Author of the publication

A stable and distortion-free echo and howling canceller telephone networks.

, and . ICASSP, page 1620-1623. IEEE, (1988)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A knapsack cryptosystem based on multiple knapsacks., , , and . ISITA, page 428-432. IEEE, (2010)An Efficient Method to Find Invalid Loops in a Communication Protocol and Its Application to HDLC., and . ICC, page 563-567. IEEE, (1986)Multi-Language Zero Knowledge Interactive Proof Systems., and . CRYPTO, volume 537 of Lecture Notes in Computer Science, page 339-352. Springer, (1990)General Public Key Residue Cryptosystems and Mental Poker Protocols., , , and . EUROCRYPT, volume 473 of Lecture Notes in Computer Science, page 374-388. Springer, (1990)Low Exponent Attack Against Elliptic Curve RSA., , and . Inf. Process. Lett., 53 (2): 77-83 (1995)Fast Construction of Secure Discrete Logarithm Problems over Jacobian Varieties., , and . SEC, volume 175 of IFIP Conference Proceedings, page 241-250. Kluwer, (2000)Simplification of stochastic fastest NLMS algorithm., , and . ISCAS (3), page 158-161. IEEE, (1999)A fast stability test for multidimensional systems., , , and . ISCAS, page 579-582. IEEE, (1993)Construction of Hyperelliptic Curves with CM and Its Application to Cryptosystems., , , and . ASIACRYPT, volume 1976 of Lecture Notes in Computer Science, page 259-273. Springer, (2000)Electronic Money and Key Management from Global and Regional Points of View.. ASIACRYPT, volume 1163 of Lecture Notes in Computer Science, page 173-184. Springer, (1996)