Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Approximation Algorithms for Cellular Network Optimization., , and . Technical Report, 232. Department of Computer Science, (July 1999)Ist P=NP? Einführung in die Theorie der NP-Vollständigkeit., and . Technical Report, 269. Department of Computer Science, (February 2001)Playing with Boolean Blocks: Post's Lattice with Applications to Complexity Theory., , , and . Technical Report, 317. Department of Computer Science, (February 2004)Simple Bases for Boolean Co-Clones., , , and . Technical Report, 350. Department of Computer Science, (January 2005)Playing with Boolean Blocks: Constraint Satisfaction Problems., , , and . Technical Report, 318. Department of Computer Science, (February 2004)A Polynomial-Time Approximation Scheme for Base Station Positioning in UMTS Networks., , , and . Technical Report, 264. Department of Computer Science, (August 2000)The Complexity of Problems Defined by Boolean Circuits., and . Technical Report, 255. Department of Computer Science, (March 2000)On Lions and Elligators: An efficient constant-time implementation of CSIDH., , and . IACR Cryptol. ePrint Arch., (2018)LMS vs XMSS: Comparison of Stateful Hash-Based Signature Schemes on ARM Cortex-M4., , , and . AFRICACRYPT, volume 12174 of Lecture Notes in Computer Science, page 258-277. Springer, (2020)On High and Low Sets for the Boolean Hierarchy., and . Technical Report, 191. Department of Computer Science, (January 1998)