Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Distance Transitive Graphs in Which the Stabilizer of a Point Contains an Alternating Group.. Eur. J. Comb., 9 (4): 379-390 (1988)Special issue on the conference ISSAC 2015: Symbolic computation and computer algebra.. J. Symb. Comput., (2017)Efficient Arithmetic in Successive Algebraic Extension Fields Using Symmetries., , and . Math. Comput. Sci., 6 (3): 217-233 (2012)Usage of Modular Techniques for Efficient Computation of Ideal Operations., and . Math. Comput. Sci., 12 (1): 1-32 (2018)Implementation of prime decomposition of polynomial ideals over small finite fields., and . J. Symb. Comput., 38 (4): 1227-1246 (2004)Special Issue on Algorithmic Methods in Galois Theory - Foreword of the Guest Editors., , and . J. Symb. Comput., 30 (6): 631-633 (2000)Complexity bounds on Semaev's naive index calculus method for ECDLP., , , and . J. Math. Cryptol., 14 (1): 460-485 (2020)Parameters for Secure Elliptic Curve Cryptosystem - Improvements on Schoof's Algorithm., , , and . Public Key Cryptography, volume 1431 of Lecture Notes in Computer Science, page 253-257. Springer, (1998)Privacy-Preserving Wildcards Pattern Matching Using Symmetric Somewhat Homomorphic Encryption., , , , and . ACISP, volume 8544 of Lecture Notes in Computer Science, page 338-353. Springer, (2014)On Determining the Solvability of Polynomials., , and . ISSAC, page 127-134. ACM, (1990)