Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Patrick Kopper University of Stuttgart

GALÆXI Scaling, , , , , , , , and . Dataset, (2024)Related to: Kempf, Daniel et al. “GALÆXI: Solving complex compressible flows with high-order discontinuous Galerkin methods on accelerator-based systems.” (2024). arXiv: 2404.12703.
GALÆXI Scaling, , , , , , , , and . Dataset, (2024)Related to: Kempf, Daniel et al. “GALÆXI: Solving complex compressible flows with high-order discontinuous Galerkin methods on accelerator-based systems.” (2024). arXiv: 2404.12703.GALÆXI Validation: Taylor-Green Vortex, , , , , , , , and . Dataset, (2024)Related to: Kempf, Daniel et al. “GALÆXI: Solving complex compressible flows with high-order discontinuous Galerkin methods on accelerator-based systems.” (2024). arXiv: 2404.12703.GALÆXI Verification: Convergence Tests, , , , , , , , and . Dataset, (2024)Related to: Kempf, Daniel et al. “GALÆXI: Solving complex compressible flows with high-order discontinuous Galerkin methods on accelerator-based systems.” (2024). arXiv: 2404.12703.
 

Other publications of authors with the same name

Approximative Public-Key-Kryptosysteme, and . Informatik-Fachberichte Springer, (1989)Das Meta-ElGamal Signaturverfahren und seine Anwendungen., , and . VIS, page 207-. Vieweg, (1995)Protokolle zum Austausch authenischer Schlüssel., and . VIS, volume 271 of Informatik-Fachberichte, page 321-328. Springer, (1991)Discrete Logarithm Based Protocols., and . EUROCRYPT, volume 547 of Lecture Notes in Computer Science, page 399-408. Springer, (1991)Meta-Message Recovery and Meta-Blind Signature Schemes Based on the Discrete Logarithm Problem and Their Applications., , and . ASIACRYPT, volume 917 of Lecture Notes in Computer Science, page 224-237. Springer, (1994)Die RISC-CISC Debatte., , and . Angewandte Informatik, 29 (7): 273-280 (1987)Secure Internet Phone., , , and . Communications and Multimedia Security, volume 192 of IFIP Conference Proceedings, Kluwer, (2001)Selbstmodifizierende Verbindungsnetzwerke.. VIS, volume 16 of DuD-Fachbeiträge, page 353-369. Vieweg, (1993)Breaking and Repairing a Convertible Undeniable Signature Scheme., , and . ACM Conference on Computer and Communications Security, page 148-152. ACM, (1996)Editorial: Chipkarten.. it+ti - Informationstechnik und Technische Informatik, 39 (5): 5-6 (1997)