| Computational commutative algebra 1 M Kreuzer, L Robbiano Springer Verlag, 2000 | 1161 | 2000 |
| Cayley-Bacharach schemes and their canonical modules AV Geramita, M Kreuzer, L Robbiano Transactions of the American Mathematical Society 339 (1), 163-189, 1993 | 155 | 1993 |
| Computing ideals of points J Abbott, A Bigatti, M Kreuzer, L Robbiano Journal of Symbolic Computation 30 (4), 341-356, 2000 | 128 | 2000 |
| Approximate computation of zero-dimensional polynomial ideals D Heldt, M Kreuzer, S Pokutta, H Poulisse Journal of Symbolic Computation 44 (11), 1566-1591, 2009 | 98 | 2009 |
| A fault attack on the LED block cipher P Jovanovic, M Kreuzer, I Polian International Workshop on Constructive Side-Channel Analysis and Secure …, 2012 | 92 | 2012 |
| Characterizations of border bases A Kehrein, M Kreuzer Journal of Pure and Applied Algebra 196 (2-3), 251-270, 2005 | 88 | 2005 |
| Computing border bases A Kehrein, M Kreuzer Journal of Pure and Applied Algebra 205 (2), 279-295, 2006 | 81 | 2006 |
| An algebraist’s view on border bases A Kehrein, M Kreuzer, L Robbiano Solving Polynomial Equations: Foundations, Algorithms, and Applications, 169-202, 2005 | 66 | 2005 |
| Computational linear and commutative algebra M Kreuzer, L Robbiano Springer, 2016 | 59 | 2016 |
| A course in mathematical cryptography G Baumslag, B Fine, M Kreuzer, G Rosenberger Walter de Gruyter GmbH & Co KG, 2015 | 55 | 2015 |
| Logik für Informatiker M Kreuzer, S Kühling Pearson Studium, 2006 | 55 | 2006 |
| Efficiently computing minimal sets of critical pairs M Caboara, M Kreuzer, L Robbiano Journal of Symbolic Computation 38 (4), 1169-1190, 2004 | 50 | 2004 |
| An algebraic fault attack on the LED block cipher P Jovanovic, M Kreuzer, I Polian Cryptology ePrint Archive, 2012 | 48 | 2012 |
| Computing zero-dimensional schemes J Abbott, M Kreuzer, L Robbiano Journal of Symbolic Computation 39 (1), 31-49, 2005 | 48 | 2005 |
| Algebraic attacks using SAT-solvers P Jovanovic, M Kreuzer De Gruyter 2 (2), 247-259, 2010 | 44 | 2010 |
| Solving polynomial equations: foundations, algorithms, and applications (algorithms and computation in mathematics) E Cattani, DA Cox, G Chèze, A Dickenstein, M Elkadi, IZ Emiris, A Galligo, ... Springer-Verlag, 2005 | 41 | 2005 |
| On the canonical module of a 0-dimensional scheme M Kreuzer Canadian Journal of Mathematics 46 (2), 357-379, 1994 | 40 | 1994 |
| Gröbner basis cryptosystems P Ackermann, M Kreuzer Applicable Algebra in Engineering, Communication and Computing 17 (3), 173-194, 2006 | 39 | 2006 |
| Traces in strict Frobenius algebras and strict complete intersections. E Kunz, M Kreuzer De Gruyter 1987 (381), 181-204, 1987 | 36 | 1987 |
| Autofault: towards automatic construction of algebraic fault attacks J Burchard, M Gay, ASM Ekossono, J Horáček, B Becker, T Schubert, ... 2017 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 65-72, 2017 | 34 | 2017 |