Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Characteristics of dysphagia in children with cerebral palsy., , , , and . Dysphagia, 9 (1): 69--73 (1994)Towards technological rules for designing innovation networks: a dynamic capabilities view, , and . International Journal of Operations & Production Management, 27 (10): 1069--1092 (2007)nicht vorhanden!.Coupled two-dimensional diagenetic and sedimentological modeling of carbonate platform evolution, , , , and . Geology, 25 (2): 175--178 (1997)Use of insolation as a proxy for high-frequency eustasy in forward modeling of platform carbonate cyclostratigraphy -- A promising approach, , and . Sedimentary Geology, 231 (1-2): 1--13 (2010)Modes of Operation Suitable for Computing on Encrypted Data., , and . IACR Trans. Symmetric Cryptol., 2017 (3): 294-324 (2017)Hash Based Digital Signature Schemes., , and . IMACC, volume 3796 of Lecture Notes in Computer Science, page 96-115. Springer, (2005)A Cryptographic Application of Weil Descent., and . IMACC, volume 1746 of Lecture Notes in Computer Science, page 191-200. Springer, (1999)Building a Community of Real-World Cryptographers., , and . IEEE Secur. Priv., 14 (6): 7-9 (2016)Thresholdizing HashEdDSA: MPC to the Rescue., , and . IACR Cryptology ePrint Archive, (2020)Sashimi: Cutting up CSI-FiSh Secret Keys to Produce an Actively Secure Distributed Signing Protocol., and . PQCrypto, volume 12100 of Lecture Notes in Computer Science, page 169-186. Springer, (2020)