| Publication | Date of Publication | Type |
|---|
| Combinatorial and geometric approaches to counting problems on linear matroids, graphic arrangements, and partial orders | 2024-01-29 | Paper |
| OBDDs of a monotone function and of its prime implicants | 2023-01-25 | Paper |
| Probing a set of hyperplanes by lines and related problems | 2023-01-18 | Paper |
| FPT algorithms to enumerate and count acyclic and totally cyclic orientations | 2022-04-27 | Paper |
| Extended formulations of lower-truncated transversal polymatroids | 2021-07-06 | Paper |
| FPT algorithms exploiting carving decomposition for Eulerian orientations and ice-type models | 2018-06-15 | Paper |
| Parametric multiroute flow and its application to multilink-attack network | 2018-05-24 | Paper |
| How to Strengthen the Security of RSA-OAEP | 2017-07-27 | Paper |
| Fixed Initialization Decoding of LDPC Codes Over a Binary Symmetric Channel | 2017-07-12 | Paper |
| Quantum Error Correction Beyond the Bounded Distance Decoding Limit | 2017-07-12 | Paper |
| How to construct efficient signcryption schemes on elliptic curves | 2016-06-09 | Paper |
| Parametric Multiroute Flow and Its Application to Robust Network with $$k$$ Edge Failures | 2015-10-16 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2948433 | 2015-09-30 | Paper |
| BDD Operations for Quantum Graph States | 2014-09-02 | Paper |
| Reducing the Spread of Damage of Key Exposures in Key-Insulated Encryption | 2014-08-21 | Paper |
| Generic cryptographic weakness of \(k\)-normal Boolean functions in certain stream ciphers and cryptanalysis of Grain-128 | 2014-02-17 | Paper |
| Proximity and Motion Planning on ℓ1-Rigid Planar Periodic Graphs | 2013-12-17 | Paper |
| A construction method of matroidal networks | 2013-08-20 | Paper |
| Ciphertext Policy Multi-dimensional Range Encryption | 2013-06-04 | Paper |
| Internal state recovery of keystream generator LILI-128 based on a novel weakness of the employed Boolean function | 2012-10-23 | Paper |
| Time-Specific Encryption from Forward-Secure Encryption | 2012-09-25 | Paper |
| Calculating Average Joint Hamming Weight for Minimal Weight Conversion of d Integers | 2012-06-08 | Paper |
| Revisiting Hyperbolic Voronoi Diagrams in Two and Higher Dimensions from Theoretical, Applied and Generalized Viewpoints | 2012-03-09 | Paper |
| Matroid enumeration for incidence geometry | 2012-03-02 | Paper |
| Distinguishability measures and entropies for general probabilistic theories | 2011-06-03 | Paper |
| Physical Equivalence of Pure States and Derivation of Qubit in General Probabilistic Theories | 2010-12-24 | Paper |
| Constructing Better KEMs with Partial Message Recovery | 2010-11-23 | Paper |
| No-cloning theorem on quantum logics | 2010-08-17 | Paper |
| Unconditionally Secure Electronic Voting | 2010-06-17 | Paper |
| Efficient hybrid encryption from ID-based encryption | 2010-03-02 | Paper |
| Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations | 2010-02-09 | Paper |
| The Role of Arbiters in Asymmetric Authentication Schemes | 2010-02-09 | Paper |
| Very-Efficient Anonymous Password-Authenticated Key Exchange and Its Extensions | 2010-01-14 | Paper |
| Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE | 2010-01-14 | Paper |
| Attribute-Based Encryption Supporting Direct/Indirect Revocation Modes | 2010-01-07 | Paper |
| Advances in Cryptology - ASIACRYPT 2003 | 2010-01-05 | Paper |
| Advances in Cryptology - ASIACRYPT 2003 | 2010-01-05 | Paper |
| Unconditionally Secure Chaffing-and-Winnowing for Multiple Use | 2009-12-03 | Paper |
| Efficient Oblivious Transfer Protocols Achieving a Non-zero Rate from Any Non-trivial Noisy Correlation | 2009-12-03 | Paper |
| An improvement of discrete Tardos fingerprinting codes | 2009-10-14 | Paper |
| Generic Construction of Stateful Identity Based Encryption | 2009-09-29 | Paper |
| Conjunctive Broadcast and Attribute-Based Encryption | 2009-08-18 | Paper |
| An approach for stream ciphers design based on joint computing over random and secret data | 2009-08-10 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3632446 | 2009-06-11 | Paper |
| Computational Geometry Analysis of Quantum State Space and Its Applications | 2009-05-20 | Paper |
| Public Key Cryptography – PKC 2004 | 2009-05-14 | Paper |
| Topics in Cryptology – CT-RSA 2004 | 2009-05-07 | Paper |
| An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations | 2009-04-29 | Paper |
| Strong Anonymous Signatures | 2009-04-29 | Paper |
| A Lower-Bound of Complexity for RSA-Based Password-Authenticated Key Exchange | 2009-04-23 | Paper |
| Semantic security for the McEliece cryptosystem without random oracles | 2009-03-31 | Paper |
| Introduction to the Special Issue on Information Theoretic Security | 2009-02-24 | Paper |
| The Commitment Capacity of the Gaussian Channel Is Infinite | 2009-02-24 | Paper |
| Orthogonality between Key Privacy and Data Privacy, Revisited | 2009-02-10 | Paper |
| A Privacy Protection Scheme for a Scalable Control Method in Context-Dependent Services | 2009-01-22 | Paper |
| Efficient Identity-Based Encryption with Tight Security Reduction | 2009-01-09 | Paper |
| On the one-wayness against chosen-plaintext attacks of the Loidreau's modified McEliece PKC | 2008-12-21 | Paper |
| Modeling Bit Flipping Decoding Based on Nonorthogonal Check Sums With Application to Iterative Decoding Attack of McEliece Cryptosystem | 2008-12-21 | Paper |
| Modeling Block Decoding Approaches for the Fast Correlation Attack | 2008-12-21 | Paper |
| A fibre bundle over manifolds of quantum channels and its application to quantum statistics | 2008-10-21 | Paper |
| Relations Among Notions of Security for Identity Based Encryption Schemes | 2008-09-18 | Paper |
| Algebraic Cryptanalysis of 58-Round SHA-1 | 2008-09-16 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3522505 | 2008-09-03 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3522510 | 2008-09-03 | Paper |
| Error-correcting codes and cryptography | 2008-08-20 | Paper |
| A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol | 2008-07-25 | Paper |
| An Authentication and Key Exchange Protocol for Secure Credential Services | 2008-06-17 | Paper |
| A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function | 2008-06-10 | Paper |
| Formal Security Treatments for Signatures from Identity-Based Encryption | 2008-06-10 | Paper |
| Bounded CCA2-Secure Encryption | 2008-05-15 | Paper |
| Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys | 2008-04-24 | Paper |
| An Improvement of Tardos’s Collusion-Secure Fingerprinting Codes with Very Short Lengths | 2008-04-17 | Paper |
| On the Key-Privacy Issue of McEliece Public-Key Encryption | 2008-04-17 | Paper |
| Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption | 2008-04-15 | Paper |
| Trade-Off Traitor Tracing | 2008-04-11 | Paper |
| An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication | 2008-04-11 | Paper |
| Efficient Shared-Key Authentication Scheme from Any Weak Pseudorandom Function | 2008-04-11 | Paper |
| Graph-Decomposition-Based Frameworks for Subset-Cover Broadcast Encryption and Efficient Instantiations | 2008-03-18 | Paper |
| Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application | 2008-03-18 | Paper |
| Cryptanalysis of Keystream Generator by Decimated Sample Based Algebraic and Fast Correlation Attacks | 2008-03-17 | Paper |
| An Efficient Aggregate Shuffle Argument Scheme | 2008-03-07 | Paper |
| Applied Cryptography and Network Security | 2008-02-19 | Paper |
| Generating facets for the cut polytope of a graph by triangular elimination | 2008-01-07 | Paper |
| Cryptography and Coding | 2007-11-28 | Paper |
| IDS False Alarm Reduction Using Continuous and Discontinuous Patterns | 2007-09-24 | Paper |
| Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA | 2007-09-24 | Paper |
| Short Signature and Universal Designated Verifier Signature Without Random Oracles | 2007-09-24 | Paper |
| An Efficient Compiler from Σ-Protocol to 2-Move Deniable Zero-Knowledge | 2007-09-11 | Paper |
| Tag-KEM from Set Partial Domain One-Way Permutations | 2007-09-07 | Paper |
| Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT | 2007-09-07 | Paper |
| Adaptively Secure Traitor Tracing Against Key Exposure and Its Application to Anywhere TV Service | 2007-09-07 | Paper |
| Geometry of optimal estimation scheme forSU(D) channels | 2007-05-07 | Paper |
| Public Key Cryptography - PKC 2006 | 2007-05-02 | Paper |
| Applied Algebra, Algebraic Algorithms and Error-Correcting Codes | 2007-02-12 | Paper |
| Applied Algebra, Algebraic Algorithms and Error-Correcting Codes | 2007-02-12 | Paper |
| Applied Algebra, Algebraic Algorithms and Error-Correcting Codes | 2007-02-12 | Paper |
| Applied Algebra, Algebraic Algorithms and Error-Correcting Codes | 2007-02-12 | Paper |
| Applied Algebra, Algebraic Algorithms and Error-Correcting Codes | 2007-02-12 | Paper |
| Information Security and Cryptology | 2006-11-14 | Paper |
| Security in Communication Networks | 2006-10-10 | Paper |
| Progress in Cryptology – Mycrypt 2005 | 2006-10-05 | Paper |
| On the relationship between convex bodies related to correlation experiments with dichotomic observables | 2006-09-28 | Paper |
| Information Security and Privacy | 2006-06-22 | Paper |
| NUMBERS OF PRIMAL AND DUAL BASES OF NETWORK FLOW AND UNIMODULAR INTEGER PROGRAMS | 2006-06-14 | Paper |
| Two-party Bell inequalities derived from combinatorics via triangular elimination | 2006-01-13 | Paper |
| Topics in Cryptology – CT-RSA 2005 | 2005-12-08 | Paper |
| Information Security and Privacy | 2005-09-07 | Paper |
| Information and Communications Security | 2005-08-19 | Paper |
| A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates | 2005-08-12 | Paper |
| Comparison Between XL and Gröbner Basis Algorithms | 2005-08-12 | Paper |
| Applied Cryptography and Network Security | 2005-06-13 | Paper |
| Applied Cryptography and Network Security | 2005-06-13 | Paper |
| Quantum versus deterministic counter automata | 2005-06-01 | Paper |
| Standard pairs for lawrence-type matrices and their applications to several lawrence-type integer programs | 2005-04-05 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4654645 | 2005-03-08 | Paper |
| ENUMERATING TRIANGULATIONS IN GENERAL DIMENSIONS | 2004-09-29 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4817513 | 2004-09-24 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4808681 | 2004-08-12 | Paper |
| Fast Correlation Attack Algorithm with List Decoding and an Application | 2004-08-12 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3044507 | 2004-08-11 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4737262 | 2004-08-11 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3043927 | 2004-08-09 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3043942 | 2004-08-09 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4472418 | 2004-08-04 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4472481 | 2004-08-04 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4474173 | 2004-08-04 | Paper |
| Quantify entanglement by concurrence hierarchy | 2004-06-10 | Paper |
| Quantum parameter estimation of a generalized Pauli channel | 2004-06-10 | Paper |
| Phase-covariant quantum cloning | 2004-06-09 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4450731 | 2004-02-16 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4450768 | 2004-02-16 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4437102 | 2003-12-07 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4437110 | 2003-12-07 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4426688 | 2003-09-16 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4428331 | 2003-09-15 | Paper |
| On the distribution of the peak-to-average power ratio in OFDM signals | 2003-08-19 | Paper |
| Equivalence between Semantic Security and Indistinguishability against Chosen Ciphertext Attacks | 2003-07-27 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4414691 | 2003-07-25 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4413863 | 2003-07-21 | Paper |
| Unconditionally Secure Anonymous Encryption and Group Authentication | 2003-07-16 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4408442 | 2003-06-29 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4408444 | 2003-06-29 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4708675 | 2003-06-18 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4536262 | 2003-02-14 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4790439 | 2003-01-28 | Paper |
| One-way probabilistic reversible and quantum one-counter automata. | 2003-01-21 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2724598 | 2002-11-04 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2724458 | 2002-09-01 | Paper |
| A Hierarchical Non-interactive Key-Sharing Scheme with Low Memory Size and High Resistance against Collusion Attacks | 2002-08-28 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2724577 | 2002-07-22 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2766854 | 2002-07-22 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4538131 | 2002-07-11 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4538175 | 2002-07-11 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4538192 | 2002-07-11 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4537992 | 2002-06-25 | Paper |
| Dualistic computational algebraic analyses of primal and dual minimum cost flow problems on acyclic tournament graphs | 2002-06-17 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4941193 | 2002-05-14 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4529990 | 2002-05-07 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4945391 | 2002-04-08 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4945399 | 2002-03-18 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2707409 | 2002-03-06 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4502513 | 2002-01-29 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4502490 | 2002-01-27 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2741391 | 2001-10-14 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2742597 | 2001-09-23 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2742648 | 2001-09-23 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2743802 | 2001-09-17 | Paper |
| Binary multilevel convolutional codes with unequal error protection capabilities | 2001-08-14 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2707435 | 2001-04-03 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4761864 | 2001-02-21 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4525751 | 2001-01-24 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4502636 | 2001-01-14 | Paper |
| Algorithms for the longest common subsequence problem for multiple strings based on geometric maxima | 2000-11-08 | Paper |
| Dynamic weighted Voronoi diagrams and weighted minimax matching of two corresponding point sets | 2000-10-10 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4505400 | 2000-09-27 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4945044 | 2000-09-04 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4945041 | 2000-08-24 | Paper |
| Restriction, terms and nonlinearity of Boolean functions | 2000-08-23 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4763620 | 2000-07-04 | Paper |
| Comparing the MOV and FR Reductions in Elliptic Curve Cryptography | 2000-06-07 | Paper |
| Relating differential distribution tables to other properties of substitution boxes | 2000-06-04 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4937179 | 2000-02-03 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4937204 | 2000-02-03 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4263443 | 2000-02-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4935166 | 2000-01-30 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4703474 | 1999-12-15 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4705029 | 1999-12-15 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4705041 | 1999-12-15 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4703857 | 1999-12-01 | Paper |
| Applications of error-control coding | 1999-11-21 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4253355 | 1999-11-08 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4253356 | 1999-11-08 | Paper |
| A New Approach to the Analysis of Free Rotations of Rigid Bodies | 1999-11-08 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4267811 | 1999-10-24 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4267826 | 1999-10-20 | Paper |
| Enhanced \(A^{*}\) algorithms for multiple alignments: optimal alignments for several sequences and k-opt approximate alignments for large cases | 1999-01-12 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3839179 | 1998-08-13 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4373645 | 1998-06-14 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4373627 | 1998-05-12 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3840096 | 1998-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4341696 | 1997-12-08 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4354783 | 1997-09-17 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4341790 | 1997-07-20 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4341706 | 1997-06-18 | Paper |
| On classes of rate k/(k+1) convolutional codes and their decoding techniques | 1997-05-12 | Paper |
| \(\varepsilon\)-approximations of \(k\)-label spaces | 1997-02-28 | Paper |
| A new unifying heuristic algorithm for the undirected minimum cut problems using minimum range cut algorithms | 1996-07-07 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4314047 | 1995-01-08 | Paper |
| A design of Reed-Solomon decoder with systolic-array structure | 1995-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4279582 | 1994-09-20 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4279603 | 1994-03-07 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4279680 | 1994-02-22 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4279702 | 1994-02-22 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4279527 | 1994-02-17 | Paper |
| Generalized concatenated codes for channels where unidirectional byte errors are predominant | 1994-02-07 | Paper |
| Orthogonal weightet linear \(L_ 1\) and \(L_ \infty\) approximation and applications | 1993-08-10 | Paper |
| Human Identification Through Insecure Channel | 1993-05-18 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4038776 | 1993-05-18 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4028885 | 1993-03-28 | Paper |
| Combination of decoding of error-correcting codes and equalization for channels with intersymbol interference | 1992-06-27 | Paper |
| Finding k points with minimum diameter and related problems | 1991-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3356233 | 1991-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3356234 | 1991-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3356240 | 1991-01-01 | Paper |
| Some classes of burst asymmetric or unidirectional error correcting codes | 1990-01-01 | Paper |
| Computing simple circuits from a set of line segments | 1990-01-01 | Paper |
| Locating a robot with angle measurements | 1990-01-01 | Paper |
| On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses | 1990-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3359634 | 1990-01-01 | Paper |
| Some new binary codes correcting asymmetric/unidirectional errors | 1990-01-01 | Paper |
| A linear-time algorithm for linear \(L_ 1\) approximation of points | 1989-01-01 | Paper |
| Notes on oriented depth-first search and longest paths | 1989-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3495234 | 1989-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3495236 | 1989-01-01 | Paper |
| Geometric relations among Voronoi diagrams | 1988-01-01 | Paper |
| Computing the volume of the union of spheres | 1988-01-01 | Paper |
| On the convexity of the multiplicative version of Karmarkar's potential function | 1988-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3803032 | 1988-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3805737 | 1988-01-01 | Paper |
| Shortest path between two simple polygons | 1987-01-01 | Paper |
| EXTENSIONS OF THE MULTIPLICATIVE PENALTY FUNCTION METHOD FOR LINEAR PROGRAMMING | 1987-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3782342 | 1987-01-01 | Paper |
| Dynamic orthogonal segment intersection search | 1987-01-01 | Paper |
| A Construction Method of High-Speed Decoders Using ROM's for Bose–Chaudhuri–Hocquenghem and Reed–Solomon Codes | 1987-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3793937 | 1987-01-01 | Paper |
| Visibility of disjoint polygons | 1986-01-01 | Paper |
| A multiplicative barrier function method for linear programming | 1986-01-01 | Paper |
| Efficient Algorithms for Geometric Graph Search Problems | 1986-01-01 | Paper |
| WORST-CASE ANALYSIS FOR PLANAR MATCHING AND TOUR HEURISTICS WITH BUCKETING TECHNIQUES AND SPACEFILLING CURVES | 1986-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3734308 | 1986-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3768247 | 1986-01-01 | Paper |
| On combinatorial structures of line drawings of polyhedra | 1985-01-01 | Paper |
| Voronoi Diagram in the Laguerre Geometry and Its Applications | 1985-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3716294 | 1985-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3741563 | 1985-01-01 | Paper |
| PRACTICAL EFFICIENCIES OF EXISTING SHORTEST-PATH ALGORITHMS AND A NEW BUCKET ALGORITHM | 1984-01-01 | Paper |
| NETWORK-FLOW ALGORITHMS FOR LOWER-TRUNCATED TRANSVERSAL POLYMATROIDS | 1983-01-01 | Paper |
| Finding the connected components and a maximum clique of an intersection graph of rectangles in the plane | 1983-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3677204 | 1983-01-01 | Paper |
| ON THE PRACTICAL EFFICIENCY OF VARIOUS MAXIMUM FLOW ALGORITHMS | 1983-01-01 | Paper |
| Finding connected components of an intersection graph of squares in the Euclidean plane | 1982-01-01 | Paper |
| Generalized tensor product codes | 1981-01-01 | Paper |
| A new multilevel coding method using error-correcting codes | 1977-01-01 | Paper |
| Correction to 'A New Multilevel Coding Method Using Error-Correcting Codes' | 1977-01-01 | Paper |
| A theory of two-dimensional cyclic codes | 1977-01-01 | Paper |
| A construction method for path-invariant comma-free codes (Corresp.) | 1974-01-01 | Paper |
| Two-dimensional Fire codes | 1973-01-01 | Paper |
| A theory of two-dimensional linear recurring arrays | 1972-01-01 | Paper |