloquium on Computational Complexity

2.4K papers, 48.1K citations

92% related
Journal of the ACM

2.9K papers, 403.4K citations

92% related
arXiv: Computational Complexity

4K papers, 32.8K citations

92% related
Performance
Metrics
No. of papers from the Journal in previous years
YearPapers
202175
202070
201957
201877
201759
201667

Top Attributes

Show by:

Journal's top 5 most impactful authors

Micha Sharir

35 papers, 1.8K citations

Robert E. Tarjan

20 papers, 11.8K citations

David Peleg

12 papers, 1.6K citations

Andrew Chi-Chih Yao

12 papers, 1.4K citations

Ming-Yang Kao

12 papers, 532 citations