Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Constructive Bounds and Exact Expectations for the Random Assignment Problem., and . RANDOM, volume 1518 of Lecture Notes in Computer Science, page 319-330. Springer, (1998)The Shrinking Generator., , and . CRYPTO, volume 773 of Lecture Notes in Computer Science, page 22-39. Springer, (1993)Attack on the Cryptographic Scheme NIKS-TAS.. CRYPTO, volume 839 of Lecture Notes in Computer Science, page 294-307. Springer, (1994)Finding a Small Root of a Univariate Modular Equation.. EUROCRYPT, volume 1070 of Lecture Notes in Computer Science, page 155-165. Springer, (1996)Divisors in residue classes, constructively., , and . Math. Comput., 77 (261): 531-545 (2008)Matrix Multiplication via Arithmetic Progressions., and . J. Symb. Comput., 9 (3): 251-280 (1990)The minimum latency problem, , , , , and . Proceedings of the twenty-sixth annual ACM symposium on Theory of computing, page 163--171. (1994)A Software-Optimized Encryption Algorithm., and . J. Cryptol., 11 (4): 273-287 (1998)The Angular-Metric Traveling Salesman Problem., , , , and . SIAM J. Comput., 29 (3): 697-711 (1999)Fast evaluation of logarithms in fields of characteristic two.. IEEE Trans. Inf. Theory, 30 (4): 587-593 (1984)