TU Darmstadt / ULB / TUbiblio

Browsen nach Person

Ebene hoch
Gruppiere nach: Keine Gruppierung | Typ des Eintrags | Datum | Sprache
Anzahl der Einträge: 251.

Garcia Cordero, Carlos ; Traverso, Giulia ; Nojoumian, Mehrdad ; Habib, Sheikh Mahbub ; Mühlhäuser, Max ; Buchmann, Johannes ; Vasilomanolakis, Emmanouil :
Sphinx: a Colluder-Resistant Trust Mechanism for Collaborative Intrusion Detection.
[Online-Edition: http://ieeeaccess.ieee.org]
In: IEEE ACCESS
[Artikel] , (2018)

Schabhüser, Lucas ; Butin, Denis ; Buchmann, Johannes :
CHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear Case.
[Online-Edition: http://www.risk.tsukuba.ac.jp/ispec2018/]
In: Information Security Practice and Experience - 14th International Conference, ISPEC 2018, Tokyo, Japan. In: Springer LNCS .
[Konferenz- oder Workshop-Beitrag] , (2018)

Kannwischer, Matthias ; Genêt, Aymeric ; Butin, Denis ; Krämer, Juliane ; Buchmann, Johannes :
Differential Power Analysis of XMSS and SPHINCS.
In: COSADE: International Workshop on Constructive Side-Channel Analysis and Secure Design. In: LNCS , 10815 . Singapore
[Konferenz- oder Workshop-Beitrag] , (2018)

Bindel, Nina ; Buchmann, Johannes ; Göpfert, Florian ; Schmidt, Markus :
Estimation of the Hardness of the Learning with Errors Problem with a Restricted Number of Samples.
In: Journal of Mathematical Cryptology
[Artikel] , (2018)

Schabhüser, Lucas ; Butin, Denis ; Demirel, Denise ; Buchmann, Johannes :
Function-Dependent Commitments for Verifiable Multi-Party Computation.
[Online-Edition: http://isc2018.sccs.surrey.ac.uk/]
In: LNCS . Guildford, UK
[Konferenz- oder Workshop-Beitrag] , (2018)

Geihs, Matthias ; Karvelas, Nikolaos ; Katzenbeisser, Stefan ; Buchmann, Johannes :
PROPYLA: Privacy Preserving Long-Term Secure Storage.
In: The Sixth International Workshop on Security in Cloud Computing (SCC). In: ACM . Songdo, Incheon, Korea
[Konferenz- oder Workshop-Beitrag] , (2018)

Liu, Mo-meng ; Krämer, Juliane ; Hu, Yu-pu ; Buchmann, Johannes :
Quantum security analysis of a lattice-based oblivious transfer protocol.
[Online-Edition: https://link.springer.com/journal/11714]
In: Frontiers of Information Technology & Electronic Engineering, 18, Issue 9 pp. 1348-1369. ISSN 2095-9184 (Print) 2095-9230 (Online)
[Artikel] , (2018)

Traverso, Giulia ; Butin, Denis ; Buchmann, Johannes ; Palesandro, Alex :
Coalition-Resistant Peer Rating for Long-Term Confidentiality.
[Online-Edition: https://pstnet.ca/pst2018/]
In: PST 2018 - 16th Annual Conference on Privacy, Security and Trust, August 28-30, 2018, Belfast, Northern Ireland, United Kingdom. PST 2018 - 16th Annual Conference on Privacy, Security and Trust IEEE Computer Society
[Konferenz- oder Workshop-Beitrag] , (2018)

Buchmann, Johannes ; Holzer, Patrick ; Wunderer, Thomas :
Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor p^α q^β.
INDOCRYPT 2017 - 18th International Conference on Cryptology in India Springer
[Konferenz- oder Workshop-Beitrag] , (2017)

Geihs, Matthias ; Nikiforov, Oleg ; Demirel, Denise ; Sauer, Alexander ; Butin, Denis ; Günther, Felix ; Alber, Gernot ; Walther, Thomas ; Buchmann, Johannes :
The Status of Quantum-Based Long-Term Secure Communication over the Internet.

[Report] , (2017)

Buldas, Ahto ; Geihs, Matthias ; Buchmann, Johannes :
Long-Term Secure Time-Stamping using Preimage-Aware Hash Functions.
ProvSec 2017 - The 11th International Conference on Provable Security Springer
[Konferenz- oder Workshop-Beitrag] , (2017)

Horsch, Moritz ; Braun, Johannes ; Buchmann, Johannes :
Password Assistance.
Open Identity Summit 2017
[Konferenz- oder Workshop-Beitrag] , (2017)

Traverso, Giulia ; Cordero, Carlos Garcia ; Nojoumian, Mehrdad ; Azarderakhsh, Reza ; Demirel, Denise ; Habib, Sheikh Mahbub ; Buchmann, Johannes :
Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems.
[Online-Edition: https://www.ucalgary.ca/pst2017/]
15th Annual Conference on Privacy, Security and Trust (PST)
[Konferenz- oder Workshop-Beitrag] , (2017)

Buchmann, Johannes ; Lauter, Kristin ; Mosca, Michele :
Postquantum Cryptography - State of the Art.
In: IEEE Security & Privacy, 15 pp. 12-13.
[Artikel] , (2017)

Buldas, Ahto ; Geihs, Matthias ; Buchmann, Johannes :
Long-Term Secure Commitments via Extractable-Binding Commitments.
In: LNCS . Springer
[Konferenz- oder Workshop-Beitrag] , (2017)

Horsch, Moritz ; Braun, Johannes ; Metz, Dominique ; Buchmann, Johannes :
Update-tolerant and Revocable Password Backup.
ACISP 2017 - 22nd Australasian Conference on Information Security and Privacy
[Konferenz- oder Workshop-Beitrag] , (2017)

Alkeilani Alkadri, Nabil ; Buchmann, Johannes ; El Bansarkhani, Rachid ; Krämer, Juliane :
A Framework to Select Parameters for Lattice-Based Cryptography.

[Anderes] , (2017)

Alkim, Erdem ; Bindel, Nina ; Buchmann, Johannes ; Dagdelen, Özgür ; Eaton, Edward ; Gutoski, Gus ; Krämer, Juliane ; Pawlega, Filip :
Revisiting TESLA in the quantum random oracle model.
PQCrypto 2017 - Eighth International Conference on Post-Quantum Cryptography Springer
[Konferenz- oder Workshop-Beitrag] , (2017)

Buchmann, Johannes ; Braun, Johannes ; Demirel, Denise ; Geihs, Matthias :
Quantum Cryptography: a view from classical cryptography.
In: Quantum Science and Technology, 2 (2)
[Artikel] , (2017)

Buchmann, Johannes ; Demirel, Denise ; Schabhüser, Lucas ; Struck, Patrick :
Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability.
In: LNCS (10194). Springer
[Konferenz- oder Workshop-Beitrag] , (2017)

Weinert, Christian ; Demirel, Denise ; Vigil, Martín ; Geihs, Matthias ; Buchmann, Johannes :
MoPS: A Modular Protection Scheme for Long-Term Storage.
12. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'17) ACM
[Konferenz- oder Workshop-Beitrag] , (2017)

Braun, Johannes ; Buchmann, Johannes ; Demirel, Denise ; Fujiwara, Mikio ; Geihs, Matthias ; Moriai, Shiho ; Sasaki, Masahide ; Waseda, Atsushi :
SHORT PAPER: LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality.
In: LNCS . Springer
[Konferenz- oder Workshop-Beitrag] , (2017)

Bindel, Nina ; Buchmann, Johannes ; Krämer, Juliane ; Mantel, Heiko ; Schickel, Johannes ; Weber, Alexandra :
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics.
In: Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS).
[Konferenz- oder Workshop-Beitrag] , (2017)

Traverso, Giulia ; Demirel, Denise ; Habib, Sheikh Mahbub ; Buchmann, Johannes :
AS³: Adaptive Social Secret Sharing for Distributed Storage Systems.
2016 Privacy, Security and Trust Conference IEEE
[Konferenz- oder Workshop-Beitrag] , (2016)

Geihs, Matthias ; Demirel, Denise ; Buchmann, Johannes :
A security analysis of techniques for long-term integrity protection.
2016 Privacy, Security and Trust Conference
[Konferenz- oder Workshop-Beitrag] , (2016)

Horsch, Moritz ; Schlipf, Mario ; Haas, Stefan ; Braun, Johannes ; Buchmann, Johannes :
Password Policy Markup Language.
In: LNI , 264 .
[Konferenz- oder Workshop-Beitrag] , (2016)

Schabhüser, Lucas ; Demirel, Denise ; Buchmann, Johannes :
An Unconditionally Hiding Auditing Procedure for Computations over Distributed Data.
The 2nd IEEE Workshop on Security and Privacy in the Cloud (SPC 2016)
[Konferenz- oder Workshop-Beitrag] , (2016)

Butin, Denis ; Demirel, Denise ; Buchmann, Johannes :
Formal Policy-based Provenance Audit.
The 11th International Workshop on Security - IWSEC 2016
[Konferenz- oder Workshop-Beitrag] , (2016)

Traverso, Giulia ; Demirel, Denise ; Buchmann, Johannes :
Dynamic and Verifiable Hierarchical Secret Sharing.
9th International Conference on Information Theoretic Security - ICITS 2016 Springer
[Konferenz- oder Workshop-Beitrag] , (2016)

Braun, Johannes ; Buchmann, Johannes ; Demirel, Denise ; Fujiwara, Mikio ; Geihs, Matthias ; Moriai, Shiho ; Sasaki, Masahide ; Waseda, Atsushi :
LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality (Full Paper).

[Anderes] , (2016)

Bindel, Nina ; Buchmann, Johannes ; Krämer, Juliane :
Lattice-Based Signature Schemes and their Sensitivity to Fault Attacks.
FDTC 2016 - Fault Diagnosis and Tolerance in Cryptography IEEE Conference Publication
[Konferenz- oder Workshop-Beitrag] , (2016)

McGrew, David ; Kampanakis, Panos ; Fluhrer, Scott ; Gazdag, Stefan-Lukas ; Butin, Denis ; Buchmann, Johannes :
State Management for Hash-Based Signatures.
3rd International Conference on Research in Security Standardisation (SSR 2016) Springer LNCS
[Konferenz- oder Workshop-Beitrag] , (2016)

Horsch, Moritz ; Schlipf, Mario ; Braun, Johannes ; Buchmann, Johannes :
Password Requirements Markup Language.
ACISP 2016 - 21st Australasian Conference on Information Security and Privacy
[Konferenz- oder Workshop-Beitrag] , (2016)

Traverso, Giulia ; Demirel, Denise ; Buchmann, Johannes:
Homomorphic Signature Schemes - A survey.
SpringerBriefs in Computer Science. Springer ISBN Softcover 978-3-319-32114-1 - ebook 978-3-319-32115-8
[Buch] , (2016)

Schabhüser, Lucas ; Demirel, Denise ; Buchmann, Johannes :
An Unconditionally Hiding Auditing Procedure for Multi-Party Computations.
In: IACR - Cryptology ePrint Archive, 2016
[Artikel] , (2016)

Buchmann, Johannes ; Büscher, Niklas ; Katzenbeisser, Stefan ; Krämer, Juliane ; Micciancio, Daniele ; Siim, Sander ; van Vredendaal, Christine ; Walter, Michael ; Göpfert, Florian :
Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge.
ASIAPKC 16 - 3rd ACM International Workshop on ASIA Public-Key Cryptography ACM
[Konferenz- oder Workshop-Beitrag] , (2016)

Buchmann, Johannes ; Göpfert, Florian ; Güneysu, Tim ; Oder, Tobias ; Pöppelmann, Thomas :
High-Performance and Lightweight Lattice-Based Public-Key Encryption.
IoTPTS '16 - 2nd ACM International Workshop on IoT Privacy, Trust, and Security ACM
[Konferenz- oder Workshop-Beitrag] , (2016)

Akleylek, Sedat ; Bindel, Nina ; Buchmann, Johannes ; Krämer, Juliane ; Marson, Giorgia Azzurra :
An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation.
International Conference on Cryptology AFRICACRYPT 2016 Springer
[Konferenz- oder Workshop-Beitrag] , (2016)

Buchmann, Johannes ; Göpfert, Florian ; Player, Rachel ; Wunderer, Thomas :
On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack.
International Conference on Cryptology AFRICACRYPT 2016 Springer
[Konferenz- oder Workshop-Beitrag] , (2016)

Buchmann, Johannes ; Demirel, Denise ; Schabhüser, Lucas:
Privately and Publicly Verifiable Computing Techniques.
ISBN 978-3-319-53797-9
[Buch] , (2016)

Vigil, Martín ; Demirel, Denise ; Habib, Sheikh Mahbub ; Hauke, Sascha ; Buchmann, Johannes ; Mühlhäuser, Max :
LoT: a Reputation-based Trust System for Long-term Archiving.
SECURWARE 2016 Thinkmind Digital Library
[Konferenz- oder Workshop-Beitrag] , (2016)

Horsch, Moritz ; Hülsing, Andreas ; Buchmann, Johannes :
PALPAS - PAsswordLess PAssword Synchronization.
International Conference on Availability, Reliability and Security (ARES)
[Konferenz- oder Workshop-Beitrag] , (2015)

Alkim, Erdem ; Bindel, Nina ; Buchmann, Johannes ; Dagdelen, Özgür ; Schwabe, Peter :
TESLA: Tightly-Secure Efficient Signatures from Standard Lattices.

[Anderes] , (2015)

Vigil, Martín ; Buchmann, Johannes ; Cabarcas, Daniel ; Weinert, Christian ; Wiesmaier, Alexander :
Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: a survey.
In: Computers & Security, 50 pp. 16-32.
[Artikel] , (2015)

El Bansarkhani, Rachid ; Dagdelen, Özgür ; Buchmann, Johannes :
Augmented Learning with Errors: The Untapped Potential of the Error Term.
Financial Cryptography and Data Security - 19th International Conference, FC 2015, Puerto Rico, January 26 - 30, 2015 Springer
[Konferenz- oder Workshop-Beitrag] , (2015)

El Bansarkhani, Rachid ; Buchmann, Johannes :
High Performance Lattice-based CCA-secure Encryption.
In: Cryptology ePrint Archive p. 20.
[Artikel] , (2015)

Classen, Jiska ; Braun, Johannes ; Volk, Florian ; Hollick, Matthias ; Buchmann, Johannes ; Mühlhäuser, Max :
A Distributed Reputation System for Certification Authority Trust Management.
14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE UbiSafe Symposium)
[Konferenz- oder Workshop-Beitrag] , (2015)

Geihs, Matthias ; Demirel, Denise ; Buchmann, Johannes :
On the Security of Long-lived Archiving Systems based on the Evidence Record Syntax.
Codes, Cryptology and Information Security Springer
[Konferenz- oder Workshop-Beitrag] , (2015)

Butin, Denis ; Gazdag, Stefan-Lukas ; Buchmann, Johannes :
Real-World Post-Quantum Digital Signatures.
Cybersecurity & Privacy Innovation Forum (CSP Forum 2015) Springer CCIS
[Konferenz- oder Workshop-Beitrag] , (2015)

Vigil, Martín ; Weinert, Christian ; Demirel, Denise ; Buchmann, Johannes :
An efficient time-stamping solution for long-term digital archiving.
IEEE 33rd International Performance Computing and Communications Conference (IPCCC)
[Konferenz- oder Workshop-Beitrag] , (2014)

Borges, Fábio ; Buchmann, Johannes ; Mühlhäuser, Max :
Introducing Asymmetric DC-Nets.
In: Proceedings IEEE Conference on Communications and Network Security (CNS) 2014.
[Konferenz- oder Workshop-Beitrag] , (2014)

Buchmann, Johannes ; Bischof, Christian ; Dagdelen, Özgür ; Fitzpatrick, Robert ; Göpfert, Florian ; Mariano, Artur :
Nearest Planes in Practice.
International Conference on Cryptography and Information security -BalkanCryptSec 2014
[Konferenz- oder Workshop-Beitrag] , (2014)

Buchmann, Johannes ; El Bansarkhani, Rachid ; Hauke, Sascha
Brunetti, Gino ; Feld, Thomas ; Heuser, Lutz ; Schnittner, Joachim ; Webel, Christian (eds.) :

Towards Security Solutions for Emergent Business Software.
Future Business Software Conference 2012 Springer
[Konferenz- oder Workshop-Beitrag] , (2014)

Braun, Johannes ; Volk, Florian ; Classen, Jiska ; Buchmann, Johannes ; Mühlhäuser, Max :
CA Trust Management for the Web PKI.
In: IOS Press: Journal of Computer Security, 22(6), 2014 913-959 (2014).
[Artikel] , (2014)

Braun, Johannes ; Buchmann, Johannes ; Mullan, Ciaran ; Wiesmaier, Alexander :
Long Term Confidentiality: a Survey.
In: Designs, Codes and Cryptography, 71 (3) pp. 459-478.
[Artikel] , (2014)

Borges, Fábio ; Demirel, Denise ; Böck, Leon ; Buchmann, Johannes ; Mühlhäuser, Max :
A Privacy-Enhancing Protocol that Provides In-Network Data Aggregation and Verifiable Smart Meter Billing.
In: 19th IEEE Symposium on Computers and Communications (ISCC 2014), Funchal, Portugal. IEEE Symposium on Computers and Communications (ISCC)
[Konferenz- oder Workshop-Beitrag] , (2014)

El Bansarkhani, Rachid ; Buchmann, Johannes :
LCPR: High Performance Compression Algorithm for Lattice-Based Signatures and Schnorr-like Constructions.
IACR Cryptology ePrint Archive 2014: 334
[Konferenz- oder Workshop-Beitrag] , (2014)

Mohamed, Mohamed Saied Emam ; Buchmann, Johannes :
Mutant Differential Fault Analysis of Trivium MDFA.
the 17th Annual International Conference on Information Security and Cryptology, ICISC2014, Springer
[Konferenz- oder Workshop-Beitrag] , (2014)

Buchmann, Johannes ; Neumann, Stephan :
Tauglichkeit von Common Criteria-Schutzprofilen für Internetwahlen in Deutschland.
In: Datenschutz und Datensicherheit - DuD, 38 (2) pp. 98-102.
[Artikel] , (2014)

El Bansarkhani, Rachid ; Buchmann, Johannes
Pointcheval, David ; Vergnaud, Damien (eds.) :

Towards Lattice Based Sequential Aggregate Signatures.
In: LNCS (8469). Springer
[Konferenz- oder Workshop-Beitrag] , (2014)

Fitzpatrick, Robert ; Bischof, Christian ; Buchmann, Johannes ; Dagdelen, Oezguer ; Goepfert, Florian ; Mariano, Artur ; Yang, Bo-Yin
Aranha, Diego F. ; Menezes, Alfred (eds.) :

Tuning GaussSieve for Speed.
[Online-Edition: http://dx.doi.org/10.1007/978-3-319-16295-9_16]
In: Progress in Cryptology - LATINCRYPT 2014, 8895 pp. 288-305.
[Artikel] , (2014)

Vigil, Martín ; Weinert, Christian ; Braden, Kjell ; Demirel, Denise ; Buchmann, Johannes :
A performance analysis of long-term archiving techniques.
IEEE - High Performace Computing and Communications (HPCC 2014)
[Konferenz- oder Workshop-Beitrag] , (2014)

Buchmann, Johannes ; Karatsiolis, Evangelos ; Wiesmaier, Alexander:
Introduction to Public Key Infrastructures.
Springer-Verlag Berlin Heidelberg ISBN 978-3-642-40656-0
[Buch] , (2013)

Buchmann, Johannes ; Nebel, Maxi ; Roßnagel, Alexander ; Shirazi, Fatemeh ; Simo, Hervais ; Waidner, Michael:
Personal Information Dashboard: Putting the Individual Back in Control.
Iso Press Amsterdam , pp. 139-164. ISBN 978-1-61499-294-3 (print) | 978-1-61499-295-0 (online)
[Buch] , (2013)

Braun, Johannes ; Volk, Florian ; Buchmann, Johannes ; Mühlhäuser, Max
Sokatis Katsikas, Isaac Agudi (Eds.) (ed.) :

Trust Views for the Web PKI.
In: Public Key Infrastructures, Services and Applications - EuroPKI 2013. In: LNCS (ISSN 0302-9743) (8341). Springer Berlin Heidelberg
[Konferenz- oder Workshop-Beitrag] , (2013)

El Bansarkhani, Rachid ; Buchmann, Johannes
Lange, Tanja ; Lauter, Kristin ; Lisonek, Petr (eds.) :

Improvement and Efficient Implementation of a Lattice-based Signature Scheme.
In: LNCS (8282).
[Konferenz- oder Workshop-Beitrag] , (2013)

Petzoldt, Albrecht ; Bulygin, Stanislav ; Buchmann, Johannes :
A multivariate based threshold ring signature scheme.
In: Applicable Algebra in Engineering, Communication and Computing, 24 (3 - 4) 255 - 275.
[Artikel] , (2013)

Vigil, Martín ; Cabarcas, Daniel ; Huang, Jingwei ; Buchmann, Johannes :
Assessing Trust in the Long-Term Protection of Documents.
18th IEEE Symposium on Computers and Communications (IEEE ISCC 2013)
[Konferenz- oder Workshop-Beitrag] , (2013)

Petzoldt, Albrecht ; Bulygin, Stanislav ; Buchmann, Johannes
Gaborit, Philippe (ed.) :

Fast Verification for Improved Versions of the UOV and Rainbow Signature Schemes.
In: LNCS (7932). Springer
[Konferenz- oder Workshop-Beitrag] , (2013)

Buchmann, Johannes (ed.), :
Internet Privacy: Options for adequate realization.
Springer Vieweg; 2013 edition ISBN 978-3642379123
[Buch] , (2013)

Buchmann, Johannes ; Demirel, Denise ; van de Graaf, Jeroen
Sadeghi, Ahmad-Reza (ed.) :

Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy.
In: LNCS (7859). Springer
[Konferenz- oder Workshop-Beitrag] , (2013)

Bulygin, Stanislav ; Walter, Michael ; Buchmann, Johannes
Dawson, E. (ed.) :

Many weak keys for PRINTcipher: fast key recovery and countermeasures.
In: Lecture Notes in Computer Science , 7779 . Springer
[Konferenz- oder Workshop-Beitrag] , (2013)

Braun, Johannes ; Wiesmaier, Alexander ; Buchmann, Johannes
Sprague, Ralph H. (ed.) :

On the Security of Encrypted Secret Sharing.
46th Hawaii International Conference on Systems Science (HICSS-46) IEEE Computer Society
[Konferenz- oder Workshop-Beitrag] , (2013)

Nie, Xuyun ; Petzoldt, Albrecht ; Buchmann, Johannes :
Cryptanalysis of 2-layer Nonlinear Piece In Hand Method.
In: LNCS (8128).
[Konferenz- oder Workshop-Beitrag] , (2013)

Nie, Xuyun ; Xu, Zhaohu ; Buchmann, Johannes
Gaborit, Philippe (ed.) :

Cryptanalysis of Hash-based Tamed Transformation and Minus Signature Scheme.
In: LNCS (7932). Springer
[Konferenz- oder Workshop-Beitrag] , (2013)

Buchmann, Johannes ; Cabarcas, Daniel ; Göpfert, Florian ; Hülsing, Andreas ; Weiden, Patrick
Lange, Tanja ; Lauter, Kristin ; Lisonek, Petr (eds.) :

Discrete Ziggurat: A Time-Memory Trade-off for Sampling from a Gaussian Distribution over the Integers.
In: LNCS (8282). Springer
[Konferenz- oder Workshop-Beitrag] , (2013)

Bulygin, Stanislav ; Walter, Michael ; Buchmann, Johannes :
Full analysis of PRINTcipher with respect to invariant subspace attack: efficient key recovery and countermeasures.
In: Designs, Codes, and Cryptography 73(3) 997-1022 (2014).
[Artikel] , (2013)

Mohamed, Mohamed Saied Emam ; Bulygin, Stanislav ; Zohner, Michael ; Heuser, Annelie ; Walter, Michael ; Buchmann, Johannes :
Improved Algebraic Side-Channel Attack on AES.
In: Journal of Cryptographic Engineering pp. 139-156.
[Artikel] , (2013)

Weiden, Patrick ; Hülsing, Andreas ; Cabarcas, Daniel ; Buchmann, Johannes :
Instantiating Treeless Signature Schemes.

[Anderes] , (2013)

Buchmann, Johannes ; Dahmen, Erik ; Ereth, Sarah ; Hülsing, Andreas ; Rückert, Markus :
On the security of the Winternitz one-time signature scheme.
In: International Journal of Applied Cryptography, 3 (1) pp. 84-96.
[Artikel] , (2013)

Hülsing, Andreas ; Rausch, Lea ; Buchmann, Johannes :
Optimal Parameters for XMSS^MT.
In: MoCrySEn 2013. LNCS (8128). Springer Regensburg, Germany , pp. 194-208.
[Buchkapitel] , (2013)

Hülsing, Andreas ; Rausch, Lea ; Buchmann, Johannes :
Optimal parameters for XMSS-MT.
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-642-40588-4_...]
In: Security Engineering and Intelligence Informatics, CD-ARES 2013 Workshops
[Artikel] , (2013)

Demirel, Denise ; Henning, Maria ; van de Graaf, Jeroen ; Ryan, Peter Y. A. ; Buchmann, Johannes
Heather, James ; Schneider, Steve ; Teague, Vanessa (eds.) :

Prêt à Voter Providing Everlasting Privacy.
In: LNCS (7985). Springer
[Konferenz- oder Workshop-Beitrag] , (2013)

Shirazi, Fatemeh ; Diaz, Claudia ; Mullan, Ciaran ; Wright, Joss ; Buchmann, Johannes :
Towards Measuring Resilience in Anonymous Communication Networks.
In: HotPETs 2013
[Artikel] , (2013)

Kreutzer, Michael ; Waidner, Michael ; Buchmann, Johannes :
IT-Sicherheitsforschung in Darmstadt - von den Grundlagen bis zur Anwendung.
In: Praxis der Informationsverarbeitung und Kommunikation, 35 (4) pp. 305-308.
[Artikel] , (2012)

Walter, Michael ; Bulygin, Stanislav ; Buchmann, Johannes
Kutylowski, Miroslaw ; Yung, Moti (eds.) :

Optimizing Guessing Strategies for Algebraic Cryptanalysis with Applications to EPCBC.
In: Lecture Notes in Computer Science , 7763 . Springer
[Konferenz- oder Workshop-Beitrag] , (2012)

Braun, Johannes ; Hülsing, Andreas ; Wiesmaier, Alexander ; Vigil, Martín ; Buchmann, Johannes
De Capitani di Vimercati, Sabrina ; Mitchell, Chris (eds.) :

How to avoid the Breakdown of Public Key Infrastructures - Forward Secure Signatures for Certificate Authorities.
In: LNCS (7868). Springer
[Konferenz- oder Workshop-Beitrag] , (2012)

Göttert, Norman ; Feller, Thomas ; Schneider, Michael ; Huss, Sorin ; Buchmann, Johannes
Prouff, Emmanuel ; Schaumont, Patrick (eds.) :

On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes.
In: LNCS (7428). Springer
[Konferenz- oder Workshop-Beitrag] , (2012)

Kelbert, Florian ; Shirazi, Fatemeh ; Simo, Hervais ; Wüchner, Tobias ; Buchmann, Johannes ; Pretschner, Alexander ; Waidner, Michael
Buchmann, Johannes (ed.) :

State of Online Privacy: A Technical Perspective.
In: Internet Privacy. Eine multidisziplinäre Bestandsaufnahme/ A multidisciplinary analysis (acatech STUDIE). Springer Verlag Heidelberg , pp. 189-279. ISBN 978-3-642-31942-6
[Buchkapitel] , (2012)

Hülsing, Andreas ; Busold, Christoph ; Buchmann, Johannes
Knudsen, Lars ; Wu, Huapeng (eds.) :

Forward Secure Signatures on Smart Cards.
In: LNCS (7707). Springer Berlin Heidelberg
[Konferenz- oder Workshop-Beitrag] , (2012)

Schreiner, Steffen ; Grigoras, Costin ; Grigoras, Alina ; Betev, Latchezar ; Buchmann, Johannes :
A Grid security architecture for AliEn.
Proceedings of Science (PoS), ISGC2012:027, International Symposium on Grids & Clouds (ISGC) 2012
[Konferenz- oder Workshop-Beitrag] , (2012)

Mohamed, Mohamed Saied Emam ; Bulygin, Stanislav ; Zohner, Michael ; Heuser, Annelie ; Walter, Michael ; Buchmann, Johannes :
Improved Algebraic Side-Channel Attack on AES.
2012 IEEE International Symposium on Hardware-Oriented Security and Trust IEEE
[Konferenz- oder Workshop-Beitrag] , (2012)

Niebuhr, Robert ; Meziani, Mohammed ; Bulygin, Stanislav ; Buchmann, Johannes :
Selecting Parameters for Secure McEliece-based Cryptosystems.
In: International Journal of Information Security, 11 (3) pp. 137-147.
[Artikel] , (2012)

Braun, Johannes ; Buchmann, Johannes
Levi, Albert ; Badra, Mohamad ; Cesana, Matteo ; Ghassemian, Mona ; Jabeur, Nafaa ; Klonowski, Marek ; Mana, Antonio ; Sargento, Susana ; Zeadally, Sherali (eds.) :

Perfect Confidentiality Network - A solution for information theoretically secure key agreement.
5th IFIP International Conference on New Technologies, Mobility & Security (NTMS) 2012 IEEE
[Konferenz- oder Workshop-Beitrag] , (2012)

Fischlin, Marc ; Buchmann, Johannes ; Manulis, Mark (eds.) :
Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography.
Fischlin, Marc ; Buchmann, Johannes ; Manulis, Mark (eds.), Springer
[Konferenz- oder Workshop-Beitrag] , (2012)

Vigil, Martín Gagliotti ; Cabarcas, Daniel ; Wiesmaier, Alexander ; Buchmann, Johannes :
Authenticity, Integrity and Proof-of-Existence for Long-Term Archiving: a Survey.
In: IACR Cryptology ePrint Archive
[Artikel] , (2012)

Schreiner, Steffen ; Grigoras, Costin ; Litmaath, Maarten ; Betev, Latchezar ; Buchmann, Johannes :
Certified Grid Job Submission in the ALICE Grid Services.
In: Open Access Journal of Physics: Conference Series (JPCS), International Conference on Computing in High Energy and Nuclear Physics (CHEP) 2012
[Artikel] , (2012)

Buchmann, Johannes (ed.), :
Internet Privacy - Eine multidisziplinäre Bestandsaufnahme/ A multidisciplinary analysis.
Springer Verlag , p. 328. ISBN 978-3-642-31942-6
[Buch] , (2012)

Bulygin, Stanislav ; Buchmann, Johannes
Lin, Dongdai ; Tsudik, Gene ; Wang, Xiaoyun (eds.) :

Algebraic cryptanalysis of the round-reduced and side channel analysis of the full PRINTCipher-48.
In: Lecture Notes in Computer Science , 7092 . Springer
[Konferenz- oder Workshop-Beitrag] , (2011)

Buchmann, Johannes ; Dahmen, Erik ; Hülsing, Andreas
Yang, Bo-Yin (ed.) :

XMSS - A Practical Forward Secure Signature Scheme based on Minimal Security Assumptions.
In: Lecture Notes in Computer Science - LNCS (7071). Springer Berlin / Heidelberg
[Konferenz- oder Workshop-Beitrag] , (2011)

Kuo, Po-Chun ; Schneider, Michael ; Dagdelen, Özgür ; Reichelt, Jan ; Buchmann, Johannes ; Cheng, Chen-Mou ; Yang, Bo-Yin
Preneel, Bart ; Takagi, Tsuyoshi (eds.) :

Extreme Enumeration on GPU and in Clouds - How Many Dollars You Need to Break SVP Challenges -.
In: LNCS (6917). Springer
[Konferenz- oder Workshop-Beitrag] , (2011)

Mohamed, Mohamed Saied Emam ; Ding, Jintai ; Buchmann, Johannes
Kim, Tai-Hoon ; Adeli, Hojjat ; Robles, Rosslin John ; Balitanas, Maricel (eds.) :

Towards Algebraic Cryptanalysis of HFE Challenge 2.
In: Communications in Computer and Information Science (200). Springer
[Konferenz- oder Workshop-Beitrag] , (2011)

Mohamed, Mohamed Saied Emam ; Bulygin, Stanislav ; Buchmann, Johannes
Kim, Tai-Hoon ; Adeli, Hojjat ; Robles, Rosslin John ; Balitanas, Maricel (eds.) :

Using SAT Solving to Improve Differential Fault Analysis of Trivium.
In: Communications in Computer and Information Science , 200 . Springer
[Konferenz- oder Workshop-Beitrag] , (2011)

Buchmann, Johannes ; Dahmen, Erik ; Ereth, Sarah ; Hülsing, Andreas ; Rückert, Markus
Nitaj, Abderrahmane ; Pointcheval, David (eds.) :

On the security of the Winternitz one-time signature scheme.
In: Lecture Notes in Computer Science (LNCS) (6737). Springer Berlin / Heidelberg
[Konferenz- oder Workshop-Beitrag] , (2011)

Petzoldt, Albrecht ; Bulygin, Stanislav ; Buchmann, Johannes
Catalano, Dario ; Fazio, Nelly ; Gennaro, Rosario ; Nicolosi, Antonio (eds.) :

Linear Recurring Sequences for the UOV Key Generation.
In: LNCS (6571). Springer
[Konferenz- oder Workshop-Beitrag] , (2011)

Wiesmaier, Alexander ; Horsch, Moritz ; Braun, Johannes ; Kiefer, Franziskus ; Hühnlein, Detlef ; Strenzke, Falko ; Buchmann, Johannes
Cheung, Bruce ; Hui, Lucas Chi Kwong ; Sandhu, Ravi ; Wong, Duncan (eds.) :

An efficient mobile PACE implementation.
In: ACM Symposium on Information, Computer and Communications Security . ACM
[Konferenz- oder Workshop-Beitrag] , (2011)

Mohamed, Mohamed Saied Emam ; Bulygin, Stanislav ; Buchmann, Johannes :
Improved Differential Fault Analysis of Trivium.
Proceedings of COSADE 2011
[Konferenz- oder Workshop-Beitrag] , (2011)

Langer, Lucie ; Wiesmaier, Alexander ; Buchmann, Johannes :
Secure Long-term Record Keeping in the Public Sector.
In: EGovernement Review (7) pp. 14-15.
[Artikel] , (2011)

Mohamed, Mohamed Saied Emam ; Ding, Jintai ; Buchmann, Johannes :
The Complexity Analysis of the MutantXL Family.
In: IACR Cryptology ePrint Archive p. 36.
[Artikel] , (2011)

Niebuhr, Robert ; Cayrel, Pierre-Louis ; Buchmann, Johannes :
Improving the effciency of Generalized Birthday Attacks against certain structured cryptosystems.
The Seventh International Workshop on Coding and Cryptography 2011 (WCC 2011)
[Konferenz- oder Workshop-Beitrag] , (2011)

Petzoldt, Albrecht ; Bulygin, Stanislav ; Buchmann, Johannes
Gong, G. ; Gupta, K. C. (eds.) :

CyclicRainbow - A multivariate Signature Scheme with a Partially Cyclic Public Key.
In: Lecture Notes in Computer Science , 6498 . Springer
[Konferenz- oder Workshop-Beitrag] , (2010)

Mohamed, Mohamed Saied Emam ; Cabarcas, Daniel ; Ding, Jintai ; Buchmann, Johannes ; Bulygin, Stanislav
Lee, Donghoon ; Hong, Seokhie (eds.) :

MXL3: An efficient algorithm for computing Gröbner bases of zero-dimensional ideals.
Proceedings of the 12th International Conference on Information Security and Cryptography - ICISC 2009 Springer
[Konferenz- oder Workshop-Beitrag] , (2010)

Mohamed, Wael Said Abd Elmageed ; Bulygin, Stanislav ; Ding, Jintai ; Buchmann, Johannes ; Werner, Fabian
Heng, S.-H. ; Wright, R. N. ; Goi, B.-M. (eds.) :

Practical Algebraic Cryptanalysis for Dragon-based Cryptosystems.
In: Lecture Notes in Computer Science (6467). Springer
[Konferenz- oder Workshop-Beitrag] , (2010)

Bulygin, Stanislav ; Petzoldt, Albrecht ; Buchmann, Johannes
Gong, G. ; Gupta, K. C. (eds.) :

Towards provable security of the Unbalanced Oil and Vinegar signature scheme under direct attacks.
In: Lecture Notes in Computer Science , 6498 . Springer
[Konferenz- oder Workshop-Beitrag] , (2010)

Petzoldt, Albrecht ; Bulygin, Stanislav ; Buchmann, Johannes
Cid, Carlos ; Faugere, Jean-Charles (eds.) :

A Multivariate Signature Scheme with a Partially Cyclic Public Key.
In: Proceedings of the 2nd International Conference on Symbolic Computation and Cryptography
[Konferenz- oder Workshop-Beitrag] , (2010)

Niebuhr, Robert ; Cayrel, Pierre-Louis ; Bulygin, Stanislav ; Buchmann, Johannes :
On lower bounds for Information Set Decoding over F_q.
Proceedings of the 2nd International Conference on Symbolic Computation and Cryptography (SCC 2010)
[Konferenz- oder Workshop-Beitrag] , (2010)

Mohamed, Wael Said Abd Elmageed ; Ding, Jintai ; Kleinjung, Thorsten ; Bulygin, Stanislav ; Buchmann, Johannes
Cid, Carlos ; Faugere, Jean-Charles (eds.) :

PWXL: A Parallel Wiedemann-XL Algorithm for Solving Polynomial Equations over GF(2).
Proceedings of the 2nd International Conference on Symbolic Computation and Cryptography (SCC 2010)
[Konferenz- oder Workshop-Beitrag] , (2010)

Buchmann, Johannes ; Wiesmaier, Alexander :
Eine kurze Geschichte der Schlüssel.
In: 360° -- Fachmagazin für das Management im öffentlichen Sektor (17) pp. 21-23.
[Artikel] , (2010)

Buchmann, Johannes ; Cabarcas, Daniel ; Ding, Jintai ; Mohamed, Mohamed Saied Emam
Bernstein, Daniel ; Lange, Tanja (eds.) :

Flexible Partial Enlargement to Accelerate Gröbner Basis Computation over F_2.
In: LNCS (6055). Springer
[Konferenz- oder Workshop-Beitrag] , (2010)

Hermans, Jens ; Schneider, Michael ; Buchmann, Johannes ; Vercauteren, Frederik ; Preneel, Bart
Bernstein, Daniel ; Lange, Tanja (eds.) :

Parallel Shortest Lattice Vector Enumeration on Graphics Cards.
In: LNCS , 6055 . Springer
[Konferenz- oder Workshop-Beitrag] , (2010)

Petzoldt, Albrecht ; Bulygin, Stanislav ; Buchmann, Johannes
Sendrier, Nicolas (ed.) :

Selecting Parameters for the Rainbow Signature Scheme.
In: Lecture Notes in Computer Science (6061). Springer
[Konferenz- oder Workshop-Beitrag] , (2010)

Langer, Lucie ; Volkamer, Melanie ; Schmidt, Axel ; Buchmann, Johannes :
A Taxonomy Refining the Security Requirements for Electronic Voting: Analyzing Helios as a Proof of Concept.
Fifth International Conference on Availability, Reliability and Security (ARES 2010) IEEE Computer Society
[Konferenz- oder Workshop-Beitrag] , (2010)

Richter, Philipp ; Langer, Lucie ; Hupf, Katharina ; Volkamer, Melanie ; Buchmann, Johannes
Schweigh�ofer, Erich ; Geist, Anton ; Staufer, Ines (eds.) :

Verifizierbarkeit und Öffentlichkeitsgrundsatz bei elektronischen Wahlen.
Globale Sicherheit und proaktiver Staat - Die Rolle der Rechtsinformatik, Tagungsband des 13. Internationalen Rechtsinformatik Symposium IRIS 2010
[Konferenz- oder Workshop-Beitrag] , (2010)

Niebuhr, Robert ; Cayrel, Pierre-Louis ; Bulygin, Stanislav ; Buchmann, Johannes :
Attacking code/lattice-based cryptosystems using Partial Knowledge.
Proceedings of Inscrypt 2010 China Press
[Konferenz- oder Workshop-Beitrag] , (2010)

Buchmann, Johannes:
Einführung in die Kryptographie / Introduction to Cryptography.
Springer Berlin/Heidelberg , p. 274. ISBN 9783642111853
[Buch] , (2010)

Schmidt, Axel ; Volkamer, Melanie ; Buchmann, Johannes
Krimmer, Robert ; Grimm, Rüdiger (eds.) :

An Evaluation and Certification Approach to Enable Voting Service Providers.
In: LNI , 167 . GI
[Konferenz- oder Workshop-Beitrag] , (2010)

Schneider, Michael ; Buchmann, Johannes :
Extended Lattice Reduction Experiments using the BKZ Algorithm.
In: LNI (170). GI
[Konferenz- oder Workshop-Beitrag] , (2010)

Buchmann, Johannes ; Braun, Johannes ; Horsch, Moritz ; Hühnlein, Detlef ; Kiefer, Franziskus ; Strenzke, Falko ; Wiesmaier, Alexander :
Towards a mobile eCard Client.
13. Kryptotag
[Konferenz- oder Workshop-Beitrag] , (2010)

Langer, Lucie ; Weber, Stefan ; Schmidt, Axel ; Buchmann, Johannes ; Volkamer, Melanie :
Towards Long-Term Free and Secret Electronic Elections Providing Voter-Verifiability in the Bulletin Board Model.
Proceedings of 3rd International Conference on Theory and Practice of Electronic Governance (ICEGOV2009) ACM Press
[Konferenz- oder Workshop-Beitrag] , (2009)

Langer, Lucie ; Volkamer, Melanie ; Weber, Stefan ; Schmidt, Axel ; Buchmann, Johannes
Davies, Jim ; Janowski, Tomasz (eds.) :

Towards Long-Term Free and Secret Electronic Elections Providing Voter-Verifiability in the Bulletin Board Model.
ICEGOV 2009, Proceedings of the 3rd International Conference on Theory and Practice of Electronic Governance
[Konferenz- oder Workshop-Beitrag] , (2009)

Mohamed, Mohamed Saied Emam ; Ding, Jintai ; Buchmann, Johannes ; Werner, Fabian :
Algebraic Attack on the MQQ Public Key Cryptosystem.
In: LNCS (5888). Springer
[Konferenz- oder Workshop-Beitrag] , (2009)

Buchmann, Johannes ; Lindner, Richard :
Secure Parameters for SWIFFT.
In: LNCS (5922). Springer
[Konferenz- oder Workshop-Beitrag] , (2009)

Buchmann, Johannes ; Roßnagel, Alexander :
Das Bundesverfassungsgericht und Telemedienwahlen.
In: K&R, 9 pp. 543-548.
[Artikel] , (2009)

Schmidt, Axel ; Heinson, Dennis ; Langer, Lucie ; Opitz-Talidou, Zoi ; Richter, Philipp ; Volkamer, Melanie ; Buchmann, Johannes
Ryan, Johannes Y. A. ; Schoenmakers, Berry (eds.) :

Developing a Legal Framework for Remote Electronic Voting.
In: LNCS , 5767 . Springer
[Konferenz- oder Workshop-Beitrag] , (2009)

Langer, Lucie ; Schmidt, Axel ; Volkamer, Melanie ; Buchmann, Johannes
Fischer, Stefan ; Maehle, Erik ; Reischuk, Rüdiger (eds.) :

Classifying Privacy and Verifiability Requirements for Electronic Voting.
Informatik 2009: Im Focus das Leben, Beiträge der 39. Jahrestagung der Gesellschaft für Informatik e.V. (GI)
[Konferenz- oder Workshop-Beitrag] , (2009)

Volkamer, Melanie ; Schryen, Guido ; Langer, Lucie ; Schmidt, Axel ; Buchmann, Johannes
Fischer, Stefan ; Maehle, Erik ; Reischuk, Rüdiger (eds.) :

Elektronische Wahlen: Verifizierung vs. Zertifizierung.
Informatik 2009: Im Focus das Leben, Beiträge der 39. Jahrestagung der Gesellschaft für Informatik e.V.
[Konferenz- oder Workshop-Beitrag] , (2009)

Buchmann, Johannes ; Karatsiolis, Vangelis :
Notification Services for the Server-Based Certificate Validation Protocol.
In: Int'l J. of Communications, Network and System Sciences, 2 (5) pp. 378-384.
[Artikel] , (2009)

Schmidt, Axel ; Langer, Lucie ; Buchmann, Johannes ; Volkamer, Melanie :
Specification of a Voting Service Provider.
In: IEEE CS Digital Library, doi: 10.1109/RE-VOTE.2009.8 .
[Konferenz- oder Workshop-Beitrag] , (2009)

Langer, Lucie ; Schmidt, Axel ; Buchmann, Johannes ; Volkamer, Melanie ; Stolfik, Alexander :
Towards a Framework on the Security Requirements for Electronic Voting Protocols.
In: IEEE CS Digital Library, doi: 10.1109/RE-VOTE.2009.9 .
[Konferenz- oder Workshop-Beitrag] , (2009)

Schneider, Michael ; Buchmann, Johannes ; Lindner, Richard :
Probabilistic Analysis of LLL Reduced Bases.
In: LNCS (6429). Springer
[Konferenz- oder Workshop-Beitrag] , (2009)

Langer, Lucie ; Schmidt, Axel ; Volkamer, Melanie ; Buchmann, Johannes
Prosser, Alexander ; Parycek, Peter (eds.) :

Ein PKI-basiertes Protokoll für sichere und praktikable Onlinewahlen.
Proceedings of EDEM 2009 ; Tagungsband Elektronische Demokratie in Österreich OCG Verlag
[Konferenz- oder Workshop-Beitrag] , (2009)

Buchmann, Johannes ; Lindner, Richard ; Rückert, Markus ; Schneider, Michael :
Post-quantum cryptography: lattice signatures.
In: Special Issue of Computing (CECC 2008)
[Artikel] , (2009)

Schmidt, Axel ; Volkamer, Melanie ; Langer, Lucie ; Buchmann, Johannes
Fischer, Stefan ; Maehle, Erik ; Reischuk, Rüdiger (eds.) :

Towards the impact of the operational environment on the security of e-voting.
In: LNI , 154 . Gesellschaft für Informatik
[Konferenz- oder Workshop-Beitrag] , (2009)

Dahmen, Erik ; Okeya, Katsuyuki ; Takagi, Tsuyoshi ; Vuillaume, Camille
Buchmann, Johannes ; Ding, Jintai (eds.) :

Digital Signatures out of Second-Preimage Resistant Hash Functions.
In: LNCS (5299). Springer
[Konferenz- oder Workshop-Beitrag] , (2008)

Mohamed, Mohamed Saied Emam ; Mohamed, Wael Said Abd Elmageed ; Ding, Jintai ; Buchmann, Johannes :
MXL2: Solving Polynomial Equations over GF(2) Using an Improved Mutant Strategy.
Post-Quantum Cryptography, Second International Workshop, PQCrypto 2008
[Konferenz- oder Workshop-Beitrag] , (2008)

Buchmann, Johannes ; Ding, Jintai (eds.) :
Post-Quantum Cryptography.
Buchmann, Johannes ; Ding, Jintai (eds.), Springer
[Konferenz- oder Workshop-Beitrag] , (2008)

Bernstein, Daniel ; Buchmann, Johannes ; Dahmen, Erik (eds.), :
Post-Quantum Cryptography.
Springer , p. 245. ISBN 978-3-540-88701-0
[Buch] , (2008)

Rohde, Sebastian ; Eisenbarth, Thomas ; Dahmen, Erik ; Buchmann, Johannes ; Paar, Christof
Grimaud, Gilles ; Standaert, François-Xavier (eds.) :

Fast Hash-Based Signatures on Constrained Devices.
In: LNCS (5189). Springer
[Konferenz- oder Workshop-Beitrag] , (2008)

Vuillaume, Camille ; Okeya, Katsuyuki ; Dahmen, Erik ; Buchmann, Johannes
Chung, Kyo-Il ; Sohn, Kiwook ; Yung, Moti (eds.) :

Public Key Authentication with Memory Tokens.
In: LNCS (5379). Springer
[Konferenz- oder Workshop-Beitrag] , (2008)

Buchmann, Johannes ; Döring, Martin ; Lindner, Richard :
Efficiency Improvement for {NTRU}.
In: Lecture Notes in Informatics (128).
[Konferenz- oder Workshop-Beitrag] , (2008)

Rohde, Sebastian ; Eisenbarth, Thomas ; Dahmen, Erik ; Buchmann, Johannes ; Paar, Christof :
Efficient Hash-Based Signatures on Embedded Devices.
SECSI - Secure Component and System Identification 2008
[Konferenz- oder Workshop-Beitrag] , (2008)

Buchmann, Johannes ; Lindner, Richard ; Rückert, Markus
Buchmann, Johannes ; Ding, Jintai (eds.) :

Explicit Hard Instances of the Shortest Vector Problem.
In: LNCS (5299).
[Konferenz- oder Workshop-Beitrag] , (2008)

Buchmann, Johannes ; Dahmen, Erik ; Schneider, Michael
Buchmann, Johannes ; Ding, Jintai (eds.) :

Merkle Tree Traversal Revisited.
In: LNCS (5299). Springer
[Konferenz- oder Workshop-Beitrag] , (2008)

Ding, Jintai ; Buchmann, Johannes ; Mohamed, Mohamed Saied Emam ; Mohamed, Wael Said Abd Elmageed ; Weinmann, Ralf-Philipp :
MutantXL.
SCC 2008
[Konferenz- oder Workshop-Beitrag] , (2008)

Buchmann, Johannes ; Ding, Jíntai (eds.), :
Post-Quantum Cryptography (PQCrypto 2008).
Springer Cincinnati, OH, USA ISBN 978-3-540-88402-6
[Buch] , (2008)

Buchmann, Johannes ; Ding, Jintai (eds.) :
Post-Quantum Cryptography, Second International Workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17-19, 2008, Proceedings.
Buchmann, Johannes ; Ding, Jintai (eds.), In: Lecture Notes in Computer Science , 5299 . Springer
[Konferenz- oder Workshop-Beitrag] , (2008)

Langer, Lucie ; Schmidt, Axel ; Buchmann, Johannes :
Secure Online Elections in Practice.

[Anderes] , (2008)

Langer, Lucie ; Schmidt, Axel ; Buchmann, Johannes
Remenyi, Dan (ed.) :

Secure and Practical Online Elections via Voting Service Provider.
Proceedings of the 4th International Conference on e-Government -- ICEG, Melbourne, Australia ACI
[Konferenz- oder Workshop-Beitrag] , (2008)

Buchmann, Johannes ; Dahmen, Erik ; Klintsevich, Elena ; Okeya, Katsuyuki ; Vuillaume, Camille :
Merkle Signatures with Virtually Unlimited Signature Capacity.
In: LNCS , 4521 . Springer
[Konferenz- oder Workshop-Beitrag] , (2007)

Weber, Stefan Georg ; Araujo, Roberto ; Buchmann, Johannes :
On coercion-resistant electronic elections with linear work.
In: The Second International Conference on Availability, Reliability and Security, 2007 : ARES 2007 ; 2nd International Workshop Dependability and Security in e-Government (DeSeGov 2007)...ISBN 0-7695-2775-2, 978-0-7695-2775-8 [Online-Ressource]. , pp. 908-916.
[Buchkapitel] , (2007)

Buchmann, Johannes ; Vollmer, Ulrich:
Binary Quadratic Forms. An Algorithmic Approach.
Algorithms and Computation in Mathematics (20). Springer Berlin/Heidelberg , p. 318. ISBN 978-3-540-46367-2
[Buch] , (2007)

Weber, Stefan ; Araújo, Roberto ; Buchmann, Johannes :
On Coercion-Resistant Electronic Elections with Linear Work.
In: >ares, 00 pp. 908-916.
[Artikel] , (2007)

Buchmann, Johannes ; Garcia, Luis Carlos Coronado ; Dahmen, Erik ; Döring, Martin ; Klintsevich, Elena :
{CMSS} - An Improved Merkle Signature Scheme.
In: LNCS , 4329 . Springer
[Konferenz- oder Workshop-Beitrag] , (2006)

Lippert, Marcus ; Karatsiolis, Evangelos ; Wiesmaier, Alexander ; Buchmann, Johannes :
Life-Cycle Management of X.509 Certifcates Based on LDAP Directories.
In: >Journal of Computer Security, 14(5) pp. 419-439.
[Artikel] , (2006)

Araújo, Roberto ; Wiesmaier, Alexander ; Buchmann, Johannes :
The T-Vote Protocol.

[Report] , (2006)

Buchmann, Johannes ; Ludwig, Christoph :
Practical Lattice Basis Sampling Reduction.
In: LNCS , 4076 . Springer
[Konferenz- oder Workshop-Beitrag] , (2006)

Wiesmaier, Alexander ; Rauchschwalbe, Ulrich ; Ludwig, Christoph ; Henhapl, Birgit ; Ruppert, Markus ; Buchmann, Johannes :
Intrinsically Legal-For-Trade Objects by Digital Signatures.
In: LNI , P-77 .
[Konferenz- oder Workshop-Beitrag] , (2006)

Wiesmaier, Alexander ; Ludwig, Christoph ; Rauchschwalbe, Ulrich ; Henhapl, Birgit ; Ruppert, Markus ; Buchmann, Johannes :
Intrinsically Legal-For-Trade Objects by Digital Signatures.
Sicherheit 2006: Sicherheit - Schutz und Zuverlässigkeit, Beiträge der 3. Jahrestagungdes Fachbereichs der Gesellschaft für Informatik e.V.
[Konferenz- oder Workshop-Beitrag] , (2006)

Buchmann, Johannes ; Pyshkin, Andrei ; Weinmann, Ralf-Philipp :
Block Ciphers Sensitive to Gröbner Basis Attacks.
In: Topics in Cryptology - CT-RSA 2006 <San Jose, CA, USA,2006> ; (Lecture Notes in Computer Science ; 3860) ; 313-331 ; ISBN: 3-540-31033-9 .
[Konferenz- oder Workshop-Beitrag] , (2006)

Buchmann, Johannes ; Pyshkin, Andrei ; Weinmann, Ralf-Philipp :
A Zero-Dimensional Gröbner Basis for AES-128.
In: Fast software encryption : 13th International Workshop, FSE 2006; Graz, Austria, March 15 - 17, 2006; revised selected papers / Matthew Robshaw (Ed.). - Berlin ; Heidelberg [u.a.] : Springer, 2006, S. 78-88 (Lecture notes in computer science ; 4047) ISBN: . Springer , Berlin ; Heidelberg [u.a.]
[Konferenz- oder Workshop-Beitrag] , (2006)

Buchmann, Johannes ; Vollmer, Ulrich :
CLC2006 - Workshop on Codes and Lattices in Cryptography.

[Anderes] , (2006)

Kaiser, Markus ; Buchmann, Johannes :
Computer Verification in Cryptography.
International Conference on Computer Science-(ICCS&#039;06)
[Konferenz- oder Workshop-Beitrag] , (2006)

Rauchschwalbe, Ulrich ; Wiesmaier, Alexander ; Ludwig, Christoph ; Buchmann, Johannes :
Digital Signierte Wägeresultate - Neue Wege in der Sicherung eichfähiger Messwerte.
In: >W&auml;gen, Dosieren, Mischen - (WDM), 3/2006 23--27.
[Artikel] , (2006)

Kaiser, Markus ; Buchmann, Johannes :
A Formal Approach for Proof Constructions in Cryptography.
In: >International Journal of Computer Science, 1 195--203.
[Artikel] , (2006)

Buchmann, Johannes ; Dahmen, Erik ; May, Alexander ; Vollmer, Ulrich :
Krypto 2020.
In: >The Information Security Journal -(KES), 5 pp. 74-83.
[Artikel] , (2006)

Buchmann, Johannes :
Passwörter oder Smartcards zur Absicherung von Portalen?

[Report] , (2006)

Buchmann, Johannes ; May, Alexander ; Vollmer, Ulrich :
Perspectives for cryptographic long-term security.
In: >Commun. ACM, 49 (9) pp. 50-55.
[Artikel] , (2006)

Buchmann, Johannes ; May, Alexander ; Vollmer, Ulrich :
Perspectives for cryptographic long-term security.
In: >Commun. ACM, 49 (9)
[Artikel] , (2006)

Buchmann, Johannes ; Vollmer, Ulrich :
A Terr algorithm for computations in the infrastructure of real-quadratic number fields.
In: >Journal de Théorie des Nombres de Bordeaux, 18 (3) 559--572.
[Artikel] , (2006)

Lippert, Marcus ; Karatsiolis, Evangelos ; Wiesmaier, Alexander ; Buchmann, Johannes :
Directory Based Registration in Public Key Infrastructures.
The 4th International Workshop for Applied PKI (IWAP’05) IOS Press
[Konferenz- oder Workshop-Beitrag] , (2005)

Wiesmaier, Alexander ; Lippert, Marcus ; Karatsiolis, Vangelis ; Raptis, Georgios ; Buchmann, Johannes :
An Evaluated Certification Services System for the German National Root CA - Legally binding and trustworthy Transactions in E-Business and E-Government.
EEE 2005 - International Conference on E-Business, Enterprise Information Systems, E-Government, and Outsourcing CSREA Press
[Konferenz- oder Workshop-Beitrag] , (2005)

Straub, Tobias ; Ginkel, Thilo-Alexander ; Buchmann, Johannes :
A Multipurpose Delegation Proxy for WWW/ Credentials.
In: LNCS , 3545 . Springer
[Konferenz- oder Workshop-Beitrag] , (2005)

Wiesmaier, Alexander ; Karatsiolis, Vangelis ; Lippert, Marcus ; Buchmann, Johannes :
The Workshop - Implementing Well Structured Enterprise Applications.
SERP 2005 - International Conference on Software Engineering Research and Practice CSREA Press
[Konferenz- oder Workshop-Beitrag] , (2005)

Wiesmaier, Alexander ; Fischer, Mike ; Lippert, Marcus ; Buchmann, Johannes :
Outflanking and Securely Using the PIN/TAN-System.
SAM 2005 - International Conference on Security and Management CSREA Press
[Konferenz- oder Workshop-Beitrag] , (2005)

Buchmann, Johannes ; Takagi, Tsuyoshi ; Vollmer, Ulrich :
Number field cryptography.
High Primes and Misdemeanours: Lectures in Honour of the 60th Birthday of Hugh Cowie Williams
[Konferenz- oder Workshop-Beitrag] , (2004)

Buchmann, Johannes ; Coronado, Carlos ; Döring, Martin ; Engelbert, Daniela ; Ludwig, Christoph ; Overbeck, Raphael ; Schmidt, Arthur ; Vollmer, Ulrich ; Weinmann, Ralf-Philipp :
Post-Quantum Signatures.

[Anderes] , (2004)

Karatsiolis, Vangelis ; Lippert, Marcus ; Wiesmaier, Alexander ; Pitaev, Anna ; Ruppert, Markus ; Buchmann, Johannes :
Towards a Flexible {Intra-Trustcenter} Management Protocol.
In: >CoRR, cs.CR/0411067
[Artikel] , (2004)

Baier, Harald ; Buchmann, Johannes ; Busch, Christoph :
Aus- und Weiterbildung in IT-Sicherheit.
In: IT-Sicherheit im verteilten Chaos : Tagungsband 8. Deutscher IT-Sicherheitskongress des BSI 2003 / Bundesamt für Sicherheit in der Informationstechnik.- Ingelheim : SecuMedia Verl., 2003.- 531 S.- ISBN 3-922746-49-7.- S. 179-190 . SecuMedia Verl. , Ingelheim
[Konferenz- oder Workshop-Beitrag] , (2003)

Baier, Harald ; Buchmann, Johannes ; Busch, Christoph :
{Aus-} und Weiterbildung in {IT}-Sicherheit.

[Report] , (2003)

Buchmann, Johannes ; Schmidt, Arthur :
Computing the structure of a finite abelian group.

[Report] , (2003)

Buchmann, Johannes ; Takagi, Tsuyoshi :
Kryptographie - Chancen und Risiken.

[Report] , (2003)

Buchmann, Johannes ; Takagi, Tsuyoshi ; Vollmer, Ulrich :
Number field cryptography.

[Report] , (2003)

Buchmann, Johannes ; Sakurai, Kouichi ; Takagi, Tsuyoshi :
An IND-CCA2 Public-Key Cryptosystem with Fast Decryption.
In: LNCS (2587). Springer
[Konferenz- oder Workshop-Beitrag] , (2002)

Buchmann, Johannes ; Ernst, Markus ; Henhapl, Birgit ; Huss, Sorin :
Elliptische Kurven Kryptographie - hocheffizient und portabel.
In: >thema FORSCHUNG, Eingebette Systeme: Entwurf und Anwendung versteckter Computer (1/2002) pp. 102-109.
[Artikel] , (2002)

Buchmann, Johannes :
Theoretische Informatik.
In: 30 Jahre Informatik an deutschen Hochschulen. - Darmstadt : Techn. Univ., Fachbereich Informatik, 2002. - S. 114-115. Techn. Univ., Darmstadt
[Buchkapitel] , (2002)

Buchmann, Johannes :
Cryptographic Protocols.

[Anderes] , (2002)

Biehl, Ingrid ; Buchmann, Johannes ; Hamdy, Safuat ; Meyer, Andreas :
A Signature Scheme Based on the Intractability of Computing Roots.
In: >Des. Codes Cryptography, 25 (3) pp. 223-236.
[Artikel] , (2002)

Buchmann, Johannes ; Hamdy, S. :
A survey on IQ cryptography.
In: Public-key cryptography and computational number theory. Hrsg.: K. Alster, J. Urbanowicz, H.C. Wiliams. - Berlin, New York: de Gruyter, 2001. S. 1-15. de Gruyter, Berlin, New York
[Buchkapitel] , (2001)

Baier, Harald ; Buchmann, Johannes :
Efficient Construction of Cryptographically Strong Elliptic Curves.

[Report] , (2001)

Buchmann, Johannes ; Sakurai, Kouichi ; Takagi, Tsuyoshi :
An {IND-CCA2} Public-Key Cryptosystem with Fast Decryption.

[Report] , (2001)

Buchmann, Johannes ; Hamdy, Safuat :
A Survey on {IQ} Cryptography.

[Report] , (2001)

Buchmann, Johannes :
Wie sicher kann Sicherheit sein?

[Report] , (2001)

Baier, Harald ; Buchmann, Johannes :
Efficient Construction of Cryptographically Strong Elliptic Curves.
In: LNCS (1977). Springer
[Konferenz- oder Workshop-Beitrag] , (2000)

Buchmann, Johannes ; Maurer, M. ; Möller, B. :
Cryptography based on number fields with large regulator.
In: Journal de théorie des nombres de Bordeaux, 12 pp. 293-307.
[Artikel] , (2000)

Baier, Harald ; Buchmann, Johannes :
Efficient construction of cryptographically strong elliptic curves.
In: Progress in cryptology: INDOCRYPT 2000. Hrsg.: B. Roy, E. Okamoto. - Berlin, Heidelberg (u.a.): Springer, 2000 = Lecture notes in computer science; 1977. S. 191-202. Springer, Berlin, Heidelberg (u.a.)
[Buchkapitel] , (2000)

Buchmann, Johannes ; Hoeholdt, Tom ; Stichtenoth, Hennning ; Tapia-Recillas, Horacio (eds.) :
Coding Theory cryptography and related areas.
Buchmann, Johannes ; Hoeholdt, Tom ; Stichtenoth, Hennning ; Tapia-Recillas, Horacio (eds.), Springer
[Konferenz- oder Workshop-Beitrag] , (2000)

Buchmann, Johannes ; Maurer, Markus ; Möller, Bodo :
Cryptography Based on Number Fields with Large Regulator.

[Report] , (2000)

Biehl, Ingrid ; Buchmann, Johannes ; Hamdy, Safuat ; Meyer, Andreas :
A Signature Scheme Based on the Intractability of Computing Roots.

[Report] , (2000)

Buchmann, Johannes ; Ruppert, M. ; Tak, M.:
FlexiPKI - Realisierung einer flexiblen Public-Key-Infrastruktur.
Techn. Univ., FB 20, Inst. für Theoretische Informatik, Darmstadt
[Buch] , (1999)

Buchmann, Johannes ; Squirrel, D.:
Kernels of integer matrices via modular arithmetic.
Techn. Univ., FB 20, Inst. für Theoretische Informatik, Darmstadt
[Buch] , (1999)

Buchmann, Johannes ; Hoeholdt, Tom ; Stichtenoth, Hennning ; Tapia-Recillas, Horacio (eds.), :
Coding Theory, Cryptography and Related Areas.
Springer ISBN 978-3-540-66248-8
[Buch] , (1999)

Biehl, Ingrid ; Buchmann, Johannes ; Hamdy, Safuat ; Meyer, Andreas :
Cryptographic Protocols Based on Intractability of Extracting Roots and Computing Discrete Logarithms.

[Report] , (1999)

Buchmann, Johannes ; Ruppert, Markus ; Tak, Markus :
{FlexiPKI} - Realisierung einer flexiblen Public-Key-Infrastruktur.

[Report] , (1999)

Buchmann, Johannes ; Squirrel, Douglas :
Kernels of Integer Matrices via Modular Arithmetic.

[Report] , (1999)

Buchmann, Johannes ; Eisenbrand, Friedrich :
On factor refinement in number fields.
In: >Mathematics of Computation, 68 (225) pp. 345-350.
[Artikel] , (1999)

Buchmann, Johannes ; Maurer, Markus :
Wie sicher ist die Public-Key-Kryptographie.

[Report] , (1999)

Buchmann, Johannes ; Maurer, Markus :
Approximate Evaluation of {L(1,chi-delta)}.

[Report] , (1998)

Buchmann, Johannes ; Weber, Damian :
Discrete Logarithms: Recent Progress.

[Report] , (1998)

Buchmann, Johannes ; Jacobson, Michael J. ; Neis, Stefan ; Theobald, Patrick ; Weber, Damian :
Sieving Methods for Class Group Computation.

[Report] , (1998)

Buchmann, Johannes ; Paulus, Sachar :
A One Way Function Based on Ideal Arithmetic in Number Fields.
In: LNCS (1294). Springer
[Konferenz- oder Workshop-Beitrag] , (1997)

Buchmann, Johannes ; Paulus, S.:
A one way function based on ideal arithmetic in number fields.
Techn. Hochschule, FB 20, FG Theoretische Informatik, Darmstadt
[Buch] , (1997) , Darmstadt: Techn. Hochschule, FB 20, Inst. für Theoretische Informatik, 1997. 9 S

Buchmann, Johannes ; Jacobson, Michael J. ; Teske, Edlyn :
On some computational problems in finite abelian groups.
In: >Mathematics in Computation, 66 (220) pp. 1663-1687.
[Artikel] , (1997)

Biehl, Ingrid ; Buchmann, Johannes :
An analysis of the reduction algorithms for binary quadratic forms.

[Report] , (1997)

Buchmann, Johannes ; Paulus, Sachar :
A one way function based on ideal arithmetic in number fields.

[Report] , (1997)

Buchmann, Johannes ; Neis, S.:
Algorithms for linear algebra problems over principal ideal rings.
Techn. Hochschule, FB 20, FG Theoretische Informatik, Darmstadt
[Buch] , (1996) , Darmstadt: Techn. Hochschule, FB 20, FG Theoretische Informatik, 1996

Buchmann, Johannes ; Eisenbrand, F.:
On factor refinement in number fields.
Techn. Hochschule, FB 20, FG Theoretische Informatik, Darmstadt
[Buch] , (1996) , Darmstadt: Techn. Hochschule, FB 20, FG Theoretische Informatik, 1996

Buchmann, Johannes ; Jacobson, M. J. ; Teske, E.:
On some computational problems in finite abelian groups.
Techn. Hochschule, FB 20, FG Theoretische Informatik, Darmstadt
[Buch] , (1996) , Darmstadt: Techn. Hochschule, FB 20, FG Theoretische Informatik, 1996

Buchmann, Johannes ; Neis, Stefan :
Algorithms for Linear Algebra Problems over Principal Ideal Rings.

[Report] , (1996)

Buchmann, Johannes ; Eisenbrand, Friedrich :
On Factor Refinement in Number Fields.

[Report] , (1996)

Buchmann, Johannes ; Jacobson, Michael J. ; Teske, Edlyn :
On some computational problems in finite abelian groups.

[Report] , (1996)

Biehl, Ingrid ; Buchmann, Johannes ; Thiel, Christoph :
Cryptographic Protocols Based on Discrete Logarithms in Real-quadratic Orders.
In: LNCS (839). Springer
[Konferenz- oder Workshop-Beitrag] , (1994)

Buchmann, Johannes ; Loho, Jürgen ; Zayer, Jörg :
An Implementation of the General Number Field Sieve.
In: LNCS (773). Springer
[Konferenz- oder Workshop-Beitrag] , (1994)

Buchmann, Johannes :
Reducing lattice bases by means of approximations.
In: LNCS (1122). Springer
[Konferenz- oder Workshop-Beitrag] , (1994)

Biehl, Ingrid ; Buchmann, Johannes :
Algorithms for quadratic orders.
In: >Mathematics of Computation
[Artikel] , (1994)

Buchmann, Johannes ; Lenstra, Hendrik W. :
Approximating rings of integers in number fields.
In: >Journal de Théorie des Nombres de Bordeaux, 6 (2)
[Artikel] , (1994)

Buchmann, Johannes ; Paulus, Sachar :
Algorithms for finite abelian groups.

[Anderes] , (1993)

Buchmann, Johannes ; Hollinger, Christine :
On smooth ideals in number fields.
In: >Journal of Number Theory
[Artikel] , (1993)

Biehl, Ingrid ; Buchmann, Johannes ; Meyer, Bernd ; Thiel, Christian ; Thiel, Christoph :
Tools for Proving Zero Knowledge.
In: LNCS (658). Springer
[Konferenz- oder Workshop-Beitrag] , (1992)

Ganzinger, Harald ; Paul, Wolfgang ; Buchmann, Johannes:
Informatik - Festschrift zum 60. Geburtstag von Günter Hotz.
Teubner Texte. Vieweg + Teubner Stuttgart + Leipzig , p. 508. ISBN 978-3815420331
[Buch] , (1992)

Buchmann, Johannes ; Kessler, Volker :
Computing a reduced lattice basis from a generating system.

[Anderes] , (1992)

Buchmann, Johannes ; van Sprang, Oliver :
On short representations of orders and number fields.

[Anderes] , (1992)

Buchmann, Johannes ; Thiel, Christoph ; Williams, Hugh :
Short representations of quadratic integers.

[Anderes] , (1992)

Buchmann, Johannes :
Number Theoretic Algorithms and Cryptology.
In: LNCS (529). Springer
[Konferenz- oder Workshop-Beitrag] , (1991)

Buchmann, Johannes ; Düllmann, Stephan :
On the Computation of Discrete Logarithms in Class Groups.
In: LNCS (537). Springer
[Konferenz- oder Workshop-Beitrag] , (1991)

Buchmann, Johannes ; Müller, Volker :
Computing the number of points on elliptic curves over finite prime fields.
International Symposium on Symbolic and Algebraic Computation-(ISSAC 1991)
[Konferenz- oder Workshop-Beitrag] , (1991)

Buchmann, Johannes ; Düllmann, Stephan :
Distributed class group computation.

[Anderes] , (1991)

Buchmann, Johannes ; Roth, Ralf ; Diehl, Matthias :
{LiPS}: A System for distributed applications.

[Anderes] , (1991)

Buchmann, Johannes ; Williams, Hugh :
Some remarks concerning the complexity of computing class groups of quadratic fields.
In: >Journal of Complexity, 7 (3) pp. 311-315.
[Artikel] , (1991)

Buchmann, Johannes ; Shoup, Victor :
Constructing Nonresidues in Finite Fields and the Extended Riemann Hypothesis.

[Anderes] , (1990)

Buchmann, Johannes :
A subexponential algorithm for the determination of class groups and regulators of algebraic number fields.
In: Progr. Math. , 91 . Birkhäuser Boston
[Konferenz- oder Workshop-Beitrag] , (1990)

Buchmann, Johannes ; Düllmann, Stephan ; Williams, Hugh :
On the Complexity and Efficiency of a New Key Exchange System.
In: LNCS (434). Springer
[Konferenz- oder Workshop-Beitrag] , (1989)

Diese Liste wurde am Sat Dec 15 02:54:00 2018 CET generiert.