Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Look at the Interpolation Problem.. J. Symb. Log., 40 (1): 1-13 (1975)The Herbrand Symposium: (Marseilles July 16-July 24 1981).. J. Symb. Log., 48 (4): 1210-1232 (1983)Linear Cryptanalysis of Non Binary Ciphers., , and . Selected Areas in Cryptography, volume 4876 of Lecture Notes in Computer Science, page 184-211. Springer, (2007)Probing Attacks on Tamper-Resistant Devices., , and . CHES, volume 1717 of Lecture Notes in Computer Science, page 303-315. Springer, (1999)Approximating the Number of Error Locations within a Constant Ratio is NP-complete.. AAECC, volume 673 of Lecture Notes in Computer Science, page 325-331. Springer, (1993)CryptoComputing with Rationals., , and . Financial Cryptography, volume 2357 of Lecture Notes in Computer Science, page 136-146. Springer, (2002)The Two Faces of Lattices in Cryptology., and . CaLC, volume 2146 of Lecture Notes in Computer Science, page 146-180. Springer, (2001)Projective Coordinates Leak., , and . EUROCRYPT, volume 3027 of Lecture Notes in Computer Science, page 257-267. Springer, (2004)Proofs of Knowledge for Non-monotone Discrete-Log Formulae and Applications., and . ISC, volume 2433 of Lecture Notes in Computer Science, page 272-288. Springer, (2002)Cryptanalysis of Another Knapsack Cryptosystem., and . ASIACRYPT, volume 739 of Lecture Notes in Computer Science, page 470-476. Springer, (1991)