Publikationen Browse by type | Browse by year | Search | TU-Bibliography
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Date | Item Type | No Grouping
Jump to: 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1994 | 1993 | 1992 | 1991 | 1990 | 1989
Number of items: 257.

2019

Geihs, Matthias and Nikiforov, Oleg and Demirel, Denise and Sauer, Alexander and Butin, Denis and Günther, Felix and Alber, Gernot and Walther, Thomas and Buchmann, Johannes (2019):
The Status of Quantum-Based Long-Term Secure Communication over the Internet.
In: IEEE Transactions on Sustainable Computing, IEEE, ISSN 2377-3782,
DOI: 10.1109/TSUSC.2019.2913948,
[Online-Edition: https://ieeexplore.ieee.org/document/8703121],
[Article]

Schabhüser, Lucas and Butin, Denis and Buchmann, Johannes (2019):
Context Hiding Multi-Key Linearly Homomorphic Authenticators.
In: Topics in Cryptology - CT-RSA 2019 - The Cryptographers' Track at the RSA Conference 2019, Springer, San Francisco, CA, USA, March 4–8, 2019, [Online-Edition: https://www.rsaconference.com/events/us19/speakers/cryptogra...],
[Conference or Workshop Item]

Schabhüser, Lucas and Butin, Denis and Buchmann, Johannes (2019):
Function-Dependent Commitments from Homomorphic Authenticators.
Springer, In: 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, 3-5 July 2019, [Online-Edition: https://acisp19.canterbury.ac.nz/],
[Conference or Workshop Item]

Geihs, Matthias and Schabhüser, Lucas and Buchmann, Johannes (2019):
Efficient Proactive Secret Sharing for Large Data via Concise Vector Commitments.
Springer, In: International Conference on Codes, Cryptology, and Information Security (C2SI) 2019, Rabat, Morocco, April 22 - 24, 2019, In: LNCS, [Online-Edition: http://www.c2si-conference.org/],
[Conference or Workshop Item]

Reuter, Christian and Altmann, Jürgen and Aal, Konstantin and Aldehoff, Larissa and Buchmann, Johannes and Bernhardt, Ute and Denker, Kai and Herrmann, Dominik and Hollick, Matthias and Katzenbeisser, Stefan and Kaufhold, Marc-André and Nordmann, Alfred and Reinhold, Thomas and Riebe, Thea and Ripper, Annette and Ruhmann, Ingo and Saalbach, Klaus-Peter and Schörnig, Niklas and Sunyaev, Ali and Wulf, Volker
Reuter, Christian (ed.) (2019):
The Future of IT in Peace and Security.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, Wiesbaden, Germany, Springer Vieweg, DOI: 10.1007/978-3-658-25652-4_19,
[Online-Edition: https://www.springer.com/de/book/9783658256517],
[Book Section]

2018

Geihs, Matthias and Buchmann, Johannes (2018):
ELSA: Efficient Long-Term Secure Storage of Large Datasets.
In: International Conference on Information Security and Cryptology (ICISC) 2018, Springer, Seoul, Korean, Nov 28, 2018 - Nov 30, 2018, In: LNCS, [Online-Edition: http://www.wikicfp.com/cfp/program?id=1397&s=ICISC&f=Interna...],
[Conference or Workshop Item]

Garcia Cordero, Carlos and Traverso, Giulia and Nojoumian, Mehrdad and Habib, Sheikh Mahbub and Mühlhäuser, Max and Buchmann, Johannes and Vasilomanolakis, Emmanouil (2018):
Sphinx: a Colluder-Resistant Trust Mechanism for Collaborative Intrusion Detection.
In: IEEE ACCESS, IEEE, DOI: 10.1109/ACCESS.2018.2880297,
[Online-Edition: http://ieeeaccess.ieee.org],
[Article]

Schabhüser, Lucas and Butin, Denis and Buchmann, Johannes (2018):
CHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear Case.
In: Information Security Practice and Experience - ISPEC 2018, In: Information Security Practice and Experience - 14th International Conference, ISPEC 2018, Tokyo, Japan, In: Springer LNCS, [Online-Edition: http://www.risk.tsukuba.ac.jp/ispec2018/],
[Conference or Workshop Item]

Schabhüser, Lucas and Butin, Denis and Demirel, Denise and Buchmann, Johannes (2018):
Function-Dependent Commitments for Verifiable Multi-Party Computation.
In: Information Security - 21st International Conference, ISC 2018, Guildford, UK, In: LNCS, [Online-Edition: http://isc2018.sccs.surrey.ac.uk/],
[Conference or Workshop Item]

Bindel, Nina and Buchmann, Johannes and Göpfert, Florian and Schmidt, Markus (2018):
Estimation of the Hardness of the Learning with Errors Problem with a Restricted Number of Samples.
In: Journal of Mathematical Cryptology, de Gruyter, [Article]

Geihs, Matthias and Karvelas, Nikolaos and Katzenbeisser, Stefan and Buchmann, Johannes (2018):
PROPYLA: Privacy Preserving Long-Term Secure Storage.
In: SCC Workshop @ AsiaCCS 2018, Songdo, Incheon, Korea, In: The Sixth International Workshop on Security in Cloud Computing (SCC), In: ACM, [Conference or Workshop Item]

Kannwischer, Matthias and Genêt, Aymeric and Butin, Denis and Krämer, Juliane and Buchmann, Johannes (2018):
Differential Power Analysis of XMSS and SPHINCS.
In: COSADE2018, Singapore, In: COSADE: International Workshop on Constructive Side-Channel Analysis and Secure Design, In: LNCS, 10815, [Conference or Workshop Item]

Liu, Mo-meng and Krämer, Juliane and Hu, Yu-pu and Buchmann, Johannes (2018):
Quantum security analysis of a lattice-based oblivious transfer protocol.
In: Frontiers of Information Technology & Electronic Engineering, Springer, pp. 1348-1369, 18, Issue 9, ISSN 2095-9184 (Print) 2095-9230 (Online),
[Online-Edition: https://link.springer.com/journal/11714],
[Article]

Traverso, Giulia and Butin, Denis and Buchmann, Johannes and Palesandro, Alex (2018):
Coalition-Resistant Peer Rating for Long-Term Confidentiality.
In: PST 2018 - 16th Annual Conference on Privacy, Security and Trust, IEEE Computer Society, In: PST 2018 - 16th Annual Conference on Privacy, Security and Trust, Belfast, Northern Ireland, United Kingdom, August 28-30, 2018, [Online-Edition: https://pstnet.ca/pst2018/],
[Conference or Workshop Item]

2017

Buchmann, Johannes and Holzer, Patrick and Wunderer, Thomas (2017):
Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor p^α q^β.
In: INDOCRYPT 2017 - 18th International Conference on Cryptology in India, Springer, [Conference or Workshop Item]

Butin, Denis and Wälde, Julian and Buchmann, Johannes (2017):
Post-Quantum Authentication in OpenSSL with Hash-Based Signatures.
In: ICMU - The Tenth International Conference on Mobile Computing and Ubiquitous Networking, Toyama International Conference Center, Toyama, Japan, October 3-5, 2017, [Online-Edition: http://www.icmu.org/icmu2017/],
[Conference or Workshop Item]

Buldas, Ahto and Geihs, Matthias and Buchmann, Johannes (2017):
Long-Term Secure Time-Stamping using Preimage-Aware Hash Functions.
In: ProvSec 2017 - The 11th International Conference on Provable Security, Springer, [Conference or Workshop Item]

Horsch, Moritz and Braun, Johannes and Buchmann, Johannes (2017):
Password Assistance.
In: Open Identity Summit 2017, Karlstad, Sweden, [Conference or Workshop Item]

Traverso, Giulia and Cordero, Carlos Garcia and Nojoumian, Mehrdad and Azarderakhsh, Reza and Demirel, Denise and Habib, Sheikh Mahbub and Buchmann, Johannes (2017):
Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems.
In: 15th Annual Conference on Privacy, Security and Trust (PST), Calgary, CA, 28.-30.8. 2017, [Online-Edition: https://www.ucalgary.ca/pst2017/],
[Conference or Workshop Item]

Buchmann, Johannes and Lauter, Kristin and Mosca, Michele (2017):
Postquantum Cryptography - State of the Art.
In: IEEE Security & Privacy, pp. 12-13, 15, [Article]

Horsch, Moritz and Braun, Johannes and Metz, Dominique and Buchmann, Johannes (2017):
Update-tolerant and Revocable Password Backup.
In: ACISP 2017 - 22nd Australasian Conference on Information Security and Privacy, Auckland, New Zealand, [Conference or Workshop Item]

Buldas, Ahto and Geihs, Matthias and Buchmann, Johannes (2017):
Long-Term Secure Commitments via Extractable-Binding Commitments.
In: ACISP 2017 - 22nd Australasian Conference on Information Security and Privacy, Springer, Auckland, New Zealand, In: LNCS, [Conference or Workshop Item]

Alkeilani Alkadri, Nabil and Buchmann, Johannes and El Bansarkhani, Rachid and Krämer, Juliane (2017):
A Framework to Select Parameters for Lattice-Based Cryptography.
[Other]

Alkim, Erdem and Bindel, Nina and Buchmann, Johannes and Dagdelen, Özgür and Eaton, Edward and Gutoski, Gus and Krämer, Juliane and Pawlega, Filip (2017):
Revisiting TESLA in the quantum random oracle model.
In: PQCrypto 2017 - Eighth International Conference on Post-Quantum Cryptography, Springer, Utrecht, the Netherlands, [Conference or Workshop Item]

Buchmann, Johannes and Braun, Johannes and Demirel, Denise and Geihs, Matthias (2017):
Quantum Cryptography: a view from classical cryptography.
In: Quantum Science and Technology, 2, (2), DOI: 10.1088/2058-9565/aa69cd,
[Article]

Braun, Johannes and Buchmann, Johannes and Demirel, Denise and Fujiwara, Mikio and Geihs, Matthias and Moriai, Shiho and Sasaki, Masahide and Waseda, Atsushi (2017):
SHORT PAPER: LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality.
In: ASIACCS 2017 - ACM Asia Conference on Computer and Communications Security, Springer, Abu Dhabi, UAE, In: LNCS, [Conference or Workshop Item]

Weinert, Christian and Demirel, Denise and Vigil, Martín and Geihs, Matthias and Buchmann, Johannes (2017):
MoPS: A Modular Protection Scheme for Long-Term Storage.
In: 12. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'17), ACM, ISBN 978-1-4503-4944-4,
DOI: 10.1145/3052973.3053025,
[Conference or Workshop Item]

Buchmann, Johannes and Demirel, Denise and Schabhüser, Lucas and Struck, Patrick (2017):
Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability.
In: C2SI 2017 - Codes, Cryptology and Information Security - Second International Conference in honor of Professor Claude Carlet, Springer, Rabat, Morocco, In: LNCS, ISBN 978-3-319-55589-8,
[Conference or Workshop Item]

Bindel, Nina and Buchmann, Johannes and Krämer, Juliane and Mantel, Heiko and Schickel, Johannes and Weber, Alexandra (2017):
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics.
In: Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS), [Conference or Workshop Item]

2016

Traverso, Giulia and Demirel, Denise and Habib, Sheikh Mahbub and Buchmann, Johannes (2016):
AS³: Adaptive Social Secret Sharing for Distributed Storage Systems.
In: 2016 Privacy, Security and Trust Conference, IEEE, Auckland, New Zealand, [Conference or Workshop Item]

Geihs, Matthias and Demirel, Denise and Buchmann, Johannes (2016):
A security analysis of techniques for long-term integrity protection.
In: 2016 Privacy, Security and Trust Conference, Auckland, New Zealand, [Conference or Workshop Item]

Schabhüser, Lucas and Demirel, Denise and Buchmann, Johannes (2016):
An Unconditionally Hiding Auditing Procedure for Computations over Distributed Data.
In: The 2nd IEEE Workshop on Security and Privacy in the Cloud (SPC 2016), Philadelphia, PA USA, [Conference or Workshop Item]

Horsch, Moritz and Schlipf, Mario and Haas, Stefan and Braun, Johannes and Buchmann, Johannes (2016):
Password Policy Markup Language.
In: Open Identity Summit, In: LNI, 264, [Conference or Workshop Item]

Butin, Denis and Demirel, Denise and Buchmann, Johannes (2016):
Formal Policy-based Provenance Audit.
In: The 11th International Workshop on Security - IWSEC 2016, sola city Conference Center, Akihabara-Ochanomizu District, Tokyo, Japan, [Conference or Workshop Item]

McGrew, David and Kampanakis, Panos and Fluhrer, Scott and Gazdag, Stefan-Lukas and Butin, Denis and Buchmann, Johannes (2016):
State Management for Hash-Based Signatures.
In: 3rd International Conference on Research in Security Standardisation (SSR 2016), Springer LNCS, Gaithersburg, USA, [Conference or Workshop Item]

Braun, Johannes and Buchmann, Johannes and Demirel, Denise and Fujiwara, Mikio and Geihs, Matthias and Moriai, Shiho and Sasaki, Masahide and Waseda, Atsushi (2016):
LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality (Full Paper).
[Other]

Traverso, Giulia and Demirel, Denise and Buchmann, Johannes (2016):
Dynamic and Verifiable Hierarchical Secret Sharing.
In: 9th International Conference on Information Theoretic Security - ICITS 2016, Springer, Tacoma, Washington, USA, [Conference or Workshop Item]

Bindel, Nina and Buchmann, Johannes and Krämer, Juliane (2016):
Lattice-Based Signature Schemes and their Sensitivity to Fault Attacks.
In: FDTC 2016 - Fault Diagnosis and Tolerance in Cryptography, IEEE Conference Publication, Santa Barbara, CA, USA, [Conference or Workshop Item]

Horsch, Moritz and Schlipf, Mario and Braun, Johannes and Buchmann, Johannes (2016):
Password Requirements Markup Language.
In: ACISP 2016 - 21st Australasian Conference on Information Security and Privacy, Melbourne, Australia, [Conference or Workshop Item]

Schabhüser, Lucas and Demirel, Denise and Buchmann, Johannes (2016):
An Unconditionally Hiding Auditing Procedure for Multi-Party Computations.
In: IACR - Cryptology ePrint Archive, 2016, [Article]

Traverso, Giulia and Demirel, Denise and Buchmann, Johannes (2016):
Homomorphic Signature Schemes - A survey.
Springer, In: SpringerBriefs in Computer Science, ISBN Softcover 978-3-319-32114-1 - ebook 978-3-319-32115-8,
DOI: 10.1007/978-3-319-32115-8,
[Book]

Buchmann, Johannes and Göpfert, Florian and Güneysu, Tim and Oder, Tobias and Pöppelmann, Thomas (2016):
High-Performance and Lightweight Lattice-Based Public-Key Encryption.
In: IoTPTS '16 - 2nd ACM International Workshop on IoT Privacy, Trust, and Security, ACM, Xi'an, China, [Conference or Workshop Item]

Buchmann, Johannes and Büscher, Niklas and Katzenbeisser, Stefan and Krämer, Juliane and Micciancio, Daniele and Siim, Sander and van Vredendaal, Christine and Walter, Michael and Göpfert, Florian (2016):
Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge.
In: ASIAPKC 16 - 3rd ACM International Workshop on ASIA Public-Key Cryptography, ACM, Xi'an, China, [Conference or Workshop Item]

Buchmann, Johannes and Demirel, Denise and Schabhüser, Lucas (2016):
Privately and Publicly Verifiable Computing Techniques.
ISBN 978-3-319-53797-9,
[Book]

Akleylek, Sedat and Bindel, Nina and Buchmann, Johannes and Krämer, Juliane and Marson, Giorgia Azzurra (2016):
An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation.
In: International Conference on Cryptology AFRICACRYPT 2016, Springer, Fes, Morocco, [Conference or Workshop Item]

Buchmann, Johannes and Göpfert, Florian and Player, Rachel and Wunderer, Thomas (2016):
On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack.
In: International Conference on Cryptology AFRICACRYPT 2016, Springer, Fes, Morocco, [Conference or Workshop Item]

Vigil, Martín and Demirel, Denise and Habib, Sheikh Mahbub and Hauke, Sascha and Buchmann, Johannes and Mühlhäuser, Max (2016):
LoT: a Reputation-based Trust System for Long-term Archiving.
In: SECURWARE 2016, Thinkmind Digital Library, Nice, France, ISBN 978-1-61208-493-0,
[Conference or Workshop Item]

2015

Horsch, Moritz and Hülsing, Andreas and Buchmann, Johannes (2015):
PALPAS - PAsswordLess PAssword Synchronization.
In: International Conference on Availability, Reliability and Security (ARES), Université Paul Sabatier, Toulouse, France, [Conference or Workshop Item]

Alkim, Erdem and Bindel, Nina and Buchmann, Johannes and Dagdelen, Özgür and Schwabe, Peter (2015):
TESLA: Tightly-Secure Efficient Signatures from Standard Lattices.
[Other]

Vigil, Martín and Buchmann, Johannes and Cabarcas, Daniel and Weinert, Christian and Wiesmaier, Alexander (2015):
Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: a survey.
In: Computers & Security, pp. 16-32, 50, [Article]

El Bansarkhani, Rachid and Dagdelen, Özgür and Buchmann, Johannes (2015):
Augmented Learning with Errors: The Untapped Potential of the Error Term.
In: Financial Cryptography and Data Security - 19th International Conference, FC 2015, Puerto Rico, January 26 - 30, 2015, Springer, Isla Verde, Puerto Rico, [Conference or Workshop Item]

El Bansarkhani, Rachid and Buchmann, Johannes (2015):
High Performance Lattice-based CCA-secure Encryption.
In: Cryptology ePrint Archive, p. 20, [Article]

Butin, Denis and Gazdag, Stefan-Lukas and Buchmann, Johannes (2015):
Real-World Post-Quantum Digital Signatures.
In: Cybersecurity & Privacy Innovation Forum (CSP Forum 2015), Springer CCIS, Brussels, Belgium, [Conference or Workshop Item]

Classen, Jiska and Braun, Johannes and Volk, Florian and Hollick, Matthias and Buchmann, Johannes and Mühlhäuser, Max (2015):
A Distributed Reputation System for Certification Authority Trust Management.
In: 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE UbiSafe Symposium), Helsinki, Finland, [Conference or Workshop Item]

Geihs, Matthias and Demirel, Denise and Buchmann, Johannes (2015):
On the Security of Long-lived Archiving Systems based on the Evidence Record Syntax.
In: Codes, Cryptology and Information Security, Springer, Mohammed V University, Rabat, Morocco, [Conference or Workshop Item]

2014

Vigil, Martín and Weinert, Christian and Demirel, Denise and Buchmann, Johannes (2014):
An efficient time-stamping solution for long-term digital archiving.
In: IEEE 33rd International Performance Computing and Communications Conference (IPCCC), Austin, TX, USA, DOI: 10.1109/PCCC.2014.7017099,
[Conference or Workshop Item]

Borges, Fábio and Buchmann, Johannes and Mühlhäuser, Max (2014):
Introducing Asymmetric DC-Nets.
In: Proceedings IEEE Conference on Communications and Network Security (CNS) 2014, [Conference or Workshop Item]

Buchmann, Johannes and Bischof, Christian and Dagdelen, Özgür and Fitzpatrick, Robert and Göpfert, Florian and Mariano, Artur (2014):
Nearest Planes in Practice.
In: International Conference on Cryptography and Information security -BalkanCryptSec 2014, Istanbul, Turkey, [Conference or Workshop Item]

Buchmann, Johannes and El Bansarkhani, Rachid and Hauke, Sascha
Brunetti, Gino and Feld, Thomas and Heuser, Lutz and Schnittner, Joachim and Webel, Christian (eds.) (2014):
Towards Security Solutions for Emergent Business Software.
In: Future Business Software Conference 2012, Springer, St. Leon-Rot, Germany, [Conference or Workshop Item]

Borges, Fábio and Demirel, Denise and Böck, Leon and Buchmann, Johannes and Mühlhäuser, Max (2014):
A Privacy-Enhancing Protocol that Provides In-Network Data Aggregation and Verifiable Smart Meter Billing.
In: IEEE Symposium on Computers and Communications (ISCC), In: 19th IEEE Symposium on Computers and Communications (ISCC 2014), Funchal, Portugal, DOI: 10.1109/ISCC.2014.6912612,
[Conference or Workshop Item]

Braun, Johannes and Buchmann, Johannes and Mullan, Ciaran and Wiesmaier, Alexander (2014):
Long Term Confidentiality: a Survey.
In: Designs, Codes and Cryptography, pp. 459-478, 71, (3), DOI: 10.1007/s10623-012-9747-6,
[Article]

Braun, Johannes and Volk, Florian and Classen, Jiska and Buchmann, Johannes and Mühlhäuser, Max (2014):
CA Trust Management for the Web PKI.
In: IOS Press: Journal of Computer Security, 22(6), 2014, pp. 913-959 (2014), [Article]

Fitzpatrick, Robert and Bischof, Christian and Buchmann, Johannes and Dagdelen, Oezguer and Goepfert, Florian and Mariano, Artur and Yang, Bo-Yin
Tuning GaussSieve for Speed.
In: Progress in Cryptology - LATINCRYPT 2014, Springer International Publishing, pp. 288-305, 8895, [Online-Edition: http://dx.doi.org/10.1007/978-3-319-16295-9_16],
[Article]

El Bansarkhani, Rachid and Buchmann, Johannes
Pointcheval, David and Vergnaud, Damien (eds.) (2014):
Towards Lattice Based Sequential Aggregate Signatures.
In: Progress in Cryptology - AFRICACRYPT 2014 - 7th International Conference on Cryptology in Africa, Springer, Marrakesh, Morocco, In: LNCS, ISBN 978-3-319-06733-9,
[Conference or Workshop Item]

El Bansarkhani, Rachid and Buchmann, Johannes (2014):
LCPR: High Performance Compression Algorithm for Lattice-Based Signatures and Schnorr-like Constructions.
In: IACR Cryptology ePrint Archive 2014: 334, [Conference or Workshop Item]

Vigil, Martín and Weinert, Christian and Braden, Kjell and Demirel, Denise and Buchmann, Johannes (2014):
A performance analysis of long-term archiving techniques.
In: IEEE - High Performace Computing and Communications (HPCC 2014), Paris, France, [Conference or Workshop Item]

Buchmann, Johannes and Neumann, Stephan (2014):
Tauglichkeit von Common Criteria-Schutzprofilen für Internetwahlen in Deutschland.
In: Datenschutz und Datensicherheit - DuD, Springer Gabler Verlag, pp. 98-102, 38, (2), [Article]

Mohamed, Mohamed Saied Emam and Buchmann, Johannes (2014):
Mutant Differential Fault Analysis of Trivium MDFA.
In: the 17th Annual International Conference on Information Security and Cryptology, ICISC2014, Springer, [Conference or Workshop Item]

2013

Buchmann, Johannes and Karatsiolis, Evangelos and Wiesmaier, Alexander (2013):
Introduction to Public Key Infrastructures.
Springer-Verlag Berlin Heidelberg, ISBN 978-3-642-40656-0,
[Book]

Buchmann, Johannes and Nebel, Maxi and Roßnagel, Alexander and Shirazi, Fatemeh and Simo, Hervais and Waidner, Michael (2013):
Personal Information Dashboard: Putting the Individual Back in Control.
Iso Press, ISBN 978-1-61499-294-3 (print) | 978-1-61499-295-0 (online),
DOI: 10.3233/978-1-61499-295-0-139,
[Book]

Braun, Johannes and Volk, Florian and Buchmann, Johannes and Mühlhäuser, Max
Katsikas, Sokatis and Agudo, Isaac (eds.) (2013):
Trust Views for the Web PKI.
Springer Berlin Heidelberg, In: Public Key Infrastructures, Services and Applications - EuroPKI 2013, In: LNCS, ISSN 0302-9743,
[Conference or Workshop Item]

Petzoldt, Albrecht and Bulygin, Stanislav and Buchmann, Johannes (2013):
A multivariate based threshold ring signature scheme.
In: Applicable Algebra in Engineering, Communication and Computing, pp. 255 - 275, 24, (3 - 4), DOI: 10.1007/s00200-013-0190-3,
[Article]

El Bansarkhani, Rachid and Buchmann, Johannes
Lange, Tanja and Lauter, Kristin and Lisonek, Petr (eds.) (2013):
Improvement and Efficient Implementation of a Lattice-based Signature Scheme.
In: Selected Areas in Cryptography 2013 (SAC'13), Simon Fraser University, Burnaby, British Columbia, Canada, In: LNCS, [Conference or Workshop Item]

Vigil, Martín and Cabarcas, Daniel and Huang, Jingwei and Buchmann, Johannes (2013):
Assessing Trust in the Long-Term Protection of Documents.
In: 18th IEEE Symposium on Computers and Communications (IEEE ISCC 2013), Split, Croatia, [Conference or Workshop Item]

Petzoldt, Albrecht and Bulygin, Stanislav and Buchmann, Johannes
Gaborit, Philippe (ed.) (2013):
Fast Verification for Improved Versions of the UOV and Rainbow Signature Schemes.
In: Fifth International Conference on Post-Quantum Cryptography - PQCrypto 2013, Springer, Limoges, France, In: LNCS, ISBN 978-3-642-38615-2,
[Conference or Workshop Item]

Buchmann, Johannes (ed.) (2013):
Internet Privacy: Options for adequate realization.
Springer Vieweg; 2013 edition, ISBN 978-3642379123,
[Book]

Buchmann, Johannes and Demirel, Denise and van de Graaf, Jeroen
Sadeghi, Ahmad-Reza (ed.) (2013):
Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy.
In: Financial Cryptography and Data Security: 17th International Conference, 2013, Springer, In: LNCS, ISBN 978-3-642-39883-4,
[Conference or Workshop Item]

Bulygin, Stanislav and Walter, Michael and Buchmann, Johannes
Dawson, E. (ed.) (2013):
Many weak keys for PRINTcipher: fast key recovery and countermeasures.
In: RSA Conference Cryptographer's Track (CT-RSA 2013), Springer, In: Lecture Notes in Computer Science, 7779, [Conference or Workshop Item]

Braun, Johannes and Wiesmaier, Alexander and Buchmann, Johannes
Sprague, Ralph H. (ed.) (2013):
On the Security of Encrypted Secret Sharing.
In: 46th Hawaii International Conference on Systems Science (HICSS-46), IEEE Computer Society, Grand Wailea, Maui, Hawaii, ISBN 978-0-7695-4892-0,
DOI: 10.1109/HICSS.2013.426,
[Conference or Workshop Item]

Hülsing, Andreas and Rausch, Lea and Buchmann, Johannes (2013):
Optimal parameters for XMSS-MT.
In: Security Engineering and Intelligence Informatics, CD-ARES 2013 Workshops, [Online-Edition: https://link.springer.com/chapter/10.1007/978-3-642-40588-4_...],
[Article]

Mohamed, Mohamed Saied Emam and Bulygin, Stanislav and Zohner, Michael and Heuser, Annelie and Walter, Michael and Buchmann, Johannes (2013):
Improved Algebraic Side-Channel Attack on AES.
In: Journal of Cryptographic Engineering, pp. 139-156, [Article]

Bulygin, Stanislav and Walter, Michael and Buchmann, Johannes (2013):
Full analysis of PRINTcipher with respect to invariant subspace attack: efficient key recovery and countermeasures.
In: Designs, Codes, and Cryptography 73(3), pp. 997-1022 (2014), DOI: 10.1007/s10623-013-9840-5,
[Article]

Buchmann, Johannes and Dahmen, Erik and Ereth, Sarah and Hülsing, Andreas and Rückert, Markus (2013):
On the security of the Winternitz one-time signature scheme.
In: International Journal of Applied Cryptography, pp. 84-96, 3, (1), [Article]

Nie, Xuyun and Xu, Zhaohu and Buchmann, Johannes
Gaborit, Philippe (ed.) (2013):
Cryptanalysis of Hash-based Tamed Transformation and Minus Signature Scheme.
In: Fifth International Conference on Post-Quantum Cryptography - PQCrypto 2013, Springer, Limoges, France, In: LNCS, [Conference or Workshop Item]

Demirel, Denise and Henning, Maria and van de Graaf, Jeroen and Ryan, Peter Y. A. and Buchmann, Johannes
Heather, James and Schneider, Steve and Teague, Vanessa (eds.) (2013):
Prêt à Voter Providing Everlasting Privacy.
In: VoteID 2013: The 4th International Conference on e-Voting and Identity, 2013, Springer, University of Surrey, Guildford, UK, In: LNCS, [Conference or Workshop Item]

Shirazi, Fatemeh and Diaz, Claudia and Mullan, Ciaran and Wright, Joss and Buchmann, Johannes (2013):
Towards Measuring Resilience in Anonymous Communication Networks.
In: HotPETs 2013, [Article]

Hülsing, Andreas and Rausch, Lea and Buchmann, Johannes (2013):
Optimal Parameters for XMSS^MT.
In: MoCrySEn 2013, Springer, pp. 194-208, [Book Section]

Nie, Xuyun and Petzoldt, Albrecht and Buchmann, Johannes (2013):
Cryptanalysis of 2-layer Nonlinear Piece In Hand Method.
In: Second International Workshop on Modern Cryptography and Security Engineering - MoCrySen 2013, Regensburg, Germany, In: LNCS, [Conference or Workshop Item]

Buchmann, Johannes and Cabarcas, Daniel and Göpfert, Florian and Hülsing, Andreas and Weiden, Patrick
Lange, Tanja and Lauter, Kristin and Lisonek, Petr (eds.) (2013):
Discrete Ziggurat: A Time-Memory Trade-off for Sampling from a Gaussian Distribution over the Integers.
In: Selected Areas in Cryptography 2013 (SAC'13), Springer, Simon Fraser University, Burnaby, British Columbia, Canada, In: LNCS, [Conference or Workshop Item]

Weiden, Patrick and Hülsing, Andreas and Cabarcas, Daniel and Buchmann, Johannes (2013):
Instantiating Treeless Signature Schemes.
[Other]

2012

Walter, Michael and Bulygin, Stanislav and Buchmann, Johannes
Kutylowski, Miroslaw and Yung, Moti (eds.) (2012):
Optimizing Guessing Strategies for Algebraic Cryptanalysis with Applications to EPCBC.
In: The 8th China International Conference on Information Security and Cryptology (Inscrypt 2012), Springer, Beijing, China, In: Lecture Notes in Computer Science, 7763, ISBN 978-3-642-38518-6,
[Conference or Workshop Item]

Kreutzer, Michael and Waidner, Michael and Buchmann, Johannes (2012):
IT-Sicherheitsforschung in Darmstadt - von den Grundlagen bis zur Anwendung.
In: Praxis der Informationsverarbeitung und Kommunikation, pp. 305-308, 35, (4), [Article]

Göttert, Norman and Feller, Thomas and Schneider, Michael and Huss, Sorin and Buchmann, Johannes
Prouff, Emmanuel and Schaumont, Patrick (eds.) (2012):
On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes.
In: Workshop on Cryptographic Hardware and Embedded Systems (CHES 2012), Springer, Leuven, Belgium, In: LNCS, ISBN 978-3-642-33026-1,
[Conference or Workshop Item]

Kelbert, Florian and Shirazi, Fatemeh and Simo, Hervais and Wüchner, Tobias and Buchmann, Johannes and Pretschner, Alexander and Waidner, Michael
Buchmann, Johannes (ed.) (2012):
State of Online Privacy: A Technical Perspective.
In: Internet Privacy. Eine multidisziplinäre Bestandsaufnahme/ A multidisciplinary analysis (acatech STUDIE), Springer Verlag Heidelberg, pp. 189-279, [Book Section]

Braun, Johannes and Hülsing, Andreas and Wiesmaier, Alexander and Vigil, Martín and Buchmann, Johannes
De Capitani di Vimercati, Sabrina and Mitchell, Chris (eds.) (2012):
How to avoid the Breakdown of Public Key Infrastructures - Forward Secure Signatures for Certificate Authorities.
In: Public Key Infrastructures, Services and Applications - EuroPKI 2012, Springer, Pisa, Italy, In: LNCS, ISBN 978-3-642-40011-7,
[Conference or Workshop Item]

Hülsing, Andreas and Busold, Christoph and Buchmann, Johannes
Knudsen, Lars and Wu, Huapeng (eds.) (2012):
Forward Secure Signatures on Smart Cards.
In: SAC2012 - Conference on Selected Areas in Cryptography, Springer Berlin Heidelberg, Windsor, Canada, In: LNCS, ISBN 978-3-642-35998-9,
DOI: 10.1007/978-3-642-35999-6_5,
[Conference or Workshop Item]

Schreiner, Steffen and Grigoras, Costin and Grigoras, Alina and Betev, Latchezar and Buchmann, Johannes (2012):
A Grid security architecture for AliEn.
In: Proceedings of Science (PoS), ISGC2012:027, International Symposium on Grids & Clouds (ISGC) 2012, Taipei, Taiwan, [Conference or Workshop Item]

Niebuhr, Robert and Meziani, Mohammed and Bulygin, Stanislav and Buchmann, Johannes (2012):
Selecting Parameters for Secure McEliece-based Cryptosystems.
In: International Journal of Information Security, pp. 137-147, 11, (3), [Article]

Mohamed, Mohamed Saied Emam and Bulygin, Stanislav and Zohner, Michael and Heuser, Annelie and Walter, Michael and Buchmann, Johannes (2012):
Improved Algebraic Side-Channel Attack on AES.
In: 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, IEEE, ISBN 978-1-4673-2341-3,
DOI: 10.1109/HST.2012.6224335,
[Conference or Workshop Item]

Braun, Johannes and Buchmann, Johannes
Levi, Albert and Badra, Mohamad and Cesana, Matteo and Ghassemian, Mona and Jabeur, Nafaa and Klonowski, Marek and Mana, Antonio and Sargento, Susana and Zeadally, Sherali (eds.) (2012):
Perfect Confidentiality Network - A solution for information theoretically secure key agreement.
In: 5th IFIP International Conference on New Technologies, Mobility & Security (NTMS) 2012, IEEE, Istanbul, Turkey, ISBN 978-1-4673-0229-6,
DOI: 10.1109/NTMS.2012.6208676,
[Conference or Workshop Item]

Fischlin, Marc and Buchmann, Johannes and Manulis, Mark (eds.) (2012):
Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography.
Springer, ISBN 978-3-642-30056-1,
DOI: 10.1007/978-3-642-30057-8,
[Conference or Workshop Item]

Schreiner, Steffen and Grigoras, Costin and Litmaath, Maarten and Betev, Latchezar and Buchmann, Johannes (2012):
Certified Grid Job Submission in the ALICE Grid Services.
In: Open Access Journal of Physics: Conference Series (JPCS), International Conference on Computing in High Energy and Nuclear Physics (CHEP) 2012, [Article]

Vigil, Martín Gagliotti and Cabarcas, Daniel and Wiesmaier, Alexander and Buchmann, Johannes (2012):
Authenticity, Integrity and Proof-of-Existence for Long-Term Archiving: a Survey.
In: IACR Cryptology ePrint Archive, [Article]

Buchmann, Johannes (ed.) (2012):
Internet Privacy - Eine multidisziplinäre Bestandsaufnahme/ A multidisciplinary analysis.
Springer Verlag, ISBN 978-3-642-31942-6,
[Book]

2011

Bulygin, Stanislav and Buchmann, Johannes
Lin, Dongdai and Tsudik, Gene and Wang, Xiaoyun (eds.) (2011):
Algebraic cryptanalysis of the round-reduced and side channel analysis of the full PRINTCipher-48.
In: Proceedings of The 10th International Conference on Cryptography and Network Security (CANS 2011), Springer, Sanya, China, In: Lecture Notes in Computer Science, 7092, ISBN 978-3-642-25512-0,
[Conference or Workshop Item]

Buchmann, Johannes and Dahmen, Erik and Hülsing, Andreas
Yang, Bo-Yin (ed.) (2011):
XMSS - A Practical Forward Secure Signature Scheme based on Minimal Security Assumptions.
In: Post-Quantum Cryptography - Proceedings of PQCrypto 2011, Springer Berlin / Heidelberg, In: Lecture Notes in Computer Science - LNCS, ISBN 978-3-642-25404-8,
DOI: 10.1007/978-3-642-25405-5_8,
[Conference or Workshop Item]

Kuo, Po-Chun and Schneider, Michael and Dagdelen, Özgür and Reichelt, Jan and Buchmann, Johannes and Cheng, Chen-Mou and Yang, Bo-Yin
Preneel, Bart and Takagi, Tsuyoshi (eds.) (2011):
Extreme Enumeration on GPU and in Clouds - How Many Dollars You Need to Break SVP Challenges -.
In: Workshop on Cryptographic Hardware and Embedded Systems - CHES 2011, Springer, In: LNCS, [Conference or Workshop Item]

Mohamed, Mohamed Saied Emam and Ding, Jintai and Buchmann, Johannes
Kim, Tai-Hoon and Adeli, Hojjat and Robles, Rosslin John and Balitanas, Maricel (eds.) (2011):
Towards Algebraic Cryptanalysis of HFE Challenge 2.
In: Proceedings of "The 5th International Conference on Information Security and Assurance" ISA 2011, Springer, Brno University, Czech Republic, In: Communications in Computer and Information Science, ISBN 978-3-642-23140-7,
DOI: 10.1007/978-3-642-23141-4_12,
[Conference or Workshop Item]

Mohamed, Mohamed Saied Emam and Bulygin, Stanislav and Buchmann, Johannes
Kim, Tai-Hoon and Adeli, Hojjat and Robles, Rosslin John and Balitanas, Maricel (eds.) (2011):
Using SAT Solving to Improve Differential Fault Analysis of Trivium.
In: Proceedings of "The 5th International Conference on Information Security and Assurance" ISA 2011, Springer, Brno, Czech Republic, In: Communications in Computer and Information Science, 200, DOI: 10.1007/978-3-642-23141-4_7,
[Conference or Workshop Item]

Buchmann, Johannes and Dahmen, Erik and Ereth, Sarah and Hülsing, Andreas and Rückert, Markus
Nitaj, Abderrahmane and Pointcheval, David (eds.) (2011):
On the security of the Winternitz one-time signature scheme.
In: Progress in Cryptology - AFRICACRYPT 2011, Springer Berlin / Heidelberg, Dakar, Senegal, In: Lecture Notes in Computer Science (LNCS), ISBN 978-3-642-21968-9,
DOI: 10.1007/978-3-642-21969-6_23,
[Conference or Workshop Item]

Wiesmaier, Alexander and Horsch, Moritz and Braun, Johannes and Kiefer, Franziskus and Hühnlein, Detlef and Strenzke, Falko and Buchmann, Johannes
Cheung, Bruce and Hui, Lucas Chi Kwong and Sandhu, Ravi and Wong, Duncan (eds.) (2011):
An efficient mobile PACE implementation.
In: ASIA CCS '11: 6th ACM Symposium on Information, Computer and Communications Security, ACM, Hong Kong, In: ACM Symposium on Information, Computer and Communications Security, DOI: 10.1145/1966913.1966936,
[Conference or Workshop Item]

Petzoldt, Albrecht and Bulygin, Stanislav and Buchmann, Johannes
Catalano, Dario and Fazio, Nelly and Gennaro, Rosario and Nicolosi, Antonio (eds.) (2011):
Linear Recurring Sequences for the UOV Key Generation.
In: Proceedings of PKC 2011, Springer, In: LNCS, [Conference or Workshop Item]

Mohamed, Mohamed Saied Emam and Bulygin, Stanislav and Buchmann, Johannes (2011):
Improved Differential Fault Analysis of Trivium.
In: Proceedings of COSADE 2011, Darmstadt, [Conference or Workshop Item]

Langer, Lucie and Wiesmaier, Alexander and Buchmann, Johannes (2011):
Secure Long-term Record Keeping in the Public Sector.
In: EGovernement Review, pp. 14-15, (7), [Article]

Niebuhr, Robert and Cayrel, Pierre-Louis and Buchmann, Johannes (2011):
Improving the effciency of Generalized Birthday Attacks against certain structured cryptosystems.
In: The Seventh International Workshop on Coding and Cryptography 2011 (WCC 2011), [Conference or Workshop Item]

Mohamed, Mohamed Saied Emam and Ding, Jintai and Buchmann, Johannes (2011):
The Complexity Analysis of the MutantXL Family.
In: IACR Cryptology ePrint Archive, p. 36, [Article]

2010

Bulygin, Stanislav and Petzoldt, Albrecht and Buchmann, Johannes
Gong, G. and Gupta, K. C. (eds.) (2010):
Towards provable security of the Unbalanced Oil and Vinegar signature scheme under direct attacks.
In: Proceedings of IndoCrypt 2010, Springer, In: Lecture Notes in Computer Science, 6498, [Conference or Workshop Item]

Petzoldt, Albrecht and Bulygin, Stanislav and Buchmann, Johannes
Gong, G. and Gupta, K. C. (eds.) (2010):
CyclicRainbow - A multivariate Signature Scheme with a Partially Cyclic Public Key.
In: Proceedings of IndoCrypt 2010, Springer, In: Lecture Notes in Computer Science, 6498, [Conference or Workshop Item]

Mohamed, Mohamed Saied Emam and Cabarcas, Daniel and Ding, Jintai and Buchmann, Johannes and Bulygin, Stanislav
Lee, Donghoon and Hong, Seokhie (eds.) (2010):
MXL3: An efficient algorithm for computing Gröbner bases of zero-dimensional ideals.
In: Proceedings of the 12th International Conference on Information Security and Cryptography - ICISC 2009, Springer, Seoul, Korea, Lecture Notes in Computer, ISBN 978-3-642-14422-6,
DOI: 10.1007/978-3-642-14423-3_7,
[Conference or Workshop Item]

Mohamed, Wael Said Abd Elmageed and Bulygin, Stanislav and Ding, Jintai and Buchmann, Johannes and Werner, Fabian
Heng, S.-H. and Wright, R. N. and Goi, B.-M. (eds.) (2010):
Practical Algebraic Cryptanalysis for Dragon-based Cryptosystems.
In: Proceedings of The Ninth International Conference on Cryptology And Network Security (CANS 2010), Springer, Kuala Lumpur, Malaysia, In: Lecture Notes in Computer Science, ISBN 978-3-642-17618-0,
DOI: 10.1007/978-3-642-17619-7_11,
[Conference or Workshop Item]

Petzoldt, Albrecht and Bulygin, Stanislav and Buchmann, Johannes
Cid, Carlos and Faugere, Jean-Charles (eds.) (2010):
A Multivariate Signature Scheme with a Partially Cyclic Public Key.
In: Proceedings of the 2nd International Conference on Symbolic Computation and Cryptography (SCC 2010), [Conference or Workshop Item]

Mohamed, Wael Said Abd Elmageed and Ding, Jintai and Kleinjung, Thorsten and Bulygin, Stanislav and Buchmann, Johannes
Cid, Carlos and Faugere, Jean-Charles (eds.) (2010):
PWXL: A Parallel Wiedemann-XL Algorithm for Solving Polynomial Equations over GF(2).
In: Proceedings of the 2nd International Conference on Symbolic Computation and Cryptography (SCC 2010), [Conference or Workshop Item]

Niebuhr, Robert and Cayrel, Pierre-Louis and Bulygin, Stanislav and Buchmann, Johannes (2010):
On lower bounds for Information Set Decoding over F_q.
In: Proceedings of the 2nd International Conference on Symbolic Computation and Cryptography (SCC 2010), [Conference or Workshop Item]

Buchmann, Johannes and Cabarcas, Daniel and Ding, Jintai and Mohamed, Mohamed Saied Emam
Bernstein, Daniel and Lange, Tanja (eds.) (2010):
Flexible Partial Enlargement to Accelerate Gröbner Basis Computation over F_2.
In: AFRICACRYPT, Springer, Stellenbosch, South Africa, In: LNCS, ISBN 978-3-642-12677-2,
[Conference or Workshop Item]

Petzoldt, Albrecht and Bulygin, Stanislav and Buchmann, Johannes
Sendrier, Nicolas (ed.) (2010):
Selecting Parameters for the Rainbow Signature Scheme.
In: Proceedings of PQCrypto 2010, Springer, In: Lecture Notes in Computer Science, [Conference or Workshop Item]

Hermans, Jens and Schneider, Michael and Buchmann, Johannes and Vercauteren, Frederik and Preneel, Bart
Bernstein, Daniel and Lange, Tanja (eds.) (2010):
Parallel Shortest Lattice Vector Enumeration on Graphics Cards.
In: Africacrypt 2010, Springer, Stellenbpsch, South Africa, In: LNCS, 6055, [Conference or Workshop Item]

Buchmann, Johannes and Wiesmaier, Alexander (2010):
Eine kurze Geschichte der Schlüssel.
In: 360° -- Fachmagazin für das Management im öffentlichen Sektor, pp. 21-23, (17), [Article]

Langer, Lucie and Volkamer, Melanie and Schmidt, Axel and Buchmann, Johannes (2010):
A Taxonomy Refining the Security Requirements for Electronic Voting: Analyzing Helios as a Proof of Concept.
In: Fifth International Conference on Availability, Reliability and Security (ARES 2010), IEEE Computer Society, Krakow, Poland, ISBN 978-0-7695-3965-2,
[Conference or Workshop Item]

Richter, Philipp and Langer, Lucie and Hupf, Katharina and Volkamer, Melanie and Buchmann, Johannes
Schweighöfer, Erich and Geist, Anton and Staufer, Ines (eds.) (2010):
Verifizierbarkeit und Öffentlichkeitsgrundsatz bei elektronischen Wahlen.
In: Globale Sicherheit und proaktiver Staat - Die Rolle der Rechtsinformatik, Tagungsband des 13. Internationalen Rechtsinformatik Symposium IRIS 2010, Salzburg, [Conference or Workshop Item]

Buchmann, Johannes (2010):
Einführung in die Kryptographie / Introduction to Cryptography.
Springer Berlin/Heidelberg, ISBN 9783642111853,
[Book]

Niebuhr, Robert and Cayrel, Pierre-Louis and Bulygin, Stanislav and Buchmann, Johannes (2010):
Attacking code/lattice-based cryptosystems using Partial Knowledge.
In: Proceedings of Inscrypt 2010, China Press, [Conference or Workshop Item]

Schneider, Michael and Buchmann, Johannes (2010):
Extended Lattice Reduction Experiments using the BKZ Algorithm.
In: Sicherheit, GI, Berlin, In: LNI, [Conference or Workshop Item]

Buchmann, Johannes and Braun, Johannes and Horsch, Moritz and Hühnlein, Detlef and Kiefer, Franziskus and Strenzke, Falko and Wiesmaier, Alexander (2010):
Towards a mobile eCard Client.
In: 13. Kryptotag, Darmstadt, [Conference or Workshop Item]

Schmidt, Axel and Volkamer, Melanie and Buchmann, Johannes
Krimmer, Robert and Grimm, Rüdiger (eds.) (2010):
An Evaluation and Certification Approach to Enable Voting Service Providers.
In: Electronic Voting 2010, EVOTE 2010, 4th International Conference, Co-organized by Council of Europe, Gesellschaft für Informatik and E-Voting.CC, July 21st - 24th, 2010, in Castle Hofen, Bregenz, Austria, GI, In: LNI, 167, ISBN 978-3-88579-261-1,
[Conference or Workshop Item]

2009

Langer, Lucie and Weber, Stefan and Schmidt, Axel and Buchmann, Johannes and Volkamer, Melanie (2009):
Towards Long-Term Free and Secret Electronic Elections Providing Voter-Verifiability in the Bulletin Board Model.
In: Proceedings of 3rd International Conference on Theory and Practice of Electronic Governance (ICEGOV2009), ACM Press, Bogota, Colombia, ISBN 978-1-60558-663-2,
[Conference or Workshop Item]

Langer, Lucie and Volkamer, Melanie and Weber, Stefan and Schmidt, Axel and Buchmann, Johannes
Davies, Jim and Janowski, Tomasz (eds.) (2009):
Towards Long-Term Free and Secret Electronic Elections Providing Voter-Verifiability in the Bulletin Board Model.
In: ICEGOV 2009, Proceedings of the 3rd International Conference on Theory and Practice of Electronic Governance, Bogota, 322, [Conference or Workshop Item]

Buchmann, Johannes and Lindner, Richard (2009):
Secure Parameters for SWIFFT.
In: Indocrypt 2009, Springer, In: LNCS, [Conference or Workshop Item]

Mohamed, Mohamed Saied Emam and Ding, Jintai and Buchmann, Johannes and Werner, Fabian (2009):
Algebraic Attack on the MQQ Public Key Cryptosystem.
In: Cryptology and Network Security, 8th International Conference, CANS 2009, Springer, Kanazawa, Japan, In: LNCS, ISBN 978-3-642-10432-9,
DOI: 10.1007/978-3-642-10433-6_26,
[Conference or Workshop Item]

Schmidt, Axel and Heinson, Dennis and Langer, Lucie and Opitz-Talidou, Zoi and Richter, Philipp and Volkamer, Melanie and Buchmann, Johannes
Ryan, Johannes Y. A. and Schoenmakers, Berry (eds.) (2009):
Developing a Legal Framework for Remote Electronic Voting.
In: E-Voting and Identity, Second International Conference, VOTE-ID 2009, Springer, Luxembourg, In: LNCS, 5767, ISBN 978-3-642-04134-1,
DOI: 10.1007/978-3-642-04135-8_6,
[Conference or Workshop Item]

Buchmann, Johannes and Roßnagel, Alexander (2009):
Das Bundesverfassungsgericht und Telemedienwahlen.
In: K&R, pp. 543-548, 9, [Article]

Langer, Lucie and Schmidt, Axel and Buchmann, Johannes and Volkamer, Melanie and Stolfik, Alexander (2009):
Towards a Framework on the Security Requirements for Electronic Voting Protocols.
In: First International Workshop on Requirements Engineering for E-Voting Systems, Atlanta, GA, USA, In: IEEE CS Digital Library, doi: 10.1109/RE-VOTE.2009.9, ISBN 978-0-7695-4100-6,
DOI: http://doi.ieeecomputersociety.org/10.1109/RE-VOTE.2009.8,
[Conference or Workshop Item]

Schmidt, Axel and Langer, Lucie and Buchmann, Johannes and Volkamer, Melanie (2009):
Specification of a Voting Service Provider.
In: First International Workshop on Requirements Engineering for E-Voting Systems, In: IEEE CS Digital Library, doi: 10.1109/RE-VOTE.2009.8, ISBN 978-0-7695-4100-6,
DOI: http://doi.ieeecomputersociety.org/10.1109/RE-VOTE.2009.8,
[Conference or Workshop Item]

Buchmann, Johannes and Karatsiolis, Vangelis (2009):
Notification Services for the Server-Based Certificate Validation Protocol.
In: Int'l J. of Communications, Network and System Sciences, pp. 378-384, 2, (5), DOI: 10.4236/ijcns.2009.25042,
[Article]

Volkamer, Melanie and Schryen, Guido and Langer, Lucie and Schmidt, Axel and Buchmann, Johannes
Fischer, Stefan and Maehle, Erik and Reischuk, Rüdiger (eds.) (2009):
Elektronische Wahlen: Verifizierung vs. Zertifizierung.
In: Informatik 2009: Im Focus das Leben, Beiträge der 39. Jahrestagung der Gesellschaft für Informatik e.V., LNI, [Conference or Workshop Item]

Langer, Lucie and Schmidt, Axel and Volkamer, Melanie and Buchmann, Johannes
Fischer, Stefan and Maehle, Erik and Reischuk, Rüdiger (eds.) (2009):
Classifying Privacy and Verifiability Requirements for Electronic Voting.
In: Informatik 2009: Im Focus das Leben, Beiträge der 39. Jahrestagung der Gesellschaft für Informatik e.V. (GI), LNI, [Conference or Workshop Item]

Schneider, Michael and Buchmann, Johannes and Lindner, Richard (2009):
Probabilistic Analysis of LLL Reduced Bases.
In: Western European Workshop on Research in Cryptology - WEWoRC 2009, Springer, Graz University of Technology, Austria, In: LNCS, [Conference or Workshop Item]

Buchmann, Johannes and Lindner, Richard and Rückert, Markus and Schneider, Michael (2009):
Post-quantum cryptography: lattice signatures.
In: Special Issue of Computing (CECC 2008), [Article]

Schmidt, Axel and Volkamer, Melanie and Langer, Lucie and Buchmann, Johannes
Fischer, Stefan and Maehle, Erik and Reischuk, Rüdiger (eds.) (2009):
Towards the impact of the operational environment on the security of e-voting.
In: Informatik 2009: Im Focus das Leben, Beiträge der 39. Jahrestagung der Gesellschaft für Informatik e.V. (GI), Gesellschaft für Informatik, In: LNI, 154, [Conference or Workshop Item]

Langer, Lucie and Schmidt, Axel and Volkamer, Melanie and Buchmann, Johannes
Prosser, Alexander and Parycek, Peter (eds.) (2009):
Ein PKI-basiertes Protokoll für sichere und praktikable Onlinewahlen.
In: Proceedings of EDEM 2009 ; Tagungsband Elektronische Demokratie in Österreich, OCG Verlag, [Conference or Workshop Item]

2008

Mohamed, Mohamed Saied Emam and Mohamed, Wael Said Abd Elmageed and Ding, Jintai and Buchmann, Johannes (2008):
MXL2: Solving Polynomial Equations over GF(2) Using an Improved Mutant Strategy.
In: Post-Quantum Cryptography, Second International Workshop, PQCrypto 2008, DOI: 10.1007/978-3-540-88403-3_14,
[Conference or Workshop Item]

Buchmann, Johannes and Ding, Jintai (eds.) (2008):
Post-Quantum Cryptography.
Springer, Cincinnati, LNCS, [Conference or Workshop Item]

Bernstein, Daniel and Buchmann, Johannes and Dahmen, Erik (eds.) (2008):
Post-Quantum Cryptography.
Springer, ISBN 978-3-540-88701-0,
[Book]

Dahmen, Erik and Okeya, Katsuyuki and Takagi, Tsuyoshi and Vuillaume, Camille
Buchmann, Johannes and Ding, Jintai (eds.) (2008):
Digital Signatures out of Second-Preimage Resistant Hash Functions.
In: PQCrypto 2008, Springer, Cincinnati, USA, In: LNCS, ISBN 978-3-540-88402-6,
[Conference or Workshop Item]

Rohde, Sebastian and Eisenbarth, Thomas and Dahmen, Erik and Buchmann, Johannes and Paar, Christof
Grimaud, Gilles and Standaert, François-Xavier (eds.) (2008):
Fast Hash-Based Signatures on Constrained Devices.
In: CARDIS 2008, Springer, London, GB, In: LNCS, ISBN 978-3-540-85892-8,
[Conference or Workshop Item]

Vuillaume, Camille and Okeya, Katsuyuki and Dahmen, Erik and Buchmann, Johannes
Chung, Kyo-Il and Sohn, Kiwook and Yung, Moti (eds.) (2008):
Public Key Authentication with Memory Tokens.
In: Workshop on Information Security Applications - WISA 2008, Springer, Jeju Island, Korea, In: LNCS, ISBN 978-3-642-00305-9,
[Conference or Workshop Item]

Langer, Lucie and Schmidt, Axel and Buchmann, Johannes (2008):
Secure Online Elections in Practice.
[Other]

Rohde, Sebastian and Eisenbarth, Thomas and Dahmen, Erik and Buchmann, Johannes and Paar, Christof (2008):
Efficient Hash-Based Signatures on Embedded Devices.
In: SECSI - Secure Component and System Identification 2008, [Conference or Workshop Item]

Ding, Jintai and Buchmann, Johannes and Mohamed, Mohamed Saied Emam and Mohamed, Wael Said Abd Elmageed and Weinmann, Ralf-Philipp (2008):
MutantXL.
In: SCC 2008, [Conference or Workshop Item]

Langer, Lucie and Schmidt, Axel and Buchmann, Johannes
Remenyi, Dan (ed.) (2008):
Secure and Practical Online Elections via Voting Service Provider.
In: Proceedings of the 4th International Conference on e-Government -- ICEG, Melbourne, Australia, ACI, ISBN 978-1-9066938-21-4,
[Conference or Workshop Item]

Buchmann, Johannes and Lindner, Richard and Rückert, Markus
Buchmann, Johannes and Ding, Jintai (eds.) (2008):
Explicit Hard Instances of the Shortest Vector Problem.
In: PQCrypto 2008, In: LNCS, ISBN 978-3-540-88402-6,
[Conference or Workshop Item]

Buchmann, Johannes and Döring, Martin and Lindner, Richard (2008):
Efficiency Improvement for {NTRU}.
In: Sicherheit 2008, Saarbrücken, In: Lecture Notes in Informatics, [Conference or Workshop Item]

Buchmann, Johannes and Dahmen, Erik and Schneider, Michael
Buchmann, Johannes and Ding, Jintai (eds.) (2008):
Merkle Tree Traversal Revisited.
In: PQCrypto 2008, Springer, In: LNCS, [Conference or Workshop Item]

Buchmann, Johannes and Ding, Jíntai (eds.) (2008):
Post-Quantum Cryptography (PQCrypto 2008).
Springer, LNCS, ISBN 978-3-540-88402-6,
[Book]

Buchmann, Johannes and Ding, Jintai (eds.) (2008):
Post-Quantum Cryptography, Second International Workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17-19, 2008, Proceedings.
In: PQCrypto, Springer, In: Lecture Notes in Computer Science, 5299, ISBN 978-3-540-88402-6,
[Conference or Workshop Item]

2007

Buchmann, Johannes and Dahmen, Erik and Klintsevich, Elena and Okeya, Katsuyuki and Vuillaume, Camille (2007):
Merkle Signatures with Virtually Unlimited Signature Capacity.
In: ACNS 2007 - Applied Cryptography and Network Security, 5th International Conference, Springer, In: LNCS, 4521, DOI: 10.1007/978-3-540-72738-5_3,
[Conference or Workshop Item]

Weber, Stefan Georg and Araujo, Roberto and Buchmann, Johannes (2007):
On coercion-resistant electronic elections with linear work.
In: The Second International Conference on Availability, Reliability and Security, 2007 : ARES 2007 ; 2nd International Workshop Dependability and Security in e-Government (DeSeGov 2007)...ISBN 0-7695-2775-2, 978-0-7695-2775-8 [Online-Ressource], pp. 908-916, [Book Section]

Weber, Stefan and Araújo, Roberto and Buchmann, Johannes (2007):
On Coercion-Resistant Electronic Elections with Linear Work.
In: >ares, IEEE Computer Society, pp. 908-916, 00, DOI: http://doi.ieeecomputersociety.org/10.1109/ARES.2007.108,
[Article]

Buchmann, Johannes and Vollmer, Ulrich (2007):
Binary Quadratic Forms. An Algorithmic Approach.
Springer Berlin/Heidelberg, In: Algorithms and Computation in Mathematics, ISBN 978-3-540-46367-2,
[Book]

2006

Buchmann, Johannes and Garcia, Luis Carlos Coronado and Dahmen, Erik and Döring, Martin and Klintsevich, Elena (2006):
{CMSS} - An Improved Merkle Signature Scheme.
In: INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India, Springer, In: LNCS, 4329, DOI: 10.1007/11941378_25,
[Conference or Workshop Item]

Lippert, Marcus and Karatsiolis, Evangelos and Wiesmaier, Alexander and Buchmann, Johannes (2006):
Life-Cycle Management of X.509 Certifcates Based on LDAP Directories.
In: >Journal of Computer Security, pp. 419-439, 14(5), [Article]

Araújo, Roberto and Wiesmaier, Alexander and Buchmann, Johannes (2006):
The T-Vote Protocol.
(TI-3/06), [Report]

Buchmann, Johannes and Ludwig, Christoph (2006):
Practical Lattice Basis Sampling Reduction.
In: ANTS 2006: Algorithmic Number Theory, Springer, Berlin, In: LNCS, 4076, ISBN 978-3-540-36075-9,
DOI: 10.1007/11792086_17,
[Conference or Workshop Item]

Wiesmaier, Alexander and Rauchschwalbe, Ulrich and Ludwig, Christoph and Henhapl, Birgit and Ruppert, Markus and Buchmann, Johannes (2006):
Intrinsically Legal-For-Trade Objects by Digital Signatures.
In: SICHERHEIT 2006, Sicherheit - Schutz und Zuverlässigkeit, 3. Jahrestagung, Magdeburg, In: LNI, P-77, [Conference or Workshop Item]

Wiesmaier, Alexander and Ludwig, Christoph and Rauchschwalbe, Ulrich and Henhapl, Birgit and Ruppert, Markus and Buchmann, Johannes (2006):
Intrinsically Legal-For-Trade Objects by Digital Signatures.
In: Sicherheit 2006: Sicherheit - Schutz und Zuverlässigkeit, Beiträge der 3. Jahrestagungdes Fachbereichs der Gesellschaft für Informatik e.V., Darmstadt, ISBN 3-88579-171-4,
[Conference or Workshop Item]

Buchmann, Johannes and Pyshkin, Andrei and Weinmann, Ralf-Philipp (2006):
Block Ciphers Sensitive to Gröbner Basis Attacks.
In: Topics in Cryptology - CT-RSA 2006 <San Jose, CA, USA,2006> ; (Lecture Notes in Computer Science ; 3860) ; 313-331 ; ISBN: 3-540-31033-9, [Conference or Workshop Item]

Buchmann, Johannes and Pyshkin, Andrei and Weinmann, Ralf-Philipp (2006):
A Zero-Dimensional Gröbner Basis for AES-128.
Berlin ; Heidelberg [u.a.], Springer, In: Fast software encryption : 13th International Workshop, FSE 2006; Graz, Austria, March 15 - 17, 2006; revised selected papers / Matthew Robshaw (Ed.). - Berlin ; Heidelberg [u.a.] : Springer, 2006, S. 78-88 (Lecture notes in computer science ; 4047) ISBN:, [Conference or Workshop Item]

Kaiser, Markus and Buchmann, Johannes (2006):
Computer Verification in Cryptography.
In: International Conference on Computer Science-(ICCS&#039;06), 12, ISBN 975-00803-1-9,
[Conference or Workshop Item]

Kaiser, Markus and Buchmann, Johannes (2006):
A Formal Approach for Proof Constructions in Cryptography.
In: >International Journal of Computer Science, pp. 195--203, 1, [Article]

Buchmann, Johannes and Vollmer, Ulrich (2006):
CLC2006 - Workshop on Codes and Lattices in Cryptography.
[Other]

Buchmann, Johannes and May, Alexander and Vollmer, Ulrich (2006):
Perspectives for cryptographic long-term security.
In: >Commun. ACM, 49, (9), DOI: 10.1145/1151055,
[Article]

Rauchschwalbe, Ulrich and Wiesmaier, Alexander and Ludwig, Christoph and Buchmann, Johannes (2006):
Digital Signierte Wägeresultate - Neue Wege in der Sicherung eichfähiger Messwerte.
In: >W&auml;gen, Dosieren, Mischen - (WDM), pp. 23--27, 3/2006, [Article]

Buchmann, Johannes (2006):
Passwörter oder Smartcards zur Absicherung von Portalen?
(TI-2/06), [Report]

Buchmann, Johannes and Dahmen, Erik and May, Alexander and Vollmer, Ulrich (2006):
Krypto 2020.
In: >The Information Security Journal -(KES), pp. 74-83, 5, [Article]

Buchmann, Johannes and May, Alexander and Vollmer, Ulrich (2006):
Perspectives for cryptographic long-term security.
In: >Commun. ACM, pp. 50-55, 49, (9), [Article]

Buchmann, Johannes and Vollmer, Ulrich (2006):
A Terr algorithm for computations in the infrastructure of real-quadratic number fields.
In: >Journal de Théorie des Nombres de Bordeaux, pp. 559--572, 18, (3), [Article]

2005

Lippert, Marcus and Karatsiolis, Evangelos and Wiesmaier, Alexander and Buchmann, Johannes (2005):
Directory Based Registration in Public Key Infrastructures.
In: The 4th International Workshop for Applied PKI (IWAP’05), IOS Press, [Conference or Workshop Item]

Straub, Tobias and Ginkel, Thilo-Alexander and Buchmann, Johannes (2005):
A Multipurpose Delegation Proxy for WWW/ Credentials.
In: EuroPKI 2005 - Public Key Infrastructure, Second European PKI Workshop: Research and Applications, Springer, In: LNCS, 3545, ISBN 3-540-28062-6,
[Conference or Workshop Item]

Wiesmaier, Alexander and Karatsiolis, Vangelis and Lippert, Marcus and Buchmann, Johannes (2005):
The Workshop - Implementing Well Structured Enterprise Applications.
In: SERP 2005 - International Conference on Software Engineering Research and Practice, CSREA Press, Las Vegas, Nevada, USA, ISBN 1-932415-50-5,
[Conference or Workshop Item]

Wiesmaier, Alexander and Lippert, Marcus and Karatsiolis, Vangelis and Raptis, Georgios and Buchmann, Johannes (2005):
An Evaluated Certification Services System for the German National Root CA - Legally binding and trustworthy Transactions in E-Business and E-Government.
In: EEE 2005 - International Conference on E-Business, Enterprise Information Systems, E-Government, and Outsourcing, CSREA Press, Las Vegas, Nevada, USA, ISBN 1-932415-76-9,
[Conference or Workshop Item]

Wiesmaier, Alexander and Fischer, Mike and Lippert, Marcus and Buchmann, Johannes (2005):
Outflanking and Securely Using the PIN/TAN-System.
In: SAM 2005 - International Conference on Security and Management, CSREA Press, Las Vegas, Nevada, USA, ISBN 1-932415-82-3,
[Conference or Workshop Item]

2004

Karatsiolis, Vangelis and Lippert, Marcus and Wiesmaier, Alexander and Pitaev, Anna and Ruppert, Markus and Buchmann, Johannes (2004):
Towards a Flexible {Intra-Trustcenter} Management Protocol.
In: >CoRR, cs.CR/0411067, [Article]

Buchmann, Johannes and Coronado, Carlos and Döring, Martin and Engelbert, Daniela and Ludwig, Christoph and Overbeck, Raphael and Schmidt, Arthur and Vollmer, Ulrich and Weinmann, Ralf-Philipp (2004):
Post-Quantum Signatures.
[Other]

Buchmann, Johannes and Takagi, Tsuyoshi and Vollmer, Ulrich (2004):
Number field cryptography.
In: High Primes and Misdemeanours: Lectures in Honour of the 60th Birthday of Hugh Cowie Williams, 41, ISBN 200-8218-3353-7,
[Conference or Workshop Item]

2003

Baier, Harald and Buchmann, Johannes and Busch, Christoph (2003):
Aus- und Weiterbildung in IT-Sicherheit.
Ingelheim, SecuMedia Verl., In: IT-Sicherheit im verteilten Chaos : Tagungsband 8. Deutscher IT-Sicherheitskongress des BSI 2003 / Bundesamt für Sicherheit in der Informationstechnik.- Ingelheim : SecuMedia Verl., 2003.- 531 S.- ISBN 3-922746-49-7.- S. 179-190, [Conference or Workshop Item]

Baier, Harald and Buchmann, Johannes and Busch, Christoph (2003):
{Aus-} und Weiterbildung in {IT}-Sicherheit.
(TI-2/03), [Report]

Buchmann, Johannes and Schmidt, Arthur (2003):
Computing the structure of a finite abelian group.
(TI-5/03), [Report]

Buchmann, Johannes and Takagi, Tsuyoshi (2003):
Kryptographie - Chancen und Risiken.
(TI-6/03), [Report]

Buchmann, Johannes and Takagi, Tsuyoshi and Vollmer, Ulrich (2003):
Number field cryptography.
(TI-11/03), [Report]

2002

Buchmann, Johannes and Sakurai, Kouichi and Takagi, Tsuyoshi (2002):
An IND-CCA2 Public-Key Cryptosystem with Fast Decryption.
In: ICISC 2002 - Information Security and Cryptology, 5th International Conference, Springer, Seoul, Korea, In: LNCS, ISBN {3-540-00716-4,
[Conference or Workshop Item]

Buchmann, Johannes and Ernst, Markus and Henhapl, Birgit and Huss, Sorin (2002):
Elliptische Kurven Kryptographie - hocheffizient und portabel.
In: >thema FORSCHUNG, Eingebette Systeme: Entwurf und Anwendung versteckter Computer, pp. 102-109, (1/2002), [Article]

Buchmann, Johannes (2002):
Theoretische Informatik.
In: 30 Jahre Informatik an deutschen Hochschulen. - Darmstadt : Techn. Univ., Fachbereich Informatik, 2002. - S. 114-115, Darmstadt, Techn. Univ., [Book Section]

Biehl, Ingrid and Buchmann, Johannes and Hamdy, Safuat and Meyer, Andreas (2002):
A Signature Scheme Based on the Intractability of Computing Roots.
In: >Des. Codes Cryptography, pp. 223-236, 25, (3), [Article]

Buchmann, Johannes (2002):
Cryptographic Protocols.
[Other]

2001

Buchmann, Johannes and Hamdy, S. (2001):
A survey on IQ cryptography.
In: Public-key cryptography and computational number theory. Hrsg.: K. Alster, J. Urbanowicz, H.C. Wiliams. - Berlin, New York: de Gruyter, 2001. S. 1-15, Berlin, New York, de Gruyter, [Book Section]

Baier, Harald and Buchmann, Johannes (2001):
Efficient Construction of Cryptographically Strong Elliptic Curves.
(TI-2/01), [Report]

Buchmann, Johannes (2001):
Wie sicher kann Sicherheit sein?
(TI-5/01), [Report]

Buchmann, Johannes and Hamdy, Safuat (2001):
A Survey on {IQ} Cryptography.
(TI-4/01), [Report]

Buchmann, Johannes and Sakurai, Kouichi and Takagi, Tsuyoshi (2001):
An {IND-CCA2} Public-Key Cryptosystem with Fast Decryption.
(TI-10/01), [Report]

2000

Baier, Harald and Buchmann, Johannes (2000):
Efficient Construction of Cryptographically Strong Elliptic Curves.
In: INDOCRYPT 2000 - First International Conference in Cryptology in India, Springer, Calcutta, India, In: LNCS, ISBN 3-540-41452-5,
[Conference or Workshop Item]

Baier, Harald and Buchmann, Johannes (2000):
Efficient construction of cryptographically strong elliptic curves.
In: Progress in cryptology: INDOCRYPT 2000. Hrsg.: B. Roy, E. Okamoto. - Berlin, Heidelberg (u.a.): Springer, 2000 = Lecture notes in computer science; 1977. S. 191-202, Berlin, Heidelberg (u.a.), Springer, [Book Section]

Buchmann, Johannes and Maurer, M. and Möller, B. (2000):
Cryptography based on number fields with large regulator.
In: Journal de théorie des nombres de Bordeaux, pp. 293-307, 12, [Article]

Biehl, Ingrid and Buchmann, Johannes and Hamdy, Safuat and Meyer, Andreas (2000):
A Signature Scheme Based on the Intractability of Computing Roots.
(TI-1/00), [Report]

Buchmann, Johannes and Maurer, Markus and Möller, Bodo (2000):
Cryptography Based on Number Fields with Large Regulator.
(TI-5/00), [Report]

Buchmann, Johannes and Hoeholdt, Tom and Stichtenoth, Hennning and Tapia-Recillas, Horacio (eds.) (2000):
Coding Theory cryptography and related areas.
Springer, Guanajuato, Mexico, in April 1998, ISBN 978-3-540-66248-8,
[Conference or Workshop Item]

1999

Buchmann, Johannes and Squirrel, D. (1999):
Kernels of integer matrices via modular arithmetic.
Darmstadt, Techn. Univ., FB 20, Inst. für Theoretische Informatik, [Book]

Buchmann, Johannes and Ruppert, M. and Tak, M. (1999):
FlexiPKI - Realisierung einer flexiblen Public-Key-Infrastruktur.
Darmstadt, Techn. Univ., FB 20, Inst. für Theoretische Informatik, [Book]

Biehl, Ingrid and Buchmann, Johannes and Hamdy, Safuat and Meyer, Andreas (1999):
Cryptographic Protocols Based on Intractability of Extracting Roots and Computing Discrete Logarithms.
(TI-16/99), [Report]

Buchmann, Johannes and Eisenbrand, Friedrich (1999):
On factor refinement in number fields.
In: >Mathematics of Computation, pp. 345-350, 68, (225), [Article]

Buchmann, Johannes and Maurer, Markus (1999):
Wie sicher ist die Public-Key-Kryptographie.
(TI-2/99), [Report]

Buchmann, Johannes and Ruppert, Markus and Tak, Markus (1999):
{FlexiPKI} - Realisierung einer flexiblen Public-Key-Infrastruktur.
(TI-22/99), [Report]

Buchmann, Johannes and Squirrel, Douglas (1999):
Kernels of Integer Matrices via Modular Arithmetic.
(TI-4/99), [Report]

Buchmann, Johannes and Hoeholdt, Tom and Stichtenoth, Hennning and Tapia-Recillas, Horacio (eds.) (1999):
Coding Theory, Cryptography and Related Areas.
Springer, ISBN 978-3-540-66248-8,
[Book]

1998

Buchmann, Johannes and Jacobson, Michael J. and Neis, Stefan and Theobald, Patrick and Weber, Damian (1998):
Sieving Methods for Class Group Computation.
(TI-8/98), [Report]

Buchmann, Johannes and Maurer, Markus (1998):
Approximate Evaluation of {L(1,chi-delta)}.
(TI-6/98), [Report]

Buchmann, Johannes and Weber, Damian (1998):
Discrete Logarithms: Recent Progress.
(TI-12/98), [Report]

1997

Buchmann, Johannes and Paulus, Sachar (1997):
A One Way Function Based on Ideal Arithmetic in Number Fields.
In: CRYPTO '97 - 17th Annual International Cryptology Conference, Springer, Santa Barbara, California, USA, In: LNCS, ISBN 3-540-63384-7,
[Conference or Workshop Item]

Buchmann, Johannes and Paulus, S. (1997):
A one way function based on ideal arithmetic in number fields.
Darmstadt: Techn. Hochschule, FB 20, Inst. für Theoretische Informatik, 1997. 9 S,
Darmstadt, Techn. Hochschule, FB 20, FG Theoretische Informatik, [Book]

Biehl, Ingrid and Buchmann, Johannes (1997):
An analysis of the reduction algorithms for binary quadratic forms.
(TI-26/97), [Report]

Buchmann, Johannes and Jacobson, Michael J. and Teske, Edlyn (1997):
On some computational problems in finite abelian groups.
In: >Mathematics in Computation, pp. 1663-1687, 66, (220), [Article]

Buchmann, Johannes and Paulus, Sachar (1997):
A one way function based on ideal arithmetic in number fields.
(TI-5/97), [Report]

1996

Buchmann, Johannes and Eisenbrand, F. (1996):
On factor refinement in number fields.
Darmstadt: Techn. Hochschule, FB 20, FG Theoretische Informatik, 1996,
Darmstadt, Techn. Hochschule, FB 20, FG Theoretische Informatik, [Book]

Buchmann, Johannes and Neis, S. (1996):
Algorithms for linear algebra problems over principal ideal rings.
Darmstadt: Techn. Hochschule, FB 20, FG Theoretische Informatik, 1996,
Darmstadt, Techn. Hochschule, FB 20, FG Theoretische Informatik, [Book]

Buchmann, Johannes and Jacobson, M. J. and Teske, E. (1996):
On some computational problems in finite abelian groups.
Darmstadt: Techn. Hochschule, FB 20, FG Theoretische Informatik, 1996,
Darmstadt, Techn. Hochschule, FB 20, FG Theoretische Informatik, [Book]

Buchmann, Johannes and Eisenbrand, Friedrich (1996):
On Factor Refinement in Number Fields.
(TI-5/96), [Report]

Buchmann, Johannes and Jacobson, Michael J. and Teske, Edlyn (1996):
On some computational problems in finite abelian groups.
(TI-2/96), [Report]

Buchmann, Johannes and Neis, Stefan (1996):
Algorithms for Linear Algebra Problems over Principal Ideal Rings.
(TI-7/96), [Report]

1994

Biehl, Ingrid and Buchmann, Johannes and Thiel, Christoph (1994):
Cryptographic Protocols Based on Discrete Logarithms in Real-quadratic Orders.
In: CRYPTO '94 - 14th Annual International Cryptology Conference, Springer, Santa Barbara, California, USA, In: LNCS, ISBN 3-540-58333-5,
[Conference or Workshop Item]

Buchmann, Johannes and Loho, Jürgen and Zayer, Jörg (1994):
An Implementation of the General Number Field Sieve.
In: CRYPTO '93 - 13th Annual International Cryptology Conference, Springer, Santa Barbara, California, USA, In: LNCS, ISBN 3-540-57766-1,
[Conference or Workshop Item]

Buchmann, Johannes (1994):
Reducing lattice bases by means of approximations.
In: ANTS-II - Algorithmic Number Theory, Second International Symposium, Springer, Talence, France, In: LNCS, ISBN 3-540-61581-4,
[Conference or Workshop Item]

Biehl, Ingrid and Buchmann, Johannes (1994):
Algorithms for quadratic orders.
In: >Mathematics of Computation, [Article]

Buchmann, Johannes and Lenstra, Hendrik W. (1994):
Approximating rings of integers in number fields.
In: >Journal de Théorie des Nombres de Bordeaux, 6, (2), [Article]

1993

Buchmann, Johannes and Hollinger, Christine (1993):
On smooth ideals in number fields.
In: >Journal of Number Theory, [Article]

Buchmann, Johannes and Paulus, Sachar (1993):
Algorithms for finite abelian groups.
[Other]

1992

Biehl, Ingrid and Buchmann, Johannes and Meyer, Bernd and Thiel, Christian and Thiel, Christoph (1992):
Tools for Proving Zero Knowledge.
In: EUROCRYPT '92 - Workshop on the Theory and Application of of Cryptographic Techniques, Springer, Balatonfüred, Hungary, In: LNCS, ISBN 3-540-56413-6,
[Conference or Workshop Item]

Ganzinger, Harald and Paul, Wolfgang and Buchmann, Johannes
Ganzinger, Harald and Paul, Wolfgang and Buchmann, Johannes (eds.) (1992):
Informatik - Festschrift zum 60. Geburtstag von Günter Hotz.
Vieweg + Teubner, In: Teubner Texte, ISBN 978-3815420331,
[Book]

Buchmann, Johannes and Kessler, Volker (1992):
Computing a reduced lattice basis from a generating system.
[Other]

Buchmann, Johannes and van Sprang, Oliver (1992):
On short representations of orders and number fields.
[Other]

Buchmann, Johannes and Thiel, Christoph and Williams, Hugh (1992):
Short representations of quadratic integers.
[Other]

1991

Buchmann, Johannes (1991):
Number Theoretic Algorithms and Cryptology.
In: FCT '91 - Fundamentals of Computation Theory, 8th International Symposium, Springer, Gosen, Germany, In: LNCS, ISBN 3-540-54458-5,
[Conference or Workshop Item]

Buchmann, Johannes and Düllmann, Stephan (1991):
On the Computation of Discrete Logarithms in Class Groups.
In: CRYPTO '90 - 10th Annual International Cryptology Conference, Springer, Santa Barbara, California, USA, In: LNCS, ISBN 3-540-54508-5,
[Conference or Workshop Item]

Buchmann, Johannes and Düllmann, Stephan (1991):
Distributed class group computation.
[Other]

Buchmann, Johannes and Müller, Volker (1991):
Computing the number of points on elliptic curves over finite prime fields.
In: International Symposium on Symbolic and Algebraic Computation-(ISSAC 1991), [Conference or Workshop Item]

Buchmann, Johannes and Roth, Ralf and Diehl, Matthias (1991):
{LiPS}: A System for distributed applications.
[Other]

Buchmann, Johannes and Williams, Hugh (1991):
Some remarks concerning the complexity of computing class groups of quadratic fields.
In: >Journal of Complexity, pp. 311-315, 7, (3), DOI: 10.1016/0885-064X(91)90039-Z,
[Article]

1990

Buchmann, Johannes (1990):
A subexponential algorithm for the determination of class groups and regulators of algebraic number fields.
In: Séminaire de Théorie des Nombres, Paris 1988--1989, Birkhäuser Boston, In: Progr. Math., 91, [Conference or Workshop Item]

Buchmann, Johannes and Shoup, Victor (1990):
Constructing Nonresidues in Finite Fields and the Extended Riemann Hypothesis.
[Other]

1989

Buchmann, Johannes and Düllmann, Stephan and Williams, Hugh (1989):
On the Complexity and Efficiency of a New Key Exchange System.
In: EUROCRYPT '89 - Workshop on the Theory and Application of of Cryptographic Techniques, Springer, Houthalen, Belgium, In: LNCS, ISBN 3-540-53433-4,
[Conference or Workshop Item]

This list was generated on Wed Sep 18 04:28:29 2019 CEST.