[{"publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783540406631","9783540451266"]},"publication_status":"published","year":"2003","place":"Berlin, Heidelberg","page":"162-181","citation":{"ieee":"J. Blömer and J.-P. Seifert, “Fault Based Cryptanalysis of the Advanced Encryption Standard (AES),” in <i>Financial Cryptography</i>, Berlin, Heidelberg: Springer Berlin Heidelberg, 2003, pp. 162–181.","chicago":"Blömer, Johannes, and Jean-Pierre Seifert. “Fault Based Cryptanalysis of the Advanced Encryption Standard (AES).” In <i>Financial Cryptography</i>, 162–81. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. <a href=\"https://doi.org/10.1007/978-3-540-45126-6_12\">https://doi.org/10.1007/978-3-540-45126-6_12</a>.","ama":"Blömer J, Seifert J-P. Fault Based Cryptanalysis of the Advanced Encryption Standard (AES). In: <i>Financial Cryptography</i>. Berlin, Heidelberg: Springer Berlin Heidelberg; 2003:162-181. doi:<a href=\"https://doi.org/10.1007/978-3-540-45126-6_12\">10.1007/978-3-540-45126-6_12</a>","apa":"Blömer, J., &#38; Seifert, J.-P. (2003). Fault Based Cryptanalysis of the Advanced Encryption Standard (AES). In <i>Financial Cryptography</i> (pp. 162–181). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/978-3-540-45126-6_12\">https://doi.org/10.1007/978-3-540-45126-6_12</a>","bibtex":"@inbook{Blömer_Seifert_2003, place={Berlin, Heidelberg}, title={Fault Based Cryptanalysis of the Advanced Encryption Standard (AES)}, DOI={<a href=\"https://doi.org/10.1007/978-3-540-45126-6_12\">10.1007/978-3-540-45126-6_12</a>}, booktitle={Financial Cryptography}, publisher={Springer Berlin Heidelberg}, author={Blömer, Johannes and Seifert, Jean-Pierre}, year={2003}, pages={162–181} }","short":"J. Blömer, J.-P. Seifert, in: Financial Cryptography, Springer Berlin Heidelberg, Berlin, Heidelberg, 2003, pp. 162–181.","mla":"Blömer, Johannes, and Jean-Pierre Seifert. “Fault Based Cryptanalysis of the Advanced Encryption Standard (AES).” <i>Financial Cryptography</i>, Springer Berlin Heidelberg, 2003, pp. 162–81, doi:<a href=\"https://doi.org/10.1007/978-3-540-45126-6_12\">10.1007/978-3-540-45126-6_12</a>."},"publisher":"Springer Berlin Heidelberg","date_updated":"2022-01-06T06:58:51Z","author":[{"last_name":"Blömer","full_name":"Blömer, Johannes","id":"23","first_name":"Johannes"},{"first_name":"Jean-Pierre","last_name":"Seifert","full_name":"Seifert, Jean-Pierre"}],"date_created":"2018-06-05T08:25:18Z","title":"Fault Based Cryptanalysis of the Advanced Encryption Standard (AES)","doi":"10.1007/978-3-540-45126-6_12","publication":"Financial Cryptography","type":"book_chapter","status":"public","_id":"3018","department":[{"_id":"64"}],"user_id":"25078"},{"department":[{"_id":"34"},{"_id":"64"}],"author":[{"first_name":"Matthias","full_name":"Ernst, Matthias","last_name":"Ernst"}],"date_created":"2023-10-05T13:33:11Z","user_id":"41047","_id":"47641","date_updated":"2023-10-05T13:39:01Z","language":[{"iso":"ger"}],"title":"Asymptotische Optimalität von LZ77 bei beschränktem Speicher","type":"bachelorsthesis","status":"public","citation":{"short":"M. Ernst, Asymptotische Optimalität von LZ77 bei beschränktem Speicher, 2003.","mla":"Ernst, Matthias. <i>Asymptotische Optimalität von LZ77 bei beschränktem Speicher</i>. 2003.","bibtex":"@book{Ernst_2003, title={Asymptotische Optimalität von LZ77 bei beschränktem Speicher}, author={Ernst, Matthias}, year={2003} }","apa":"Ernst, M. (2003). <i>Asymptotische Optimalität von LZ77 bei beschränktem Speicher</i>.","chicago":"Ernst, Matthias. <i>Asymptotische Optimalität von LZ77 bei beschränktem Speicher</i>, 2003.","ieee":"M. Ernst, <i>Asymptotische Optimalität von LZ77 bei beschränktem Speicher</i>. 2003.","ama":"Ernst M. <i>Asymptotische Optimalität von LZ77 bei beschränktem Speicher</i>.; 2003."},"year":"2003"},{"status":"public","type":"bachelorsthesis","language":[{"iso":"ger"}],"department":[{"_id":"34"},{"_id":"64"}],"user_id":"41047","_id":"47635","citation":{"ieee":"K. Voß, <i>Asymptotische Optimalität von Lempel-Ziv bei Markowprozessen</i>. 2003.","chicago":"Voß, Kerstin. <i>Asymptotische Optimalität von Lempel-Ziv bei Markowprozessen</i>, 2003.","ama":"Voß K. <i>Asymptotische Optimalität von Lempel-Ziv bei Markowprozessen</i>.; 2003.","short":"K. Voß, Asymptotische Optimalität von Lempel-Ziv bei Markowprozessen, 2003.","bibtex":"@book{Voß_2003, title={Asymptotische Optimalität von Lempel-Ziv bei Markowprozessen}, author={Voß, Kerstin}, year={2003} }","mla":"Voß, Kerstin. <i>Asymptotische Optimalität von Lempel-Ziv bei Markowprozessen</i>. 2003.","apa":"Voß, K. (2003). <i>Asymptotische Optimalität von Lempel-Ziv bei Markowprozessen</i>."},"year":"2003","title":"Asymptotische Optimalität von Lempel-Ziv bei Markowprozessen","date_created":"2023-10-05T13:30:48Z","author":[{"full_name":"Voß, Kerstin","last_name":"Voß","first_name":"Kerstin"}],"date_updated":"2023-10-05T13:39:08Z"},{"has_accepted_license":"1","year":"2003","citation":{"mla":"Hoppe, Ulrich. <i>Markovprozesse zur Modellierung bei Codekompression</i>. 2003.","bibtex":"@book{Hoppe_2003, title={Markovprozesse zur Modellierung bei Codekompression}, author={Hoppe, Ulrich}, year={2003} }","short":"U. Hoppe, Markovprozesse zur Modellierung bei Codekompression, 2003.","apa":"Hoppe, U. (2003). <i>Markovprozesse zur Modellierung bei Codekompression</i>.","chicago":"Hoppe, Ulrich. <i>Markovprozesse zur Modellierung bei Codekompression</i>, 2003.","ieee":"U. Hoppe, <i>Markovprozesse zur Modellierung bei Codekompression</i>. 2003.","ama":"Hoppe U. <i>Markovprozesse zur Modellierung bei Codekompression</i>.; 2003."},"date_updated":"2023-10-05T16:54:38Z","oa":"1","date_created":"2023-10-05T16:38:19Z","author":[{"first_name":"Ulrich","full_name":"Hoppe, Ulrich","last_name":"Hoppe"}],"title":"Markovprozesse zur Modellierung bei Codekompression","type":"misc","status":"public","file":[{"date_updated":"2023-10-05T16:54:38Z","creator":"bhenrik","date_created":"2023-10-05T16:38:12Z","file_size":1902248,"file_name":"2003_Hoppe_MarkowprozesseZurModellierungBeiCodekompression.ps","file_id":"47724","access_level":"open_access","content_type":"application/postscript","relation":"main_file"}],"_id":"47696","department":[{"_id":"34"},{"_id":"64"}],"user_id":"41047","keyword":["Diplomarbeit"],"ddc":["000"],"language":[{"iso":"ger"}],"file_date_updated":"2023-10-05T16:54:38Z"},{"date_updated":"2023-10-05T22:08:27Z","oa":"1","author":[{"full_name":"Unterkirchner, Claudia","last_name":"Unterkirchner","first_name":"Claudia"}],"date_created":"2023-10-05T13:31:16Z","title":"Implementierung eines arithmetischen Dekodierers in Java","has_accepted_license":"1","year":"2003","citation":{"ieee":"C. Unterkirchner, <i>Implementierung eines arithmetischen Dekodierers in Java</i>. 2003.","chicago":"Unterkirchner, Claudia. <i>Implementierung eines arithmetischen Dekodierers in Java</i>, 2003.","ama":"Unterkirchner C. <i>Implementierung eines arithmetischen Dekodierers in Java</i>.; 2003.","apa":"Unterkirchner, C. (2003). <i>Implementierung eines arithmetischen Dekodierers in Java</i>.","mla":"Unterkirchner, Claudia. <i>Implementierung eines arithmetischen Dekodierers in Java</i>. 2003.","short":"C. Unterkirchner, Implementierung eines arithmetischen Dekodierers in Java, 2003.","bibtex":"@book{Unterkirchner_2003, title={Implementierung eines arithmetischen Dekodierers in Java}, author={Unterkirchner, Claudia}, year={2003} }"},"_id":"47636","department":[{"_id":"34"},{"_id":"64"}],"user_id":"41047","ddc":["000"],"file_date_updated":"2023-10-05T22:08:27Z","language":[{"iso":"ger"}],"type":"bachelorsthesis","status":"public","file":[{"content_type":"application/pdf","relation":"main_file","date_updated":"2023-10-05T22:08:27Z","date_created":"2023-10-05T22:03:44Z","creator":"bhenrik","file_size":809237,"access_level":"open_access","file_name":"2003_Unterkircher_ImplementierungEinesArithmetischenDekodierersInJava.pdf","file_id":"47787"}]},{"date_updated":"2023-10-05T22:08:52Z","oa":"1","date_created":"2023-10-05T13:32:54Z","author":[{"first_name":"Daniel","last_name":"Kuntze","full_name":"Kuntze, Daniel"}],"title":"Tabellenbasierte arithmetische Codierung","has_accepted_license":"1","year":"2003","citation":{"ama":"Kuntze D. <i>Tabellenbasierte arithmetische Codierung</i>.; 2003.","ieee":"D. Kuntze, <i>Tabellenbasierte arithmetische Codierung</i>. 2003.","chicago":"Kuntze, Daniel. <i>Tabellenbasierte arithmetische Codierung</i>, 2003.","apa":"Kuntze, D. (2003). <i>Tabellenbasierte arithmetische Codierung</i>.","bibtex":"@book{Kuntze_2003, title={Tabellenbasierte arithmetische Codierung}, author={Kuntze, Daniel}, year={2003} }","short":"D. Kuntze, Tabellenbasierte arithmetische Codierung, 2003.","mla":"Kuntze, Daniel. <i>Tabellenbasierte arithmetische Codierung</i>. 2003."},"_id":"47640","user_id":"41047","department":[{"_id":"34"},{"_id":"64"}],"ddc":["000"],"file_date_updated":"2023-10-05T22:08:52Z","language":[{"iso":"ger"}],"type":"bachelorsthesis","file":[{"file_size":304544,"file_name":"2003_Kuntze_TabellenbasierteArithmetischeCodierung.pdf","access_level":"open_access","file_id":"47788","date_updated":"2023-10-05T22:08:52Z","date_created":"2023-10-05T22:04:08Z","creator":"bhenrik","relation":"main_file","content_type":"application/pdf"}],"status":"public"},{"type":"bachelorsthesis","year":"2003","citation":{"apa":"Soltenborn, C. (2003). <i>Kompressionsverlust bei arithmetischer Codierung mit endlicher Präzision</i>.","short":"C. Soltenborn, Kompressionsverlust bei arithmetischer Codierung mit endlicher Präzision, 2003.","bibtex":"@book{Soltenborn_2003, title={Kompressionsverlust bei arithmetischer Codierung mit endlicher Präzision}, author={Soltenborn, Christian}, year={2003} }","mla":"Soltenborn, Christian. <i>Kompressionsverlust bei arithmetischer Codierung mit endlicher Präzision</i>. 2003.","ama":"Soltenborn C. <i>Kompressionsverlust bei arithmetischer Codierung mit endlicher Präzision</i>.; 2003.","ieee":"C. Soltenborn, <i>Kompressionsverlust bei arithmetischer Codierung mit endlicher Präzision</i>. 2003.","chicago":"Soltenborn, Christian. <i>Kompressionsverlust bei arithmetischer Codierung mit endlicher Präzision</i>, 2003."},"status":"public","date_updated":"2023-10-05T13:39:29Z","_id":"47638","date_created":"2023-10-05T13:32:10Z","author":[{"last_name":"Soltenborn","full_name":"Soltenborn, Christian","first_name":"Christian"}],"user_id":"41047","department":[{"_id":"34"},{"_id":"64"}],"title":"Kompressionsverlust bei arithmetischer Codierung mit endlicher Präzision","language":[{"iso":"ger"}]},{"year":"2003","citation":{"apa":"Todtenbier, C. (2003). <i>Implementierung eines arithmetischen Kodierers in Java</i>.","short":"C. Todtenbier, Implementierung eines arithmetischen Kodierers in Java, 2003.","mla":"Todtenbier, Christian. <i>Implementierung eines arithmetischen Kodierers in Java</i>. 2003.","bibtex":"@book{Todtenbier_2003, title={Implementierung eines arithmetischen Kodierers in Java}, author={Todtenbier, Christian}, year={2003} }","chicago":"Todtenbier, Christian. <i>Implementierung eines arithmetischen Kodierers in Java</i>, 2003.","ieee":"C. Todtenbier, <i>Implementierung eines arithmetischen Kodierers in Java</i>. 2003.","ama":"Todtenbier C. <i>Implementierung eines arithmetischen Kodierers in Java</i>.; 2003."},"title":"Implementierung eines arithmetischen Kodierers in Java","date_updated":"2023-10-05T13:39:26Z","date_created":"2023-10-05T13:31:45Z","author":[{"last_name":"Todtenbier","full_name":"Todtenbier, Christian","first_name":"Christian"}],"status":"public","type":"bachelorsthesis","language":[{"iso":"ger"}],"_id":"47637","user_id":"41047","department":[{"_id":"34"},{"_id":"64"}]},{"year":"2003","citation":{"ieee":"M. Ziegler, <i>Fehlerangriffe auf spezielle Implementierungen von RSA</i>. 2003.","chicago":"Ziegler, Max. <i>Fehlerangriffe Auf Spezielle Implementierungen von RSA</i>, 2003.","ama":"Ziegler M. <i>Fehlerangriffe Auf Spezielle Implementierungen von RSA</i>.; 2003.","bibtex":"@book{Ziegler_2003, title={Fehlerangriffe auf spezielle Implementierungen von RSA}, author={Ziegler, Max}, year={2003} }","mla":"Ziegler, Max. <i>Fehlerangriffe Auf Spezielle Implementierungen von RSA</i>. 2003.","short":"M. Ziegler, Fehlerangriffe Auf Spezielle Implementierungen von RSA, 2003.","apa":"Ziegler, M. (2003). <i>Fehlerangriffe auf spezielle Implementierungen von RSA</i>."},"date_updated":"2023-10-05T13:39:11Z","date_created":"2023-10-05T13:30:15Z","author":[{"first_name":"Max","last_name":"Ziegler","full_name":"Ziegler, Max"}],"title":"Fehlerangriffe auf spezielle Implementierungen von RSA","type":"bachelorsthesis","status":"public","_id":"47634","user_id":"41047","department":[{"_id":"34"},{"_id":"64"}],"language":[{"iso":"eng"}]},{"language":[{"iso":"ger"}],"_id":"47639","user_id":"41047","department":[{"_id":"34"},{"_id":"64"}],"status":"public","type":"bachelorsthesis","title":"Verkürzte Huffman-Codierung zur Codekompression","date_updated":"2023-10-05T13:42:10Z","date_created":"2023-10-05T13:32:32Z","author":[{"first_name":"Marvin","last_name":"Lindner","full_name":"Lindner, Marvin"}],"year":"2003","citation":{"apa":"Lindner, M. (2003). <i>Verkürzte Huffman-Codierung zur Codekompression</i>.","short":"M. Lindner, Verkürzte Huffman-Codierung zur Codekompression, 2003.","mla":"Lindner, Marvin. <i>Verkürzte Huffman-Codierung zur Codekompression</i>. 2003.","bibtex":"@book{Lindner_2003, title={Verkürzte Huffman-Codierung zur Codekompression}, author={Lindner, Marvin}, year={2003} }","ama":"Lindner M. <i>Verkürzte Huffman-Codierung zur Codekompression</i>.; 2003.","chicago":"Lindner, Marvin. <i>Verkürzte Huffman-Codierung zur Codekompression</i>, 2003.","ieee":"M. Lindner, <i>Verkürzte Huffman-Codierung zur Codekompression</i>. 2003."}},{"year":"2003","citation":{"ama":"Ackermann MR. <i>Tabellenbasierte arithmetische Kodierung bei allgemeinen Alphabeten</i>.; 2003.","chicago":"Ackermann, Marcel R. <i>Tabellenbasierte arithmetische Kodierung bei allgemeinen Alphabeten</i>, 2003.","ieee":"M. R. Ackermann, <i>Tabellenbasierte arithmetische Kodierung bei allgemeinen Alphabeten</i>. 2003.","short":"M.R. Ackermann, Tabellenbasierte arithmetische Kodierung bei allgemeinen Alphabeten, 2003.","mla":"Ackermann, Marcel R. <i>Tabellenbasierte arithmetische Kodierung bei allgemeinen Alphabeten</i>. 2003.","bibtex":"@book{Ackermann_2003, title={Tabellenbasierte arithmetische Kodierung bei allgemeinen Alphabeten}, author={Ackermann, Marcel R.}, year={2003} }","apa":"Ackermann, M. R. (2003). <i>Tabellenbasierte arithmetische Kodierung bei allgemeinen Alphabeten</i>."},"has_accepted_license":"1","title":"Tabellenbasierte arithmetische Kodierung bei allgemeinen Alphabeten","oa":"1","date_updated":"2023-10-05T16:54:32Z","author":[{"first_name":"Marcel R.","full_name":"Ackermann, Marcel R.","last_name":"Ackermann"}],"date_created":"2023-10-05T16:37:47Z","status":"public","file":[{"content_type":"application/postscript","relation":"main_file","date_created":"2023-10-05T16:37:41Z","creator":"bhenrik","date_updated":"2023-10-05T16:54:32Z","access_level":"open_access","file_id":"47722","file_name":"2003_Ackermann_TabellenbasierteArithmetischeKodierungBeiAllgemeinenAlphabeten.ps","file_size":8764824}],"type":"misc","keyword":["Diplomarbeit"],"ddc":["000"],"file_date_updated":"2023-10-05T16:54:32Z","language":[{"iso":"ger"}],"_id":"47695","department":[{"_id":"34"},{"_id":"64"}],"user_id":"41047"},{"publication":"IEEE Transactions on Information Theory","file":[{"content_type":"application/pdf","success":1,"relation":"main_file","date_updated":"2018-06-05T08:37:48Z","creator":"feidens","date_created":"2018-06-05T08:37:48Z","file_size":260143,"access_level":"closed","file_id":"3035","file_name":"pet.pdf"}],"ddc":["000"],"issue":"6","year":"2002","publisher":"Institute of Electrical and Electronics Engineers (IEEE)","date_created":"2018-06-05T08:36:14Z","title":"Priority encoding transmission","type":"journal_article","status":"public","_id":"3034","user_id":"25078","department":[{"_id":"64"}],"file_date_updated":"2018-06-05T08:37:48Z","extern":"1","publication_status":"published","has_accepted_license":"1","publication_identifier":{"issn":["0018-9448"]},"citation":{"ama":"Albanese A, Blömer J, Edmonds J, Luby M, Sudan M. Priority encoding transmission. <i>IEEE Transactions on Information Theory</i>. 2002;42(6):1737-1744. doi:<a href=\"https://doi.org/10.1109/18.556670\">10.1109/18.556670</a>","chicago":"Albanese, Andres, Johannes Blömer, Jeff Edmonds, Michael Luby, and Madhu Sudan. “Priority Encoding Transmission.” <i>IEEE Transactions on Information Theory</i> 42, no. 6 (2002): 1737–44. <a href=\"https://doi.org/10.1109/18.556670\">https://doi.org/10.1109/18.556670</a>.","ieee":"A. Albanese, J. Blömer, J. Edmonds, M. Luby, and M. Sudan, “Priority encoding transmission,” <i>IEEE Transactions on Information Theory</i>, vol. 42, no. 6, pp. 1737–1744, 2002.","mla":"Albanese, Andres, et al. “Priority Encoding Transmission.” <i>IEEE Transactions on Information Theory</i>, vol. 42, no. 6, Institute of Electrical and Electronics Engineers (IEEE), 2002, pp. 1737–44, doi:<a href=\"https://doi.org/10.1109/18.556670\">10.1109/18.556670</a>.","bibtex":"@article{Albanese_Blömer_Edmonds_Luby_Sudan_2002, title={Priority encoding transmission}, volume={42}, DOI={<a href=\"https://doi.org/10.1109/18.556670\">10.1109/18.556670</a>}, number={6}, journal={IEEE Transactions on Information Theory}, publisher={Institute of Electrical and Electronics Engineers (IEEE)}, author={Albanese, Andres and Blömer, Johannes and Edmonds, Jeff and Luby, Michael and Sudan, Madhu}, year={2002}, pages={1737–1744} }","short":"A. Albanese, J. Blömer, J. Edmonds, M. Luby, M. Sudan, IEEE Transactions on Information Theory 42 (2002) 1737–1744.","apa":"Albanese, A., Blömer, J., Edmonds, J., Luby, M., &#38; Sudan, M. (2002). Priority encoding transmission. <i>IEEE Transactions on Information Theory</i>, <i>42</i>(6), 1737–1744. <a href=\"https://doi.org/10.1109/18.556670\">https://doi.org/10.1109/18.556670</a>"},"intvolume":"        42","page":"1737-1744","date_updated":"2022-01-06T06:58:53Z","author":[{"last_name":"Albanese","full_name":"Albanese, Andres","first_name":"Andres"},{"first_name":"Johannes","full_name":"Blömer, Johannes","id":"23","last_name":"Blömer"},{"first_name":"Jeff","full_name":"Edmonds, Jeff","last_name":"Edmonds"},{"full_name":"Luby, Michael","last_name":"Luby","first_name":"Michael"},{"full_name":"Sudan, Madhu","last_name":"Sudan","first_name":"Madhu"}],"volume":42,"doi":"10.1109/18.556670"},{"publication_identifier":{"isbn":["0818665807"]},"publication_status":"published","citation":{"ama":"Albanese A, Blömer J, Edmonds J, Luby M, Sudan M. Priority encoding transmission. In: <i>Proceedings 35th Annual Symposium on Foundations of Computer Science</i>. IEEE Comput. Soc. Press; 2002. doi:<a href=\"https://doi.org/10.1109/sfcs.1994.365731\">10.1109/sfcs.1994.365731</a>","ieee":"A. Albanese, J. Blömer, J. Edmonds, M. Luby, and M. Sudan, “Priority encoding transmission,” in <i>Proceedings 35th Annual Symposium on Foundations of Computer Science</i>, 2002.","chicago":"Albanese, A., Johannes Blömer, J. Edmonds, M. Luby, and M. Sudan. “Priority Encoding Transmission.” In <i>Proceedings 35th Annual Symposium on Foundations of Computer Science</i>. IEEE Comput. Soc. Press, 2002. <a href=\"https://doi.org/10.1109/sfcs.1994.365731\">https://doi.org/10.1109/sfcs.1994.365731</a>.","apa":"Albanese, A., Blömer, J., Edmonds, J., Luby, M., &#38; Sudan, M. (2002). Priority encoding transmission. In <i>Proceedings 35th Annual Symposium on Foundations of Computer Science</i>. IEEE Comput. Soc. Press. <a href=\"https://doi.org/10.1109/sfcs.1994.365731\">https://doi.org/10.1109/sfcs.1994.365731</a>","bibtex":"@inproceedings{Albanese_Blömer_Edmonds_Luby_Sudan_2002, title={Priority encoding transmission}, DOI={<a href=\"https://doi.org/10.1109/sfcs.1994.365731\">10.1109/sfcs.1994.365731</a>}, booktitle={Proceedings 35th Annual Symposium on Foundations of Computer Science}, publisher={IEEE Comput. Soc. Press}, author={Albanese, A. and Blömer, Johannes and Edmonds, J. and Luby, M. and Sudan, M.}, year={2002} }","mla":"Albanese, A., et al. “Priority Encoding Transmission.” <i>Proceedings 35th Annual Symposium on Foundations of Computer Science</i>, IEEE Comput. Soc. Press, 2002, doi:<a href=\"https://doi.org/10.1109/sfcs.1994.365731\">10.1109/sfcs.1994.365731</a>.","short":"A. Albanese, J. Blömer, J. Edmonds, M. Luby, M. Sudan, in: Proceedings 35th Annual Symposium on Foundations of Computer Science, IEEE Comput. Soc. Press, 2002."},"year":"2002","author":[{"first_name":"A.","last_name":"Albanese","full_name":"Albanese, A."},{"id":"23","full_name":"Blömer, Johannes","last_name":"Blömer","first_name":"Johannes"},{"last_name":"Edmonds","full_name":"Edmonds, J.","first_name":"J."},{"last_name":"Luby","full_name":"Luby, M.","first_name":"M."},{"first_name":"M.","last_name":"Sudan","full_name":"Sudan, M."}],"date_created":"2018-06-05T08:43:13Z","date_updated":"2022-01-06T06:58:53Z","publisher":"IEEE Comput. Soc. Press","doi":"10.1109/sfcs.1994.365731","title":"Priority encoding transmission","publication":"Proceedings 35th Annual Symposium on Foundations of Computer Science","type":"conference","status":"public","department":[{"_id":"64"}],"user_id":"25078","_id":"3040","extern":"1"},{"doi":"10.1109/sfcs.1991.185434","title":"Computing sums of radicals in polynomial time","author":[{"first_name":"Johannes","last_name":"Blömer","id":"23","full_name":"Blömer, Johannes"}],"date_created":"2018-06-05T08:44:18Z","publisher":"IEEE Comput. Soc. Press","date_updated":"2023-01-10T13:49:25Z","citation":{"chicago":"Blömer, Johannes. “Computing Sums of Radicals in Polynomial Time.” In <i>[1991] Proceedings 32nd Annual Symposium of Foundations of Computer Science</i>. IEEE Comput. Soc. Press, 2002. <a href=\"https://doi.org/10.1109/sfcs.1991.185434\">https://doi.org/10.1109/sfcs.1991.185434</a>.","ieee":"J. Blömer, “Computing sums of radicals in polynomial time,” 2002, doi: <a href=\"https://doi.org/10.1109/sfcs.1991.185434\">10.1109/sfcs.1991.185434</a>.","ama":"Blömer J. Computing sums of radicals in polynomial time. In: <i>[1991] Proceedings 32nd Annual Symposium of Foundations of Computer Science</i>. IEEE Comput. Soc. Press; 2002. doi:<a href=\"https://doi.org/10.1109/sfcs.1991.185434\">10.1109/sfcs.1991.185434</a>","bibtex":"@inproceedings{Blömer_2002, title={Computing sums of radicals in polynomial time}, DOI={<a href=\"https://doi.org/10.1109/sfcs.1991.185434\">10.1109/sfcs.1991.185434</a>}, booktitle={[1991] Proceedings 32nd Annual Symposium of Foundations of Computer Science}, publisher={IEEE Comput. Soc. Press}, author={Blömer, Johannes}, year={2002} }","mla":"Blömer, Johannes. “Computing Sums of Radicals in Polynomial Time.” <i>[1991] Proceedings 32nd Annual Symposium of Foundations of Computer Science</i>, IEEE Comput. Soc. Press, 2002, doi:<a href=\"https://doi.org/10.1109/sfcs.1991.185434\">10.1109/sfcs.1991.185434</a>.","short":"J. Blömer, in: [1991] Proceedings 32nd Annual Symposium of Foundations of Computer Science, IEEE Comput. Soc. Press, 2002.","apa":"Blömer, J. (2002). Computing sums of radicals in polynomial time. <i>[1991] Proceedings 32nd Annual Symposium of Foundations of Computer Science</i>. <a href=\"https://doi.org/10.1109/sfcs.1991.185434\">https://doi.org/10.1109/sfcs.1991.185434</a>"},"year":"2002","publication_identifier":{"isbn":["0818624450"]},"has_accepted_license":"1","publication_status":"published","file_date_updated":"2018-06-05T08:45:15Z","extern":"1","ddc":["000"],"department":[{"_id":"64"}],"user_id":"25078","_id":"3041","status":"public","file":[{"date_updated":"2018-06-05T08:45:15Z","creator":"feidens","date_created":"2018-06-05T08:45:15Z","file_size":335754,"file_id":"3042","access_level":"closed","file_name":"ComputingSumsOfRadicals_01.pdf","content_type":"application/pdf","success":1,"relation":"main_file"}],"publication":"[1991] Proceedings 32nd Annual Symposium of Foundations of Computer Science","type":"conference"},{"keyword":["Applied Mathematics","Computer Science Applications","General Computer Science"],"language":[{"iso":"eng"}],"publication":"Algorithmica","publisher":"Springer Science and Business Media LLC","date_created":"2023-01-10T13:44:28Z","title":"Denesting by Bounded Degree Radicals","issue":"1","year":"2002","_id":"35857","user_id":"23","department":[{"_id":"64"}],"type":"journal_article","status":"public","date_updated":"2023-01-10T13:48:53Z","author":[{"last_name":"Blömer","full_name":"Blömer, J.","first_name":"J."}],"volume":28,"doi":"10.1007/s004530010028","publication_status":"published","publication_identifier":{"issn":["0178-4617","1432-0541"]},"citation":{"ama":"Blömer J. Denesting by Bounded Degree Radicals. <i>Algorithmica</i>. 2002;28(1):2-15. doi:<a href=\"https://doi.org/10.1007/s004530010028\">10.1007/s004530010028</a>","chicago":"Blömer, J. “Denesting by Bounded Degree Radicals.” <i>Algorithmica</i> 28, no. 1 (2002): 2–15. <a href=\"https://doi.org/10.1007/s004530010028\">https://doi.org/10.1007/s004530010028</a>.","ieee":"J. Blömer, “Denesting by Bounded Degree Radicals,” <i>Algorithmica</i>, vol. 28, no. 1, pp. 2–15, 2002, doi: <a href=\"https://doi.org/10.1007/s004530010028\">10.1007/s004530010028</a>.","apa":"Blömer, J. (2002). Denesting by Bounded Degree Radicals. <i>Algorithmica</i>, <i>28</i>(1), 2–15. <a href=\"https://doi.org/10.1007/s004530010028\">https://doi.org/10.1007/s004530010028</a>","mla":"Blömer, J. “Denesting by Bounded Degree Radicals.” <i>Algorithmica</i>, vol. 28, no. 1, Springer Science and Business Media LLC, 2002, pp. 2–15, doi:<a href=\"https://doi.org/10.1007/s004530010028\">10.1007/s004530010028</a>.","short":"J. Blömer, Algorithmica 28 (2002) 2–15.","bibtex":"@article{Blömer_2002, title={Denesting by Bounded Degree Radicals}, volume={28}, DOI={<a href=\"https://doi.org/10.1007/s004530010028\">10.1007/s004530010028</a>}, number={1}, journal={Algorithmica}, publisher={Springer Science and Business Media LLC}, author={Blömer, J.}, year={2002}, pages={2–15} }"},"intvolume":"        28","page":"2-15"},{"status":"public","file":[{"date_updated":"2023-10-05T16:54:44Z","creator":"bhenrik","date_created":"2023-10-05T16:39:26Z","file_size":3696785,"access_level":"open_access","file_id":"47726","file_name":"2002_Fricke_Pseudorandom.ps","content_type":"application/postscript","relation":"main_file"}],"type":"misc","keyword":["Diplomarbeit"],"ddc":["000"],"file_date_updated":"2023-10-05T16:54:44Z","language":[{"iso":"eng"}],"_id":"47698","department":[{"_id":"34"},{"_id":"64"}],"user_id":"41047","year":"2002","citation":{"ieee":"B. Fricke, <i>Construction of Pseudorandom Functions</i>. 2002.","chicago":"Fricke, Birgitta. <i>Construction of Pseudorandom Functions</i>, 2002.","ama":"Fricke B. <i>Construction of Pseudorandom Functions</i>.; 2002.","mla":"Fricke, Birgitta. <i>Construction of Pseudorandom Functions</i>. 2002.","short":"B. Fricke, Construction of Pseudorandom Functions, 2002.","bibtex":"@book{Fricke_2002, title={Construction of Pseudorandom Functions}, author={Fricke, Birgitta}, year={2002} }","apa":"Fricke, B. (2002). <i>Construction of Pseudorandom Functions</i>."},"has_accepted_license":"1","title":"Construction of Pseudorandom Functions","oa":"1","date_updated":"2023-10-05T16:54:44Z","author":[{"first_name":"Birgitta","full_name":"Fricke, Birgitta","last_name":"Fricke"}],"date_created":"2023-10-05T16:39:34Z"},{"date_updated":"2023-10-05T16:42:39Z","author":[{"first_name":"Deniz","full_name":"Deveci, Deniz","last_name":"Deveci"}],"date_created":"2023-10-05T16:38:45Z","title":"Evaluierung und Implementierung eines vollständig verteilten RSA-Kryptographiesystems","year":"2002","citation":{"apa":"Deveci, D. (2002). <i>Evaluierung und Implementierung eines vollständig verteilten RSA-Kryptographiesystems</i>.","short":"D. Deveci, Evaluierung und Implementierung eines vollständig verteilten RSA-Kryptographiesystems, 2002.","bibtex":"@book{Deveci_2002, title={Evaluierung und Implementierung eines vollständig verteilten RSA-Kryptographiesystems}, author={Deveci, Deniz}, year={2002} }","mla":"Deveci, Deniz. <i>Evaluierung und Implementierung eines vollständig verteilten RSA-Kryptographiesystems</i>. 2002.","chicago":"Deveci, Deniz. <i>Evaluierung und Implementierung eines vollständig verteilten RSA-Kryptographiesystems</i>, 2002.","ieee":"D. Deveci, <i>Evaluierung und Implementierung eines vollständig verteilten RSA-Kryptographiesystems</i>. 2002.","ama":"Deveci D. <i>Evaluierung und Implementierung eines vollständig verteilten RSA-Kryptographiesystems</i>.; 2002."},"_id":"47697","department":[{"_id":"34"},{"_id":"64"}],"user_id":"41047","keyword":["Diplomarbeit"],"language":[{"iso":"ger"}],"type":"misc","status":"public"},{"type":"misc","status":"public","department":[{"_id":"34"},{"_id":"64"}],"user_id":"41047","_id":"47699","language":[{"iso":"eng"}],"keyword":["Diplomarbeit"],"citation":{"apa":"Helbich, A. (2002). <i>The Weil-Pairing and Signature Schemes in Elliptic Curve Cryptography</i>.","short":"A. Helbich, The Weil-Pairing and Signature Schemes in Elliptic Curve Cryptography, 2002.","bibtex":"@book{Helbich_2002, title={The Weil-Pairing and Signature Schemes in Elliptic Curve Cryptography}, author={Helbich, Anke}, year={2002} }","mla":"Helbich, Anke. <i>The Weil-Pairing and Signature Schemes in Elliptic Curve Cryptography</i>. 2002.","chicago":"Helbich, Anke. <i>The Weil-Pairing and Signature Schemes in Elliptic Curve Cryptography</i>, 2002.","ieee":"A. Helbich, <i>The Weil-Pairing and Signature Schemes in Elliptic Curve Cryptography</i>. 2002.","ama":"Helbich A. <i>The Weil-Pairing and Signature Schemes in Elliptic Curve Cryptography</i>.; 2002."},"year":"2002","date_created":"2023-10-05T16:40:05Z","author":[{"first_name":"Anke","last_name":"Helbich","full_name":"Helbich, Anke"}],"date_updated":"2023-10-05T16:42:35Z","title":"The Weil-Pairing and Signature Schemes in Elliptic Curve Cryptography"},{"status":"public","type":"misc","language":[{"iso":"eng"}],"keyword":["Diplomarbeit"],"department":[{"_id":"34"},{"_id":"64"}],"user_id":"41047","_id":"47700","citation":{"apa":"Schepers, D. (2002). <i>Timing Attacks for Cryptosystems based on Elliptic Curves</i>.","mla":"Schepers, Daniel. <i>Timing Attacks for Cryptosystems Based on Elliptic Curves</i>. 2002.","short":"D. Schepers, Timing Attacks for Cryptosystems Based on Elliptic Curves, 2002.","bibtex":"@book{Schepers_2002, title={Timing Attacks for Cryptosystems based on Elliptic Curves}, author={Schepers, Daniel}, year={2002} }","ama":"Schepers D. <i>Timing Attacks for Cryptosystems Based on Elliptic Curves</i>.; 2002.","chicago":"Schepers, Daniel. <i>Timing Attacks for Cryptosystems Based on Elliptic Curves</i>, 2002.","ieee":"D. Schepers, <i>Timing Attacks for Cryptosystems based on Elliptic Curves</i>. 2002."},"year":"2002","title":"Timing Attacks for Cryptosystems based on Elliptic Curves","author":[{"full_name":"Schepers, Daniel","last_name":"Schepers","first_name":"Daniel"}],"date_created":"2023-10-05T16:41:01Z","date_updated":"2023-10-05T16:42:34Z"},{"_id":"47633","user_id":"41047","department":[{"_id":"34"},{"_id":"64"}],"ddc":["000"],"language":[{"iso":"ger"}],"file_date_updated":"2023-10-05T22:02:59Z","type":"bachelorsthesis","file":[{"file_size":361052,"access_level":"open_access","file_name":"2002_Hoppe_MDS-Codes.ps","file_id":"47786","date_updated":"2023-10-05T22:02:59Z","creator":"bhenrik","date_created":"2023-10-05T22:02:59Z","relation":"main_file","content_type":"application/postscript"}],"status":"public","oa":"1","date_updated":"2023-10-05T22:03:17Z","author":[{"first_name":"Ulrich","full_name":"Hoppe, Ulrich","last_name":"Hoppe"}],"date_created":"2023-10-05T13:29:41Z","title":"Implementierung und Evaluation eines MDS-Blockcodes mit unabhängigen Paritätssymbolen","has_accepted_license":"1","year":"2002","citation":{"chicago":"Hoppe, Ulrich. <i>Implementierung und Evaluation eines MDS-Blockcodes mit unabhängigen Paritätssymbolen</i>, 2002.","ieee":"U. Hoppe, <i>Implementierung und Evaluation eines MDS-Blockcodes mit unabhängigen Paritätssymbolen</i>. 2002.","ama":"Hoppe U. <i>Implementierung und Evaluation eines MDS-Blockcodes mit unabhängigen Paritätssymbolen</i>.; 2002.","apa":"Hoppe, U. (2002). <i>Implementierung und Evaluation eines MDS-Blockcodes mit unabhängigen Paritätssymbolen</i>.","short":"U. Hoppe, Implementierung und Evaluation eines MDS-Blockcodes mit unabhängigen Paritätssymbolen, 2002.","mla":"Hoppe, Ulrich. <i>Implementierung und Evaluation eines MDS-Blockcodes mit unabhängigen Paritätssymbolen</i>. 2002.","bibtex":"@book{Hoppe_2002, title={Implementierung und Evaluation eines MDS-Blockcodes mit unabhängigen Paritätssymbolen}, author={Hoppe, Ulrich}, year={2002} }"}}]
