| Publication | Date of Publication | Type |
|---|
| On the impossibility of surviving (iterated) deletion of weakly dominated strategies in rational MPC | 2024-08-01 | Paper |
| A generic construction of an anonymous reputation system and instantiations from lattices | 2024-06-26 | Paper |
| Enhanced Security of Attribute-Based Signatures | 2023-06-28 | Paper |
| A Complexity Theoretical Study of Fuzzy K -Means | 2023-04-26 | Paper |
| Coresets for Fuzzy K-Means with Applications | 2022-07-21 | Paper |
| Denesting by bounded degree radicals | 2021-12-20 | Paper |
| How well do SEM algorithms imitate EM algorithms? A non-asymptotic analysis for mixture models | 2020-05-27 | Paper |
| Practical, anonymous, and publicly linkable universally-composable reputation systems | 2020-01-21 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4633923 | 2019-05-06 | Paper |
| Subtleties in Security Definitions for Predicate Encryption with Public Index | 2019-03-14 | Paper |
| Delegatable attribute-based anonymous credentials from dynamically malleable signatures | 2018-08-10 | Paper |
| Voronoi Cells of Lattices with Respect to Arbitrary Norms | 2018-07-18 | Paper |
| On the complexity of computing short linearly independent vectors and short bases in a lattice | 2016-09-29 | Paper |
| Short Group Signatures with Distributed Traceability | 2016-05-25 | Paper |
| Construction of Fully CCA-Secure Predicate Encryptions from Pair Encoding Schemes | 2016-04-08 | Paper |
| Analysis of agglomerative clustering | 2014-11-19 | Paper |
| Clustering for metric and nonmetric distance measures | 2014-11-18 | Paper |
| Analysis of Agglomerative Clustering | 2012-01-23 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3579409 | 2010-08-06 | Paper |
| Bregman Clustering for Separable Instances | 2010-06-22 | Paper |
| Computer Aided Verification | 2010-03-31 | Paper |
| Public Key Cryptography – PKC 2004 | 2009-05-14 | Paper |
| Sampling methods for shortest vectors, closest vectors and successive minima | 2009-04-29 | Paper |
| A Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers | 2008-05-06 | Paper |
| Analysis of Countermeasures Against Access Driven Cache Attacks on AES | 2008-03-25 | Paper |
| Advances in Cryptology - CRYPTO 2003 | 2007-11-28 | Paper |
| Sampling Methods for Shortest Vectors, Closest Vectors and Successive Minima | 2007-11-28 | Paper |
| Selected Areas in Cryptography | 2006-10-10 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4736445 | 2004-08-09 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4787195 | 2003-01-09 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2754148 | 2001-12-06 | Paper |
| Denesting by bounded degree radicals | 2000-08-27 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4230369 | 1999-09-02 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4252031 | 1999-06-17 | Paper |
| The rank of sparse random matrices over finite fields | 1997-12-15 | Paper |
| Priority encoding transmission | 1997-06-12 | Paper |
| Approximate matching of polygonal shapes | 1996-10-20 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4857789 | 1995-12-07 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4038728 | 1993-05-18 | Paper |