Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptographic Hash Functions: Recent Design Trends and Security Notions., , and . IACR Cryptology ePrint Archive, (2011)The Use of Symbolic Computation in Geometric Modelling., , , , and . IMA Conference on the Mathematics of Surfaces, page 199-206. Clarendon Press, (1988)A Generic Root Operation for Exact Real Arithmetic., and . CCA, volume 2064 of Lecture Notes in Computer Science, page 82-87. Springer, (2000)Copyright Issues for MKM., and . MKM, volume 3119 of Lecture Notes in Computer Science, page 1-16. Springer, (2004)A Comparison of Equality in Computer Algebra and Correctness in Mathematical Pedagogy., , and . Calculemus/MKM, volume 5625 of Lecture Notes in Computer Science, page 75-89. Springer, (2009)The Parallel Risch Algorithm (I).. EUROCAM, volume 144 of Lecture Notes in Computer Science, page 144-157. Springer, (1982)Curtains in CAD: Why Are They a Problem and How Do We Fix Them?, , and . ICMS, volume 12097 of Lecture Notes in Computer Science, page 17-26. Springer, (2020)Computing with semi-algebraic sets represented by triangular decomposition., , , , and . ISSAC, page 75-82. ACM, (2011)Scratchpad's View of Algebra I: Basic Commutative Algebra., and . DISCO, volume 429 of Lecture Notes in Computer Science, page 40-54. Springer, (1990)Scratchpad's View of Algebra II: A Categorical View of Factorization., , and . ISSAC, page 32-38. ACM, (1991)