Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Simple Power Analysis Attack on the Serpent Key Schedule., , and . IACR Cryptology ePrint Archive, (2009)Execution of A Requirement Model in Software Development., , , , and . IASSE, page 203-208. ISCA, (2004)Application of a Tauberian theorem to finite model theory.. Arch. Math. Log., 25 (1): 91-98 (1985)Regular Languages in NC¹., , , and . J. Comput. Syst. Sci., 44 (3): 478-499 (1992)Some methods for computing component distribution probabilities in relational structures.. Discrete Mathematics, 66 (1-2): 59-77 (1987)The largest set partitioned by a subfamily of a cover., and . J. Comb. Theory, Ser. A, 54 (2): 296-303 (1990)Lower Bounds for the Complexity of Theories.. Current Trends in Theoretical Computer Science, volume 40 of World Scientific Series in Computer Science, World Scientific, (1993)An Algebra and a Logic for NC¹, and . LICS, page 12-21. IEEE Computer Society, (1988)A Deductive System for Existential Least Fixpoint Logic.. J. Log. Comput., 3 (2): 197-213 (1993)Side Channel Analysis, Fault Injection and Applications - A Computationally Feasible SPA Attack on AES via Optimized Search., , and . SEC, volume 181 of IFIP, page 577-588. Springer, (2005)