Florian Hess

Orcid: 0000-0002-4529-0932

According to our database1, Florian Hess authored at least 25 papers between 2001 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Out-of-Domain Generalization in Dynamical Systems Reconstruction.
CoRR, 2024

2023
Generalized Teacher Forcing for Learning Chaotic Dynamics.
Proceedings of the International Conference on Machine Learning, 2023

2022
Tractable Dendritic RNNs for Reconstructing Nonlinear Dynamical Systems.
Proceedings of the International Conference on Machine Learning, 2022

2016
Combined schemes for signature and encryption: The public-key and the identity-based setting.
Inf. Comput., 2016

2013
3D Analysis of the Proximal Interphalangeal Joint Kinematics during Flexion.
Comput. Math. Methods Medicine, 2013

2012
Generalised Jacobians in Cryptography and Coding Theory.
Proceedings of the Arithmetic of Finite Fields - 4th International Workshop, 2012

2009
Optimised Versions of the Ate and Twisted Ate Pairings.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

2008
Aspects of Pairing Inversion.
IEEE Trans. Inf. Theory, 2008

Combined (identity-based) public key schemes.
IACR Cryptol. ePrint Arch., 2008

Pairing Lattices.
IACR Cryptol. ePrint Arch., 2008

2007
Hyperelliptic Pairings.
Proceedings of the Pairing-Based Cryptography, 2007

Ate Pairing on Hyperelliptic Curves.
Proceedings of the Advances in Cryptology, 2007

2006
The Eta Pairing Revisited.
IEEE Trans. Inf. Theory, 2006

2005
On the Linear Complexity and Multidimensional Distribution of Congruential Generators over Elliptic Curves.
Des. Codes Cryptogr., 2005

2004
On the security of the verifiably-encrypted signature scheme of Boneh, Gentry, Lynn and Shacham.
Inf. Process. Lett., 2004

An Algorithm for Computing Isomorphisms of Algebraic Function Fields.
Proceedings of the Algorithmic Number Theory, 6th International Symposium, 2004

2003
Computing the multiplicative group of residue class rings.
Math. Comput., 2003

The GHS Attack Revisited.
Proceedings of the Advances in Cryptology, 2003

2002
Computing Riemann-Roch Spaces in Algebraic Function Fields and Related Topics.
J. Symb. Comput., 2002

Constructive and Destructive Facets of Weil Descent on Elliptic Curves.
J. Cryptol., 2002

Exponent Group Signature Schemes and Efficient Identity Based Signature Schemes Based on Pairings.
IACR Cryptol. ePrint Arch., 2002

Efficient Identity Based Signature Schemes Based on Pairings.
Proceedings of the Selected Areas in Cryptography, 2002

An Algorithm for Computing Weierstrass Points.
Proceedings of the Algorithmic Number Theory, 5th International Symposium, 2002

2001
Extending the GHS Weil Descent Attack.
IACR Cryptol. ePrint Arch., 2001

Two Topics in Hyperelliptic Cryptography.
Proceedings of the Selected Areas in Cryptography, 8th Annual International Workshop, 2001


  Loading...