Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Approximative Public-Key-Kryptosysteme, and . Informatik-Fachberichte Springer, (1989)Das Meta-ElGamal Signaturverfahren und seine Anwendungen., , and . VIS, page 207-. Vieweg, (1995)Protokolle zum Austausch authenischer Schlüssel., and . VIS, volume 271 of Informatik-Fachberichte, page 321-328. Springer, (1991)Meta-Message Recovery and Meta-Blind Signature Schemes Based on the Discrete Logarithm Problem and Their Applications., , and . ASIACRYPT, volume 917 of Lecture Notes in Computer Science, page 224-237. Springer, (1994)Discrete Logarithm Based Protocols., and . EUROCRYPT, volume 547 of Lecture Notes in Computer Science, page 399-408. Springer, (1991)Secure Internet Phone., , , and . Communications and Multimedia Security, volume 192 of IFIP Conference Proceedings, Kluwer, (2001)Die RISC-CISC Debatte., , and . Angewandte Informatik, 29 (7): 273-280 (1987)Selbstmodifizierende Verbindungsnetzwerke.. VIS, volume 16 of DuD-Fachbeiträge, page 353-369. Vieweg, (1993)Breaking and Repairing a Convertible Undeniable Signature Scheme., , and . ACM Conference on Computer and Communications Security, page 148-152. ACM, (1996)Editorial: Chipkarten.. it+ti - Informationstechnik und Technische Informatik, 39 (5): 5-6 (1997)