Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A data model and algebra for probabilistic complex values., , and . Ann. Math. Artif. Intell., 33 (2-4): 205-252 (2001)Fast Lattice Point Enumeration with Minimal Overhead., and . SODA, page 276-294. SIAM, (2015)Tracing Internet Path Transparency., , , and . TMA, page 1-7. IEEE, (2018)Gaussian Sampling over the Integers: Efficient, Generic, Constant-Time., and . CRYPTO (2), volume 10402 of Lecture Notes in Computer Science, page 455-485. Springer, (2017)A Heisenberg limit for quantum region estimation., and . ISIT, page 1126-1130. IEEE, (2014)Towards a theory of non-commutative optimization: geodesic first and second order methods for moment maps and polytopes., , , , , and . CoRR, (2019)Algebraic Analysis of the Poles in the Doppler Spectrum for Vehicle-to-Vehicle Channels., , and . IEEE Wireless Commun. Letters, 7 (4): 662-665 (2018)Full analysis of PRINTcipher with respect to invariant subspace attack: efficient key recovery and countermeasures., , and . Des. Codes Cryptogr., 73 (3): 997-1022 (2014)Improved algebraic side-channel attack on AES., , , , , and . J. Cryptographic Engineering, 3 (3): 139-156 (2013)Hyperpfaffians and Geometric Complexity Theory., and . CoRR, (2019)