TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 29.

German

Birk, Frederik and Ali, Fares and Schneider, Michael and Weigold, Matthias (2019):
Hochpräzise Faserkunststoffbauteile für den Einsatz in Werkzeugmaschinen.
In: wt Werkstattstechnik online, 109 (11/12), pp. 868-872. VDI Fachmedien, e-ISSN 1436-4980,
[Article]

Hülsing, Andreas and Petzoldt, Albrecht and Schneider, Michael and Alaoui, Sidi Mohamed El Yousfi Waldmann, Ulrich (ed.) (2012):
Post-Quantum Signaturverfahren Heute.
In: 22. SIT-Smartcard Workshop 2012,
Fraunhofer Verlag Stuttgart, ISBN 978-3-8396-0347-5,
[Conference or Workshop Item]

Schneider, Michael (2011):
Analysis of Gauss-Sieve for Solving the Shortest Vector Problem in Lattices.
In: LNCS, 6552, In: WALCOM 2011, pp. 89-97,
Springer, [Conference or Workshop Item]

Cayrel, Pierre-Louis and Hoffmann, Gerhard and Schneider, Michael (2011):
GPU Implementation of the Keccak Hash Function Family.
In: ISA 2011 - The 5th International Conference on Information Security and Assurance,
Brno University, Czech Republic, [Conference or Workshop Item]

Milde, Benjamin and Schneider, Michael (2011):
A Parallel Implementation of GaussSieve for the Shortest Vector Problem in Lattices.
In: PaCT 2011,
[Conference or Workshop Item]

Rückert, Markus and Schneider, Michael and Schröder, Dominique Zhou, Jianying and Yung, Moti (eds.) (2010):
Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs.
In: 6123 of LNCS, In: ACNS 2010, pp. 69-86,
Springer, Beijing, China, ISBN 978-3-642-13707-5,
[Conference or Workshop Item]

Buchmann, Johannes and Lindner, Richard and Rückert, Markus and Schneider, Michael (2009):
Post-quantum cryptography: lattice signatures.
In: Special Issue of Computing (CECC 2008), [Article]

Schneider, Michael (2008):
Improved Authentication Path Computation for Merkle Trees.
Technische Universität Darmstadt, [Master Thesis]

Buchmann, Johannes and Dahmen, Erik and Schneider, Michael Buchmann, Johannes and Ding, Jintai (eds.) (2008):
Merkle Tree Traversal Revisited.
In: LNCS, In: PQCrypto 2008, pp. 63-78,
Springer, [Conference or Workshop Item]

Schneider, Michael (2001):
Methodeneinsatz in der Produktentwicklungspraxis.
346, Düsseldorf, VDI-Verl., TU Darmstadt,
[Ph.D. Thesis]

Schneider, Michael (1998):
Entwicklung einer Sonde zur Defäkotonomie.
Technische Universität Darmstadt,
[Seminar paper (Midterm)]

English

Zulj, I. and Glock, C. H. and Grosse, E. H. and Schneider, Michael (2018):
Picker routing and storage-assignment strategies for precedence-constrained order picking.
123, In: Computers & Industrial Engineering, pp. 338-347. [Article]

Emde, Simon and Schneider, Michael (2018):
Just-In-Time Vehicle Routing for In-House Part Feeding to Assembly Lines.
52, In: Transportation Science, (3), pp. 497-737. ISSN 0041-1655,
DOI: 10.1287/trsc.2018.0824,
[Article]

Abedinnia, Hamid and Glock, C. H. and Schneider, Michael (2017):
Machine scheduling in production: a content analysis.
50, In: Applied Mathematical Modelling, pp. 279-299. Elsevier Science, ISSN 0307-904X,
DOI: 10.1016/j.apm.2017.05.016,
[Article]

Schneider, Michael (2016):
Metaheuristics and exact optimization methods for variants of the vehicle-routing problem.
Darmstadt, [Habilitation]

Schneider, Michael (2011):
Computing Shortest Lattice Vectors on Special Hardware.
TU Darmstadt,
[Ph.D. Thesis]

Schneider, Michael and Sauer, T. and Birkhofer, Herbert (2001):
Results and conclusions of the evaluation of successful co-operation projects among industry and universities.
In: Unifying engineering design - building a partnership between research and industry: Design methods for performance and sustainability: Proceedings of ICED 01: 13th International Conference on Engineering Design, 2001 in Glasgow. Hrsg.: S. Culley (u.a.) -, [Conference or Workshop Item]

Schneider, Michael and Birkhofer, Herbert (1999):
How to increase efficiency of design processes by design methods: an evaluation of successful co-operation projects among industry and universities.
In: ICED 99: International Congress on Engineering Design <12, 1999, München>; Proceedings. Hrsg.: U. Lindemann, H. Birkhofer, H. Meerkamm, S. Vajna. - Zürich: Ed. Heurista, 1999. Vol. 3, S. 1553-1558 (Schriftenreihe WDK; 26), Zürich, Ed. Heurista, [Conference or Workshop Item]

["languages_typename_1" not defined]

Fontein, Felix and Schneider, Michael and Wagner, Urs (2013):
A Polynomial Time Version of LLL With Deep Insertions.
In: International Workshop on Coding and Cryptography - WCC 2013,
Bergen (Norway), [Conference or Workshop Item]

Schneider, Michael (2013):
Sieving for Shortest Vectors in Ideal Lattices.
In: Africa Crypt 2013,
Cairo, Egypt, [Conference or Workshop Item]

El Bansarkhani, Rachid and Cabarcas, Daniel and Kuo, Po-Chun and Schmidt, Patrick and Schneider, Michael (2012):
A Selection of Recent lattice-Based Signature and Encryption Schemes.
53, In: Tatra Mountains Mathematical Publications, pp. 81-102. [Article]

Göttert, Norman and Feller, Thomas and Schneider, Michael and Huss, Sorin and Buchmann, Johannes Prouff, Emmanuel and Schaumont, Patrick (eds.) (2012):
On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes.
In: LNCS, In: Workshop on Cryptographic Hardware and Embedded Systems (CHES 2012), pp. 512-529,
Springer, Leuven, Belgium, ISBN 978-3-642-33026-1,
[Conference or Workshop Item]

Kuo, Po-Chun and Schneider, Michael and Dagdelen, Özgür and Reichelt, Jan and Buchmann, Johannes and Cheng, Chen-Mou and Yang, Bo-Yin Preneel, Bart and Takagi, Tsuyoshi (eds.) (2011):
Extreme Enumeration on GPU and in Clouds - How Many Dollars You Need to Break SVP Challenges -.
In: LNCS, In: Workshop on Cryptographic Hardware and Embedded Systems - CHES 2011, pp. 176-191,
Springer, [Conference or Workshop Item]

Schneider, Michael and Göttert, Norman Preneel, Bart and Takagi, Tsuyoshi (eds.) (2011):
Random Sampling for Short Lattice Vectors on Graphics Cards.
In: LNCS, In: Workshop on Cryptographic Hardware and Embedded Systems 2011 (CHES 2011), pp. 160-175,
Springer, Nara, Japan, DOI: 10.1007/978-3-642-23951-9_11,
[Conference or Workshop Item]

Cayrel, Pierre-Louis and Hoffmann, Gerhard and Schneider, Michael (2011):
GPU Implementation of the Keccak Hash Function Family.
In: The 5th International Conference on Information Security and Assurance - ISA 2011,
Brno University, Czech Republic, [Conference or Workshop Item]

Dagdelen, Özgür and Schneider, Michael (2010):
Parallel Enumeration of Shortest Lattice Vectors.
In: LNCS, 6272, In: Euro-Par 2010, pp. 211-222,
Springer, [Conference or Workshop Item]

Hermans, Jens and Schneider, Michael and Buchmann, Johannes and Vercauteren, Frederik and Preneel, Bart Bernstein, Daniel and Lange, Tanja (eds.) (2010):
Parallel Shortest Lattice Vector Enumeration on Graphics Cards.
In: LNCS, 6055, In: Africacrypt 2010, pp. 52-68,
Springer, Stellenbpsch, South Africa, [Conference or Workshop Item]

Schneider, Michael and Buchmann, Johannes (2010):
Extended Lattice Reduction Experiments using the BKZ Algorithm.
In: LNI, In: Sicherheit, pp. 241-252,
GI, Berlin, [Conference or Workshop Item]

Schneider, Michael and Buchmann, Johannes and Lindner, Richard (2009):
Probabilistic Analysis of LLL Reduced Bases.
In: LNCS, In: Western European Workshop on Research in Cryptology - WEWoRC 2009,
Springer, Graz University of Technology, Austria, [Conference or Workshop Item]

This list was generated on Sat Dec 5 02:30:13 2020 CET.