Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Wichmann, Peer
add a person with the name Wichmann, Peer
 

Other publications of authors with the same name

Inverting the Pseudo Exponentiation., , and . EUROCRYPT, volume 473 of Lecture Notes in Computer Science, page 344-351. Springer, (1990)Towards Acceptable Key Escrow Systems., , , , and . ACM Conference on Computer and Communications Security, page 51-58. ACM, (1994)Cryptanalysis of a Modified Rotor Machine.. EUROCRYPT, volume 434 of Lecture Notes in Computer Science, page 395-402. Springer, (1989)Eine Sicherheitsarchitektur für verteilte Systeme am Beispiel von DSSA.. GI-Fachgespräch über Rechenzentren, page 237-247. Deutscher Universitäts Verlag, (1993)Systematische Analyse von Kryptosystemen.. Universität Karlsruhe, (1998)