2007 | ||
---|---|---|
5 | EE | Bart Kirkels, Martijn Maas, Peter Roelse: A security architecture for pay-per-view business models in conditional access systems. Digital Rights Management Workshop 2007: 1-9 |
4 | EE | Peter Roelse: The design of composite permutations with applications to DES-like S-boxes. Des. Codes Cryptography 42(1): 21-42 (2007) |
2003 | ||
3 | Peter Fleischmann, Markus Chr. Holder, Peter Roelse: The black-box Niederreiter algorithm and its implementation over the binary field. Math. Comput. 72(244): 1887-1899 (2003) | |
1999 | ||
2 | Peter Roelse: Factoring high-degree polynomials over F2 with Niederreiter's algorithm on the IBM SP2. Math. Comput. 68(226): 869-880 (1999) | |
1998 | ||
1 | Christof Paar, Peter Fleischmann, Peter Roelse: Efficient Multiplier Architectures for Galois Fields GF(2 4n). IEEE Trans. Computers 47(2): 162-170 (1998) |
1 | Peter Fleischmann | [1] [3] |
2 | Markus Chr. Holder | [3] |
3 | Bart Kirkels | [5] |
4 | Martijn Maas | [5] |
5 | Christof Paar | [1] |