Author of the publication

Analyzing Conflicts and Dependencies of Rule-Based Transformations in Henshin.

, , , and . FASE, volume 9033 of Lecture Notes in Computer Science, page 165-168. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exponent Group Signature Schemes and Efficient Identity Based Signature Schemes Based on Pairings.. IACR Cryptology ePrint Archive, (2002)Pairing Lattices.. Pairing, volume 5209 of Lecture Notes in Computer Science, page 18-38. Springer, (2008)Hyperelliptic Pairings., , and . Pairing, volume 4575 of Lecture Notes in Computer Science, page 108-131. Springer, (2007)Computing Riemann-Roch Spaces in Algebraic Function Fields and Related Topics.. J. Symb. Comput., 33 (4): 425-445 (2002)Generalised Jacobians in Cryptography and Coding Theory.. WAIFI, volume 7369 of Lecture Notes in Computer Science, page 1-15. Springer, (2012)Aspects of Pairing Inversion., , and . IEEE Trans. Inf. Theory, 54 (12): 5719-5728 (2008)Integrating Multimodal Data for Joint Generative Modeling of Complex Dynamics, , , and . (2024)On the security of the verifiably-encrypted signature scheme of Boneh, Gentry, Lynn and Shacham.. Inf. Process. Lett., 89 (3): 111-114 (2004)Extending the GHS Weil Descent Attack., , and . EUROCRYPT, volume 2332 of Lecture Notes in Computer Science, page 29-44. Springer, (2002)An Algorithm for Computing Isomorphisms of Algebraic Function Fields.. ANTS, volume 3076 of Lecture Notes in Computer Science, page 263-271. Springer, (2004)