Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Milliwatt terahertz harmonic generation from topological insulator metamaterials, , , , , , , , , and 9 other author(s). Light Sci Appl, 11 (1): 315 (Nov 1, 2022)Estimating housing needs. Architectural Pr, London, (1946)Bausparen in England, Amerika und Deutschland. Bauwelt-Verl, Berlin, (1931)Locally Decodable/Correctable Codes for Insertions and Deletions., , , , and . FSTTCS, volume 182 of LIPIcs, page 16:1-16:17. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2020)Public-Coin Zero-Knowledge Arguments with (almost) Minimal Time and Space Overheads., , , , and . TCC (2), volume 12551 of Lecture Notes in Computer Science, page 168-197. Springer, (2020)Private and Resource-Bounded Locally Decodable Codes for Insertions and Deletions., and . ISIT, page 1841-1846. IEEE, (2021)P4-free Partition and Cover Numbers & Applications., , , , , and . ITC, volume 199 of LIPIcs, page 16:1-16:25. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2021)Secure Computation Based on Leaky Correlations: High Resilience Setting., , and . CRYPTO (2), volume 10402 of Lecture Notes in Computer Science, page 3-32. Springer, (2017)A multiplication operation for the hierarchy of norms., and . Ann. Pure Appl. Log., 169 (7): 656-673 (2018)Secure Computation Using Leaky Correlations (Asymptotically Optimal Constructions)., , , and . TCC (2), volume 11240 of Lecture Notes in Computer Science, page 36-65. Springer, (2018)