Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Number theory for computing. Springer, (2002)Testing Mersenne Primes with Elliptic Curves., and . CASC, volume 4194 of Lecture Notes in Computer Science, page 303-312. Springer, (2006)Secure Electronic and Mobile Commerce., and . CIMCA/IAWTIC, page 692-697. IEEE Computer Society, (2005)Cryptographic and Computational Challenges in Grid Computing., , and . FCS, page 200-204. CSREA Press, (2006)Computability, Learnability and Breakability in Cryptanalysis.. CIMCA/IAWTIC/ISE, page 1274-1281. IEEE Computer Society, (2008)Polynomially Uncomputable Number-Theoretic Problems in Cryptography and Network Security., , and . FCS, page 195-199. CSREA Press, (2006)Grid Services Mediation., , , , , and . AINA, page 879-884. IEEE Computer Society, (2005)Can Integer Factorization be in P?, and . CIMCA/IAWTIC, page 266. IEEE Computer Society, (2006)A New Scheme for Deniable/Repudiable Authentication., , and . CASC, volume 4770 of Lecture Notes in Computer Science, page 424-432. Springer, (2007)