![]() |
| 2007 | ||
|---|---|---|
| 5 | EE | Bart Kirkels, Martijn Maas, Peter Roelse: A security architecture for pay-per-view business models in conditional access systems. Digital Rights Management Workshop 2007: 1-9 |
| 4 | EE | Peter Roelse: The design of composite permutations with applications to DES-like S-boxes. Des. Codes Cryptography 42(1): 21-42 (2007) |
| 2003 | ||
| 3 | Peter Fleischmann, Markus Chr. Holder, Peter Roelse: The black-box Niederreiter algorithm and its implementation over the binary field. Math. Comput. 72(244): 1887-1899 (2003) | |
| 1999 | ||
| 2 | Peter Roelse: Factoring high-degree polynomials over F2 with Niederreiter's algorithm on the IBM SP2. Math. Comput. 68(226): 869-880 (1999) | |
| 1998 | ||
| 1 | Christof Paar, Peter Fleischmann, Peter Roelse: Efficient Multiplier Architectures for Galois Fields GF(2 4n). IEEE Trans. Computers 47(2): 162-170 (1998) | |
| 1 | Peter Fleischmann | [1] [3] |
| 2 | Markus Chr. Holder | [3] |
| 3 | Bart Kirkels | [5] |
| 4 | Martijn Maas | [5] |
| 5 | Christof Paar | [1] |