Author of the publication

Effective Localization Using Double Ideal Quotient and Its Implementation.

, and . CASC, volume 11077 of Lecture Notes in Computer Science, page 272-287. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Special issue on the conference ISSAC 2015: Symbolic computation and computer algebra.. J. Symb. Comput., (2017)On Determining the Solvability of Polynomials., , and . ISSAC, page 127-134. ACM, (1990)Effective Localization Using Double Ideal Quotient and Its Implementation., and . CASC, volume 11077 of Lecture Notes in Computer Science, page 272-287. Springer, (2018)A Modular Method for Computing the Splitting Field of a Polynomial., and . ANTS, volume 4076 of Lecture Notes in Computer Science, page 124-140. Springer, (2006)Practical Packing Method in Somewhat Homomorphic Encryption., , , , and . DPM/SETOP, volume 8247 of Lecture Notes in Computer Science, page 34-50. Springer, (2013)Efficient Arithmetic in Successive Algebraic Extension Fields Using Symmetries., , and . Math. Comput. Sci., 6 (3): 217-233 (2012)Usage of Modular Techniques for Efficient Computation of Ideal Operations., and . Math. Comput. Sci., 12 (1): 1-32 (2018)Parameters for Secure Elliptic Curve Cryptosystem - Improvements on Schoof's Algorithm., , , and . Public Key Cryptography, volume 1431 of Lecture Notes in Computer Science, page 253-257. Springer, (1998)Privacy-Preserving Wildcards Pattern Matching Using Symmetric Somewhat Homomorphic Encryption., , , , and . ACISP, volume 8544 of Lecture Notes in Computer Science, page 338-353. Springer, (2014)The Block Cipher SC2000., , , , , , , and . FSE, volume 2355 of Lecture Notes in Computer Science, page 312-327. Springer, (2001)