Reprints and Preprints

  • Irregularity of prime numbers over real quadratic fields. In: Algorithmic number theory: third international symposium; proceedings, no. 1423 in Springer Lecture Notes in Computer Science, Springer-Verlag, 1998. [publisher] [abs] [pdf]
  • Comparison of Algorithms to Calculate “Quadratic Irregularity” of Prime Numbers: Extended Abstract. In: Proceedings of the Conference on The Mathematics of Public-Key Cryptography, June 12–17, 1999, Fields Institute, Toronto. [abs] [pdf]
  • On the Fontaine-Mazur Conjecture for number fields and an analogue for function fields. Journal of Number Theory, 81:16–47, 2000. [publisher] [abs] [pdf]
  • Comparison of algorithms to calculate quadratic irregularity of prime numbers. Mathematics of Computation, 71:863–871, 2002. [publisher] [xxx] [abs] [pdf]
  • Fixed Points and Two-Cycles of the Discrete Logarithm. In: Algorithmic number theory: 5th international symposium; proceedings, no. 2369 in Springer Lecture Notes in Computer Science, Springer-Verlag, 2002. [publisher] [abs] [pdf] [addenda/corrigenda from xxx]
  • Notes on an analogue of the Fontaine-Mazur conjecture. With Jeffrey D. Achter. Journal de Théorie des Nombres de Bordeaux, 15:627–637, 2003. [publisher] [xxx] [abs]
  • First-hit analysis of algorithms for computing quadratic irregularity. Mathematics of Computation, 73:939–948, 2004. [publisher] [xxx] [abs]
  • Distribution of Values of Real Quadratic Zeta Functions. In: Unusual Applications of Number Theory, no. 64 in DIMACS: Series in Discrete Mathematics and Theoretical Computer Science, AMS, 2004. [xxx] [abs]
  • New Conjectures and Results for Small Cycles of the Discrete Logarithm. With Pieter Moree. In: High Primes and Misdemeanours: lectures in honour of the 60th birthday of Hugh Cowie Williams, no. 41 in Fields Institute Communications, AMS, 2004. [xxx] [abs]
  • A Comparison of Cryptography Courses. Cryptologia, 28 (2), 2004. [publisher] [xxx] [abs] [pdf]
  • Abelian varieties over finite fields with a specified characteristic polynomial modulo ℓ. Journal de Théorie des Nombres de Bordeaux, 16:173–178, 2004. [publisher] [xxx] [abs]
  • Distribution of the Error in Estimated Numbers of Fixed Points of the Discrete Logarithm. Communications in Computer Algebra, 38:111–118, 2004. [publisher or publisher] [xxx] [abs]
  • Underwater Model Rockets: An Innovative Design Problem and Competition for Undergraduate Students in Engineering, Math and Science. With Richard Layton, Tina Hudson and Laurence D. Merkle. In: Proceedings of the 2005 American Society for Engineering Education Annual Conference and Exposition, 2005. [publisher] [abs] [pdf]
  • Some Heuristics and Results for Small Cycles of the Discrete Logarithm. With Pieter Moree. Mathematics of Computation, 75:419–449, 2006. [publisher] [xxx] [abs]
  • Underwater Hacker Missile Wars: A Cryptography and Engineering Contest. With Richard Layton, Laurence Merkle, and Tina Hudson. Cryptologia, 30:69–77, 2006. [publisher] [xxx] [abs]
  • The Graph Theory of Blackwork Embroidery. In:  Making Mathematics with Needlework: Ten Papers and Ten Projects, edited by sarah-marie belcastro and Carolyn Yackel.  A.K. Peters, 2007.  [book web page] [abs] [pdf (preprint, not complete)]]
  • Review of Complexity and Cryptography: An Introduction by John Talbot and Dominic Welsh Cryptologia, 32:92–97, 2008. [publisher]
  • Math in Your Hands: Integrating the Use of Maple with the Collaborative Use of Wireless Tablet PCs. With Shannon Sexton and Julia Williams. In: The Impact of Tablet PCs and Pen-based Technology: New Horizons, Purdue University Press, 2009.  [book web page] [abs]
  • Mapping the discrete logarithm.  With Daniel R. Cloutier. Involve, 3:197–213, 2010.  [publisher] [pdf (for screen)]  [pdf (for printing)]
  • Counting Fixed Points, Two-Cycles, and Collisions of the Discrete Exponential Function using p-adic Methods. With Margaret M. Robinson.   Journal of the Australian Mathematical Society, 92: 163-178, 2012. (Special issue in memory of Alf van der Poorten) [publisher] [xxx]
  • A Good Hash Function is Hard to Find, and Vice Versa. Cryptologia, 37:107-119, 2013.  [pdf]
    Acknowledgement:  This is an Author’s Accepted Manuscript of an article published in Cryptologia, copyright Taylor & Francis, available online at: http://www.tandfonline.com/10.1080/01611194.2012.687429. [publisher]
  • Demitasse: A “Small” Version of the Tiny Encryption Algorithm and its Use in a Classroom Setting.   Cryptologia, 37:74-83, 2013.  [pdf]
    Acknowledgement:  This is an Author’s Accepted Manuscript of an article published in Cryptologia, copyright Taylor & Francis, available online at: http://www.tandfonline.com/10.1080/01611194.2012.660237. [publisher]
  • Statistics for fixed points of the self-power map.  With Matthew Friedrichsen.  Preprint.  [xxx]
  • Hyperbolic Tilings with Truly Hyperbolic Crochet Motifs. With Lana Holden. In: Proceedings of Bridges 2014: Mathematics, Music, Art, Architecture, Culture, Tessellations Publishing, 2014.  [publisher (full-text available)]
  • Modeling Braids, Cables, and Weaves with Stranded Cellular Automata. With Lana Holden. In: Proceedings of Bridges 2016: Mathematics, Music, Art, Architecture, Culture, Tessellations Publishing, 2016.  [publisher (full-text available)]
  • Counting fixed points and two-cycles of the singular map x ↦ xxn.  With Pamela A. Richardson and Margaret M. Robinson.  Preprint.  [xxx]