TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 20.

Möller, Bodo (2003):
Improved Techniques for Fast Exponentiation.
In: ICISC 2002 - Information Security and Cryptology - 5th International Conference, Springer, In: LNCS, 2587, ISBN 3-540-00716-4,
[Conference or Workshop Item]

Möller, Bodo (2003):
Public-Key Cryptography.
Darmstadt, Technische Universität, TU Darmstadt, [Online-Edition: urn:nbn:de:tuda-tuprints-3722],
[Ph.D. Thesis]

Möller, Bodo (2003):
Provably Secure Public-Key Encryptionfor Length-Preserving Chaumian Mixes.
In: CT-RSA 2003 - Topics in Cryptology, The Cryptographers' Track at the RSA Conference 2003, Springer, San Francisco, CA, USA, In: LNCS, 2612, ISBN 3-540-00847-0,
[Conference or Workshop Item]

Möller, Bodo (2003):
Improved Techniques for Fast Exponentiation.
In: ICISC 2002 - Information Security and Cryptology, Springer, Seoul, Korea, In: LNCS, 2587, ISBN 978-3-540-00716-6,
[Conference or Workshop Item]

Möller, Bodo (2003):
Improved techniques for fast exponentiation.
Berlin [u.a.], Springer, In: Information security and cryptology : ICISC <5, 2002, Soul> / ed. Pil Joong Lee [u.a.]. - Berlin [u.a.] : Springer, 2003. - (Lecture notes in computer science ; 2587). - ISBN 3-540-00716-4. - S. 298-312, [Conference or Workshop Item]

Möller, Bodo (2003):
Public key cryptography.
Darmstadt, Techn. Univ., TU Darmstadt, [Ph.D. Thesis]

Möller, Bodo (2003):
Public-Key Cryptography - Theory and Practice.
Technische Universit&auml;t Darmstadt, [Ph.D. Thesis]

Izu, Tetsuya and Möller, Bodo and Takagi, Tsuyoshi (2002):
Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks.
In: Progress in Cryptology - INDOCRYPT 2002, Third International Conference on Cryptology, Springer, Hyderabad, India, In: LNCS, ISBN 3-540-00263-4,
[Conference or Workshop Item]

Möller, Bodo (2002):
Parallelizable Elliptic Curve Point Multiplication Method with Resistance against Side-Channel Attacks.
In: ISC 2002 - Information Security, 5th International Conference, Springer, Sao Paulo, Brazil, In: LNCS, ISBN 3-540-44270-7,
[Conference or Workshop Item]

Izu, Tetsuya and Möller, Bodo and Takagi, Tsuyoshi (2002):
Improved elliptic curve multiplication methods resistant against side channel attacks.
Berlin [u.a.], Springer, In: Progress in cryptology : INDOCRYPT <3, 2002, Hyderabad> / ed. Alfred Menezes ... - Berlin [u.a.] : Springer, 2002. - (Lecture notes in computer science ; 2551). - ISBN 3-540-00263-4. - S. 296-313, [Conference or Workshop Item]

Möller, Bodo (2002):
Parallelizable elliptic curve point multiplication method with resistance against side-channel attacks.
Berlin [u.a.], Springer, In: Information security : ISC <5, 2002, Sao Paulo> / ed. Agnes Hui Chan ... - Berlin [u.a.] : Springer, 2002. - (Lecture notes in computer science ; 2433). - ISBN 3-540-44270-7. - S. 402-413, [Conference or Workshop Item]

Möller, Bodo (2002):
Provably secure public key encryption for length preserving Chaumian mixes.
Darmstadt, TU, 5/02, [Book]

Möller, Bodo (2002):
Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes.
(TI-5/02), [Report]

Möller, Bodo (2001):
Securing Elliptic Curve Point Multiplication against Side-Channel Attacks.
In: ISC 2001 - Information Security, 4th International Conference, Springer, Malaga, Spain, In: LNCS, ISBN 3-540-42662-0,
[Conference or Workshop Item]

Möller, Bodo (2001):
Algorithms for multi-exponentiation.
Darmstadt, Techn. Univ., FB 20, FG Theoretische Informatik, TI-8/0, [Book]

Möller, Bodo (2001):
Securing elliptic curve point multiplication against side-channel attacks.
In: Information security - ISC 2001. Hrsg.: G.I. Davida, Y. Frankel. - Berlin [u.a.]: Springer, 2001 (Lecture notes in computer science; 2000). S. 324-334, Berlin [u.a.], Springer, [Book Section]

Hamdy, Safuat and Möller, Bodo (2000):
Security of Cryptosystems Based on Class Groups of Imaginary Quadratic Orders.
In: ASIACRYPT 2000 - 6th International Conference on the Theory and Application of Cryptology and Information Security, Springer, Kyoto, Japan, In: LNCS, ISBN 3-540-41404-5,
[Conference or Workshop Item]

Möller, Bodo (2000):
Sicherheit durch Open Source.
Heidelberg, dpunkt-Verl., In: Internet - E-Business-Strategien für die Unternehmensentwicklung: Deutscher Internet Kongress 2000, Karlsruhe. Hrsg.: M. Barabas, G. Rossbach. - Heidelberg: dpunkt-Verl., 2000. S. 239-246, [Conference or Workshop Item]

Buchmann, Johannes and Maurer, Markus and Möller, Bodo (2000):
Cryptography Based on Number Fields with Large Regulator.
(TI-5/00), [Report]

Hamdy, Safuat and Möller, Bodo (2000):
Security of Crytosystems Based on Class Groups of Imaginary Quadratic Orders.
(TI-4/00), [Report]

This list was generated on Tue Oct 15 00:21:14 2019 CEST.