Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Jacobsthal Binary Sequences., , and . Information Security, Coding Theory and Related Combinatorics, volume 29 of NATO Science for Peace and Security Series - D: Information and Communication Security, IOS Press, (2011)Notes on the CRTDH Group Key Agreement Protocol., , and . ICDCS Workshops, page 406-411. IEEE Computer Society, (2008)On the Tennis Ball Problem., , and . Integers, (2011)A Public Key Cryptosystem Based on Non-abelian Finite Groups., , , and . J. Cryptol., 22 (1): 62-74 (2009)Toward Understanding Key Estimation in Learning Robust Humanoid Locomotion., , , , and . CoRR, (2024)Primitive sets in a lattice., , and . Australas. J Comb., (2008)The number of classes of choice functions under permutation equivalence., and . Australas. J Comb., (1998)Learning Gait-conditioned Bipedal Locomotion with Motor Adaptation*., , , , , and . Humanoids, page 1-7. IEEE, (2023)Enumeration of certain binary vectors., and . Australas. J Comb., (1996)