Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptographic Hash Functions: Recent Design Trends and Security Notions., , and . IACR Cryptology ePrint Archive, (2011)A Generic Root Operation for Exact Real Arithmetic., and . CCA, volume 2064 of Lecture Notes in Computer Science, page 82-87. Springer, (2000)Copyright Issues for MKM., and . MKM, volume 3119 of Lecture Notes in Computer Science, page 1-16. Springer, (2004)A Comparison of Equality in Computer Algebra and Correctness in Mathematical Pedagogy., , and . Calculemus/MKM, volume 5625 of Lecture Notes in Computer Science, page 75-89. Springer, (2009)Scratchpad's View of Algebra II: A Categorical View of Factorization., , and . ISSAC, page 32-38. ACM, (1991)Scratchpad's View of Algebra I: Basic Commutative Algebra., and . DISCO, volume 429 of Lecture Notes in Computer Science, page 40-54. Springer, (1990)Computing with semi-algebraic sets represented by triangular decomposition., , , , and . ISSAC, page 75-82. ACM, (2011)The Use of Symbolic Computation in Geometric Modelling., , , , and . IMA Conference on the Mathematics of Surfaces, page 199-206. Clarendon Press, (1988)On writing OpenMath content dictionaries.. SIGSAM Bull., 34 (2): 12-15 (2000)A small OpenMath type system.. SIGSAM Bull., 34 (2): 16-21 (2000)