Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Continuous Adaptive Evolution of a Fast-Growing Corynebacterium glutamicum Strain Independent of Protocatechuate, , , , , , , , , and 1 other author(s). Frontiers in Microbiology, (2019)Improved algebraic side-channel attack on AES., , , , , and . J. Cryptographic Engineering, 3 (3): 139-156 (2013)Life-cycle management of X.509 certificates based on LDAP directories., , , and . Journal of Computer Security, 14 (5): 419-439 (2006)CA trust management for the Web PKI., , , , and . Journal of Computer Security, 22 (6): 913-959 (2014)Towards Algebraic Cryptanalysis of HFE Challenge 2., , and . ISA, volume 200 of Communications in Computer and Information Science, page 123-131. Springer, (2011)Towards a Framework on the Security Requirements for Electronic Voting Protocols., , , , and . REVOTE, page 61-68. IEEE Computer Society, (2009)On the Complexity of Computing Class Groups of Algebraic Number Fields., and . AAECC, volume 357 of Lecture Notes in Computer Science, page 122-130. Springer, (1988)Practical Lattice Basis Sampling Reduction., and . ANTS, volume 4076 of Lecture Notes in Computer Science, page 222-237. Springer, (2006)Post-Quantum Cryptography: State of the Art., , , and . The New Codebreakers, volume 9100 of Lecture Notes in Computer Science, page 88-108. Springer, (2016)Computation of Independent Units in Number Fields by Dirichlet's Method., and . AAECC, volume 229 of Lecture Notes in Computer Science, page 302-305. Springer, (1985)