Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mis-representation of Identities in E-cash Schemes and how to Prevent it., , , and . ASIACRYPT, volume 1163 of Lecture Notes in Computer Science, page 276-285. Springer, (1996)Easy Come - Easy Go Divisible Cash., , and . EUROCRYPT, volume 1403 of Lecture Notes in Computer Science, page 561-575. Springer, (1998)On the quadratic spans of DeBruijn sequences., and . IEEE Trans. Inf. Theory, 36 (4): 822-829 (1990)A fast algorithm for determining the complexity of a binary sequence with period 2n., and . IEEE Trans. Inf. Theory, 29 (1): 144-146 (1983)On the linear complexity of feedback registers., , and . IEEE Trans. Inf. Theory, 36 (3): 640-644 (1990)Password Authenticated Key Exchange for Resource-Constrained Wireless Communications (Extended Abstract)., , and . ICN (2), volume 3421 of Lecture Notes in Computer Science, page 827-834. Springer, (2005)The Software-Oriented Stream Cipher SSC2., , and . FSE, volume 1978 of Lecture Notes in Computer Science, page 31-48. Springer, (2000)Threshold Schemes with Disenrollment., , , and . CRYPTO, volume 740 of Lecture Notes in Computer Science, page 540-548. Springer, (1992)Dedicated vs. distributed: A study of mission survivability metrics., , , , and . MILCOM, page 1345-1350. IEEE, (2011)Correlation Functions of Geometric Sequences., , and . EUROCRYPT, volume 473 of Lecture Notes in Computer Science, page 214-221. Springer, (1990)