Computational commutative algebra 1 M Kreuzer, L Robbiano Springer Verlag, 2000 | 1076 | 2000 |

Cayley-Bacharach schemes and their canonical modules AV Geramita, M Kreuzer, L Robbiano Transactions of the American Mathematical Society 339 (1), 163-189, 1993 | 149 | 1993 |

Computing ideals of points J Abbott, A Bigatti, M Kreuzer, L Robbiano Journal of Symbolic Computation 30 (4), 341-356, 2000 | 122 | 2000 |

Approximate computation of zero-dimensional polynomial ideals D Heldt, M Kreuzer, S Pokutta, H Poulisse Journal of Symbolic Computation 44 (11), 1566-1591, 2009 | 88 | 2009 |

A fault attack on the LED block cipher P Jovanovic, M Kreuzer, I Polian Constructive Side-Channel Analysis and Secure Design: Third International …, 2012 | 86 | 2012 |

Characterizations of border bases A Kehrein, M Kreuzer Journal of Pure and Applied Algebra 196 (2-3), 251-270, 2005 | 80 | 2005 |

Computing border bases A Kehrein, M Kreuzer Journal of Pure and Applied Algebra 205 (2), 279-295, 2006 | 69 | 2006 |

An algebraist’s view on border bases A Kehrein, M Kreuzer, L Robbiano Solving Polynomial Equations: Foundations, Algorithms, and Applications, 169-202, 2005 | 65 | 2005 |

Protecting apparatus J Kraft, H Reulein, J Franz, M Kreuzer US Patent 5,707,075, 1998 | 62 | 1998 |

Logik für Informatiker M Kreuzer, S Kühling Pearson Studium, 2006 | 56 | 2006 |

Computational linear and commutative algebra M Kreuzer, L Robbiano Springer, 2016 | 50 | 2016 |

A course in mathematical cryptography G Baumslag, B Fine, M Kreuzer, G Rosenberger Walter de Gruyter GmbH & Co KG, 2015 | 50 | 2015 |

An algebraic fault attack on the LED block cipher P Jovanovic, M Kreuzer, I Polian Cryptology ePrint Archive, 2012 | 45 | 2012 |

Efficiently computing minimal sets of critical pairs M Caboara, M Kreuzer, L Robbiano Journal of Symbolic Computation 38 (4), 1169-1190, 2004 | 45 | 2004 |

Computing zero-dimensional schemes J Abbott, M Kreuzer, L Robbiano Journal of Symbolic Computation 39 (1), 31-49, 2005 | 43 | 2005 |

On the canonical module of a 0-dimensional scheme M Kreuzer Canadian Journal of Mathematics 46 (2), 357-379, 1994 | 43 | 1994 |

Algebraic attacks using SAT-solvers P Jovanovic, M Kreuzer Walter de Gruyter GmbH & Co. KG 2 (2), 247-259, 2010 | 41 | 2010 |

Traces in strict Frobenius algebras and strict complete intersections. E Kunz, M Kreuzer Walter de Gruyter, Berlin/New York 1987 (381), 181-204, 1987 | 38 | 1987 |

Solving polynomial equations: foundations, algorithms, and applications (algorithms and computation in mathematics) E Cattani, DA Cox, G Chèze, A Dickenstein, M Elkadi, IZ Emiris, A Galligo, ... Springer-Verlag, 2005 | 37 | 2005 |

Gröbner basis cryptosystems P Ackermann, M Kreuzer Applicable Algebra in Engineering, Communication and Computing 17, 173-194, 2006 | 33 | 2006 |