Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The recurrence function of a random Sturmian word., and . ANALCO, page 100-114. SIAM, (2017)The Complete Analysis of the Binary Euclidean Algorithm.. ANTS, volume 1423 of Lecture Notes in Computer Science, page 77-94. Springer, (1998)Algorithms for Computing Signs of 2×2 Determinants: Dynamics and Average-Case Analysis.. ESA, volume 1284 of Lecture Notes in Computer Science, page 486-499. Springer, (1997)On the Stack-Size of General Tries., , and . RAIRO Theor. Informatics Appl., 35 (2): 163-185 (2001)An analysis of the Gaussian algorithm for lattice reduction., , and . ANTS, volume 877 of Lecture Notes in Computer Science, page 144-158. Springer, (1994)How to Break Okamoto's Cryptosystem by Reducing Lattice Bases., , and . EUROCRYPT, volume 330 of Lecture Notes in Computer Science, page 281-291. Springer, (1988)A Unifying Framework for the Analysis of a Class of Euclidean Algorithms.. LATIN, volume 1776 of Lecture Notes in Computer Science, page 343-354. Springer, (2000)An Upper Bound on the Average Number of Iterations of the LLL Algorithm., and . Theor. Comput. Sci., 123 (1): 95-115 (1994)Dynamics of the Binary Euclidean Algorithm: Functional Analysis and Operators.. Algorithmica, 22 (4): 660-685 (1998)Two Arithmetical Sources and Their Associated Tries., , , , , and . AofA, volume 159 of LIPIcs, page 4:1-4:19. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2020)