Polynomial evaluation over finite fields: new algorithms and complexity bounds Michele EliaJoachim RosenthalDavide Schipani Original Paper 16 December 2011 Pages: 129 - 141
Cryptanalysis of a key exchange protocol based on the endomorphisms ring End\({(\mathbb{Z}_{p} \times \mathbb{Z}_{p^2})}\) Abdel Alim KamalAmr M. Youssef Original Paper 05 April 2012 Pages: 143 - 149
About the algebraic solutions of smallest enclosing cylinders problems Michel Petitjean Original Paper 13 July 2012 Pages: 151 - 164
Convolutional Goppa codes defined on fibrations J. I. Iglesias CurtoJ. M. Muñoz PorrasG. Serrano Sotelo Original Paper 09 August 2012 Pages: 165 - 178
Evaluating geometric queries using few arithmetic operations R. GrimsonJ. HeintzB. Kuijpers Original Paper 15 August 2012 Pages: 179 - 193
The invariant functions and invariant-image conditions of the rational Bézier triangles H. E. Bez Original Paper 21 September 2012 Pages: 195 - 205