Author of the publication

Die Entwicklung und Umsetzung von IT-Sicherheitsstandards als sozialer Aushandlungsprozess.

, , , and . Datenschutz und Datensicherheit, 43 (11): 713-718 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Die Entwicklung und Umsetzung von IT-Sicherheitsstandards als sozialer Aushandlungsprozess., , , and . Datenschutz und Datensicherheit, 43 (11): 713-718 (2019)Solving subset sum with small space - Handling cryptanalytic Big Data.. it Inf. Technol., 62 (3-4): 181-187 (2020)A 4H-SiC CMOS Oscillator-Based Temperature Sensor Operating from 298 K up to 573 K., , , , , , , and . Sensors, 23 (24): 9653 (December 2023)Quantum Period Finding is Compression Robust., and . IACR Trans. Symmetric Cryptol., 2022 (1): 183-211 (2022)Legendre PRF (Multiple) Key Attacks and the Power of Preprocessing., and . CSF, page 428-438. IEEE, (2022)How to Backdoor (Classic) McEliece and How to Guard Against Backdoors., , , and . PQCrypto, volume 13512 of Lecture Notes in Computer Science, page 24-44. Springer, (2022)New NTRU Records with Improved Lattice Bases., , and . PQCrypto, volume 14154 of Lecture Notes in Computer Science, page 167-195. Springer, (2023)McEliece needs a Break - Solving McEliece-1284 and Quasi-Cyclic-2918 with Modern ISD., , and . IACR Cryptol. ePrint Arch., (2021)Approximate Divisor Multiples - Factoring with Only a Third of the Secret CRT-Exponents., , and . EUROCRYPT (3), volume 13277 of Lecture Notes in Computer Science, page 147-167. Springer, (2022)How to Meet Ternary LWE Keys.. CRYPTO (2), volume 12826 of Lecture Notes in Computer Science, page 701-731. Springer, (2021)