Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Funkspiel schemes: an alternative to conventional tamper resistance., , , and . ACM Conference on Computer and Communications Security, page 125-133. ACM, (2000)Hom Complexes of Set Systems.. Electron. J. Comb., 20 (1): 4 (2013)Generalized triangulations and diagonal-free subsets of stack polyominoes.. J. Comb. Theory, Ser. A, 112 (1): 117-142 (2005)Exact sequences for the homology of the matching complex.. J. Comb. Theory, Ser. A, 115 (8): 1504-1526 (2008)Oddly Triangulated Polygons: 11298 2007, 547., , and . The American Mathematical Monthly, 116 (4): 371-372 (2009)Security Proofs for the RSA-PSS Signature Scheme and Its Variants.. IACR Cryptology ePrint Archive, (2001)Securing RSA-KEM via the AES., and . Public Key Cryptography, volume 3386 of Lecture Notes in Computer Science, page 29-46. Springer, (2005)An OAEP Variant With a Tight Security Proof.. IACR Cryptology ePrint Archive, (2002)Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1., and . RFC, (February 2003)Optimal Decision Trees on Simplicial Complexes.. Electron. J. Comb., (2005)