Computational commutative algebra 1 M Kreuzer, L Robbiano Springer Verlag, 2000 | 1114 | 2000 |
Cayley-Bacharach schemes and their canonical modules AV Geramita, M Kreuzer, L Robbiano Transactions of the American Mathematical Society 339 (1), 163-189, 1993 | 151 | 1993 |
Computing ideals of points J Abbott, A Bigatti, M Kreuzer, L Robbiano Journal of Symbolic Computation 30 (4), 341-356, 2000 | 123 | 2000 |
A fault attack on the LED block cipher P Jovanovic, M Kreuzer, I Polian Constructive Side-Channel Analysis and Secure Design: Third International …, 2012 | 90 | 2012 |
Approximate computation of zero-dimensional polynomial ideals D Heldt, M Kreuzer, S Pokutta, H Poulisse Journal of Symbolic Computation 44 (11), 1566-1591, 2009 | 90 | 2009 |
Characterizations of border bases A Kehrein, M Kreuzer Journal of Pure and Applied Algebra 196 (2-3), 251-270, 2005 | 82 | 2005 |
Computing border bases A Kehrein, M Kreuzer Journal of Pure and Applied Algebra 205 (2), 279-295, 2006 | 73 | 2006 |
An algebraist’s view on border bases A Kehrein, M Kreuzer, L Robbiano Solving Polynomial Equations: Foundations, Algorithms, and Applications, 169-202, 2005 | 65 | 2005 |
Logik für Informatiker M Kreuzer, S Kühling Pearson Studium, 2006 | 57 | 2006 |
Computational linear and commutative algebra M Kreuzer, L Robbiano Springer, 2016 | 56 | 2016 |
A course in mathematical cryptography G Baumslag, B Fine, M Kreuzer, G Rosenberger Walter de Gruyter GmbH & Co KG, 2015 | 53 | 2015 |
Efficiently computing minimal sets of critical pairs M Caboara, M Kreuzer, L Robbiano Journal of Symbolic Computation 38 (4), 1169-1190, 2004 | 49 | 2004 |
An algebraic fault attack on the LED block cipher P Jovanovic, M Kreuzer, I Polian Cryptology ePrint Archive, 2012 | 48 | 2012 |
Computing zero-dimensional schemes J Abbott, M Kreuzer, L Robbiano Journal of Symbolic Computation 39 (1), 31-49, 2005 | 44 | 2005 |
Algebraic attacks using SAT-solvers P Jovanovic, M Kreuzer Walter de Gruyter GmbH & Co. KG 2 (2), 247-259, 2010 | 43 | 2010 |
On the canonical module of a 0-dimensional scheme M Kreuzer Canadian Journal of Mathematics 46 (2), 357-379, 1994 | 41 | 1994 |
Solving polynomial equations: foundations, algorithms, and applications (algorithms and computation in mathematics) E Cattani, DA Cox, G Chèze, A Dickenstein, M Elkadi, IZ Emiris, A Galligo, ... Springer-Verlag, 2005 | 39 | 2005 |
Gröbner basis cryptosystems P Ackermann, M Kreuzer Applicable Algebra in Engineering, Communication and Computing 17, 173-194, 2006 | 36 | 2006 |
Traces in strict Frobenius algebras and strict complete intersections. E Kunz, M Kreuzer Walter de Gruyter, Berlin/New York 1987 (381), 181-204, 1987 | 36 | 1987 |
Autofault: towards automatic construction of algebraic fault attacks J Burchard, M Gay, ASM Ekossono, J Horáček, B Becker, T Schubert, ... 2017 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 65-72, 2017 | 32 | 2017 |