TU Darmstadt / ULB / TUbiblio

Items in division

Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Date | Item Type | Language | No Grouping
Jump to: A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | R | S | T | V | W | Y | Z
Number of items at this level: 1121.

A

Albrecht, Martin R. and Curtis, Benjamin R. and Deo, Amit and Davidson, Alex and Player, Rachel and Postlethwaite, Eamonn W. and Virdia, Fernando and Wunderer, Thomas (2018):
Estimate all the {LWE, NTRU} schemes!
In: SCN 2018, In: 11th Conference on Security and Cryptography for Networks, Amalfi, Italy, In: LNCS, [Online-Edition: http://scn.di.unisa.it/],
[Conference or Workshop Item]

Alexopoulos, Nikolaos and Habib, Sheikh Mahbub and Mühlhäuser, Max (2018):
Towards Secure Distributed Trust Management on a Global Scale.
In: IoT S&P’18: ACM SIGCOMM 2018 Workshop on IoT Security and Privacy, New York, NY, USA, ACM, Budapest, HU, 20-25 August 2018, [Online-Edition: https://conferences.sigcomm.org/sigcomm/2018/workshop-iotsp....],
[Conference or Workshop Item]

Albrecht, Martin and Göpfert, Florian and Vidria, Fernando and Wunderer, Thomas (2017):
Revisiting the Expected Cost of Solving uSVP and Applications to LWE.
In: ASIACRYPT 2017 - Advances in Cryptology, Springer, [Conference or Workshop Item]

Alkeilani Alkadri, Nabil and Buchmann, Johannes and El Bansarkhani, Rachid and Krämer, Juliane (2017):
A Framework to Select Parameters for Lattice-Based Cryptography.
[Other]

Alkim, Erdem and Bindel, Nina and Buchmann, Johannes and Dagdelen, Özgür and Eaton, Edward and Gutoski, Gus and Krämer, Juliane and Pawlega, Filip (2017):
Revisiting TESLA in the quantum random oracle model.
In: PQCrypto 2017 - Eighth International Conference on Post-Quantum Cryptography, Springer, Utrecht, the Netherlands, [Conference or Workshop Item]

Appel, Michael and Bossert, Andreas and Cooper, Steven and Kußmaul, Tobias and Löffler, Johannes and Pauer, Christof and Wiesmaier, Alexander (2016):
Block ciphers for the IoT – SIMON, SPECK, KATAN, LED, TEA, PRESENT, and SEA compared.
[Report]

Appel, Michael and Pauer, Christof and Wiesmaier, Alexander (2016):
Security aspects and comparison of block ciphers LED and TEA.
[Report]

Akleylek, Sedat and Bindel, Nina and Buchmann, Johannes and Krämer, Juliane and Marson, Giorgia Azzurra (2016):
An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation.
In: International Conference on Cryptology AFRICACRYPT 2016, Springer, Fes, Morocco, [Conference or Workshop Item]

Akleylek, Sedat and Dagdelen, Özgür and Tok, Zaliha Yüce (2016):
On the Efficiency of Polynomial Multiplication for Lattice-Based Cryptography on GPUs Using CUDA.
In: Cryptography and Information Security in the Balkans, Springer, Koper, Slovenia, In: LNCS, 9540, [Conference or Workshop Item]

Appel, Michael and Pauer, Christof and Wiesmaier, Alexander (2016):
Sicherheitsaspekte und Vergleich der Blockchifren LED und TEA.
[Report]

Alkim, Erdem and Bindel, Nina and Buchmann, Johannes and Dagdelen, Özgür and Schwabe, Peter (2015):
TESLA: Tightly-Secure Efficient Signatures from Standard Lattices.
[Other]

Alkeilani Alkadri, Nabil (2015):
Post-Quantum Commitment Schemes.
TU Darmstadt, [Master Thesis]

Arabadzhieva, Vladislava (2015):
Privacy Taxonomy for Verifiable Poll-site Voting Schemes.
TU Darmstadt, [Master Thesis]

Albrecht, Martin and Fitzpatrick, Robert and Göpfert, Florian (2013):
On the Efficacy of Solving LWE by Reduction to Unique-SVP.
In: ICISC 2013, Seoul, Korea, [Conference or Workshop Item]

Alaoui, Sidi Mohamed El Yousfi and El Bansarkhani, Rachid and Cayrel, Pierre-Louis and Hoffmann, Gerhard (2013):
Code based Identification and Signature Schemes in Software.
In: Second International Workshop on Modern Cryptography and Security Engineering - MoCrySen 2013, University of Regensburg, Regensburg, Germany, [Conference or Workshop Item]

Abdelmageed Mohamed, Wael Said (2011):
Improvements for the XL Algorithm with Applications to Algebraic Cryptanalysis.
Darmstadt, Germany, TU Darmstadt, [Online-Edition: urn:nbn:de:tuda-tuprints-26216],
[Ph.D. Thesis]

Alaoui, Sidi Mohamed El Yousfi and Cayrel, Pierre-Louis and Meziani, Mohammed
Kim, Tai-Hoon and Adeli, Hojjat and Robles, Rosslin John and Balitanas, Maricel (eds.) (2011):
Improved Identity-Based Identification and Signature Schemes Using Quasi-Dyadic Goppa Codes.
In: ISA, Springer, In: Communications in Computer and Information Science, 200, [Conference or Workshop Item]

Adolph, Daniel (2009):
Fractional Recoding for the Shamir Method.
Technische Universität Darmstadt, [Master Thesis]

Arzt, Steven (2009):
Design and Implementation of a Cryptographic Plugin for E-mail Clients.
[Other]

Araújo, Roberto and Ryan, Peter Y. A. (2008):
Improving Farnel, Threeballot and Randell-Ryan Voting Schemes.
[Other]

Abbé, Thomas (2007):
Implementierung eines qualifiziert signierenden Timestamping-Servers.
Technische Universität Darmstadt, [Master Thesis]

Alaoui, Sidi Mohamed El Yousfi (2007):
Konstruktion von Hashfunktionen.
Technische Universität Darmstadt, [Master Thesis]

Araújo, Roberto and Foulle, Sébastian and Traoré, Jacques (2007):
A practical and secure coercion-resistant scheme for remote elections.
[Other]

Alkassar, Ammar and Volkamer, Melanie (2007):
E-Voting and Identity -- First International Conference, VOTE-ID 2007.
[Article]

Araújo, Roberto and Wiesmaier, Alexander and Buchmann, Johannes (2006):
The T-Vote Protocol.
(TI-3/06), [Report]

Araújo, Roberto and Custódio, Ricardo Felipe and Wiesmaier, Alexander and Takagi, Tsuyoshi (2006):
An Electronic Scheme for the Farnel Paper-Based Voting Protocol.
In: Industrial Track Proceedings of the 4th International Conference on Applied Cryptography and Network Security (ACNS 06), Springer, [Conference or Workshop Item]

Alkassar, Ammar and Krimmer, Robert and Volkamer, Melanie (2005):
Online-Wahlen für Gremien -- Wahlen in Gremien als Einsatzgebiet für Wahlen ohne vertrauenswürdige Instanz.
In: Datenschutz und Datensicherheit, pp. 480-482, 8, [Article]

Akishita, Toru and Takagi, Tsuyoshi (2003):
Zero-Value Point Attacks on Elliptic Curve Cryptosystem.
In: ISC 2003 - Information Security, 6th International Conference, Springer, Bristol, UK, In: LNCS, 2851, ISBN 3-540-20176-9,
[Conference or Workshop Item]

Akishita, Toru and Takagi, Tsuyoshi (2003):
Zero-Value Point Attacks on Elliptic Curve Cryptosystem.
(TI-1/03), [Report]

Albert, Michael (2001):
Konzeption und Implementierung eines Remote Access {VPNs} für Außendienstarbeiter unter Einsatz einer Public-Key-Infrastruktur.
Technische Universität Darmstadt, [Master Thesis]

Appel, Helo and Biehl, Ingrid and Fuhrmann, Arnulf and Ruppert, Markus and Takagi, Tsuyoshi and Takura, Akira and Valentin, Christian (1999):
Ein sicherer, robuster Zeitstempeldienst auf der Basis verteilter {RSA}-Signaturen.
(TI-21/99), [Report]

Amendola, Sandro (1995):
Effiziente Algorithmen für Probleme in Gittern über {$mathbbR^d$}.
Universität des Saarlandes, [Master Thesis]

Abel, Christine (1994):
Ein Algorithmus zur Berechnung der Klassenzahl und des Regulators reellquadratischer Ordnungen.
Universität des Saarlandes, [Ph.D. Thesis]

B

Bindel, Nina and Braun, Johannes and Gladiator, Luca and Stöckert, Tobias and Wirth, Johannes (2019):
X.509-Compliant Hybrid Certificates for the Post-Quantum Transition.
In: Journal of Open Source Software, The Open Journal, 4, (40), ISSN 2475-9066,
DOI: 10.21105/joss.01606,
[Article]

Burger, Michael and Bischof, Christian and Krämer, Juliane
Khalid, Zine-Dine (ed.) (2019):
A new Parallelization for p3Enum and Parallelized Generation of Optimized Pruning Functions.
In: Proceedings of the 2019 International Conference on High Performance Computing & Simulation, Dublin, IEEE, In: HPCS 2019, Dublin, Irland, 15.7. - 19.7.2019, [Online-Edition: http://hpcs2019.cisedu.info/],
[Conference or Workshop Item]

Burger, Michael and Bischof, Christian and Krämer, Juliane (2019):
p3Enum: A new Parameterizable and Shared-Memory Parallelized Shortest Vector Problem Solver.
In: Proceeding of the INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE 2019, Springer, [Conference or Workshop Item]

Bindel, Nina and Brendel, Jacqueline and Fischlin, Marc and Goncalves, Brian and Stebila, Douglas (2019):
Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange.
Chongqing, China, In: PQCrypto 2019, May 8-10, 2019, [Conference or Workshop Item]

Burger, Michael and Bischof, Christian and Calotoiu, Alexandru and Wunderer, Thomas and Wolf, Felix (2018):
Exploring the Performance Envelope of the LLL Algorithm.
In: CSE-2018, IEEE Computer Society, In: CSE 2018 – 21st IEEE International Conference on Computational Science and Engineering, Faculty of Automatic Control and Computers, University Politehnica of Bucharest, Romania, 29.-31.10.2018, [Online-Edition: https://cse2018.hpc.pub.ro/],
[Conference or Workshop Item]

Bindel, Nina and Buchmann, Johannes and Göpfert, Florian and Schmidt, Markus (2018):
Estimation of the Hardness of the Learning with Errors Problem with a Restricted Number of Samples.
In: Journal of Mathematical Cryptology, de Gruyter, [Article]

Bindel, Nina (2018):
On the Security of Lattice-Based Signature Schemes in a Post-Quantum World.
Darmstadt, Technische Universität, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8100],
[Ph.D. Thesis]

Buchmann, Johannes and Holzer, Patrick and Wunderer, Thomas (2017):
Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor p^α q^β.
In: INDOCRYPT 2017 - 18th International Conference on Cryptology in India, Springer, [Conference or Workshop Item]

Butin, Denis and Wälde, Julian and Buchmann, Johannes (2017):
Post-Quantum Authentication in OpenSSL with Hash-Based Signatures.
In: ICMU - The Tenth International Conference on Mobile Computing and Ubiquitous Networking, Toyama International Conference Center, Toyama, Japan, October 3-5, 2017, [Online-Edition: http://www.icmu.org/icmu2017/],
[Conference or Workshop Item]

Buldas, Ahto and Geihs, Matthias and Buchmann, Johannes (2017):
Long-Term Secure Time-Stamping using Preimage-Aware Hash Functions.
In: ProvSec 2017 - The 11th International Conference on Provable Security, Springer, [Conference or Workshop Item]

Bindel, Nina and Krämer, Juliane and Schreiber, Johannes (2017):
Hampering fault attacks against lattice-based signature schemes - countermeasures and their efficiency.
In: CODES/ISSS ’17 Companion, Springer, [Conference or Workshop Item]

Buchmann, Johannes and Lauter, Kristin and Mosca, Michele (2017):
Postquantum Cryptography - State of the Art.
In: IEEE Security & Privacy, pp. 12-13, 15, [Article]

Butin, Denis (2017):
Hash-Based Signatures: State of Play.
In: IEEE Security & Privacy, pp. 37-43, 15, (4), DOI: 10.1109/MSP.2017.3151334,
[Article]

Bernhard, David and Kulyk, Oksana and Volkamer, Melanie (2017):
Security Proofs for Participation Privacy, Receipt-Freeness, Ballot Privacy for the Helios Voting Scheme.
In: 12th International Conference on Availability, Reliability and Security - ARES 2017, ACM, DOI: 10.1145/3098954.3098990,
[Conference or Workshop Item]

Buldas, Ahto and Geihs, Matthias and Buchmann, Johannes (2017):
Long-Term Secure Commitments via Extractable-Binding Commitments.
In: ACISP 2017 - 22nd Australasian Conference on Information Security and Privacy, Springer, Auckland, New Zealand, In: LNCS, [Conference or Workshop Item]

Bugge, Sebastian (2017):
Solving Learning With Errors Instances Using Quantum Reductions.
TU Darmstadt, [Master Thesis]

Bindel, Nina and Herath, Udyani and McKague, Matthew and Stebila, Douglas (2017):
Transitioning to a Quantum-Resistant Public Key Infrastructure.
In: PQCrypto 2017 - Eighth International Conference on Post-Quantum Cryptography, Springer, Utrecht, the Netherlands, [Conference or Workshop Item]

Buchmann, Johannes and Braun, Johannes and Demirel, Denise and Geihs, Matthias (2017):
Quantum Cryptography: a view from classical cryptography.
In: Quantum Science and Technology, 2, (2), DOI: 10.1088/2058-9565/aa69cd,
[Article]

Bindel, Nina (2017):
Ein deutsches digitales Signaturverfahren auf dem Weg zum internationalen kryptographischen Standard.
In: Digitale Gesellschaft zwischen Risikobereitschaft und Sicherheitsbedürfnis- Tagungsband zum 15. Deutschen IT-Sicherheitskongress, SecuMedia Verlag, [Conference or Workshop Item]

Biemann, Chris and Bontcheva, Kalina and Eckart de Castilho, Richard and Gurevych, Iryna and Yimam, Seid Muhie
Ide, Nancy and Pustejovsky, James (eds.) (2017):
Collaborative Web-based Tools for Multi-layer Text Annotation.
In: The Handbook of Linguistic Annotation, Springer Netherlands, pp. 229-256, DOI: 10.1007/978-94-024-0881-2,
[Online-Edition: http://www.springer.com/de/book/9789402408799],
[Book Section]

Braun, Johannes and Buchmann, Johannes and Demirel, Denise and Fujiwara, Mikio and Geihs, Matthias and Moriai, Shiho and Sasaki, Masahide and Waseda, Atsushi (2017):
SHORT PAPER: LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality.
In: ASIACCS 2017 - ACM Asia Conference on Computer and Communications Security, Springer, Abu Dhabi, UAE, In: LNCS, [Conference or Workshop Item]

Buchmann, Johannes and Demirel, Denise and Schabhüser, Lucas and Struck, Patrick (2017):
Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability.
In: C2SI 2017 - Codes, Cryptology and Information Security - Second International Conference in honor of Professor Claude Carlet, Springer, Rabat, Morocco, In: LNCS, ISBN 978-3-319-55589-8,
[Conference or Workshop Item]

Brendel, Jacqueline and Demirel, Denise (2016):
Efficient Proactive Secret Sharing.
In: 2016 Privacy, Security and Trust Conference, IEEE, Auckland, New Zealand, [Conference or Workshop Item]

Brendel, J. and Demirel, D. (2016):
Efficient proactive secret sharing.
In: 2016 14th Annual Conference on Privacy, Security and Trust (PST), DOI: 10.1109/PST.2016.7907013,
[Conference or Workshop Item]

Bossert, Andreas and Cooper, Steven and Wiesmaier, Alexander (2016):
A comparison of block ciphers SIMON, SPECK, and KATAN.
[Report]

Butin, Denis and Demirel, Denise and Buchmann, Johannes (2016):
Formal Policy-based Provenance Audit.
In: The 11th International Workshop on Security - IWSEC 2016, sola city Conference Center, Akihabara-Ochanomizu District, Tokyo, Japan, [Conference or Workshop Item]

Braun, Johannes and Buchmann, Johannes and Demirel, Denise and Fujiwara, Mikio and Geihs, Matthias and Moriai, Shiho and Sasaki, Masahide and Waseda, Atsushi (2016):
LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality (Full Paper).
[Other]

Bindel, Nina and Buchmann, Johannes and Krämer, Juliane (2016):
Lattice-Based Signature Schemes and their Sensitivity to Fault Attacks.
In: FDTC 2016 - Fault Diagnosis and Tolerance in Cryptography, IEEE Conference Publication, Santa Barbara, CA, USA, [Conference or Workshop Item]

Bernhard, David and Kulyk, Oksana and Volkamer, Melanie (2016):
Security Proofs for Participation Privacy and Stronger Verifiability for Helios.
[Other]

Buchmann, Johannes and Göpfert, Florian and Güneysu, Tim and Oder, Tobias and Pöppelmann, Thomas (2016):
High-Performance and Lightweight Lattice-Based Public-Key Encryption.
In: IoTPTS '16 - 2nd ACM International Workshop on IoT Privacy, Trust, and Security, ACM, Xi'an, China, [Conference or Workshop Item]

Buchmann, Johannes and Büscher, Niklas and Katzenbeisser, Stefan and Krämer, Juliane and Micciancio, Daniele and Siim, Sander and van Vredendaal, Christine and Walter, Michael and Göpfert, Florian (2016):
Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge.
In: ASIAPKC 16 - 3rd ACM International Workshop on ASIA Public-Key Cryptography, ACM, Xi'an, China, [Conference or Workshop Item]

Budurushi, Jurlind and Hilt, Annika and Volkamer, Melanie (2016):
"E-Mail made in Germany" Untersuchung der Sicherheitsbeurteilung von E-Mail-Nutzern.
In: Datenschutz und Datensicherheit - DuD, Springer Fachmedien Wiesbaden, pp. 300-304, 40, (5), DOI: 10.1007/s11623-016-0600-3,
[Article]

Buchmann, Johannes and Demirel, Denise and Schabhüser, Lucas (2016):
Privately and Publicly Verifiable Computing Techniques.
ISBN 978-3-319-53797-9,
[Book]

Budurushi, Jurlind and Reanaud, Karen and Volkamer, Melanie and Woide, Marcel (2016):
An Investigation into the Usability of Electronic Voting Systems for Complex Elections.
In: Journal of Annals of Telecommunications: The role of telecommunications in electronic voting, Springer Paris, pp. 309–322, 71, (7), DOI: 10.1007/s12243-016-0510-2,
[Article]

Buchmann, Johannes and Göpfert, Florian and Player, Rachel and Wunderer, Thomas (2016):
On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack.
In: International Conference on Cryptology AFRICACRYPT 2016, Springer, Fes, Morocco, [Conference or Workshop Item]

Brendel, Jacqueline (2016):
Efficient Proactive Secret Sharing.
TU Darmstadt, [Master Thesis]

Braun, Kristoffer and Rack, Philipp (2015):
Shoulder-surfing resistente Authentisierung an mobilen Endgeräten.
SecuMedia Verlag, TU Darmstadt, In: Tagungsband zum Deutschen IT-Sicherheitskonkress, 14, [Master Thesis]

Braun, Johannes (2015):
Maintaining Security and Trust in Large Scale Public Key Infrastructures.
TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/4566],
[Ph.D. Thesis]

Butin, Denis and Métayer, Daniel Le (2015):
A Guide to End-to-End Privacy Accountability.
In: 1st International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity (TELERISE 2015), IEEE, Florence, Italy, [Conference or Workshop Item]

Butin, Denis and Gazdag, Stefan-Lukas and Buchmann, Johannes (2015):
Real-World Post-Quantum Digital Signatures.
In: Cybersecurity & Privacy Innovation Forum (CSP Forum 2015), Springer CCIS, Brussels, Belgium, [Conference or Workshop Item]

Braun, Johannes (2014):
Ubiquitous support of multi path probing: Preventing man in the middle attacks on Internet communication.
In: IEEE Conference on Communications and Network Security (IEEE CNS 2014 Poster Session), San Francisco, USA, [Conference or Workshop Item]

Buchmann, Johannes and Bischof, Christian and Dagdelen, Özgür and Fitzpatrick, Robert and Göpfert, Florian and Mariano, Artur (2014):
Nearest Planes in Practice.
In: International Conference on Cryptography and Information security -BalkanCryptSec 2014, Istanbul, Turkey, [Conference or Workshop Item]

Budurushi, Jurlind and Renaud, Karen and Volkamer, Melanie and Woide, Marcel
Krimmer, Robert and Volkamer, Melanie (eds.) (2014):
Implementation and Evaluation of the EasyVote Tallying Component and Ballot.
In: 6th International Conference on Electronic Voting (EVOTE), IEEE, Lochau, ISBN 978-3-200-03697-0,
DOI: 10.1109/EVOTE.2014.7001140,
[Conference or Workshop Item]

Buchmann, Johannes and El Bansarkhani, Rachid and Hauke, Sascha
Brunetti, Gino and Feld, Thomas and Heuser, Lutz and Schnittner, Joachim and Webel, Christian (eds.) (2014):
Towards Security Solutions for Emergent Business Software.
In: Future Business Software Conference 2012, Springer, St. Leon-Rot, Germany, [Conference or Workshop Item]

Bartsch, Steffen and Boos, Carina and Canova, Gamze and Dyck, Dominic and Henhapl, Birgit and Schultheis, Michael and Volkamer, Melanie
Plödereder, Erhard and Grunske, Lars and Schneider, Eric and Ull, Dominik (eds.) (2014):
Interdisziplinäres Bewertungskonzept für Risiken auf Webseiten.
In: Workshop RiskKom der GI-FGn SECMGT & ECOM auf der Informatik 2014, Gesellschaft für Informatik, Bonn, [Conference or Workshop Item]

Budurushi, Jurlind and Neumann, Stephan and Shala, Genc and Volkamer, Melanie
Plödereder, Erhard and Grunske, Lars and Schneider, Eric and Ull, Dominik (eds.) (2014):
Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trail.
In: INF14 - Workshop: Elektronische Wahlen: Unterstützung der Wahlprozesse mittels Technik, Köllen Druck+Verlag GmbH, Bonn, Stuttgart, In: Lecture Notes in Informatics (LNI), 232, ISBN 978-3-88579-626-8,
[Conference or Workshop Item]

Braun, Johannes and Buchmann, Johannes and Mullan, Ciaran and Wiesmaier, Alexander (2014):
Long Term Confidentiality: a Survey.
In: Designs, Codes and Cryptography, pp. 459-478, 71, (3), DOI: 10.1007/s10623-012-9747-6,
[Article]

Braun, Johannes and Volk, Florian and Classen, Jiska and Buchmann, Johannes and Mühlhäuser, Max (2014):
CA Trust Management for the Web PKI.
In: IOS Press: Journal of Computer Security, 22(6), 2014, pp. 913-959 (2014), [Article]

Budurushi, Jurlind and Stockhardt, Simon and Woide, Marcel and Volkamer, Melanie
Tryfonas, Theo and Askoxylakis, Ioannis (eds.) (2014):
Paper Audit Trails and Voters' Privacy Concerns.
In: Human Aspects of Information Security, Privacy and Trust, Springer International Publishing Switzerland, Heraklion, Greece, In: LNCS, 8533, [Conference or Workshop Item]

Budurushi, Jurlind and Volkamer, Melanie
Parycek, Peter and Edelmann, Noella (eds.) (2014):
Feasibility Analysis of Various Electronic Voting Systems for Complex Elections.
In: International Conference for E-Democracy and Open Government 2014, Edition Donau-Universität Krems, Danube University Krems, ISBN 978-3-902505-35-4,
[Conference or Workshop Item]

Bartsch, Steffen and Volkamer, Melanie (2014):
Expert Knowledge for Contextualized Warnings.
[Report]

Budurushi, Jurlind and Jöris, Roman and Volkamer, Melanie (2014):
Implementing and evaluating a software-independent voting system for polling station elections.
In: Journal of Information Security and Applications, pp. 1-10, 19, (2), DOI: 10.1016/j.jisa.2014.03.001,
[Article]

Bergmann, Clemens and Canova, Gamze (2014):
Design, Implementation and Evaluation of an Anti-Phishing Education App.
Darmstadt, Germany, TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/3763],
[Master Thesis]

Bartsch, Steffen and Boos, Carina and Dyck, Dominic and Schwarz, Christopher and Theuerling, Heike and Henhapl, Birgit and Volkamer, Melanie (2014):
Unterstützung für ein risikobewusstes Verhalten im Internet.
In: Vielfalt der Informatik, Bremen, [Conference or Workshop Item]

Boos, Carina and Bartsch, Steffen and Volkamer, Melanie (2014):
Rechtliche und technische Nutzerunterstützung bei der Button-Lösung.
In: Computer und Recht, pp. 119-127, (2), DOI: 10.9785/ovs-cr-2014-119,
[Article]

Budurushi, Jurlind and Woide, Marcel and Volkamer, Melanie (2014):
Introducing Precautionary Behavior by Temporal Diversion of Voter Attention from Casting to Verifying their Vote.
In: Workshop on Usable Security (USEC), Internet Society, San Diego, ISBN 1-891562-37-1,
DOI: 10.14722/usec.2014.23037,
[Conference or Workshop Item]

Buchmann, Johannes and Neumann, Stephan (2014):
Tauglichkeit von Common Criteria-Schutzprofilen für Internetwahlen in Deutschland.
In: Datenschutz und Datensicherheit - DuD, Springer Gabler Verlag, pp. 98-102, 38, (2), [Article]

Buchmann, Johannes and Karatsiolis, Evangelos and Wiesmaier, Alexander (2013):
Introduction to Public Key Infrastructures.
Springer-Verlag Berlin Heidelberg, ISBN 978-3-642-40656-0,
[Book]

Braun, Johannes and Kiefer, Franziskus and Hülsing, Andreas
Katsikas, Sokratis and Agudo, Isaac (eds.) (2013):
Revocation & Non-Repudiation: When the first destroys the latter.
In: Public Key Infrastructures, Services and Applications - EuroPKI 2013, Springer Berlin Heidelberg, RHUL, Egham, UK, In: LNCS, ISBN 978-3-642-53996-1,
DOI: 10.1007/978-3-642-53997-8_3,
[Conference or Workshop Item]

Buchmann, Johannes and Nebel, Maxi and Roßnagel, Alexander and Shirazi, Fatemeh and Simo, Hervais and Waidner, Michael (2013):
Personal Information Dashboard: Putting the Individual Back in Control.
Iso Press, ISBN 978-1-61499-294-3 (print) | 978-1-61499-295-0 (online),
DOI: 10.3233/978-1-61499-295-0-139,
[Book]

Braun, Johannes and Volk, Florian and Buchmann, Johannes and Mühlhäuser, Max
Katsikas, Sokatis and Agudo, Isaac (eds.) (2013):
Trust Views for the Web PKI.
Springer Berlin Heidelberg, In: Public Key Infrastructures, Services and Applications - EuroPKI 2013, In: LNCS, ISSN 0302-9743,
[Conference or Workshop Item]

Bouyukliev, Iliya and Bulygin, Stanislav and Martínez-Moro, Edgar
Bouyukliev, Iliya and Bulygin, Stanislav and Martínez-Moro, Edgar (eds.) (2013):
Foreword: computer algebra in coding theory and cryptography.
In: Applicable Algebra in Engineering, Communication and Computing, Springer, pp. 157 - 158, DOI: 10.1007/s00200-013-0199-7,
[Book Section]

Braden, Kjell (2013):
XML Advanced Electronic Signatures and XML Evidence Record Syntax for Long-Term Protection of Data objects.
TU Darmstadt, [Master Thesis]

Bernhard, David and Neumann, Stephan and Volkamer, Melanie
Schneider, Steve and Heather, James and Teague, Vanessa (eds.) (2013):
Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs.
In: 4th International Conference on e-Voting and Identity (VoteID13), Springer, University of Surrey, Guildford, UK, In: Lecture Notes in Computer Science, 7985, [Conference or Workshop Item]

Bartsch, Steffen and Berger, Bernhard and Bunke, Michaela and Sohr, Karsten
Pernul, Günther and Sandhu, Ravi (eds.) (2013):
The Transitivity-of-Trust Problem in Android Application Interaction.
In: 8th International Conference on Availability, Reliability and Security (ARES 2013), IEEE, University of Surrey, Guildford, UK, [Conference or Workshop Item]

Budurushi, Jurlind and Henning, Maria and Volkamer, Melanie
Schneider, Steve and Heather, James and Teague, Vanessa (eds.) (2013):
Vote Casting in Any Preferred Constituency: A New Voting Channel.
In: 4th International Conference on e-Voting and Identity (VoteID13), Springer, University of Surrey, Guildford, UK, In: Lecture Notes in Computer Science, 7985, [Conference or Workshop Item]

Budurushi, Jurlind and Neumann, Stephan and Olembo, Maina and Volkamer, Melanie
Pernul, Günther and Sandhu, Ravi (eds.) (2013):
Pretty Understandable Democracy - A Secure and Understandable Internet Voting Scheme.
In: 8th International Conference on Availability, Reliability and Security (AReS 2013), IEEE, University of Regensburg, Germany, [Conference or Workshop Item]

Bartsch, Steffen and Volkamer, Melanie and Theuerling, Heike and Karayumak, Fatih
Huth, Michael (ed.) (2013):
Contextualized Web warnings, and how they cause distrust.
In: Trust and Trustworthy Computing (TRUST 2013), Springer, In: TRUST 2013, London, UK, 17. - 19. Juni 2013, [Conference or Workshop Item]

Baumöller, Claas and Schaaf, Joachim and Horsch, Moritz and Wiesmaier, Alexander and Braun, Johannes (2013):
EP 2600270 Identification element-based authentication and identification with decentralised service use.
[Standards, patents]

Buchmann, Johannes and Demirel, Denise and van de Graaf, Jeroen
Sadeghi, Ahmad-Reza (ed.) (2013):
Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy.
In: Financial Cryptography and Data Security: 17th International Conference, 2013, Springer, In: LNCS, ISBN 978-3-642-39883-4,
[Conference or Workshop Item]

Braun, Johannes and Horsch, Moritz and Hülsing, Andreas (2013):
Effiziente Umsetzung des Kettenmodells unter Verwendung vorwärtssicherer Signaturverfahren.
In: Informationssicherheit stärken - Vertrauen in die Zukunft schaffen. Tagungsband zum 13. Deutschen IT-Sicherheitskongress, SecuMedia Verlag, Bonn, ISBN 978-3-922746-95-9,
[Conference or Workshop Item]

Bulygin, Stanislav and Walter, Michael and Buchmann, Johannes
Dawson, E. (ed.) (2013):
Many weak keys for PRINTcipher: fast key recovery and countermeasures.
In: RSA Conference Cryptographer's Track (CT-RSA 2013), Springer, In: Lecture Notes in Computer Science, 7779, [Conference or Workshop Item]

Braun, Johannes and Wiesmaier, Alexander and Buchmann, Johannes
Sprague, Ralph H. (ed.) (2013):
On the Security of Encrypted Secret Sharing.
In: 46th Hawaii International Conference on Systems Science (HICSS-46), IEEE Computer Society, Grand Wailea, Maui, Hawaii, ISBN 978-0-7695-4892-0,
DOI: 10.1109/HICSS.2013.426,
[Conference or Workshop Item]

Bulygin, Stanislav and Walter, Michael and Buchmann, Johannes (2013):
Full analysis of PRINTcipher with respect to invariant subspace attack: efficient key recovery and countermeasures.
In: Designs, Codes, and Cryptography 73(3), pp. 997-1022 (2014), DOI: 10.1007/s10623-013-9840-5,
[Article]

Buchmann, Johannes and Cabarcas, Daniel and Göpfert, Florian and Hülsing, Andreas and Weiden, Patrick
Lange, Tanja and Lauter, Kristin and Lisonek, Petr (eds.) (2013):
Discrete Ziggurat: A Time-Memory Trade-off for Sampling from a Gaussian Distribution over the Integers.
In: Selected Areas in Cryptography 2013 (SAC'13), Springer, Simon Fraser University, Burnaby, British Columbia, Canada, In: LNCS, [Conference or Workshop Item]

Braun, Johannes and Rynkowski, Gregor (2013):
The Potential of an Individualized Set of trusted CAs: Defending against CA Failures in the Web PKI.
In: Social Computing (SocialCom) - PASSAT2013, Washington D.C., USA, DOI: 10.1109/SocialCom.2013.90,
[Conference or Workshop Item]

Buchmann, Johannes and Dahmen, Erik and Ereth, Sarah and Hülsing, Andreas and Rückert, Markus (2013):
On the security of the Winternitz one-time signature scheme.
In: International Journal of Applied Cryptography, pp. 84-96, 3, (1), [Article]

Braun, Johannes and Hülsing, Andreas and Wiesmaier, Alexander (2012):
Schlanke Infrastrukturen für den digitalen Rechtsverkehr - Vorwärtssichere Verfahren für qualifizierte elektronische Signaturen.
[Report]

Braun, Johannes and Horsch, Moritz and Wiesmaier, Alexander
Ryan, Mark and Smyth, Ben and Wang, Guilin (eds.) (2012):
iPIN and mTAN for secure eID applications.
In: 8th International Conference on Information Security Practice and Experience (ISPEC 2012), Springer, Hangzhou, China, In: LNCS, ISBN 978-3-642-29100-5,
DOI: 10.1007/978-3-642-29101-2_18,
[Conference or Workshop Item]

Braun, Johannes and Hülsing, Andreas and Wiesmaier, Alexander and Vigil, Martín and Buchmann, Johannes
De Capitani di Vimercati, Sabrina and Mitchell, Chris (eds.) (2012):
How to avoid the Breakdown of Public Key Infrastructures - Forward Secure Signatures for Certificate Authorities.
In: Public Key Infrastructures, Services and Applications - EuroPKI 2012, Springer, Pisa, Italy, In: LNCS, ISBN 978-3-642-40011-7,
[Conference or Workshop Item]

Bär, Daniel and Biemann, Chris and Gurevych, Iryna and Zesch, Torsten (2012):
UKP: Computing Semantic Textual Similarity by Combining Multiple Content Similarity Measures.
In: Proceedings of the 6th International Workshop on Semantic Evaluation, held in conjunction with the 1st Joint Conference on Lexical and Computational Semantics, [Online-Edition: http://www.aclweb.org/anthology/S12-1059],
[Conference or Workshop Item]

Bartsch, Steffen (2012):
Policy Override in Practice: Model, Evaluation, and Decision Support.
In: Security and Communication Networks, DOI: 10.1002/sec.547,
[Article]

Bartsch, Steffen and Sasse, Angela (2012):
How Users Bypass Access Control and Why: The Impact of Authorization Problems on Individuals and the Organization.
(RN/12/06), [Report]

Braun, Johannes and Buchmann, Johannes
Levi, Albert and Badra, Mohamad and Cesana, Matteo and Ghassemian, Mona and Jabeur, Nafaa and Klonowski, Marek and Mana, Antonio and Sargento, Susana and Zeadally, Sherali (eds.) (2012):
Perfect Confidentiality Network - A solution for information theoretically secure key agreement.
In: 5th IFIP International Conference on New Technologies, Mobility & Security (NTMS) 2012, IEEE, Istanbul, Turkey, ISBN 978-1-4673-0229-6,
DOI: 10.1109/NTMS.2012.6208676,
[Conference or Workshop Item]

Busold, Christoph (2012):
Hash-based Signatures on Smart Cards.
TU Darmstadt, [Master Thesis]

Bulygin, Stanislav and Walter, Michael (2012):
Study of the invariant coset attack on PRINTcipher: more weak keys with practical key recovery.
(2012/085), [Report]

Bartsch, Steffen and Sohr, Karsten and Bunke, Michaela and Hofrichter, Oliver and Berger, Bernhard (2012):
The Transitivity of Trust Problem in the Interaction of Android Applications.
(64-2012), ISBN 978-0-7695-5008-4,
DOI: 10.1109/ARES.2013.39,
[Report]

Bartsch, Steffen and Sasse, Angela (2012):
How Users Bypass Access Control – and Why: The Impact of Authorization Problems on Individuals and the Organization.
In: Proceedings of the 21st European Conference on Information Systems (ECIS 2013), London, UK, [Conference or Workshop Item]

Bartsch, Steffen and Sasse, Angela
Ossowski, Sascha and Lecca, Paola (eds.) (2012):
Guiding Decisions on Authorization Policies: A Participatory Approach to Decision Support.
In: Proceedings of the 27th Annual ACM Symposium on Applied Computing, ACM, Trento, Italy, In: SAC '12, ISBN 978-1-4503-0857-1,
DOI: 10.1145/2245276.2232015,
[Conference or Workshop Item]

Bulygin, Stanislav and Buchmann, Johannes
Lin, Dongdai and Tsudik, Gene and Wang, Xiaoyun (eds.) (2011):
Algebraic cryptanalysis of the round-reduced and side channel analysis of the full PRINTCipher-48.
In: Proceedings of The 10th International Conference on Cryptography and Network Security (CANS 2011), Springer, Sanya, China, In: Lecture Notes in Computer Science, 7092, ISBN 978-3-642-25512-0,
[Conference or Workshop Item]

Buchmann, Johannes and Dahmen, Erik and Hülsing, Andreas
Yang, Bo-Yin (ed.) (2011):
XMSS - A Practical Forward Secure Signature Scheme based on Minimal Security Assumptions.
In: Post-Quantum Cryptography - Proceedings of PQCrypto 2011, Springer Berlin / Heidelberg, In: Lecture Notes in Computer Science - LNCS, ISBN 978-3-642-25404-8,
DOI: 10.1007/978-3-642-25405-5_8,
[Conference or Workshop Item]

Braun, Johannes and Wiesmaier, Alexander and Klieme, Eric and Strick, Linda and Wunderlich, Wolfgang (2011):
Der elektronische Safe als vertrauenswürdiger Cloud Service.
[Report]

Bartsch, Steffen (2011):
Exploring Twisted Paths: Analyzing Authorization Processes in Organizations.
In: NSS '11: Proceedings of the 5th International Conference on Network and System Security, IEEE Computer Society, Milan, Italy, DOI: 10.1109/ICNSS.2011.6060003,
[Conference or Workshop Item]

Braun, Johannes and Horsch, Moritz and Wiesmaier, Alexander and Hühnlein, Detlef
Schartner, Peter and Taeger, Jürgen (eds.) (2011):
Mobile Authentisierung und Signatur.
In: D-A-CH Security 2011: Bestandsaufnahme, Konzepte, Anwendungen, Perspektiven, syssec Verlag, Oldenburg, ISBN 978-3-00-034960-7,
[Conference or Workshop Item]

Bartsch, Steffen (2011):
Practitioners Perspectives on Security in Agile Development.
In: FARES: 6th International Workshop on Frontiers in Availability, Reliability and Security, IEEE Computer Society, Vienna, Austria, DOI: 10.1109/ARES.2011.82,
[Conference or Workshop Item]

Buchmann, Johannes and Dahmen, Erik and Ereth, Sarah and Hülsing, Andreas and Rückert, Markus
Nitaj, Abderrahmane and Pointcheval, David (eds.) (2011):
On the security of the Winternitz one-time signature scheme.
In: Progress in Cryptology - AFRICACRYPT 2011, Springer Berlin / Heidelberg, Dakar, Senegal, In: Lecture Notes in Computer Science (LNCS), ISBN 978-3-642-21968-9,
DOI: 10.1007/978-3-642-21969-6_23,
[Conference or Workshop Item]

Bartsch, Steffen (2011):
An Authorization Enforcement Usability Case Study.
In: ESSoS 2011, Springer, Madrid, Spain, DOI: 10.1007/978-3-642-19125-1_16,
[Conference or Workshop Item]

Bulygin, Stanislav and Petzoldt, Albrecht and Buchmann, Johannes
Gong, G. and Gupta, K. C. (eds.) (2010):
Towards provable security of the Unbalanced Oil and Vinegar signature scheme under direct attacks.
In: Proceedings of IndoCrypt 2010, Springer, In: Lecture Notes in Computer Science, 6498, [Conference or Workshop Item]

Bartsch, Steffen (2010):
A calculus for the qualitative risk assessment of policy override authorization.
In: SIN: Proceedings of the 3rd international conference on Security of information and networks, ACM, Taganrog, Rostov-on-Don, Russian Federation, ISBN 978-1-4503-0234-0,
DOI: 10.1145/1854099.1854115,
[Conference or Workshop Item]

Buchmann, Johannes and Wiesmaier, Alexander (2010):
Eine kurze Geschichte der Schlüssel.
In: 360° -- Fachmagazin für das Management im öffentlichen Sektor, pp. 21-23, (17), [Article]

Buchmann, Johannes and Cabarcas, Daniel and Ding, Jintai and Mohamed, Mohamed Saied Emam
Bernstein, Daniel and Lange, Tanja (eds.) (2010):
Flexible Partial Enlargement to Accelerate Gröbner Basis Computation over F_2.
In: AFRICACRYPT, Springer, Stellenbosch, South Africa, In: LNCS, ISBN 978-3-642-12677-2,
[Conference or Workshop Item]

Belhilali, Mohamed (2010):
Entwurf und Implementierung von SCVP in Java - Simple Certificate Validation Protocol.
TU Darmstadt, [Master Thesis]

Bartsch, Steffen (2010):
Supporting Authorization Policy Modification in Agile Development of {Web} Applications.
In: SecSE: Fourth International Workshop on Secure Software Engineering, IEEE Computer Society, Krakow, Poland, DOI: 10.1109/ARES.2010.19,
[Conference or Workshop Item]

Backs, Christian (2010):
Anbindung eines externen Authentifizierungsdienstes an ein Online-Wahlsystem.
TU Darmstadt, [Master Thesis]

Barreto, Paulo and Cayrel, Pierre-Louis and Misoczki, Rafael and Niebuhr, Robert (2010):
Quasi-dyadic CFS signatures.
In: Inscrypt 2010, Springer, In: LNCS, [Conference or Workshop Item]

Buchmann, Johannes (2010):
Einführung in die Kryptographie / Introduction to Cryptography.
Springer Berlin/Heidelberg, ISBN 9783642111853,
[Book]

Buchmann, Johannes and Braun, Johannes and Horsch, Moritz and Hühnlein, Detlef and Kiefer, Franziskus and Strenzke, Falko and Wiesmaier, Alexander (2010):
Towards a mobile eCard Client.
In: 13. Kryptotag, Darmstadt, [Conference or Workshop Item]

Braun, Johannes (2009):
Nutzung des elektronischen Personalausweises im eCommerce.
TU Darmstadt, [Master Thesis]

Buchmann, Johannes and Lindner, Richard (2009):
Secure Parameters for SWIFFT.
In: Indocrypt 2009, Springer, In: LNCS, [Conference or Workshop Item]

Buchmann, Johannes and Roßnagel, Alexander (2009):
Das Bundesverfassungsgericht und Telemedienwahlen.
In: K&R, pp. 543-548, 9, [Article]

Buchmann, Johannes and Karatsiolis, Vangelis (2009):
Notification Services for the Server-Based Certificate Validation Protocol.
In: Int'l J. of Communications, Network and System Sciences, pp. 378-384, 2, (5), DOI: 10.4236/ijcns.2009.25042,
[Article]

Beck, Martin and Tews, Erik (2009):
Practical attacks against WEP and WPA.
In: Second ACM Conference on Wireless Network Security - WISEC 2009, [Conference or Workshop Item]

Bartsch, Steffen and Sohr, Karsten and Bormann, Carsten (2009):
Supporting Agile Development of Authorization Rules for SME Applications.
In: TrustCol: 3rd International Workshop on Trusted Collaboration, Springer, Orlando, FL, USA, DOI: 10.1007/978-3-642-03354-4_35,
[Conference or Workshop Item]

Buchmann, Johannes and Lindner, Richard and Rückert, Markus and Schneider, Michael (2009):
Post-quantum cryptography: lattice signatures.
In: Special Issue of Computing (CECC 2008), [Article]

Bergner, Martin (2008):
Minimale Voraussetzungen für blinde Signaturen.
Technische Universität Darmstadt, [Master Thesis]

Biadatz, Adalbert (2008):
Server gesteuerte Chipkarten Aktualisierung.
Technische Universität Darmstadt, [Master Thesis]

Brandl, Andreas (2008):
Implementierung eines Responders für CMP over HTTP zur Erstellung von CV- und X.509 Zertifikaten im Umfeld der elektronischen Gesundheitskarte.
Technische Universität Darmstadt, [Master Thesis]

Buchmann, Johannes and Lindner, Richard and Rückert, Markus
Buchmann, Johannes and Ding, Jintai (eds.) (2008):
Explicit Hard Instances of the Shortest Vector Problem.
In: PQCrypto 2008, In: LNCS, ISBN 978-3-540-88402-6,
[Conference or Workshop Item]

Buchmann, Johannes and Döring, Martin and Lindner, Richard (2008):
Efficiency Improvement for {NTRU}.
In: Sicherheit 2008, Saarbrücken, In: Lecture Notes in Informatics, [Conference or Workshop Item]

Bartsch, Steffen and Bormann, Carsten
Horster, Patrick (ed.) (2008):
Berechtigungsmodellierung im Geschäftsprozessmanagement von KMU.
In: D.A.CH. Security 2008, syssec Verlag, [Conference or Workshop Item]

Buchmann, Johannes and Dahmen, Erik and Schneider, Michael
Buchmann, Johannes and Ding, Jintai (eds.) (2008):
Merkle Tree Traversal Revisited.
In: PQCrypto 2008, Springer, In: LNCS, [Conference or Workshop Item]

Buchmann, Johannes and Dahmen, Erik and Klintsevich, Elena and Okeya, Katsuyuki and Vuillaume, Camille (2007):
Merkle Signatures with Virtually Unlimited Signature Capacity.
In: ACNS 2007 - Applied Cryptography and Network Security, 5th International Conference, Springer, In: LNCS, 4521, DOI: 10.1007/978-3-540-72738-5_3,
[Conference or Workshop Item]

Becker, Jochen (2007):
Kommunikation in einem Trustcenter Intra Trustcenter Protocol Version 1.2 Entwurf und Design.
Technische Universität Darmstadt, [Master Thesis]

Bennani, Younes (2007):
Optimierung de Flexsecures Online Certificate Status Protocol.
Technische Universität Darmstadt, [Master Thesis]

Blume, Sebastian (2007):
Efficient Java Implementation of GMSS.
Technische Universität Darmstadt, [Master Thesis]

Borisova, Zornitsa (2007):
Rankin Lattice Reduction for Programmers.
Technische Universität Darmstadt, [Master Thesis]

Buchmann, Johannes and Vollmer, Ulrich (2007):
Binary Quadratic Forms. An Algorithmic Approach.
Springer Berlin/Heidelberg, In: Algorithms and Computation in Mathematics, ISBN 978-3-540-46367-2,
[Book]

Buchmann, Johannes and Garcia, Luis Carlos Coronado and Dahmen, Erik and Döring, Martin and Klintsevich, Elena (2006):
{CMSS} - An Improved Merkle Signature Scheme.
In: INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India, Springer, In: LNCS, 4329, DOI: 10.1007/11941378_25,
[Conference or Workshop Item]

Buchmann, Johannes and Ludwig, Christoph (2006):
Practical Lattice Basis Sampling Reduction.
In: ANTS 2006: Algorithmic Number Theory, Springer, Berlin, In: LNCS, 4076, ISBN 978-3-540-36075-9,
DOI: 10.1007/11792086_17,
[Conference or Workshop Item]

Buchmann, Johannes and Pyshkin, Andrei and Weinmann, Ralf-Philipp (2006):
Block Ciphers Sensitive to Gröbner Basis Attacks.
In: Topics in Cryptology - CT-RSA 2006 <San Jose, CA, USA,2006> ; (Lecture Notes in Computer Science ; 3860) ; 313-331 ; ISBN: 3-540-31033-9, [Conference or Workshop Item]

Buchmann, Johannes and Pyshkin, Andrei and Weinmann, Ralf-Philipp (2006):
A Zero-Dimensional Gröbner Basis for AES-128.
Berlin ; Heidelberg [u.a.], Springer, In: Fast software encryption : 13th International Workshop, FSE 2006; Graz, Austria, March 15 - 17, 2006; revised selected papers / Matthew Robshaw (Ed.). - Berlin ; Heidelberg [u.a.] : Springer, 2006, S. 78-88 (Lecture notes in computer science ; 4047) ISBN:, [Conference or Workshop Item]

Becker, Anja (2006):
Methods of Fault Analysis Attacks on Elliptic Curve Cryptosystems.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Buchmann, Johannes and Vollmer, Ulrich (2006):
CLC2006 - Workshop on Codes and Lattices in Cryptography.
[Other]

Buchmann, Johannes and May, Alexander and Vollmer, Ulrich (2006):
Perspectives for cryptographic long-term security.
In: >Commun. ACM, 49, (9), DOI: 10.1145/1151055,
[Article]

Buchmann, Johannes (2006):
Passwörter oder Smartcards zur Absicherung von Portalen?
(TI-2/06), [Report]

Buchmann, Johannes and Dahmen, Erik and May, Alexander and Vollmer, Ulrich (2006):
Krypto 2020.
In: >The Information Security Journal -(KES), pp. 74-83, 5, [Article]

Buchmann, Johannes and May, Alexander and Vollmer, Ulrich (2006):
Perspectives for cryptographic long-term security.
In: >Commun. ACM, pp. 50-55, 49, (9), [Article]

Buchmann, Johannes and Vollmer, Ulrich (2006):
A Terr algorithm for computations in the infrastructure of real-quadratic number fields.
In: >Journal de Théorie des Nombres de Bordeaux, pp. 559--572, 18, (3), [Article]

Baier, Harald and Straub, Tobias (2005):
Awareness by Doing. Ein neues Konzept zur Sensibilisierung von {IT}-Anwendern.
[Other]

Bakuri, Harini (2005):
Security Analysis and Implementation of Password-based Cryptosystem.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Baier, Harald and Ruppert, Markus (2004):
Interoperable and Flexible Digital Signatures for {E-Government} and {E-Commerce}.
(TI-6/04), [Report]

Biehl, Ingrid and Paulus, Sachar and Takagi, Tsuyoshi (2004):
Efficient Undeniable Signature Schemes Based on Ideal Arithmetic in Quadratic Orders.
In: >IJDCC: Designs, Codes and Cryptography, pp. 99-123, 31, (2), [Article]

Buchmann, Johannes and Coronado, Carlos and Döring, Martin and Engelbert, Daniela and Ludwig, Christoph and Overbeck, Raphael and Schmidt, Arthur and Vollmer, Ulrich and Weinmann, Ralf-Philipp (2004):
Post-Quantum Signatures.
[Other]

Buchmann, Johannes and Takagi, Tsuyoshi and Vollmer, Ulrich (2004):
Number field cryptography.
In: High Primes and Misdemeanours: Lectures in Honour of the 60th Birthday of Hugh Cowie Williams, 41, ISBN 200-8218-3353-7,
[Conference or Workshop Item]

Baier, Harald and Buchmann, Johannes and Busch, Christoph (2003):
Aus- und Weiterbildung in IT-Sicherheit.
Ingelheim, SecuMedia Verl., In: IT-Sicherheit im verteilten Chaos : Tagungsband 8. Deutscher IT-Sicherheitskongress des BSI 2003 / Bundesamt für Sicherheit in der Informationstechnik.- Ingelheim : SecuMedia Verl., 2003.- 531 S.- ISBN 3-922746-49-7.- S. 179-190, [Conference or Workshop Item]

Baier, Harald (2003):
A Fast {Java} Implementation of a Provably Secure Pseudo Random Bit Generator Based on the Elliptic Curve Discrete Logarithm Problem.
(TI-7/03), [Report]

Baier, Harald and Buchmann, Johannes and Busch, Christoph (2003):
{Aus-} und Weiterbildung in {IT}-Sicherheit.
(TI-2/03), [Report]

Baier, Harald and Köhler, Günter (2003):
How to Compute the Coefficients of the Elliptic Modular Function {j(z)}.
(TI-4/03), [Report]

Barraci, Nima and Becker, Sven (2003):
Generische Integration von Kryptoprozessoren in den {Java}-basierten {FlexiProvider}.
[Other]

Buchmann, Johannes and Schmidt, Arthur (2003):
Computing the structure of a finite abelian group.
(TI-5/03), [Report]

Buchmann, Johannes and Takagi, Tsuyoshi (2003):
Kryptographie - Chancen und Risiken.
(TI-6/03), [Report]

Buchmann, Johannes and Takagi, Tsuyoshi and Vollmer, Ulrich (2003):
Number field cryptography.
(TI-11/03), [Report]

Buchmann, Johannes and Sakurai, Kouichi and Takagi, Tsuyoshi (2002):
An IND-CCA2 Public-Key Cryptosystem with Fast Decryption.
In: ICISC 2002 - Information Security and Cryptology, 5th International Conference, Springer, Seoul, Korea, In: LNCS, ISBN {3-540-00716-4,
[Conference or Workshop Item]

Buchmann, Johannes and Ernst, Markus and Henhapl, Birgit and Huss, Sorin (2002):
Elliptische Kurven Kryptographie - hocheffizient und portabel.
In: >thema FORSCHUNG, Eingebette Systeme: Entwurf und Anwendung versteckter Computer, pp. 102-109, (1/2002), [Article]

Buchmann, Johannes (2002):
Theoretische Informatik.
In: 30 Jahre Informatik an deutschen Hochschulen. - Darmstadt : Techn. Univ., Fachbereich Informatik, 2002. - S. 114-115, Darmstadt, Techn. Univ., [Book Section]

Baier, Harald (2002):
Efficient Algorithms for Generating Elliptic Curves over Finite Fields Suitable for Use in Cryptography.
Technische Universit&auml;t Darmstadt, [Ph.D. Thesis]

Biehl, Ingrid and Buchmann, Johannes and Hamdy, Safuat and Meyer, Andreas (2002):
A Signature Scheme Based on the Intractability of Computing Roots.
In: >Des. Codes Cryptography, pp. 223-236, 25, (3), [Article]

Buchmann, Johannes (2002):
Cryptographic Protocols.
[Other]

Baier, Harald (2001):
Elliptic Curves of Prime Order over Optimal Extension Fields for Use in Cryptography.
In: INDOCRYPT 2001 - Second International Conference on Cryptology in India, Springer, Chennai, India, In: LNCS, ISBN 3-540-43010-5,
[Conference or Workshop Item]

Buchmann, Johannes and Hamdy, S. (2001):
A survey on IQ cryptography.
In: Public-key cryptography and computational number theory. Hrsg.: K. Alster, J. Urbanowicz, H.C. Wiliams. - Berlin, New York: de Gruyter, 2001. S. 1-15, Berlin, New York, de Gruyter, [Book Section]

Baier, Harald (2001):
Efficient Computation of Fourier Series and Singular Moduli with Application in Cryptography.
(TI-7/01), [Report]

Baier, Harald (2001):
Elliptic Curves of Prime Order over Optimal Extension Fields for Use in Cryptography.
(TI-11/01), [Report]

Baier, Harald and Buchmann, Johannes (2001):
Efficient Construction of Cryptographically Strong Elliptic Curves.
(TI-2/01), [Report]

Buchmann, Johannes (2001):
Wie sicher kann Sicherheit sein?
(TI-5/01), [Report]

Buchmann, Johannes and Hamdy, Safuat (2001):
A Survey on {IQ} Cryptography.
(TI-4/01), [Report]

Buchmann, Johannes and Sakurai, Kouichi and Takagi, Tsuyoshi (2001):
An {IND-CCA2} Public-Key Cryptosystem with Fast Decryption.
(TI-10/01), [Report]

Baier, Harald and Buchmann, Johannes (2000):
Efficient Construction of Cryptographically Strong Elliptic Curves.
In: INDOCRYPT 2000 - First International Conference in Cryptology in India, Springer, Calcutta, India, In: LNCS, ISBN 3-540-41452-5,
[Conference or Workshop Item]

Baier, Harald and Buchmann, Johannes (2000):
Efficient construction of cryptographically strong elliptic curves.
In: Progress in cryptology: INDOCRYPT 2000. Hrsg.: B. Roy, E. Okamoto. - Berlin, Heidelberg (u.a.): Springer, 2000 = Lecture notes in computer science; 1977. S. 191-202, Berlin, Heidelberg (u.a.), Springer, [Book Section]

Buchmann, Johannes and Maurer, M. and Möller, B. (2000):
Cryptography based on number fields with large regulator.
In: Journal de théorie des nombres de Bordeaux, pp. 293-307, 12, [Article]

Biehl, Ingrid and Buchmann, Johannes and Hamdy, Safuat and Meyer, Andreas (2000):
A Signature Scheme Based on the Intractability of Computing Roots.
(TI-1/00), [Report]

Buchmann, Johannes and Maurer, Markus and Möller, Bodo (2000):
Cryptography Based on Number Fields with Large Regulator.
(TI-5/00), [Report]

Buchmann, Johannes and Squirrel, D. (1999):
Kernels of integer matrices via modular arithmetic.
Darmstadt, Techn. Univ., FB 20, Inst. für Theoretische Informatik, [Book]

Buchmann, Johannes and Ruppert, M. and Tak, M. (1999):
FlexiPKI - Realisierung einer flexiblen Public-Key-Infrastruktur.
Darmstadt, Techn. Univ., FB 20, Inst. für Theoretische Informatik, [Book]

Biehl, Ingrid and Buchmann, Johannes and Hamdy, Safuat and Meyer, Andreas (1999):
Cryptographic Protocols Based on Intractability of Extracting Roots and Computing Discrete Logarithms.
(TI-16/99), [Report]

Biehl, Ingrid and Paulus, Sachar and Takagi, Tsuyoshi (1999):
Efficient Undeniable Signature Schemes based on Ideal Arithmetic in Quadratic Orders.
(TI-10/99), [Report]

Binisik, Emre (1999):
Sieben in Zahlkörpern und Funktionenkörpern.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Boivin, Michele (1999):
Anwendung hyperelliptischer Kurven in der Kryptographie.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Breuning, Manuel (1999):
Eine topologische Struktur für die Idealgruppe.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Buchmann, Johannes and Eisenbrand, Friedrich (1999):
On factor refinement in number fields.
In: >Mathematics of Computation, pp. 345-350, 68, (225), [Article]

Buchmann, Johannes and Maurer, Markus (1999):
Wie sicher ist die Public-Key-Kryptographie.
(TI-2/99), [Report]

Buchmann, Johannes and Ruppert, Markus and Tak, Markus (1999):
{FlexiPKI} - Realisierung einer flexiblen Public-Key-Infrastruktur.
(TI-22/99), [Report]

Buchmann, Johannes and Squirrel, Douglas (1999):
Kernels of Integer Matrices via Modular Arithmetic.
(TI-4/99), [Report]

Budnick, Michael (1999):
Zur Reduktion des {DL}-Problems für elliptische Kurven auf das {DL}-Problem in endlichen Körpern.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Backes, Werner (1998):
Berechnung kürzester Gittervektoren.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Buchmann, Johannes and Jacobson, Michael J. and Neis, Stefan and Theobald, Patrick and Weber, Damian (1998):
Sieving Methods for Class Group Computation.
(TI-8/98), [Report]

Buchmann, Johannes and Maurer, Markus (1998):
Approximate Evaluation of {L(1,chi-delta)}.
(TI-6/98), [Report]

Buchmann, Johannes and Weber, Damian (1998):
Discrete Logarithms: Recent Progress.
(TI-12/98), [Report]

Buchmann, Johannes and Paulus, Sachar (1997):
A One Way Function Based on Ideal Arithmetic in Number Fields.
In: CRYPTO '97 - 17th Annual International Cryptology Conference, Springer, Santa Barbara, California, USA, In: LNCS, ISBN 3-540-63384-7,
[Conference or Workshop Item]

Buchmann, Johannes and Paulus, S. (1997):
A one way function based on ideal arithmetic in number fields.
Darmstadt: Techn. Hochschule, FB 20, Inst. für Theoretische Informatik, 1997. 9 S,
Darmstadt, Techn. Hochschule, FB 20, FG Theoretische Informatik, [Book]

Biehl, Ingrid and Buchmann, Johannes (1997):
An analysis of the reduction algorithms for binary quadratic forms.
(TI-26/97), [Report]

Buchmann, Johannes and Jacobson, Michael J. and Teske, Edlyn (1997):
On some computational problems in finite abelian groups.
In: >Mathematics in Computation, pp. 1663-1687, 66, (220), [Article]

Buchmann, Johannes and Paulus, Sachar (1997):
A one way function based on ideal arithmetic in number fields.
(TI-5/97), [Report]

Buchmann, Johannes and Eisenbrand, F. (1996):
On factor refinement in number fields.
Darmstadt: Techn. Hochschule, FB 20, FG Theoretische Informatik, 1996,
Darmstadt, Techn. Hochschule, FB 20, FG Theoretische Informatik, [Book]

Buchmann, Johannes and Neis, S. (1996):
Algorithms for linear algebra problems over principal ideal rings.
Darmstadt: Techn. Hochschule, FB 20, FG Theoretische Informatik, 1996,
Darmstadt, Techn. Hochschule, FB 20, FG Theoretische Informatik, [Book]

Buchmann, Johannes and Jacobson, M. J. and Teske, E. (1996):
On some computational problems in finite abelian groups.
Darmstadt: Techn. Hochschule, FB 20, FG Theoretische Informatik, 1996,
Darmstadt, Techn. Hochschule, FB 20, FG Theoretische Informatik, [Book]

Biehl, Ingrid and Meyer, Bernd (1996):
Protocols for Collusion-Secure Asymmetric Fingerprintig.
(TI-1/96), [Report]

Buchmann, Johannes and Eisenbrand, Friedrich (1996):
On Factor Refinement in Number Fields.
(TI-5/96), [Report]

Buchmann, Johannes and Jacobson, Michael J. and Teske, Edlyn (1996):
On some computational problems in finite abelian groups.
(TI-2/96), [Report]

Buchmann, Johannes and Neis, Stefan (1996):
Algorithms for Linear Algebra Problems over Principal Ideal Rings.
(TI-7/96), [Report]

Bentz, Patrik (1995):
Eine effiziente Implementierung der verbesserten Buchberger Algorithmen und eine Datenstruktur für Polynome in mehreren Veründerlichen.
Universit&auml;t des Saarlandes, [Master Thesis]

Biehl, Ingrid and Buchmann, Johannes and Thiel, Christoph (1994):
Cryptographic Protocols Based on Discrete Logarithms in Real-quadratic Orders.
In: CRYPTO '94 - 14th Annual International Cryptology Conference, Springer, Santa Barbara, California, USA, In: LNCS, ISBN 3-540-58333-5,
[Conference or Workshop Item]

Buchmann, Johannes and Loho, Jürgen and Zayer, Jörg (1994):
An Implementation of the General Number Field Sieve.
In: CRYPTO '93 - 13th Annual International Cryptology Conference, Springer, Santa Barbara, California, USA, In: LNCS, ISBN 3-540-57766-1,
[Conference or Workshop Item]

Biehl, Ingrid (1994):
Definition and Existence of Super Complexity Cores.
In: ISAAC '94 - Algorithms and Computation, 5th International Symposium, Springer, Beijing, P. R. China, In: LNCS, ISBN 3-540-58325-4,
[Conference or Workshop Item]

Buchmann, Johannes (1994):
Reducing lattice bases by means of approximations.
In: ANTS-II - Algorithmic Number Theory, Second International Symposium, Springer, Talence, France, In: LNCS, ISBN 3-540-61581-4,
[Conference or Workshop Item]

Biehl, Ingrid and Buchmann, Johannes (1994):
Algorithms for quadratic orders.
In: >Mathematics of Computation, [Article]

Buchmann, Johannes and Lenstra, Hendrik W. (1994):
Approximating rings of integers in number fields.
In: >Journal de Théorie des Nombres de Bordeaux, 6, (2), [Article]

Bartholomes, Jutta (1993):
Gitterbasisreduktion im Reellen.
Universit&auml;t des Saarlandes, [Master Thesis]

Berger, Franz-Dieter (1993):
ECM - Faktorisieren mit elliptischen Kurven.
Universit&auml;t des Saarlandes, [Master Thesis]

Biehl, Ingrid (1993):
Eine Grundlegung der Average-Case Komplexitätstheorie.
Universit&auml;t des Saarlandes, [Ph.D. Thesis]

Buchmann, Johannes and Hollinger, Christine (1993):
On smooth ideals in number fields.
In: >Journal of Number Theory, [Article]

Buchmann, Johannes and Paulus, Sachar (1993):
Algorithms for finite abelian groups.
[Other]

Biehl, Ingrid and Buchmann, Johannes and Meyer, Bernd and Thiel, Christian and Thiel, Christoph (1992):
Tools for Proving Zero Knowledge.
In: EUROCRYPT '92 - Workshop on the Theory and Application of of Cryptographic Techniques, Springer, Balatonfüred, Hungary, In: LNCS, ISBN 3-540-56413-6,
[Conference or Workshop Item]

Buchmann, Johannes and Kessler, Volker (1992):
Computing a reduced lattice basis from a generating system.
[Other]

Buchmann, Johannes and van Sprang, Oliver (1992):
On short representations of orders and number fields.
[Other]

Buchmann, Johannes and Thiel, Christoph and Williams, Hugh (1992):
Short representations of quadratic integers.
[Other]

Buchmann, Johannes (1991):
Number Theoretic Algorithms and Cryptology.
In: FCT '91 - Fundamentals of Computation Theory, 8th International Symposium, Springer, Gosen, Germany, In: LNCS, ISBN 3-540-54458-5,
[Conference or Workshop Item]

Buchmann, Johannes and Düllmann, Stephan (1991):
On the Computation of Discrete Logarithms in Class Groups.
In: CRYPTO '90 - 10th Annual International Cryptology Conference, Springer, Santa Barbara, California, USA, In: LNCS, ISBN 3-540-54508-5,
[Conference or Workshop Item]

Buchmann, Johannes and Düllmann, Stephan (1991):
Distributed class group computation.
[Other]

Buchmann, Johannes and Müller, Volker (1991):
Computing the number of points on elliptic curves over finite prime fields.
In: International Symposium on Symbolic and Algebraic Computation-(ISSAC 1991), [Conference or Workshop Item]

Buchmann, Johannes and Roth, Ralf and Diehl, Matthias (1991):
{LiPS}: A System for distributed applications.
[Other]

Buchmann, Johannes and Williams, Hugh (1991):
Some remarks concerning the complexity of computing class groups of quadratic fields.
In: >Journal of Complexity, pp. 311-315, 7, (3), DOI: 10.1016/0885-064X(91)90039-Z,
[Article]

Buchmann, Johannes (1990):
A subexponential algorithm for the determination of class groups and regulators of algebraic number fields.
In: Séminaire de Théorie des Nombres, Paris 1988--1989, Birkhäuser Boston, In: Progr. Math., 91, [Conference or Workshop Item]

Buchmann, Johannes and Shoup, Victor (1990):
Constructing Nonresidues in Finite Fields and the Extended Riemann Hypothesis.
[Other]

Buchmann, Johannes and Düllmann, Stephan and Williams, Hugh (1989):
On the Complexity and Efficiency of a New Key Exchange System.
In: EUROCRYPT '89 - Workshop on the Theory and Application of of Cryptographic Techniques, Springer, Houthalen, Belgium, In: LNCS, ISBN 3-540-53433-4,
[Conference or Workshop Item]

C

Coudert, Fanny and Butin, Denis and Métayer, Daniel Le (2015):
Body-worn Cameras for Police Accountability: Opportunities and Risks.
In: Computer Law & Security Review (CLSR), pp. 749-762, 31, (6), [Article]

Cabarcas, Daniel and Demirel, Denise and Göpfert, Florian and Lancrenon, Jean and Wunderer, Thomas (2015):
An Unconditionally Hiding and Long-Term Binding Post-Quantum Commitment Scheme.
[Report]

Canova, Gamze and Volkamer, Melanie and Bergmann, Clemens and Borza, Roland and Reinheimer, Benjamin and Stockhardt, Simon and Tenberg, Ralf (2015):
Learn To Spot Phishing URLs with the Android NoPhish App.
In: Information Security Education Across the Curriculum - 9th (IFIP), Springer, Hamburg, Germany, In: IFIP Advances in Information and Communication Technology, DOI: 10.1007/978-3-319-18500-2_8,
[Conference or Workshop Item]

Canova, Gamze and Volkamer, Melanie and Bergmann, Clemens and Reinheimer, Benjamin (2015):
NoPhish App Evaluation: Lab and Retention Study.
In: NDSS Workshop on Usable Security 2015, Internet Society, San Diego, [Conference or Workshop Item]

Classen, Jiska and Braun, Johannes and Volk, Florian and Hollick, Matthias and Buchmann, Johannes and Mühlhäuser, Max (2015):
A Distributed Reputation System for Certification Authority Trust Management.
In: 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE UbiSafe Symposium), Helsinki, Finland, [Conference or Workshop Item]

Charfi, Ahmed (2014):
SAT-solving in Algebraic cryptanalysis.
TU Darmstadt, [Master Thesis]

Canova, Gamze and Volkamer, Melanie and Weiler, Simon (2014):
Poster: Password Entering and Transmission Security.
Scottsdale, Arizona, [Other]

Canova, Gamze and Volkamer, Melanie and Bergmann, Clemens and Borza, Roland
Mauw, Sjouke and Jensen, Christian Damsgaard (eds.) (2014):
NoPhish: An Anti-Phishing Education App.
In: 10th International Workshop on Security and Trust Management in conjunction with ESORICS 2014, Springer International Publishing, Wroclaw, Poland, In: Lecture Notes in Computer Science, 8743, [Conference or Workshop Item]

Conrad, Bernd and Shirazi, Fatemeh (2014):
Analyzing the Effectiveness of DoS Attacks on Tor.
In: 7th International Conference on Security of Information and Networks (SIN 2014), Glasgow, UK, [Conference or Workshop Item]

Conrad, Bernd and Shirazi, Fatemeh (2014):
A Survey on Tor and I2P.
In: Ninth International Conference on Internet Monitoring and Protection (ICIMP2014), Paris, France, [Conference or Workshop Item]

Cholakov, Kostadin and Biemann, Chris and Eckle-Kohler, Judith and Gurevych, Iryna
Calzolari, Nicoletta and Choukri, Khalid and Declerck, Thierry and Loftsson, Hrafn and Maegaard, Bente and Mariani, Joseph and Moreno, Asuncion and Odijk, Jan and Piperidis, Stelios (eds.) (2014):
Lexical Substitution Dataset for German.
In: Proceedings of the 9th International Conference on Language Resources and Evaluation (LREC 2014), European Language Resources Association (ELRA), [Online-Edition: http://www.lrec-conf.org/proceedings/lrec2014/pdf/545_Paper....],
[Conference or Workshop Item]

Classen, Jiska (2014):
Reputation Systems for Trust Management in the Web PKI.
TU Darmstadt, [Master Thesis]

Conrad, Bernd (2014):
Analyzing the Effectiveness of DoS Attacks on Tor.
TU Darmstadt, [Master Thesis]

Cabarcas, Daniel and Göpfert, Florian and Weiden, Patrick (2013):
Provably Secure LWE-Encryption with Uniform Secret.
[Other]

Cayrel, Pierre-Louis and Alaoui, Sidi Mohamed El Yousfi and Véron, Pascal and Hoffmann, Gerhard (2012):
An improved threshold ring signature scheme based on error correcting codes.
In: WAIFI 2012, pp. 45 - 63, LNCS, (7369), [Article]

Cayrel, Pierre-Louis and Alaoui, Sidi Mohamed El Yousfi and Hoffmann, Gerhard and Meziani, Mohammed and Niebuhr, Robert
Kim, Tai-Hoon and Adeli, Hojjat and Robles, Rosslin John and Balitanas, Maricel (eds.) (2011):
Recent Progress in Code-Based Cryptography.
In: The 5th International Conference on Information Security and Assurance - ISA-2011, Springer, Brno University, Czech Republic, In: LNCS, [Conference or Workshop Item]

Cayrel, Pierre-Louis and Alaoui, Sidi Mohamed El Yousfi and Günther, Felix and Hoffmann, Gerhard and Rothe, Holger (2011):
Efficient implementation of code-based identification/signature schemes.
In: WEWoRC 2011, [Article]

Cayrel, Pierre-Louis and Hoffmann, Gerhard and Schneider, Michael (2011):
GPU Implementation of the Keccak Hash Function Family.
In: ISA 2011 - The 5th International Conference on Information Security and Assurance, Brno University, Czech Republic, [Conference or Workshop Item]

Cayrel, Pierre-Louis and Hoffmann, Gerhard and Schneider, Michael (2011):
GPU Implementation of the Keccak Hash Function Family.
In: The 5th International Conference on Information Security and Assurance - ISA 2011, Brno University, Czech Republic, [Conference or Workshop Item]

Cayrel, Pierre-Louis and Lindner, Richard and Rückert, Markus and Silva, Rosemberg (2010):
Improved Zero-knowledge Identification with Lattices.
In: The Fourth International Conference on Provable Security (ProvSec 2010), Springer, In: LNCS, [Conference or Workshop Item]

Cayrel, Pierre-Louis and Véron, Pascal and Alaoui, Sidi Mohamed El Yousfi (2010):
A zero-knowledge identification scheme based on the q-ary Syndrome Decoding problem.
In: Proceedings of the Seventeenth Workshop on Selected Areas in Cryptography(SAC2010), SAC2010, [Conference or Workshop Item]

Cayrel, Pierre-Louis and Lindner, Richard and Rückert, Markus and Silva, Rosemberg (2010):
A Lattice-Based Threshold Ring Signature Scheme.
In: The first international conference on cryptology and Information security, LatinCrypt 2010, Springer, In: LNCS, [Conference or Workshop Item]

Cayrel, Pierre-Louis and Alaoui, Sidi Mohamed El Yousfi (2010):
Dual Construction of Stern-based Signature Schemes.
In: International Conference on Computer, Electrical, and Systems Sciences, and Engineering"ICCESSE 2010", 63 March 2010, [Conference or Workshop Item]

Chehimi, Nemr (2009):
Gitterbasisreduktion in Java.
Technische Universität Darmstadt, [Master Thesis]

Cakir-Tas, Sueheyla (2008):
Symmetrische Blockchiffren.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Clos, Johannes (2008):
Secure Client Platforms for Remote Internet Voting.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Chen, Jun (2007):
Verifiable Mixnets Techniques and Prototype Implementation.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Coronado García, Luis Carlos (2006):
Provably Secure and Practical Signature Schemes.
Darmstadt, Technische Universität, TU Darmstadt, [Online-Edition: urn:nbn:de:tuda-tuprints-6421],
[Ph.D. Thesis]

Coronado, Carlos (2005):
Can Schönhage multiplication speed up the RSA decryption or encryption?
In: Conference on Cryptology - MoraviaCrypt '05, [Conference or Workshop Item]

Coronado, Carlos (2005):
Improvements to the Merkle signature scheme.
In: Conference on Cryptology - MoraviaCrypt &#039;05, [Conference or Workshop Item]

Caspary, Jan and Weber, Martin (2001):
Hardwarebeschleunigung der Punktmultiplikation über GF(2<sup>n</sup>) mit dem Elliptic Curve KryptoProzessor {(ECP)} am Beispiel des {ECDSA}-Signaturverfahrens.
[Other]

Coroama, Vlad and Ruppert, Markus and Seipel, Michael and Tak, Markus (2001):
{Java}-basierte Kryptographie wird interoperabel.
(TI-1/01), [Report]

Coroama, Vlad (2000):
Flexible Anbindung von SmartCards an eine {Java}-Sicherheitsinfrastruktur.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Carls, Robert (1999):
Punktezählalgorithmen für ordinäre elliptische Kurven über endlichen Körpern der Charakteristik 2.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Crnjak, Markus (1999):
{ElG}amal-Verschlüsselung mit elliptischen Kurven über Körpern der Charakteristik größer 3.
Technische Universit&auml;t Darmstadt, [Master Thesis]

D

Degabriele, Jean Paul and Janson, Christian and Struck, Patrick (2019):
Sponges Resist Leakage: The Case of Authenticated Encryption.
In: ASIACRYPT 2019 - the 25th Annual International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December, 8-12, [Online-Edition: https://eprint.iacr.org/2019/1034.pdf],
[Conference or Workshop Item]

Demmler, Daniel and Rindal, Peter and Rosulek, Mike and Trieu, Ni (2018):
PIR-PSI: Scaling Private Contact Discovery.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), De Gruyter Open, pp. 159-178, DOI: 10.1515/popets-2018-0037,
[Article]

Deligeorgopoulos, Efstathios (2018):
Evaluation of Proactive Secret Sharing for Long-Term Secure Storage.
TU Darmstadt, [Master Thesis]

Dietsch, Sascha Thorsten (2017):
Integration des gitterbasierten LARA-Verschlüsselungsverfahrens in JCA.
TU Darmstadt, [Master Thesis]

Demirel, Denise and Krenn, Stephan and Loruenser, Thomas and Traverso, Giulia (2016):
Efficient Third Party Auditing for a Distributed Storage System.
In: International Conference on Availability, Reliability and Security - ARES 2016, IEEE, Salzburg, Austria, [Conference or Workshop Item]

Diedrich, Lennart and Jattke, Patrick and Murati, Lulzim and Senker, Matthias and Wiesmaier, Alexander (2016):
Comparison of Lightweight Stream Ciphers: MICKEY 2.0, WG-8, Grain and Trivium.
[Report]

Dix, Isabella (2016):
Implementation of a Reputation System for CA Trust Management.
TU Darmstadt, [Master Thesis]

Dagdelen, Özgür and Gajek, Sebastian and Göpfert, Florian (2015):
Learning With Errors in the Exponent.
In: 18th International Conference on information Security and Cryptology (ICISC) 2015, Springer, Seoul, Korea, In: LNCS, [Conference or Workshop Item]

Diedrich, Lennart and Murati, Lulzim and Wiesmaier, Alexander (2015):
Stream ciphers in the IoT: Grain and Trivium.
[Report]

Demirel, Denise and Lancrenon, Jean (2015):
How to Securely Prolong the Computational Bindingness of Pedersen Commitments.
[Report]

Dogan, Ferit (2015):
Design and Implementation of Plug-ins for JCrypTool.
TU Darmstadt, [Master Thesis]

Ding, Jintai and Petzoldt, Albrecht and Wang, Lih-Chung (2014):
The Cubic Simple Matrix Encryption Scheme.
In: PQCrypto 2014, Springer, Waterloo, Canada, In: LNCS, [Conference or Workshop Item]

Dagdelen, Özgür and Venturi, Daniele (2014):
A Multi-Party Protocol for Privacy-Preserving Cooperative Linear System of Equations.
In: BalkancryptSec 2014 - International Conference on Cryptography and Information security, Springer, Istanbul, Turkey, In: LNCS, ISBN 978-3-319-21356-9,
DOI: 10.1007/978-3-319-21356-9_11,
[Conference or Workshop Item]

Dagdelen, Özgür and El Bansarkhani, Rachid and Göpfert, Florian and Güneysu, Tim and Oder, Tobias and Pöppelmann, Thomas and Sanchez, Ana Helena and Schwabe, Peter (2014):
High-speed signatures from standard lattices.
In: Latincrypt 2014, Florianópolis, Brazil, [Conference or Workshop Item]

Demirel, Denise (2014):
Universally Verifiable Poll-Site Voting Schemes Providing Everlasting Privacy.
TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/4019],
[Ph.D. Thesis]

Dagdelen, Özgür and Venturi, Daniele (2014):
A Second Look at Fischlin’s Transformation.
In: Africacrypt 2014, Marrakech, Morocco, [Conference or Workshop Item]

Dagdelen, Özgür and Fischlin, Marc (2014):
Intercepting Tokens in Cryptographic Protocols: The Empire Strikes Back in the Clone Wars.
In: ISIT 2014 - IEEE International Symposium on Information Theory, Honolulu HI USA, [Conference or Workshop Item]

Demirel, Denise and Henning, Maria and van de Graaf, Jeroen and Ryan, Peter Y. A. and Buchmann, Johannes
Heather, James and Schneider, Steve and Teague, Vanessa (eds.) (2013):
Prêt à Voter Providing Everlasting Privacy.
In: VoteID 2013: The 4th International Conference on e-Voting and Identity, 2013, Springer, University of Surrey, Guildford, UK, In: LNCS, [Conference or Workshop Item]

Dagdelen, Özgür and Fischlin, Marc and Gagliardoni, Tommaso (2013):
The Fiat-Shamir Transformation in the Quantum World.
In: ASIACRYPT 2013, Bangalore, India, [Conference or Workshop Item]

Demirel, Denise and Henning, Maria (2012):
Legal Analysis of Privacy Weaknesses in Poll-Site eVoting Systems.
In: Jusletter IT - Die Zeitschrift für IT und Recht, Editions Weblaw, [Online-Edition: https://jusletter-it.weblaw.ch/redaktion.html],
[Article]

Demirel, Denise and van de Graaf, Jeroen and Araújo, Roberto (2012):
Improving Helios with Everlasting Privacy Towards the Public.
In: Electronic Voting Technology Workshop / Workshop on Trustworthy Elections - EVT/WOTE 2012, Bellevue, WA, [Conference or Workshop Item]

Demirel, Denise and Henning, Maria and Ryan, Peter Y. A. and Schneider, Steve and Volkamer, Melanie (2011):
Feasibility Analysis of Pret a Voter for German Federal Elections.
In: 3rd international conference on e-voting and identity (VoteID 2011), Springer, Tallinn, Estonia, 7187 2012, ISBN 978-3-642-32746-9,
DOI: 10.1007/978-3-642-32747-6_10,
[Conference or Workshop Item]

Demirel, Denise and Frankland, Richard and Popovic, Darko and Volkamer, Melanie
Parycek, Peter and Kripp, Melanie J and Noella, Edelmann (eds.) (2011):
Voting software to support election preparation, counting, and tallying.
In: CeDEM11 Proceedings of the International Conference for E-Democracy and Open Government, Edition Donau-Universität Krems, [Conference or Workshop Item]

Demirel, Denise (2010):
Effizientes Lösen linearer Gleichungssysteme über GF(2) mit GPUs.
TU Darmstadt, [Master Thesis]

Dagdelen, Özgür and Schneider, Michael (2010):
Parallel Enumeration of Shortest Lattice Vectors.
In: Euro-Par 2010, Springer, In: LNCS, 6272, [Conference or Workshop Item]

Dahmen, Erik and Krauß, Christoph
Garay, Christoph A. and Miyaji, Atsuko and Otsuka, Akira (eds.) (2009):
Short Hash-Based Signatures for Wireless Sensor Networks.
In: CANS 2009, Springer, Kanazawa, Japan, In: LNCS, ISBN 978-3-540-89640-1,
[Conference or Workshop Item]

Deußer, Clemens and Reubold, Jan (2009):
Design und Implementierung kryptographischer Funktionen und Protokolle des elektronischen Personalausweises.
TU Darmstadt, [Master Thesis]

Dahmen, Erik (2009):
Post-quantum signatures for today.
Darmstadt, Technische Universität, TU Darmstadt, [Online-Edition: urn:nbn:de:tuda-tuprints-13196],
[Ph.D. Thesis]

dos Santos Araujo, Roberto Samarone (2008):
On Remote and Voter-Verifiable Voting.
Darmstadt, Technische Universität, TU Darmstadt, [Online-Edition: urn:nbn:de:tuda-tuprints-12128],
[Ph.D. Thesis]

Dahmen, Erik and Okeya, Katsuyuki and Takagi, Tsuyoshi and Vuillaume, Camille
Buchmann, Johannes and Ding, Jintai (eds.) (2008):
Digital Signatures out of Second-Preimage Resistant Hash Functions.
In: PQCrypto 2008, Springer, Cincinnati, USA, In: LNCS, ISBN 978-3-540-88402-6,
[Conference or Workshop Item]

Döring, Martin (2008):
On the Theory and Practice of Quantum-Immune Cryptography.
Darmstadt, Technische Universität, TU Darmstadt, [Online-Edition: urn:nbn:de:tuda-tuprints-10729],
[Ph.D. Thesis]

Ding, Jintai and Buchmann, Johannes and Mohamed, Mohamed Saied Emam and Mohamed, Wael Said Abd Elmageed and Weinmann, Ralf-Philipp (2008):
MutantXL.
In: SCC 2008, [Conference or Workshop Item]

Dietrich, Christoph (2008):
Maximale Sicherheit im Identitymanagement bei optimaler Benutzbarkeit des Systems.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Detken, Kai-Oliver and Gitz, Stephan and Bartsch, Steffen and Sethmann, Richard
Horster, Patrick (ed.) (2008):
Trusted Network Connect -- {Sicherer Zugang ins Unternehmensnetz}.
In: D.A.CH. Security 2008, syssec Verlag, [Conference or Workshop Item]

Ding, Jintai and Lindner, Richard (2007):
Identifying Ideal Lattices.
[Other]

Dahmen, Erik and Okeya, Katsuyuki and Schepers, Daniel (2007):
Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography.
In: ACISP 2007 - Australasian Conference on Information Security and Privacy, Springer, In: LNCS, 4586, ISBN 978-3-540-73457-4,
DOI: 10.1007/978-3-540-73458-1_19,
[Conference or Workshop Item]

Dahmen, Erik and Okeya, Katsuyuki and Takagi, Tsuyoshi (2007):
A New Upper Bound for the Minimal Density of Joint Representations in Elliptic Curve Cryptosystems.
In: >IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, Special Section on Discrete Mathematics and Its Applications, pp. 952-959, E90-A, (5), [Article]

Drahavets, Maryia (2006):
Flexible Anbindung von Smartcards an eine Sicherheitsinfrastruktur.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Dahmen, Erik (2005):
Efficient Algorithms for Multi-Scalar Multiplications.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Dahmen, Erik and Okeya, Katsuyuki and Takagi, Tsuyoshi (2005):
Efficient Left-to-Right Multi-Exponentiations.
(TI-2/05), [Report]

Dobre, Dan and Mühleisen, Matthias (2003):
Using the Shared {VM} Jini Utility.
Technische Universit&auml;t Darmstadt, [Other]

Dambruch, Jens (2001):
Framework zur flexiblen Formularverarbeitung im Rahmen von {FlexiTRUST} Formulare, Verarbeitungslogik und Ergebnisse.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Denny, Thomas (1997):
Lösen dünn besetzter Gleichungssysteme über endlichen Körpern.
Universit&auml;t des Saarlandes, [Ph.D. Thesis]

Denny, Thomas and Müller, Volker (1996):
On the reduction of composed relations from the number field sieve.
In: International Algorithmic Number Theory Symposium-(ANTS), [Conference or Workshop Item]

Denny, Thomas and Dodson, Bruce and Lenstra, Arjen and Manasse, Mark (1994):
On the Factorization of {RSA}-120.
In: CRYPTO’ 93 - Advances in Cryptology, Springer, In: LNCS, 773, DOI: 10.1007/3-540-48329-2_15,
[Conference or Workshop Item]

Denny, Thomas (1993):
Faktorisieren mit dem Quadratischen Sieb.
Universit&auml;t des Saarlandes, [Master Thesis]

Düllmann, Stephan (1991):
Ein Algorithmus zur Bestimmumg positiv definiter binaerer quadratischer Formen.
Universität des Saarlandes, [Ph.D. Thesis]

Düllmann, Stephan (1988):
Ein neues Verfahren zum öffentlichen Schlüsselaustausch.
Universit&auml;t D&uuml;sseldorf, [Other]

E

El Bansarkhani, Rachid (2018):
LARA - A Design Concept for Lattice-based Encryption.
In: ePrint Archive, (Report 2017/049), [Report]

El Bansarkhani, Rachid and Sturm, Jan (2016):
An Efficient Lattice-based Multisignature Scheme with Applications to Bitcoins.
In: 15th International Conference on Cryptology and Network Security - CANS 2016, Milan, Italy, [Conference or Workshop Item]

El Bansarkhani, Rachid and El Kaafarani, Ali (2016):
Post-Quantum Attribute-Based Signatures from Lattice Assumptions.
[Other]

Erbenich, Vanessa (2016):
On the Efficiency of Lattice-Based Encryption.
TU Darmstadt, [Master Thesis]

El Bansarkhani, Rachid (2015):
On the Design and Improvement of Lattice-based Cryptosystems.
Darmstadt, Technische Universität, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/4969],
[Ph.D. Thesis]

El Bansarkhani, Rachid and Dagdelen, Özgür and Buchmann, Johannes (2015):
Augmented Learning with Errors: The Untapped Potential of the Error Term.
In: Financial Cryptography and Data Security - 19th International Conference, FC 2015, Puerto Rico, January 26 - 30, 2015, Springer, Isla Verde, Puerto Rico, [Conference or Workshop Item]

El Bansarkhani, Rachid and Buchmann, Johannes (2015):
High Performance Lattice-based CCA-secure Encryption.
In: Cryptology ePrint Archive, p. 20, [Article]

El Bansarkhani, Rachid and Buchmann, Johannes
Pointcheval, David and Vergnaud, Damien (eds.) (2014):
Towards Lattice Based Sequential Aggregate Signatures.
In: Progress in Cryptology - AFRICACRYPT 2014 - 7th International Conference on Cryptology in Africa, Springer, Marrakesh, Morocco, In: LNCS, ISBN 978-3-319-06733-9,
[Conference or Workshop Item]

El Bansarkhani, Rachid and Buchmann, Johannes (2014):
LCPR: High Performance Compression Algorithm for Lattice-Based Signatures and Schnorr-like Constructions.
In: IACR Cryptology ePrint Archive 2014: 334, [Conference or Workshop Item]

El Bansarkhani, Rachid and Buchmann, Johannes
Lange, Tanja and Lauter, Kristin and Lisonek, Petr (eds.) (2013):
Improvement and Efficient Implementation of a Lattice-based Signature Scheme.
In: Selected Areas in Cryptography 2013 (SAC'13), Simon Fraser University, Burnaby, British Columbia, Canada, In: LNCS, [Conference or Workshop Item]

EL Yousfi Alaoui, Sidi Mohamed (2013):
Code-based Identification and Signature Schemes.
Darmstadt, TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/3485],
[Ph.D. Thesis]

Egert, Rolf (2013):
Lattice-based Signatures.
TU Darmstadt, [Master Thesis]

El Bansarkhani, Rachid and Cabarcas, Daniel and Kuo, Po-Chun and Schmidt, Patrick and Schneider, Michael (2012):
A Selection of Recent lattice-Based Signature and Encryption Schemes.
In: Tatra Mountains Mathematical Publications, pp. 81-102, 53, [Article]

El Bansarkhani, Rachid and Meziani, Mohammed (2012):
An Efficient Lattice-based Secret Sharing Construction.
In: WISTP - Workshop in Information Security Theory and Practice 2012, Springer, London, UK, In: LNCS, [Conference or Workshop Item]

El Bansarkhani, Rachid (2010):
Solving Lattice Problems with Voronoi Cells.
TU Darmstadt, [Master Thesis]

Errabih, Abdelhafid (2008):
Entwurf und Implementierung eines Clients zur Funktionalitäts{ü}berpr{ü}fung von Chipkarten - am Beispiel des Heilberufsausweises.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Ederov, Boris (2007):
Merkle Tree Traversal Techniques.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Engelbert, Daniela and Overbeck, Raphael and Schmidt, Arthur (2007):
A Summary of McEliece-Type SCryptosystems and their Security.
In: >Journal of Mathematical Cryptology, pp. 151-199, 1, (2), [Article]

Eckart, Marc (2006):
Verwaltung von Identitäten von {PKI} -Teilnehmern in der Registration Authority.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Ehli, Oliver (2002):
{ElGamal-Signaturen} mit elliptischen Kurven.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Ender, Christoph (2002):
Verwaltung eines verteilten Systems mit {Java} und Servlets.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Ernst, Markus and Henhapl, Birgit and Huss, Sorin and Klupsch, Steffen (2002):
{FPGA} based Hardware Acceleration for Elliptic Curve Public Key Cryptosystems.
[Other]

Ernst, Markus and Henhapl, Birgit (2001):
High Performance {ECDSA} over F(2<sup>n</sup>) based on {Java} with Hardware Acceleration.
(TI-6/01), [Report]

F

Fojtik, Roman (2016):
Salt Synchronization Service.
TU Darmstadt, [Master Thesis]

Fleisch, Gilbert (2016):
Towards policy checks on passwords via fully homomorphic encryption.
TU Darmstadt, [Master Thesis]

Faraon, Montathar and Stenberg, Georg J. H. and Budurushi, Jurlind and Kaipainen, Mauri
Parycek, Peter and Sachs, Michael and Skoric, Marko (eds.) (2014):
Positive but skeptical - A study of attitudes towards Internet voting in Sweden.
In: CeDEM Asia 2014: Proceedings of the International Conference for E-Democracy and Open Government, Münster: Edition Donau-Universität Krems, Hong Kong, ISBN 978-3-902505-71-2,
[Conference or Workshop Item]

Franke, Daniel (2014):
Risk Simulations for the Web PKI.
Darmstadt, TU Darmstadt, [Master Thesis]

Fontein, Felix and Schneider, Michael and Wagner, Urs (2013):
A Polynomial Time Version of LLL With Deep Insertions.
In: International Workshop on Coding and Cryptography - WCC 2013, Bergen (Norway), [Conference or Workshop Item]

Fehr, Victoria (2012):
Sophisticated Public-Key Encryption.
Tu Darmstadt, [Master Thesis]

Frankland, Richard and Demirel, Denise and Budurushi, Jurlind and Volkamer, Melanie (2011):
Side-channels and eVoting machine security: Identifying vulnerabilities and defining requirements.
In: International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE'11), IEEE, Trento, Italy, ISBN 978-1-4577-0951-7,
DOI: 10.1109/REVOTE.2011.6045914,
[Conference or Workshop Item]

Fischer-Hübner, Simone and Grimm, Rüdiger and Lo Iacono, Luigi and Möller, Sebastian and Müller, Günter and Volkamer, Melanie (2011):
Gebrauchstaugliche Informationssicherheit.
In: Die Zeitschrift für Informationssicherheit - Usable Security and Privacy, p. 14, [Article]

Fleck, Matthias (2006):
Zur Benutzbarkeit von {PKI}-Anwendungen im praktischen Einsatz.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Fritsch, Sebastian (2006):
Towards Secure Electronic Workflows Examples of Applied {PKI}.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Frommer, J. and Wiesmaier, Alexander and Araújo, Roberto and Lippert, Marcus
Zhou, Jianying and Yung, Moti and Bao, Feng (eds.) (2006):
On Firewalls and Tunneling.
In: Industrial Proceedings of the 4th International Conference on Applied Cryptography and Network Security (ACNS&#039;06), Singapore, [Conference or Workshop Item]

Fan, Rong (2005):
On the Efficiency Analysis of {wNAF} and {wMOF}.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Feldgen, Lutz (2002):
Analyse von Enterprise Application Servern und Datenbank Management Systemen für {FlexiTRUST}.
Technische Universit&auml;t Darmstadt, [Other]

Feldgen, Lutz and Winkler, Markus (2002):
Design und Implementierung der {FlexiTRUST-CA} als {Java} Enterprise Application.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Fischer, Mike (2002):
Angriff auf ein {PIN/TAN}-gestütztes Online-Banking-Verfahren.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Franke, Sylvain (2002):
Deanymisierbare elektronische Zahlungsmittel - ein Verleich zweier Implementationen.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Fertig, Thomas (2000):
Digitale Signaturen mit elliptischen Kurven über GF(2<sup>n</sup>).
Technische Universit&auml;t Darmstadt, [Master Thesis]

Fuhrmann, Arnulf (2000):
Verteilte effiziente RSA-Schlüsselerzeugung in JAVA.
[Other]

Fischer, Johannes (1996):
Integration von {Ebene-1-Softwarefehlertoleranz} in {LiPS}.
Universit&auml;t des Saarlandes, [Master Thesis]

G

Graf, Holger and Schwarz, Reinhard and Becker, Tilman and Mück, Jürgen
Goldstein, Denise and Schneider, Tidarat and Braun, Johannes (eds.) (2019):
SCIKE Innovationsbericht - Innovation durch Internationalisierung.
TU Darmstadt, [Online-Edition: https://software-cluster.org/wp-content/uploads/2019/08/GESA...],
[Report]

Geihs, Matthias and Nikiforov, Oleg and Demirel, Denise and Sauer, Alexander and Butin, Denis and Günther, Felix and Alber, Gernot and Walther, Thomas and Buchmann, Johannes (2019):
The Status of Quantum-Based Long-Term Secure Communication over the Internet.
In: IEEE Transactions on Sustainable Computing, IEEE, ISSN 2377-3782,
DOI: 10.1109/TSUSC.2019.2913948,
[Online-Edition: https://ieeexplore.ieee.org/document/8703121],
[Article]

Geihs, Matthias and Schabhüser, Lucas and Buchmann, Johannes (2019):
Efficient Proactive Secret Sharing for Large Data via Concise Vector Commitments.
Springer, In: International Conference on Codes, Cryptology, and Information Security (C2SI) 2019, Rabat, Morocco, April 22 - 24, 2019, In: LNCS, [Online-Edition: http://www.c2si-conference.org/],
[Conference or Workshop Item]

Geihs, Matthias and Buchmann, Johannes (2018):
ELSA: Efficient Long-Term Secure Storage of Large Datasets.
In: International Conference on Information Security and Cryptology (ICISC) 2018, Springer, Seoul, Korean, Nov 28, 2018 - Nov 30, 2018, In: LNCS, [Online-Edition: http://www.wikicfp.com/cfp/program?id=1397&s=ICISC&f=Interna...],
[Conference or Workshop Item]

Guski, Florian (2018):
Simulation of the Quantum Hybrid Attack in Q#.
TU Darmstadt, [Bachelor Thesis]

Geihs, Matthias and Karvelas, Nikolaos and Katzenbeisser, Stefan and Buchmann, Johannes (2018):
PROPYLA: Privacy Preserving Long-Term Secure Storage.
In: SCC Workshop @ AsiaCCS 2018, Songdo, Incheon, Korea, In: The Sixth International Workshop on Security in Cloud Computing (SCC), In: ACM, [Conference or Workshop Item]

Geihs, Matthias (2018):
Long-Term Protection of Integrity and Confidentiality – Security Foundations and System Constructions.
Darmstadt, Technische Universität, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8094],
[Ph.D. Thesis]

Göpfert, Florian and van Vredendaal, Christine and Wunderer, Thomas (2017):
A Hybrid Lattice Basis Reduction and Quantum Search Attack on LWE.
In: PQCrypto 2017 - Eighth International Conference on Post-Quantum Cryptography, [Conference or Workshop Item]

Geihs, Matthias and Demirel, Denise and Buchmann, Johannes (2016):
A security analysis of techniques for long-term integrity protection.
In: 2016 Privacy, Security and Trust Conference, Auckland, New Zealand, [Conference or Workshop Item]

Gerber, Nina and McDermott, Ronja and Volkamer, Melanie and Vogt, Joachim (2016):
Understanding information security compliance - Why goal setting and rewards might be a bad idea.
In: International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), University of Plymouth, Frankfurt, Germany, 10., [Conference or Workshop Item]

Göpfert, Florian (2016):
Securely Instantiating Cryptographic Schemes Based on the Learning with Errors Assumption.
Darmstadt, Technische Universität, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5850],
[Ph.D. Thesis]

Gagliotti Vigil, Martín Augusto (2015):
Trustworthy and Efficient Protection Schemes for Digital Archiving.
Darmstadt, TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/4669],
[Ph.D. Thesis]

Gutmann, Andreas and Renaud, Karen and Volkamer, Melanie (2015):
Nudging Bank Account Holders Towards More Secure PIN Management.
In: Journal of Internet Technology and Secured Transaction (JITST), Infonomics Society, 4, DOI: 10.20533/jitst.2046.3723.2015.0049,
[Conference or Workshop Item]

Ganji, Fatemeh and Krämer, Juliane and Seifert, Jean-Pierre and Tajik, Shahin (2015):
Lattice Basis Reduction Attack against Physically Unclonable Functions.
In: 22nd ACM Conference on Computer and Communications Security (CCS 2015), Denver, Colorado, US, [Conference or Workshop Item]

Geihs, Matthias and Demirel, Denise and Buchmann, Johannes (2015):
On the Security of Long-lived Archiving Systems based on the Evidence Record Syntax.
In: Codes, Cryptology and Information Security, Springer, Mohammed V University, Rabat, Morocco, [Conference or Workshop Item]

Geihs, Matthias and Cabarcas, Daniel
Aranha, Diego F. and Menezes, Alfred (eds.) (2014):
Efficient Integer Encoding for Homomorphic Encryption via Ring Isomorphisms.
In: 3rd International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2014, Springer, Florianópolis, Brazil, In: LNCS, ISBN 978-3-319-16295-9,
[Conference or Workshop Item]

Gutmann, Andreas and Matsuura, Kanta (2013):
The use of linguistics in cryptography and its application to improve the HB protocol.
Kagawa, Japan, [Other]

Gleser, Michael (2013):
Policy-basierter Vergleich von Zertifizierungspraktiken innerhalb der Web-PKI.
TU Darmstadt, [Master Thesis]

Geihs, Matthias (2013):
Evaluation of homomorphic encryption for machine learning.
TU Darmstadt, [Master Thesis]

Guo, Sheng (2013):
Integration von vorwärtssicheren Signaturverfahren in die CA Infrastruktur.
[Report]

Göttert, Norman and Feller, Thomas and Schneider, Michael and Huss, Sorin and Buchmann, Johannes
Prouff, Emmanuel and Schaumont, Patrick (eds.) (2012):
On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes.
In: Workshop on Cryptographic Hardware and Embedded Systems (CHES 2012), Springer, Leuven, Belgium, In: LNCS, ISBN 978-3-642-33026-1,
[Conference or Workshop Item]

Göttert, Norman (2012):
Hardware and Software Implementation of an LWE-Based Encryption Scheme.
TU Darmstadt, [Master Thesis]

Gharadaghy, Rojan (2010):
Funktion und Realisierung der Telematikinfrastruktur für die elektronische Gesundheitskarte unter besonderer Betrachtung der Public-Key-Infrastruktur.
TU Darmstadt, [Master Thesis]

Grimm, Rüdiger and Hupf, Katharina and Volkamer, Melanie
Krimmer, Robert and Grimm, Rüdiger (eds.) (2010):
A Formal IT-Security Model for the Correction and Abort Requirement of Electronic Voting.
In: Electronic Voting 2010, EVOTE 2010, 4th International Conference, Co-organized by Council of Europe, Gesellschaft für Informatik and E-Voting.CC, July 21st - 24th, 2010, in Castle Hofen, Bregenz, Austria, In: LNI, 167, ISBN 978-3-88579-261-1,
[Conference or Workshop Item]

Gharadaghy, Rojan and Volkamer, Melanie (2010):
Verifiability in Electronic Voting - Explanations for Non Security Experts.
In: Electronic Voting 2010, EVOTE 2010, 4th International Conference, Co-organized by Council of Europe, Gesellschaft für Informatik and E-Voting.CC, July 21st - 24th, 2010, in Castle Hofen, Bregenz, Austria, In: LNI, ISBN 978-3-88579-261-1,
[Conference or Workshop Item]

Gaber, Michael (2009):
Entwurf und Implementierung eines Plug-Ins für JCrypTool - RSA, DSA und ElGamal Visualisierungen.
TU Darmstadt, [Master Thesis]

Grimm, Rüdiger and Volkamer, Melanie (2008):
Development of a Formal IT-Security Model for Remote Electronic Voting Systems.
In: Electronic Voting - 3rd International Conference, Gesellschaft für Informatik, In: LNI, 131, [Conference or Workshop Item]

Gitter, Rotraud and Langer, Lucie and Okunick, Susanne and Opitz-Talidou, Zoi (2008):
Long-term retention in e-voting -- Legal requirements and technical implementation.
In: Electronic Voting 2008, GI, 131, ISBN 978-3-88579-225-3,
[Conference or Workshop Item]

Ghiglieri, Marco (2007):
Flexible - Eine erweiterbare {GUI} für den FlexiProvider (Frontend).
Technische Universit&auml;t Darmstadt, [Master Thesis]

Grimm, Rüdiger and Volkamer, Melanie (2007):
Robustere Anforderungen für Online-Wahlen aufbauend auf dem Schutzprofil 'Zentrale Auforderungen für Online-Wahlen'.
[Report]

Guaadaoui, Abdellah (2006):
Sicherheitsdefinitionen für Challenge-Response-Identifikationsverfahren.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Grimm, Rüdiger and Krimmer, Robert and Meißner, Nils and Reinhard, Kai and Volkamer, Melanie and Weinand, Marcel
Krimmer, Robert (ed.)
LNI, GI (Corporate Creators) (2006):
Security Requirements for Non-political Internet Voting.
In: Electronic Voting (EVOTE) 2006, Bonn, Gesellschaft für Informatik, pp. 203-212, [Book Section]

Grimm, Rüdiger and Volkamer, Melanie
Krimmer, Robert (ed.) (2006):
Multiple Cast in Online Voting - Analyzing Chances.
In: Electronic Voting 2006 - $2^{nd}$ International Conference, In: Springer LNI, 86, [Conference or Workshop Item]

Ginkel, Thilo-Alexander (2004):
Entwurf und Implementierung eines Authentifikations-Proxys für das World Wide Web.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Grahl, Alexander and Kiss, Tekla (2004):
Entwurf und Implementierung einer {Web-Test} Anwendung und Integrierung in die Eclipse {IDE}.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Groß, Clemens (2000):
Ein Verschlüsselungsprotokoll auf Basis von reellquadratischen Zahlkörpern.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Galbraith, Steven and Paulus, Sachar and Smart, Nigel (1998):
Arithmetic on Superelliptic Curves.
(TI-11/98), [Report]

Gross, Olaf (1994):
Der Block Lanczos Algorithmus über {$GF(2)$}.
Universit&auml;t des Saarlandes, [Master Thesis]

Ganzinger, Harald and Paul, Wolfgang and Buchmann, Johannes
Ganzinger, Harald and Paul, Wolfgang and Buchmann, Johannes (eds.) (1992):
Informatik - Festschrift zum 60. Geburtstag von Günter Hotz.
Vieweg + Teubner, In: Teubner Texte, ISBN 978-3815420331,
[Book]

H

Horsch, Moritz (2018):
Generating and Managing Secure Passwords for Online Accounts.
Darmstadt, Technische Universität, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/7003],
[Ph.D. Thesis]

Horsch, Moritz and Braun, Johannes and Buchmann, Johannes (2017):
Password Assistance.
In: Open Identity Summit 2017, Karlstad, Sweden, [Conference or Workshop Item]

Horsch, Moritz and Braun, Johannes and Metz, Dominique and Buchmann, Johannes (2017):
Update-tolerant and Revocable Password Backup.
In: ACISP 2017 - 22nd Australasian Conference on Information Security and Privacy, Auckland, New Zealand, [Conference or Workshop Item]

Holzer, Patrick (2017):
Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor p^α q^β.
TU Darmstadt, [Master Thesis]

Horsch, Moritz and Schlipf, Mario and Haas, Stefan and Braun, Johannes and Buchmann, Johannes (2016):
Password Policy Markup Language.
In: Open Identity Summit, In: LNI, 264, [Conference or Workshop Item]

Horsch, Moritz and Schlipf, Mario and Braun, Johannes and Buchmann, Johannes (2016):
Password Requirements Markup Language.
In: ACISP 2016 - 21st Australasian Conference on Information Security and Privacy, Melbourne, Australia, [Conference or Workshop Item]

Horsch, Moritz and Hülsing, Andreas and Buchmann, Johannes (2015):
PALPAS - PAsswordLess PAssword Synchronization.
In: International Conference on Availability, Reliability and Security (ARES), Université Paul Sabatier, Toulouse, France, [Conference or Workshop Item]

Horsch, Moritz and Tuengerthal, Max and Wich, Tobias (2014):
SAML Privacy-Enhancing Profile.
In: Open Identity Summit 2014, GI, Stuttgart, Germany, In: LNI, P-237, [Conference or Workshop Item]

Henning, Maria and Budurushi, Jurlind and Volkamer, Melanie (2014):
Öffentlichkeitsgrundsatz und Stimmzettelbelege.
[Report]

Horsch, Moritz and Derler, David and Rath, Christof and Haase, Hans-Martin and Wich, Tobias (2014):
Open Source für europäische Signaturen.
In: >Datenschutz und Datensicherheit, pp. 237-241, 38, (4), DOI: 10.1007/s11623-014-0098-5,
[Article]

Henning, Maria and Budurushi, Jurlind and Volkamer, Melanie (2014):
Elektronsiche Wahlen durch Stimmzettelbelege? Untersuchung möglicher Umsetzungen des Öffentlichkeitsgrundsatzes bei elektronischen Wahlen.
In: MultiMedia und Recht (MMR), pp. 154-158, [Article]

Hühnlein, Detlef and Schwenk, Jörg and Wich, Tobias and Mladenov, Vladislav and Feldmann, Florian and Schmölz, Johannes and Brügger, Bud and Horsch, Moritz (2013):
Options for integrating eID and SAML.
In: DIM'13 - Proceedings of the 2013 ACM Workshop on Digital Identity Management, ACM, Berlin, Germany, ISBN 978-1-4503-2493-9,
DOI: 10.1145/2517881.2517892,
[Conference or Workshop Item]

Hülsing, Andreas (2013):
Practical Forward Secure Signatures using Minimal Security Assumptions.
Darmstadt, TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/3651],
[Ph.D. Thesis]

Hamann, Tobias (2013):
The BKZ Simulation Algorithm.
Tu Darmstadt, [Master Thesis]

Hülsing, Andreas and Braun, Johannes (2013):
Langzeitsichere Signaturen durch den Einsatz hashbasierter Signaturverfahren.
In: Informationssicherheit stärken - Vertrauen in die Zukunft schaffen. Tagungsband zum 13. Deutschen IT-Sicherheitskongress, SecuMedia Verlag, Bonn, ISBN 978-3-922746-95-9,
[Conference or Workshop Item]

Horsch, Moritz and Hühnlein, Detlef and Breitenstrom, Christian and Wieland, Thomas and Wiesmaier, Alexander and Biallowons, Benedikt and Petrautzki, Dirk and Potzernheim, Simon and Schmölz, Johannes and Wesner, Alexander and Wich, Tobias (2013):
Die Open eCard App für mehr Transparenz, Vertrauen und Benutzerfreundlichkeit beim elektronischen Identitätsnachweis.
In: Informationssicherheit stärken - Vertrauen in die Zukunft schaffen. Tagungsband zum 13. Deutschen IT-Sicherheitskongress, SecuMedia Verlag, ISBN 978-3-922746-95-9,
[Conference or Workshop Item]

Horsch, Moritz and Hühnlein, Detlef and Lehmann, Anja and Schmölz, Johannes and Wich, Tobias (2013):
Authentisierung mit der Open eCard App.
In: >Datenschutz und Datensicherheit, pp. 507-511, 37, (8), DOI: 10.1007/s11623-013-0208-9,
[Article]

Hülsing, Andreas (2013):
WOTS+ - Shorter Signatures for Hash-Based Signature Schemes.
In: Africa Crypt 2013, Cairo, Egypt, [Conference or Workshop Item]

Hülsing, Andreas and Rausch, Lea and Buchmann, Johannes (2013):
Optimal Parameters for XMSS^MT.
In: MoCrySEn 2013, Springer, pp. 194-208, [Book Section]

Hülsing, Andreas and Rausch, Lea and Buchmann, Johannes (2013):
Optimal parameters for XMSS-MT.
In: Security Engineering and Intelligence Informatics, CD-ARES 2013 Workshops, [Online-Edition: https://link.springer.com/chapter/10.1007/978-3-642-40588-4_...],
[Article]

Hornschuch, Marian (2012):
Multivariate-based identification and signature schemes with additional properties.
TU Darmstadt, [Master Thesis]

Horsch, Moritz and Braun, Johannes and Wiesmaier, Alexander (2012):
Decoupling Authentication from the Usage of Services.
[Report]

Hülsing, Andreas and Busold, Christoph and Buchmann, Johannes
Knudsen, Lars and Wu, Huapeng (eds.) (2012):
Forward Secure Signatures on Smart Cards.
In: SAC2012 - Conference on Selected Areas in Cryptography, Springer Berlin Heidelberg, Windsor, Canada, In: LNCS, ISBN 978-3-642-35998-9,
DOI: 10.1007/978-3-642-35999-6_5,
[Conference or Workshop Item]

Hülsing, Andreas and Petzoldt, Albrecht and Schneider, Michael and Alaoui, Sidi Mohamed El Yousfi
Waldmann, Ulrich (ed.) (2012):
Post-Quantum Signaturverfahren Heute.
In: 22. SIT-Smartcard Workshop 2012, Fraunhofer Verlag Stuttgart, ISBN 978-3-8396-0347-5,
[Conference or Workshop Item]

Hühnlein, Detlef and Petrautzki, Dirk and Schmölz, Johannes and Wich, Tobias and Horsch, Moritz and Wieland, Thomas and Eichholz, Jan and Wiesmaier, Alexander and Braun, Johannes and Feldmann, Florian and Potzernheim, Simon and Schwenk, Jörg and Kahlo, Christian and Kühne, Andreas and Veit, Heiko (2012):
On the design and implementation of the Open eCard App.
In: GI SICHERHEIT 2012 Sicherheit - Schutz und Zuverlässigkeit, Darmstadt, [Conference or Workshop Item]

Horsch, Moritz and Braun, Johannes and Wiesmaier, Alexander and Schaaf, Joachim and Baumöller, Claas (2012):
Verteilte Dienstnutzung mit dem neuen Personalausweis.
In: D-A-CH Security 2012, 25. - 26. September, [Conference or Workshop Item]

Henning, Maria and Demirel, Denise and Volkamer, Melanie (2012):
Öffentlichkeit vs. Verifizierbarkeit – Inwieweit erfüllt mathematische Verifizierbarkeit den Grundsatz der Öffentlichkeit der Wahl.
In: Proceedings of the 15th International Legal Informatics Symposium (IRIS 2012), Salzburg, Austria, [Conference or Workshop Item]

Horsch, Moritz and Braun, Johannes and Wiesmaier, Alexander (2011):
Mobile eID application for the German identity card.
[Report]

Hoffmann, Gerhard (2011):
Implementation of McEliece using quasi-dyadic Goppa codes.
TU Darmstadt, [Master Thesis]

Horsch, Moritz and Stopczynski, Martin (2011):
The German eCard-Strategy.
[Report]

Horsch, Moritz (2011):
Mobile Authentisierung mit dem neuen Personalausweis (MONA).
TU Darmstadt, [Master Thesis]

Hermans, Jens and Schneider, Michael and Buchmann, Johannes and Vercauteren, Frederik and Preneel, Bart
Bernstein, Daniel and Lange, Tanja (eds.) (2010):
Parallel Shortest Lattice Vector Enumeration on Graphics Cards.
In: Africacrypt 2010, Springer, Stellenbpsch, South Africa, In: LNCS, 6055, [Conference or Workshop Item]

Heuser, Annelie (2010):
Chess reduction - Using Artificial Intelligence for Lattice Reduction.
TU Darmstadt, [Master Thesis]

Hartmann, Frank (2010):
Probability Distribution of Gram-Schmidt Coefficients after LLL-Reduction.
TU Darmstadt, [Master Thesis]

Hühnlein, Detlef and Korte, Ulrike and Langer, Lucie and Wiesmaier, Alexander (2009):
A Comprehensive Reference Architecture for Trustworthy Long-Term Archiving of Sensitive Data.
In: 3rd International Conference on New Technologies, Mobility and Security (NTMS), IEEE Press, DOI: 10.1109/NTMS.2009.5384830,
[Conference or Workshop Item]

Horsch, Moritz (2009):
MobilePACE - Password Authenticated Connection Establishment implementation on mobile devices.
TU Darmstadt, [Master Thesis]

Huthmann, Jan (2007):
Datengesteuerte Initialisierung komplexer Softwaresysteme als Voraussetzung zentralisierter Konfiguration.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Helbach, Jörg and Krimmer, Robert and Meletiadou, Anastasia and Meissner, Nils and Volkamer, Melanie (2007):
Zukunft von Online-Wahlen - Aktuelle rechtliche, politische, soziale und technisch-organisatorische Fragen.
In: Datenschutz und Datensicherheit, pp. 434-440, 31, (6), [Article]

Hühnlein, Detlef (2005):
Kryptosysteme auf Basis imaginärquadratischer Nichtmaximalordnungen.
Darmstadt, Technische Universität, TU Darmstadt, [Online-Edition: urn:nbn:de:tuda-tuprints-5218],
[Ph.D. Thesis]

Homann, Frank (2004):
Flexibles Datenbankmodell für {TrustCenter}.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Hagedorn, Axel (2003):
{IEEE 802.11i} Sicherheit in drahtlosen lokalen Netzen.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Hähnle, Jochen (2003):
Design und Entwicklung eines Testframeworks für {JLiPSD}.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Hechler, Jochen (2003):
Primzahlnachweis mit Hilfe elliptischer Kurven.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Henhapl, Birgit (2003):
Zur Effizienz von elliptische Kurven Kryptographie.
Technische Universit&auml;t Darmstadt, [Ph.D. Thesis]

Hölzer, Christina (2003):
Quantenalgorithmus für das Hauptidealproblem.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Heinemann, Andreas and Straub, Tobias (2003):
Mund-zu-Mund-Propaganda mit Bonussystem in mobilen Ad-Hoc-Netzen.
In: INFORMATIK 2003 - Innovative Informatikanwendungen, In: LNI, 35, ISBN 3-88579-364-4,
[Conference or Workshop Item]

Hamdy, Safuat (2002):
Über die Sicherheit und Effizienz kryptographischer Verfahren mit Klassengruppen imaginär-quadratischer Zahlkörper.
Technische Universit&auml;t Darmstadt, [Ph.D. Thesis]

Hammen, Ralf (2002):
Integrationskonzept für Trustcenter-Software.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Henge-Ernst, Jürgen and Linke, Sebastian (2002):
Anbindung einer Personalisierungssstrasse an das {FlexiTRUST}-System.
[Other]

Henhapl, Birgit (2002):
Platform Independant Elliptic Curve Cryptography over Fp.
(TI-6/02), [Report]

Hornung, Heiko (2002):
Ein Framework zur Automatisierung von Tests formularbasierter Web-Anwendungen.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Hühnlein, Detlef (2001):
Faster Generation of NICE-Schnorr-Type Signatures.
In: CT-RSA 2001 - The Cryptographer's Track at RSA Conference 2001, Springer, San Francisco, CA, USA, In: LNCS, ISBN 3-540-41898-9,
[Conference or Workshop Item]

Hartmann, Michael and Maseberg, Sönke (2001):
Smart Cards for the {FlexiPKI} Environment.
(TI-9/01), [Report]

Hamdy, Safuat and Möller, Bodo (2000):
Security of Cryptosystems Based on Class Groups of Imaginary Quadratic Orders.
In: ASIACRYPT 2000 - 6th International Conference on the Theory and Application of Cryptology and Information Security, Springer, Kyoto, Japan, In: LNCS, ISBN 3-540-41404-5,
[Conference or Workshop Item]

Hühnlein, Detlef (2000):
Efficient Implementation of Cryptosystems Based on Non-maximal Imaginary Quadratic Orders.
In: SAC '99 - Selected Areas in Cryptography, 6th Annual International Workshop, Springer, Kingston, Ontario, Canada, In: LNCS, ISBN 3-540-67185-4,
[Conference or Workshop Item]

Hühnlein, Detlef and Merkle, Johannes (2000):
An Efficient NICE-Schnorr-Type Signature Scheme.
In: PKC 2000 - Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, Springer, Melbourne, Victoria, Australia, In: LNCS, ISBN 3-540-66967-1,
[Conference or Workshop Item]

Hamdy, Safuat and Möller, Bodo (2000):
Security of Crytosystems Based on Class Groups of Imaginary Quadratic Orders.
(TI-4/00), [Report]

Hartmann, Michael and Maseberg, Sönke (2000):
Fail-Safe-Konzept für {FlexiPKI}.
(TI-11/00), [Report]

Hühnlein, Detlef (2000):
Quadratic orders for {NESSIE} - Overview and parameter sizes of three public key families.
(TI-3/00), [Report]

Hühnlein, Detlef (2000):
Faster Generation of {NICE}-{Schnorr}-type Signatures.
(TI-8/00), [Report]

Hühnlein, Detlef and Merkle, Johannes (1999):
Secure and Cost Efficient Electronic Stamps.
In: Secure Networking - CQRE (Secure) '99 - International Exhibition and Congress, Springer, Düsseldorf, Germany, In: LNCS, ISBN 3-540-66800-4,
[Conference or Workshop Item]

Hühnlein, Detlef and Takagi, Tsuyoshi (1999):
Reducing Logarithms in Totally Non-maximal Imaginary Quadratic Orders to Logarithms in Finite Fields.
In: ASIACRYPT '99, International Conference on the Theory and Applications of Cryptology and Information Security, Springer, Singapore, In: LNCS, ISBN 3-540-66666-4,
[Conference or Workshop Item]

Hartmann, Michael and Paulus, Sachar and Takagi, Tsuyoshi (1999):
NICE - New Ideal Coset Encryption.
In: CHES '99 - Cryptographic Hardware and Embedded Systems, First International Workshop, Springer, Worcester, MA, USA, In: LNCS, ISBN 3-540-66646-X,
[Conference or Workshop Item]

Hahn, Tobias and Meyer, Andreas and Neis, Stefan and Pfahler, Thomas (1999):
Implementing Cryptographic Protocols Based on Algebraic Number Fields.
(TI-24/99), [Report]

Hamdy, Safuat (1999):
Elliptische Kurven - Neue Wege in der Public-Key-Kryptographie.
(TI-5/99), [Report]

Hamdy, Safuat and Maurer, Markus (1999):
Feige-Fiat-Shamir Identification Based on Real Quadratic Fields.
(TI-23/99), [Report]

Hartmann, Michael (1999):
Implementierung der Entschlüsselung des {NICE}-Kryptosystems auf einer Smartcard.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Hartmann, Michael and Paulus, Sachar and Takagi, Tsuyoshi (1999):
{NICE} - New Ideal Coset Encryption.
(TI-11/99), [Report]

Henhapl, Birgit (1999):
Digitales Signieren mit Elliptischen Kurven über Primkörpern großer Charakteristik.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Hühnlein, Detlef (1999):
A survey of crytosystems based on imaginary quadratic orders.
(TI-19/99), [Report]

Hühnlein, Detlef (1999):
Elliptische Kurven in {HBCI} - ein Backup zu {RSA}.
(TI-20/99), [Report]

Hühnlein, Detlef (1999):
Efficient implementation of cryptosystems based on non-maximal imaginary quadratic orders.
(TI-6/99), [Report]

Hühnlein, Detlef and Merkle, Johannes (1999):
Secure and cost efficient electronic stamps.
(TI-17/99), [Report]

Hühnlein, Detlef and Merkle, Johannes (1999):
An efficient {NICE}-{Schnorr}-type signature.
(TI-18/99), [Report]

Hühnlein, Detlef and Meyer, Andreas and Takagi, Tsuyoshi (1999):
Rabin and {RSA} analogues based on non-maximal imaginary quadratic orders.
(TI-7/99), [Report]

Hühnlein, Detlef and Takagi, Tsuyoshi (1999):
Reducing logarithms in totally non-maximal imaginary quadratic orders to logarithms in finite fields.
(TI-8/99), [Report]

Hühnlein, Detlef and Meyer, Andreas and Takagi, Tsuyoshi (1998):
Rabin and {RSA} analogues based on non-maximal imaginary quadratic orders.
In: ICSCI '98 - 1st International Conference on Information Security and Cryptology, Korea Institute of Information Security and Cryptology (KIISC), Seoul, Korea, [Conference or Workshop Item]

Hühnlein, Detlef and Jacobson, Michael J. and Paulus, Sachar and Takagi, Tsuyoshi (1998):
A Cryptosystem Based on Non-maximal Imaginary Quadratic Orders with Fast Decryption.
In: EUROCRYPT '98 - International Conference on the Theory and Application of Cryptographic Techniques, Springer, Espoo, Finland, In: LNCS, ISBN 3-540-64518-7,
[Conference or Workshop Item]

Haible, Bruno and Papanikolaou, Thomas (1998):
Fast Multiprecision Evaluation of Series of Rational Numbers.
In: ANTS-III - Algorithmic Number Theory, Third International Symposium, Springer, Portland, Oregon, USA, In: LNCS, ISBN 3-540-64657-4,
[Conference or Workshop Item]

Haible, Bruno and Papanikolaou, Thomas (1997):
Fast multiprecision evaluation of series of rational numbers.
(TI-7/97), [Report]

Hühnlein, Detlef (1997):
Credential Management and Secure Single Login for {SPKM}.
(TI-28/97), [Report]

Hühnlein, Detlef and Jacobson, Michael J. and Paulus, Sachar (1997):
A cryptosystem based on non-maximal imaginary quadratic orders with fast decryption.
(TI-24/97), [Report]

Hiber, Carmen (1995):
Eine Untersuchung der verbesserten Buchberger Algorithmen zur Gröbnerbasen-Konstruktion.
Universit&auml;t des Saarlandes, [Master Thesis]

Handl, Ralf (1994):
Sicherheit kryptographischer Protokolle.
Universit&auml;t des Saarlandes, [Ph.D. Thesis]

Hürter, Michael (1994):
Modifikationen zum Number Field Sieve.
Universit&auml;t des Saarlandes, [Master Thesis]

I

Inel, Miray (2014):
Entwurf und Implementierung von Plug-ins für JCrypTool.
TU Darmstadt, [Master Thesis]

Ivanova, Vanya (2010):
Lattice Basis Reduction in Infinity Norm.
TU Darmstadt, [Master Thesis]

Inel, Oryal (2009):
Entwurf und Implementierung von Plug-ins für JCrypTool -Visualisierung von kryptographischen Grundlagen.
TU Darmstadt, [Master Thesis]

Izu, Tetsuya and Möller, Bodo and Takagi, Tsuyoshi (2002):
Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks.
In: Progress in Cryptology - INDOCRYPT 2002, Third International Conference on Cryptology, Springer, Hyderabad, India, In: LNCS, ISBN 3-540-00263-4,
[Conference or Workshop Item]

Izu, Tetsuya and Takagi, Tsuyoshi (2002):
On the Security of Brier-Joye{'}s Addition Formula for Weierstrass-form Elliptic Curves.
(TI-3/02), [Report]

J

Jattke, Patrick and Senker, Matthias and Wiesmaier, Alexander (2016):
Comparison of two Lightweight Stream Ciphers: MICKEY 2.0 & WG-8.
[Report]

Jiang, Biqiang (2010):
Design and Implementation of Plug-ins for JCrypTool - Visualization of the Cryptographic SPA and DPA Attacks.
TU Darmstadt, [Master Thesis]

Jonker, Hugo and Volkamer, Melanie
Alkassar, Ammar and Volkamer, Melanie (eds.) (2007):
Compliance of RIES to the proposed e-voting protection profile.
In: Proceedings of the 1st international conference on E-voting and identity, Springer-Verlag, Bochum, Germany, In: VOTE-ID&#039;07, 4896, ISBN 3-540-77492-0, 978-3-540-77492-1,
[Conference or Workshop Item]

Joye, Marc and Quisquater, Jean-Jacques and Takagi, Tsuyoshi (2001):
How to Choose Secret Parameters for {RSA}-Type Cryptosystems over Elliptic Curves.
In: >Designs, Codes and Cryptography, pp. 297-316, 23, (3), [Article]

Jacobson, Michael J. (1999):
Subexponential class group computation in quadratic orders.
Aachen: Shaker, 1999. XVIII, 179 S,
Aachen, Shaker, TU Darmstadt, [Ph.D. Thesis]

Jacobson, Michael J. (1999):
Applying sieving to the computation of quadratic class groups.
In: >Mathematics of Computation, pp. 859-867, 68, (226), [Article]

Joye, Marc and Quisquater, Jean-Jacques and Takagi, Tsuyoshi (1997):
How to Choose Secret Parameters for {RSA}-Type Cryptosystems over Elliptic Curves.
(TI-35/97), [Report]

Jacobson, Michael J. (1997):
Applying Sieving to the Computation of Quadratic Class Groups.
(TI-19/97), [Report]

K

Krämer, Juliane and Loiero, Mirjam (2019):
Fault Attacks on UOV and Rainbow.
In: COSADE 2019, Springer, Darmstadt, [Online-Edition: https://www.cosade.org/index.html],
[Conference or Workshop Item]

Kalsen, Ali (2018):
On the impact of quantum algorithms on lattice enumeration.
TU Darmstadt, [Master Thesis]

Kannwischer, Matthias and Genêt, Aymeric and Butin, Denis and Krämer, Juliane and Buchmann, Johannes (2018):
Differential Power Analysis of XMSS and SPHINCS.
In: COSADE2018, Singapore, In: COSADE: International Workshop on Constructive Side-Channel Analysis and Secure Design, In: LNCS, 10815, [Conference or Workshop Item]

Krüger, Stefan and Nadi, Sarah and Reif, Michael and Ali, Karim and Mezini, Mira and Bodden, Eric and Göpfert, Florian and Günther, Felix and Weinert, Christian and Demmler, Daniel and Kamath, Ram (2017):
CogniCrypt: Supporting Developers in using Cryptography.
In: Automated Software Engineering (ASE'17), Piscataway, NJ, USA, ACM, Piscataway, NJ, USA, DOI: 10.1109/ASE.2017.8115707,
[Online-Edition: http://dl.acm.org/citation.cfm?id=3155562.3155681],
[Conference or Workshop Item]

Kannwischer, Matthias (2017):
Physical Attack Vulnerability of Hash-Based Signature Schemes.
TU Darmstadt, [Master Thesis]

Kulyk, Oksana and Marky, Karola and Neumann, Stephan and Volkamer, Melanie (2016):
Introducing Proxy Voting to Helios.
In: 11th International Conference on Availability, Reliability and Security - ARES 2016, IEEE, Salzburg, DOI: 10.1109/ARES.2016.38,
[Conference or Workshop Item]

Klir, Thomas (2016):
Design and Implementation of an Archiving System Providing Long-Term Integrity and Long-Term Confidentiality.
TU Darmstadt, [Master Thesis]

Kunz, Alexandra and Volkamer, Melanie and Stockhardt, Simon and Palberg, Sven and Lottermann, Tessa and Piegert, Eric (2016):
NoPhish: Evaluation of a web application that teaches people being aware of phishing attacks.
In: Jahrestagung der Gesellschaft für Informatik, Lecture Notes in Informatics (LNI), Bonn, Germany, [Conference or Workshop Item]

Kulyk, Oksana and Neumann, Stephan and Marky, Karola and Budurushi, Jurlind and Volkamer, Melanie (2016):
Coercion-resistant Proxy Voting.
In: 31st International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2016, Springer, Ghent, Belgium, [Conference or Workshop Item]

Kulyk, Oksana and Volkamer, Melanie (2016):
Efficiency Comparison of Various Approaches in E-Voting Protocols.
In: Financial Cryptography and Data Security. FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Revised Selected Papers, Springer, Barbados, [Conference or Workshop Item]

Kulyk, Oksana and Gerber, Paul and Reinheimer, Benjamin and Renaud, Karen and Volkamer, Melanie (2016):
Encouraging Privacy-Aware Smartphone App Installation: What Would the Technically-Adept Do.
In: NDSS Workshop on Usable Security (USEC), Internet Society., San Diego, California, ISBN 1891562428,
[Conference or Workshop Item]

Krämer, Juliane and Kiss, Ágnes and Stüber, Anke (2015):
On the Optimality of Differential Fault Analyses on CLEFIA.
In: 6. International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS'15), Springer, DOI: 10.1007/978-3-319-32859-1_15,
[Conference or Workshop Item]

Kulyk, Oksana and Teague, Vanessa and Volkamer, Melanie
Haenni, Rolf and Koenig, Reto and Wikström, Douglas (eds.) (2015):
Extending Helios Towards Private Eligibility Verifiability.
In: E-Voting and Identity: 5th International Conference - VoteID 2015, Springer, Bern, Switzerland, [Conference or Workshop Item]

Kulyk, Oksana and Neumann, Stephan and Budurushi, Jurlind and Volkamer, Melanie and Haenni, Rolf and Koenig, Reto and von Bergen, Philemon (2015):
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.
In: 10th International Conference on Availability, Reliability and Security - ARES 2015, IEEE, Toulouse, France, DOI: 10.1109/ARES.2015.75,
[Conference or Workshop Item]

Kulyk, Oksana and Neumann, Stephan and Budurushi, Jurlind and Volkamer, Melanie and Haenni, Rolf and Koenig, Reto and von Bergen, Philemon (2015):
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.
[Other]

Kußmaul, Tobias and Löffler, Johannes and Wiesmaier, Alexander (2015):
Block ciphers PRESENT and SEA in comparison.
[Report]

Kulyk, Oksana and Feier, Christian and Köster, Thorben (2014):
Electronic Voting with Fully Distributed Trust and Maximized Flexibility Regarding Ballot Design.
In: 6th International Conference on Electronic Voting - EVOTE 2014, IEEE, Lochau, ISBN 978-3-200-03697-0,
DOI: 10.1109/EVOTE.2014.7001142,
[Conference or Workshop Item]

Klos, Christian (2013):
Design and deployment of a public key infrastructure.
TU Darmstadt, [Master Thesis]

Kreutzer, Michael and Waidner, Michael and Buchmann, Johannes (2012):
IT-Sicherheitsforschung in Darmstadt - von den Grundlagen bis zur Anwendung.
In: Praxis der Informationsverarbeitung und Kommunikation, pp. 305-308, 35, (4), [Article]

Kelbert, Florian and Shirazi, Fatemeh and Simo, Hervais and Wüchner, Tobias and Buchmann, Johannes and Pretschner, Alexander and Waidner, Michael
Buchmann, Johannes (ed.) (2012):
State of Online Privacy: A Technical Perspective.
In: Internet Privacy. Eine multidisziplinäre Bestandsaufnahme/ A multidisciplinary analysis (acatech STUDIE), Springer Verlag Heidelberg, pp. 189-279, [Book Section]

Kiefer, Franziskus and Wiesmaier, Alexander and Fritz, Christian (2012):
Practical Security in E-Mail Applications.
In: The 2012 International Conference on Security and Management (SAM’12), Las Vegas, USA, [Conference or Workshop Item]

Kauer, Michaela and Pfeiffer, Thomas and Volkamer, Melanie and Theuerling, Heike and Bruder, Ralph
Suri, Neeraj and Waidner, Michael (eds.) (2012):
It is not about the design – it is about the content! Making warnings more efficient by communicating risks appropriately.
In: Sicherheit, GI, Darmstadt, Germany, In: LNI, 195, ISBN 978-3-88579-289-5,
[Conference or Workshop Item]

Kauer, Michaela and Kiesel, Florian and Ueberschaer, Felix and Volkamer, Melanie and Bruder, Ralph
Jähnke, Jochen and Mühlen, Nicolas von zur and Rechert, Klaus and Suchodoletz, Dirk von (eds.)
Max-Planck Institut für ausländisches und internationales Strafrecht (Corporate Creator) (2012):
The Influence of trustworthiness of website layout on security perception of websites.
In: Current Issues in IT Security 2012 Schriftenreihe des Max-Planck-Instituts für ausländisches und internationales Strafrecht. Reihe I: Interdisziplinäre Forschungen aus Strafrecht und Kriminologie, Berlin, Duncker & Humblot, pp. 215-220, [Book Section]

Kuo, Po-Chun and Schneider, Michael and Dagdelen, Özgür and Reichelt, Jan and Buchmann, Johannes and Cheng, Chen-Mou and Yang, Bo-Yin
Preneel, Bart and Takagi, Tsuyoshi (eds.) (2011):
Extreme Enumeration on GPU and in Clouds - How Many Dollars You Need to Break SVP Challenges -.
In: Workshop on Cryptographic Hardware and Embedded Systems - CHES 2011, Springer, In: LNCS, [Conference or Workshop Item]

Kiefer, Franziskus (2010):
Effiziente Implementierung des PACE- und EACProtokolls für mobile Geräte.
TU Darmstadt, [Master Thesis]

Karatsiolis, Vangelis and Langer, Lucie and Schmidt, Axel and Tews, Erik and Wiesmaier, Alexander (2010):
Cryptographic Application Scenarios.
(TI-01/10), [Report]

Kaiser, Markus (2010):
Computer verification of algorithms using a formal proof system.
Berlin, dissertation.de, TU Darmstadt, In: Dissertation.de, 1583, ISBN 978-3-86624-483-2,
[Ph.D. Thesis]

Kühn, Ulrich and Pyshkin, Andrei and Tews, Erik and Weinmann, Ralf-Philipp (2008):
Variants of Bleichenbacher's Low-Exponent Attack on PKCS#1 RSA Signatures.
In: Sicherheit 2008: Sicherheit, Schutz und Zuverlässigkeit, Saarbrücken, Germany, [Conference or Workshop Item]

Kern, Tobias (2008):
Next Generation Usability of Cryptography - Combining FlexiProvider and JCrypToo.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Krimmer, Robert and Volkamer, Melanie (2008):
Challenges Posted by Distance Voting in General: Postal Voting, and in Particular eVoting.
[Report]

Krimmer, Robert and Volkamer, Melanie
Krishna, Jaya and Agarwal, Naveen Kumar (eds.) (2008):
Observing Threats to Voters Anonymity: Election Observation of Electronic Voting.
In: E-Voting - Perspectives and Experiences, In: The Icfai University Press, [Conference or Workshop Item]

Karatsiolis, Evangelos (2007):
Flexible Certificate Management in Public Key Infrastructures.
Darmstadt, Technische Universität, TU Darmstadt, [Online-Edition: urn:nbn:de:tuda-tuprints-8781],
[Ph.D. Thesis]

Kutscher, Dirk and Ott, Jörg and Bartsch, Steffen (2007):
Supporting network access and service location in dynamic environments.
In: Campus-Wide Information Systems, p. 225, 24, (4), DOI: 10.1108/10650740710834626,
[Article]

Krimmer, Robert and Triessnig, Stefan and Volkamer, Melanie
Alkassar, Ammar and Volkamer, Melanie (eds.) (2007):
The Development of Remote E-Voting Around the World: A Review of Roads and Directions.
In: E-Voting and Identity, First International Conference, VOTE-ID 2007, Springer-Verlag, Bochum, Germany, In: VOTE-ID&#039;07, 4896, ISBN 3-540-77492-0, 978-3-540-77492-1,
[Conference or Workshop Item]

Kurosawa, Kaoru and Schmidt-Samoa, Katja (2006):
New Online/Offline Signature Schemes Without Random Oracles.
In: PKC 2006 - Public Key Cryptography, Springer, New York, NY, USA, In: LNCS, 3958, ISBN 978-3-540-33851-2,
DOI: 10.1007/11745853_22,
[Conference or Workshop Item]

Kaiser, Markus and Buchmann, Johannes (2006):
Computer Verification in Cryptography.
In: International Conference on Computer Science-(ICCS&#039;06), 12, ISBN 975-00803-1-9,
[Conference or Workshop Item]

Kaiser, Markus and Buchmann, Johannes (2006):
A Formal Approach for Proof Constructions in Cryptography.
In: >International Journal of Computer Science, pp. 195--203, 1, [Article]

Klink, Alexander (2006):
Cryptographic Voting Protocols - A Prototype Design and Implementation for University Elections at {TU} Darmstadt.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Köhler, Sabine (2006):
Sicherheitsparameter für das Okamoto-Tanaka-Uchiyama Quanten-Public-Key-Kryptosystem.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Kotchourova, Inna (2006):
An Approach for Formal and Computer Verification in Cryptography.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Kusch, Sebastian (2006):
Formalizing the {DSA} Signature Scheme in Isabelle/{HOL}.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Karatsiolis, Evangelos and Lippert, Marcus and Wiesmaier, Alexander (2005):
Planning for Directory Services in Public Key Infrastructures.
In: Sicherheit 2005: Sicherheit - Schutz und Zuverlässigkeit, Beiträge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.v. (GI), GI, Regensburg, In: LNI, 62, ISBN 3-88579-391-1,
[Conference or Workshop Item]

Kraatz, Sarah (2005):
Generische Konstruktion von Fail-Stop Signatur Schemata.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Kramer, Kai (2005):
Trustcentermigration - Umstellung von {LiDIA-CA} auf evaluierte Prozesse.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Krimmer, Robert and Volkamer, Melanie
Schweighöfer, Erich and Liebwald, Doris and Augeneder, Silvia and Menzel, Thomas (eds.) (2005):
Wählen auf Distanz: Ein Vergleich zwischen elektronischen und nicht elektronischen Verfahren.
In: Effizienz von e-Lösungen in Staat und Gesellschaft, Aktuelle Fragen zur Rechtsinformatik IRIS 2005, In: Boorberg Verlag, [Conference or Workshop Item]

Karatsiolis, Vangelis and Lippert, Marcus and Wiesmaier, Alexander (2004):
Using {LDAP} Directories for Management of {PKI} Processes.
In: Public Key Infrastructure, Springer Berlin/Heidelberg, 3093, ISBN 978-3-540-22216-3,
[Conference or Workshop Item]

Karatsiolis, Vangelis and Lippert, Marcus and Wiesmaier, Alexander and Pitaev, Anna and Ruppert, Markus and Buchmann, Johannes (2004):
Towards a Flexible {Intra-Trustcenter} Management Protocol.
In: >CoRR, cs.CR/0411067, [Article]

Kurosawa, Kaoru and Schmidt-Samoa, Katja and Takagi, Tsuyoshi (2003):
A Complete and Explicit Security Reduction Algorithm for RSA-Based Cryptosystems.
In: ASIACRYPT 2003 - 9th International Conference on the Theory and Application of Cryptology and Information Security, Springer, Taipei, Taiwan, In: LNCS, 2894, ISBN 3-540-20592-6,
DOI: 10.1007/b94617,
[Conference or Workshop Item]

Kastell, Kira and Meyer, Ulrike and Jakoby, Rolf (2003):
Secure Handover Procedures.
(TI-8/03), [Report]

Kastell, Kira and Meyer, Ulrike and Jakoby, Rolf (2003):
Secure Handover Procedures.
In: The 2003 International Conference on Communications in Computing- (CIC 2003), [Conference or Workshop Item]

Kreuder, Alexander (2003):
Ein neuer Reduktionsbeweis für das {RSA}-Paillier Kryptosystem.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Kurosawa, Kaoru and Schmidt-Samoa, Katja and Takagi, Tsuyoshi (2003):
A Complete and Explicit Security Reduction Algorithm for RSA-Based Cryptosystems.
(TI-9/03), [Report]

Kügler, Dennis and Vogt, Holger (2002):
Fair Tracing without Trustees.
In: Financial Cryptography 2001, Springer, Grand Cayman, British West Indies, In: LNCS, ISBN 3-540-44079-8,
[Conference or Workshop Item]

Kügler, Dennis (2002):
Ein mißbrauchfreies anonymes elektonisches Zahlungssystem.
Technische Universit&auml;t Darmstadt, [Ph.D. Thesis]

Kügler, Dennis and Vogt, Holger (2002):
Off-line Payments with Auditable Tracing.
(TI-8/02), [Report]

Kwiotek, Daniel (2002):
Entwicklung einer sicheren Web-Schnittstelle für eine bestehende Enterprise-Anwendung basierend auf {PKI}-Technologien am Beispiel der {ERP}-Software {ProAd}.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Kügler, Dennis and Vogt, Holger (2001):
Marking: A Privacy Protecting Approach Against Blackmailing.
In: PKC 2001 - Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, Springer, Cheju Island, Korea, In: LNCS, ISBN 3-540-41658-7,
[Conference or Workshop Item]

Kalenderian, Igor (2001):
Implementierung des Austausches kryptographischer Komponenten in {FlexiPKI} mittels Update Management Protocol.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Kügler, Dennis and Vogt, Holger (2001):
Fair Tracing without Trustees.
(TI-14/01), [Report]

Kügler, Dennis and Vogt, Holger (2001):
Auditable Tracing with Unconditional Anonymity.
(TI-16/01), [Report]

Kügler, Dennis and Vogt, Holger (2001):
Unsichtbare Markierungen in elektronischem Geld.
(TI-15/01), [Report]

Kügler, Dennis and Vogt, Holger (2000):
Marking: A Privacy Protecting Approach against Blackmailing.
(TI-9/00), [Report]

Knabe, Thorsten (1999):
LiPS} basiertes Job Queueing System für {LiDIA.
(TI-1/99), [Report]

Kügler, Dennis and Maurer, Markus (1999):
A Note on the Weakness of the Maurer-Yacobi Squaring Method.
(TI-15/99), [Report]

Kügler, Dennis and Maurer, Markus and Paulus, Sachar (1999):
Identitätsbasierte Kryptosysteme als Alternative zu Public Key Infrastrukturen.
(TI-3/99), [Report]

Kügler, Dennis (1998):
Eine Aufwandsanalyse für identitätsbasierte Kryptosysteme.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Kenn, Holger (1996):
Entwurf eines einfachen Client-Server-Systems zur Verteilung von Schlüsseldaten asymmetrischer Kryptosysteme.
Universit&auml;t des Saarlandes, [Master Thesis]

Keuschen, Patrick (1996):
Entwurf und Implementierung von ojekt-orientierten Bibliotheksroutinen zur Realisierung von Secret Sharing Schemata.
Technische Hochschule Darmstadt, [Master Thesis]

L

Liu, Mo-meng and Krämer, Juliane and Hu, Yu-pu and Buchmann, Johannes (2018):
Quantum security analysis of a lattice-based oblivious transfer protocol.
In: Frontiers of Information Technology & Electronic Engineering, Springer, pp. 1348-1369, 18, Issue 9, ISSN 2095-9184 (Print) 2095-9230 (Online),
[Online-Edition: https://link.springer.com/journal/11714],
[Article]

Loiero, Mirjam (2018):
Fault Attacks on Multivariate Signature Schemes.
TU Darmstadt, [Master Thesis]

Lato, Ellen (2016):
Fault Attacks on Lattice-Based Encryption Schemes.
TU Darmstadt, [Master Thesis]

Lieb, Patrick and Schmidt, Markus and Wiesmaier, Alexander (2016):
ECDSA and QUARTZ in Comparison with RSA.
[Report]

Loruenser, Thomas and Rodriguez, Charles Bastos and Demirel, Denise and Fischer-Hübner, Simone and Gross, Thomas R. and Langer, Thomas and des Noes, Mathieu and Poehls, Henrich and Rozenberg, Boris and Slamanig, Daniel (2015):
Towards a New Paradigm for Privacy and Security in Cloud Services.
In: CoRR abs/1506.05980 (2015), [Article]

Letzkus, Fabian (2015):
NotaryCache: Preventing man-in-the-middle attacks through ubiquitous multi-path probing.
TU Darmstadt, [Master Thesis]

Likavec, Lena (2011):
Application of Lattice Basis Reduction.
TU Darmstadt, [Master Thesis]

Lindner, Richard (2011):
Towards Efficient Lattice-Based Cryptography.
TU Darmstadt, [Online-Edition: urn:nbn:de:tuda-tuprints-23877],
[Ph.D. Thesis]

Langer, Lucie and Wiesmaier, Alexander and Buchmann, Johannes (2011):
Secure Long-term Record Keeping in the Public Sector.
In: EGovernement Review, pp. 14-15, (7), [Article]

Lindner, Richard and Peikert, Chris (2011):
Better Key Sizes (and Attacks) for LWE-Based Encryption.
In: CT-RSA 2011, [Conference or Workshop Item]

Langer, Lucie (2010):
Privacy and Verifiability in Electronic Voting.
TU Darmstadt, [Online-Edition: urn:nbn:de:tuda-tuprints-23138],
[Ph.D. Thesis]

Langer, Lucie and Schmidt, Axel and Wiesmaier, Alexander (2010):
INNOVATIVE PERSONALAUSWEIS‐ANWENDUNGEN Mehrwert des elektronischen Personalausweises jenseits von Portal‐ und Formularanwendungen: Technische Machbarkeit und langfristige Sicherheit.
[Report]

Langer, Lucie and Volkamer, Melanie and Schmidt, Axel and Buchmann, Johannes (2010):
A Taxonomy Refining the Security Requirements for Electronic Voting: Analyzing Helios as a Proof of Concept.
In: Fifth International Conference on Availability, Reliability and Security (ARES 2010), IEEE Computer Society, Krakow, Poland, ISBN 978-0-7695-3965-2,
[Conference or Workshop Item]

Langer, Lucie and Jonker, Hugo and Pieters, Wolter (2010):
Anonymity and Verifiability in Voting: Understanding (Un)Linkability.
In: ICICS, Barcelona, Spain, [Conference or Workshop Item]

Langer, Lucie and Weber, Stefan and Schmidt, Axel and Buchmann, Johannes and Volkamer, Melanie (2009):
Towards Long-Term Free and Secret Electronic Elections Providing Voter-Verifiability in the Bulletin Board Model.
In: Proceedings of 3rd International Conference on Theory and Practice of Electronic Governance (ICEGOV2009), ACM Press, Bogota, Colombia, ISBN 978-1-60558-663-2,
[Conference or Workshop Item]

Langer, Lucie and Volkamer, Melanie and Weber, Stefan and Schmidt, Axel and Buchmann, Johannes
Davies, Jim and Janowski, Tomasz (eds.) (2009):
Towards Long-Term Free and Secret Electronic Elections Providing Voter-Verifiability in the Bulletin Board Model.
In: ICEGOV 2009, Proceedings of the 3rd International Conference on Theory and Practice of Electronic Governance, Bogota, 322, [Conference or Workshop Item]

Langer, Lucie and Wiesmaier, Alexander (2009):
Der Lifetime eSafe -- ein sicheres elektronisches Schließfach.
In: 8th European Conference on Digital Archiving (ECA2010), Geneva, Switzerland, [Conference or Workshop Item]

Langer, Lucie and Schmidt, Axel and Wiesmaier, Alexander (2009):
Projekt Campuspilot -- Akzeptanzbericht.
(TI-2/09), [Report]

Langer, Lucie and Schmidt, Axel and Volkamer, Melanie and Buchmann, Johannes
Fischer, Stefan and Maehle, Erik and Reischuk, Rüdiger (eds.) (2009):
Classifying Privacy and Verifiability Requirements for Electronic Voting.
In: Informatik 2009: Im Focus das Leben, Beiträge der 39. Jahrestagung der Gesellschaft für Informatik e.V. (GI), LNI, [Conference or Workshop Item]

Langer, Lucie and Schmidt, Axel and Buchmann, Johannes and Volkamer, Melanie and Stolfik, Alexander (2009):
Towards a Framework on the Security Requirements for Electronic Voting Protocols.
In: First International Workshop on Requirements Engineering for E-Voting Systems, Atlanta, GA, USA, In: IEEE CS Digital Library, doi: 10.1109/RE-VOTE.2009.9, ISBN 978-0-7695-4100-6,
DOI: http://doi.ieeecomputersociety.org/10.1109/RE-VOTE.2009.8,
[Conference or Workshop Item]

Langer, Lucie and Schmidt, Axel and Volkamer, Melanie (2009):
Verifizierbarkeit elektronischer Wahlen.
In: eGovernement Review, 4, [Article]

Langer, Lucie and Wiesmaier, Alexander (2009):
Langfristige Sicherheit am Beispiel eines virtuellen Tresors.
[Report]

Lucks, Stefan and Schuler, Andreas and Tews, Erik and Weinmann, Ralf-Philipp and Wenzel, Matthias
Fischlin, Marc (ed.) (2009):
Attacks on the DECT authentication mechanisms.
In: CT-RSA 2009, Springer, San Francisco, CA, USA, In: LNCS, ISBN 978-3-642-00861-0,
[Conference or Workshop Item]

Langer, Lucie and Schmidt, Axel and Wiesmaier, Alexander (2009):
From Student Smartcard Applications to the German Electronic Identity Card.
In: ECEG09, ACI, ISBN 978-1-906638-34-4,
[Conference or Workshop Item]

Langer, Lucie and Opitz-Talidou, Zoi (2009):
Elektronische Aufbewahrung von Wahldokumenten bei Onlinewahlverfahren.
In: IRIS 2009, [Conference or Workshop Item]

Langer, Lucie and Opitz-Talidou, Zoi (2009):
Elektronische Aufbewahrung von Wahldokumenten bei Onlinewahlen: Beweggründe, rechtliche Anforderungen und technische Umsetzung.
In: DuD, 9, [Article]

Langer, Lucie (2009):
Long-term verifiability of remote electronic elections.
In: Practical studies in e-Governement, Practical studies in e-Governement, [Book Section]

Langer, Lucie and Schmidt, Axel and Volkamer, Melanie (2009):
Verifizierbarkeit elektronischer Wahlen.
In: eGovernment Review, 4, [Article]

Langer, Lucie and Schmidt, Axel and Volkamer, Melanie and Buchmann, Johannes
Prosser, Alexander and Parycek, Peter (eds.) (2009):
Ein PKI-basiertes Protokoll für sichere und praktikable Onlinewahlen.
In: Proceedings of EDEM 2009 ; Tagungsband Elektronische Demokratie in Österreich, OCG Verlag, [Conference or Workshop Item]

Langer, Lucie and Schmidt, Axel (2008):
Onlinewahlen mit Wahldiensteanbieter - das Verbundprojekt voteremote.
In: EDem08, [Conference or Workshop Item]

Langer, Lucie and Schmidt, Axel and Buchmann, Johannes (2008):
Secure Online Elections in Practice.
[Other]

Lei, Qin (2008):
Design and Implementation of Secure Email for BlackBerry Devices - Solutions in the enterprise contex.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Langer, Lucie and Schmidt, Axel and Araújo, Roberto (2008):
A pervasively verifiable online voting scheme.
In: Informatik 2008, 133, ISBN 978-3-88579-227-7,
[Conference or Workshop Item]

Lehmann, Julian (2008):
Fast Elliptic Curve Operation Costs and Comparison of Sole Inversion Precomputation Schemes.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Längsfeld, Carsten (2008):
Entwurf und Implementierung eines OpenPGP Clients.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Langer, Lucie and Schmidt, Axel and Buchmann, Johannes
Remenyi, Dan (ed.) (2008):
Secure and Practical Online Elections via Voting Service Provider.
In: Proceedings of the 4th International Conference on e-Government -- ICEG, Melbourne, Australia, ACI, ISBN 978-1-9066938-21-4,
[Conference or Workshop Item]

Langer, Lucie
Remenyi, Dan (ed.) (2008):
Towards Legally Binding Online Elections in Germany.
In: Proceedings of the 4th International Conference on e-Government -- ICEG, Melbourne, Australia, ACI, ISBN 978-1-9066938-21-4,
[Conference or Workshop Item]

Liu, Fen and Ji, Wen and Hu, Lei and Ding, Jintai and Lv, Shuwang and Pyshkin, Andrei and Weinmann, Ralf-Philipp (2007):
Analysis of the SMS4 Block Cipher.
In: ACISP, [Conference or Workshop Item]

Lulev, Hristo (2007):
Overview of Bit Commitment Schemes.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Lippert, Marcus and Karatsiolis, Evangelos and Wiesmaier, Alexander and Buchmann, Johannes (2006):
Life-Cycle Management of X.509 Certifcates Based on LDAP Directories.
In: >Journal of Computer Security, pp. 419-439, 14(5), [Article]

Lindner, Richard (2006):
Current Attacks on NTRU.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Langer, Lucie (2006):
Stromchiffren - Entwurf, Einsatz und Schwächen.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Lippert, Marcus and Karatsiolis, Evangelos and Wiesmaier, Alexander and Buchmann, Johannes (2005):
Directory Based Registration in Public Key Infrastructures.
In: The 4th International Workshop for Applied PKI (IWAP’05), IOS Press, [Conference or Workshop Item]

Laabs, M. and Merz, M. and Wunderlich, J. and Straub, T. (2005):
Benutzbarkeitsevaluation von Trustcenter-Software am Beispiel der Windows 2003 Server {CA}.
In: D-A-CH Security, [Conference or Workshop Item]

Ludwig, Christoph (2005):
Practical Lattice Basis Sampling Reduction.
Technische Universit&auml;t Darmstadt, [Ph.D. Thesis]

Lue, Feng (2004):
Security Analysis of {RSA} Cryptosystem Against Side Channel Attacks.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Ludwig, Christoph (2003):
A Faster Lattice Reduction Method Using Quantum Search.
In: ISAAC 2003 - Algorithms and Computation, 14th International Symposium, Springer, Kyoto, Japan, In: LNCS, 2906, ISBN 3-540-20695-7,
[Conference or Workshop Item]

Liese, Thorsten (2003):
Eine Software zur automatisierten Erstellung von {IEEE829}-Testdokumentationen.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Ludwig, Christoph (2003):
A Faster Lattice Reduction Method Using Quantum Search.
(TI-3/03), [Report]

Ludwig, Christoph (2002):
The Security and Efficiency of Micciancio{'}s Cryptosystem.
(TI-7/02), [Report]

Lippert, Marcus (2000):
Ein beweisbar sicherer Pseudoufallsbit-Generator auf der Basis des {DL}-Problems in elliptischen Kurven.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Liefke, Thomas and Rodeh, Ohad and Setz, Thomas (1999):
First Steps in the Implementation of a Fault-Tolerant Tuple - Space Machine for Volatile Data.
(TI-13/99), [Report]

Liefke, Thomas and Setz, Thomas (1999):
Extension of the {TRIPS} Prototype.
(TI-12/99), [Report]

Liefke, Thomas (1997):
Tupleview: towards a Monitoring, Debugging and Profiling Tool for {LiPS}.
Universit&auml;t des Saarlandes, [Master Thesis]

Liefke, Thomas and Setz, Thomas (1997):
Tupleview - ein Monitoring-, Debugging- und Profiling-Tool für {LiPS}.
(TI-37/97), [Report]

Lippmann, Jens (1997):
Integration einer Testumgebung in {LiPS}.
Universit&auml;t des Saarlandes, [Master Thesis]

Lehmann, Frank (1994):
Implementierung von Algorithmen zur Berechnung modularer Polynome und deren Anwendung im Algorithmus von Atkin.
Universit&auml;t des Saarlandes, [Master Thesis]

Loho, Jürgen (1991):
Die Implementierung des Number Field Sieve.
Universit&auml;t des Saarlandes, [Master Thesis]

M

Mulholland, John and Mosca, Michele and Braun, Johannes (2017):
The Day the Cryptography Dies.
In: IEEE Security & Privacy, pp. 14-21, 15, (4), DOI: 10.1109/MSP.2017.3151325,
[Article]

Mohamed, Mohamed Saied Emam and El Bansarkhani, Rachid and Petzoldt, Albrecht (2016):
MQSAS - A Multivariate Sequential Aggregate Signature Scheme.
In: ISC 2016 - The 19th Information Security Conference, Springer LNCS, Honolulu, Hi, USA, [Conference or Workshop Item]

McGrew, David and Kampanakis, Panos and Fluhrer, Scott and Gazdag, Stefan-Lukas and Butin, Denis and Buchmann, Johannes (2016):
State Management for Hash-Based Signatures.
In: 3rd International Conference on Research in Security Standardisation (SSR 2016), Springer LNCS, Gaithersburg, USA, [Conference or Workshop Item]

Marky, Karola and Gutmann, Andreas and Rack, Philipp and Volkamer, Melanie (2016):
Privacy Friendly Apps-Making Developers Aware of Privacy Violations.
In: 1st International Workshop on Innovations in Mobile Privacy and Security, CEUR Workshop Proceedings, 1575, [Conference or Workshop Item]

Mayer, Christoph (2016):
Implementing a Toolkit for Ring-LWE Cryptography.
TU Darmstadt, [Master Thesis]

Meuser, Tobias and Schmidt, Larissa and Wiesmaier, Alexander (2015):
Comparing Lightweight Hash Functions – PHOTON & Quark.
[Report]

Mayer, Peter and Volkamer, Melanie and Kauer, Michaela
Prakash, Atul and Shyamasundar, Rudrapatna (eds.) (2014):
Authentication Schemes - Comparison and Effective Password Spaces.
In: Information Systems Security : International Conference on Information Systems Security (ICISS), Berlin, Cham, Springer International Publishing, In: International Conference on Information Systems Security (ICISS), Hyderabad, India, 16-20.12.2014, In: Lecture notes in computer science, 8880, ISBN 978-3-319-13840-4,
DOI: 10.1007/978-3-319-13841-1_12,
[Conference or Workshop Item]

Meziani, Mohammed (2014):
Designing and Improving Code-based Cryptosystems.
Germany, TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/3972],
[Ph.D. Thesis]

Mohamed, Mohamed Saied Emam and Buchmann, Johannes (2014):
Mutant Differential Fault Analysis of Trivium MDFA.
In: the 17th Annual International Conference on Information Security and Cryptology, ICISC2014, Springer, [Conference or Workshop Item]

Mohamed, Mohamed Saied Emam and Bulygin, Stanislav and Zohner, Michael and Heuser, Annelie and Walter, Michael and Buchmann, Johannes (2013):
Improved Algebraic Side-Channel Attack on AES.
In: Journal of Cryptographic Engineering, pp. 139-156, [Article]

Mohamed, Mohamed Saied Emam and Bulygin, Stanislav and Zohner, Michael and Heuser, Annelie and Walter, Michael and Buchmann, Johannes (2012):
Improved Algebraic Side-Channel Attack on AES.
In: 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, IEEE, ISBN 978-1-4673-2341-3,
DOI: 10.1109/HST.2012.6224335,
[Conference or Workshop Item]

Moecke, Cristian Thiago and Volkamer, Melanie (2012):
Usable Secure Email Communications - Criteria and evaluation of existing approaches.
In: Information and Computer Security, pp. 75-85, DOI: 10.1108/09685221311314419,
[Article]

Meziani, Mohammed (2012):
SBS: A Fast and Secure Syndrome Based Stream Cipher.
[Other]

Meziani, Mohammed and Hoffmann, Gerhard and Cayrel, Pierre-Louis (2012):
Improving the Performance of the SYND Stream Cipher.
In: AfricaCrypt 2012, Springer, Al Akhawayn University, Ifran, Morocco, In: LNCS, [Conference or Workshop Item]

Meziani, Mohammed and El Bansarkhani, Rachid (2012):
An Efficient and Secure Coding-based Authenticated Encryption.
In: 7th DPM International Workshop on Data Privacy Management (DPM 2012), Springer, Pisa, Italy, In: LNCS, [Conference or Workshop Item]

Mohamed, Mohamed Saied Emam and Ding, Jintai and Buchmann, Johannes
Kim, Tai-Hoon and Adeli, Hojjat and Robles, Rosslin John and Balitanas, Maricel (eds.) (2011):
Towards Algebraic Cryptanalysis of HFE Challenge 2.
In: Proceedings of "The 5th International Conference on Information Security and Assurance" ISA 2011, Springer, Brno University, Czech Republic, In: Communications in Computer and Information Science, ISBN 978-3-642-23140-7,
DOI: 10.1007/978-3-642-23141-4_12,
[Conference or Workshop Item]

Mohamed, Mohamed Saied Emam and Bulygin, Stanislav and Buchmann, Johannes
Kim, Tai-Hoon and Adeli, Hojjat and Robles, Rosslin John and Balitanas, Maricel (eds.) (2011):
Using SAT Solving to Improve Differential Fault Analysis of Trivium.
In: Proceedings of "The 5th International Conference on Information Security and Assurance" ISA 2011, Springer, Brno, Czech Republic, In: Communications in Computer and Information Science, 200, DOI: 10.1007/978-3-642-23141-4_7,
[Conference or Workshop Item]

Mohamed, Mohamed Saied Emam (2011):
Improved Strategies for Solving Multivariate Polynomial Equation Systems over Finite Fields.
Darmstadt, TU Darmstadt, Informatik, [Online-Edition: urn:nbn:de:tuda-tuprints-26222],
[Ph.D. Thesis]

Meziani, M. and Alaoui, Sidi Mohamed El Yousfi and Cayrel, Pierre-Louis (2011):
Hash Functions Based on Coding Theory.
In: 2nd Workshop on Codes, Cryptography and Communication Systems (WCCCS 2011), [Conference or Workshop Item]

McHardy, Patrick and Schuler, Andreas and Tews, Erik (2011):
Interactive decryption of DECT phone calls.
In: Fourth ACM Conference on Wireless Network Security (WiSec '11), Hamburg, [Conference or Workshop Item]

Mönkehues, Stephan (2011):
SWIFFT-Modifikationen, Korrektur von Operm5.
TU Darmstadt, [Master Thesis]

Mohamed, Mohamed Saied Emam and Bulygin, Stanislav and Buchmann, Johannes (2011):
Improved Differential Fault Analysis of Trivium.
In: Proceedings of COSADE 2011, Darmstadt, [Conference or Workshop Item]

Milde, Benjamin and Schneider, Michael (2011):
A Parallel Implementation of GaussSieve for the Shortest Vector Problem in Lattices.
In: PaCT 2011, [Conference or Workshop Item]

Mohamed, Mohamed Saied Emam and Ding, Jintai and Buchmann, Johannes (2011):
The Complexity Analysis of the MutantXL Family.
In: IACR Cryptology ePrint Archive, p. 36, [Article]

Meziani, Mohammed and Cayrel, Pierre-Louis and Alaoui, Sidi Mohamed El Yousfi
Kim, Tai-Hoon and Adeli, Hojjat and Robles, Rosslin John and Balitanas, Maricel (eds.) (2011):
2SC: An Efficient Code-Based Stream Cipher.
In: ISA, Springer, 200, [Conference or Workshop Item]

Mohamed, Mohamed Saied Emam and Cabarcas, Daniel and Ding, Jintai and Buchmann, Johannes and Bulygin, Stanislav
Lee, Donghoon and Hong, Seokhie (eds.) (2010):
MXL3: An efficient algorithm for computing Gröbner bases of zero-dimensional ideals.
In: Proceedings of the 12th International Conference on Information Security and Cryptography - ICISC 2009, Springer, Seoul, Korea, Lecture Notes in Computer, ISBN 978-3-642-14422-6,
DOI: 10.1007/978-3-642-14423-3_7,
[Conference or Workshop Item]

Mohamed, Wael Said Abd Elmageed and Bulygin, Stanislav and Ding, Jintai and Buchmann, Johannes and Werner, Fabian
Heng, S.-H. and Wright, R. N. and Goi, B.-M. (eds.) (2010):
Practical Algebraic Cryptanalysis for Dragon-based Cryptosystems.
In: Proceedings of The Ninth International Conference on Cryptology And Network Security (CANS 2010), Springer, Kuala Lumpur, Malaysia, In: Lecture Notes in Computer Science, ISBN 978-3-642-17618-0,
DOI: 10.1007/978-3-642-17619-7_11,
[Conference or Workshop Item]

Mohamed, Wael Said Abd Elmageed and Ding, Jintai and Kleinjung, Thorsten and Bulygin, Stanislav and Buchmann, Johannes
Cid, Carlos and Faugere, Jean-Charles (eds.) (2010):
PWXL: A Parallel Wiedemann-XL Algorithm for Solving Polynomial Equations over GF(2).
In: Proceedings of the 2nd International Conference on Symbolic Computation and Cryptography (SCC 2010), [Conference or Workshop Item]

Marinov, Veselin (2010):
ECDSA Plug-in for the E-learning Platform JCrypTool.
TU Darmstadt, [Master Thesis]

Mohamed, Mohamed Saied Emam and Ding, Jintai and Buchmann, Johannes and Werner, Fabian (2009):
Algebraic Attack on the MQQ Public Key Cryptosystem.
In: Cryptology and Network Security, 8th International Conference, CANS 2009, Springer, Kanazawa, Japan, In: LNCS, ISBN 978-3-642-10432-9,
DOI: 10.1007/978-3-642-10433-6_26,
[Conference or Workshop Item]

Molter, Gregor and Ogata, Kei and Tews, Erik and Weinmann, Ralf-Philipp (2009):
An Efficient FPGA Implementation for an DECT Brute-Force Attacking Scenario.
In: 5th IEEE International Conference on Wireless and Mobile Communications (ICWMC 2009), IEEE Computer Society, ISBN 978-0-76-953750-4,
DOI: 10.1109/ICWMC.2009.20,
[Conference or Workshop Item]

Mengele, Alexandra (2009):
Digital Enhanced Cordless Telecommunication (DECT) devices for residential use.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Mohamed, Mohamed Saied Emam and Mohamed, Wael Said Abd Elmageed and Ding, Jintai and Buchmann, Johannes (2008):
MXL2: Solving Polynomial Equations over GF(2) Using an Improved Mutant Strategy.
In: Post-Quantum Cryptography, Second International Workshop, PQCrypto 2008, DOI: 10.1007/978-3-540-88403-3_14,
[Conference or Workshop Item]

Möller, Marco (2008):
Information Theoretical Models for Hierarchical Structured Agents and their Computation</a> - Informationtheoretische Modelle für hierarchisch strukturierte Agenten und ihre Berechnung (deutsche Zusammenfassung).
Technische Universit&auml;t Darmstadt, [Master Thesis]

Matzies, Alexander (2007):
Implementierung flexibler Skalarmultiplikation auf Elliptischen Kurven.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Meziani, Mohammed (2007):
Konstruktion von Hashfunktionen.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Meyer, Ulrike and Wetzel, Susanne (2006):
Introducing History Enriched Security Context Transfer to Enhance the Security of Susequent Handover.
In: Workshop on Pervasive Computing and Communication Security, IEEE, Pisa, Italy, DOI: 10.1109/PERCOMW.2006.70,
[Conference or Workshop Item]

Meyer, Andreas (2006):
{"U}ber die Sicherheit und Effizienz kryptographischer Verfahren in algebraischen Zahlkörpern.
Technische Universit&auml;t Darmstadt, [Ph.D. Thesis]

Meyer, Ulrike (2005):
Secure Roaming and Handover Procedures in Wireless Access Networks.
Technische Universit&auml;t Darmstadt, [Ph.D. Thesis]

Meyer, Ulrike and Cordasco, Jared and Wetzel, Susanne
Choi, Sunghyun and Buddhikot, Milind and Cigno, Renato Lo (eds.) (2005):
An approach to enhance inter-provider roaming through secret sharing and its application to {WLAN}s.
In: WMASH, ACM, ISBN 1-59593-143-0,
[Conference or Workshop Item]

Meyer, Ulrike and Wetzel, Susanne (2004):
A man-in-the-middle attack on {UMTS}.
In: Workshop on Wireless Security 2004, ACM, Philadelphia, PA, USA, ISBN 1-58113-925-X,
DOI: 10.1145/1023646.1023662,
[Conference or Workshop Item]

Meyer, Ulrike and Kastell, Kira and Fernandez-Pello, Adrian and Perez, Diego and Jakoby, Rolf (2004):
Advantage and Use of a Location Based Handover Algorithm.
In: IEEE conference VTC2004-Fall, [Conference or Workshop Item]

Meyer, Ulrike and Wetzel, Susanne (2004):
On the Impact of GSMs Encryption and Man-in-the-middle Attacks on the Security of Interoperating GSM/UMTS Networks.
In: The 15th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications - PIMRC 2004, Barcelona, Spain, 5-8 September 2004, DOI: 10.1109/PIMRC.2004.1368846,
[Conference or Workshop Item]

Müller, Tobias (2004):
Sicherheitsparameter für Regevs Kryptosystem.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Möller, Bodo (2003):
Improved Techniques for Fast Exponentiation.
In: ICISC 2002 - Information Security and Cryptology - 5th International Conference, Springer, In: LNCS, 2587, ISBN 3-540-00716-4,
[Conference or Workshop Item]

Möller, Bodo (2003):
Provably Secure Public-Key Encryptionfor Length-Preserving Chaumian Mixes.
In: CT-RSA 2003 - Topics in Cryptology, The Cryptographers' Track at the RSA Conference 2003, Springer, San Francisco, CA, USA, In: LNCS, 2612, ISBN 3-540-00847-0,
[Conference or Workshop Item]

Möller, Bodo (2003):
Improved Techniques for Fast Exponentiation.
In: ICISC 2002 - Information Security and Cryptology, Springer, Seoul, Korea, In: LNCS, 2587, ISBN 978-3-540-00716-6,
[Conference or Workshop Item]

Möller, Bodo (2003):
Public-Key Cryptography - Theory and Practice.
Technische Universit&auml;t Darmstadt, [Ph.D. Thesis]

Möller, Bodo (2002):
Parallelizable Elliptic Curve Point Multiplication Method with Resistance against Side-Channel Attacks.
In: ISC 2002 - Information Security, 5th International Conference, Springer, Sao Paulo, Brazil, In: LNCS, ISBN 3-540-44270-7,
[Conference or Workshop Item]

Maseberg, Jan Sönke (2002):
Fail-Safe-Konzept für Public-Key-Infrastrukturen.
Darmstadt, Technische Universität, TU Darmstadt, [Online-Edition: urn:nbn:de:tuda-tuprints-2464],
[Ph.D. Thesis]

Möller, Bodo (2002):
Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes.
(TI-5/02), [Report]

Müller, Andreas Rudolf (2002):
JLiPSD} - eine Portierung des lipsd nach {Java.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Möller, Bodo (2001):
Securing Elliptic Curve Point Multiplication against Side-Channel Attacks.
In: ISC 2001 - Information Security, 4th International Conference, Springer, Malaga, Spain, In: LNCS, ISBN 3-540-42662-0,
[Conference or Workshop Item]

Meyer, Andreas and Neis, Stefan and Pfahler, Thomas (2001):
First Implementation of Cryptographic Protocols Based on Algebraic Number Fields.
In: ACISP 2001 - Australasian Conference on Information Security and Privacy, Springer, In: LNCS, 2119, DOI: 10.1007/3-540-47719-5_9,
[Conference or Workshop Item]

Maurer, Markus (2000):
Regulator approximation and fundamental unit computation for real-quadratic orders.
Darmstadt, Technische Universität, TU Darmstadt, [Online-Edition: urn:nbn:de:tuda-tuprints-878],
[Ph.D. Thesis]

Müller, Volker and Stein, Andreas and Thiel, Christoph (1999):
Computing discrete logarithms in real quadratic congruence function fields of large genus.
In: >Mathematics of Computation, pp. 807-822, 68, (226), [Article]

Müller, Volker and Paulus, Sachar (1998):
Elliptische Kurven und Public Key Kryptographie.
[Other]

Müller, Volker (1998):
Fast Multiplication on Elliptic Curves over Small Fields of Characteristic Two.
In: >Journal of Cryptology, pp. 219-234, 11, (4), [Article]

Müller, Volker and Vanstone, Scott and Zuccherato, Robert (1998):
Discrete Logarithm Based Cryptosystems in Quadratic Function Fields of Characteristic 2.
In: >Designs, Codes and Cryptography, pp. 159-178, 14, (2), [Article]

Maurer, Markus (1997):
The logarithm function in LiDIA's bigfloat class.
Darmstadt, TU Darmstadt, FB20, Institut für Theoretische Informatik, [Report]

Meyer, Andreas (1997):
Ein neues Identifikations- und Signaturverfahren über imaginär-quadratischen Klassengruppen.
Universit&auml;t des Saarlandes, [Master Thesis]

Müller, Volker (1997):
Fast Multiplication on Elliptic Curves over Small Fields of Characteristic Two.
(TI-4/97), [Report]

Müller, Volker (1997):
Efficient Algorithms for Multiplication on Elliptic Curves.
(TI-9/97), [Report]

Müller, Volker (1997):
Efficient Algorithms for Multiplication on Elliptic Curves.
[Other]

Müller, Volker and Paulus, Sachar (1997):
On the Generation of Cryptographically Strong Elliptic Curves.
(TI-25/97), [Report]

Meyer, Bernd and Müller, Volker (1996):
A Public Key Cryptosystem Based on Elliptic Curves over {Z/nZ} Equivalent to Factoring.
In: EUROCRYPT '96 - International Conference on the Theory and Application of Cryptographic Techniques, Springer, Saragossa, Spain, In: LNCS, ISBN 3-540-61186-X,
[Conference or Workshop Item]

Mignotte, Maurice and Pethö, Attila and Roth, Ralf (1996):
Complete solutions of a family of quartic Thue and index form equations.
In: >Mathematics of Computation, pp. 341-354, 65, (213), [Article]

Monstadt, Andreas (1996):
Eine Entwicklungsumgebung für die objektorientierte Bibliothek {LiDIA}.
Universit&auml;t des Saarlandes, [Master Thesis]

Meyer, Bernd (1995):
Zur Trennung von Klassen ununterscheidbarer Ensembles.
Universit&auml;t des Saarlandes, [Ph.D. Thesis]

Müller, Andreas (1995):
Eine {FFT}-Continuation für die elliptische Kurvenmethode.
Universit&auml;t des Saarlandes, [Master Thesis]

Müller, Volker (1995):
Ein Algorithmus zur Bestimmung der Punktanzahl elliptischer Kurven über Körpern der Charakteristik größer drei.
Universit&auml;t des Saarlandes, [Ph.D. Thesis]

Maurer, Markus (1994):
Eine Implementierung des Algorithmus von Atkin zur Berechnung der Punktanzahl elliptischer Kurven über endlichen Primkörpern der Charakteristik größer drei.
Universit&auml;t des Saarlandes, [Master Thesis]

Müller, Achim (1994):
Effiziente Algorithmen für Probleme der linearen Algebra über {$mathbbZ$}.
Universit&auml;t des Saarlandes, [Master Thesis]

Merscher, Patrick (1992):
Standards fuer objektorientiertes Programmieren in der Computeralgebra.
Universit&auml;t des Saarlandes, [Master Thesis]

Meyer, Bernd (1992):
Bit-Commitment-Schemes und Zero-Knowledge.
Universit&auml;t des Saarlandes, [Master Thesis]

Müller, Volker (1991):
Berechnung der Punktanzahl Elliptischer Kurven über endlichen Primkörpern.
Universit&auml;t des Saarlandes, [Master Thesis]

N

Neumann, Stephan and Volkamer, Melanie and Budurushi, Jurlind and Prandini, Marco (2016):
SecIVo: a quantitative security evaluation framework for internet voting schemes.
In: >Annals of Telecommunications, pp. 1-16, DOI: 10.1007/s12243-016-0520-0,
[Article]

Neumann, Stephan and Volkamer, Melanie and Strube, Moritz and Jung, Wolfgang and Brelle, Achim (2015):
Cast-as-intended-Verifizierbarkeit für das Polyas-Internetwahlsystem.
In: Datenschutz und Datensicherheit, pp. 747-752, 11/2015, DOI: 10.1007/s11623-015-0512-7,
[Article]

Neumann, Stephan and Feier, Christian and Sahin, Perihan and Fach, Sebastian (2014):
Pretty Understandable Democracy 2.0.
In: 6th International Conference on Electronic Voting (EVOTE), TUT Press, Lochau, [Conference or Workshop Item]

Neumann, Stephan and Olembo, Maina and Renaud, Karen and Volkamer, Melanie
Kö, Andrea and Francesconi, Enrico (eds.) (2014):
Helios Verification: To Alleviate, or to Nominate: Is That The Question, Or Shall We Have Both?
In: 3rd International Conference on Electronic Government and the Information Systems Perspective, Springer, München, In: Lecture Notes in Computer Science, 8650, ISBN 978-3-319-10177-4,
[Conference or Workshop Item]

Neumann, Stephan and Kulyk, Oksana and Volkamer, Melanie (2014):
A Usable Android Application Implementing Distributed Cryptography For Election Authorities.
In: 9th International Workshop on Frontiers in Availability, Reliability and Security - FARES 2014, IEEE, Fribourg, Switzerland, [Conference or Workshop Item]

Neumann, Stephan and Budurushi, Jurlind and Volkamer, Melanie
Zissis, Dimitrios and Lekkas, Dimitrios (eds.) (2014):
Analysis of Security and Cryptographic Approaches to Provide Secret and Verifiable Electronic Voting.
IGI Global, pp. 27-61, [Book Section]

Neumann, Stephan and Kahlert, Anna and Henning, Maria and Richter, Philipp and Jonker, Hugo and Volkamer, Melanie
Wimmer, Maria and Tambouris, Efthimios and Macintosh, Ann (eds.) (2013):
Modeling the German Legal Latitude Principles.
In: 5th International Conference on eParticipation (ePart 2013), Springer, Koblenz, Germany, In: Lecture Notes in Computer Science, 8075, [Conference or Workshop Item]

Neumann, Stephan and Kulyk, Oksana and Murati, Lulzim and Volkamer, Melanie (2013):
Towards a Practical Mobile Application for Election Authorities (Demo).
In: 4th International Conference on e-Voting and Identity (VoteID13), [Conference or Workshop Item]

Neumann, Stephan and Kahlert, Anna and Henning, Maria and Jonker, Hugo and Volkamer, Melanie (2013):
Informatische Modellierung der Prinzipien des gesetzlichen Gestaltungsspielraums im Hinblick auf Wahlsysteme.
In: Abstraction and Application: Proceedings of the 16th International Legal Informatics Symposium (IRIS 2013), Salzburg, Austria, [Conference or Workshop Item]

Nie, Xuyun and Xu, Zhaohu and Buchmann, Johannes
Gaborit, Philippe (ed.) (2013):
Cryptanalysis of Hash-based Tamed Transformation and Minus Signature Scheme.
In: Fifth International Conference on Post-Quantum Cryptography - PQCrypto 2013, Springer, Limoges, France, In: LNCS, [Conference or Workshop Item]

Nie, Xuyun and Petzoldt, Albrecht and Buchmann, Johannes (2013):
Cryptanalysis of 2-layer Nonlinear Piece In Hand Method.
In: Second International Workshop on Modern Cryptography and Security Engineering - MoCrySen 2013, Regensburg, Germany, In: LNCS, [Conference or Workshop Item]

Neumann, Stephan and Volkamer, Melanie (2012):
Civitas and the Real World: Problems and Solutions from a Practical Point of View.
In: 7th International Conference on Availability, Reliability and Security (ARES), IEEE, Prague, Czech Republic, ISBN 978-1-4673-2244-7,
DOI: 10.1109/ARES.2012.75,
[Conference or Workshop Item]

Niebuhr, Robert (2012):
Attacking and Defending Code-based Cryptosystems.
TU Darmstadt, [Online-Edition: urn:nbn:de:tuda-tuprints-30312],
[Ph.D. Thesis]

Nickel, Claudia (2012):
Accelerometer-based Biometric Gait Recognition for Authentication on Smartphones.
TU Darmstadt, [Online-Edition: urn:nbn:de:tuda-tuprints-30146],
[Ph.D. Thesis]

Niebuhr, Robert and Meziani, Mohammed and Bulygin, Stanislav and Buchmann, Johannes (2012):
Selecting Parameters for Secure McEliece-based Cryptosystems.
In: International Journal of Information Security, pp. 137-147, 11, (3), [Article]

Neumann, Stephan and Volkamer, Melanie (2012):
Formal Treatment of Distributed Trust in Electronic Voting.
In: The Seventh International Conference on Internet Monitoring and Protection (ICIMP 2012), ThinkMind Digital Library, Stuttgart. Germany, ICIMP 2012, The Seventh I, ISBN 978-1-61208-201-1,
[Conference or Workshop Item]

Niebuhr, Robert and Cayrel, Pierre-Louis (2011):
Broadcast Attacks against Code-Based Schemes.
In: 4th Western European Workshop on Research in Cryptology, WEWoRC 2011, Springer, Weimar, Germany, In: LNCS, ISBN 978-3-642-34158-8,
[Conference or Workshop Item]

Niebuhr, Robert and Cayrel, Pierre-Louis and Buchmann, Johannes (2011):
Improving the effciency of Generalized Birthday Attacks against certain structured cryptosystems.
In: The Seventh International Workshop on Coding and Cryptography 2011 (WCC 2011), [Conference or Workshop Item]

Nohl, Karsten and Tews, Erik (2010):
Kann man mit DECT noch vertraulich telefonieren?
In: >Datenschutz und Datensicherheit (DuD), 2010, (11), [Article]

Niebuhr, Robert and Cayrel, Pierre-Louis and Bulygin, Stanislav and Buchmann, Johannes (2010):
On lower bounds for Information Set Decoding over F_q.
In: Proceedings of the 2nd International Conference on Symbolic Computation and Cryptography (SCC 2010), [Conference or Workshop Item]

Nohl, Karsten and Tews, Erik and Weinmann, Ralf-Philipp (2010):
Cryptanalysis of the DECT Standard Cipher.
In: Fast Software Encryption 2010, Seoul, [Conference or Workshop Item]

Niebuhr, Robert and Cayrel, Pierre-Louis and Bulygin, Stanislav and Buchmann, Johannes (2010):
Attacking code/lattice-based cryptosystems using Partial Knowledge.
In: Proceedings of Inscrypt 2010, China Press, [Conference or Workshop Item]

Nussbaumer, Mihaela (2008):
Elektronische (Langzeit-)Archivierung mit Hilfe digitaler Signaturen.
Technische Universität Darmstadt, [Master Thesis]

Nauheimer, Frank (2007):
Development of a lattice based blind signature scheme.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Nguentcheu, Paul Cesar (2007):
Analyse, Design und Implementierung von Krypto-Verfahren zur sicheren Netzwerkkommunikation.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Niebuhr, Robert (2006):
Application of Algebraic-Geometric Codes in Cryptography.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Neis, Stefan (2002):
Zur Berechnung von Klassengruppen.
Darmstadt, Technische Universität, TU Darmstadt, [Online-Edition: urn:nbn:de:tuda-tuprints-2835],
[Ph.D. Thesis]

Neis, Stefan (1998):
Reducing Ideal Arithmetic to Linear Albebra Problems.
(TI-9/98), [Report]

Nüsseler, Markus (1998):
Sicherer Zugangsschutz mit Hilfe eines Einmalpaßwortgenerators auf einer Chipkarte.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Neis, Stefan (1994):
Kurze Darstellungen von Ordnungen.
Universit&auml;t des Saarlandes, [Master Thesis]

Naumann-Kipper, Petra (1992):
Interaktive Beweissysteme und {Arthur-Merlin- Beweissysteme}.
Universit&auml;t des Saarlandes, [Master Thesis]

O

Olembo, Maina and Renaud, Karen and Bartsch, Steffen and Volkamer, Melanie (2014):
Voter, What Message Will Motivate You to Verify Your Vote?
In: Workshop on Usable Security (USEC), Internet Society, San Diego, ISBN 1-891562-37-1,
DOI: 10.14722/usec.2014.23038,
[Conference or Workshop Item]

Olembo, Maina and Bartsch, Steffen and Volkamer, Melanie
Schneider, Steve and Heather, James and Teague, Vanessa (eds.) (2013):
Mental Models of Verifiability in Voting.
In: 4th International Conference on e-Voting and Identity (VoteID13), Springer, University of Surrey, Guildford, UK, In: Lecture Notes in Computer Science, 7985, [Conference or Workshop Item]

Olembo, Maina and Volkamer, Melanie
Saeed, Saqib and Reddick, Christopher (eds.) (2013):
E-Voting System Usability: Lessons for Interface Design, User Studies, and Usability Criteria.
IGI Global, pp. 172 - 201, DOI: 10.4018/978-1-4666-3640-8.ch011,
[Book Section]

Olembo, Maina and Stockhardt, Simon and Hülsing, Andreas and Volkamer, Melanie
University, Plymouth (ed.) (2013):
Developing and Testing a Visual Hash Scheme.
In: European Information Security Multi-Conference (EISMC 2013), [Conference or Workshop Item]

Olembo, Maina and Volkamer, Melanie (2012):
Recommendations For E-Voting System Usability: Lessons From Literature For Interface Design, User Studies, and Usability Criteria.
[Report]

Olembo, Maina and Kahlert, Anna and Neumann, Stephan and Volkamer, Melanie
Kripp, Melanie J and Volkamer, Melanie and Grimm, Rüdiger (eds.) (2012):
Partial Verifiability in POLYAS for the GI Elections.
In: 5th International Conference on Electronic Voting 2012 (EVOTE2012), Gesellschaft für Informatik, Castle Hofen, Bregenz, Austria, In: LNI - Lecture Notes in Informatics, 205, ISBN 978-3-88579-299-4,
[Conference or Workshop Item]

Olembo, Maina and Volkamer, Melanie (2011):
Authentication Techniques, Client-Side Voting Software, and Secure Platform Mechanisms.
[Report]

Olembo, Maina and Schmidt, Patrick and Volkamer, Melanie (2011):
Introducing Verifiability in the POLYAS Remote Electronic Voting System.
In: Proceedings of the Sixth International Conference on Availability, Reliability and Security (ARES 2011), IEEE Computer Society, Vienna, Austria, [Conference or Workshop Item]

Overbeck, Raphael (2007):
Public Key Cryptography based on Coding Theory.
Darmstadt, Technische Universität, TU Darmstadt, [Online-Edition: urn:nbn:de:tuda-tuprints-8234],
[Ph.D. Thesis]

Oberender, Jens and Volkamer, Melanie and de Meer, Hermann (2007):
Denial-of-Service Flooding Detection in Anonymity Networks.
[Conference or Workshop Item]

Overbeck, Raphael (2006):
Statistical Decoding Revisited.
In: ACISP'06 - Proceedings of the 11th Australasian conference on Information Security and Privacy, Springer, In: LNCS, 4058, ISBN 978-3-540-35458-1,
DOI: 10.1007/11780656_24,
[Conference or Workshop Item]

Overbeck, Raphael (2006):
Extending Gibson's attacks on the {GPT} Cryptosystem.
In: Coding and Cryptography, Springer Berlin/Heidelberg, In: Lecture Notes in Computer Science, 3969/2006, ISBN 978-3-540-35481-9,
DOI: 10.1007/11779360_15,
[Conference or Workshop Item]

Overbeck, Raphael (2005):
A New Structural Attack for GPT and Variants.
In: Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Springer, Kuala Lumpur, Malaysia, In: LNCS, ISBN 3-540-28938-0,
DOI: 10.1007/11554868_5,
[Conference or Workshop Item]

Okeya, Katsuyuki and Takagi, Tsuyoshi and Vuillaume, Camille (2004):
On the Importance of Protecting {$Delta$} in {SFLASH} against Side Channel Attacks.
In: Itcc 2004: International Conference on Information Technology: Coding and Computing, Las Vegas, Nevada, USA, [Conference or Workshop Item]

Okeya, Katsuyuki and Schmidt-Samoa, Katja and Spahn, Christian and Takagi, Tsuyoshi (2004):
Signed Binary Representations Revisited.
In: CRYPTO 2004, Springer, In: Advances in cryptology : proceedings / CRYPTO 2004, 24th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15 - 19, 2004, In: LNCS, 3152, [Conference or Workshop Item]

Okeya, Katsuyuki and Takagi, Tsuyoshi and Vuillaume, Camille (2004):
On the Importance of Protecting {$Delta$} in {SFLASH} against Side Channel Attack.
(TI-8/04), [Report]

Overbeck, Raphael (2004):
Potential und Grenzen der Anwendung von Gitterreduktionsalgorithmen in der Kryptographie.
Technische Universit&auml;t Darmstadt, [Master Thesis]

P

Petzoldt, Albrecht and Szepieniec, Alan and Mohamed, Mohamed Saied Emam (2017):
A Practical Multivariate Blind Signature Scheme.
In: Financial Cryptography and Data Security 2017, Malta, [Conference or Workshop Item]

Petzoldt, Albrecht and Cheng, Ming-Shing and Yang, Bo-Yin and Chengdong, Tao and Ding, Jintai (2015):
Design Principles for HFEv- based Signature Schemes.
In: ASIACRYPT 2015 - Part I - 21st International Conference on the Theory and Application of Cryptology and Information Security, Springer, Auckland, New Zealand, In: LNCS, [Conference or Workshop Item]

Petzoldt, Albrecht and Bulygin, Stanislav and Buchmann, Johannes (2013):
A multivariate based threshold ring signature scheme.
In: Applicable Algebra in Engineering, Communication and Computing, pp. 255 - 275, 24, (3 - 4), DOI: 10.1007/s00200-013-0190-3,
[Article]

Petzoldt, Albrecht (2013):
Selecting and Reducing Key Sizes for Multivariate Cryptography.
Darmstadt, Germany, tuprints, TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/3523],
[Ph.D. Thesis]

Petzoldt, Albrecht and Bulygin, Stanislav and Buchmann, Johannes
Gaborit, Philippe (ed.) (2013):
Fast Verification for Improved Versions of the UOV and Rainbow Signature Schemes.
In: Fifth International Conference on Post-Quantum Cryptography - PQCrypto 2013, Springer, Limoges, France, In: LNCS, ISBN 978-3-642-38615-2,
[Conference or Workshop Item]

Petzoldt, Albrecht and Bulygin, Stanislav (2012):
Linear Recurring Sequences for the UOV Key Generation Revisited.
In: The 15th Annual International Conference on Information Security and Cryptology (ICISC 2012), Springer 2013, Seoul, Korea, In: Lecture Notes in Computer Science, ISBN 978-3-642-37681-8,
[Conference or Workshop Item]

Petzoldt, Albrecht and Thomae, Enrico and Bulygin, Stanislav and Wolf, Christopher
Preneel, Bart and Takagi, Tsuyoshi (eds.) (2011):
Small Public Keys and Fast Verification for Multivariate Quadratic Public Key Systems.
In: Proceedings of "Workshop on Cryptographic Hardware and Embedded Systems 2011 (CHES 2011)", Springer, In: Lecture Notes in Computer Science, 6917, [Conference or Workshop Item]

Petzoldt, Albrecht and Bulygin, Stanislav and Buchmann, Johannes
Catalano, Dario and Fazio, Nelly and Gennaro, Rosario and Nicolosi, Antonio (eds.) (2011):
Linear Recurring Sequences for the UOV Key Generation.
In: Proceedings of PKC 2011, Springer, In: LNCS, [Conference or Workshop Item]

Popovic, Darko (2011):
Kosten-Nutzen-Analyse von elektronischen Wahlen an der TU Darmstadt.
TU Darmstadt, [Master Thesis]

Petzoldt, Albrecht and Bulygin, Stanislav and Buchmann, Johannes
Gong, G. and Gupta, K. C. (eds.) (2010):
CyclicRainbow - A multivariate Signature Scheme with a Partially Cyclic Public Key.
In: Proceedings of IndoCrypt 2010, Springer, In: Lecture Notes in Computer Science, 6498, [Conference or Workshop Item]

Petzoldt, Albrecht and Bulygin, Stanislav and Buchmann, Johannes
Cid, Carlos and Faugere, Jean-Charles (eds.) (2010):
A Multivariate Signature Scheme with a Partially Cyclic Public Key.
In: Proceedings of the 2nd International Conference on Symbolic Computation and Cryptography (SCC 2010), [Conference or Workshop Item]

Popall, Enrico (2010):
Wirtschaftlicher Nutzen des neuen Personalausweises.
TU Darmstadt, [Master Thesis]

Petzoldt, Albrecht and Bulygin, Stanislav and Buchmann, Johannes
Sendrier, Nicolas (ed.) (2010):
Selecting Parameters for the Rainbow Signature Scheme.
In: Proceedings of PQCrypto 2010, Springer, In: Lecture Notes in Computer Science, [Conference or Workshop Item]

Pyshkin, Andrey (2008):
Algebraic Cryptanalysis in Block Ciphers Using Gröbner Bases.
Technische Universit&auml;t Darmstadt, [Ph.D. Thesis]

Pancheva, Krasimira (2007):
On Lattices, Codes and Regev{'}s Cryptosystem.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Peter, Markus (2006):
Angriffe auf das {McEliece} Kryptosystem.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Penev, Tsvetan (2005):
Identity Based Public Key Infrastructures.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Peter, Markus (2005):
Effizienz- und Sicherheitsanalyse von Micropayment Systemen.
Technische Universit&auml;t Darmstadt, [Other]

Poeplau, Lea (2005):
Counting Points on Elliptic Curves.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Pape, Sebastian (2004):
Sicherheitsmodelle für das Ajtai-Dwork-Kryptosystem.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Pitaev, Anna (2004):
Entwurf und Implementierung einer Revokationskomponente für ein {Java}-basiertes Trustcenter.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Planz, Thilo (2002):
Entwurf und Implementierung einer Infrastruktur für ein {Java}-basiertes Trustcenter.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Planz, Thilo (2002):
Konzepte für eine sichere Schlüsselverwaltung.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Petter, Andreas (2001):
Kryptographie mit algebraischen Zahlkörpern: Relevante Schlüssellängen.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Paulus, Sachar and Takagi, Tsuyoshi (2000):
A New Public-Key Cryptosystem over a Quadratic Order with Quadratic Decryption Time.
In: >Journal of Cryptology, 13, [Article]

Paulus, Sachar and Rück, Hans-Georg (1999):
Real and imaginary quadratic representations of hyperelliptic function fields.
In: >Mathematics in Computation, pp. 1233-1241, 68, (227), [Article]

Paulus, Sachar and Takagi, Tsuyoshi (1999):
A new public-key cryptosystem over quadratic orders with quadratic decryption time.
(TI-9/99), [Report]

Paulus, Sachar and Takagi, Tsuyoshi (1998):
A generalization of the Diffie-Hellman problem and related cryptosystems allowing fast decryption.
In: ICSCI '98 - 1st International Conference on Information Security and Cryptology, Korea Institute of Information Security and Cryptology (KIISC), Seoul, Korea, [Conference or Workshop Item]

Paulus, Sachar (1998):
Lattice Basis Reduction in Function Fields.
In: ANTS-III - Algorithmic Number Theory, Third International Symposium, Springer, Portland, Oregon, USA, In: LNCS, ISBN 3-540-64657-4,
[Conference or Workshop Item]

Paulus, Sachar (1998):
Lattice Basis Reduction in Function Fields.
(TI-2/98), [Report]

Paulus, Sachar and Takagi, Tsuyoshi (1998):
A generalization of the Diffie-Hellman problem and related cryptosystems allowing fast decryption.
(TI-5/98), [Report]

Pfahler, Thomas (1998):
Polynomfaktorisierung über endlichen Körpern.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Papanikolaou, Thomas (1997):
Technical documentation using a {C++} to {LaTeX} formatting program.
(TI-17/97), [Report]

Papanikolaou, Thomas (1997):
Entwurf und Entwicklung einer objektorientierten Bibliothek für algorithmische Zahlentheorie.
Universit&auml;t des Saarlandes, [Ph.D. Thesis]

Papanikolaou, Thomas and Zayer, Jörg (1997):
{ALGO.STY} - a {LaTeX} style for algorithm editing.
(TI-18/97), [Report]

Paulus, Sachar (1997):
{MAJA} - Das Konzept eines Multi Application {JavaCard} Environment.
(TI-34/97), [Report]

Paulus, Sachar and Rück, Hans-Georg (1997):
Real and imaginary quadratic representations of hyperelliptic function fields.
(TI-14/97), [Report]

Paulus, Sachar and Setz, Thomas (1997):
Developing and Testing a Smart Card Application.
(TI-27/97), [Report]

Paulus, Sachar (1996):
Ein Algorithmus zur Berechnung der Klassengruppe quadratischer Ordnungen über Hauptidealringen.
[Report]

Papanikolaou, Thomas (1993):
libF - Eine lange Gleitpunktarithmetik.
Universit&auml;t des Saarlandes, [Master Thesis]

Paulus, Sachar (1992):
Algorithmen fuer endliche abelsche Gruppen.
Universit&auml;t des Saarlandes, [Master Thesis]

R

Ranly, Paul Moritz (2019):
On the feasibility of hierarchical secret sharing-based distributed storage systems.
Darmstadt, TU Darmstadt, [Bachelor Thesis]

Roepke, Rene and Thraem, Timo and Wagener, Johannes and Wiesmaier, Alexander (2016):
A Survey on Protocols securing the Internet of Things: DTLS, IPSec and IEEE 802.11i.
[Report]

Roth, Johannes (2016):
Analyse von TLS Bibliotheken basierend auf Fuzz Testing.
TU Darmstadt, [Master Thesis]

Rauzy, Pablo and Kiss, Ágnes and Krämer, Juliane and Seifert, Jean-Pierre (2016):
Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT.
In: Constructive Side-Channel Analysis and Secure Design - 7. International Workshop (COSADE'16), Springer, DOI: 10.1007/978-3-319-43283-0_7,
[Conference or Workshop Item]

Rieß, Susanne (2016):
An Analysis of Lattice-Based Key Exchange Protocols.
TU Darmstadt, [Master Thesis]

Radeck-Arneth, Stephan and Milde, Benjamin and Lange, Arvid and Gouvea, Evandro and Radomski, Stefan and Biemann, Chris and Mühlhäuser, Max
Král, Pavel and Matoušek, Václav (eds.) (2015):
Open-Source German Distant Speech Recognition: Corpus and Acoustic Model.
In: Text, Speech and Dialogue. Proceedings of the 18th International Conference TSD2015, Plzen, Czech Republic, Springer International Publishing, DOI: 10.1007/978-3-319-24033-6,
[Conference or Workshop Item]

Renaud, Karen and Volkamer, Melanie (2015):
Exploring Mental Models Underlying PIN Management Strategies.
In: World Congress on Internet Security (WorldCIS 2015), IEEE, [Conference or Workshop Item]

Radeck-Arneth, Stephan and Biemann, Chris and Schnelle-Walka, Dirk (2014):
Towards Ambient Search.
In: Proceedings of the LWA 2014 Workshops: KDML, IR, FGWM, Aachen, Germany, 8-10 September 2014, Springer, [Conference or Workshop Item]

Riecker, Michael and Yuan, Dingwen and El Bansarkhani, Rachid and Hollick, Matthias (2014):
Patrolling wireless sensor networks: Randomized intrusion detection.
In: 10th ACM Symposium on QoS and Security for Wireless and Mobile Networks, Q2SWinet ’14, Montreal, QC, Canada, [Conference or Workshop Item]

Riecker, Michael and Biedermann, Sebastian and El Bansarkhani, Rachid and Hollick, Matthias (2014):
Lightweight Energy Consumption Based Intrusion Detection System for Wireless Sensor Networks.
In: International Journal of Information Security, Springer, pp. 155-167, 14, (2), ISSN 1615-5270,
[Article]

Rynkowski, Gregor (2013):
Individuell angepasstes Vertrauen in die Web-PKI: Eine Analyse des Einsparungspotentials an vertrauenswürdigen CAs.
TU Darmstadt, [Master Thesis]

Rothenberg, Christian Esteve and Macapuna, Carlos A. B. and Magalhães, Maurício F. and Verdi, Fábio and Wiesmaier, Alexander (2011):
In-packet Bloom Filters: Design and Networking Applications.
In: Computer Networks - The International Journal of Computer and Telecommunications Networking, pp. 1364-1378, 55, (6), [Article]

Rückert, Markus (2011):
Lattice-based Signature Schemes with Additional Features.
TU Darmstadt, [Online-Edition: urn:nbn:de:tuda-tuprints-23939],
[Ph.D. Thesis]

Rückert, Markus
Abe, Masayuki (ed.) (2010):
Lattice-based Blind Signatures.
In: ASIACRYPT 2010, Springer, Singapore, In: LNCS, ISBN 978-3-642-17372-1,
[Conference or Workshop Item]

Rückert, Markus
Garay, Markus A. and Prisco, Roberto De (eds.) (2010):
Adaptively Secure Identity-based Identification from Lattices without Random Oracles.
In: SCN 2010, Springer, Amalfi, Italy, In: LNCS, ISBN 978-3-642-15316-7,
[Conference or Workshop Item]

Rückert, Markus (2010):
Strongly Unforgeable Signatures and Hierarchical Identity-based Signatures from Lattices Without Random Oracles.
In: PQCrypto 2010, Springer, Darmstadt, In: LNCS, LNCS, ISBN 978-3-642-12928-5,
[Conference or Workshop Item]

Rückert, Markus and Schneider, Michael and Schröder, Dominique
Zhou, Jianying and Yung, Moti (eds.) (2010):
Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs.
In: ACNS 2010, Springer, Beijing, China, In: 6123 of LNCS, ISBN 978-3-642-13707-5,
[Conference or Workshop Item]

Rückert, Markus and Schröder, Dominique
Bernstein, Daniel and Lange, Tanja (eds.) (2010):
Fair Partially Blind Signatures.
In: Africacrypt 2010, Springer, In: LNCS, LNCS, ISBN 978-3-642-12677-2,
[Conference or Workshop Item]

Röhrig, Rouven (2010):
Entwurf und Implementierung eines Plug-ins für JCrypTool - S/MIME-Visualisierung.
TU Darmstadt, [Master Thesis]

Richter, Philipp and Langer, Lucie and Hupf, Katharina and Volkamer, Melanie and Buchmann, Johannes
Schweighöfer, Erich and Geist, Anton and Staufer, Ines (eds.) (2010):
Verifizierbarkeit und Öffentlichkeitsgrundsatz bei elektronischen Wahlen.
In: Globale Sicherheit und proaktiver Staat - Die Rolle der Rechtsinformatik, Tagungsband des 13. Internationalen Rechtsinformatik Symposium IRIS 2010, Salzburg, [Conference or Workshop Item]

Rückert, Markus and Schröder, Dominique
Shacham, Hovav and Waters, Brent (eds.) (2009):
Security of Verifiably Encrypted Signatures and a Construction Without Random Oracles.
In: Pairing 2009, Springer, Palo Alto, USA, LNCS, ISBN 978-3-642-03297-4,
[Conference or Workshop Item]

Rückert, Markus
Roy, Bimal and Sendrier, Nicolas (eds.) (2009):
Verifiably Encrypted Signatures from RSA without NIZKs.
In: Indocrypt 2009, Springer, New Delhi, India, In: LNCS, ISBN 978-3-642-10627-9,
[Conference or Workshop Item]

Roch, Steffen (2009):
Konzeption und Integration eines sicheren drahtlosen Netzwerks im Unternehmensumfeld (am Beispiel des Heraeus Konzerns).
Technische Universität Darmstadt, [Master Thesis]

Rückert, Markus and Schröder, Dominique (2009):
Aggregate and Verifiably Encrypted Signatures from Multilinear Maps Without Random Oracles.
In: ISA 2009, Springer, Seoul, In: LNCS, ISBN 978-3-642-02616-4,
[Conference or Workshop Item]

Rupp, Andy and Leander, Gregor and Bangerter, Endre and Dent, Alexander and Sadeghi, Ahmad-Reza (2008):
Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems.
In: Advances in Cryptology - ASIACRYPT 2008, [Conference or Workshop Item]

Richter, Peter (2008):
Optimierung des Merkle-Signaturverfahrens auf System z.
TU Darmstadt, [Master Thesis]

Rohde, Sebastian and Eisenbarth, Thomas and Dahmen, Erik and Buchmann, Johannes and Paar, Christof
Grimaud, Gilles and Standaert, François-Xavier (eds.) (2008):
Fast Hash-Based Signatures on Constrained Devices.
In: CARDIS 2008, Springer, London, GB, In: LNCS, ISBN 978-3-540-85892-8,
[Conference or Workshop Item]

Roth, Adrian (2008):
Implementierung von Applikationen für den FINREAD Kartenleser.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Rohde, Sebastian and Eisenbarth, Thomas and Dahmen, Erik and Buchmann, Johannes and Paar, Christof (2008):
Efficient Hash-Based Signatures on Embedded Devices.
In: SECSI - Secure Component and System Identification 2008, [Conference or Workshop Item]

Ruseva, Desislava (2008):
Security Analysis of Quaternion Signatures.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Rexroth, Peer and Wiesmaier, Alexander (2007):
MAVA - Modular Security for Distributed Applications.
(TI-1/07), [Report]

Roth, Andreas (2007):
Flexible - Eine erweiterbare {GUI} f{\"u}r den FlexiProvider (Backend).
Technische Universit&auml;t Darmstadt, [Master Thesis]

Rückert, Markus (2007):
Implementierung und Analyse von gitterbasierten Angriffen auf {NTRU}.
Technische Universität Darmstadt, [Master Thesis]

Rauchschwalbe, Ulrich and Wiesmaier, Alexander and Ludwig, Christoph and Buchmann, Johannes (2006):
Digital Signierte Wägeresultate - Neue Wege in der Sicherung eichfähiger Messwerte.
In: >W&auml;gen, Dosieren, Mischen - (WDM), pp. 23--27, 3/2006, [Article]

Roth, Volker and Straub, Tobias and Richter, Kai (2005):
Security and usability engineering with particular attention to electronic mail.
In: >International Journal of Man-Machine Studies, pp. 51-73, 63, (1-2), [Article]

Ruppert, Markus and Tak, Markus (2001):
Sicherheitsmanagement durch generische, objektorientierte Modellierung einer TrustCenter Software.
(TI-3/01), [Report]

Rauch, Katja (2000):
Implementierung von symmetrischen Verschlüsselungsverfahren.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Rau, Andrea (1999):
Bestimmung der Anzahl rationaler Punkte elliptischer Kurven über endlichen Körpern der Charakteristik 2.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Roth, Bärbel (1996):
Pseudozufallszahlengeneratoren in {LiSA}.
Universit&auml;t des Saarlandes, [Master Thesis]

Roth, Ralf and Setz, Thomas (1993):
Distributed Processing with {LiPS}.
[Other]

Roth, Ralf and Setz, Thomas (1993):
{LiPS}: a system for distibuted processing on workstations.
[Book]

Roth, Ralf (1992):
{LiPS} Ein System für verteilte Anwendungen.
Universit&auml;t des Saarlandes, [Master Thesis]

S

Schneider, Tidarat and Kerber, Jens and Goldstein, Denise and Takeva, Savina and Stemmler, Elisabeth
Braun, Johannes and Schneider, Tidarat and Goldstein, Denise (eds.) (2019):
Software-Cluster international - Innovation durch Internationalisierung: Ein Leitfaden.
TU Darmstadt, [Online-Edition: https://software-cluster.org/wp-content/uploads/2019/08/GESA...],
[Report]

Schwind, Julian (2019):
Sicherheits- und Datenschutzkonzept für die zentrale Verteilung von PPDs.
Darmstadt, TU Darmstadt, Fachbereich Informatik, [Bachelor Thesis]

Schabhüser, Lucas (2019):
Information-Theoretic Privacy in Verifiable Outsourced Computation.
TU Darmstadt, [Ph.D. Thesis]

Schabhüser, Lucas and Butin, Denis and Buchmann, Johannes (2019):
Context Hiding Multi-Key Linearly Homomorphic Authenticators.
In: Topics in Cryptology - CT-RSA 2019 - The Cryptographers' Track at the RSA Conference 2019, Springer, San Francisco, CA, USA, March 4–8, 2019, [Online-Edition: https://www.rsaconference.com/events/us19/speakers/cryptogra...],
[Conference or Workshop Item]

Schabhüser, Lucas and Butin, Denis and Buchmann, Johannes (2019):
Function-Dependent Commitments from Homomorphic Authenticators.
Springer, In: 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, 3-5 July 2019, [Online-Edition: https://acisp19.canterbury.ac.nz/],
[Conference or Workshop Item]

Schabhüser, Lucas (2019):
Information-Theoretic Privacy in Verifiable Outsourced Computation.
Darmstadt, Technische Universität, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/9052],
[Ph.D. Thesis]

Schabhüser, Lucas and Butin, Denis and Buchmann, Johannes (2018):
CHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear Case.
In: Information Security Practice and Experience - ISPEC 2018, In: Information Security Practice and Experience - 14th International Conference, ISPEC 2018, Tokyo, Japan, In: Springer LNCS, [Online-Edition: http://www.risk.tsukuba.ac.jp/ispec2018/],
[Conference or Workshop Item]

Schabhüser, Lucas and Butin, Denis and Demirel, Denise and Buchmann, Johannes (2018):
Function-Dependent Commitments for Verifiable Multi-Party Computation.
In: Information Security - 21st International Conference, ISC 2018, Guildford, UK, In: LNCS, [Online-Edition: http://isc2018.sccs.surrey.ac.uk/],
[Conference or Workshop Item]

Schreiber, Johannes (2017):
Countermeasures Against First Order Fault Attacks Using the Example of ring-TESLA.
TU Darmstadt, [Master Thesis]

Schmidt, Markus (2017):
Estimation of the Hardness of the Learning with Errors Problem with a Given Number of Samples.
TU Darmstadt, [Master Thesis]

Schabhüser, Lucas and Demirel, Denise and Buchmann, Johannes (2016):
An Unconditionally Hiding Auditing Procedure for Computations over Distributed Data.
In: The 2nd IEEE Workshop on Security and Privacy in the Cloud (SPC 2016), Philadelphia, PA USA, [Conference or Workshop Item]

Schabhüser, Lucas and Demirel, Denise and Buchmann, Johannes (2016):
An Unconditionally Hiding Auditing Procedure for Multi-Party Computations.
In: IACR - Cryptology ePrint Archive, 2016, [Article]

Stockhardt, Simon and Reinheimer, Benjamin and Volkamer, Melanie and Mayer, Peter and Kunz, Alexandra and Rack, Philipp and Lehmann, Daniel (2016):
Teaching Phishing-Security: Which Way is Best?
In: 31st International Conference on ICT Systems Security and Privacy Protection (IFIP SEC), Springer, Ghent, Belgium, [Conference or Workshop Item]

Schochlow, Verena and Neumann, Stephan and Braun, Kristoffer and Volkamer, Melanie (2016):
Bewertung der GMX/Mailvelope-Ende-zu-Ende-Verschlüsselung.
In: Datenschutz und Datensicherheit, 5/2016, DOI: 10.1007/s11623-016-0599-5,
[Conference or Workshop Item]

Schlipf, Mario (2015):
Password Policy Crawler.
TU Darmstadt, [Master Thesis]

Struck, Patrick (2015):
On the difference between hardness and security: a comparison of lattice-based signature schemes.
TU Darmstadt, [Master Thesis]

Shirazi, Fatemeh and Goehring, Matthias and Diaz, Claudia (2015):
Tor Experimentation Tools.
In: International Workshop on Privacy Engineering – IWPE'15, co-located with 36th IEEE symposium on Security and Privacy, IEEE, FAIRMONT, SAN JOSE, CA, [Conference or Workshop Item]

Schreiner, Steffen (2015):
A Security Architecture for e-Science Grid Computing.
TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/4376],
[Ph.D. Thesis]

Shirazi, Fatemeh and Volkamer, Melanie (2014):
What Deters Jane from Preventing Identification and Tracking on the Web?
In: 13th ACM Workshop on Privacy in the Electronic Society (WPES 2014), ACM, Scottsdale, Arizona, USA, ISBN 978-1-4503-3148-7,
DOI: 10.1145/2665943.2665963,
[Conference or Workshop Item]

Schlipf, Mario (2014):
Passwort-Richtlinien.
TU Darmstadt, [Master Thesis]

Strenzke, Falko (2013):
Efficiency and Implementation Security of Code-based Cryptosystems.
Darmstadt, TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/3690],
[Ph.D. Thesis]

Strenzke, Falko (2013):
Timing Attacks against the Syndrome Inversion in Code-Based Cryptosystems.
In: Fifth International Conference on Post-Quantum Cryptography - PQCrypto 2013, Springer, Limoges, France, In: LNCS, [Conference or Workshop Item]

Schnelle-Walka, Dirk and Radomski, Stefan and Radeck-Arneth, Stephan (2013):
Probabilistic Dialog Management.
In: Proceedings of VikingPLoP 2013 Conference, [Conference or Workshop Item]

Schneider, Michael (2013):
Sieving for Shortest Vectors in Ideal Lattices.
In: Africa Crypt 2013, Cairo, Egypt, [Conference or Workshop Item]

Shirazi, Fatemeh and Diaz, Claudia and Mullan, Ciaran and Wright, Joss and Buchmann, Johannes (2013):
Towards Measuring Resilience in Anonymous Communication Networks.
In: HotPETs 2013, [Article]

Schläpfer, Michael and Volkamer, Melanie (2012):
The Secure Platform Problem - Taxonomy and Analysis of Existing Proposals to Address this Problem.
In: Proceedings of the 6th International Conference on Theory and Practice of Electronic Governance, Albany, NY, USA, In: ACM, ISBN 978-1-4503-1200-4,
DOI: 10.1145/2463728.2463807,
[Conference or Workshop Item]

Schreiner, Steffen and Grigoras, Costin and Grigoras, Alina and Betev, Latchezar and Buchmann, Johannes (2012):
A Grid security architecture for AliEn.
In: Proceedings of Science (PoS), ISGC2012:027, International Symposium on Grids & Clouds (ISGC) 2012, Taipei, Taiwan, [Conference or Workshop Item]

Schreiner, Steffen and Grigoras, Costin and Litmaath, Maarten and Betev, Latchezar and Buchmann, Johannes (2012):
Certified Grid Job Submission in the ALICE Grid Services.
In: Open Access Journal of Physics: Conference Series (JPCS), International Conference on Computing in High Energy and Nuclear Physics (CHEP) 2012, [Article]

Schmidt, Axel (2012):
Enabling Secure Online Elections with the Voting Service Provider.
TU Darmstadt, [Ph.D. Thesis]

Schneider, Michael (2011):
Computing Shortest Lattice Vectors on Special Hardware.
TU Darmstadt, [Online-Edition: urn:nbn:de:tuda-tuprints-28290],
[Ph.D. Thesis]

Schreiner, Steffen and Bagnasco, Stefano and Banerjee, Subho Sankar and Betev, Latchezar and Carminati, Federico and Datskova, Olga Vladimirovna and Furano, Fabrizio and Grigoras, Alina and Grigoras, Costin and Lorenzo, Patricia Mendez and Peters, Andreas Joachim and Saiz, Pablo and Zhu, Jianlin (2011):
Securing the AliEn File Catalogue - Enforcing authorization with accountable file operations.
In: Journal of Physics: Conference Series (JPCS), 331:062044, International Conference on Computing in High Energy and Nuclear Physics (CHEP) 2010, [Article]

Schneider, Michael and Göttert, Norman
Preneel, Bart and Takagi, Tsuyoshi (eds.) (2011):
Random Sampling for Short Lattice Vectors on Graphics Cards.
In: Workshop on Cryptographic Hardware and Embedded Systems 2011 (CHES 2011), Springer, Nara, Japan, In: LNCS, DOI: 10.1007/978-3-642-23951-9_11,
[Conference or Workshop Item]

Shirazi, Fatemeh and Neumann, Stephan and Ciolacu, Ines and Volkamer, Melanie (2011):
Robust Electronic Voting: Introducing robustness in Civitas.
In: International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE), 2011, Trento, Italy, DOI: 10.1109/REVOTE.2011.6045915,
[Conference or Workshop Item]

Schmidt, Patrick (2011):
Fully Homomorphic Encryption: Overview and Cryptanalysis.
TU Darmstadt, [Master Thesis]

Schryen, Guido and Volkamer, Melanie and Habib, Sheikh Mahbub and Ries, Sebastian (2011):
A Formal Approach Towards Measuring Trust in Distributed Systems.
In: Proceedings of the 2011 ACM Symposium on Applied Computing, ACM, Taichung, Taiwan, ISBN 978-1-4503-0113-8,
DOI: 10.1145/1982185.1982548,
[Conference or Workshop Item]

Schneider, Michael (2011):
Analysis of Gauss-Sieve for Solving the Shortest Vector Problem in Lattices.
In: WALCOM 2011, Springer, In: LNCS, 6552, [Conference or Workshop Item]

Spycher, Oliver and Volkamer, Melanie and Koenig, Reto
Lipmaa, Helger and Kiayias, Aggelos (eds.) (2011):
Transparency and Technical Measures to Establish Trust in Norwegian Internet Voting.
In: 3rd international conference on e-voting and identity (VoteID 2011), Springer, In: Springer LNCS, ISBN 978-3-642-32746-9,
DOI: 10.1007/978-3-642-32747-6_2,
[Conference or Workshop Item]

Sami, Arif and Karabulut, Murat (2010):
Analyse von homomorpher Verschlüsselung und MIX Netzen für elektronische Wahlsysteme.
TU Darmstadt, [Master Thesis]

Strenzke, Falko (2010):
Manger's Attack revisited.
In: Twelfth International Conference on Information and Communications Security, Springer, [Conference or Workshop Item]

Schneider, Michael and Buchmann, Johannes (2010):
Extended Lattice Reduction Experiments using the BKZ Algorithm.
In: Sicherheit, GI, Berlin, In: LNI, [Conference or Workshop Item]

Schmidt, Axel and Volkamer, Melanie and Buchmann, Johannes
Krimmer, Robert and Grimm, Rüdiger (eds.) (2010):
An Evaluation and Certification Approach to Enable Voting Service Providers.
In: Electronic Voting 2010, EVOTE 2010, 4th International Conference, Co-organized by Council of Europe, Gesellschaft für Informatik and E-Voting.CC, July 21st - 24th, 2010, in Castle Hofen, Bregenz, Austria, GI, In: LNI, 167, ISBN 978-3-88579-261-1,
[Conference or Workshop Item]

Schmidt, Axel and Heinson, Dennis and Langer, Lucie and Opitz-Talidou, Zoi and Richter, Philipp and Volkamer, Melanie and Buchmann, Johannes
Ryan, Johannes Y. A. and Schoenmakers, Berry (eds.) (2009):
Developing a Legal Framework for Remote Electronic Voting.
In: E-Voting and Identity, Second International Conference, VOTE-ID 2009, Springer, Luxembourg, In: LNCS, 5767, ISBN 978-3-642-04134-1,
DOI: 10.1007/978-3-642-04135-8_6,
[Conference or Workshop Item]

Schmidt, Axel and Langer, Lucie and Buchmann, Johannes and Volkamer, Melanie (2009):
Specification of a Voting Service Provider.
In: First International Workshop on Requirements Engineering for E-Voting Systems, In: IEEE CS Digital Library, doi: 10.1109/RE-VOTE.2009.8, ISBN 978-0-7695-4100-6,
DOI: http://doi.ieeecomputersociety.org/10.1109/RE-VOTE.2009.8,
[Conference or Workshop Item]

Schneider, Michael and Buchmann, Johannes and Lindner, Richard (2009):
Probabilistic Analysis of LLL Reduced Bases.
In: Western European Workshop on Research in Cryptology - WEWoRC 2009, Springer, Graz University of Technology, Austria, In: LNCS, [Conference or Workshop Item]

Stopczynski, Martin (2009):
Erweiterte Benutzerführung für den Umgang mit sicheren Verbindungen in Browsern.
TU Darmstadt, [Master Thesis]

Schreiner, Steffen (2009):
The Impact of Linux Superuser Privileges on System and Data Security within a Cloud Computing Storage Architecture.
TU Darmstadt, [Master Thesis]

Schmidt, Axel and Volkamer, Melanie and Langer, Lucie and Buchmann, Johannes
Fischer, Stefan and Maehle, Erik and Reischuk, Rüdiger (eds.) (2009):
Towards the impact of the operational environment on the security of e-voting.
In: Informatik 2009: Im Focus das Leben, Beiträge der 39. Jahrestagung der Gesellschaft für Informatik e.V. (GI), Gesellschaft für Informatik, In: LNI, 154, [Conference or Workshop Item]

Schelten, Kevin (2008):
On a Special Class of Lattices, Computational Problems, and Hash Functions.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Schneider, Michael (2008):
Improved Authentication Path Computation for Merkle Trees.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Sögüt, Gökhan (2007):
Kombinierte Schwachstellenanalyse für schnelle Exponentiationen.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Stifi, Musab Haj (2007):
{GMSS} Signatur Generation für {RFID} Tags.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Schmidt, Arthur (2007):
Zur Lösung von zahlentheoretischen Problemen mit klassischen und Quantencomputern.
Technische Universit&auml;t Darmstadt, [Ph.D. Thesis]

Schuster, Dieter (2007):
Multivariate Interpolationsangriffe auf symmetrische Chiffren.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Schweickert, Ralf (2007):
Längerfristiger Zugriff auf verschlüsselte Daten bei Smartcard-basierten {PKI}-Lösungen.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Schmidt, Arthur (2006):
Quantum Algorithm for Solving the Discrete Logarithm Problem in the Class Group of an Imaginary Quadratic Field and Security Comparison of Current Cryptosystems at the Beginning of Quantum Computer.
In: Emerging Trends in Information and Communication Security, International Conference, ETRICS 2006, In: LNCS, 3595, ISBN 3-540-34640-6,
DOI: 10.1007/11766155_34,
[Conference or Workshop Item]

Schmidt-Samoa, Katja (2006):
Contributions to Provable Security and Efficient Cryptography.
Darmstadt, Technische Universität, TU Darmstadt, [Online-Edition: urn:nbn:de:tuda-tuprints-7085],
[Ph.D. Thesis]

Straub, Tobias (2006):
Usability Challenges of PKI.
Darmstadt, Technische Universität, TU Darmstadt, [Online-Edition: urn:nbn:de:tuda-tuprints-6821],
[Ph.D. Thesis]

Straub, Tobias and Hartl, Manuel and Ruppert, Markus (2006):
Digitale Reisepässe in Deutschland . Prozesse und Sicherheits-Infrastruktur.
In: Sicherheit 2006 - "Sicherheit Schutz und Sicherheit", [Conference or Workshop Item]

Schmidt-Samoa, Katja (2006):
A New Rabin-type Trapdoor Permutation Equivalent to Factoring.
In: >Electronic Notes in Theoretical Computer Science, pp. 79-94, 157, (3), [Article]

Schmidt-Samoa, Katja and Semay, Olivier and Takagi, Tsuyoshi (2006):
Analysis of Fractional Window Recoding Methods and Their Application to Elliptic Curve Cryptosystems.
In: >IEEE Transactions on Computers, pp. 48-57, 55, (1), [Article]

Schmidt, Axel (2006):
Analyse von auf {C*} basierenden Public Key Chiffren.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Seipp, Michele-Yvonne (2006):
Formalisation of Proofs in Cryptography.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Schmidt-Samoa, Katja and Takagi, Tsuyoshi (2005):
Paillier's Cryptosystem Modulo p2q and Its Applications to Trapdoor Commitment Schemes.
In: Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Springer, Kuala Lumpur, Malaysia, In: LNCS, 3715, ISBN 3-540-28938-0,
DOI: 10.1007/11554868_21,
[Conference or Workshop Item]

Straub, Tobias and Ginkel, Thilo-Alexander and Buchmann, Johannes (2005):
A Multipurpose Delegation Proxy for WWW/ Credentials.
In: EuroPKI 2005 - Public Key Infrastructure, Second European PKI Workshop: Research and Applications, Springer, In: LNCS, 3545, ISBN 3-540-28062-6,
[Conference or Workshop Item]

Schmidt, Arthur and Vollmer, Ulrich (2005):
Polynomial time quantum algorithm for the computation of the unit group of a number field.
In: STOC 2005 - Proceedings of the 37th Annual ACM Symposium on Theory of Computing, ACM, Baltimore, MD, USA, ISBN 1-58113-960-8,
DOI: 10.1145/1060590.1060661,
[Conference or Workshop Item]

Seudié, Hervé (2005):
Anwendungen von Digitalen Identitäten an einer Hochschule.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Stegers, Till (2005):
Analysis of Faug&eacute;re&rsquo;s F5 Algorithm.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Satanovski, Vladislav (2005):
Zentralisierte Konfigurationsverwaltung komplexer IT-Systeme.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Sato, Hisayoshi and Schepers, Daniel and Takagi, Tsuyoshi (2004):
Exact Analysis of Montgomery Multiplication.
In: INDOCRYPT 2004 - 5th International Conference on Cryptology in India, Springer, Chennai, India, In: LNCS, 3348, ISBN 3-540-24130-2,
[Conference or Workshop Item]

Straub, Tobias and Heinemann, Andreas (2004):
An anonymous bonus point system for mobile commerce based on word-of-mouth recommendation.
In: ACM SAC 2004 - Proceedings of the 2004 ACM Symposium on Applied Computing, Nicosia, Cyprus, ISBN 1-58113-812-1,
DOI: 10.1145/967900.968059,
[Conference or Workshop Item]

Stögbauer, Marcus (2004):
Efficient Algorithms for Pairing-Based Cryptosystems.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Straub, Tobias (2004):
A Method for Strengthening Certificate Enrollment.
In: WartaCrypt 2004, Bedlewo, Poland, [Conference or Workshop Item]

Straub, Tobias and Baier, Harald (2004):
A Framework for Evaluating the Usability and the Utility of PKI-enabled Applications.
(TI-5/04), [Report]

Straub, Tobias and Baier, Harald (2004):
A Framework for Evaluating the Usability and the Utility of {PKI}-enabled Applications.
In: EUROPKI 2004, Springer, 3093, [Conference or Workshop Item]

Sato, Hisayoshi and Schepers, Daniel and Takagi, Tsuyoshi (2004):
Exact Analysis of Montgomery Multiplication.
(TI-2/04), [Report]

Schmidt-Samoa, Katja (2004):
Factorization-based Fail-Stop Signatures Revisited.
(TI-7/04), [Report]

Schmidt-Samoa, Katja and Semay, Olivier and Takagi, Tsuyoshi (2004):
Analysis of Some Efficient Window Methods and their Application to Elliptic Curve Cryptosystems.
(TI-3/04), [Report]

Schmidt, Arthur and Vollmer, Ulrich (2004):
Polynomial Time Quantum Algorithm for the Computation of the Unit Group of a Number Field.
(TI-1/04), [Report]

Schwierz, Sebastian (2004):
Sicherheitsanalyse für Langzeitsicherheit von Public-Key Verfahren.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Seiffert, Björn (2004):
Erweiterung der {Flexi-PKI} um einen {UMP}-Update-Service.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Semay, Olivier (2004):
Efficiency analysis of window methods using {Markov} chains.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Straub, Tobias (2003):
Efficient Two Party Multi-Prime {RSA} Key Generation.
In: Communication, Network, and Information Security -(CNIS 2003), IASTED International Conference on Communication, [Conference or Workshop Item]

Sakurai, Kouichi and Takagi, Tsuyoshi (2002):
On the Security of a Modified Paillier Public-Key Primitive.
In: ACISP 2002 - Information Security and Privacy, 7th Australian Conference, Springer, Melbourne, Australia, In: LNCS, 2384, ISBN 3-540-43861-0,
[Conference or Workshop Item]

Sakurai, Kouichi and Takagi, Tsuyoshi (2002):
New Semantically Secure Public-Key Cryptosystems from the {RSA}-Primitive.
In: PKC 2002 - Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, Springer, Paris, France, In: LNCS, ISBN 3-540-43168-3,
[Conference or Workshop Item]

Sakurai, Kouichi and Takagi, Tsuyoshi (2002):
On the Security of a Modified Paillier Public-Key Primitive.
(TI-4/02), [Report]

Sandner, Tobias (2002):
Signaturverfahren mittels hyperelliptischen Kurven und deren effiziente Implementierung.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Schmidt, Arthur (2002):
Zur Berechnung der Struktur endlicher abelscher Gruppen.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Sakurai, Kouichi and Takagi, Tsuyoshi (2001):
New Semantically Secure Public-Key Cryptosystems from the {RSA}-Primitive.
(TI-12/01), [Report]

Schramm, Dirk (2001):
Entwicklung einer flexiblen {Java}-basierten {S/MIME}-Erweiterung für Microsoft Outlook.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Schuster, Markus (2001):
{OpenRA} - Framework zur flexiblen Formularverarbeitung Darstellung, Transport und Produktion.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Seiler, Oliver (2001):
Signaturverfahren mit Elliptischen Kurven über Körpern der Charakteristik 2 und deren Arithmetik.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Seiler, Patrick (2001):
Konzept und Aufbau einer prototypischen Public Key Infrastruktur auf Basis von FlexiTrust.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Sesterhenn, Christoph (2000):
Design und Implementierung eines Kryptographie-Plugin für Email-Clients basierend auf {S/MIME} und {JAVA}.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Seipel, Michael (2000):
Die Java Cryptographic Architecture {(JCA)} als Implementierung der Generic Security Service {(GSS-API)} am Beispiel von {SAP R/3} Konzept und Prototyp.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Schaub, Joachim (1999):
Implementierung von Public-Key-Kryptosystemen über imaginär-quadratische Ordnungen.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Setz, Thomas (1998):
Dynamic-Load-Adaption in {LiPS}.
(TI-10/98), [Report]

Süssmann, Boris (1998):
Entwicklung eines sicheren Telearbeitsplatzes.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Setz, Thomas (1997):
Experience with Literate Programming or Towards Qualified Programming.
(TI-15/97), [Report]

Setz, Thomas (1997):
Design, Implementation and Performance of a Mutex-Token based Fault- Tolerant Tuple Space Machine.
(TI-39/97), [Report]

Setz, Thomas and Fischer, Johannes and Liefke, Thomas (1997):
libtracer: Eine komfortable Bibliothek zum Generieren levelbasierter Tracing-Ausgaben.
(TI-16/97), [Report]

Setz, Thomas and Liefke, Thomas (1997):
The {LiPS} Runtime Systems.
(TI-6/97), [Report]

Setz, Thomas and Lippmann, Jens (1997):
Softwaretesten in {LiPS}.
(TI-36/97), [Report]

Sauer, Michael (1997):
Eine Block-Lanczos Implementierung für {LiDIA}.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Schank, Eric (1997):
Probabilistische Beweisverifikation.
Technische Universit&auml;t Darmstadt, [Ph.D. Thesis]

Schwarz, Jochen (1997):
Entwurf und Implementierung einer objektorientierten Softwarebibliothek kryptographischer Algorithmen.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Setz, Thomas (1996):
Integration von Mechanismen zur Unterstützung der Fehlertoleranz in {LiPS}.
Universit&auml;t des Saarlandes, [Ph.D. Thesis]

Setz, Thomas and Fischer, Johannes (1996):
Fault-tolerant Distributed Applications in {LiPS}.
(TI-3/96), [Report]

Setz, Thomas and Levy, Zohar (1996):
Requirements for {TRIPS}.
(TI-6/96), [Report]

Schirokauer, Oliver and Weber, Damian and Denny, Thomas (1996):
Discrete Logarithms: The Effectiveness of the Index Calculus Method.
In: >Algorithmic Number Theory-(ANTS), pp. 337--362, 1122, [Article]

Sosnowski, Thomas (1994):
Faktorisieren mit dem Quadratischen Sieb auf dem Hypercube.
Universit&auml;t des Saarlandes, [Master Thesis]

Scheid, Erik (1993):
Ein neuer Algorithmus zur Berechnung der Klassenzahl algebraischer Zahlkörper.
Universit&auml;t des Saarlandes, [Master Thesis]

Schank, Eric (1991):
Zur probabilistischen Berechenbarkeitstheorie.
Universit&auml;t des Saarlandes, [Master Thesis]

T

Traverso, Giulia (2019):
Long-Term Confidential Secret Sharing-Based Distributed Storage Systems.
Darmstadt, Technische Universität, FG Informatik, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8762],
[Ph.D. Thesis]

Traverso, Giulia and Butin, Denis and Buchmann, Johannes and Palesandro, Alex (2018):
Coalition-Resistant Peer Rating for Long-Term Confidentiality.
In: PST 2018 - 16th Annual Conference on Privacy, Security and Trust, IEEE Computer Society, In: PST 2018 - 16th Annual Conference on Privacy, Security and Trust, Belfast, Northern Ireland, United Kingdom, August 28-30, 2018, [Online-Edition: https://pstnet.ca/pst2018/],
[Conference or Workshop Item]

Traverso, Giulia and Cordero, Carlos Garcia and Nojoumian, Mehrdad and Azarderakhsh, Reza and Demirel, Denise and Habib, Sheikh Mahbub and Buchmann, Johannes (2017):
Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems.
In: 15th Annual Conference on Privacy, Security and Trust (PST), Calgary, CA, 28.-30.8. 2017, [Online-Edition: https://www.ucalgary.ca/pst2017/],
[Conference or Workshop Item]

Traverso, Giulia and Demirel, Denise and Habib, Sheikh Mahbub and Buchmann, Johannes (2016):
AS³: Adaptive Social Secret Sharing for Distributed Storage Systems.
In: 2016 Privacy, Security and Trust Conference, IEEE, Auckland, New Zealand, [Conference or Workshop Item]

Traverso, Giulia and Demirel, Denise and Buchmann, Johannes (2016):
Dynamic and Verifiable Hierarchical Secret Sharing.
In: 9th International Conference on Information Theoretic Security - ICITS 2016, Springer, Tacoma, Washington, USA, [Conference or Workshop Item]

Traverso, Giulia and Demirel, Denise and Buchmann, Johannes (2016):
Homomorphic Signature Schemes - A survey.
Springer, In: SpringerBriefs in Computer Science, ISBN Softcover 978-3-319-32114-1 - ebook 978-3-319-32115-8,
DOI: 10.1007/978-3-319-32115-8,
[Book]

Ta, Vinh-Thong and Butin, Denis and Métayer, Daniel Le (2015):
Formal Accountability for Biometric Surveillance: A Case Study.
In: Annual Privacy Forum (APF2015), Springer, Luxembourg, In: LNCS, [Conference or Workshop Item]

Tao, Chengdong and Xiang, Hong and Petzoldt, Albrecht and Ding, Jintai (2015):
Simple Matrix - A Multivariate Public Key Cryptosystem (MPKC) for Encryption.
In: Finite Fields and Their Applications, pp. 352-368, (35), [Article]

Tews, Erik (2012):
DECT Security Analysis.
Darmstadt, TU Darmstadt, [Online-Edition: urn:nbn:de:tuda-tuprints-29328],
[Ph.D. Thesis]

Tews, Erik and Wälde, Julian and Weiner, Michael (2011):
Breaking DVB-CSA.
In: Western European Workshop on Research in Cryptology - WEWoRC 2011, Weimar, [Conference or Workshop Item]

Tzvetkov, Vesselin Dimitrov (2010):
Virtual Private Networks for mobile environments. Development of protocol for mobile security and algorithms for location update.
Darmstadt, Technische Universität, TU Darmstadt, [Online-Edition: urn:nbn:de:tuda-tuprints-20583],
[Ph.D. Thesis]

Tserovski, Lyudmil (2008):
Practical Security of Micciancios's Hash Function.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Tews, Erik (2007):
Attacks on the WEP protocol.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Tews, Erik and Weinmann, Ralf-Philipp and Pyshkin, Andrei (2007):
Breaking 104 Bit WEP in Less Than 60 Seconds.
In: WISA, [Conference or Workshop Item]

Tischhauser, Elmar (2007):
T-Funktionsbasierte Blockchiffren.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Tomova, Iskra (2007):
Implementierung eines Selbstbedienungsclients f{ü}r eine dezentral administrierbare Trustcenter-Lösung.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Tomova, Iskra (2005):
Card Manager: Entwurf und Implementierung.
Technische Universit&auml;t Darmstadt, [Other]

Tak, Markus (2002):
Ein {S/MIME}-Plugin für Outlook zur Verwendung alternativer kryptographischer Algorithmen.
(TI-9/02), [Report]

Takagi, Tsuyoshi (2001):
New public-key cryptosystems with fast decryption.
Technische Universit&auml;t Darmstadt, [Ph.D. Thesis]

Theobald, Patrick (2000):
Ein Framework zur Berechnung der Hermite-Normalform von großen, dünnbesetzten, ganzzahligen Matrizen.
Technische Universit&auml;t Darmstadt, [Ph.D. Thesis]

Tak, Markus (1999):
Public Key Infrastrukturen - ein {Java}-basiertes Trustcenter.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Teske, Edlyn (1999):
The Pohlig-Hellman Method Generalized for Group Structure Computation.
In: >Journal of Symbolic Computation, pp. 521-534, 27, (6), [Article]

Teske, Edlyn (1998):
Speeding Up Pollard's Rho Method for Computing Discrete Logarithms.
In: ANTS-III - Algorithmic Number Theory, Third International Symposium, Springer, Portland, Oregon, USA, In: LNCS, ISBN 3-540-64657-4,
[Conference or Workshop Item]

Teske, Edlyn (1998):
A space efficient algorithm for group structure computation.
In: >Mathematics of Computation, pp. 1637-1663, 67, (224), [Article]

Teske, Edlyn (1998):
The Pohlig-Hellman Method Generalized for Group Structure Computation.
(TI-7/98), [Report]

Teske, Edlyn (1998):
Algorithms for Finite Abelian Groups.
Shaker, Technische Universität Darmstadt, ISBN 978-3826540455,
[Ph.D. Thesis]

Teske, Edlyn (1998):
Speeding up Pollard's Rho Method for Computing Discrete Logarithms.
(TI-1/98), [Report]

Teske, Edlyn (1997):
A Space Efficient Algorithm for Group Structure Computation.
(TI-3/97), [Report]

Theobald, Patrick and Wetzel, Susanne and Backes, Werner (1997):
Design concepts for matrices and lattices in LiDIA.
In: Symposium on Applied Computing-(SAC), DOI: http://doi.acm.org/10.1145/331697.332344,
[Conference or Workshop Item]

Theobald, Patrick and Wetzel, Susanne and Setz, Thomas (1997):
LiDIA, LiPS - Erste gemeinsame Schritte.
(TI-38/97), [Report]

Theobald, Patrick and Wetzel, Susanne and Backes, Werner (1996):
Design Concepts for Matrices and Lattices in {LiDIA}.
(TI-4/96), [Report]

Theobald, Patrick (1995):
Eine Implementierung von Algorithmen der linearen Algebra über {$mathbbZ$}.
Universit&auml;t des Saarlandes, [Master Thesis]

Thiel, Christoph (1995):
On the complexity of some problems in algorithmic algebraic number theory.
Universit&auml;t des Saarlandes, [Ph.D. Thesis]

Thiel, Christoph (1994):
Under the Assumption of the Generalized {Riemann} Hypothesis Verifying the Class Number Belongs To {NP} $cap$ co-{NP}.
In: Algorithmic Number Theory-(ANTS), In: Lecture Notes in Computer Science, 877, [Conference or Workshop Item]

Thiel, Christoph (1992):
Zur Theorie interaktiver Beweissysteme mit mehreren Provern.
Universit&auml;t des Saarlandes, [Master Thesis]

Thiel, Christian (1992):
Zur Identität von {IP} und {ZK}.
Universit&auml;t des Saarlandes, [Master Thesis]

V

Volkamer, Melanie and Renaud, Karen and Gerber, Paul (2016):
Spot the phish by checking the pruned URL.
In: Information and Computer Security, pp. 372-385, 24, (4), DOI: 10.1108/ICS-07-2015-0032,
[Article]

Volkamer, Melanie and Renaud, Karen and Reinheimer, Benjamin (2016):
TORPEDO: TOoltip-poweRed Phishing Email DetectiOn.
In: 31st International Conference on ICT Systems Security and Privacy Protection (IFIP SEC), Springer, Ghent, Belgium, [Conference or Workshop Item]

Vigil, Martín and Demirel, Denise and Habib, Sheikh Mahbub and Hauke, Sascha and Buchmann, Johannes and Mühlhäuser, Max (2016):
LoT: a Reputation-based Trust System for Long-term Archiving.
In: SECURWARE 2016, Thinkmind Digital Library, Nice, France, ISBN 978-1-61208-493-0,
[Conference or Workshop Item]

Volkamer, Melanie and Renaud, Karen and Kulyk, Oksana and Emeröz, Sinem
Foresti, Sara (ed.) (2015):
A Socio-Technical Investigation into Smartphone Security.
In: Security and Trust Management: 11th International Workshop - STM 2015, Springer, [Conference or Workshop Item]

Volkamer, Melanie and Renaud, Karen and Kulyk, Oksana and Emeröz, Sinem (2015):
An Investigation into the "Other" Barriers to Adoption of Smartphone Security Precautions (Poor Usability being a Given).
[Report]

Volkamer, Melanie and Renaud, Karen and Braun, Kristoffer and Canova, Gamze and Reinheimer, Benjamin
Conti, Mauro and Schunter, Matthias and Askoxylakis, Ioannis (eds.) (2015):
Design and Field Evaluation of PassSec: Raising and Sustaining Web Surfer Risk Awareness.
In: International Conference on Trust and Trustworthy Computing (TRUST), Springer, Heraklion, Crete, Greece, In: Trust and Trustworthy Computing, ISBN 978-3-319-22845-7,
DOI: 10.1007/978-3-319-22846-4_7,
[Conference or Workshop Item]

Vigil, Martín and Buchmann, Johannes and Cabarcas, Daniel and Weinert, Christian and Wiesmaier, Alexander (2015):
Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: a survey.
In: Computers & Security, pp. 16-32, 50, [Article]

Vigil, Martín and Weinert, Christian and Demirel, Denise and Buchmann, Johannes (2014):
An efficient time-stamping solution for long-term digital archiving.
In: IEEE 33rd International Performance Computing and Communications Conference (IPCCC), Austin, TX, USA, DOI: 10.1109/PCCC.2014.7017099,
[Conference or Workshop Item]

Vieten, Jannik (2014):
Evaluierung des U-LP Verschlüsselungsverfahrens in der Praxis.
TU Darmstadt, [Master Thesis]

Vigil, Martín and Weinert, Christian and Braden, Kjell and Demirel, Denise and Buchmann, Johannes (2014):
A performance analysis of long-term archiving techniques.
In: IEEE - High Performace Computing and Communications (HPCC 2014), Paris, France, [Conference or Workshop Item]

Volkamer, Melanie and Renaud, Karen
Fischlin, Marc and Katzenbeisser, Stefan (eds.) (2013):
Mental Models – General Introduction and Review of Their Application to Human-Centred Security.
In: Number Theory and Cryptography, Springer Berlin Heidelberg, pp. 255-280, DOI: 10.1007/978-3-642-42001-6_18,
[Book Section]

Vigil, Martín and Cabarcas, Daniel and Huang, Jingwei and Buchmann, Johannes (2013):
Assessing Trust in the Long-Term Protection of Documents.
In: 18th IEEE Symposium on Computers and Communications (IEEE ISCC 2013), Split, Croatia, [Conference or Workshop Item]

Volkamer, Melanie and Stockhardt, Simon and Bartsch, Steffen and Kauer, Michaela (2013):
Adopting the CMU/APWG Anti-Phishing Landing Page idea for Germany.
In: 3rd Workshop on Socio-Technical Aspects in Security and Trust (STAST), 2013, IEEE Digital Library, New Orleans, LA, USA, DOI: 10.1109/STAST.2013.12,
[Conference or Workshop Item]

Volkamer, Melanie and Bartsch, Steffen and Kauer, Michaela
University, Plymouth (ed.) (2013):
Contextualized Security Interventions in Password Transmission Scenarios.
In: European Information Security Multi-Conference (EISMC 2013), Lisbon, Spain, [Conference or Workshop Item]

Vigil, Martín and Custódio, Ricardo Felipe (2012):
Cleaning up the PKI for Long-term Signatures.
In: 12th SBSeg 2012, Brazilian Symposium on Information and Computer System Security, Brazilian Computer Society, Curitiba PR, Brazil, [Conference or Workshop Item]

Vigil, Martín and Moecke, Cristian Thiago and Custódio, Ricardo Felipe and Volkamer, Melanie
De Capitani di Vimercati, Sabrina and Mitchell, Chris (eds.) (2012):
The Notary Based PKI -- A Lightweight PKI for Long-term Signatures on Documents.
In: EuroPKI 2012, September 13-14, Springer, Pisa, Italy, In: LNCS, ISBN 978-3-642-40011-7,
[Conference or Workshop Item]

Vigil, Martín Gagliotti and Cabarcas, Daniel and Wiesmaier, Alexander and Buchmann, Johannes (2012):
Authenticity, Integrity and Proof-of-Existence for Long-Term Archiving: a Survey.
In: IACR Cryptology ePrint Archive, [Article]

Volkamer, Melanie and Karayumak, Fatih and Kauer, Michaela and Halim, Dhanish and Bruder, Ralph (2012):
Security versus Trust Indicators in 2011 in Germany.
In: Current Issues in IT Security 2012, Duncker & Humblot, Freiburg, I, ISBN 978-3-86113-115-1,
[Conference or Workshop Item]

Volkamer, Melanie and Budurushi, Jurlind and Demirel, Denise (2011):
Vote casting device with VV-SV-PAT for elections with complicated ballot papers.
In: International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE'11), IEEE, Trento, Italy, ISBN 978-1-4577-0951-7,
DOI: 10.1109/REVOTE.2011.6045910,
[Conference or Workshop Item]

Volkamer, Melanie and Spycher, Oliver and Dubuis, Eric (2011):
Measures to Establish Trust in Internet Voting.
In: ICEGOV 2011, Proceedings of the 5th International Conference on Theory and Practice of Electronic Governance, ACM, Tallinn, Estonia, In: ICEGOV '11, DOI: http://doi.acm.org/10.1145/2072069.2072071,
[Conference or Workshop Item]

Volkamer, Melanie and Schryen, Guido (2010):
Measuring eTrust in distributed systems - General Concept and Application to Internet Voting.
In: 23rd Bled eConference, Bled, Slovenia, June 20-23, [Conference or Workshop Item]

Volkamer, Melanie (2010):
Evaluierungsverfahren für Internetwahlsysteme.
In: IT-Information Technology, pp. 169-172, it 3/2010, DOI: 10.1524/itit.2010.0587,
[Article]

Volkamer, Melanie
Gutwirth, Serge and Poullet, Yves and Hert, Paul De (eds.) (2010):
Data Protection in a Profiled World.
Springer, pp. 177-190, [Book Section]

Volkamer, Melanie and Schryen, Guido and Langer, Lucie and Schmidt, Axel and Buchmann, Johannes
Fischer, Stefan and Maehle, Erik and Reischuk, Rüdiger (eds.) (2009):
Elektronische Wahlen: Verifizierung vs. Zertifizierung.
In: Informatik 2009: Im Focus das Leben, Beiträge der 39. Jahrestagung der Gesellschaft für Informatik e.V., LNI, [Conference or Workshop Item]

Volkamer, Melanie and Grimm, Rüdiger (2009):
Determine the Resilience of Evaluated Internet Voting Systems.
In: First International Workshop on Requirements Engineering for E-Voting Systems, In: IEEE CS Digital Library, doi: 10.1109/RE-VOTE.2009.2, [Conference or Workshop Item]

Volkamer, Melanie (2009):
Evaluation of Electronic Voting -Requirements and Evaluation Procedures to Support Responsible Election Authorities.
Springer, ISBN 978-3-642-01661-5,
[Book]

Volkamer, Melanie
Wagner, Dorothea and Bernstein, Abraham (eds.) (2009):
Evaluation von Internetwahlsystemen.
In: Ausgezeichnete Informatikdissertationen 2008,, Gesellschaft für Informatik, In: LNI, D-9, [Conference or Workshop Item]

Vuillaume, Camille and Okeya, Katsuyuki and Dahmen, Erik and Buchmann, Johannes
Chung, Kyo-Il and Sohn, Kiwook and Yung, Moti (eds.) (2008):
Public Key Authentication with Memory Tokens.
In: Workshop on Information Security Applications - WISA 2008, Springer, Jeju Island, Korea, In: LNCS, ISBN 978-3-642-00305-9,
[Conference or Workshop Item]

Velyanova, Veneta (2008):
An Analysis of the Neff's Voter Verifiable Election Scheme.
Technische Universität Darmstat, [Master Thesis]

Velikov, Aleksandar (2008):
Provable Security of Merkle-Micciancio-Lyubashevsky's Signature.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Volkamer, Melanie and Vogt, Roland (2008):
Basissatz von Sicherheitsanforderungen an Online-Wahlprodukte.
(BSI-PP-0037-2008), [Article]

Vizev, Nikolay Vasilev (2007):
Side Channel Attacks on NTRUEncrypt.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Volkamer, Melanie and McGaley, Margaret (2007):
Requirements and Evaluation Procedures for eVoting.
In: Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, IEEE Computer Society, [Conference or Workshop Item]

Volkamer, Melanie and Hauff, Harald (2007):
Zum Nutzen hoher Zertifizierungsstufen nach den Common Criteria (II).
In: Datenschutz und Datensicherheit, pp. 766-768, 10, [Article]

Volkamer, Melanie and Hauff, Harald (2007):
Zum Nutzen hoher Zertifizierungsstufen nach den Common Criteria (I).
In: Datenschutz und Datensicherheit, pp. 692-695, 9, [Article]

Volkamer, Melanie and Krimmer, Robert and Grimm, Rüdiger
Prosser, Alexander and Parycek, Peter (eds.) (2007):
Independent Audits of Remote Electronic Voting -- Developing a Common Criteria Protection Profile.
In: Proceedings of EDEM 2007; Tagungsband Elektronische Demokratie in "Osterreich, In: OCG Verlag, [Conference or Workshop Item]

Volkamer, Melanie and Krimmer, Robert
Grönlund, Ake and Scholl, Jochen and Wimmer, Maria (eds.) (2007):
Requirements and Evaluation Techniques for Online-Voting.
In: Electronic Government 6th International EGOV Conference, Universitätsverlag Rudolf Trauner, In: Schriftreihe Informatik, 24, [Conference or Workshop Item]

Velikova, Zaharina (2006):
A Lattice Attack on the McEliece Public Key Cryptosystem.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Volkamer, Melanie and Krimmer, Robert (2006):
Secrecy forever? Analysis of Anonymity in Internet-based Voting Protocols.
In: Proceedings of the The First International Conference on Availability, Reliability and Security, ARES 2006, The International Dependability Conference - Bridging Theory and Practice, In: {IEEE Computer Society} % todo eigenlich publisher, [Conference or Workshop Item]

Volkamer, Melanie and Vogt, Roland (2006):
New Generation of Voting Machines in Germany The Hamburg Way to Verify Correctness.
In: In Frontiers in Electronic Elections - FEE &#039;06, url{http://fee.iavoss.org/2006/papers/fee-2006-iavoss-New-Generation-of-Vot ing-Machines-in-Germany.pdf}, [Conference or Workshop Item]

Volkamer, Melanie and Krimmer, Robert (2006):
Observing Voter's Anonymity: Guide on how to Observe Electronic Voting.
[Report]

Volkamer, Melanie and Alkassar, Ammar and Sadeghi, Ahmad-Reza and Schulz, Stefan (2006):
Enabling the Application of Open Systems like PCs for Online Voting.
In: Frontiers in Electronic Elections -- FEE &#039;06, url{http://fee.iavoss.org/2006/papers/fee-2006-iavoss-Enabling_the_applicat ion_of_open_systems_like-PCs_for_Online_Voting.pdf}, [Conference or Workshop Item]

Volkamer, Melanie and Krimmer, Robert (2006):
Die Online-Wahl auf dem Weg zum Durchbruch.
In: Informatik Spektrum, pp. 98-113, 29, (2), [Article]

Volkamer, Melanie and Reinhard, Walter and Vogt, Roland
Dittmann, Jana (ed.) (2006):
FUSE - ein Internetwahlsystem für zeitlich unbegrenzt geheime Betriebswahlen.
In: Sicherheit 2006: Sicherheit - Schutz und Zuverlässigkeit, Beiträge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), In: Springer LNI, 77, [Conference or Workshop Item]

Vogt, Holger (2004):
Fairer Austausch.
Darmstadt, Technische Universität, TU Darmstadt, [Online-Edition: urn:nbn:de:tuda-tuprints-4490],
[Ph.D. Thesis]

Vuillaume, Camille (2004):
Side Channel Attacks on Elliptic Curve Cryptosystems.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Volkamer, Melanie and Hutter, Dieter
Prosser, Alexander and Krimmer, Robert (eds.) (2004):
From Legal Principles to an Internet Voting System.
In: Electronic Voting in Europe - Technology, Law, Politics and Society, In: Springer LNI, 47, [Conference or Workshop Item]

Vollmer, Ulrich (2003):
A note on the hermite basis computation of large integer matrices.
In: ISSAC &#039;03: Proceedings of the 2003 international symposium on Symbolic and algebraic computation, ACM Press, Philadelphia, PA, USA, ISBN 1-58113-641-2,
[Conference or Workshop Item]

Vollmer, Ulrich (2003):
A note on the hermite basis computation of large integer matrices.
(TI-10/03), [Report]

Vollmer, Ulrich (2003):
Rigorously Analyzed Algorithms for the Discrete Logarithm Problem in Quadratic Number Fields.
Technische Universit&auml;t Darmstadt, [Ph.D. Thesis]

Vuillaume, Camille (2003):
Efficiency Comparison of Several {RSA} Variants.
[Other]

Vollmer, Ulrich (2002):
An accelerated Buchmann algorithm for regulator computation in real quadratic fields.
(TI-2/02), [Report]

Vollmer, Ulrich (2002):
An accelerated Buchmann algorithm for regulator computation in real quadratic fields.
In: Proceedings of Algorithmic Number Theory (ANTS-V), 2369/2002, [Conference or Workshop Item]

Valentin, Christian (2001):
Ein verteilter Zeitstempeldienst basierend auf {RSA} in {Java}.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Vest, Torsten (2001):
Design und Implementierung eines {CSP} zur Anbindung der {JCA} an die Microsoft {CryptoAPI}.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Vollmer, Ulrich (2000):
Asymptotically Fast Discrete Logarithms in Quadratic Number Fields.
In: ANTS-IV - Algorithmic Number Theory, 4th International Symposium, Springer, Leiden, The Netherlands, In: LNCS, ISBN 3-540-67695-3,
[Conference or Workshop Item]

Vollmer, Ulrich (2000):
Asymptotically Fast Discrete Logarithms in Quadratic Number Fields.
(TI-6/00), [Report]

van Sprang, Oliver (1994):
Basisreduktionsalgorithmen für Gitter kleiner Dimension.
Universit&auml;t des Saarlandes, [Ph.D. Thesis]

van Sprang, Oliver (1994):
Lower Bounds for the {LLL} Lattice Reduction Algorithm.
In: STACS, [Conference or Workshop Item]

W

Wunderer, Thomas and Burger, Michael and Nguyen, Giang Nam (2018):
Parallelizing the Hybrid Lattice Reduction and Meet-in-the-Middle Attack.
In: CSE-2018, IEEE Computer Society, In: CSE 2018 – 21st IEEE International Conference on Computational Science and Engineering, Faculty of Automatic Control and Computers, University Politehnica of Bucharest, Romania, 29.-31.10.2018, [Online-Edition: https://cse2018.hpc.pub.ro/],
[Conference or Workshop Item]

Wunderer, Thomas (2018):
A Detailed Analysis of the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack.
In: Journal of Mathematical Cryptology (JMC), De Gruyter, [Article]

Wunderer, Thomas and Wang, Yuntao (2018):
Revisiting the Sparsification Technique in Kannan’s Embedding Attack on LWE.
In: ISPEC 2018, Tokyo, Japan, In: 14th International Conference on Information Security Practice and Experience (ISPEC 2018), In: Springer LNCS, [Conference or Workshop Item]

Wunderer, Thomas (2018):
On the Security of Lattice-Based Cryptography Against Lattice Reduction and Hybrid Attacks.
Darmstadt, Technische Universität, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8082],
[Ph.D. Thesis]

Weinert, Christian and Demirel, Denise and Vigil, Martín and Geihs, Matthias and Buchmann, Johannes (2017):
MoPS: A Modular Protection Scheme for Long-Term Storage.
In: 12. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'17), ACM, ISBN 978-1-4503-4944-4,
DOI: 10.1145/3052973.3053025,
[Conference or Workshop Item]

Wunderer, Thomas (2016):
Revisiting the Hybrid Attack: Improved Analysis and Refined Security Estimates.
[Other]

Weinert, Christian (2016):
Building a Modular Long-Term Archiving System.
TU Darmstadt, [Master Thesis]

Wolf, Peter and Barrat, Jordi and Bolo, Eden and Bravo, Alejandro and Krimmer, Robert and Neumann, Stephan and Parreño, Al and Schürmann, Carsten and Volkamer, Melanie (2015):
Certification of ICTs in Elections.
nternational Institute for Democracy and Electoral Assistance, 1, [Book]

Wiesmaier, Alexander and Braun, Johannes and Horsch, Moritz (2014):
EP 2639997 - Method and system for secure access of a first computer to a second computer.
[Standards, patents]

Weinert, Christian (2013):
Content Integrity System and Notarisation for Long-Term Protection of Data Objects.
TU Darmstadt, [Bachelor Thesis]

Wich, Tobias and Horsch, Moritz and Petrautzki, Dirk and Schmölz, Johannes and Wieland, Thomas and Potzernheim, Simon (2013):
An extensible platform for eID, signatures and more.
In: Open Identity Summit 2013, GI, Kloster Banz, Germany, In: LNI, P-223, [Conference or Workshop Item]

Wälde, Julian (2013):
Algebraic Cryptanalysis of Round Reduced Versions of CSA and the LED Family of Block Ciphers.
TU Darmstadt, [Master Thesis]

Weiden, Patrick and Hülsing, Andreas and Cabarcas, Daniel and Buchmann, Johannes (2013):
Instantiating Treeless Signature Schemes.
[Other]

Werlang, Felipe and Vigil, Martín and Custódio, Ricardo Felipe (2013):
A User-Centric Digital Signature Scheme.
In: EuroPKI 2013, [Conference or Workshop Item]

Walter, Michael and Bulygin, Stanislav and Buchmann, Johannes
Kutylowski, Miroslaw and Yung, Moti (eds.) (2012):
Optimizing Guessing Strategies for Algebraic Cryptanalysis with Applications to EPCBC.
In: The 8th China International Conference on Information Security and Cryptology (Inscrypt 2012), Springer, Beijing, China, In: Lecture Notes in Computer Science, 7763, ISBN 978-3-642-38518-6,
[Conference or Workshop Item]

Walter, Michael (2012):
Algebraic methods in analyzing lightweight cryptographic symmetric primitives.
TU Darmstadt, [Master Thesis]

Warta, Simon (2011):
Deriving Signature Schemes from Public-Key Cryptosystems.
TU Darmstadt, [Master Thesis]

Wiesmaier, Alexander and Horsch, Moritz and Braun, Johannes and Kiefer, Franziskus and Hühnlein, Detlef and Strenzke, Falko and Buchmann, Johannes
Cheung, Bruce and Hui, Lucas Chi Kwong and Sandhu, Ravi and Wong, Duncan (eds.) (2011):
An efficient mobile PACE implementation.
In: ASIA CCS '11: 6th ACM Symposium on Information, Computer and Communications Security, ACM, Hong Kong, In: ACM Symposium on Information, Computer and Communications Security, DOI: 10.1145/1966913.1966936,
[Conference or Workshop Item]

Weiner, Michael and Tews, Erik and Heinz, Benedikt and Heyszl, Johann (2010):
FPGA Implementation of an Improved Attack Against the DECT Standard Cipher.
In: ICISC 2010 - 13th Annual International Conference on Information Security and Cryptology, Springer, Seoul, Korea, In: LNCS, [Conference or Workshop Item]

Weinmann, Ralf-Philipp (2009):
Algebraic Methods in Block Cipher Cryptanalysis.
Darmstadt, Technische Universität, TU Darmstadt, [Online-Edition: urn:nbn:de:tuda-tuprints-13624],
[Ph.D. Thesis]

Wiesmaier, Alexander (2009):
Secure private key management in adaptable public key infrastructures.
Berlin, Mensch-und-Buch-Verl., ISBN 978-3-86664-646-9,
[Book]

Weber, Pia (2008):
Einsatzgebiete Digitaler Signaturen.
TU Darmstadt, [Master Thesis]

Weber, Stefan (2008):
Coercion-Resistant Cryptographic Voting: Implementing Free and Secret Electronic Elections.
VDM Verlag Dr. Müller, [Book]

Weber, Stefan Georg and Araujo, Roberto and Buchmann, Johannes (2007):
On coercion-resistant electronic elections with linear work.
In: The Second International Conference on Availability, Reliability and Security, 2007 : ARES 2007 ; 2nd International Workshop Dependability and Security in e-Government (DeSeGov 2007)...ISBN 0-7695-2775-2, 978-0-7695-2775-8 [Online-Ressource], pp. 908-916, [Book Section]

Weber, Stefan and Araújo, Roberto and Buchmann, Johannes (2007):
On Coercion-Resistant Electronic Elections with Linear Work.
In: >ares, IEEE Computer Society, pp. 908-916, 00, DOI: http://doi.ieeecomputersociety.org/10.1109/ARES.2007.108,
[Article]

Wiesmaier, Alexander and Rauchschwalbe, Ulrich and Ludwig, Christoph and Henhapl, Birgit and Ruppert, Markus and Buchmann, Johannes (2006):
Intrinsically Legal-For-Trade Objects by Digital Signatures.
In: SICHERHEIT 2006, Sicherheit - Schutz und Zuverlässigkeit, 3. Jahrestagung, Magdeburg, In: LNI, P-77, [Conference or Workshop Item]

Wiesmaier, Alexander and Ludwig, Christoph and Rauchschwalbe, Ulrich and Henhapl, Birgit and Ruppert, Markus and Buchmann, Johannes (2006):
Intrinsically Legal-For-Trade Objects by Digital Signatures.
In: Sicherheit 2006: Sicherheit - Schutz und Zuverlässigkeit, Beiträge der 3. Jahrestagungdes Fachbereichs der Gesellschaft für Informatik e.V., Darmstadt, ISBN 3-88579-171-4,
[Conference or Workshop Item]

Weber, Stefan (2006):
A Coercion-Resistant Cryptographic Voting Protocol - Evaluation and Prototype Implementation.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Wiesmaier, Alexander (2006):
The State of the Art in Algorithmic Encryption.
(TI-1/06), [Report]

Weber, Stefan (2006):
A Coercion-Resistant Cryptographic Voting Protocol - Evaluation and Prototype Implementation.
Technische Universität Darmstadt, [Master Thesis]

Wiesmaier, Alexander and Karatsiolis, Vangelis and Lippert, Marcus and Buchmann, Johannes (2005):
The Workshop - Implementing Well Structured Enterprise Applications.
In: SERP 2005 - International Conference on Software Engineering Research and Practice, CSREA Press, Las Vegas, Nevada, USA, ISBN 1-932415-50-5,
[Conference or Workshop Item]

Wiesmaier, Alexander and Lippert, Marcus and Karatsiolis, Vangelis and Raptis, Georgios and Buchmann, Johannes (2005):
An Evaluated Certification Services System for the German National Root CA - Legally binding and trustworthy Transactions in E-Business and E-Government.
In: EEE 2005 - International Conference on E-Business, Enterprise Information Systems, E-Government, and Outsourcing, CSREA Press, Las Vegas, Nevada, USA, ISBN 1-932415-76-9,
[Conference or Workshop Item]

Wirt, Kai (2005):
Fault Attack on the {DVB} Common Scrambling Algorithm.
In: ICCSA 2005 - Computational Science and Its Applications, Springer, Singapore, In: LNCS, 3481, ISBN 3-540-25861-2,
DOI: 10.1007/11424826_61,
[Conference or Workshop Item]

Wiesmaier, Alexander and Fischer, Mike and Lippert, Marcus and Buchmann, Johannes (2005):
Outflanking and Securely Using the PIN/TAN-System.
In: SAM 2005 - International Conference on Security and Management, CSREA Press, Las Vegas, Nevada, USA, ISBN 1-932415-82-3,
[Conference or Workshop Item]

Weinmann, Ralf-Philipp (2005):
3. Krypto-Tag - Workshop über Kryptographie.
(TI-1/05), [Report]

Weinmann, Ralf-Philipp and Wirt, Kai (2005):
Analysis of the {DVB} Common Scrambling Algorithm.
In: Communications and Multimedia Security, Springer Boston, ISBN 0-387-24485-9,
DOI: 10.1007/b105674,
[Conference or Workshop Item]

Wiesmaier, Alexander and Lippert, Marcus and Karatsiolis, Vangelis (2004):
The Key Authority - Secure Key Management in Hierarchical Public Key Infrastructures.
In: Security and Management 2004, Las Vegas, Nevada, USA, ISBN 1-932415-37-8,
[Conference or Workshop Item]

Weimer, Daniel (2004):
An Adaption of the {NICE} Crytosystem to Real Quadratic Orders.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Wolthusen, Stephen (2003):
A Model-Independent Security Architecture for Distributed Heterogeneous Systems.
Technische Universit&auml;t Darmstadt, [Ph.D. Thesis]

Winkler, Markus (2002):
Analyse der {Enterprise-Java-Beans} Spezifikation Version 2.0 als Basis für {FlexiTRUST}.
[Other]

Wahrenbruch, Thomas (2001):
Elliptische Kurven Kryptographie auf {Java} Cards.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Wiesmaier, Alexander (2001):
{FlexiTRUST CA} Ein flexibles, skalierbares und dynamisch erweiterbares Trustcenter.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Wetzel, Susanne (1998):
Lattice Basis Reduction Algorithms and their Applications.
Universit&auml;t des Saarlandes, [Ph.D. Thesis]

Weber, Damian (1997):
Diskrete Logarithmen in {GF(p)} mit dem Number Field Sieve.
Universit&auml;t des Saarlandes, [Ph.D. Thesis]

Weber, Damian (1996):
Computing Discrete Logarithms with the General Number Field Sieve.
In: ANTS-II - Algorithmic Number Theory, Second International Symposium, Springer, Talence, France, In: LNCS, [Conference or Workshop Item]

Weber, Damian (1995):
An Implementation of the General Number Field Sieve to Compute Discrete Logarithms mod p.
In: EUROCRYPT '95 - International Conference on the Theory and Application of Cryptographic Techniques, Springer, Saint-Malo, France, In: LNCS, ISBN 3-540-59409-4,
[Conference or Workshop Item]

Wiese, Kay (1994):
Parallelisierung von {LLL}-Algorithmen zur Gitterbasisreduktion.
Universit&auml;t des Saarlandes, [Master Thesis]

Weber, Damian (1993):
Ein Algorithmus zur Zerlegung von Primzahlen in Primideale.
Universit&auml;t des Saarlandes, [Master Thesis]

Wellner, Ingrid (1990):
Zur Theorie der Zero Knowledge Proofs.
Universit&auml;t des Saarlandes, [Diploma Thesis or Magisterarbeit]

Y

Yoseph, Berhane (2007):
Gegenmaßnahmen zu Seitenkanalangriffen.
TU Darmstadt, [Master Thesis]

Z

Zibuschka, Jan and Horsch, Moritz and Kubach, Michael
Roßnagel, Heiko and Wagner, Sven and Hühnlein, Detlef (eds.) (2019):
The ENTOURAGE Privacy and Security Reference Architecture for Internet of Things Ecosystems.
In: Open Identity Summit 2019, Bonn, Gesellschaft für Informatik, Garmisch-Partenkirchen, 28.-29.03.2019, ISSN 1617-5468,
ISBN 978-3-88579-687-9,
[Online-Edition: https://dl.gi.de/handle/20.500.12116/20981],
[Conference or Workshop Item]

Zhang, Qi (2015):
Mutant Algebraic Side-Channel Attack.
TU Darmstadt, [Master Thesis]

Zhang, Jiang and Zhang, Zhenfeng and Ding, Jintai and Snook, Michael and Dagdelen, Özgür (2015):
Authenticated Key Exchange from Ideal Lattices.
In: EUROCRYPT 2015, Sofia, Bulgaria, [Conference or Workshop Item]

Zörkler, Jens (2003):
Einführung einer Public-Key-Infrastruktur in einer Universität.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Zieschang, Thilo (1997):
Combinatorial Properties of Basic Encryption Operations.
In: EUROCRYPT '97 - International Conference on the Theory and Application of Cryptographic Techniques, Springer, Konstanz, Germany, In: LNCS, ISBN 3-540-62975-0,
[Conference or Workshop Item]

Zieschang, Thilo (1997):
Finite groups and graphs in cryptanalysis.
Technische Universit&auml;t Darmstadt, [Ph.D. Thesis]

Zieschang, Thilo (1997):
On the Number of Cycles in Permutations.
(TI-2/97), [Report]

Zieschang, Thilo (1997):
Security Properties of Public Key Certification Networks.
(TI-1/97), [Report]

Zieschang, Thilo (1996):
Combinatorial Properties of Basic Encryption Operations.
(TI-11/96), [Report]

Zieschang, Thilo (1996):
Breaking an Oblivious Transfer with Low Exponents.
(TI-10/96), [Report]

Zayer, Jörg (1995):
Faktorisieren mit dem Number Field Sieve.
Universit&auml;t des Saarlandes, [Ph.D. Thesis]

Zayer, Jörg (1991):
Die Theorie des Number Field Sieve.
Universit&auml;t des Saarlandes, [Master Thesis]

This list was generated on Thu Oct 17 01:05:32 2019 CEST.