Ronald Rietman

According to our database1, Ronald Rietman authored at least 25 papers between 2004 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Classification for long-term monitoring of cough.
Discov. Artif. Intell., December, 2025

2022
Detection of Coughing and Respiratory Sensing in Conversational Speech.
Proceedings of the 15th International Joint Conference on Biomedical Engineering Systems and Technologies, 2022

2019
Round5: Compact and Fast Post-Quantum Public-Key Encryption.
IACR Cryptol. ePrint Arch., 2019

2018
Shorter Messages and Faster Post-Quantum Encryption with Round5 on Cortex M.
IACR Cryptol. ePrint Arch., 2018

Round5: Compact and Fast Post-Quantum Public-Key Encryption.
IACR Cryptol. ePrint Arch., 2018

A Multi-layer Recursive Residue Number System.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

2017
Improved key-reconciliation method.
IACR Cryptol. ePrint Arch., 2017

spKEX: An optimized lattice-based key exchange.
IACR Cryptol. ePrint Arch., 2017

Round2: KEM and PKE based on GLWR.
IACR Cryptol. ePrint Arch., 2017

2016
Attacks and parameter choices in HIMMO.
IACR Cryptol. ePrint Arch., 2016

Efficient quantum-resistant trust Infrastructure based on HIMMO.
IACR Cryptol. ePrint Arch., 2016

2015
A comprehensive and lightweight security architecture to secure the IoT throughout the lifecycle of a device based on HIMMO.
IACR Cryptol. ePrint Arch., 2015

Results on polynomial interpolation with mixed modular operations and unknown moduli.
IACR Cryptol. ePrint Arch., 2015

HIMMO: a collusion-resistant identity-based scheme for symmetric key generation.
ACM Commun. Comput. Algebra, 2015

DTLS-HIMMO: Achieving DTLS Certificate Security with Symmetric Key Overhead.
Proceedings of the Computer Security - ESORICS 2015, 2015

2014
HIMMO - A Lightweight, Fully Collusion Resistant Key Pre-Distribution Scheme.
IACR Cryptol. ePrint Arch., 2014

DTLS-HIMMO: Efficiently Securing a Post-Quantum World with a Fully-Collusion Resistant KPS.
IACR Cryptol. ePrint Arch., 2014

Interpolation and Approximation of Polynomials in Finite Fields over a Short Interval from Noisy Values.
Exp. Math., 2014

The MMO problem.
CoRR, 2014

The <i>MMO</i> problem.
Proceedings of the International Symposium on Symbolic and Algebraic Computation, 2014

2009
Uniform Illumination Rendering Using an Array of LEDs: A Signal Processing Perspective.
IEEE Trans. Signal Process., 2009

2008
Peak restoration in ofdm receiver with clipping a/d converter.
IEEE Trans. Wirel. Commun., 2008

An efficient framed-slotted ALOHA algorithm with pilot frame and binary selection for anti-collision of RFID tags.
IEEE Commun. Lett., 2008

2005
A finite-source queuing model for the IEEE 802.11 DCF.
Eur. Trans. Telecommun., 2005

2004
An M/G/1 Queueing Model with Gated Random Order of Service.
Queueing Syst. Theory Appl., 2004


  Loading...