Author of the publication

On the Computation of Elimination Ideals of Boolean Polynomial Rings.

, , and . ASCM, volume 5081 of Lecture Notes in Computer Science, page 334-348. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Implementation of Boolean Gröbner Bases., and . ASCM, page 87-92. Springer, (2009)An Implementation Method of Boolean Gröbner Bases and Comprehensive Boolean Gröbner Bases on General Computer Algebra Systems., and . ICMS, volume 8592 of Lecture Notes in Computer Science, page 531-536. Springer, (2014)Strongly Secure Identity-Based Key Exchange with Single Pairing Operation., , , and . ESORICS (2), volume 11736 of Lecture Notes in Computer Science, page 484-503. Springer, (2019)Is High Resolution Representation More Effective for Content Based Image Classification?, , , and . IJCNN, page 4045-4050. IEEE, (2006)Two-level decoupled Hamming network for associative memory under noisy environment., , and . ISCAS (4), page 3635-3638. IEEE, (2005)Revocable Hierarchical Identity-Based Authenticated Key Exchange., , , , , and . ICISC, volume 13218 of Lecture Notes in Computer Science, page 3-27. Springer, (2021)On the Computation of Elimination Ideals of Boolean Polynomial Rings., , and . ASCM, volume 5081 of Lecture Notes in Computer Science, page 334-348. Springer, (2007)A differential LSI method for document classification., , and . IRAL, page 25-32. ACL, (2003)Making the Identity-Based Diffie-Hellman Key Exchange Efficiently Revocable., , , , , and . LATINCRYPT, volume 14168 of Lecture Notes in Computer Science, page 171-191. Springer, (2023)