TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 20.

Book Section

Möller, Bodo (2001):
Securing elliptic curve point multiplication against side-channel attacks.
In: Information security - ISC 2001. Hrsg.: G.I. Davida, Y. Frankel. - Berlin [u.a.]: Springer, 2001 (Lecture notes in computer science; 2000). S. 324-334, Berlin [u.a.], Springer, [Book Section]

Book

Möller, Bodo (2002):
Provably secure public key encryption for length preserving Chaumian mixes.
5/02Darmstadt, TU, [Book]

Möller, Bodo (2001):
Algorithms for multi-exponentiation.
TI-8/0Darmstadt, Techn. Univ., FB 20, FG Theoretische Informatik, [Book]

Conference or Workshop Item

Möller, Bodo (2003):
Improved Techniques for Fast Exponentiation.
2587In: LNCS, In: ICISC 2002 - Information Security and Cryptology - 5th International Conference, Springer, pp. 298-312, ISBN 3-540-00716-4,
[Conference or Workshop Item]

Möller, Bodo (2003):
Provably Secure Public-Key Encryptionfor Length-Preserving Chaumian Mixes.
2612In: LNCS, In: CT-RSA 2003 - Topics in Cryptology, The Cryptographers' Track at the RSA Conference 2003, Springer, San Francisco, CA, USA, pp. 244-262, ISBN 3-540-00847-0,
[Conference or Workshop Item]

Möller, Bodo (2003):
Improved Techniques for Fast Exponentiation.
2587In: LNCS, In: ICISC 2002 - Information Security and Cryptology, Springer, Seoul, Korea, pp. 298-312, ISBN 978-3-540-00716-6,
[Conference or Workshop Item]

Möller, Bodo (2003):
Improved techniques for fast exponentiation.
In: Information security and cryptology : ICISC <5, 2002, Soul> / ed. Pil Joong Lee [u.a.]. - Berlin [u.a.] : Springer, 2003. - (Lecture notes in computer science ; 2587). - ISBN 3-540-00716-4. - S. 298-312, Berlin [u.a.], Springer, [Conference or Workshop Item]

Izu, Tetsuya and Möller, Bodo and Takagi, Tsuyoshi (2002):
Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks.
In: LNCS, In: Progress in Cryptology - INDOCRYPT 2002, Third International Conference on Cryptology, Springer, Hyderabad, India, pp. 296-313, ISBN 3-540-00263-4,
[Conference or Workshop Item]

Möller, Bodo (2002):
Parallelizable Elliptic Curve Point Multiplication Method with Resistance against Side-Channel Attacks.
In: LNCS, In: ISC 2002 - Information Security, 5th International Conference, Springer, Sao Paulo, Brazil, pp. 402-413, ISBN 3-540-44270-7,
[Conference or Workshop Item]

Izu, Tetsuya and Möller, Bodo and Takagi, Tsuyoshi (2002):
Improved elliptic curve multiplication methods resistant against side channel attacks.
In: Progress in cryptology : INDOCRYPT <3, 2002, Hyderabad> / ed. Alfred Menezes ... - Berlin [u.a.] : Springer, 2002. - (Lecture notes in computer science ; 2551). - ISBN 3-540-00263-4. - S. 296-313, Berlin [u.a.], Springer, [Conference or Workshop Item]

Möller, Bodo (2002):
Parallelizable elliptic curve point multiplication method with resistance against side-channel attacks.
In: Information security : ISC <5, 2002, Sao Paulo> / ed. Agnes Hui Chan ... - Berlin [u.a.] : Springer, 2002. - (Lecture notes in computer science ; 2433). - ISBN 3-540-44270-7. - S. 402-413, Berlin [u.a.], Springer, [Conference or Workshop Item]

Möller, Bodo (2001):
Securing Elliptic Curve Point Multiplication against Side-Channel Attacks.
In: LNCS, In: ISC 2001 - Information Security, 4th International Conference, Springer, Malaga, Spain, pp. 324-334, ISBN 3-540-42662-0,
[Conference or Workshop Item]

Hamdy, Safuat and Möller, Bodo (2000):
Security of Cryptosystems Based on Class Groups of Imaginary Quadratic Orders.
In: LNCS, In: ASIACRYPT 2000 - 6th International Conference on the Theory and Application of Cryptology and Information Security, Springer, Kyoto, Japan, pp. 234-248, ISBN 3-540-41404-5,
[Conference or Workshop Item]

Möller, Bodo (2000):
Sicherheit durch Open Source.
In: Internet - E-Business-Strategien für die Unternehmensentwicklung: Deutscher Internet Kongress 2000, Karlsruhe. Hrsg.: M. Barabas, G. Rossbach. - Heidelberg: dpunkt-Verl., 2000. S. 239-246, Heidelberg, dpunkt-Verl., [Conference or Workshop Item]

Report

Möller, Bodo (2002):
Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes.
(TI-5/02), [Report]

Buchmann, Johannes and Maurer, Markus and Möller, Bodo (2000):
Cryptography Based on Number Fields with Large Regulator.
(TI-5/00), [Report]

Hamdy, Safuat and Möller, Bodo (2000):
Security of Crytosystems Based on Class Groups of Imaginary Quadratic Orders.
(TI-4/00), [Report]

Ph.D. Thesis

Möller, Bodo (2003):
Public-Key Cryptography.
Darmstadt, Technische Universität, TU Darmstadt, [Online-Edition: urn:nbn:de:tuda-tuprints-3722],
[Ph.D. Thesis]

Möller, Bodo (2003):
Public key cryptography.
Darmstadt, Techn. Univ., TU Darmstadt, [Ph.D. Thesis]

Möller, Bodo (2003):
Public-Key Cryptography - Theory and Practice.
Technische Universit&auml;t Darmstadt, [Ph.D. Thesis]

This list was generated on Tue Mar 31 01:06:31 2020 CEST.