Items in division
- TU Darmstadt (106975)
- 20 Department of Computer Science (16098)
- Theoretical Computer Science - Cryptography and Computer Algebra (1222)
- Long-term Security (26)
- Theoretical Computer Science - Cryptography and Computer Algebra (1222)
- 20 Department of Computer Science (16098)
A
Alkeilani Alkadri, Nabil (2022)
On Lattice-Based Signatures with Advanced Functionalities.
Technische Universität Darmstadt
doi: 10.26083/tuprints-00020793
Ph.D. Thesis, Primary publication, Publisher's Version
Alkim, Erdem ; Barreto, Paulo S. L. M. ; Bindel, Nina ; Krämer, Juliane ; Longa, Patrick ; Ricardini, Jefferson E. (2020)
The Lattice-Based Digital Signature Scheme qTESLA.
18th International Conference on Applied Cryptography and Network Security (ACNS 2020). virtual Conference (19.10.2020-22.10.2020)
Conference or Workshop Item, Bibliographie
Alkeilani Alkadri, Nabil ; Bansarkhani, Rachid El ; Buchmann, Johannes (2020)
BLAZE: Practical Lattice-Based Blind Signatures for Privacy-Preserving Applications.
24th International Conference on Financial Cryptography and Data Security (FC'20). Kota Kinabalu, Malaysia (10.02.2020-14.02.2020)
Conference or Workshop Item, Bibliographie
Alkeilani Alkadri, Nabil ; Bansarkhani, Rachid El ; Buchmann, Johannes (2020)
On Lattice-Based Interactive Protocols: An Approach with Less or No Aborts.
The 25th Australasian Conference on Information Security and Privacy (ACISP'20). Perth, Australia (30.11.2020-02.12.2020)
Conference or Workshop Item, Bibliographie
Alkeilani Alkadri, Nabil ; Das, Poulami ; Erwig, Andreas ; Faust, Sebastian ; Krämer, Juliane ; Riahi, Siavash ; Struck, Patrick (2020)
Deterministic Wallets in a Quantum World.
The 27th ACM Conference on Computer and Communications Security (CCS 2020). virtual Conference (09.11.2020-13.11.2020)
Conference or Workshop Item, Bibliographie
Albrecht, Martin R. ; Curtis, Benjamin R. ; Deo, Amit ; Davidson, Alex ; Player, Rachel ; Postlethwaite, Eamonn W. ; Virdia, Fernando ; Wunderer, Thomas (2018)
Estimate all the {LWE, NTRU} schemes!
11th Conference on Security and Cryptography for Networks. Amalfi, Italy
Conference or Workshop Item, Bibliographie
Alexopoulos, Nikolaos ; Habib, Sheikh Mahbub ; Mühlhäuser, Max (2018)
Towards Secure Distributed Trust Management on a Global Scale.
IoT S&P’18: ACM SIGCOMM 2018 Workshop on IoT Security and Privacy. Budapest, Hungary (20.08.2018-25.08.2018)
doi: 10.1145/3229565.3229569
Conference or Workshop Item, Bibliographie
Albrecht, Martin ; Göpfert, Florian ; Vidria, Fernando ; Wunderer, Thomas (2017)
Revisiting the Expected Cost of Solving uSVP and Applications to LWE.
Conference or Workshop Item, Bibliographie
Alkeilani Alkadri, Nabil ; Buchmann, Johannes ; Bansarkhani, Rachid El ; Krämer, Juliane (2017)
A Framework to Select Parameters for Lattice-Based Cryptography.
In: Cryptology ePrint Archive, 2017 (615)
Article, Bibliographie
Alkim, Erdem ; Bindel, Nina ; Buchmann, Johannes ; Dagdelen, Özgür ; Eaton, Edward ; Gutoski, Gus ; Krämer, Juliane ; Pawlega, Filip (2017)
Revisiting TESLA in the quantum random oracle model.
Utrecht, the Netherlands
Conference or Workshop Item, Bibliographie
Appel, Michael ; Pauer, Christof ; Wiesmaier, Alexander (2016)
Security aspects and comparison of block ciphers LED and TEA.
Report, Bibliographie
Appel, Michael ; Bossert, Andreas ; Cooper, Steven ; Kußmaul, Tobias ; Löffler, Johannes ; Pauer, Christof ; Wiesmaier, Alexander (2016)
Block ciphers for the IoT - SIMON, SPECK, KATAN, LED, TEA, PRESENT, and SEA compared.
Report, Bibliographie
Akleylek, Sedat ; Bindel, Nina ; Buchmann, Johannes ; Krämer, Juliane ; Marson, Giorgia Azzurra (2016)
An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation.
Fes, Morocco
Conference or Workshop Item, Bibliographie
Akleylek, Sedat ; Dagdelen, Özgür ; Tok, Zaliha Yüce (2016)
On the Efficiency of Polynomial Multiplication for Lattice-Based Cryptography on GPUs Using CUDA.
Koper, Slovenia
Conference or Workshop Item, Bibliographie
Appel, Michael ; Pauer, Christof ; Wiesmaier, Alexander (2016)
Sicherheitsaspekte und Vergleich der Blockchifren LED und TEA.
Report, Bibliographie
Alkim, Erdem ; Bindel, Nina ; Buchmann, Johannes ; Dagdelen, Özgür ; Schwabe, Peter (2015)
TESLA: Tightly-Secure Efficient Signatures from Standard Lattices.
In: Cryptology ePrints Archive, 2015 (755)
Article, Bibliographie
Arabadzhieva, Vladislava (2015)
Privacy Taxonomy for Verifiable Poll-site Voting Schemes.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Alkeilani Alkadri, Nabil (2015)
Post-Quantum Commitment Schemes.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Albrecht, Martin ; Fitzpatrick, Robert ; Göpfert, Florian (2013)
On the Efficacy of Solving LWE by Reduction to Unique-SVP.
Seoul, Korea
Conference or Workshop Item, Bibliographie
Abdelmageed Mohamed, Wael Said (2011)
Improvements for the XL Algorithm with Applications to Algebraic Cryptanalysis.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication
Aguilar Melchor, C. ; Cayrel, Pierre-Louis ; Gaborit, Philippe ; Laguillaumie, F. (2010)
A New Efficient Threshold Ring Signature Scheme based on Coding Theory.
In: IEEE IT
Article, Bibliographie
Adolph, Daniel (2009)
Fractional Recoding for the Shamir Method.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Arzt, Steven (2009)
Design and Implementation of a Cryptographic Plugin for E-mail Clients.
Other, Bibliographie
Araújo, Roberto dos Santos (2008)
On Remote and Voter-Verifiable Voting.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication
Araújo, Roberto ; Ryan, Peter Y. A. (2008)
Improving Farnel, Threeballot and Randell-Ryan Voting
Schemes.
In: Cryptology ePrint Archive, 2008 (82)
Article, Bibliographie
Abbé, Thomas (2007)
Implementierung eines qualifiziert signierenden Timestamping-Servers.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Araújo, Roberto ; Foulle, Sébastian ; Traoré, Jacques (2007)
A practical and secure coercion-resistant scheme for
remote
elections.
Other, Bibliographie
Alkassar, Ammar ; Volkamer, Melanie (2007)
E-Voting and Identity -- First International Conference, VOTE-ID 2007.
Article, Bibliographie
Araújo, Roberto ; Wiesmaier, Alexander ; Buchmann, Johannes (2006)
The T-Vote Protocol.
Report, Bibliographie
Araújo, Roberto ; Custódio, Ricardo Felipe ; Wiesmaier, Alexander ; Takagi, Tsuyoshi (2006)
An Electronic Scheme for the Farnel Paper-Based Voting Protocol.
Conference or Workshop Item, Bibliographie
Alkassar, Ammar ; Krimmer, Robert ; Volkamer, Melanie (2005)
Online-Wahlen für Gremien -- Wahlen in Gremien als Einsatzgebiet für Wahlen ohne vertrauenswürdige Instanz.
In: Datenschutz und Datensicherheit, 8
Article, Bibliographie
Akishita, Toru ; Takagi, Tsuyoshi (2003)
Zero-Value Point Attacks on Elliptic
Curve Cryptosystem.
Bristol, UK
Conference or Workshop Item, Bibliographie
Akishita, Toru ; Takagi, Tsuyoshi (2003)
Zero-Value Point Attacks on Elliptic
Curve Cryptosystem.
Report, Bibliographie
Albert, Michael (2001)
Konzeption und Implementierung eines Remote Access {VPNs} für Außendienstarbeiter unter Einsatz einer Public-Key-Infrastruktur.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie
Appel, Helo ; Biehl, Ingrid ; Fuhrmann, Arnulph ; Ruppert, Markus ; Takagi, Tsuyoshi ; Takura, Akira ; Valentin, Christian (1999)
Ein sicherer, robuster Zeitstempeldienst auf der Basis verteilter {RSA}-Signaturen.
Report, Bibliographie
Amendola, Sandro (1995)
Effiziente Algorithmen für
Probleme in Gittern über {$mathbbR^d$}.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie
Abel, Christine (1994)
Ein Algorithmus zur Berechnung der Klassenzahl und des Regulators reellquadratischer Ordnungen.
Universität des Saarlandes
Ph.D. Thesis, Bibliographie
B
Büscher, Niklas ; Demmler, Daniel ; Karvelas, Nikolaos ; Katzenbeisser, Stefan ; Krämer, Juliane ; Rathee, Deevashwer ; Schneider, Thomas ; Struck, Patrick (2020)
Secure Two-Party Computation in a Quantum world.
18th International Conference on Applied Cryptography and Network Security (ACNS'20). virtual Conference (19.10.2020-22.10.2020)
Conference or Workshop Item, Bibliographie
Bauspieß, Pia ; Kolberg, Jascha ; Demmler, Daniel ; Krämer, Juliane ; Busch, Christoph (2020)
Post-Quantum Secure Two-Party Computation for Iris Biometric Template Protection.
12th IEEE International Workshop on Information Forensics and Security (WIFS 2020). virtual Conference (06.12.2020-11.12.2020)
Conference or Workshop Item, Bibliographie
Buchmann, Johannes ; Geihs, Matthias ; Hamacher, Kay ; Katzenbeisser, Stefan ; Stammler, Sebastian (2019)
Long-term integrity protection of genomic data.
In: EURASIP Journal on Information Security
doi: 10.1186/s13635-019-0099-x
Article, Bibliographie
Bindel, Nina ; Braun, Johannes ; Gladiator, Luca ; Stöckert, Tobias ; Wirth, Johannes (2019)
X.509-Compliant Hybrid Certificates for the Post-Quantum Transition.
In: Journal of Open Source Software, 4 (40)
doi: 10.21105/joss.01606
Article, Bibliographie
Burger, Michael ; Bischof, Christian ; Krämer, Juliane
ed.: Khalid, Zine-Dine (2019)
A new Parallelization for p3Enum and Parallelized Generation of Optimized Pruning Functions.
HPCS 2019- International Conference on High Performance Computing & Simulation. Dublin, Irland (15.07.2019-19.07.2019)
Conference or Workshop Item, Bibliographie
Bindel, Nina ; Brendel, Jacqueline ; Fischlin, Marc ; Goncalves, Brian ; Stebila, Douglas
eds.: Ding, Jintai ; Steinwandt, Rainer (2019)
Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange.
10th International Conference on Post-Quantum Cryptography. Chongqing, People's Republic China (08.05.2019-10.05.2019)
doi: 10.1007/978-3-030-25510-7_12
Conference or Workshop Item, Bibliographie
Burger, Michael ; Bischof, Christian ; Krämer, Juliane (2019)
p3Enum: A new Parameterizable and Shared-Memory Parallelized Shortest Vector Problem Solver.
Faro, Portugal (12.06.2019-14.06.2019)
doi: 10.1007/978-3-030-22750-0_48
Conference or Workshop Item, Bibliographie
Bansarkhani, Rachid El (2019)
LARA - A Design Concept for Lattice-based Encryption.
FC 2019: 23rd International Conference on Financial Cryptography and Data Security. Frigate Bay, St. Kitts and Nevis (18.02.2019-22.02.2019)
doi: 10.1007/978-3-030-32101-7_23
Conference or Workshop Item, Bibliographie
Burger, Michael ; Bischof, Christian ; Calotoiu, Alexandru ; Wunderer, Thomas ; Wolf, Felix (2018)
Exploring the Performance Envelope of the LLL Algorithm.
21st IEEE International Conference on Computational Science and Engineering. Bucharest, Romania (29.10.2018-31.10.2018)
doi: 10.1109/CSE.2018.00012
Conference or Workshop Item, Bibliographie
Bindel, Nina ; Buchmann, Johannes ; Göpfert, Florian ; Schmidt, Markus (2018)
Estimation of the Hardness of the Learning with Errors Problem with a Restricted Number of Samples.
In: Journal of Mathematical Cryptology
Article, Bibliographie
Bindel, Nina (2018)
On the Security of Lattice-Based Signature Schemes in a Post-Quantum World.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication
Buchmann, Johannes ; Holzer, Patrick ; Wunderer, Thomas (2017)
Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor p^α q^β.
Conference or Workshop Item, Bibliographie
Butin, Denis ; Wälde, Julian ; Buchmann, Johannes (2017)
Post-Quantum Authentication in OpenSSL with Hash-Based Signatures.
ICMU - The Tenth International Conference on Mobile Computing and Ubiquitous Networking. Toyama International Conference Center, Toyama, Japan (03.10.2017-05.10.2017)
Conference or Workshop Item, Bibliographie
Buldas, Ahto ; Geihs, Matthias ; Buchmann, Johannes (2017)
Long-Term Secure Time-Stamping using Preimage-Aware Hash Functions.
Conference or Workshop Item, Bibliographie
Bindel, Nina ; Krämer, Juliane ; Schreiber, Johannes (2017)
Hampering fault attacks against lattice-based signature schemes - countermeasures and their efficiency.
Conference or Workshop Item, Bibliographie
Buchmann, Johannes ; Lauter, Kristin ; Mosca, Michele (2017)
Postquantum Cryptography - State of the Art.
In: IEEE Security & Privacy, 15
Article, Bibliographie
Butin, Denis (2017)
Hash-Based Signatures: State of Play.
In: IEEE Security & Privacy, 15 (4)
doi: 10.1109/MSP.2017.3151334
Article, Bibliographie
Bernhard, David ; Kulyk, Oksana ; Volkamer, Melanie (2017)
Security Proofs for Participation Privacy, Receipt-Freeness, Ballot Privacy for the Helios Voting Scheme.
doi: 10.1145/3098954.3098990
Conference or Workshop Item, Bibliographie
Buldas, Ahto ; Geihs, Matthias ; Buchmann, Johannes (2017)
Long-Term Secure Commitments via Extractable-Binding Commitments.
Auckland, New Zealand
Conference or Workshop Item, Bibliographie
Bugge, Sebastian (2017)
Solving Learning With Errors Instances Using Quantum Reductions.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Bindel, Nina ; Herath, Udyani ; McKague, Matthew ; Stebila, Douglas (2017)
Transitioning to a Quantum-Resistant Public Key Infrastructure.
Utrecht, the Netherlands
Conference or Workshop Item, Bibliographie
Buchmann, Johannes ; Braun, Johannes ; Demirel, Denise ; Geihs, Matthias (2017)
Quantum Cryptography: a view from classical cryptography.
In: Quantum Science and Technology, 2 (2)
doi: 10.1088/2058-9565/aa69cd
Article, Bibliographie
Bindel, Nina (2017)
Ein deutsches digitales Signaturverfahren auf dem Weg zum internationalen kryptographischen Standard.
Conference or Workshop Item, Bibliographie
Biemann, Chris ; Bontcheva, Kalina ; Eckart de Castilho, Richard ; Gurevych, Iryna ; Yimam, Seid Muhie
eds.: Ide, Nancy ; Pustejovsky, James (2017)
Collaborative Web-based Tools for Multi-layer Text Annotation.
In: The Handbook of Linguistic Annotation
doi: 10.1007/978-94-024-0881-2
Book Section, Bibliographie
Braun, Johannes ; Buchmann, Johannes ; Demirel, Denise ; Fujiwara, Mikio ; Geihs, Matthias ; Moriai, Shiho ; Sasaki, Masahide ; Waseda, Atsushi (2017)
SHORT PAPER: LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality.
ASIA CCS '17. Abu Dhabi, UAE (02.04.2017-06.04.2017)
doi: 10.1145/3052973.3053043
Conference or Workshop Item, Bibliographie
Buchmann, Johannes ; Demirel, Denise ; Schabhüser, Lucas ; Struck, Patrick (2017)
Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability.
Rabat, Morocco
Conference or Workshop Item, Bibliographie
Bansarkhani, Rachid El (2017)
LARA - A Design Concept for Lattice-based Encryption.
Report, Bibliographie
Brendel, Jacqueline ; Demirel, Denise (2016)
Efficient Proactive Secret Sharing.
Auckland, New Zealand
Conference or Workshop Item, Bibliographie
Brendel, J. ; Demirel, D. (2016)
Efficient proactive secret sharing.
2016 14th Annual Conference on Privacy, Security and Trust (PST).
doi: 10.1109/PST.2016.7907013
Conference or Workshop Item, Bibliographie
Bansarkhani, Rachid El ; Sturm, Jan (2016)
An Efficient Lattice-based Multisignature Scheme with Applications to Bitcoins.
Milan, Italy
Conference or Workshop Item, Bibliographie
Butin, Denis ; Demirel, Denise ; Buchmann, Johannes (2016)
Formal Policy-based Provenance Audit.
sola city Conference Center, Akihabara-Ochanomizu District, Tokyo, Japan
Conference or Workshop Item, Bibliographie
Bossert, Andreas ; Cooper, Steven ; Wiesmaier, Alexander (2016)
A comparison of block ciphers SIMON, SPECK, and KATAN.
Report, Bibliographie
Bansarkhani, Rachid El ; El Kaafarani, Ali (2016)
Post-Quantum Attribute-Based Signatures from Lattice Assumptions.
In: Cryptology ePrint Archive, 2016 (823)
Article, Bibliographie
Braun, Johannes ; Buchmann, Johannes ; Demirel, Denise ; Fujiwara, Mikio ; Geihs, Matthias ; Moriai, Shiho ; Sasaki, Masahide ; Waseda, Atsushi (2016)
LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality (Full Paper).
ASIA CCS '17. Abu Dhabi, UEA (02.04.2017-06.04.2017)
Conference or Workshop Item, Bibliographie
Bindel, Nina ; Buchmann, Johannes ; Krämer, Juliane (2016)
Lattice-Based Signature Schemes and their Sensitivity to Fault Attacks.
Santa Barbara, CA, USA
Conference or Workshop Item, Bibliographie
Bernhard, David ; Kulyk, Oksana ; Volkamer, Melanie (2016)
Security Proofs for Participation Privacy and Stronger Verifiability for Helios.
doi: 10.5445/IR/1000081968
Report, Bibliographie
Buchmann, Johannes ; Göpfert, Florian ; Güneysu, Tim ; Oder, Tobias ; Pöppelmann, Thomas (2016)
High-Performance and Lightweight Lattice-Based Public-Key Encryption.
Xi'an, China
Conference or Workshop Item, Bibliographie
Buchmann, Johannes ; Büscher, Niklas ; Katzenbeisser, Stefan ; Krämer, Juliane ; Micciancio, Daniele ; Siim, Sander ; Vredendaal, Christine van ; Walter, Michael ; Göpfert, Florian (2016)
Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge.
Xi'an, China
Conference or Workshop Item, Bibliographie
Budurushi, Jurlind ; Hilt, Annika ; Volkamer, Melanie (2016)
"E-Mail made in Germany" Untersuchung der Sicherheitsbeurteilung von E-Mail-Nutzern.
In: Datenschutz und Datensicherheit - DuD, 40 (5)
doi: 10.1007/s11623-016-0600-3
Article, Bibliographie
Buchmann, Johannes ; Demirel, Denise ; Schabhüser, Lucas (2016)
Privately and Publicly Verifiable Computing Techniques.
Book, Bibliographie
Budurushi, Jurlind ; Reanaud, Karen ; Volkamer, Melanie ; Woide, Marcel (2016)
An Investigation into the Usability of Electronic Voting Systems for Complex Elections.
In: Journal of Annals of Telecommunications: The role of telecommunications in electronic voting, 71 (7)
doi: 10.1007/s12243-016-0510-2
Article, Bibliographie
Buchmann, Johannes ; Göpfert, Florian ; Player, Rachel ; Wunderer, Thomas (2016)
On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack.
Fes, Morocco
Conference or Workshop Item, Bibliographie
Brendel, Jacqueline (2016)
Efficient Proactive Secret Sharing.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Bansarkhani, Rachid El (2015)
On the Design and Improvement of Lattice-based Cryptosystems.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication
Braun, Kristoffer ; Rack, Philipp (2015)
Shoulder-surfing resistente Authentisierung an mobilen Endgeräten.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Bansarkhani, Rachid El ; Dagdelen, Özgür ; Buchmann, Johannes (2015)
Augmented Learning with Errors: The Untapped Potential of the Error Term.
Isla Verde, Puerto Rico
Conference or Workshop Item, Bibliographie
Bansarkhani, Rachid El ; Buchmann, Johannes (2015)
High Performance Lattice-based CCA-secure Encryption.
In: Cryptology ePrint Archive
Article, Bibliographie
Braun, Johannes (2015)
Maintaining Security and Trust in Large Scale Public Key Infrastructures.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication
Butin, Denis ; Métayer, Daniel Le (2015)
A Guide to End-to-End Privacy Accountability.
Florence, Italy
Conference or Workshop Item, Bibliographie
Butin, Denis ; Gazdag, Stefan-Lukas ; Buchmann, Johannes (2015)
Real-World Post-Quantum Digital Signatures.
Brussels, Belgium
Conference or Workshop Item, Bibliographie
Braun, Johannes ; Volk, Florian ; Classen, Jiska ; Buchmann, Johannes ; Mühlhäuser, Max (2014)
CA Trust Management for the Web PKI.
In: Journal of Computer Security, 22 (6)
doi: 10.3233/JCS-140509
Article, Bibliographie
Braun, Johannes (2014)
Ubiquitous support of multi path probing: Preventing man in the middle attacks on Internet communication.
San Francisco, USA
Conference or Workshop Item, Bibliographie
Buchmann, Johannes ; Bischof, Christian ; Dagdelen, Özgür ; Fitzpatrick, Robert ; Göpfert, Florian ; Mariano, Artur (2014)
Nearest Planes in Practice.
Istanbul, Turkey
Conference or Workshop Item, Bibliographie
Budurushi, Jurlind ; Renaud, Karen ; Volkamer, Melanie ; Woide, Marcel
eds.: Krimmer, Robert ; Volkamer, Melanie (2014)
Implementation and Evaluation of the EasyVote Tallying Component and Ballot.
Lochau
doi: 10.1109/EVOTE.2014.7001140
Conference or Workshop Item, Bibliographie
Budurushi, Jurlind ; Neumann, Stephan ; Shala, Genc ; Volkamer, Melanie
eds.: Plödereder, Erhard ; Grunske, Lars ; Schneider, Eric ; Ull, Dominik (2014)
Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trail.
44. Jahrestagung der Gesellschaft für Informatik. Stuttgart, Germany (22.09.2014-26.09.2014)
Conference or Workshop Item, Bibliographie
Buchmann, Johannes ; Bansarkhani, Rachid El ; Hauke, Sascha
eds.: Brunetti, Gino ; Feld, Thomas ; Heuser, Lutz ; Schnittner, Joachim ; Webel, Christian (2014)
Towards Security Solutions for Emergent Business Software.
St. Leon-Rot, Germany
Conference or Workshop Item, Bibliographie
Bartsch, Steffen ; Boos, Carina ; Canova, Gamze ; Dyck, Dominic ; Henhapl, Birgit ; Schultheis, Michael ; Volkamer, Melanie
eds.: Plödereder, Erhard ; Grunske, Lars ; Schneider, Eric ; Ull, Dominik (2014)
Interdisziplinäres Bewertungskonzept für Risiken auf Webseiten.
Bonn
Conference or Workshop Item, Bibliographie
Braun, Johannes ; Buchmann, Johannes ; Mullan, Ciaran ; Wiesmaier, Alexander (2014)
Long Term Confidentiality: a Survey.
In: Designs, Codes and Cryptography, 71 (3)
doi: 10.1007/s10623-012-9747-6
Article, Bibliographie
Budurushi, Jurlind ; Stockhardt, Simon ; Woide, Marcel ; Volkamer, Melanie
eds.: Tryfonas, Theo ; Askoxylakis, Ioannis (2014)
Paper Audit Trails and Voters' Privacy Concerns.
Heraklion, Greece
Conference or Workshop Item, Bibliographie
Budurushi, Jurlind ; Volkamer, Melanie
eds.: Parycek, Peter ; Edelmann, Noella (2014)
Feasibility Analysis of Various Electronic Voting Systems for Complex Elections.
Danube University Krems
Conference or Workshop Item, Bibliographie
Bartsch, Steffen ; Volkamer, Melanie (2014)
Expert Knowledge for Contextualized Warnings.
Report, Bibliographie
Budurushi, Jurlind ; Jöris, Roman ; Volkamer, Melanie (2014)
Implementing and evaluating a software-independent voting system for polling station elections.
In: Journal of Information Security and Applications, 19 (2)
doi: 10.1016/j.jisa.2014.03.001
Article, Bibliographie
Bergmann, Clemens ; Canova, Gamze (2014)
Design, Implementation and Evaluation of an Anti-Phishing Education App.
Technische Universität Darmstadt
Master Thesis, Primary publication
Budurushi, Jurlind ; Woide, Marcel ; Volkamer, Melanie (2014)
Introducing Precautionary Behavior by Temporal Diversion of Voter Attention from Casting to Verifying their Vote.
San Diego
doi: 10.14722/usec.2014.23037
Conference or Workshop Item, Bibliographie
Boos, Carina ; Bartsch, Steffen ; Volkamer, Melanie (2014)
Rechtliche und technische Nutzerunterstützung bei der Button-Lösung.
In: Computer und Recht, (2)
doi: 10.9785/ovs-cr-2014-119
Article, Bibliographie
Bartsch, Steffen ; Boos, Carina ; Dyck, Dominic ; Schwarz, Christopher ; Theuerling, Heike ; Henhapl, Birgit ; Volkamer, Melanie (2014)
Unterstützung für ein risikobewusstes Verhalten im Internet.
Bremen
Conference or Workshop Item, Bibliographie
Bansarkhani, Rachid El ; Buchmann, Johannes
eds.: Pointcheval, David ; Vergnaud, Damien (2014)
Towards Lattice Based Sequential Aggregate Signatures.
Marrakesh, Morocco
Conference or Workshop Item, Bibliographie
Bansarkhani, Rachid El ; Buchmann, Johannes (2014)
LCPR: High Performance Compression Algorithm for Lattice-Based Signatures and Schnorr-like Constructions.
Conference or Workshop Item, Bibliographie
Buchmann, Johannes ; Neumann, Stephan (2014)
Tauglichkeit von Common Criteria-Schutzprofilen für Internetwahlen in Deutschland.
In: Datenschutz und Datensicherheit - DuD, 38 (2)
Article, Bibliographie
Buchmann, Johannes ; Karatsiolis, Evangelos ; Wiesmaier, Alexander (2013)
Introduction to Public Key Infrastructures.
Book, Bibliographie
Braun, Johannes ; Kiefer, Franziskus ; Hülsing, Andreas
eds.: Katsikas, Sokratis ; Agudo, Isaac (2013)
Revocation & Non-Repudiation: When the first destroys the latter.
RHUL, Egham, UK
doi: 10.1007/978-3-642-53997-8_3
Conference or Workshop Item, Bibliographie
Buchmann, Johannes ; Nebel, Maxi ; Roßnagel, Alexander ; Shirazi, Fatemeh ; Simo, Hervais ; Waidner, Michael
ed.: Hildebrandt, Mireille (2013)
Personal Information Dashboard: Putting the Individual Back in Control.
In: Digital Enlightenment Yearbook 2013
doi: 10.3233/978-1-61499-295-0-139
Book Section, Bibliographie
Braun, Johannes ; Volk, Florian ; Buchmann, Johannes ; Mühlhäuser, Max
eds.: Katsikas, Sokrates K. ; Agudo, Isaac (2013)
Trust Views for the Web PKI.
10th European Workshopon Public Key Infrastructures, Services and Applications (EuroPKI 2013). Egham, United Kingdom (12.09.2013-13.09.2013)
Conference or Workshop Item, Bibliographie
Bouyukliev, Iliya ; Bulygin, Stanislav ; Martínez-Moro, Edgar
eds.: Bouyukliev, Iliya ; Bulygin, Stanislav ; Martínez-Moro, Edgar (2013)
Foreword: computer algebra in coding theory and cryptography.
In: Applicable Algebra in Engineering, Communication and Computing
doi: 10.1007/s00200-013-0199-7
Book Section, Bibliographie
Bansarkhani, Rachid El ; Buchmann, Johannes
eds.: Lange, Tanja ; Lauter, Kristin ; Lisonek, Petr (2013)
Improvement and Efficient Implementation of a Lattice-based Signature Scheme.
Simon Fraser University, Burnaby, British Columbia, Canada
Conference or Workshop Item, Bibliographie
Braden, Kjell (2013)
XML Advanced Electronic Signatures and XML Evidence Record Syntax for Long-Term Protection of Data objects.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Bernhard, David ; Neumann, Stephan ; Volkamer, Melanie
eds.: Schneider, Steve ; Heather, James ; Teague, Vanessa (2013)
Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs.
University of Surrey, Guildford, UK
Conference or Workshop Item, Bibliographie
Budurushi, Jurlind ; Neumann, Stephan ; Olembo, Maina ; Volkamer, Melanie
eds.: Pernul, Günther ; Sandhu, Ravi (2013)
Pretty Understandable Democracy - A Secure and Understandable Internet Voting Scheme.
University of Regensburg, Germany
Conference or Workshop Item, Bibliographie
Budurushi, Jurlind ; Henning, Maria ; Volkamer, Melanie
eds.: Schneider, Steve ; Heather, James ; Teague, Vanessa (2013)
Vote Casting in Any Preferred Constituency: A New Voting Channel.
University of Surrey, Guildford, UK
Conference or Workshop Item, Bibliographie
Bartsch, Steffen ; Berger, Bernhard ; Bunke, Michaela ; Sohr, Karsten
eds.: Pernul, Günther ; Sandhu, Ravi (2013)
The Transitivity-of-Trust Problem in Android Application Interaction.
University of Surrey, Guildford, UK
Conference or Workshop Item, Bibliographie
Bartsch, Steffen ; Volkamer, Melanie ; Theuerling, Heike ; Karayumak, Fatih
ed.: Huth, Michael (2013)
Contextualized Web warnings, and how they cause distrust.
TRUST 2013. London, UK (17.06.2013-19.06.2013)
Conference or Workshop Item, Bibliographie
Baumöller, Claas ; Schaaf, Joachim ; Horsch, Moritz ; Wiesmaier, Alexander ; Braun, Johannes (2013)
Identification element-based authentication and identification with decentralised service use.
Norm, patent, standard, Bibliographie
Buchmann, Johannes ; Demirel, Denise ; Graaf, Jeroen van de
ed.: Sadeghi, Ahmad-Reza (2013)
Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy.
Conference or Workshop Item, Bibliographie
Braun, Johannes ; Horsch, Moritz ; Hülsing, Andreas (2013)
Effiziente Umsetzung des Kettenmodells unter Verwendung vorwärtssicherer Signaturverfahren.
Bonn
Conference or Workshop Item, Bibliographie
Bulygin, Stanislav ; Walter, Michael ; Buchmann, Johannes
ed.: Dawson, E. (2013)
Many weak keys for PRINTcipher: fast key recovery and countermeasures.
Conference or Workshop Item, Bibliographie
Braun, Johannes ; Wiesmaier, Alexander ; Buchmann, Johannes
ed.: Sprague, Ralph H. (2013)
On the Security of Encrypted Secret Sharing.
Grand Wailea, Maui, Hawaii
doi: 10.1109/HICSS.2013.426
Conference or Workshop Item, Bibliographie
Bulygin, Stanislav ; Walter, Michael ; Buchmann, Johannes (2013)
Full analysis of PRINTcipher with respect to invariant subspace attack: efficient key recovery and countermeasures.
In: Designs, Codes, and Cryptography 73(3)
doi: 10.1007/s10623-013-9840-5
Article, Bibliographie
Buchmann, Johannes ; Dahmen, Erik ; Ereth, Sarah ; Hülsing, Andreas ; Rückert, Markus (2013)
On the security of the Winternitz one-time signature scheme.
In: International Journal of Applied Cryptography, 3 (1)
Article, Bibliographie
Buchmann, Johannes ; Cabarcas, Daniel ; Göpfert, Florian ; Hülsing, Andreas ; Weiden, Patrick
eds.: Lange, Tanja ; Lauter, Kristin ; Lisonek, Petr (2013)
Discrete Ziggurat: A Time-Memory Trade-off for Sampling from a Gaussian Distribution over the Integers.
Simon Fraser University, Burnaby, British Columbia, Canada
Conference or Workshop Item, Bibliographie
Braun, Johannes ; Rynkowski, Gregor (2013)
The Potential of an Individualized Set of trusted CAs: Defending against CA Failures in the Web PKI.
Washington D.C., USA
doi: 10.1109/SocialCom.2013.90
Conference or Workshop Item, Bibliographie
Bansarkhani, Rachid El ; Cabarcas, Daniel ; Kuo, Po-Chun ; Schmidt, Patrick ; Schneider, Michael (2012)
A Selection of Recent lattice-Based Signature and Encryption Schemes.
In: Tatra Mountains Mathematical Publications, 53
Article, Bibliographie
Braun, Johannes ; Hülsing, Andreas ; Wiesmaier, Alexander (2012)
Schlanke Infrastrukturen für den digitalen Rechtsverkehr - Vorwärtssichere Verfahren für qualifizierte elektronische Signaturen.
Report, Bibliographie
Braun, Johannes ; Horsch, Moritz ; Wiesmaier, Alexander
eds.: Ryan, Mark ; Smyth, Ben ; Wang, Guilin (2012)
iPIN and mTAN for secure eID applications.
Hangzhou, China
doi: 10.1007/978-3-642-29101-2_18
Conference or Workshop Item, Bibliographie
Braun, Johannes ; Hülsing, Andreas ; Wiesmaier, Alexander ; Vigil, Martín ; Buchmann, Johannes
eds.: De Capitani di Vimercati, Sabrina ; Mitchell, Chris (2012)
How to avoid the Breakdown of Public Key Infrastructures - Forward Secure Signatures for Certificate Authorities.
Pisa, Italy
Conference or Workshop Item, Bibliographie
Bär, Daniel ; Biemann, Chris ; Gurevych, Iryna ; Zesch, Torsten (2012)
UKP: Computing Semantic Textual Similarity by Combining Multiple Content Similarity Measures.
Conference or Workshop Item, Bibliographie
Braun, Johannes ; Buchmann, Johannes
eds.: Levi, Albert ; Badra, Mohamad ; Cesana, Matteo ; Ghassemian, Mona ; Jabeur, Nafaa ; Klonowski, Marek ; Mana, Antonio ; Sargento, Susana ; Zeadally, Sherali (2012)
Perfect Confidentiality Network - A solution for information theoretically secure key agreement.
Istanbul, Turkey
doi: 10.1109/NTMS.2012.6208676
Conference or Workshop Item, Bibliographie
Bartsch, Steffen (2012)
Policy Override in Practice: Model, Evaluation, and Decision Support.
In: Security and Communication Networks
doi: 10.1002/sec.547
Article, Bibliographie
Bartsch, Steffen ; Sasse, Angela (2012)
How Users Bypass Access Control and Why: The Impact of Authorization Problems on Individuals and the Organization.
Report, Bibliographie
Busold, Christoph (2012)
Hash-based Signatures on Smart Cards.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Bulygin, Stanislav ; Walter, Michael (2012)
Study of the invariant coset attack on PRINTcipher: more weak keys with practical key recovery.
Report, Bibliographie
Bansarkhani, Rachid El ; Meziani, Mohammed (2012)
An Efficient Lattice-based Secret Sharing Construction.
London, UK
Conference or Workshop Item, Bibliographie
Bartsch, Steffen ; Sohr, Karsten ; Bunke, Michaela ; Hofrichter, Oliver ; Berger, Bernhard (2012)
The Transitivity of Trust Problem in the Interaction of Android Applications.
doi: 10.1109/ARES.2013.39
Report, Bibliographie
Bartsch, Steffen ; Sasse, Angela (2012)
How Users Bypass Access Control – and Why: The Impact of Authorization Problems on Individuals and the Organization.
London, UK
Conference or Workshop Item, Bibliographie
Bartsch, Steffen ; Sasse, Angela
eds.: Ossowski, Sascha ; Lecca, Paola (2012)
Guiding Decisions on Authorization Policies: A Participatory Approach to Decision Support.
Trento, Italy
doi: 10.1145/2245276.2232015
Conference or Workshop Item, Bibliographie
Bulygin, Stanislav ; Buchmann, Johannes
eds.: Lin, Dongdai ; Tsudik, Gene ; Wang, Xiaoyun (2011)
Algebraic cryptanalysis of the round-reduced and side channel analysis of the full PRINTCipher-48.
Sanya, China
Conference or Workshop Item, Bibliographie
Buchmann, Johannes ; Dahmen, Erik ; Hülsing, Andreas
ed.: Yang, Bo-Yin (2011)
XMSS - A Practical Forward Secure Signature Scheme based on Minimal Security Assumptions.
doi: 10.1007/978-3-642-25405-5_8
Conference or Workshop Item, Bibliographie
Braun, Johannes ; Horsch, Moritz ; Wiesmaier, Alexander ; Hühnlein, Detlef
eds.: Schartner, Peter ; Taeger, Jürgen (2011)
Mobile Authentisierung und Signatur.
Oldenburg
Conference or Workshop Item, Bibliographie
Braun, Johannes ; Wiesmaier, Alexander ; Klieme, Eric ; Strick, Linda ; Wunderlich, Wolfgang (2011)
Der elektronische Safe als vertrauenswürdiger Cloud Service.
Report, Bibliographie
Bartsch, Steffen (2011)
Exploring Twisted Paths: Analyzing Authorization Processes in Organizations.
Milan, Italy
doi: 10.1109/ICNSS.2011.6060003
Conference or Workshop Item, Bibliographie
Bartsch, Steffen (2011)
Practitioners Perspectives on Security in Agile Development.
Vienna, Austria
doi: 10.1109/ARES.2011.82
Conference or Workshop Item, Bibliographie
Buchmann, Johannes ; Dahmen, Erik ; Ereth, Sarah ; Hülsing, Andreas ; Rückert, Markus
eds.: Nitaj, Abderrahmane ; Pointcheval, David (2011)
On the security of the Winternitz one-time signature scheme.
Dakar, Senegal
doi: 10.1007/978-3-642-21969-6_23
Conference or Workshop Item, Bibliographie
Bartsch, Steffen (2011)
An Authorization Enforcement Usability Case Study.
Madrid, Spain
doi: 10.1007/978-3-642-19125-1_16
Conference or Workshop Item, Bibliographie
Bansarkhani, Rachid El (2010)
Solving Lattice Problems with Voronoi Cells.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Bulygin, Stanislav ; Petzoldt, Albrecht ; Buchmann, Johannes
eds.: Gong, G. ; Gupta, K. C. (2010)
Towards provable security of the Unbalanced Oil and Vinegar signature scheme under direct attacks.
Conference or Workshop Item, Bibliographie
Bartsch, Steffen (2010)
A calculus for the qualitative risk assessment of policy override authorization.
Taganrog, Rostov-on-Don, Russian Federation
doi: 10.1145/1854099.1854115
Conference or Workshop Item, Bibliographie
Buchmann, Johannes ; Cabarcas, Daniel ; Ding, Jintai ; Mohamed, Mohamed Saied Emam
eds.: Bernstein, Daniel ; Lange, Tanja (2010)
Flexible Partial Enlargement to Accelerate Gröbner Basis Computation over F_2.
Stellenbosch, South Africa
Conference or Workshop Item, Bibliographie
Buchmann, Johannes ; Wiesmaier, Alexander (2010)
Eine kurze Geschichte der Schlüssel.
In: 360° -- Fachmagazin für das Management im öffentlichen Sektor, (17)
Article, Bibliographie
Belhilali, Mohamed (2010)
Entwurf und Implementierung von SCVP in Java - Simple Certificate Validation Protocol.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Bartsch, Steffen (2010)
Supporting Authorization Policy Modification in Agile Development of {Web} Applications.
Krakow, Poland
doi: 10.1109/ARES.2010.19
Conference or Workshop Item, Bibliographie
Backs, Christian (2010)
Anbindung eines externen Authentifizierungsdienstes an ein Online-Wahlsystem.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Barreto, Paulo ; Cayrel, Pierre-Louis ; Misoczki, Rafael ; Niebuhr, Robert (2010)
Quasi-dyadic CFS signatures.
Conference or Workshop Item, Bibliographie
Buchmann, Johannes (2010)
Einführung in die Kryptographie / Introduction to Cryptography.
Book, Bibliographie
Buchmann, Johannes ; Braun, Johannes ; Horsch, Moritz ; Hühnlein, Detlef ; Kiefer, Franziskus ; Strenzke, Falko ; Wiesmaier, Alexander (2010)
Towards a mobile eCard Client.
Darmstadt
Conference or Workshop Item, Bibliographie
Braun, Johannes (2009)
Nutzung des elektronischen Personalausweises im eCommerce.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie
Buchmann, Johannes ; Lindner, Richard (2009)
Secure Parameters for SWIFFT.
Conference or Workshop Item, Bibliographie
Buchmann, Johannes ; Roßnagel, Alexander (2009)
Das Bundesverfassungsgericht und Telemedienwahlen.
In: K&R, 9
Article, Bibliographie
Buchmann, Johannes ; Karatsiolis, Vangelis (2009)
Notification Services for the Server-Based Certificate Validation Protocol.
In: Int'l J. of Communications, Network and System Sciences, 2 (5)
doi: 10.4236/ijcns.2009.25042
Article, Bibliographie
Beck, Martin ; Tews, Erik (2009)
Practical attacks against WEP and WPA.
Conference or Workshop Item, Bibliographie
Bartsch, Steffen ; Sohr, Karsten ; Bormann, Carsten (2009)
Supporting Agile Development of Authorization Rules for SME Applications.
Orlando, FL, USA
doi: 10.1007/978-3-642-03354-4_35
Conference or Workshop Item, Bibliographie
Buchmann, Johannes ; Lindner, Richard ; Rückert, Markus ; Schneider, Michael (2009)
Post-quantum cryptography: lattice signatures.
In: Special Issue of Computing (CECC 2008)
Article, Bibliographie
Bergner, Martin (2008)
Minimale Voraussetzungen für blinde Signaturen.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Biadatz, Adalbert (2008)
Server gesteuerte Chipkarten Aktualisierung.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Brandl, Andreas (2008)
Implementierung eines
Responders für
CMP over HTTP zur Erstellung von CV- und X.509 Zertifikaten im
Umfeld der elektronischen Gesundheitskarte.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Buchmann, Johannes ; Lindner, Richard ; Rückert, Markus
eds.: Buchmann, Johannes ; Ding, Jintai (2008)
Explicit Hard Instances of the Shortest Vector Problem.
Conference or Workshop Item, Bibliographie
Buchmann, Johannes ; Döring, Martin ; Lindner, Richard (2008)
Efficiency Improvement for {NTRU}.
Saarbrücken
Conference or Workshop Item, Bibliographie
Bartsch, Steffen ; Bormann, Carsten
ed.: Horster, Patrick (2008)
Berechtigungsmodellierung im Geschäftsprozessmanagement von KMU.
Conference or Workshop Item, Bibliographie
Buchmann, Johannes ; Dahmen, Erik ; Schneider, Michael
eds.: Buchmann, Johannes ; Ding, Jintai (2008)
Merkle Tree Traversal Revisited.
Conference or Workshop Item, Bibliographie
Buchmann, Johannes ; Dahmen, Erik ; Klintsevich, Elena ; Okeya, Katsuyuki ; Vuillaume, Camille (2007)
Merkle Signatures with Virtually Unlimited Signature
Capacity.
doi: 10.1007/978-3-540-72738-5_3
Conference or Workshop Item, Bibliographie
Becker, Jochen (2007)
Kommunikation in einem Trustcenter
Intra Trustcenter Protocol Version 1.2 Entwurf und Design.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Bennani, Younes (2007)
Optimierung de Flexsecures Online
Certificate Status Protocol.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Blume, Sebastian (2007)
Efficient Java Implementation of
GMSS.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Borisova, Zornitsa (2007)
Rankin Lattice Reduction for
Programmers.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Buchmann, Johannes ; Vollmer, Ulrich (2007)
Binary Quadratic Forms. An Algorithmic
Approach.
Book, Bibliographie
Buchmann, Johannes ; Garcia, Luis Carlos Coronado ; Dahmen, Erik ; Döring, Martin ; Klintsevich, Elena (2006)
{CMSS} - An Improved Merkle Signature
Scheme.
doi: 10.1007/11941378_25
Conference or Workshop Item, Bibliographie
Buchmann, Johannes ; Ludwig, Christoph (2006)
Practical Lattice Basis Sampling
Reduction.
Berlin
doi: 10.1007/11792086_17
Conference or Workshop Item, Bibliographie
Buchmann, Johannes ; Pyshkin, Andrei ; Weinmann, Ralf-Philipp (2006)
Block Ciphers Sensitive to Gröbner Basis Attacks.
Conference or Workshop Item, Bibliographie
Buchmann, Johannes ; Pyshkin, Andrei ; Weinmann, Ralf-Philipp (2006)
A Zero-Dimensional Gröbner Basis for AES-128.
13th International Workshop, FSE 2006. Graz (15.03.2006-17.03.2006)
Conference or Workshop Item, Bibliographie
Becker, Anja (2006)
Methods of Fault Analysis Attacks on
Elliptic Curve Cryptosystems.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Buchmann, Johannes ; Vollmer, Ulrich (2006)
CLC2006 - Workshop on Codes and Lattices in Cryptography.
Other, Bibliographie
Buchmann, Johannes ; May, Alexander ; Vollmer, Ulrich (2006)
Perspectives for cryptographic long-term security.
In: >Commun. ACM, 49 (9)
doi: 10.1145/1151030.1151055
Article, Bibliographie
Buchmann, Johannes (2006)
Passwörter oder Smartcards zur Absicherung von Portalen?
Report, Bibliographie
Buchmann, Johannes ; Dahmen, Erik ; May, Alexander ; Vollmer, Ulrich (2006)
Krypto 2020.
In: >The Information Security Journal -(KES), 5
Article, Bibliographie
Buchmann, Johannes ; May, Alexander ; Vollmer, Ulrich (2006)
Perspectives for cryptographic
long-term security.
In: >Commun. ACM, 49 (9)
Article, Bibliographie
Buchmann, Johannes ; Vollmer, Ulrich (2006)
A Terr algorithm for computations in the infrastructure of real-quadratic number fields.
In: >Journal de Théorie des Nombres de Bordeaux, 18 (3)
Article, Bibliographie
Baier, Harald ; Straub, Tobias (2005)
Awareness by Doing. Ein neues Konzept
zur Sensibilisierung von {IT}-Anwendern.
Other, Bibliographie
Bakuri, Harini (2005)
Security Analysis and Implementation
of Password-based Cryptosystem.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Buchmann, Johannes ; Coronado, Carlos ; Döring, Martin ; Engelbert, Daniela ; Ludwig, Christoph ; Overbeck, Raphael ; Schmidt, Arthur ; Vollmer, Ulrich ; Weinmann, Ralf-Philipp (2004)
Post-Quantum Signatures.
In: Cryptology ePrint Archive, 2004 (297)
Article, Bibliographie
Baier, Harald ; Ruppert, Markus (2004)
Interoperable and Flexible Digital
Signatures for {E-Government} and {E-Commerce}.
Report, Bibliographie
Biehl, Ingrid ; Paulus, Sachar ; Takagi, Tsuyoshi (2004)
Efficient Undeniable Signature Schemes
Based on Ideal Arithmetic in Quadratic Orders.
In: >IJDCC: Designs, Codes and Cryptography, 31 (2)
Article, Bibliographie
Buchmann, Johannes ; Takagi, Tsuyoshi ; Vollmer, Ulrich (2004)
Number field cryptography.
Conference or Workshop Item, Bibliographie
Baier, Harald ; Buchmann, Johannes ; Busch, Christoph (2003)
Aus- und Weiterbildung in IT-Sicherheit.
Conference or Workshop Item, Bibliographie
Baier, Harald (2003)
A Fast {Java} Implementation of a Provably Secure Pseudo Random Bit Generator Based on the Elliptic Curve Discrete Logarithm Problem.
Report, Bibliographie
Baier, Harald ; Buchmann, Johannes ; Busch, Christoph (2003)
{Aus-} und Weiterbildung in
{IT}-Sicherheit.
Report, Bibliographie
Baier, Harald ; Köhler, Günter (2003)
How to Compute the Coefficients of the
Elliptic Modular Function {j(z)}.
Report, Bibliographie
Barraci, Nima ; Becker, Sven (2003)
Generische Integration von
Kryptoprozessoren in den {Java}-basierten {FlexiProvider}.
Other, Bibliographie
Buchmann, Johannes ; Schmidt, Arthur (2003)
Computing the structure of a finite
abelian group.
Report, Bibliographie
Buchmann, Johannes ; Takagi, Tsuyoshi (2003)
Kryptographie - Chancen und Risiken.
Report, Bibliographie
Buchmann, Johannes ; Takagi, Tsuyoshi ; Vollmer, Ulrich (2003)
Number field cryptography.
Report, Bibliographie
Buchmann, Johannes ; Sakurai, Kouichi ; Takagi, Tsuyoshi (2002)
An IND-CCA2 Public-Key Cryptosystem with Fast Decryption.
Seoul, Korea
Conference or Workshop Item, Bibliographie
Buchmann, Johannes ; Ernst, Markus ; Henhapl, Birgit ; Huss, Sorin (2002)
Elliptische Kurven Kryptographie - hocheffizient und portabel.
In: >thema FORSCHUNG, Eingebette Systeme: Entwurf und Anwendung versteckter Computer, (1/2002)
Article, Bibliographie
Buchmann, Johannes (2002)
Theoretische Informatik.
In: 30 Jahre Informatik an deutschen Hochschulen: Festschrift
Book Section, Bibliographie
Baier, Harald (2002)
Efficient Algorithms for Generating Elliptic Curves over Finite Fields Suitable for Use in Cryptography.
Technische Universität Darmstadt
Ph.D. Thesis, Bibliographie
Biehl, Ingrid ; Buchmann, Johannes ; Hamdy, Safuat ; Meyer, Andreas (2002)
A Signature Scheme Based on the
Intractability of Computing Roots.
In: >Des. Codes Cryptography, 25 (3)
Article, Bibliographie
Buchmann, Johannes (2002)
Cryptographic Protocols.
Other, Bibliographie
Baier, Harald (2001)
Elliptic Curves of Prime Order over
Optimal Extension Fields for Use in Cryptography.
Chennai, India
Conference or Workshop Item, Bibliographie
Buchmann, Johannes ; Hamdy, S. (2001)
A survey on IQ cryptography.
In: Public-key cryptography and computational number theory
Book Section, Bibliographie
Baier, Harald (2001)
Efficient Computation of Fourier
Series and Singular Moduli with Application in Cryptography.
Report, Bibliographie
Baier, Harald (2001)
Elliptic Curves of Prime Order over
Optimal Extension Fields for Use in Cryptography.
Report, Bibliographie
Baier, Harald ; Buchmann, Johannes (2001)
Efficient Construction of
Cryptographically Strong Elliptic Curves.
Report, Bibliographie
Buchmann, Johannes (2001)
Wie sicher kann Sicherheit sein?
Report, Bibliographie
Buchmann, Johannes ; Hamdy, Safuat (2001)
A Survey on {IQ} Cryptography.
Report, Bibliographie
Buchmann, Johannes ; Sakurai, Kouichi ; Takagi, Tsuyoshi (2001)
An {IND-CCA2} Public-Key Cryptosystem
with Fast Decryption.
Report, Bibliographie
Baier, Harald ; Buchmann, Johannes (2000)
Efficient Construction of
Cryptographically Strong Elliptic Curves.
Calcutta, India
Conference or Workshop Item, Bibliographie
Baier, Harald ; Buchmann, Johannes (2000)
Efficient construction of cryptographically strong elliptic curves.
In: Progress in cryptology: INDOCRYPT 2000
Book Section, Bibliographie
Buchmann, Johannes ; Maurer, M. ; Möller, B. (2000)
Cryptography based on number fields with large regulator.
In: Journal de théorie des nombres de Bordeaux, 12
Article, Bibliographie
Biehl, Ingrid ; Buchmann, Johannes ; Hamdy, Safuat ; Meyer, Andreas (2000)
A Signature Scheme Based on the
Intractability of Computing Roots.
Report, Bibliographie
Buchmann, Johannes ; Maurer, Markus ; Möller, Bodo (2000)
Cryptography Based on Number Fields
with Large Regulator.
Report, Bibliographie
Buchmann, Johannes ; Squirrel, D. (1999)
Kernels of integer matrices via modular arithmetic.
Book, Bibliographie
Buchmann, Johannes ; Ruppert, M. ; Tak, M. (1999)
FlexiPKI - Realisierung einer flexiblen Public-Key-Infrastruktur.
Book, Bibliographie
Biehl, Ingrid ; Buchmann, Johannes ; Hamdy, Safuat ; Meyer, Andreas (1999)
Cryptographic Protocols Based on Intractability of Extracting Roots and Computing Discrete Logarithms.
Report, Bibliographie
Biehl, Ingrid ; Paulus, Sachar ; Takagi, Tsuyoshi (1999)
Efficient Undeniable Signature Schemes
based on Ideal Arithmetic in Quadratic Orders.
Report, Bibliographie
Binisik, Emre (1999)
Sieben in Zahlkörpern und
Funktionenkörpern.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie
Boivin, Michele (1999)
Anwendung hyperelliptischer Kurven in
der Kryptographie.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie
Breuning, Manuel (1999)
Eine topologische Struktur für die
Idealgruppe.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie
Buchmann, Johannes ; Eisenbrand, Friedrich (1999)
On factor refinement in number
fields.
In: >Mathematics of Computation, 68 (225)
Article, Bibliographie
Buchmann, Johannes ; Maurer, Markus (1999)
Wie sicher ist die
Public-Key-Kryptographie.
Report, Bibliographie
Buchmann, Johannes ; Ruppert, Markus ; Tak, Markus (1999)
{FlexiPKI} - Realisierung einer
flexiblen Public-Key-Infrastruktur.
Report, Bibliographie
Buchmann, Johannes ; Squirrel, Douglas (1999)
Kernels of Integer Matrices via
Modular Arithmetic.
Report, Bibliographie
Budnick, Michael (1999)
Zur Reduktion des {DL}-Problems für elliptische Kurven auf das {DL}-Problem in endlichen Körpern.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie
Backes, Werner (1998)
Berechnung kürzester
Gittervektoren.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie
Buchmann, Johannes ; Jacobson, Michael J. ; Neis, Stefan ; Theobald, Patrick ; Weber, Damian (1998)
Sieving Methods for Class Group
Computation.
Report, Bibliographie
Buchmann, Johannes ; Maurer, Markus (1998)
Approximate Evaluation of
{L(1,chi-delta)}.
Report, Bibliographie
Buchmann, Johannes ; Weber, Damian (1998)
Discrete Logarithms: Recent Progress.
Report, Bibliographie
Buchmann, Johannes ; Paulus, Sachar (1997)
A One Way Function Based on Ideal
Arithmetic in Number Fields.
Santa Barbara, California, USA
Conference or Workshop Item, Bibliographie
Buchmann, Johannes ; Paulus, S. (1997)
A one way function based on ideal arithmetic in number fields.
Book, Bibliographie
Biehl, Ingrid ; Buchmann, Johannes (1997)
An analysis of the reduction
algorithms for binary quadratic forms.
Report, Bibliographie
Buchmann, Johannes ; Jacobson, Michael J. ; Teske, Edlyn (1997)
On some computational problems in
finite abelian groups.
In: >Mathematics in Computation, 66 (220)
Article, Bibliographie
Buchmann, Johannes ; Paulus, Sachar (1997)
A one way function based on ideal
arithmetic in number fields.
Report, Bibliographie
Buchmann, Johannes ; Eisenbrand, F. (1996)
On factor refinement in number fields.
Book, Bibliographie
Buchmann, Johannes ; Neis, S. (1996)
Algorithms for linear algebra problems over principal ideal rings.
Book, Bibliographie
Buchmann, Johannes ; Jacobson, M. J. ; Teske, E. (1996)
On some computational problems in finite abelian groups.
Book, Bibliographie
Biehl, Ingrid ; Meyer, Bernd (1996)
Protocols for Collusion-Secure
Asymmetric Fingerprintig.
Report, Bibliographie
Buchmann, Johannes ; Eisenbrand, Friedrich (1996)
On Factor Refinement in Number
Fields.
Report, Bibliographie
Buchmann, Johannes ; Jacobson, Michael J. ; Teske, Edlyn (1996)
On some computational problems in
finite abelian groups.
Report, Bibliographie
Buchmann, Johannes ; Neis, Stefan (1996)
Algorithms for Linear Algebra Problems
over Principal Ideal Rings.
Report, Bibliographie
Bentz, Patrik (1995)
Eine effiziente Implementierung der
verbesserten Buchberger Algorithmen und eine Datenstruktur für Polynome in mehreren Veründerlichen.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie
Biehl, Ingrid ; Buchmann, Johannes ; Thiel, Christoph (1994)
Cryptographic Protocols Based on
Discrete Logarithms in Real-quadratic Orders.
Santa Barbara, California, USA
Conference or Workshop Item, Bibliographie
Buchmann, Johannes ; Loho, Jürgen ; Zayer, Jörg (1994)
An Implementation of the General
Number Field Sieve.
Santa Barbara, California, USA
Conference or Workshop Item, Bibliographie
Biehl, Ingrid (1994)
Definition and Existence of Super
Complexity Cores.
Beijing, P. R. China
Conference or Workshop Item, Bibliographie
Buchmann, Johannes (1994)
Reducing lattice bases by means of
approximations.
Talence, France
Conference or Workshop Item, Bibliographie
Biehl, Ingrid ; Buchmann, Johannes (1994)
Algorithms for quadratic orders.
In: >Mathematics of Computation
Article, Bibliographie
Buchmann, Johannes ; Lenstra, Hendrik W. (1994)
Approximating rings of integers in
number fields.
In: >Journal de Théorie des Nombres de Bordeaux, 6 (2)
Article, Bibliographie
Bartholomes, Jutta (1993)
Gitterbasisreduktion im Reellen.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie
Berger, Franz-Dieter (1993)
ECM - Faktorisieren mit elliptischen Kurven.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie
Biehl, Ingrid (1993)
Eine Grundlegung der Average-Case Komplexitätstheorie.
Universität des Saarlandes
Ph.D. Thesis, Bibliographie
Buchmann, Johannes ; Hollinger, Christine (1993)
On smooth ideals in number fields.
In: >Journal of Number Theory
Article, Bibliographie
Buchmann, Johannes ; Paulus, Sachar (1993)
Algorithms for finite abelian groups.
Other, Bibliographie
Biehl, Ingrid ; Buchmann, Johannes ; Meyer, Bernd ; Thiel, Christian ; Thiel, Christoph (1992)
Tools for Proving Zero Knowledge.
Balatonfüred, Hungary
Conference or Workshop Item, Bibliographie
Buchmann, Johannes ; Kessler, Volker (1992)
Computing a reduced lattice basis from
a generating system.
Other, Bibliographie
Buchmann, Johannes ; Sprang, Oliver van (1992)
On short representations of orders and
number fields.
Other, Bibliographie
Buchmann, Johannes ; Thiel, Christoph ; Williams, Hugh (1992)
Short representations of quadratic
integers.
Other, Bibliographie
Buchmann, Johannes (1991)
Number Theoretic Algorithms and
Cryptology.
Gosen, Germany
Conference or Workshop Item, Bibliographie
Buchmann, Johannes ; Düllmann, Stephan (1991)
On the Computation of Discrete
Logarithms in Class Groups.
Santa Barbara, California, USA
Conference or Workshop Item, Bibliographie
Buchmann, Johannes ; Düllmann, Stephan (1991)
Distributed class group computation.
Other, Bibliographie
Buchmann, Johannes ; Müller, Volker (1991)
Computing the number of points on
elliptic curves over finite prime fields.
Conference or Workshop Item, Bibliographie
Buchmann, Johannes ; Roth, Ralf ; Diehl, Matthias (1991)
{LiPS}: A System for distributed
applications.
Other, Bibliographie
Buchmann, Johannes ; Williams, Hugh (1991)
Some remarks concerning the complexity
of computing class groups of quadratic fields.
In: >Journal of Complexity, 7 (3)
doi: 10.1016/0885-064X(91)90039-Z
Article, Bibliographie
Buchmann, Johannes (1990)
A subexponential algorithm for the determination of class groups and regulators of algebraic number fields.
Conference or Workshop Item, Bibliographie
Buchmann, Johannes ; Shoup, Victor (1990)
Constructing Nonresidues in Finite
Fields and the Extended Riemann Hypothesis.
Other, Bibliographie
Buchmann, Johannes ; Düllmann, Stephan ; Williams, Hugh (1989)
On the Complexity and Efficiency of a
New Key Exchange System.
Houthalen, Belgium
Conference or Workshop Item, Bibliographie
C
Cremers, Cas ; Düzlü, Samed ; Fiedler, Rune ; Fischlin, Marc ; Janson, Christian (2021)
BUFFing signature schemes beyond unforgeability and the case of post-quantum signature.
42nd IEEE Symposium on Security and Privacy. virtual Conference (23.05.2021-27.05.2021)
Conference or Workshop Item, Bibliographie
Coudert, Fanny ; Butin, Denis ; Métayer, Daniel Le (2015)
Body-worn Cameras for Police Accountability: Opportunities and Risks.
In: Computer Law & Security Review (CLSR), 31 (6)
Article, Bibliographie
Cabarcas, Daniel ; Demirel, Denise ; Göpfert, Florian ; Lancrenon, Jean ; Wunderer, Thomas (2015)
An Unconditionally Hiding and Long-Term Binding Post-Quantum Commitment Scheme.
Report, Bibliographie
Canova, Gamze ; Volkamer, Melanie ; Bergmann, Clemens ; Borza, Roland ; Reinheimer, Benjamin ; Stockhardt, Simon ; Tenberg, Ralf (2015)
Learn To Spot Phishing URLs with the Android NoPhish App.
Hamburg, Germany
doi: 10.1007/978-3-319-18500-2_8
Conference or Workshop Item, Bibliographie
Canova, Gamze ; Volkamer, Melanie ; Bergmann, Clemens ; Reinheimer, Benjamin (2015)
NoPhish App Evaluation: Lab and Retention Study.
San Diego
Conference or Workshop Item, Bibliographie
Classen, Jiska ; Braun, Johannes ; Volk, Florian ; Hollick, Matthias ; Buchmann, Johannes ; Mühlhäuser, Max (2015)
A Distributed Reputation System for Certification Authority Trust Management.
Helsinki, Finland
Conference or Workshop Item, Bibliographie
Charfi, Ahmed (2014)
SAT-solving in Algebraic cryptanalysis.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Canova, Gamze ; Volkamer, Melanie ; Weiler, Simon (2014)
Poster: Password Entering and Transmission Security.
ACM SIGSAC Conference on Computer and Communications Security. Scottsdale, Arizona (03.11.2014-07.11.2014)
doi: 10.1145/2660267.2662387
Conference or Workshop Item, Bibliographie
Conrad, Bernd ; Shirazi, Fatemeh (2014)
Analyzing the Effectiveness of DoS Attacks on Tor.
Glasgow, UK
Conference or Workshop Item, Bibliographie
Canova, Gamze ; Volkamer, Melanie ; Bergmann, Clemens ; Borza, Roland
eds.: Mauw, Sjouke ; Jensen, Christian Damsgaard (2014)
NoPhish: An Anti-Phishing Education App.
Wroclaw, Poland
Conference or Workshop Item, Bibliographie
Conrad, Bernd ; Shirazi, Fatemeh (2014)
A Survey on Tor and I2P.
Paris, France
Conference or Workshop Item, Bibliographie
Cholakov, Kostadin ; Biemann, Chris ; Eckle-Kohler, Judith ; Gurevych, Iryna
eds.: Calzolari, Nicoletta ; Choukri, Khalid ; Declerck, Thierry ; Loftsson, Hrafn ; Maegaard, Bente ; Mariani, Joseph ; Moreno, Asuncion ; Odijk, Jan ; Piperidis, Stelios (2014)
Lexical Substitution Dataset for German.
Conference or Workshop Item, Bibliographie
Conrad, Bernd (2014)
Analyzing the Effectiveness of DoS Attacks on Tor.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Classen, Jiska (2014)
Reputation Systems for Trust Management in the Web PKI.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Cabarcas, Daniel ; Göpfert, Florian ; Weiden, Patrick (2013)
Provably Secure LWE-Encryption with Uniform Secret.
In: Cryptology ePrint Archive, 2013 (164)
Article, Bibliographie
Cayrel, Pierre-Louis ; Yousfi Alaoui, Sidi Mohamed el ; Véron, Pascal ; Hoffmann, Gerhard (2012)
An improved threshold ring signature scheme based on error correcting codes.
Conference or Workshop Item, Bibliographie
Cayrel, Pierre-Louis ; Yousfi Alaoui, Sidi Mohamed el ; Hoffmann, Gerhard ; Meziani, Mohammed ; Niebuhr, Robert
eds.: Kim, Tai-Hoon ; Adeli, Hojjat ; Robles, Rosslin John ; Balitanas, Maricel (2011)
Recent Progress in Code-Based Cryptography.
Brno University, Czech Republic
Conference or Workshop Item, Bibliographie
Cayrel, Pierre-Louis ; Yousfi Alaoui, Sidi Mohamed el ; Günther, Felix ; Hoffmann, Gerhard ; Rothe, Holger (2011)
Efficient implementation of code-based identification/signature schemes.
In: WEWoRC 2011
Article, Bibliographie
Cayrel, Pierre-Louis ; Hoffmann, Gerhard ; Schneider, Michael (2011)
GPU Implementation of the Keccak Hash Function Family.
Brno University, Czech Republic
Conference or Workshop Item, Bibliographie
Cayrel, Pierre-Louis ; Hoffmann, Gerhard ; Schneider, Michael (2011)
GPU Implementation of the Keccak Hash Function Family.
Brno University, Czech Republic
Conference or Workshop Item, Bibliographie
Cayrel, Pierre-Louis ; Lindner, Richard ; Rückert, Markus ; Silva, Rosemberg (2010)
Improved Zero-knowledge Identification with Lattices.
Malacca, Malaysia (13.10.2010-15.10.2010)
Conference or Workshop Item, Bibliographie
Cayrel, Pierre-Louis ; Lindner, Richard ; Rückert, Markus ; Silva, Rosemberg (2010)
A Lattice-Based Threshold Ring Signature Scheme.
Puebla, Mexico (08.08.2010-11.08.2010)
Conference or Workshop Item, Bibliographie
Cayrel, Pierre-Louis ; Véron, Pascal ; Yousfi Alaoui, Sidi Mohamed el (2010)
A zero-knowledge identification scheme based on the q-ary Syndrome Decoding problem.
SAC2010
Conference or Workshop Item, Bibliographie
Cayrel, Pierre-Louis ; Yousfi Alaoui, Sidi Mohamed el (2010)
Dual Construction of Stern-based Signature Schemes.
Conference or Workshop Item, Bibliographie
Chehimi, Nemr (2009)
Gitterbasisreduktion in Java.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Cakir-Tas, Sueheyla (2008)
Symmetrische Blockchiffren.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Clos, Johannes (2008)
Secure Client Platforms for Remote
Internet Voting.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Chen, Jun (2007)
Verifiable Mixnets Techniques and
Prototype Implementation.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Coronado García, Luis Carlos (2006)
Provably Secure and Practical Signature Schemes.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication
Coronado, Carlos (2005)
Can Schönhage multiplication speed up the RSA decryption or encryption?
Conference or Workshop Item, Bibliographie
Coronado, Carlos (2005)
Improvements to the Merkle signature
scheme.
Conference or Workshop Item, Bibliographie
Caspary, Jan ; Weber, Martin (2001)
Hardwarebeschleunigung der
Punktmultiplikation über GF(2<sup>n</sup>) mit dem Elliptic Curve KryptoProzessor {(ECP)} am Beispiel des
{ECDSA}-Signaturverfahrens.
Other, Bibliographie
Coroama, Vlad ; Ruppert, Markus ; Seipel, Michael ; Tak, Markus (2001)
{Java}-basierte Kryptographie wird
interoperabel.
Report, Bibliographie
Coroama, Vlad (2000)
Flexible Anbindung von SmartCards an
eine {Java}-Sicherheitsinfrastruktur.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie
Carls, Robert (1999)
Punktezählalgorithmen für
ordinäre elliptische Kurven über endlichen Körpern der Charakteristik 2.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie
Crnjak, Markus (1999)
{ElG}amal-Verschlüsselung mit elliptischen Kurven über Körpern der Charakteristik größer 3.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
D
Degabriele, Jean Paul ; Janson, Christian ; Struck, Patrick (2019)
Sponges Resist Leakage: The Case of Authenticated Encryption.
25th Annual International Conference on the Theory and Application of Cryptology and Information Security. Kobe, Japan (08.12.2019-12.12.2019)
Conference or Workshop Item, Bibliographie
Demmler, Daniel ; Rindal, Peter ; Rosulek, Mike ; Trieu, Ni (2018)
PIR-PSI: Scaling Private Contact Discovery.
In: Proceedings on Privacy Enhancing Technologies (PoPETs)
doi: 10.1515/popets-2018-0037
Article, Bibliographie
Deligeorgopoulos, Efstathios (2018)
Evaluation of Proactive Secret Sharing for Long-Term Secure Storage.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Dietsch, Sascha Thorsten (2017)
Integration des gitterbasierten LARA-Verschlüsselungsverfahrens in JCA.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Demirel, Denise ; Krenn, Stephan ; Loruenser, Thomas ; Traverso, Giulia (2016)
Efficient Third Party Auditing for a Distributed Storage System.
Salzburg, Austria
Conference or Workshop Item, Bibliographie
Diedrich, Lennart ; Jattke, Patrick ; Murati, Lulzim ; Senker, Matthias ; Wiesmaier, Alexander (2016)
Comparison of Lightweight Stream Ciphers: MICKEY 2.0, WG-8, Grain and Trivium.
Report, Bibliographie
Dix, Isabella (2016)
Implementation of a Reputation System for CA Trust Management.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Dagdelen, Özgür ; Gajek, Sebastian ; Göpfert, Florian (2015)
Learning With Errors in the Exponent.
Seoul, Korea
Conference or Workshop Item, Bibliographie
Diedrich, Lennart ; Murati, Lulzim ; Wiesmaier, Alexander (2015)
Stream ciphers in the IoT: Grain and Trivium.
Report, Bibliographie
Demirel, Denise ; Lancrenon, Jean (2015)
How to Securely Prolong the Computational Bindingness of Pedersen Commitments.
Report, Bibliographie
Dogan, Ferit (2015)
Design and Implementation of Plug-ins for JCrypTool.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie
Ding, Jintai ; Petzoldt, Albrecht ; Wang, Lih-Chung (2014)
The Cubic Simple Matrix Encryption Scheme.
Waterloo, Canada
Conference or Workshop Item, Bibliographie
Dagdelen, Özgür ; Venturi, Daniele (2014)
A Multi-Party Protocol for Privacy-Preserving Cooperative Linear System of Equations.
Istanbul, Turkey
doi: 10.1007/978-3-319-21356-9_11
Conference or Workshop Item, Bibliographie
Dagdelen, Özgür ; Bansarkhani, Rachid El ; Göpfert, Florian ; Güneysu, Tim ; Oder, Tobias ; Pöppelmann, Thomas ; Sanchez, Ana Helena ; Schwabe, Peter (2014)
High-speed signatures from standard lattices.
Florianópolis, Brazil
Conference or Workshop Item, Bibliographie
Demirel, Denise (2014)
Universally Verifiable Poll-Site Voting Schemes Providing Everlasting Privacy.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication
Dagdelen, Özgür ; Venturi, Daniele (2014)
A Second Look at Fischlin’s Transformation.
Marrakech, Morocco
Conference or Workshop Item, Bibliographie
Dagdelen, Özgür ; Fischlin, Marc (2014)
Intercepting Tokens in Cryptographic Protocols: The Empire Strikes Back in the Clone Wars.
Honolulu HI USA
Conference or Workshop Item, Bibliographie
Demirel, Denise ; Henning, Maria ; Graaf, Jeroen van de ; Ryan, Peter Y. A. ; Buchmann, Johannes
eds.: Heather, James ; Schneider, Steve ; Teague, Vanessa (2013)
Prêt à Voter Providing Everlasting Privacy.
University of Surrey, Guildford, UK
Conference or Workshop Item, Bibliographie
Dagdelen, Özgür ; Fischlin, Marc ; Gagliardoni, Tommaso (2013)
The Fiat-Shamir Transformation in the Quantum World.
Bangalore, India
Conference or Workshop Item, Bibliographie
Demirel, Denise ; Henning, Maria (2012)
Legal Analysis of Privacy Weaknesses in Poll-Site eVoting Systems.
In: Jusletter IT - Die Zeitschrift für IT und Recht
Article, Bibliographie
Demirel, Denise ; Graaf, Jeroen van de ; Araújo, Roberto (2012)
Improving Helios with Everlasting Privacy Towards the Public.
Bellevue, WA
Conference or Workshop Item, Bibliographie
Demirel, Denise ; Henning, Maria ; Ryan, Peter Y. A. ; Schneider, Steve ; Volkamer, Melanie (2011)
Feasibility Analysis of Pret a Voter for German Federal Elections.
Tallinn, Estonia
doi: 10.1007/978-3-642-32747-6_10
Conference or Workshop Item, Bibliographie
Demirel, Denise ; Frankland, Richard ; Popovic, Darko ; Volkamer, Melanie
eds.: Parycek, Peter ; Kripp, Melanie J. ; Edelmann, Noella (2011)
Voting software to support election preparation, counting, and tallying.
Conference for E-Democracy and Open Government (CeDEM11). Krems, Austria (05.05.2011-06.05.2011)
Conference or Workshop Item, Bibliographie
Demirel, Denise (2010)
Effizientes Lösen linearer Gleichungssysteme über GF(2) mit GPUs.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Dagdelen, Özgür ; Schneider, Michael (2010)
Parallel Enumeration of Shortest Lattice Vectors.
Conference or Workshop Item, Bibliographie
Dahmen, Erik ; Krauß, Christoph
eds.: Garay, Christoph A. ; Miyaji, Atsuko ; Otsuka, Akira (2009)
Short Hash-Based Signatures for Wireless Sensor Networks.
Kanazawa, Japan
Conference or Workshop Item, Bibliographie
Deußer, Clemens ; Reubold, Jan (2009)
Design und Implementierung kryptographischer Funktionen und Protokolle des elektronischen Personalausweises.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Dahmen, Erik (2009)
Post-quantum signatures for today.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication
Dahmen, Erik ; Okeya, Katsuyuki ; Takagi, Tsuyoshi ; Vuillaume, Camille
eds.: Buchmann, Johannes ; Ding, Jintai (2008)
Digital Signatures out of Second-Preimage Resistant Hash Functions.
Cincinnati, USA
Conference or Workshop Item, Bibliographie
Döring, Martin (2008)
On the Theory and Practice of Quantum-Immune Cryptography.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication
Ding, Jintai ; Buchmann, Johannes ; Mohamed, Mohamed Saied Emam ; Mohamed, Wael Said Abd Elmageed ; Weinmann, Ralf-Philipp (2008)
MutantXL.
Conference or Workshop Item, Bibliographie
Dietrich, Christoph (2008)
Maximale Sicherheit im Identitymanagement bei optimaler Benutzbarkeit des Systems.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Detken, Kai-Oliver ; Gitz, Stephan ; Bartsch, Steffen ; Sethmann, Richard
ed.: Horster, Patrick (2008)
Trusted Network Connect -- {Sicherer Zugang ins Unternehmensnetz}.
Conference or Workshop Item, Bibliographie
Ding, Jintai ; Lindner, Richard (2007)
Identifying Ideal Lattices.
In: Cryptology ePrint Archive, 2007 (322)
Article, Bibliographie
Dahmen, Erik ; Okeya, Katsuyuki ; Schepers, Daniel (2007)
Affine Precomputation with Sole Inversion in Elliptic
Curve Cryptography.
doi: 10.1007/978-3-540-73458-1_19
Conference or Workshop Item, Bibliographie
Dahmen, Erik ; Okeya, Katsuyuki ; Takagi, Tsuyoshi (2007)
A New Upper Bound for the Minimal Density of Joint
Representations in Elliptic Curve Cryptosystems.
In: >IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, Special Section on Discrete Mathematics and Its Applications, E90-A (5)
Article, Bibliographie
Drahavets, Maryia (2006)
Flexible Anbindung von Smartcards an
eine Sicherheitsinfrastruktur.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Dahmen, Erik (2005)
Efficient Algorithms for Multi-Scalar
Multiplications.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Dahmen, Erik ; Okeya, Katsuyuki ; Takagi, Tsuyoshi (2005)
Efficient Left-to-Right
Multi-Exponentiations.
Report, Bibliographie
Dobre, Dan ; Mühleisen, Matthias (2003)
Using the Shared {VM} Jini Utility.
Other, Bibliographie
Dambruch, Jens (2001)
Framework zur flexiblen Formularverarbeitung im Rahmen von {FlexiTRUST} Formulare, Verarbeitungslogik und Ergebnisse.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie
Denny, Thomas (1997)
Lösen dünn besetzter Gleichungssysteme über endlichen Körpern.
Universität des Saarlandes
Ph.D. Thesis, Bibliographie
Denny, Thomas ; Müller, Volker (1996)
On the reduction of composed relations
from the number field sieve.
Conference or Workshop Item, Bibliographie
Denny, Thomas ; Dodson, Bruce ; Lenstra, Arjen ; Manasse, Mark (1994)
On the Factorization of {RSA}-120.
doi: 10.1007/3-540-48329-2_15
Conference or Workshop Item, Bibliographie
Denny, Thomas (1993)
Faktorisieren mit dem Quadratischen Sieb.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie
Düllmann, Stephan (1991)
Ein Algorithmus zur Bestimmumg positiv definiter binaerer quadratischer Formen.
Universität des Saarlandes
Ph.D. Thesis, Bibliographie
Düllmann, Stephan (1988)
Ein neues Verfahren zum
öffentlichen Schlüsselaustausch.
Other, Bibliographie
E
Erbenich, Vanessa (2016)
On the Efficiency of Lattice-Based Encryption.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Egert, Rolf (2013)
Lattice-based Signatures.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Errabih, Abdelhafid (2008)
Entwurf und Implementierung eines Clients zur Funktionalitäts{ü}berpr{ü}fung von Chipkarten - am Beispiel des Heilberufsausweises.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Ederov, Boris (2007)
Merkle Tree Traversal Techniques.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Engelbert, Daniela ; Overbeck, Raphael ; Schmidt, Arthur (2007)
A Summary of McEliece-Type
SCryptosystems and their Security.
In: >Journal of Mathematical Cryptology, 1 (2)
Article, Bibliographie
Eckart, Marc (2006)
Verwaltung von Identitäten von
{PKI} -Teilnehmern in der Registration Authority.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Ehli, Oliver (2002)
{ElGamal-Signaturen} mit elliptischen
Kurven.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Ender, Christoph (2002)
Verwaltung eines verteilten Systems
mit {Java} und Servlets.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie
Ernst, Markus ; Henhapl, Birgit ; Huss, Sorin ; Klupsch, Steffen (2002)
{FPGA} based Hardware Acceleration for
Elliptic Curve Public Key Cryptosystems.
Other, Bibliographie
Ernst, Markus ; Henhapl, Birgit (2001)
High Performance {ECDSA} over
F(2<sup>n</sup>) based on {Java} with Hardware Acceleration.
Report, Bibliographie
F
Fojtik, Roman (2016)
Salt Synchronization Service.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Fleisch, Gilbert (2016)
Towards policy checks on passwords via fully homomorphic encryption.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Faraon, Montathar ; Stenberg, Georg J. H. ; Budurushi, Jurlind ; Kaipainen, Mauri
eds.: Parycek, Peter ; Sachs, Michael ; Skoric, Marko (2014)
Positive but skeptical - A study of attitudes towards Internet voting in Sweden.
Hong Kong
Conference or Workshop Item, Bibliographie
Franke, Daniel (2014)
Risk Simulations for the Web PKI.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Fontein, Felix ; Schneider, Michael ; Wagner, Urs (2013)
A Polynomial Time Version of LLL With Deep Insertions.
Bergen (Norway)
Conference or Workshop Item, Bibliographie
Fehr, Victoria (2012)
Sophisticated Public-Key Encryption.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Frankland, Richard ; Demirel, Denise ; Budurushi, Jurlind ; Volkamer, Melanie (2011)
Side-channels and eVoting machine security: Identifying vulnerabilities and defining requirements.
Trento, Italy
doi: 10.1109/REVOTE.2011.6045914
Conference or Workshop Item, Bibliographie
Fischer-Hübner, Simone ; Grimm, Rüdiger ; Lo Iacono, Luigi ; Möller, Sebastian ; Müller, Günter ; Volkamer, Melanie (2011)
Gebrauchstaugliche Informationssicherheit.
In: Die Zeitschrift für Informationssicherheit - Usable Security and Privacy
Article, Bibliographie
Fleck, Matthias (2006)
Zur Benutzbarkeit von
{PKI}-Anwendungen im praktischen Einsatz.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Fritsch, Sebastian (2006)
Towards Secure Electronic Workflows
Examples of Applied {PKI}.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Frommer, J. ; Wiesmaier, Alexander ; Araújo, Roberto ; Lippert, Marcus
eds.: Zhou, Jianying ; Yung, Moti ; Bao, Feng (2006)
On Firewalls and Tunneling.
Singapore
Conference or Workshop Item, Bibliographie
Fan, Rong (2005)
On the Efficiency Analysis of {wNAF}
and {wMOF}.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Feldgen, Lutz (2002)
Analyse von Enterprise Application
Servern und Datenbank Management Systemen für {FlexiTRUST}.
Other, Bibliographie
Feldgen, Lutz ; Winkler, Markus (2002)
Design und Implementierung der
{FlexiTRUST-CA} als {Java} Enterprise Application.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie
Fischer, Mike (2002)
Angriff auf ein
{PIN/TAN}-gestütztes Online-Banking-Verfahren.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie
Franke, Sylvain (2002)
Deanymisierbare elektronische
Zahlungsmittel - ein Verleich zweier Implementationen.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie
Fertig, Thomas (2000)
Digitale Signaturen mit elliptischen
Kurven über GF(2<sup>n</sup>).
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie
Fuhrmann, Arnulph (2000)
Verteilte effiziente RSA-Schlüsselerzeugung in JAVA.
Other, Bibliographie
Fischer, Johannes (1996)
Integration von
{Ebene-1-Softwarefehlertoleranz} in {LiPS}.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie
G
Gagliardoni, Tommaso ; Krämer, Juliane ; Struck, Patrick (2021)
Quantum Indistinguishability for Public Key Encryption.
PQCrypto 2021 The Twelfth International Conference on Post-Quantum Cryptography. virtual Conference (20.07.2021-22.07.2021)
Conference or Workshop Item, Bibliographie
Graf, Holger ; Schwarz, Reinhard ; Becker, Tilman ; Mück, Jürgen
eds.: Goldstein, Denise ; Schneider, Tidarat ; Braun, Johannes (2019)
SCIKE Innovationsbericht - Innovation durch Internationalisierung.
Report, Bibliographie
Geihs, Matthias ; Nikiforov, Oleg ; Demirel, Denise ; Sauer, Alexander ; Butin, Denis ; Günther, Felix ; Alber, Gernot ; Walther, Thomas ; Buchmann, Johannes (2019)
The Status of Quantum-Based Long-Term Secure Communication over the Internet.
In: IEEE Transactions on Sustainable Computing
doi: 10.1109/TSUSC.2019.2913948
Article, Bibliographie
Geihs, Matthias ; Schabhüser, Lucas ; Buchmann, Johannes (2019)
Efficient Proactive Secret Sharing for Large Data via Concise Vector Commitments.
International Conference on Codes, Cryptology, and Information Security (C2SI) 2019. Rabat, Morocco (22.04.2019-24.04.2019)
Conference or Workshop Item, Bibliographie
Geihs, Matthias ; Buchmann, Johannes (2018)
ELSA: Efficient Long-Term Secure Storage of Large Datasets.
21st Annual International Conference on Information Security and Cryptology. Seoul, Korean (28.11.2018-30.11.2018)
doi: 10.1007/978-3-030-12146-4_17
Conference or Workshop Item, Bibliographie
Guski, Florian (2018)
Simulation of the Quantum Hybrid Attack in Q#.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Geihs, Matthias ; Karvelas, Nikolaos ; Katzenbeisser, Stefan ; Buchmann, Johannes (2018)
PROPYLA: Privacy Preserving Long-Term Secure Storage.
The Sixth International Workshop on Security in Cloud Computing (SCC).
Conference or Workshop Item, Bibliographie
Geihs, Matthias (2018)
Long-Term Protection of Integrity and Confidentiality – Security Foundations and System Constructions.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication
Göpfert, Florian ; Vredendaal, Christine van ; Wunderer, Thomas (2017)
A Hybrid Lattice Basis Reduction and Quantum Search Attack on LWE.
Conference or Workshop Item, Bibliographie
Geihs, Matthias ; Demirel, Denise ; Buchmann, Johannes (2016)
A security analysis of techniques for long-term integrity protection.
Auckland, New Zealand
Conference or Workshop Item, Bibliographie
Gerber, Nina ; McDermott, Ronja ; Volkamer, Melanie ; Vogt, Joachim (2016)
Understanding information security compliance - Why goal setting and rewards might be a bad idea.
Frankfurt, Germany
Conference or Workshop Item, Bibliographie
Göpfert, Florian (2016)
Securely Instantiating Cryptographic Schemes Based on the Learning with Errors Assumption.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication
Gagliotti Vigil, Martín Augusto (2015)
Trustworthy and Efficient Protection Schemes for Digital Archiving.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication
Gutmann, Andreas ; Renaud, Karen ; Volkamer, Melanie (2015)
Nudging Bank Account Holders Towards More Secure PIN Management.
doi: 10.20533/jitst.2046.3723.2015.0049
Conference or Workshop Item, Bibliographie
Ganji, Fatemeh ; Krämer, Juliane ; Seifert, Jean-Pierre ; Tajik, Shahin (2015)
Lattice Basis Reduction Attack against Physically Unclonable Functions.
Denver, Colorado, US
Conference or Workshop Item, Bibliographie
Geihs, Matthias ; Demirel, Denise ; Buchmann, Johannes (2015)
On the Security of Long-lived Archiving Systems based on the Evidence Record Syntax.
Mohammed V University, Rabat, Morocco
Conference or Workshop Item, Bibliographie
Geihs, Matthias ; Cabarcas, Daniel
eds.: Aranha, Diego F. ; Menezes, Alfred (2014)
Efficient Integer Encoding for Homomorphic Encryption via Ring Isomorphisms.
Florianópolis, Brazil
Conference or Workshop Item, Bibliographie
Gutmann, Andreas ; Matsuura, Kanta (2013)
The use of linguistics in cryptography and its application to improve the HB protocol.
Computer Security Symposium 2013. Kagawa, Japan (21.10.2013-23.10.2013)
Conference or Workshop Item, Bibliographie
Gleser, Michael (2013)
Policy-basierter Vergleich von Zertifizierungspraktiken innerhalb der Web-PKI.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Geihs, Matthias (2013)
Evaluation of homomorphic encryption for machine learning.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Guo, Sheng (2013)
Integration von vorwärtssicheren Signaturverfahren in die CA Infrastruktur.
Report, Bibliographie
Göttert, Norman ; Feller, Thomas ; Schneider, Michael ; Huss, Sorin ; Buchmann, Johannes
eds.: Prouff, Emmanuel ; Schaumont, Patrick (2012)
On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes.
Leuven, Belgium
Conference or Workshop Item, Bibliographie
Göttert, Norman (2012)
Hardware and Software Implementation of an LWE-Based Encryption Scheme.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Gharadaghy, Rojan (2010)
Funktion und Realisierung der Telematikinfrastruktur für die elektronische Gesundheitskarte unter besonderer Betrachtung der Public-Key-Infrastruktur.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Gharadaghy, Rojan ; Volkamer, Melanie (2010)
Verifiability in Electronic Voting - Explanations for Non Security Experts.
Conference or Workshop Item, Bibliographie
Grimm, Rüdiger ; Hupf, Katharina ; Volkamer, Melanie
eds.: Krimmer, Robert ; Grimm, Rüdiger (2010)
A Formal IT-Security Model for the Correction and Abort Requirement of Electronic Voting.
Conference or Workshop Item, Bibliographie
Gaber, Michael (2009)
Entwurf und Implementierung eines Plug-Ins für JCrypTool - RSA, DSA und ElGamal Visualisierungen.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Grimm, Rüdiger ; Volkamer, Melanie (2008)
Development of a Formal IT-Security Model for Remote Electronic Voting Systems.
Conference or Workshop Item, Bibliographie
Gitter, Rotraud ; Langer, Lucie ; Okunick, Susanne ; Opitz-Talidou, Zoi (2008)
Long-term retention in e-voting -- Legal requirements and technical implementation.
Conference or Workshop Item, Bibliographie
Ghiglieri, Marco (2007)
Flexible - Eine erweiterbare {GUI}
für den FlexiProvider (Frontend).
Technische Universität Darmstadt
Master Thesis, Bibliographie
Grimm, Rüdiger ; Volkamer, Melanie (2007)
Robustere Anforderungen für Online-Wahlen aufbauend auf dem Schutzprofil 'Zentrale Auforderungen für Online-Wahlen'.
Report, Bibliographie
Guaadaoui, Abdellah (2006)
Sicherheitsdefinitionen für
Challenge-Response-Identifikationsverfahren.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Grimm, Rüdiger ; Volkamer, Melanie
ed.: Krimmer, Robert (2006)
Multiple Cast in Online Voting - Analyzing Chances.
Conference or Workshop Item, Bibliographie
Grimm, Rüdiger ; Krimmer, Robert ; Meißner, Nils ; Reinhard, Kai ; Volkamer, Melanie ; Weinand, Marcel
eds.: Krimmer, Robert ; LNI, GI (2006)
Security Requirements for Non-political Internet Voting.
In: Electronic Voting (EVOTE) 2006
Book Section, Bibliographie
Ginkel, Thilo-Alexander (2004)
Entwurf und Implementierung eines
Authentifikations-Proxys für das World Wide Web.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Grahl, Alexander ; Kiss, Tekla (2004)
Entwurf und Implementierung einer
{Web-Test} Anwendung und Integrierung in die Eclipse {IDE}.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Groß, Clemens (2000)
Ein Verschlüsselungsprotokoll auf
Basis von reellquadratischen Zahlkörpern.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie
Galbraith, Steven ; Paulus, Sachar ; Smart, Nigel (1998)
Arithmetic on Superelliptic Curves.
Report, Bibliographie
Gross, Olaf (1994)
Der Block Lanczos Algorithmus
über {$GF(2)$}.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie
Ganzinger, Harald ; Paul, Wolfgang ; Buchmann, Johannes
eds.: Ganzinger, Harald ; Paul, Wolfgang ; Buchmann, Johannes (1992)
Informatik - Festschrift zum 60. Geburtstag von Günter Hotz.
Book, Bibliographie
H
Horsch, Moritz (2018)
Generating and Managing Secure Passwords for Online Accounts.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication
Horsch, Moritz ; Braun, Johannes ; Buchmann, Johannes (2017)
Password Assistance.
Karlstad, Sweden
Conference or Workshop Item, Bibliographie
Horsch, Moritz ; Braun, Johannes ; Metz, Dominique ; Buchmann, Johannes (2017)
Update-tolerant and Revocable Password Backup.
Auckland, New Zealand
Conference or Workshop Item, Bibliographie
Holzer, Patrick (2017)
Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor p^α q^β.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Horsch, Moritz ; Schlipf, Mario ; Haas, Stefan ; Braun, Johannes ; Buchmann, Johannes (2016)
Password Policy Markup Language.
Conference or Workshop Item, Bibliographie
Horsch, Moritz ; Schlipf, Mario ; Braun, Johannes ; Buchmann, Johannes (2016)
Password Requirements Markup Language.
Melbourne, Australia
Conference or Workshop Item, Bibliographie
Horsch, Moritz ; Hülsing, Andreas ; Buchmann, Johannes (2015)
PALPAS - PAsswordLess PAssword Synchronization.
Université Paul Sabatier, Toulouse, France
Conference or Workshop Item, Bibliographie
Horsch, Moritz ; Tuengerthal, Max ; Wich, Tobias (2014)
SAML Privacy-Enhancing Profile.
Stuttgart, Germany
Conference or Workshop Item, Bibliographie
Henning, Maria ; Budurushi, Jurlind ; Volkamer, Melanie (2014)
Öffentlichkeitsgrundsatz und Stimmzettelbelege.
Report, Bibliographie
Horsch, Moritz ; Derler, David ; Rath, Christof ; Haase, Hans-Martin ; Wich, Tobias (2014)
Open Source für europäische Signaturen.
In: >Datenschutz und Datensicherheit, 38 (4)
doi: 10.1007/s11623-014-0098-5
Article, Bibliographie
Henning, Maria ; Budurushi, Jurlind ; Volkamer, Melanie (2014)
Elektronsiche Wahlen durch Stimmzettelbelege? Untersuchung möglicher Umsetzungen des Öffentlichkeitsgrundsatzes bei elektronischen Wahlen.
In: MultiMedia und Recht (MMR)
Article, Bibliographie
Hühnlein, Detlef ; Schwenk, Jörg ; Wich, Tobias ; Mladenov, Vladislav ; Feldmann, Florian ; Schmölz, Johannes ; Brügger, Bud ; Horsch, Moritz (2013)
Options for integrating eID and SAML.
Berlin, Germany
doi: 10.1145/2517881.2517892
Conference or Workshop Item, Bibliographie
Hülsing, Andreas (2013)
Practical Forward Secure Signatures using Minimal Security Assumptions.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication
Hamann, Tobias (2013)
The BKZ Simulation Algorithm.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Hülsing, Andreas ; Braun, Johannes (2013)
Langzeitsichere Signaturen durch den Einsatz hashbasierter Signaturverfahren.
Bonn
Conference or Workshop Item, Bibliographie
Horsch, Moritz ; Hühnlein, Detlef ; Breitenstrom, Christian ; Wieland, Thomas ; Wiesmaier, Alexander ; Biallowons, Benedikt ; Petrautzki, Dirk ; Potzernheim, Simon ; Schmölz, Johannes ; Wesner, Alexander ; Wich, Tobias (2013)
Die Open eCard App für mehr Transparenz, Vertrauen und Benutzerfreundlichkeit beim elektronischen Identitätsnachweis.
Conference or Workshop Item, Bibliographie
Hülsing, Andreas ; Rausch, L. ; Buchmann, Johannes (2013)
Optimal parameters for XMSS-MT.
Conference or Workshop Item, Bibliographie
Horsch, Moritz ; Hühnlein, Detlef ; Lehmann, Anja ; Schmölz, Johannes ; Wich, Tobias (2013)
Authentisierung mit der Open eCard App.
In: >Datenschutz und Datensicherheit, 37 (8)
doi: 10.1007/s11623-013-0208-9
Article, Bibliographie
Hülsing, Andreas (2013)
WOTS+ - Shorter Signatures for Hash-Based Signature Schemes.
Cairo, Egypt
Conference or Workshop Item, Bibliographie
Hülsing, Andreas ; Rausch, L. ; Buchmann, Johannes (2013)
Optimal Parameters for XMSS^MT.
In: MoCrySEn 2013
Book Section, Bibliographie
Hornschuch, Marian (2012)
Multivariate-based identification and signature schemes with additional properties.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Horsch, Moritz ; Braun, Johannes ; Wiesmaier, Alexander (2012)
Decoupling Authentication from the Usage of Services.
Report, Bibliographie
Hülsing, Andreas ; Busold, Christoph ; Buchmann, Johannes
eds.: Knudsen, Lars ; Wu, Huapeng (2012)
Forward Secure Signatures on Smart Cards.
Windsor, Canada
doi: 10.1007/978-3-642-35999-6_5
Conference or Workshop Item, Bibliographie
Hülsing, Andreas ; Petzoldt, Albrecht ; Schneider, Michael ; Yousfi Alaoui, Sidi Mohamed el
ed.: Waldmann, Ulrich (2012)
Post-Quantum Signaturverfahren Heute.
Conference or Workshop Item, Bibliographie
Hühnlein, Detlef ; Petrautzki, Dirk ; Schmölz, Johannes ; Wich, Tobias ; Horsch, Moritz ; Wieland, Thomas ; Eichholz, Jan ; Wiesmaier, Alexander ; Braun, Johannes ; Feldmann, Florian ; Potzernheim, Simon ; Schwenk, Jörg ; Kahlo, Christian ; Kühne, Andreas ; Veit, Heiko (2012)
On the design and implementation of the Open eCard App.
Darmstadt
Conference or Workshop Item, Bibliographie
Horsch, Moritz ; Braun, Johannes ; Wiesmaier, Alexander ; Schaaf, Joachim ; Baumöller, Claas (2012)
Verteilte Dienstnutzung mit dem neuen Personalausweis.
Conference or Workshop Item, Bibliographie
Henning, Maria ; Demirel, Denise ; Volkamer, Melanie (2012)
Öffentlichkeit vs. Verifizierbarkeit – Inwieweit erfüllt mathematische Verifizierbarkeit den Grundsatz der Öffentlichkeit der Wahl.
Salzburg, Austria
Conference or Workshop Item, Bibliographie
Horsch, Moritz ; Braun, Johannes ; Wiesmaier, Alexander (2011)
Mobile eID application for the German identity card.
Report, Bibliographie
Hoffmann, Gerhard (2011)
Implementation of McEliece using quasi-dyadic Goppa codes.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Horsch, Moritz ; Stopczynski, Martin (2011)
The German eCard-Strategy.
Report, Bibliographie
Horsch, Moritz (2011)
Mobile Authentisierung mit dem neuen Personalausweis (MONA).
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Hermans, Jens ; Schneider, Michael ; Buchmann, Johannes ; Vercauteren, Frederik ; Preneel, Bart
eds.: Bernstein, Daniel ; Lange, Tanja (2010)
Parallel Shortest Lattice Vector Enumeration on Graphics Cards.
Stellenbpsch, South Africa
Conference or Workshop Item, Bibliographie
Heuser, Annelie (2010)
Chess reduction - Using Artificial Intelligence for Lattice Reduction.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Hartmann, Frank (2010)
Probability Distribution of Gram-Schmidt Coefficients after LLL-Reduction.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Hühnlein, Detlef ; Korte, Ulrike ; Langer, Lucie ; Wiesmaier, Alexander (2009)
A Comprehensive Reference Architecture for Trustworthy Long-Term Archiving of Sensitive Data.
doi: 10.1109/NTMS.2009.5384830
Conference or Workshop Item, Bibliographie
Horsch, Moritz (2009)
MobilePACE - Password Authenticated Connection Establishment implementation on mobile devices.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Huthmann, Jan (2007)
Datengesteuerte Initialisierung
komplexer Softwaresysteme als Voraussetzung zentralisierter
Konfiguration.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Helbach, Jörg ; Krimmer, Robert ; Meletiadou, Anastasia ; Meissner, Nils ; Volkamer, Melanie (2007)
Zukunft von Online-Wahlen - Aktuelle rechtliche, politische, soziale und technisch-organisatorische Fragen.
In: Datenschutz und Datensicherheit, 31 (6)
Article, Bibliographie
Hühnlein, Detlef (2005)
Kryptosysteme auf Basis imaginärquadratischer Nichtmaximalordnungen.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication
Homann, Frank (2004)
Flexibles Datenbankmodell für
{TrustCenter}.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Hagedorn, Axel (2003)
{IEEE 802.11i} Sicherheit in
drahtlosen lokalen Netzen.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie
Hähnle, Jochen (2003)
Design und Entwicklung eines
Testframeworks für {JLiPSD}.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie
Hechler, Jochen (2003)
Primzahlnachweis mit Hilfe
elliptischer Kurven.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie
Henhapl, Birgit (2003)
Zur Effizienz von elliptische Kurven
Kryptographie.
Technische Universität Darmstadt
Ph.D. Thesis, Bibliographie
Hölzer, Christina (2003)
Quantenalgorithmus für das
Hauptidealproblem.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie
Heinemann, Andreas ; Straub, Tobias (2003)
Mund-zu-Mund-Propaganda mit Bonussystem in mobilen Ad-Hoc-Netzen.
Conference or Workshop Item, Bibliographie
Hamdy, Safuat (2002)
Über die Sicherheit und Effizienz kryptographischer Verfahren mit Klassengruppen imaginär-quadratischer Zahlkörper.
Technische Universität Darmstadt
Ph.D. Thesis, Bibliographie
Hammen, Ralf (2002)
Integrationskonzept für
Trustcenter-Software.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie
Henge-Ernst, Jürgen ; Linke, Sebastian (2002)
Anbindung einer
Personalisierungssstrasse an das {FlexiTRUST}-System.
Other, Bibliographie
Henhapl, Birgit (2002)
Platform Independant Elliptic Curve
Cryptography over Fp.
Report, Bibliographie
Hornung, Heiko (2002)
Ein Framework zur Automatisierung von
Tests formularbasierter Web-Anwendungen.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie
Hühnlein, Detlef (2001)
Faster Generation of NICE-Schnorr-Type Signatures.
San Francisco, CA, USA
Conference or Workshop Item, Bibliographie
Hartmann, Michael ; Maseberg, Sönke (2001)
Smart Cards for the {FlexiPKI}
Environment.
Report, Bibliographie
Hamdy, Safuat ; Möller, Bodo (2000)
Security of Cryptosystems Based on
Class Groups of Imaginary Quadratic Orders.
Kyoto, Japan
Conference or Workshop Item, Bibliographie
Hühnlein, Detlef (2000)
Efficient Implementation of
Cryptosystems Based on Non-maximal Imaginary Quadratic Orders.
Kingston, Ontario, Canada
Conference or Workshop Item, Bibliographie
Hühnlein, Detlef ; Merkle, Johannes (2000)
An Efficient NICE-Schnorr-Type Signature Scheme.
Melbourne, Victoria, Australia
Conference or Workshop Item, Bibliographie
Hamdy, Safuat ; Möller, Bodo (2000)
Security of Crytosystems Based on
Class Groups of Imaginary Quadratic Orders.
Report, Bibliographie
Hartmann, Michael ; Maseberg, Sönke (2000)
Fail-Safe-Konzept für {FlexiPKI}.
Report, Bibliographie
Hühnlein, Detlef (2000)
Quadratic orders for {NESSIE} -
Overview and parameter sizes of three public key families.
Report, Bibliographie
Hühnlein, Detlef (2000)
Faster Generation of
{NICE}-{Schnorr}-type Signatures.
Report, Bibliographie
Hühnlein, Detlef ; Merkle, Johannes (1999)
Secure and Cost Efficient Electronic
Stamps.
Düsseldorf, Germany
Conference or Workshop Item, Bibliographie
Hühnlein, Detlef ; Takagi, Tsuyoshi (1999)
Reducing Logarithms in Totally Non-maximal Imaginary Quadratic Orders to Logarithms in Finite Fields.
Singapore
Conference or Workshop Item, Bibliographie
Hartmann, Michael ; Paulus, Sachar ; Takagi, Tsuyoshi (1999)
NICE - New Ideal Coset Encryption.
Worcester, MA, USA
Conference or Workshop Item, Bibliographie
Hahn, Tobias ; Meyer, Andreas ; Neis, Stefan ; Pfahler, Thomas (1999)
Implementing Cryptographic Protocols
Based on Algebraic Number Fields.
Report, Bibliographie
Hamdy, Safuat (1999)
Elliptische Kurven - Neue Wege in der
Public-Key-Kryptographie.
Report, Bibliographie
Hamdy, Safuat ; Maurer, Markus (1999)
Feige-Fiat-Shamir Identification Based
on Real Quadratic Fields.
Report, Bibliographie
Hartmann, Michael (1999)
Implementierung der
Entschlüsselung des {NICE}-Kryptosystems auf einer Smartcard.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie
Hartmann, Michael ; Paulus, Sachar ; Takagi, Tsuyoshi (1999)
{NICE} - New Ideal Coset Encryption.
Report, Bibliographie
Henhapl, Birgit (1999)
Digitales Signieren mit Elliptischen
Kurven über Primkörpern großer Charakteristik.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie
Hühnlein, Detlef (1999)
A survey of crytosystems based on
imaginary quadratic orders.
Report, Bibliographie
Hühnlein, Detlef (1999)
Elliptische Kurven in {HBCI} - ein
Backup zu {RSA}.
Report, Bibliographie
Hühnlein, Detlef (1999)
Efficient implementation of
cryptosystems based on non-maximal imaginary quadratic orders.
Report, Bibliographie
Hühnlein, Detlef ; Merkle, Johannes (1999)
Secure and cost efficient electronic
stamps.
Report, Bibliographie
Hühnlein, Detlef ; Merkle, Johannes (1999)
An efficient {NICE}-{Schnorr}-type
signature.
Report, Bibliographie
Hühnlein, Detlef ; Meyer, Andreas ; Takagi, Tsuyoshi (1999)
Rabin and {RSA} analogues based on
non-maximal imaginary quadratic orders.
Report, Bibliographie
Hühnlein, Detlef ; Takagi, Tsuyoshi (1999)
Reducing logarithms in totally non-maximal imaginary quadratic orders to logarithms in finite fields.
Report, Bibliographie
Hühnlein, Detlef ; Meyer, Andreas ; Takagi, Tsuyoshi (1998)
Rabin and {RSA} analogues based on
non-maximal imaginary quadratic orders.
Seoul, Korea
Conference or Workshop Item, Bibliographie
Hühnlein, Detlef ; Jacobson, Michael J. ; Paulus, Sachar ; Takagi, Tsuyoshi (1998)
A Cryptosystem Based on Non-maximal
Imaginary Quadratic Orders with Fast Decryption.
Espoo, Finland
Conference or Workshop Item, Bibliographie
Haible, Bruno ; Papanikolaou, Thomas (1998)
Fast Multiprecision Evaluation of
Series of Rational Numbers.
Portland, Oregon, USA
Conference or Workshop Item, Bibliographie
Haible, Bruno ; Papanikolaou, Thomas (1997)
Fast multiprecision evaluation of
series of rational numbers.
Report, Bibliographie
Hühnlein, Detlef (1997)
Credential Management and Secure
Single Login for {SPKM}.
Report, Bibliographie
Hühnlein, Detlef ; Jacobson, Michael J. ; Paulus, Sachar (1997)
A cryptosystem based on non-maximal
imaginary quadratic orders with fast decryption.
Report, Bibliographie
Hiber, Carmen (1995)
Eine Untersuchung der verbesserten
Buchberger Algorithmen zur Gröbnerbasen-Konstruktion.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie
Handl, Ralf (1994)
Sicherheit kryptographischer Protokolle.
Universität des Saarlandes
Ph.D. Thesis, Bibliographie
Hürter, Michael (1994)
Modifikationen zum Number Field
Sieve.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie
I
Inel, Miray (2014)
Entwurf und Implementierung von Plug-ins für JCrypTool.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Ivanova, Vanya (2010)
Lattice Basis Reduction in Infinity Norm.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Inel, Oryal (2009)
Entwurf und Implementierung von Plug-ins für JCrypTool-Visualisierung von kryptographischen Grundlagen.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Izu, Tetsuya ; Möller, Bodo ; Takagi, Tsuyoshi (2002)
Improved Elliptic Curve Multiplication
Methods Resistant against Side Channel Attacks.
Hyderabad, India
Conference or Workshop Item, Bibliographie
Izu, Tetsuya ; Takagi, Tsuyoshi (2002)
On the Security of Brier-Joye{'}s
Addition Formula for Weierstrass-form Elliptic Curves.
Report, Bibliographie
J
Jattke, Patrick ; Senker, Matthias ; Wiesmaier, Alexander (2016)
Comparison of two Lightweight Stream Ciphers: MICKEY 2.0 & WG-8.
Report, Bibliographie
Jiang, Biqiang (2010)
Design and Implementation of Plug-ins for JCrypTool - Visualization of the Cryptographic SPA and DPA Attacks.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Jonker, Hugo ; Volkamer, Melanie
eds.: Alkassar, Ammar ; Volkamer, Melanie (2007)
Compliance of RIES to the proposed e-voting protection profile.
Bochum, Germany
Conference or Workshop Item, Bibliographie
Joye, Marc ; Quisquater, Jean-Jacques ; Takagi, Tsuyoshi (2001)
How to Choose Secret Parameters for
{RSA}-Type Cryptosystems over Elliptic Curves.
In: >Designs, Codes and Cryptography, 23 (3)
Article, Bibliographie
Jacobson, Michael J. (1999)
Subexponential class group computation in quadratic orders.
Technische Universität Darmstadt
Ph.D. Thesis, Bibliographie
Jacobson, Michael J. (1999)
Applying sieving to the computation of
quadratic class groups.
In: >Mathematics of Computation, 68 (226)
Article, Bibliographie
Joye, Marc ; Quisquater, Jean-Jacques ; Takagi, Tsuyoshi (1997)
How to Choose Secret Parameters for
{RSA}-Type Cryptosystems over Elliptic Curves.
Report, Bibliographie
Jacobson, Michael J. (1997)
Applying Sieving to the Computation of
Quadratic Class Groups.
Report, Bibliographie
K
Krämer, Juliane ; Struck, Patrick (2020)
Encryption Schemes using Random Oracles: from Classical to Post-Quantum Security.
11th International Conference on Post-Quantum Cryptography (PQCrypto 2020). virtual Conference (21.09.2020-23.09.2020)
Conference or Workshop Item, Bibliographie
Krämer, Juliane ; Struck, Patrick (2020)
Leakage-Resilient Authenticated Encryption from Leakage-Resilient Pseudorandom Functions.
11th International Workshop on Constructive Side-Channel Analysis and Secure Design(COSADE 2020). Lugano, Switzerland (05.10.2020-07.10.2020)
Conference or Workshop Item, Bibliographie
Krämer, Juliane ; Struck, Patrick (2020)
Security of Public Key Encryption against Resetting Attacks.
21st International Conference on Cryptology in India (Indocrypt 2020). virtual Conference (13.12.2020-16.12.2020)
Conference or Workshop Item, Bibliographie
Krämer, Juliane ; Marzougui, Soundes (2019)
Post-Quantum Cryptography in Embedded Systems.
14th International Conference on Availability, Reliability and Security. Canterbury, United Kingdom (26.08.2019-29.08.2019)
doi: 10.1145/3339252.3341475
Conference or Workshop Item, Bibliographie
Krämer, Juliane (2019)
Post-Quantum Cryptography and its Application to the IoT.
In: Informatik Spektrum, 42 (5)
doi: 10.1007/s00287-019-01200-2
Article, Bibliographie
Krämer, Juliane ; Loiero, Mirjam (2019)
Fault Attacks on UOV and Rainbow.
10th International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2019). Darmstadt, Germany (03.04.2019-05.04.2019)
Conference or Workshop Item, Bibliographie
Kannwischer, Matthias ; Genêt, Aymeric ; Butin, Denis ; Krämer, Juliane ; Buchmann, Johannes (2018)
Differential Power Analysis of XMSS and SPHINCS.
9th International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2018). Singapore (23.04.2018-24.04.2018)
doi: 10.1007/978-3-319-89641-0_10
Conference or Workshop Item, Bibliographie
Krüger, Stefan ; Nadi, Sarah ; Reif, Michael ; Ali, Karim ; Mezini, Mira ; Bodden, Eric ; Göpfert, Florian ; Günther, Felix ; Weinert, Christian ; Demmler, Daniel ; Kamath, Ram (2017)
CogniCrypt: Supporting Developers in using Cryptography.
Automated Software Engineering (ASE'17). Urbana, Illinois, USA (30.10.2017-03.11.2017)
doi: 10.1109/ASE.2017.8115707
Conference or Workshop Item, Bibliographie
Kannwischer, Matthias (2017)
Physical Attack Vulnerability of Hash-Based Signature Schemes.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Kulyk, Oksana ; Marky, Karola ; Neumann, Stephan ; Volkamer, Melanie (2016)
Introducing Proxy Voting to Helios.
Salzburg
doi: 10.1109/ARES.2016.38
Conference or Workshop Item, Bibliographie
Klir, Thomas (2016)
Design and Implementation of an Archiving System Providing Long-Term Integrity and Long-Term Confidentiality.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Kunz, Alexandra ; Volkamer, Melanie ; Stockhardt, Simon ; Palberg, Sven ; Lottermann, Tessa ; Piegert, Eric (2016)
NoPhish: Evaluation of a web application that teaches people being aware of phishing attacks.
Bonn, Germany
Conference or Workshop Item, Bibliographie
Kulyk, Oksana ; Neumann, Stephan ; Marky, Karola ; Budurushi, Jurlind ; Volkamer, Melanie (2016)
Coercion-resistant Proxy Voting.
Ghent, Belgium
Conference or Workshop Item, Bibliographie
Kulyk, Oksana ; Volkamer, Melanie (2016)
Efficiency Comparison of Various Approaches in E-Voting Protocols.
Barbados
Conference or Workshop Item, Bibliographie
Kulyk, Oksana ; Gerber, Paul ; Reinheimer, Benjamin ; Renaud, Karen ; Volkamer, Melanie (2016)
Encouraging Privacy-Aware Smartphone App Installation: What Would the Technically-Adept Do.
San Diego, California
Conference or Workshop Item, Bibliographie
Krämer, Juliane ; Kiss, Ágnes ; Stüber, Anke (2015)
On the Optimality of Differential Fault Analyses on CLEFIA.
doi: 10.1007/978-3-319-32859-1_15
Conference or Workshop Item, Bibliographie
Kulyk, Oksana ; Teague, Vanessa ; Volkamer, Melanie
eds.: Haenni, Rolf ; Koenig, Reto ; Wikström, Douglas (2015)
Extending Helios Towards Private Eligibility Verifiability.
Bern, Switzerland
Conference or Workshop Item, Bibliographie
Kulyk, Oksana ; Neumann, Stephan ; Budurushi, Jurlind ; Volkamer, Melanie ; Haenni, Rolf ; Koenig, Reto ; Bergen, Philemon von (2015)
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.
Toulouse, France
doi: 10.1109/ARES.2015.75
Conference or Workshop Item, Bibliographie
Kußmaul, Tobias ; Löffler, Johannes ; Wiesmaier, Alexander (2015)
Block ciphers PRESENT and SEA in comparison.
Report, Bibliographie
Kulyk, Oksana ; Neumann, Stephan ; Budurushi, Jurlind ; Volkamer, Melanie ; Haenni, Rolf ; Koenig, Reto ; Bergen, Philemon von (2015)
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.
In: Cryptology ePrint Archive, 2015 (558)
Article, Bibliographie
Kulyk, Oksana ; Feier, Christian ; Köster, Thorben (2014)
Electronic Voting with Fully Distributed Trust and Maximized Flexibility Regarding Ballot Design.
Lochau
doi: 10.1109/EVOTE.2014.7001142
Conference or Workshop Item, Bibliographie
Klos, Christian (2013)
Design and deployment of a public key infrastructure.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Kreutzer, Michael ; Waidner, Michael ; Buchmann, Johannes (2012)
IT-Sicherheitsforschung in Darmstadt - von den Grundlagen bis zur Anwendung.
In: Praxis der Informationsverarbeitung und Kommunikation, 35 (4)
Article, Bibliographie
Kelbert, Florian ; Shirazi, Fatemeh ; Simo, Hervais ; Wüchner, Tobias ; Buchmann, Johannes ; Pretschner, Alexander ; Waidner, Michael
ed.: Buchmann, Johannes (2012)
State of Online Privacy: A Technical Perspective.
In: Internet Privacy. Eine multidisziplinäre Bestandsaufnahme/ A multidisciplinary analysis (acatech STUDIE)
Book Section, Bibliographie
Kiefer, Franziskus ; Wiesmaier, Alexander ; Fritz, Christian (2012)
Practical Security in E-Mail Applications.
Las Vegas, USA
Conference or Workshop Item, Bibliographie
Kauer, Michaela ; Pfeiffer, Thomas ; Volkamer, Melanie ; Theuerling, Heike ; Bruder, Ralph
eds.: Suri, Neeraj ; Waidner, Michael (2012)
It is not about the design – it is about the content! Making warnings more efficient by communicating risks appropriately.
Sicherheit 2012. Sicherheit, Schutz und Zuverlässigkeit . Beiträge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI). Darmstadt, Germany (07.03.2012-09.03.2012)
Conference or Workshop Item, Bibliographie
Kauer, Michaela ; Kiesel, Florian ; Ueberschaer, Felix ; Volkamer, Melanie ; Bruder, Ralph
eds.: Jähnke, Jochen ; Mühlen, Nicolas von zur ; Rechert, Klaus ; Suchodoletz, Dirk von ; Max-Planck Institut für ausländisches und internationales Strafrecht (2012)
The Influence of trustworthiness of website layout on security perception of websites.
In: Current Issues in IT Security 2012 Schriftenreihe des Max-Planck-Instituts für ausländisches und internationales Strafrecht. Reihe I: Interdisziplinäre Forschungen aus Strafrecht und Kriminologie
Book Section, Bibliographie
Kuo, Po-Chun ; Schneider, Michael ; Dagdelen, Özgür ; Reichelt, Jan ; Buchmann, Johannes ; Cheng, Chen-Mou ; Yang, Bo-Yin
eds.: Preneel, Bart ; Takagi, Tsuyoshi (2011)
Extreme Enumeration on GPU and in Clouds - How Many Dollars You Need to Break SVP Challenges -.
Conference or Workshop Item, Bibliographie
Kiefer, Franziskus (2010)
Effiziente Implementierung des PACE - und EAC-Protokolls für mobile Geräte.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Karatsiolis, Vangelis ; Langer, Lucie ; Schmidt, Axel ; Tews, Erik ; Wiesmaier, Alexander (2010)
Cryptographic Application Scenarios.
Report, Bibliographie
Kaiser, Markus (2010)
Computer verification of algorithms using a formal proof system.
Technische Universität Darmstadt
Ph.D. Thesis, Bibliographie
Kühn, Ulrich ; Pyshkin, Andrei ; Tews, Erik ; Weinmann, Ralf-Philipp (2008)
Variants of Bleichenbacher's Low-Exponent Attack on PKCS#1 RSA Signatures.
Saarbrücken, Germany
Conference or Workshop Item, Bibliographie
Kern, Tobias (2008)
Next Generation Usability of Cryptography - Combining
FlexiProvider and JCrypToo.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Krimmer, Robert ; Volkamer, Melanie (2008)
Challenges Posted by Distance Voting in General: Postal Voting, and in Particular eVoting.
Report, Bibliographie
Krimmer, Robert ; Volkamer, Melanie
eds.: Krishna, Jaya ; Agarwal, Naveen Kumar (2008)
Observing Threats to Voters Anonymity: Election Observation of Electronic Voting.
Conference or Workshop Item, Bibliographie
Karatsiolis, Evangelos (2007)
Flexible Certificate Management in Public Key Infrastructures.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication
Kutscher, Dirk ; Ott, Jörg ; Bartsch, Steffen (2007)
Supporting network access and service location in dynamic environments.
In: Campus-Wide Information Systems, 24 (4)
doi: 10.1108/10650740710834626
Article, Bibliographie
Krimmer, Robert ; Triessnig, Stefan ; Volkamer, Melanie
eds.: Alkassar, Ammar ; Volkamer, Melanie (2007)
The Development of Remote E-Voting Around the World: A Review of Roads and Directions.
Bochum, Germany
Conference or Workshop Item, Bibliographie
Kurosawa, Kaoru ; Schmidt-Samoa, Katja (2006)
New Online/Offline Signature Schemes
Without Random Oracles.
New York, NY, USA
doi: 10.1007/11745853_22
Conference or Workshop Item, Bibliographie
Kaiser, Markus ; Buchmann, Johannes (2006)
Computer Verification in
Cryptography.
Conference or Workshop Item, Bibliographie
Kaiser, Markus ; Buchmann, Johannes (2006)
A Formal Approach for Proof
Constructions in Cryptography.
In: >International Journal of Computer Science, 1
Article, Bibliographie
Klink, Alexander (2006)
Cryptographic Voting Protocols - A Prototype Design and Implementation for University Elections at {TU} Darmstadt.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Köhler, Sabine (2006)
Sicherheitsparameter für das
Okamoto-Tanaka-Uchiyama Quanten-Public-Key-Kryptosystem.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Kotchourova, Inna (2006)
An Approach for Formal and Computer
Verification in Cryptography.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Kusch, Sebastian (2006)
Formalizing the {DSA} Signature Scheme
in Isabelle/{HOL}.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Karatsiolis, Evangelos ; Lippert, Marcus ; Wiesmaier, Alexander (2005)
Planning for Directory Services in
Public Key Infrastructures.
Regensburg
Conference or Workshop Item, Bibliographie
Kraatz, Sarah (2005)
Generische Konstruktion von Fail-Stop
Signatur Schemata.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Kramer, Kai (2005)
Trustcentermigration - Umstellung von
{LiDIA-CA} auf evaluierte Prozesse.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Krimmer, Robert ; Volkamer, Melanie
eds.: Schweighöfer, Erich ; Liebwald, Doris ; Augeneder, Silvia ; Menzel, Thomas (2005)
Wählen auf Distanz: Ein Vergleich zwischen elektronischen und nicht elektronischen Verfahren.
Conference or Workshop Item, Bibliographie
Karatsiolis, Vangelis ; Lippert, Marcus ; Wiesmaier, Alexander (2004)
Using {LDAP} Directories for
Management of {PKI} Processes.
Conference or Workshop Item, Bibliographie
Karatsiolis, Vangelis ; Lippert, Marcus ; Wiesmaier, Alexander ; Pitaev, Anna ; Ruppert, Markus ; Buchmann, Johannes (2004)
Towards a Flexible {Intra-Trustcenter}
Management Protocol.
In: >CoRR, cs.CR/0411067
Article, Bibliographie
Kurosawa, Kaoru ; Schmidt-Samoa, Katja ; Takagi, Tsuyoshi (2003)
A Complete and Explicit Security
Reduction Algorithm for RSA-Based Cryptosystems.
Taipei, Taiwan
doi: 10.1007/b94617
Conference or Workshop Item, Bibliographie
Kastell, Kira ; Meyer, Ulrike ; Jakoby, Rolf (2003)
Secure Handover Procedures.
Report, Bibliographie
Kastell, Kira ; Meyer, Ulrike ; Jakoby, Rolf (2003)
Secure Handover Procedures.
Conference or Workshop Item, Bibliographie
Kreuder, Alexander (2003)
Ein neuer Reduktionsbeweis für das
{RSA}-Paillier Kryptosystem.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie
Kurosawa, Kaoru ; Schmidt-Samoa, Katja ; Takagi, Tsuyoshi (2003)
A Complete and Explicit Security
Reduction Algorithm for RSA-Based Cryptosystems.
Report, Bibliographie
Kügler, Dennis ; Vogt, Holger (2002)
Fair Tracing without Trustees.
Grand Cayman, British West Indies
Conference or Workshop Item, Bibliographie
Kügler, Dennis (2002)
Ein mißbrauchfreies anonymes
elektonisches Zahlungssystem.
Technische Universität Darmstadt
Ph.D. Thesis, Bibliographie
Kügler, Dennis ; Vogt, Holger (2002)
Off-line Payments with Auditable
Tracing.
Report, Bibliographie
Kwiotek, Daniel (2002)
Entwicklung einer sicheren Web-Schnittstelle für eine bestehende Enterprise-Anwendung basierend auf {PKI}-Technologien am Beispiel der {ERP}-Software {ProAd}.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie
Kügler, Dennis ; Vogt, Holger (2001)
Marking: A Privacy Protecting Approach
Against Blackmailing.
Cheju Island, Korea
Conference or Workshop Item, Bibliographie
Kalenderian, Igor (2001)
Implementierung des Austausches kryptographischer Komponenten in {FlexiPKI} mittels Update Management Protocol.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Kügler, Dennis ; Vogt, Holger (2001)
Fair Tracing without Trustees.
Report, Bibliographie
Kügler, Dennis ; Vogt, Holger (2001)
Auditable Tracing with Unconditional
Anonymity.
Report, Bibliographie
Kügler, Dennis ; Vogt, Holger (2001)
Unsichtbare Markierungen in
elektronischem Geld.
Report, Bibliographie
Kügler, Dennis ; Vogt, Holger (2000)
Marking: A Privacy Protecting Approach
against Blackmailing.
Report, Bibliographie
Knabe, Thorsten (1999)
LiPS} basiertes Job Queueing System
für {LiDIA.
Report, Bibliographie
Kügler, Dennis ; Maurer, Markus (1999)
A Note on the Weakness of the
Maurer-Yacobi Squaring Method.
Report, Bibliographie
Kügler, Dennis ; Maurer, Markus ; Paulus, Sachar (1999)
Identitätsbasierte Kryptosysteme
als Alternative zu Public Key Infrastrukturen.
Report, Bibliographie
Kügler, Dennis (1998)
Eine Aufwandsanalyse für
identitätsbasierte Kryptosysteme.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie
Kenn, Holger (1996)
Entwurf eines einfachen Client-Server-Systems zur Verteilung von Schlüsseldaten asymmetrischer Kryptosysteme.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie
Keuschen, Patrick (1996)
Entwurf und Implementierung von ojekt-orientierten Bibliotheksroutinen zur Realisierung von Secret Sharing Schemata.
Technische Hochschule Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie
L
Liu, Mo-meng ; Krämer, Juliane ; Hu, Yu-pu ; Buchmann, Johannes (2018)
Quantum security analysis of a lattice-based oblivious transfer protocol.
In: Frontiers of Information Technology & Electronic Engineering, 18 (9)
Article, Bibliographie
Loiero, Mirjam (2018)
Fault Attacks on Multivariate Signature Schemes.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Lato, Ellen (2016)
Fault Attacks on Lattice-Based Encryption Schemes.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Lieb, Patrick ; Schmidt, Markus ; Wiesmaier, Alexander (2016)
ECDSA and QUARTZ in Comparison with RSA.
Report, Bibliographie
Loruenser, Thomas ; Rodriguez, Charles Bastos ; Demirel, Denise ; Fischer-Hübner, Simone ; Gross, Thomas R. ; Langer, Thomas ; des Noes, Mathieu ; Poehls, Henrich ; Rozenberg, Boris ; Slamanig, Daniel (2015)
Towards a New Paradigm for Privacy and Security in Cloud Services.
In: CoRR abs/1506.05980 (2015)
Article, Bibliographie
Letzkus, Fabian (2015)
NotaryCache: Preventing man-in-the-middle attacks through ubiquitous multi-path probing.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Likavec, Lena (2011)
Application of Lattice Basis Reduction.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Lindner, Richard (2011)
Towards Efficient Lattice-Based Cryptography.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication
Langer, Lucie ; Wiesmaier, Alexander ; Buchmann, Johannes (2011)
Secure Long-term Record Keeping in the Public Sector.
In: EGovernement Review, (7)
Article, Bibliographie
Lindner, Richard ; Peikert, Chris (2011)
Better Key Sizes (and Attacks) for LWE-Based Encryption.
Conference or Workshop Item, Bibliographie
Langer, Lucie (2010)
Privacy and Verifiability in Electronic Voting.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication
Langer, Lucie ; Schmidt, Axel ; Wiesmaier, Alexander (2010)
INNOVATIVE PERSONALAUSWEIS‐ANWENDUNGEN Mehrwert des elektronischen Personalausweises jenseits von Portal‐ und Formularanwendungen: Technische Machbarkeit und langfristige Sicherheit.
Report, Bibliographie
Langer, Lucie ; Volkamer, Melanie ; Schmidt, Axel ; Buchmann, Johannes (2010)
A Taxonomy Refining the Security Requirements for Electronic Voting: Analyzing Helios as a Proof of Concept.
5th International Conference on Availability, Reliability and Security. Krakow, Poland (15.02.2010-18.02.2010)
Conference or Workshop Item, Bibliographie
Langer, Lucie ; Jonker, Hugo ; Pieters, Wolter (2010)
Anonymity and Verifiability in Voting: Understanding (Un)Linkability.
Barcelona, Spain
Conference or Workshop Item, Bibliographie
Langer, Lucie ; Weber, Stefan ; Schmidt, Axel ; Buchmann, Johannes ; Volkamer, Melanie (2009)
Towards Long-Term Free and Secret Electronic Elections Providing Voter-Verifiability in the Bulletin Board Model.
Bogota, Colombia
Conference or Workshop Item, Bibliographie
Langer, Lucie ; Volkamer, Melanie ; Weber, Stefan ; Schmidt, Axel ; Buchmann, Johannes
eds.: Davies, Jim ; Janowski, Tomasz (2009)
Towards Long-Term Free and Secret Electronic Elections Providing Voter-Verifiability in the Bulletin Board Model.
Bogota
Conference or Workshop Item, Bibliographie
Langer, Lucie ; Wiesmaier, Alexander (2009)
Der Lifetime eSafe -- ein sicheres elektronisches Schließfach.
Geneva, Switzerland
Conference or Workshop Item, Bibliographie
Langer, Lucie ; Schmidt, Axel ; Wiesmaier, Alexander (2009)
Projekt Campuspilot -- Akzeptanzbericht.
Report, Bibliographie
Langer, Lucie ; Schmidt, Axel ; Buchmann, Johannes ; Volkamer, Melanie ; Stolfik, Alexander (2009)
Towards a Framework on the Security Requirements for Electronic Voting Protocols.
Atlanta, GA, USA
doi: 10.1109/RE-VOTE.2009.9
Conference or Workshop Item, Bibliographie
Langer, Lucie ; Schmidt, Axel ; Volkamer, Melanie ; Buchmann, Johannes
eds.: Fischer, Stefan ; Maehle, Erik ; Reischuk, Rüdiger (2009)
Classifying Privacy and Verifiability Requirements for Electronic Voting.
Conference or Workshop Item, Bibliographie
Langer, Lucie ; Schmidt, Axel ; Volkamer, Melanie (2009)
Verifizierbarkeit elektronischer Wahlen.
In: eGovernement Review, 4
Article, Bibliographie
Langer, Lucie ; Wiesmaier, Alexander (2009)
Langfristige Sicherheit am Beispiel eines virtuellen Tresors.
Report, Bibliographie
Lucks, Stefan ; Schuler, Andreas ; Tews, Erik ; Weinmann, Ralf-Philipp ; Wenzel, Matthias
ed.: Fischlin, Marc (2009)
Attacks on the DECT authentication mechanisms.
San Francisco, CA, USA
Conference or Workshop Item, Bibliographie
Langer, Lucie ; Schmidt, Axel ; Wiesmaier, Alexander (2009)
From Student Smartcard Applications to the German Electronic Identity Card.
Conference or Workshop Item, Bibliographie
Langer, Lucie ; Opitz-Talidou, Zoi (2009)
Elektronische Aufbewahrung von Wahldokumenten bei Onlinewahlverfahren.
Conference or Workshop Item, Bibliographie
Langer, Lucie ; Opitz-Talidou, Zoi (2009)
Elektronische Aufbewahrung von Wahldokumenten bei Onlinewahlen: Beweggründe, rechtliche Anforderungen und technische Umsetzung.
In: DuD, 9
Article, Bibliographie
Langer, Lucie (2009)
Long-term verifiability of remote electronic elections.
In: Practical studies in e-Governement
Book Section, Bibliographie
Langer, Lucie ; Schmidt, Axel ; Volkamer, Melanie (2009)
Verifizierbarkeit elektronischer Wahlen.
In: eGovernment Review, 4
Article, Bibliographie
Langer, Lucie ; Schmidt, Axel ; Volkamer, Melanie ; Buchmann, Johannes
eds.: Prosser, Alexander ; Parycek, Peter (2009)
Ein PKI-basiertes Protokoll für sichere und praktikable Onlinewahlen.
Conference or Workshop Item, Bibliographie
Langer, Lucie ; Schmidt, Axel (2008)
Onlinewahlen mit Wahldiensteanbieter - das Verbundprojekt voteremote.
Conference or Workshop Item, Bibliographie
Langer, Lucie ; Schmidt, Axel ; Buchmann, Johannes (2008)
Secure Online Elections in Practice.
Other, Bibliographie
Lei, Qin (2008)
Design and Implementation of Secure
Email for BlackBerry Devices -
Solutions in the enterprise contex.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Langer, Lucie ; Schmidt, Axel ; Araújo, Roberto (2008)
A pervasively verifiable online voting scheme.
Conference or Workshop Item, Bibliographie
Lehmann, Julian (2008)
Fast Elliptic Curve Operation Costs and Comparison of Sole Inversion Precomputation Schemes.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Längsfeld, Carsten (2008)
Entwurf und Implementierung eines OpenPGP Clients.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Langer, Lucie ; Schmidt, Axel ; Buchmann, Johannes
ed.: Remenyi, Dan (2008)
Secure and Practical Online Elections via Voting
Service Provider.
Conference or Workshop Item, Bibliographie
Langer, Lucie
ed.: Remenyi, Dan (2008)
Towards Legally Binding Online Elections in Germany.
Conference or Workshop Item, Bibliographie
Liu, Fen ; Ji, Wen ; Hu, Lei ; Ding, Jintai ; Lv, Shuwang ; Pyshkin, Andrei ; Weinmann, Ralf-Philipp (2007)
Analysis of the SMS4 Block Cipher.
Conference or Workshop Item, Bibliographie
Lulev, Hristo (2007)
Overview of Bit Commitment Schemes.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Lippert, Marcus ; Karatsiolis, Evangelos ; Wiesmaier, Alexander ; Buchmann, Johannes (2006)
Life-Cycle Management of X.509 Certifcates Based on LDAP Directories.
In: >Journal of Computer Security, 14 (5)
Article, Bibliographie
Lindner, Richard (2006)
Current Attacks on NTRU.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Langer, Lucie (2006)
Stromchiffren - Entwurf, Einsatz und
Schwächen.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Lippert, Marcus ; Karatsiolis, Evangelos ; Wiesmaier, Alexander ; Buchmann, Johannes (2005)
Directory Based Registration in Public Key Infrastructures.
Conference or Workshop Item, Bibliographie
Laabs, M. ; Merz, M. ; Wunderlich, J. ; Straub, T. (2005)
Benutzbarkeitsevaluation von
Trustcenter-Software am Beispiel der Windows 2003 Server {CA}.
Conference or Workshop Item, Bibliographie
Ludwig, Christoph (2005)
Practical Lattice Basis Sampling
Reduction.
Technische Universität Darmstadt
Ph.D. Thesis, Bibliographie
Lue, Feng (2004)
Security Analysis of {RSA}
Cryptosystem Against Side Channel Attacks.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Ludwig, Christoph (2003)
A Faster Lattice Reduction Method
Using Quantum Search.
Kyoto, Japan
Conference or Workshop Item, Bibliographie
Liese, Thorsten (2003)
Eine Software zur automatisierten
Erstellung von {IEEE829}-Testdokumentationen.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie
Ludwig, Christoph (2003)
A Faster Lattice Reduction Method
Using Quantum Search.
Report, Bibliographie
Ludwig, Christoph (2002)
The Security and Efficiency of
Micciancio{'}s Cryptosystem.
Report, Bibliographie
Lippert, Marcus (2000)
Ein beweisbar sicherer Pseudoufallsbit-Generator auf der Basis des {DL}-Problems in elliptischen Kurven.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie
Liefke, Thomas ; Rodeh, Ohad ; Setz, Thomas (1999)
First Steps in the Implementation of a
Fault-Tolerant Tuple - Space Machine for Volatile Data.
Report, Bibliographie
Liefke, Thomas ; Setz, Thomas (1999)
Extension of the {TRIPS} Prototype.
Report, Bibliographie
Liefke, Thomas (1997)
Tupleview: towards a Monitoring,
Debugging and Profiling Tool for {LiPS}.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie
Liefke, Thomas ; Setz, Thomas (1997)
Tupleview - ein Monitoring-,
Debugging- und Profiling-Tool für {LiPS}.
Report, Bibliographie
Lippmann, Jens (1997)
Integration einer Testumgebung in
{LiPS}.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie
Lehmann, Frank (1994)
Implementierung von Algorithmen zur Berechnung modularer Polynome und deren Anwendung im Algorithmus von Atkin.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie
Loho, Jürgen (1991)
Die Implementierung des Number Field Sieve.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie
M
Mulholland, John ; Mosca, Michele ; Braun, Johannes (2017)
The Day the Cryptography Dies.
In: IEEE Security & Privacy, 15 (4)
doi: 10.1109/MSP.2017.3151325
Article, Bibliographie
Mohamed, Mohamed Saied Emam ; Bansarkhani, Rachid El ; Petzoldt, Albrecht (2016)
MQSAS - A Multivariate Sequential Aggregate Signature Scheme.
Honolulu, Hi, USA
Conference or Workshop Item, Bibliographie
McGrew, David ; Kampanakis, Panos ; Fluhrer, Scott ; Gazdag, Stefan-Lukas ; Butin, Denis ; Buchmann, Johannes (2016)
State Management for Hash-Based Signatures.
Gaithersburg, USA
Conference or Workshop Item, Bibliographie
Marky, Karola ; Gutmann, Andreas ; Rack, Philipp ; Volkamer, Melanie (2016)
Privacy Friendly Apps-Making Developers Aware of Privacy Violations.
Conference or Workshop Item, Bibliographie
Mayer, Christoph (2016)
Implementing a Toolkit for Ring-LWE Cryptography.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Meuser, Tobias ; Schmidt, Larissa ; Wiesmaier, Alexander (2015)
Comparing Lightweight Hash Functions – PHOTON & Quark.
Report, Bibliographie
Mayer, Peter ; Volkamer, Melanie ; Kauer, Michaela
eds.: Prakash, Atul ; Shyamasundar, Rudrapatna (2014)
Authentication Schemes - Comparison and Effective Password Spaces.
International Conference on Information Systems Security (ICISS). Hyderabad, India (16.12.2014-20.12.2014)
doi: 10.1007/978-3-319-13841-1_12
Conference or Workshop Item, Bibliographie
Meziani, Mohammed (2014)
Designing and Improving Code-based Cryptosystems.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication
Mohamed, Mohamed Saied Emam ; Buchmann, Johannes (2014)
Mutant Differential Fault Analysis of Trivium MDFA.
Conference or Workshop Item, Bibliographie
Mohamed, Mohamed Saied Emam ; Bulygin, Stanislav ; Zohner, Michael ; Heuser, Annelie ; Walter, Michael ; Buchmann, Johannes (2013)
Improved Algebraic Side-Channel Attack on AES.
In: Journal of Cryptographic Engineering
Article, Bibliographie
Mohamed, Mohamed Saied Emam ; Bulygin, Stanislav ; Zohner, Michael ; Heuser, Annelie ; Walter, Michael ; Buchmann, Johannes (2012)
Improved Algebraic Side-Channel Attack on AES.
doi: 10.1109/HST.2012.6224335
Conference or Workshop Item, Bibliographie
Moecke, Cristian Thiago ; Volkamer, Melanie (2012)
Usable Secure Email Communications - Criteria and evaluation of existing approaches.
In: Information and Computer Security
doi: 10.1108/09685221311314419
Article, Bibliographie
Meziani, Mohammed (2012)
SBS: A Fast and Secure Syndrome Based Stream Cipher.
Other, Bibliographie
Meziani, Mohammed ; Hoffmann, Gerhard ; Cayrel, Pierre-Louis (2012)
Improving the Performance of the SYND Stream Cipher.
Al Akhawayn University, Ifran, Morocco
Conference or Workshop Item, Bibliographie
Meziani, Mohammed ; Bansarkhani, Rachid El (2012)
An Efficient and Secure Coding-based Authenticated Encryption.
Pisa, Italy
Conference or Workshop Item, Bibliographie
Mohamed, Mohamed Saied Emam ; Ding, Jintai ; Buchmann, Johannes
eds.: Kim, Tai-Hoon ; Adeli, Hojjat ; Robles, Rosslin John ; Balitanas, Maricel (2011)
Towards Algebraic Cryptanalysis of HFE Challenge 2.
Brno University, Czech Republic
doi: 10.1007/978-3-642-23141-4_12
Conference or Workshop Item, Bibliographie
Mohamed, Mohamed Saied Emam ; Bulygin, Stanislav ; Buchmann, Johannes
eds.: Kim, Tai-Hoon ; Adeli, Hojjat ; Robles, Rosslin John ; Balitanas, Maricel (2011)
Using SAT Solving to Improve Differential Fault Analysis of Trivium.
Brno, Czech Republic
doi: 10.1007/978-3-642-23141-4_7
Conference or Workshop Item, Bibliographie
Mohamed, Mohamed Saied Emam (2011)
Improved Strategies for Solving Multivariate Polynomial Equation Systems over Finite Fields.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication
McHardy, Patrick ; Schuler, Andreas ; Tews, Erik (2011)
Interactive decryption of DECT phone calls.
Hamburg
Conference or Workshop Item, Bibliographie
Meziani, M. ; Yousfi Alaoui, Sidi Mohamed el ; Cayrel, Pierre-Louis (2011)
Hash Functions Based on Coding Theory.
Conference or Workshop Item, Bibliographie
Mönkehues, Stephan (2011)
SWIFFT-Modifikationen, Korrektur von Operm5.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Mohamed, Mohamed Saied Emam ; Bulygin, Stanislav ; Buchmann, Johannes (2011)
Improved Differential Fault Analysis of Trivium.
Darmstadt
Conference or Workshop Item, Bibliographie
Milde, Benjamin ; Schneider, Michael (2011)
A Parallel Implementation of GaussSieve for the Shortest Vector Problem in Lattices.
Conference or Workshop Item, Bibliographie
Mohamed, Mohamed Saied Emam ; Ding, Jintai ; Buchmann, Johannes (2011)
The Complexity Analysis of the MutantXL Family.
In: IACR Cryptology ePrint Archive
Article, Bibliographie
Meziani, Mohammed ; Cayrel, Pierre-Louis ; Yousfi Alaoui, Sidi Mohamed el
eds.: Kim, Tai-Hoon ; Adeli, Hojjat ; Robles, Rosslin John ; Balitanas, Maricel (2011)
2SC: An Efficient Code-Based Stream Cipher.
Conference or Workshop Item, Bibliographie
Mohamed, Mohamed Saied Emam ; Cabarcas, Daniel ; Ding, Jintai ; Buchmann, Johannes ; Bulygin, Stanislav
eds.: Lee, Donghoon ; Hong, Seokhie (2010)
MXL3: An efficient algorithm for computing Gröbner bases of zero-dimensional ideals.
Seoul, Korea
doi: 10.1007/978-3-642-14423-3_7
Conference or Workshop Item, Bibliographie
Mohamed, Wael Said Abd Elmageed ; Bulygin, Stanislav ; Ding, Jintai ; Buchmann, Johannes ; Werner, Fabian
eds.: Heng, S.-H. ; Wright, R. N. ; Goi, B.-M. (2010)
Practical Algebraic Cryptanalysis for Dragon-based Cryptosystems.
Kuala Lumpur, Malaysia
doi: 10.1007/978-3-642-17619-7_11
Conference or Workshop Item, Bibliographie
Mohamed, Wael Said Abd Elmageed ; Ding, Jintai ; Kleinjung, Thorsten ; Bulygin, Stanislav ; Buchmann, Johannes
eds.: Cid, Carlos ; Faugere, Jean-Charles (2010)
PWXL: A Parallel Wiedemann-XL Algorithm for Solving Polynomial Equations over GF(2).
Conference or Workshop Item, Bibliographie
Marinov, Veselin (2010)
ECDSA Plug-in for the E-learning Platform JCrypTool.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Mohamed, Mohamed Saied Emam ; Ding, Jintai ; Buchmann, Johannes ; Werner, Fabian (2009)
Algebraic Attack on the MQQ Public Key Cryptosystem.
Kanazawa, Japan
doi: 10.1007/978-3-642-10433-6_26
Conference or Workshop Item, Bibliographie
Molter, Gregor ; Ogata, Kei ; Tews, Erik ; Weinmann, Ralf-Philipp (2009)
An Efficient FPGA Implementation for an DECT Brute-Force Attacking Scenario.
doi: 10.1109/ICWMC.2009.20
Conference or Workshop Item, Bibliographie
Mengele, Alexandra (2009)
Digital Enhanced Cordless Telecommunication (DECT) devices for residential use.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Mohamed, Mohamed Saied Emam ; Mohamed, Wael Said Abd Elmageed ; Ding, Jintai ; Buchmann, Johannes (2008)
MXL2: Solving Polynomial Equations over GF(2) Using an Improved Mutant Strategy.
doi: 10.1007/978-3-540-88403-3_14
Conference or Workshop Item, Bibliographie
Möller, Marco (2008)
Information Theoretical
Models for Hierarchical Structured Agents and their Computation</a>
- Informationtheoretische Modelle für hierarchisch
strukturierte Agenten und ihre Berechnung
(deutsche Zusammenfassung).
Technische Universität Darmstadt
Master Thesis, Bibliographie
Matzies, Alexander (2007)
Implementierung flexibler Skalarmultiplikation auf
Elliptischen Kurven.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Meziani, Mohammed (2007)
Konstruktion von Hashfunktionen.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Meyer, Ulrike ; Wetzel, Susanne (2006)
Introducing History Enriched Security Context Transfer to Enhance the Security of Susequent Handover.
Pisa, Italy
doi: 10.1109/PERCOMW.2006.70
Conference or Workshop Item, Bibliographie
Meyer, Andreas (2006)
{"U}ber die Sicherheit und Effizienz
kryptographischer Verfahren in algebraischen Zahlkörpern.
Technische Universität Darmstadt
Ph.D. Thesis, Bibliographie
Meyer, Ulrike (2005)
Secure Roaming and Handover Procedures
in Wireless Access Networks.
Technische Universität Darmstadt
Ph.D. Thesis, Bibliographie
Meyer, Ulrike ; Cordasco, Jared ; Wetzel, Susanne
eds.: Choi, Sunghyun ; Buddhikot, Milind ; Cigno, Renato Lo (2005)
An approach to enhance inter-provider
roaming through secret sharing and its application to {WLAN}s.
Conference or Workshop Item, Bibliographie
Meyer, Ulrike ; Wetzel, Susanne (2004)
A man-in-the-middle attack on {UMTS}.
Philadelphia, PA, USA
doi: 10.1145/1023646.1023662
Conference or Workshop Item, Bibliographie
Meyer, Ulrike ; Kastell, Kira ; Fernandez-Pello, Adrian ; Perez, Diego ; Jakoby, Rolf (2004)
Advantage and Use of a Location Based
Handover Algorithm.
Conference or Workshop Item, Bibliographie
Meyer, Ulrike ; Wetzel, Susanne (2004)
On the Impact of GSMs Encryption and
Man-in-the-middle Attacks on the Security of Interoperating GSM/UMTS Networks.
The 15th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications - PIMRC 2004. Barcelona, Spain (05.09.2004-08.09.2004)
doi: 10.1109/PIMRC.2004.1368846
Conference or Workshop Item, Bibliographie
Müller, Tobias (2004)
Sicherheitsparameter für Regevs
Kryptosystem.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Möller, Bodo (2003)
Improved Techniques for Fast
Exponentiation.
Conference or Workshop Item, Bibliographie
Möller, Bodo (2003)
Provably Secure Public-Key
Encryptionfor Length-Preserving Chaumian Mixes.
San Francisco, CA, USA
Conference or Workshop Item, Bibliographie
Möller, Bodo (2003)
Improved Techniques for Fast
Exponentiation.
Seoul, Korea
Conference or Workshop Item, Bibliographie
Möller, Bodo (2003)
Public-Key Cryptography - Theory and
Practice.
Technische Universität Darmstadt
Ph.D. Thesis, Bibliographie
Möller, Bodo (2002)
Parallelizable Elliptic Curve Point Multiplication Method with Resistance against Side-Channel Attacks.
Sao Paulo, Brazil
Conference or Workshop Item, Bibliographie
Maseberg, Jan Sönke (2002)
Fail-Safe-Konzept für Public-Key-Infrastrukturen.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication
Möller, Bodo (2002)
Provably Secure Public-Key Encryption
for Length-Preserving Chaumian Mixes.
Report, Bibliographie
Müller, Andreas Rudolf (2002)
JLiPSD} - eine Portierung des lipsd
nach {Java.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie
Möller, Bodo (2001)
Securing Elliptic Curve Point
Multiplication against Side-Channel Attacks.
Malaga, Spain
Conference or Workshop Item, Bibliographie
Meyer, Andreas ; Neis, Stefan ; Pfahler, Thomas (2001)
First Implementation of Cryptographic
Protocols Based on Algebraic Number Fields.
doi: 10.1007/3-540-47719-5_9
Conference or Workshop Item, Bibliographie
Maurer, Markus (2000)
Regulator approximation and fundamental unit computation for real-quadratic orders.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication
Müller, Volker ; Stein, Andreas ; Thiel, Christoph (1999)
Computing discrete logarithms in real
quadratic congruence function fields of large genus.
In: >Mathematics of Computation, 68 (226)
Article, Bibliographie
Müller, Volker ; Paulus, Sachar (1998)
Elliptische Kurven und Public Key
Kryptographie.
Other, Bibliographie
Müller, Volker (1998)
Fast Multiplication on Elliptic Curves
over Small Fields of Characteristic Two.
In: >Journal of Cryptology, 11 (4)
Article, Bibliographie
Müller, Volker ; Vanstone, Scott ; Zuccherato, Robert (1998)
Discrete Logarithm Based Cryptosystems
in Quadratic Function Fields of Characteristic 2.
In: >Designs, Codes and Cryptography, 14 (2)
Article, Bibliographie
Maurer, Markus (1997)
The logarithm function in LiDIA's
bigfloat class.
Report, Bibliographie
Meyer, Andreas (1997)
Ein neues Identifikations- und
Signaturverfahren über imaginär-quadratischen Klassengruppen.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie
Müller, Volker (1997)
Fast Multiplication on Elliptic Curves
over Small Fields of Characteristic Two.
Report, Bibliographie
Müller, Volker (1997)
Efficient Algorithms for
Multiplication on Elliptic Curves.
Report, Bibliographie
Müller, Volker (1997)
Efficient Algorithms for
Multiplication on Elliptic Curves.
Other, Bibliographie
Müller, Volker ; Paulus, Sachar (1997)
On the Generation of Cryptographically
Strong Elliptic Curves.
Report, Bibliographie
Meyer, Bernd ; Müller, Volker (1996)
A Public Key Cryptosystem Based on
Elliptic Curves over {Z/nZ} Equivalent to Factoring.
Saragossa, Spain
Conference or Workshop Item, Bibliographie
Mignotte, Maurice ; Pethö, Attila ; Roth, Ralf (1996)
Complete solutions of a family of
quartic Thue and index form equations.
In: >Mathematics of Computation, 65 (213)
Article, Bibliographie
Monstadt, Andreas (1996)
Eine Entwicklungsumgebung für die
objektorientierte Bibliothek {LiDIA}.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie
Meyer, Bernd (1995)
Zur Trennung von Klassen ununterscheidbarer Ensembles.
Universität des Saarlandes
Ph.D. Thesis, Bibliographie
Müller, Andreas (1995)
Eine {FFT}-Continuation für die
elliptische Kurvenmethode.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie
Müller, Volker (1995)
Ein Algorithmus zur Bestimmung der Punktanzahl elliptischer Kurven über Körpern der Charakteristik größer drei.
Universität des Saarlandes
Ph.D. Thesis, Bibliographie
Maurer, Markus (1994)
Eine Implementierung des Algorithmus von Atkin zur Berechnung der Punktanzahl elliptischer Kurven über endlichen Primkörpern der Charakteristik größer drei.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie
Müller, Achim (1994)
Effiziente Algorithmen für Probleme der linearen Algebra über {$mathbbZ$}.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie
Merscher, Patrick (1992)
Standards für objektorientiertes Programmieren in der Computeralgebra.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie
Meyer, Bernd (1992)
Bit-Commitment-Schemes und Zero-Knowledge.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie
Müller, Volker (1991)
Berechnung der Punktanzahl Elliptischer Kurven über endlichen Primkörpern.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie
N
Neumann, Stephan ; Volkamer, Melanie ; Budurushi, Jurlind ; Prandini, Marco (2016)
SecIVo: a quantitative security evaluation framework for internet voting schemes.
In: >Annals of Telecommunications
doi: 10.1007/s12243-016-0520-0
Article, Bibliographie
Neumann, Stephan ; Volkamer, Melanie ; Strube, Moritz ; Jung, Wolfgang ; Brelle, Achim (2015)
Cast-as-intended-Verifizierbarkeit für das Polyas-Internetwahlsystem.
In: Datenschutz und Datensicherheit, 2015 (11)
doi: 10.1007/s11623-015-0512-7
Article, Bibliographie
Neumann, Stephan ; Feier, Christian ; Sahin, Perihan ; Fach, Sebastian (2014)
Pretty Understandable Democracy 2.0.
Lochau
Conference or Workshop Item, Bibliographie
Neumann, Stephan ; Olembo, Maina ; Renaud, Karen ; Volkamer, Melanie
eds.: Kö, Andrea ; Francesconi, Enrico (2014)
Helios Verification: To Alleviate, or to Nominate: Is That The Question, Or Shall We Have Both?
München
Conference or Workshop Item, Bibliographie
Neumann, Stephan ; Kulyk, Oksana ; Volkamer, Melanie (2014)
A Usable Android Application Implementing Distributed Cryptography For Election Authorities.
Fribourg, Switzerland
Conference or Workshop Item, Bibliographie
Neumann, Stephan ; Budurushi, Jurlind ; Volkamer, Melanie
eds.: Zissis, Dimitrios ; Lekkas, Dimitrios (2014)
Analysis of Security and Cryptographic Approaches to Provide Secret and Verifiable Electronic Voting.
Book Section, Bibliographie
Neumann, Stephan ; Kahlert, Anna ; Henning, Maria ; Richter, Philipp ; Jonker, Hugo ; Volkamer, Melanie
eds.: Wimmer, Maria ; Tambouris, Efthimios ; Macintosh, Ann (2013)
Modeling the German Legal Latitude Principles.
Koblenz, Germany
Conference or Workshop Item, Bibliographie
Neumann, Stephan ; Kulyk, Oksana ; Murati, Lulzim ; Volkamer, Melanie (2013)
Towards a Practical Mobile Application for Election Authorities (Demo).
Conference or Workshop Item, Bibliographie
Neumann, Stephan ; Kahlert, Anna ; Henning, Maria ; Jonker, Hugo ; Volkamer, Melanie (2013)
Informatische Modellierung der Prinzipien des gesetzlichen Gestaltungsspielraums im Hinblick auf Wahlsysteme.
Salzburg, Austria
Conference or Workshop Item, Bibliographie
Nie, Xuyun ; Xu, Zhaohu ; Buchmann, Johannes
ed.: Gaborit, Philippe (2013)
Cryptanalysis of Hash-based Tamed Transformation and Minus Signature Scheme.
Limoges, France
Conference or Workshop Item, Bibliographie
Nie, Xuyun ; Petzoldt, Albrecht ; Buchmann, Johannes (2013)
Cryptanalysis of 2-layer Nonlinear Piece In Hand Method.
Regensburg, Germany
Conference or Workshop Item, Bibliographie
Neumann, Stephan ; Volkamer, Melanie (2012)
Civitas and the Real World: Problems and Solutions from a Practical Point of View.
Prague, Czech Republic
doi: 10.1109/ARES.2012.75
Conference or Workshop Item, Bibliographie
Niebuhr, Robert (2012)
Attacking and Defending Code-based Cryptosystems.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication
Nickel, Claudia (2012)
Accelerometer-based Biometric Gait Recognition for Authentication on Smartphones.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication
Niebuhr, Robert ; Meziani, Mohammed ; Bulygin, Stanislav ; Buchmann, Johannes (2012)
Selecting Parameters for Secure McEliece-based Cryptosystems.
In: International Journal of Information Security, 11 (3)
Article, Bibliographie
Neumann, Stephan ; Volkamer, Melanie (2012)
Formal Treatment of Distributed Trust in Electronic Voting.
Stuttgart. Germany
Conference or Workshop Item, Bibliographie
Niebuhr, Robert ; Cayrel, Pierre-Louis (2011)
Broadcast Attacks against Code-Based Schemes.
Weimar, Germany
Conference or Workshop Item, Bibliographie
Niebuhr, Robert ; Cayrel, Pierre-Louis ; Buchmann, Johannes (2011)
Improving the effciency of Generalized Birthday Attacks against certain structured cryptosystems.
Conference or Workshop Item, Bibliographie
Nohl, Karsten ; Tews, Erik (2010)
Kann man mit DECT noch vertraulich telefonieren?
In: >Datenschutz und Datensicherheit (DuD), 34 (11)
Article, Bibliographie
Niebuhr, Robert ; Cayrel, Pierre-Louis ; Bulygin, Stanislav ; Buchmann, Johannes (2010)
On lower bounds for Information Set Decoding over F_q.
Conference or Workshop Item, Bibliographie
Nohl, Karsten ; Tews, Erik ; Weinmann, Ralf-Philipp (2010)
Cryptanalysis of the DECT Standard Cipher.
Seoul
Conference or Workshop Item, Bibliographie
Niebuhr, Robert ; Cayrel, Pierre-Louis ; Bulygin, Stanislav ; Buchmann, Johannes (2010)
Attacking code/lattice-based cryptosystems using Partial Knowledge.
Conference or Workshop Item, Bibliographie
Nussbaumer, Mihaela (2008)
Elektronische (Langzeit-)Archivierung
mit Hilfe digitaler Signaturen.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Nauheimer, Frank (2007)
Development of a lattice based blind signature scheme.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Nguentcheu, Paul Cesar (2007)
Analyse, Design und Implementierung
von Krypto-Verfahren zur sicheren Netzwerkkommunikation.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Niebuhr, Robert (2006)
Application of Algebraic-Geometric
Codes in Cryptography.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Neis, Stefan (2002)
Zur Berechnung von Klassengruppen.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication
Neis, Stefan (1998)
Reducing Ideal Arithmetic to Linear
Albebra Problems.
Report, Bibliographie
Nüsseler, Markus (1998)
Sicherer Zugangsschutz mit Hilfe eines
Einmalpaßwortgenerators auf einer Chipkarte.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie
Neis, Stefan (1994)
Kurze Darstellungen von Ordnungen.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie
Naumann-Kipper, Petra (1992)
Interaktive Beweissysteme und {Arthur-Merlin- Beweissysteme}.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie
O
Olembo, Maina ; Renaud, Karen ; Bartsch, Steffen ; Volkamer, Melanie (2014)
Voter, What Message Will Motivate You to Verify Your Vote?
San Diego
doi: 10.14722/usec.2014.23038
Conference or Workshop Item, Bibliographie
Olembo, Maina ; Bartsch, Steffen ; Volkamer, Melanie
eds.: Schneider, Steve ; Heather, James ; Teague, Vanessa (2013)
Mental Models of Verifiability in Voting.
University of Surrey, Guildford, UK
Conference or Workshop Item, Bibliographie
Olembo, Maina ; Volkamer, Melanie
eds.: Saeed, Saqib ; Reddick, Christopher (2013)
E-Voting System Usability: Lessons for Interface Design, User Studies, and Usability Criteria.
doi: 10.4018/978-1-4666-3640-8.ch011
Book Section, Bibliographie
Olembo, Maina ; Stockhardt, Simon ; Hülsing, Andreas ; Volkamer, Melanie
ed.: University, Plymouth (2013)
Developing and Testing a Visual Hash Scheme.
Conference or Workshop Item, Bibliographie
Olembo, Maina ; Volkamer, Melanie (2012)
Recommendations For E-Voting System Usability: Lessons From Literature For Interface Design, User Studies, and Usability Criteria.
Report, Bibliographie
Olembo, Maina ; Kahlert, Anna ; Neumann, Stephan ; Volkamer, Melanie
eds.: Kripp, Melanie J. ; Volkamer, Melanie ; Grimm, Rüdiger (2012)
Partial Verifiability in POLYAS for the GI Elections.
Castle Hofen, Bregenz, Austria
Conference or Workshop Item, Bibliographie
Olembo, Maina ; Volkamer, Melanie (2011)
Authentication Techniques, Client-Side Voting Software, and Secure Platform Mechanisms.
Report, Bibliographie
Olembo, Maina ; Schmidt, Patrick ; Volkamer, Melanie (2011)
Introducing Verifiability in the POLYAS Remote Electronic Voting System.
Vienna, Austria
Conference or Workshop Item, Bibliographie
Overbeck, Raphael (2007)
Public Key Cryptography based on Coding Theory.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication
Oberender, Jens ; Volkamer, Melanie ; Meer, Hermann de (2007)
Denial-of-Service Flooding Detection in Anonymity Networks.
Conference or Workshop Item, Bibliographie
Overbeck, Raphael (2006)
Statistical Decoding Revisited.
doi: 10.1007/11780656_24
Conference or Workshop Item, Bibliographie
Overbeck, Raphael (2006)
Extending Gibson's attacks on the
{GPT} Cryptosystem.
doi: 10.1007/11779360_15
Conference or Workshop Item, Bibliographie
Overbeck, Raphael (2005)
A New Structural Attack for GPT and
Variants.
Kuala Lumpur, Malaysia
doi: 10.1007/11554868_5
Conference or Workshop Item, Bibliographie
Okeya, Katsuyuki ; Takagi, Tsuyoshi ; Vuillaume, Camille (2004)
On the Importance of Protecting
{$Delta$} in {SFLASH} against Side Channel Attacks.
Las Vegas, Nevada, USA
Conference or Workshop Item, Bibliographie
Okeya, Katsuyuki ; Schmidt-Samoa, Katja ; Spahn, Christian ; Takagi, Tsuyoshi (2004)
Signed Binary Representations
Revisited.
Advances in cryptology : proceedings / CRYPTO 2004, 24th Annual International Cryptology Conference. Santa Barbara, California, USA (15.08.2004-19.08.2004)
Conference or Workshop Item, Bibliographie
Okeya, Katsuyuki ; Takagi, Tsuyoshi ; Vuillaume, Camille (2004)
On the Importance of Protecting
{$Delta$} in {SFLASH} against Side Channel Attack.
Report, Bibliographie
Overbeck, Raphael (2004)
Potential und Grenzen der Anwendung
von Gitterreduktionsalgorithmen in der Kryptographie.
Technische Universität Darmstadt
Master Thesis, Bibliographie
P
Petzoldt, Albrecht ; Szepieniec, Alan ; Mohamed, Mohamed Saied Emam (2017)
A Practical Multivariate Blind Signature Scheme.
Malta
Conference or Workshop Item, Bibliographie
Petzoldt, Albrecht ; Cheng, Ming-Shing ; Yang, Bo-Yin ; Chengdong, Tao ; Ding, Jintai (2015)
Design Principles for HFEv- based Signature Schemes.
Auckland, New Zealand
Conference or Workshop Item, Bibliographie
Petzoldt, Albrecht ; Bulygin, Stanislav ; Buchmann, Johannes (2013)
A multivariate based threshold ring signature scheme.
In: Applicable Algebra in Engineering, Communication and Computing, 24 (3 - 4)
doi: 10.1007/s00200-013-0190-3
Article, Bibliographie
Petzoldt, Albrecht (2013)
Selecting and Reducing Key Sizes for Multivariate Cryptography.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication
Petzoldt, Albrecht ; Bulygin, Stanislav ; Buchmann, Johannes
ed.: Gaborit, Philippe (2013)
Fast Verification for Improved Versions of the UOV and Rainbow Signature Schemes.
Limoges, France
Conference or Workshop Item, Bibliographie
Petzoldt, Albrecht ; Bulygin, Stanislav (2012)
Linear Recurring Sequences for the UOV Key Generation Revisited.
Seoul, Korea
Conference or Workshop Item, Bibliographie
Petzoldt, Albrecht ; Thomae, Enrico ; Bulygin, Stanislav ; Wolf, Christopher
eds.: Preneel, Bart ; Takagi, Tsuyoshi (2011)
Small Public Keys and Fast Verification for Multivariate Quadratic Public Key Systems.
Conference or Workshop Item, Bibliographie
Petzoldt, Albrecht ; Bulygin, Stanislav ; Buchmann, Johannes
eds.: Catalano, Dario ; Fazio, Nelly ; Gennaro, Rosario ; Nicolosi, Antonio (2011)
Linear Recurring Sequences for the UOV Key Generation.
Conference or Workshop Item, Bibliographie
Popovic, Darko (2011)
Kosten-Nutzen-Analyse von elektronischen Wahlen an der TU Darmstadt.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Petzoldt, Albrecht ; Bulygin, Stanislav ; Buchmann, Johannes
eds.: Gong, G. ; Gupta, K. C. (2010)
CyclicRainbow - A multivariate Signature Scheme with a Partially Cyclic Public Key.
Conference or Workshop Item, Bibliographie
Petzoldt, Albrecht ; Bulygin, Stanislav ; Buchmann, Johannes
eds.: Cid, Carlos ; Faugere, Jean-Charles (2010)
A Multivariate Signature Scheme with a Partially Cyclic Public Key.
Conference or Workshop Item, Bibliographie
Popall, Enrico (2010)
Wirtschaftlicher Nutzen des neuen Personalausweises.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Petzoldt, Albrecht ; Bulygin, Stanislav ; Buchmann, Johannes
ed.: Sendrier, Nicolas (2010)
Selecting Parameters for the Rainbow Signature Scheme.
Conference or Workshop Item, Bibliographie
Pyshkin, Andrey (2008)
Algebraic
Cryptanalysis in Block Ciphers Using Gröbner Bases.
Technische Universität Darmstadt
Ph.D. Thesis, Bibliographie
Pancheva, Krasimira (2007)
On Lattices, Codes and Regev{'}s
Cryptosystem.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Peter, Markus (2006)
Angriffe auf das {McEliece}
Kryptosystem.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Penev, Tsvetan (2005)
Identity Based Public Key
Infrastructures.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Peter, Markus (2005)
Effizienz- und Sicherheitsanalyse von
Micropayment Systemen.
Other, Bibliographie
Poeplau, Lea (2005)
Counting Points on Elliptic Curves.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Pape, Sebastian (2004)
Sicherheitsmodelle für das
Ajtai-Dwork-Kryptosystem.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Pitaev, Anna (2004)
Entwurf und Implementierung einer
Revokationskomponente für ein {Java}-basiertes Trustcenter.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Planz, Thilo (2002)
Entwurf und Implementierung einer
Infrastruktur für ein {Java}-basiertes Trustcenter.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie
Planz, Thilo (2002)
Konzepte für eine sichere
Schlüsselverwaltung.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie
Petter, Andreas (2001)
Kryptographie mit algebraischen
Zahlkörpern: Relevante Schlüssellängen.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie
Paulus, Sachar ; Takagi, Tsuyoshi (2000)
A New Public-Key Cryptosystem over a
Quadratic Order with Quadratic Decryption Time.
In: >Journal of Cryptology, 13
Article, Bibliographie
Paulus, Sachar ; Rück, Hans-Georg (1999)
Real and imaginary quadratic
representations of hyperelliptic function fields.
In: >Mathematics in Computation, 68 (227)
Article, Bibliographie
Paulus, Sachar ; Takagi, Tsuyoshi (1999)
A new public-key cryptosystem over
quadratic orders with quadratic decryption time.
Report, Bibliographie
Paulus, Sachar ; Takagi, Tsuyoshi (1998)
A generalization of the Diffie-Hellman
problem and related cryptosystems allowing fast decryption.
Seoul, Korea
Conference or Workshop Item, Bibliographie
Paulus, Sachar (1998)
Lattice Basis Reduction in Function
Fields.
Portland, Oregon, USA
Conference or Workshop Item, Bibliographie
Paulus, Sachar (1998)
Lattice Basis Reduction in Function
Fields.
Report, Bibliographie
Paulus, Sachar ; Takagi, Tsuyoshi (1998)
A generalization of the Diffie-Hellman
problem and related cryptosystems allowing fast decryption.
Report, Bibliographie
Pfahler, Thomas (1998)
Polynomfaktorisierung über
endlichen Körpern.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie
Papanikolaou, Thomas (1997)
Technical documentation using a {C++}
to {LaTeX} formatting program.
Report, Bibliographie
Papanikolaou, Thomas (1997)
Entwurf und Entwicklung einer objektorientierten Bibliothek für algorithmische Zahlentheorie.
Universität des Saarlandes
Ph.D. Thesis, Bibliographie
Papanikolaou, Thomas ; Zayer, Jörg (1997)
{ALGO.STY} - a {LaTeX} style for
algorithm editing.
Report, Bibliographie
Paulus, Sachar (1997)
{MAJA} - Das Konzept eines Multi
Application {JavaCard} Environment.
Report, Bibliographie
Paulus, Sachar ; Rück, Hans-Georg (1997)
Real and imaginary quadratic
representations of hyperelliptic function fields.
Report, Bibliographie
Paulus, Sachar ; Setz, Thomas (1997)
Developing and Testing a Smart Card
Application.
Report, Bibliographie
Paulus, Sachar (1996)
Ein Algorithmus zur Berechnung der
Klassengruppe quadratischer Ordnungen über Hauptidealringen.
Report, Bibliographie
Papanikolaou, Thomas (1993)
libF - Eine lange Gleitpunktarithmetik.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie
Paulus, Sachar (1992)
Algorithmen für endliche abelsche Gruppen.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie
R
Roth, Johannes ; Karatsiolis, Vangelis ; Krämer, Juliane (2020)
Classic McEliece Implementation with Low Memory Footprint.
19th Smart Card Research and Advanced Application Conference (CARDIS 2020). virtual Conference (18.11.2020-19.11.2020)
Conference or Workshop Item, Bibliographie
Ranly, Paul Moritz (2019)
On the feasibility of hierarchical secret sharing-based distributed storage systems.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Roepke, Rene ; Thraem, Timo ; Wagener, Johannes ; Wiesmaier, Alexander (2016)
A Survey on Protocols securing the Internet of Things: DTLS, IPSec and IEEE 802.11i.
Report, Bibliographie
Roth, Johannes (2016)
Analyse von TLS Bibliotheken basierend auf Fuzz Testing.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Rauzy, Pablo ; Kiss, Ágnes ; Krämer, Juliane ; Seifert, Jean-Pierre (2016)
Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT.
doi: 10.1007/978-3-319-43283-0_7
Conference or Workshop Item, Bibliographie
Rieß, Susanne (2016)
An Analysis of Lattice-Based Key Exchange Protocols.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Radeck-Arneth, Stephan ; Milde, Benjamin ; Lange, Arvid ; Gouvea, Evandro ; Radomski, Stefan ; Biemann, Chris ; Mühlhäuser, Max
eds.: Král, Pavel ; Matoušek, Václav (2015)
Open-Source German Distant Speech Recognition: Corpus and Acoustic Model.
doi: 10.1007/978-3-319-24033-6
Conference or Workshop Item, Bibliographie
Renaud, Karen ; Volkamer, Melanie (2015)
Exploring Mental Models Underlying PIN Management Strategies.
Conference or Workshop Item, Bibliographie
Radeck-Arneth, Stephan ; Biemann, Chris ; Schnelle-Walka, Dirk (2014)
Towards Ambient Search.
Conference or Workshop Item, Bibliographie
Riecker, Michael ; Yuan, Dingwen ; Bansarkhani, Rachid El ; Hollick, Matthias (2014)
Patrolling wireless sensor networks: Randomized intrusion detection.
Montreal, QC, Canada
Conference or Workshop Item, Bibliographie
Riecker, Michael ; Biedermann, Sebastian ; Bansarkhani, Rachid El ; Hollick, Matthias (2014)
Lightweight Energy Consumption Based Intrusion Detection System for Wireless Sensor Networks.
In: International Journal of Information Security, 14 (2)
Article, Bibliographie
Rynkowski, Gregor (2013)
Individuell angepasstes Vertrauen in die Web-PKI: Eine Analyse des Einsparungspotentials an vertrauenswürdigen CAs.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Rothenberg, Christian Esteve ; Macapuna, Carlos A. B. ; Magalhães, Maurício F. ; Verdi, Fábio ; Wiesmaier, Alexander (2011)
In-packet Bloom Filters: Design and Networking Applications.
In: Computer Networks - The International Journal of Computer and Telecommunications Networking, 55 (6)
Article, Bibliographie
Rückert, Markus (2011)
Lattice-based Signature Schemes with Additional Features.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication
Rückert, Markus
ed.: Abe, Masayuki (2010)
Lattice-based Blind Signatures.
Singapore
Conference or Workshop Item, Bibliographie
Rückert, Markus
eds.: Garay, Markus A. ; Prisco, Roberto De (2010)
Adaptively Secure Identity-based Identification from Lattices without Random Oracles.
Amalfi, Italy
Conference or Workshop Item, Bibliographie
Rückert, Markus (2010)
Strongly Unforgeable Signatures and Hierarchical Identity-based Signatures from Lattices Without Random Oracles.
Darmstadt
Conference or Workshop Item, Bibliographie
Rückert, Markus ; Schröder, Dominique
eds.: Bernstein, Daniel ; Lange, Tanja (2010)
Fair Partially Blind Signatures.
Conference or Workshop Item, Bibliographie
Rückert, Markus ; Schneider, Michael ; Schröder, Dominique
eds.: Zhou, Jianying ; Yung, Moti (2010)
Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs.
Beijing, China
Conference or Workshop Item, Bibliographie
Röhrig, Rouven (2010)
Entwurf und Implementierung eines Plug-ins für JCrypTool - S/MIME-Visualisierung.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Richter, Philipp ; Langer, Lucie ; Hupf, Katharina ; Volkamer, Melanie ; Buchmann, Johannes
eds.: Schweighöfer, Erich ; Geist, Anton ; Staufer, Ines (2010)
Verifizierbarkeit und Öffentlichkeitsgrundsatz bei elektronischen Wahlen.
Salzburg
Conference or Workshop Item, Bibliographie
Rückert, Markus ; Schröder, Dominique
eds.: Shacham, Hovav ; Waters, Brent (2009)
Security of Verifiably Encrypted Signatures and a Construction Without Random Oracles.
Palo Alto, USA
Conference or Workshop Item, Bibliographie
Rückert, Markus
eds.: Roy, Bimal ; Sendrier, Nicolas (2009)
Verifiably Encrypted Signatures from RSA without NIZKs.
New Delhi, India
Conference or Workshop Item, Bibliographie
Roch, Steffen (2009)
Konzeption und Integration eines sicheren drahtlosen Netzwerks im Unternehmensumfeld (am Beispiel des Heraeus Konzerns).
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Rückert, Markus ; Schröder, Dominique (2009)
Aggregate and Verifiably Encrypted Signatures from Multilinear Maps Without Random Oracles.
Seoul
Conference or Workshop Item, Bibliographie
Rupp, Andy ; Leander, Gregor ; Bangerter, Endre ; Dent, Alexander ; Sadeghi, Ahmad-Reza (2008)
Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems.
Conference or Workshop Item, Bibliographie
Richter, Peter (2008)
Optimierung des Merkle-Signaturverfahrens auf System z.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Rohde, Sebastian ; Eisenbarth, Thomas ; Dahmen, Erik ; Buchmann, Johannes ; Paar, Christof
eds.: Grimaud, Gilles ; Standaert, François-Xavier (2008)
Fast Hash-Based Signatures on Constrained Devices.
London, GB
Conference or Workshop Item, Bibliographie
Roth, Adrian (2008)
Implementierung von Applikationen für den FINREAD
Kartenleser.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Rohde, Sebastian ; Eisenbarth, Thomas ; Dahmen, Erik ; Buchmann, Johannes ; Paar, Christof (2008)
Efficient Hash-Based Signatures on Embedded Devices.
Conference or Workshop Item, Bibliographie
Ruseva, Desislava (2008)
Security Analysis of Quaternion Signatures.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Rexroth, Peer ; Wiesmaier, Alexander (2007)
MAVA - Modular Security for Distributed Applications.
Report, Bibliographie
Roth, Andreas (2007)
Flexible - Eine erweiterbare {GUI} f{\"u}r den FlexiProvider
(Backend).
Technische Universität Darmstadt
Master Thesis, Bibliographie
Rückert, Markus (2007)
Implementierung und Analyse von gitterbasierten
Angriffen auf {NTRU}.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Rauchschwalbe, Ulrich ; Wiesmaier, Alexander ; Ludwig, Christoph ; Buchmann, Johannes (2006)
Digital Signierte Wägeresultate -
Neue Wege in der Sicherung eichfähiger Messwerte.
In: Wägen, Dosieren, Mischen - (WDM), (3)
Article, Bibliographie
Roth, Volker ; Straub, Tobias ; Richter, Kai (2005)
Security and usability engineering
with particular attention to electronic mail.
In: >International Journal of Man-Machine Studies, 63 (1-2)
Article, Bibliographie
Ruppert, Markus ; Tak, Markus (2001)
Sicherheitsmanagement durch
generische, objektorientierte Modellierung einer TrustCenter Software.
Report, Bibliographie
Rauch, Katja (2000)
Implementierung von symmetrischen
Verschlüsselungsverfahren.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie
Rau, Andrea (1999)
Bestimmung der Anzahl rationaler Punkte elliptischer Kurven über endlichen Körpern der Charakteristik 2.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie
Roth, Bärbel (1996)
Pseudozufallszahlengeneratoren in
{LiSA}.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie
Roth, Ralf ; Setz, Thomas (1993)
Distributed Processing with {LiPS}.
Other, Bibliographie
Roth, Ralf ; Setz, Thomas (1993)
{LiPS}: a system for distibuted
processing on workstations.
Book, Bibliographie
Roth, Ralf (1992)
{LiPS} Ein System für verteilte Anwendungen.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie
S
Schneider, Tidarat ; Kerber, Jens ; Goldstein, Denise ; Takeva, Savina ; Stemmler, Elisabeth
eds.: Braun, Johannes ; Schneider, Tidarat ; Goldstein, Denise (2019)
Software-Cluster international - Innovation durch Internationalisierung: Ein Leitfaden.
Report, Bibliographie
Schwind, Julian (2019)
Sicherheits- und Datenschutzkonzept für die zentrale Verteilung von PPDs.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Schabhüser, Lucas ; Butin, Denis ; Buchmann, Johannes (2019)
Context Hiding Multi-Key Linearly Homomorphic Authenticators.
San Francisco, CA, USA (04.03.2019-08.03.2019)
Conference or Workshop Item, Bibliographie
Schabhüser, Lucas ; Butin, Denis ; Buchmann, Johannes (2019)
Function-Dependent Commitments from Homomorphic Authenticators.
24th Australasian Conference, ACISP 2019. Christchurch, New Zealand (03.07.2019-05.07.2019)
Conference or Workshop Item, Bibliographie
Schabhüser, Lucas (2019)
Information-Theoretic Privacy in Verifiable Outsourced Computation.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication
Schabhüser, Lucas ; Butin, Denis ; Buchmann, Johannes (2018)
CHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear Case.
Information Security Practice and Experience - 14th International Conference, ISPEC 2018. Tokyo, Japan
Conference or Workshop Item, Bibliographie
Schabhüser, Lucas ; Butin, Denis ; Demirel, Denise ; Buchmann, Johannes (2018)
Function-Dependent Commitments for Verifiable Multi-Party Computation.
Conference or Workshop Item, Bibliographie
Schabhüser, Lucas ; Buchmann, Johannes ; Struck, Patrick (2017)
A Linearly Homomorphic Signature Scheme From Weaker Assumptions.
16th IMA International Conference on Cryptography and Coding (IMACC 2017). Oxford, UK (12.12.2017-14.12.2017)
doi: 10.1007/978-3-319-71045-7
Conference or Workshop Item, Bibliographie
Schreiber, Johannes (2017)
Countermeasures Against First Order Fault Attacks Using the Example of ring-TESLA.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Schmidt, Markus (2017)
Estimation of the Hardness of the Learning with Errors Problem with a Given Number of Samples.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Schabhüser, Lucas ; Demirel, Denise ; Buchmann, Johannes (2016)
An Unconditionally Hiding Auditing Procedure for Computations over Distributed Data.
Philadelphia, PA USA
Conference or Workshop Item, Bibliographie
Schabhüser, Lucas ; Demirel, Denise ; Buchmann, Johannes (2016)
An Unconditionally Hiding Auditing Procedure for Multi-Party Computations.
In: IACR - Cryptology ePrint Archive
Article, Bibliographie
Stockhardt, Simon ; Reinheimer, Benjamin ; Volkamer, Melanie ; Mayer, Peter ; Kunz, Alexandra ; Rack, Philipp ; Lehmann, Daniel (2016)
Teaching Phishing-Security: Which Way is Best?
Ghent, Belgium
Conference or Workshop Item, Bibliographie
Schochlow, Verena ; Neumann, Stephan ; Braun, Kristoffer ; Volkamer, Melanie (2016)
Bewertung der GMX/Mailvelope-Ende-zu-Ende-Verschlüsselung.
doi: 10.1007/s11623-016-0599-5
Conference or Workshop Item, Bibliographie
Schlipf, Mario (2015)
Password Policy Crawler.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Struck, Patrick (2015)
On the difference between hardness and security: a comparison of lattice-based signature schemes.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Shirazi, Fatemeh ; Goehring, Matthias ; Diaz, Claudia (2015)
Tor Experimentation Tools.
FAIRMONT, SAN JOSE, CA
Conference or Workshop Item, Bibliographie
Schreiner, Steffen (2015)
A Security Architecture for e-Science Grid Computing.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication
Shirazi, Fatemeh ; Volkamer, Melanie (2014)
What Deters Jane from Preventing Identification and Tracking on the Web?
Scottsdale, Arizona, USA
doi: 10.1145/2665943.2665963
Conference or Workshop Item, Bibliographie
Schlipf, Mario (2014)
Passwort-Richtlinien.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Strenzke, Falko (2013)
Efficiency and Implementation Security of Code-based Cryptosystems.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication
Strenzke, Falko (2013)
Timing Attacks against the Syndrome Inversion in Code-Based Cryptosystems.
Limoges, France
Conference or Workshop Item, Bibliographie
Schnelle-Walka, Dirk ; Radomski, Stefan ; Radeck-Arneth, Stephan (2013)
Probabilistic Dialog Management.
Conference or Workshop Item, Bibliographie
Schneider, Michael (2013)
Sieving for Shortest Vectors in Ideal Lattices.
Cairo, Egypt
Conference or Workshop Item, Bibliographie
Shirazi, Fatemeh ; Diaz, Claudia ; Mullan, Ciaran ; Wright, Joss ; Buchmann, Johannes (2013)
Towards Measuring Resilience in Anonymous Communication Networks.
In: HotPETs 2013
Article, Bibliographie
Schläpfer, Michael ; Volkamer, Melanie (2012)
The Secure Platform Problem - Taxonomy and Analysis of Existing Proposals to Address this Problem.
Albany, NY, USA
doi: 10.1145/2463728.2463807
Conference or Workshop Item, Bibliographie
Schreiner, Steffen ; Grigoras, Costin ; Grigoras, Alina ; Betev, Latchezar ; Buchmann, Johannes (2012)
A Grid security architecture for AliEn.
Taipei, Taiwan
Conference or Workshop Item, Bibliographie
Schreiner, Steffen ; Grigoras, Costin ; Litmaath, Maarten ; Betev, Latchezar ; Buchmann, Johannes (2012)
Certified Grid Job Submission in the ALICE Grid Services.
In: Open Access Journal of Physics: Conference Series (JPCS), International Conference on Computing in High Energy and Nuclear Physics (CHEP) 2012
Article, Bibliographie
Schmidt, Axel (2012)
Enabling Secure Online Elections with the Voting Service Provider.
Technische Universität Darmstadt
Ph.D. Thesis, Bibliographie
Schneider, Michael (2011)
Computing Shortest Lattice Vectors on Special Hardware.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication
Schreiner, Steffen ; Bagnasco, Stefano ; Banerjee, Subho Sankar ; Betev, Latchezar ; Carminati, Federico ; Datskova, Olga Vladimirovna ; Furano, Fabrizio ; Grigoras, Alina ; Grigoras, Costin ; Lorenzo, Patricia Mendez ; Peters, Andreas Joachim ; Saiz, Pablo ; Zhu, Jianlin (2011)
Securing the AliEn File Catalogue - Enforcing authorization with accountable file operations.
In: Journal of Physics: Conference Series (JPCS), 331:062044, International Conference on Computing in High Energy and Nuclear Physics (CHEP) 2010
Article, Bibliographie
Schneider, Michael ; Göttert, Norman
eds.: Preneel, Bart ; Takagi, Tsuyoshi (2011)
Random Sampling for Short Lattice Vectors on Graphics Cards.
Nara, Japan
doi: 10.1007/978-3-642-23951-9_11
Conference or Workshop Item, Bibliographie
Shirazi, Fatemeh ; Neumann, Stephan ; Ciolacu, Ines ; Volkamer, Melanie (2011)
Robust Electronic Voting: Introducing robustness in Civitas.
Trento, Italy
doi: 10.1109/REVOTE.2011.6045915
Conference or Workshop Item, Bibliographie
Schmidt, Patrick (2011)
Fully Homomorphic Encryption: Overview and Cryptanalysis.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Schryen, Guido ; Volkamer, Melanie ; Habib, Sheikh Mahbub ; Ries, Sebastian (2011)
A Formal Approach Towards Measuring Trust in Distributed Systems.
Taichung, Taiwan
doi: 10.1145/1982185.1982548
Conference or Workshop Item, Bibliographie
Schneider, Michael (2011)
Analysis of Gauss-Sieve for Solving the Shortest Vector Problem in Lattices.
Conference or Workshop Item, Bibliographie
Spycher, Oliver ; Volkamer, Melanie ; Koenig, Reto
eds.: Lipmaa, Helger ; Kiayias, Aggelos (2011)
Transparency and Technical Measures to Establish Trust in Norwegian Internet Voting.
doi: 10.1007/978-3-642-32747-6_2
Conference or Workshop Item, Bibliographie
Sami, Arif ; Karabulut, Murat (2010)
Analyse von homomorpher Verschlüsselung und MIX Netzen für elektronische Wahlsysteme.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Strenzke, Falko (2010)
Manger's Attack revisited.
Conference or Workshop Item, Bibliographie
Schneider, Michael ; Buchmann, Johannes (2010)
Extended Lattice Reduction Experiments using the BKZ Algorithm.
Berlin
Conference or Workshop Item, Bibliographie
Schmidt, Axel ; Volkamer, Melanie ; Buchmann, Johannes
eds.: Krimmer, Robert ; Grimm, Rüdiger (2010)
An Evaluation and Certification Approach to Enable Voting Service Providers.
Conference or Workshop Item, Bibliographie
Schmidt, Axel ; Heinson, Dennis ; Langer, Lucie ; Opitz-Talidou, Zoi ; Richter, Philipp ; Volkamer, Melanie ; Buchmann, Johannes
eds.: Ryan, Johannes Y. A. ; Schoenmakers, Berry (2009)
Developing a Legal Framework for Remote Electronic Voting.
Luxembourg
doi: 10.1007/978-3-642-04135-8_6
Conference or Workshop Item, Bibliographie
Schmidt, Axel ; Langer, Lucie ; Buchmann, Johannes ; Volkamer, Melanie (2009)
Specification of a Voting Service Provider.
doi: 10.1109/RE-VOTE.2009.8
Conference or Workshop Item, Bibliographie
Schneider, Michael ; Buchmann, Johannes ; Lindner, Richard (2009)
Probabilistic Analysis of LLL Reduced Bases.
Graz University of Technology, Austria
Conference or Workshop Item, Bibliographie
Stopczynski, Martin (2009)
Erweiterte Benutzerführung für den Umgang mit sicheren Verbindungen in Browsern.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Schreiner, Steffen (2009)
The Impact of Linux Superuser Privileges on System and Data Security within a Cloud Computing Storage Architecture.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Schmidt, Axel ; Volkamer, Melanie ; Langer, Lucie ; Buchmann, Johannes
eds.: Fischer, Stefan ; Maehle, Erik ; Reischuk, Rüdiger (2009)
Towards the impact of the operational environment on the security of e-voting.
Conference or Workshop Item, Bibliographie
Schelten, Kevin (2008)
On a Special Class of Lattices, Computational Problems, and Hash Functions.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Schneider, Michael (2008)
Improved Authentication Path
Computation for Merkle Trees.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Siebenhaar, Melanie ; Lehrig, Tim ; Braun, Johannes ; Görge, Thomas (2008)
Entwicklung einer SOA-basierten Webanwendung zur Buchung und Verwaltung von Segeltouren: Proprietäre Software vs. Open Source.
In: Wirtschaftsinformatik, 50 (4)
doi: 10.1365/s11576-008-0069-2
Article, Bibliographie
Sögüt, Gökhan (2007)
Kombinierte Schwachstellenanalyse
für schnelle Exponentiationen.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Stifi, Musab Haj (2007)
{GMSS} Signatur Generation für
{RFID} Tags.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Schmidt, Arthur (2007)
Zur Lösung von zahlentheoretischen
Problemen mit klassischen und Quantencomputern.
Technische Universität Darmstadt
Ph.D. Thesis, Bibliographie
Schuster, Dieter (2007)
Multivariate Interpolationsangriffe
auf symmetrische Chiffren.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Schweickert, Ralf (2007)
Längerfristiger Zugriff auf
verschlüsselte Daten bei Smartcard-basierten {PKI}-Lösungen.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Schmidt, Arthur (2006)
Quantum Algorithm for Solving the Discrete Logarithm Problem in the Class Group of an Imaginary Quadratic Field and Security Comparison of Current Cryptosystems at the Beginning of Quantum Computer.
doi: 10.1007/11766155_34
Conference or Workshop Item, Bibliographie
Schmidt-Samoa, Katja (2006)
Contributions to Provable Security and Efficient Cryptography.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication
Straub, Tobias (2006)
Usability Challenges of PKI.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication
Straub, Tobias ; Hartl, Manuel ; Ruppert, Markus (2006)
Digitale Reisepässe in Deutschland . Prozesse und Sicherheits-Infrastruktur.
Conference or Workshop Item, Bibliographie
Schmidt-Samoa, Katja (2006)
A New Rabin-type Trapdoor Permutation
Equivalent to Factoring.
In: >Electronic Notes in Theoretical Computer
Science, 157 (3)
Article, Bibliographie
Schmidt-Samoa, Katja ; Semay, Olivier ; Takagi, Tsuyoshi (2006)
Analysis of Fractional Window Recoding Methods and Their Application to Elliptic Curve Cryptosystems.
In: >IEEE Transactions on Computers, 55 (1)
Article, Bibliographie
Schmidt, Axel (2006)
Analyse von auf {C*} basierenden
Public Key Chiffren.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Seipp, Michele-Yvonne (2006)
Formalisation of Proofs in
Cryptography.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Schmidt-Samoa, Katja ; Takagi, Tsuyoshi (2005)
Paillier's Cryptosystem Modulo p2q and Its Applications to Trapdoor Commitment Schemes.
Kuala Lumpur, Malaysia
doi: 10.1007/11554868_21
Conference or Workshop Item, Bibliographie
Straub, Tobias ; Ginkel, Thilo-Alexander ; Buchmann, Johannes (2005)
A Multipurpose Delegation Proxy for WWW/ Credentials.
Conference or Workshop Item, Bibliographie
Schmidt, Arthur ; Vollmer, Ulrich (2005)
Polynomial time quantum algorithm for
the computation of the unit group of a number field.
Baltimore, MD, USA
doi: 10.1145/1060590.1060661
Conference or Workshop Item, Bibliographie
Seudié, Hervé (2005)
Anwendungen von Digitalen
Identitäten an einer Hochschule.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Stegers, Till (2005)
Analysis of Faugére’s F5
Algorithm.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Satanovski, Vladislav (2005)
Zentralisierte
Konfigurationsverwaltung komplexer IT-Systeme.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Sato, Hisayoshi ; Schepers, Daniel ; Takagi, Tsuyoshi (2004)
Exact Analysis of Montgomery
Multiplication.
Chennai, India
Conference or Workshop Item, Bibliographie
Straub, Tobias ; Heinemann, Andreas (2004)
An anonymous bonus point system for
mobile commerce based on word-of-mouth recommendation.
Nicosia, Cyprus
doi: 10.1145/967900.968059
Conference or Workshop Item, Bibliographie
Stögbauer, Marcus (2004)
Efficient Algorithms for Pairing-Based
Cryptosystems.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Straub, Tobias (2004)
A Method for Strengthening Certificate
Enrollment.
Bedlewo, Poland
Conference or Workshop Item, Bibliographie
Straub, Tobias ; Baier, Harald (2004)
A Framework for Evaluating the
Usability and the Utility of PKI-enabled Applications.
Report, Bibliographie
Straub, Tobias ; Baier, Harald (2004)
A Framework for Evaluating the
Usability and the Utility of {PKI}-enabled Applications.
Conference or Workshop Item, Bibliographie
Sato, Hisayoshi ; Schepers, Daniel ; Takagi, Tsuyoshi (2004)
Exact Analysis of Montgomery
Multiplication.
Report, Bibliographie
Schmidt-Samoa, Katja (2004)
Factorization-based Fail-Stop
Signatures Revisited.
Report, Bibliographie
Schmidt-Samoa, Katja ; Semay, Olivier ; Takagi, Tsuyoshi (2004)
Analysis of Some Efficient Window
Methods and their Application to Elliptic Curve Cryptosystems.
Report, Bibliographie
Schmidt, Arthur ; Vollmer, Ulrich (2004)
Polynomial Time Quantum Algorithm for
the Computation of the Unit Group of a Number Field.
Report, Bibliographie
Schwierz, Sebastian (2004)
Sicherheitsanalyse für
Langzeitsicherheit von Public-Key Verfahren.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Seiffert, Björn (2004)
Erweiterung der {Flexi-PKI} um einen
{UMP}-Update-Service.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Semay, Olivier (2004)
Efficiency analysis of window methods
using {Markov} chains.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Straub, Tobias (2003)
Efficient Two Party Multi-Prime {RSA}
Key Generation.
Conference or Workshop Item, Bibliographie
Sakurai, Kouichi ; Takagi, Tsuyoshi (2002)
On the Security of a Modified Paillier
Public-Key Primitive.
Melbourne, Australia
Conference or Workshop Item, Bibliographie
Sakurai, Kouichi ; Takagi, Tsuyoshi (2002)
New Semantically Secure Public-Key
Cryptosystems from the {RSA}-Primitive.
Paris, France
Conference or Workshop Item, Bibliographie
Sakurai, Kouichi ; Takagi, Tsuyoshi (2002)
On the Security of a Modified Paillier
Public-Key Primitive.
Report, Bibliographie
Sandner, Tobias (2002)
Signaturverfahren mittels
hyperelliptischen Kurven und deren effiziente Implementierung.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie
Schmidt, Arthur (2002)
Zur Berechnung der Struktur endlicher
abelscher Gruppen.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie
Sakurai, Kouichi ; Takagi, Tsuyoshi (2001)
New Semantically Secure Public-Key
Cryptosystems from the {RSA}-Primitive.
Report, Bibliographie
Schramm, Dirk (2001)
Entwicklung einer flexiblen
{Java}-basierten {S/MIME}-Erweiterung für Microsoft Outlook.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie
Schuster, Markus (2001)
{OpenRA} - Framework zur flexiblen
Formularverarbeitung Darstellung, Transport und Produktion.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie
Seiler, Oliver (2001)
Signaturverfahren mit Elliptischen Kurven über Körpern der Charakteristik 2 und deren Arithmetik.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie
Seiler, Patrick (2001)
Konzept und Aufbau einer
prototypischen Public Key Infrastruktur auf Basis von FlexiTrust.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie
Sesterhenn, Christoph (2000)
Design und Implementierung eines Kryptographie-Plugin für Email-Clients basierend auf {S/MIME} und {JAVA}.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie
Seipel, Michael (2000)
Die Java Cryptographic Architecture {(JCA)} als Implementierung der Generic Security Service {(GSS-API)} am Beispiel von {SAP R/3} Konzept und Prototyp.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie
Schaub, Joachim (1999)
Implementierung von
Public-Key-Kryptosystemen über imaginär-quadratische Ordnungen.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie
Setz, Thomas (1998)
Dynamic-Load-Adaption in {LiPS}.
Report, Bibliographie
Süssmann, Boris (1998)
Entwicklung eines sicheren
Telearbeitsplatzes.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie
Setz, Thomas (1997)
Experience with Literate Programming
or Towards Qualified Programming.
Report, Bibliographie
Setz, Thomas (1997)
Design, Implementation and Performance
of a Mutex-Token based Fault- Tolerant Tuple Space Machine.
Report, Bibliographie
Setz, Thomas ; Fischer, Johannes ; Liefke, Thomas (1997)
libtracer: Eine komfortable Bibliothek
zum Generieren levelbasierter Tracing-Ausgaben.
Report, Bibliographie
Setz, Thomas ; Liefke, Thomas (1997)
The {LiPS} Runtime Systems.
Report, Bibliographie
Setz, Thomas ; Lippmann, Jens (1997)
Softwaretesten in {LiPS}.
Report, Bibliographie
Sauer, Michael (1997)
Eine Block-Lanczos Implementierung
für {LiDIA}.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie
Schank, Eric (1997)
Probabilistische Beweisverifikation.
Technische Universität Darmstadt
Ph.D. Thesis, Bibliographie
Schwarz, Jochen (1997)
Entwurf und Implementierung einer objektorientierten Softwarebibliothek kryptographischer Algorithmen.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie
Setz, Thomas (1996)
Integration von Mechanismen zur Unterstützung der Fehlertoleranz in {LiPS}.
Universität des Saarlandes
Ph.D. Thesis, Bibliographie
Setz, Thomas ; Fischer, Johannes (1996)
Fault-tolerant Distributed
Applications in {LiPS}.
Report, Bibliographie
Setz, Thomas ; Levy, Zohar (1996)
Requirements for {TRIPS}.
Report, Bibliographie
Schirokauer, Oliver ; Weber, Damian ; Denny, Thomas (1996)
Discrete Logarithms: The Effectiveness
of the Index Calculus Method.
In: >Algorithmic Number Theory-(ANTS), 1122
Article, Bibliographie
Sosnowski, Thomas (1994)
Faktorisieren mit dem Quadratischen
Sieb auf dem Hypercube.
Universitä;t des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie
Sprang, Oliver van (1994)
Basisreduktionsalgorithmen für
Gitter kleiner Dimension.
Universität des Saarlandes
Ph.D. Thesis, Bibliographie
Sprang, Oliver van (1994)
Lower Bounds for the {LLL} Lattice
Reduction Algorithm.
Conference or Workshop Item, Bibliographie
Scheid, Erik (1993)
Ein neuer Algorithmus zur Berechnung der Klassenzahl algebraischer Zahlkörper.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie
Schank, Eric (1991)
Zur probabilistischen Berechenbarkeitstheorie.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie
T
Traverso, Giulia (2019)
Long-Term Confidential Secret Sharing-Based Distributed Storage Systems.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication
Traverso, Giulia ; Butin, Denis ; Buchmann, Johannes ; Palesandro, Alex (2018)
Coalition-Resistant Peer Rating for Long-Term Confidentiality.
PST 2018 - 16th Annual Conference on Privacy, Security and Trust. Belfast, Northern Ireland, United Kingdom (28.08.2018-30.08.2018)
Conference or Workshop Item, Bibliographie
Traverso, Giulia ; Garcia Cordero, Carlos ; Nojoumian, Mehrdad ; Azarderakhsh, Reza ; Demirel, Denise ; Habib, Sheikh Mahbub ; Buchmann, Johannes (2017)
Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems.
15th Annual Conference on Privacy, Security and Trust (PST). Calgary, Canada (28.08.2017-30.08.2017)
doi: 10.1109/pst.2017.00040
Conference or Workshop Item, Bibliographie
Traverso, Giulia ; Demirel, Denise ; Habib, Sheikh Mahbub ; Buchmann, Johannes (2016)
AS³: Adaptive Social Secret Sharing for Distributed Storage Systems.
Auckland, New Zealand
Conference or Workshop Item, Bibliographie
Traverso, Giulia ; Demirel, Denise ; Buchmann, Johannes (2016)
Dynamic and Verifiable Hierarchical Secret Sharing.
Tacoma, Washington, USA
Conference or Workshop Item, Bibliographie
Traverso, Giulia ; Demirel, Denise ; Buchmann, Johannes (2016)
Homomorphic Signature Schemes - A survey.
doi: 10.1007/978-3-319-32115-8
Book, Bibliographie
Ta, Vinh-Thong ; Butin, Denis ; Métayer, Daniel Le (2015)
Formal Accountability for Biometric Surveillance: A Case Study.
Luxembourg
Conference or Workshop Item, Bibliographie
Tao, Chengdong ; Xiang, Hong ; Petzoldt, Albrecht ; Ding, Jintai (2015)
Simple Matrix - A Multivariate Public Key Cryptosystem (MPKC) for Encryption.
In: Finite Fields and Their Applications, (35)
Article, Bibliographie
Tews, Erik (2012)
DECT Security Analysis.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication
Tews, Erik ; Wälde, Julian ; Weiner, Michael (2011)
Breaking DVB-CSA.
Weimar
Conference or Workshop Item, Bibliographie
Tzvetkov, Vesselin Dimitrov (2010)
Virtual Private Networks for mobile environments. Development of protocol for mobile security and algorithms for location update.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication
Tserovski, Lyudmil (2008)
Practical Security of Micciancios's
Hash Function.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Tews, Erik (2007)
Attacks on the WEP protocol.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Tews, Erik ; Weinmann, Ralf-Philipp ; Pyshkin, Andrei (2007)
Breaking 104 Bit WEP in Less Than 60 Seconds.
Conference or Workshop Item, Bibliographie
Tischhauser, Elmar (2007)
T-Funktionsbasierte Blockchiffren.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Tomova, Iskra (2007)
Implementierung eines
Selbstbedienungsclients f{ü}r eine dezentral administrierbare
Trustcenter-Lösung.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Tomova, Iskra (2005)
Card Manager: Entwurf und
Implementierung.
Other, Bibliographie
Tak, Markus (2002)
Ein {S/MIME}-Plugin für Outlook
zur Verwendung alternativer kryptographischer Algorithmen.
Report, Bibliographie
Takagi, Tsuyoshi (2001)
New public-key cryptosystems with fast
decryption.
Technische Universität Darmstadt
Ph.D. Thesis, Bibliographie
Theobald, Patrick (2000)
Ein Framework zur Berechnung der Hermite-Normalform von großen, dünnbesetzten, ganzzahligen Matrizen.
Technische Universität Darmstadt
Ph.D. Thesis, Bibliographie
Tak, Markus (1999)
Public Key Infrastrukturen - ein
{Java}-basiertes Trustcenter.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie
Teske, Edlyn (1999)
The Pohlig-Hellman Method Generalized
for Group Structure Computation.
In: >Journal of Symbolic Computation, 27 (6)
Article, Bibliographie
Teske, Edlyn (1998)
Speeding Up Pollard's Rho Method for Computing Discrete Logarithms.
Portland, Oregon, USA
Conference or Workshop Item, Bibliographie
Teske, Edlyn (1998)
A space efficient algorithm for group
structure computation.
In: >Mathematics of Computation, 67 (224)
Article, Bibliographie
Teske, Edlyn (1998)
The Pohlig-Hellman Method Generalized
for Group Structure Computation.
Report, Bibliographie
Teske, Edlyn (1998)
Algorithms for Finite Abelian Groups.
Technische Universität Darmstadt
Ph.D. Thesis, Bibliographie
Teske, Edlyn (1998)
Speeding up Pollard's Rho Method for
Computing Discrete Logarithms.
Report, Bibliographie
Teske, Edlyn (1997)
A Space Efficient Algorithm for Group
Structure Computation.
Report, Bibliographie
Theobald, Patrick ; Wetzel, Susanne ; Backes, Werner (1997)
Design concepts for matrices and
lattices in LiDIA.
doi: 10.1145/331697.332344
Conference or Workshop Item, Bibliographie
Theobald, Patrick ; Wetzel, Susanne ; Setz, Thomas (1997)
LiDIA, LiPS - Erste gemeinsame
Schritte.
Report, Bibliographie
Theobald, Patrick ; Wetzel, Susanne ; Backes, Werner (1996)
Design Concepts for Matrices and
Lattices in {LiDIA}.
Report, Bibliographie
Theobald, Patrick (1995)
Eine Implementierung von Algorithmen
der linearen Algebra über {$mathbbZ$}.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie
Thiel, Christoph (1995)
On the complexity of some problems in algorithmic algebraic number theory.
Universität des Saarlandes
Ph.D. Thesis, Bibliographie
Thiel, Christoph (1994)
Under the Assumption of the Generalized {Riemann} Hypothesis Verifying the Class Number Belongs To {NP} $cap$ co-{NP}.
Conference or Workshop Item, Bibliographie
Thiel, Christoph (1992)
Zur Theorie interaktiver Beweissysteme mit mehreren Provern.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie
Thiel, Christian (1992)
Zur Identität von {IP} und {ZK}.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie
V
Volkamer, Melanie ; Renaud, Karen ; Gerber, Paul (2016)
Spot the phish by checking the pruned URL.
In: Information and Computer Security, 24 (4)
doi: 10.1108/ICS-07-2015-0032
Article, Bibliographie
Volkamer, Melanie ; Renaud, Karen ; Reinheimer, Benjamin (2016)
TORPEDO: TOoltip-poweRed Phishing Email DetectiOn.
Ghent, Belgium
Conference or Workshop Item, Bibliographie
Vigil, Martín ; Demirel, Denise ; Habib, Sheikh Mahbub ; Hauke, Sascha ; Buchmann, Johannes ; Mühlhäuser, Max (2016)
LoT: a Reputation-based Trust System for Long-term Archiving.
Nice, France
Conference or Workshop Item, Bibliographie
Volkamer, Melanie ; Renaud, Karen ; Kulyk, Oksana ; Emeröz, Sinem
ed.: Foresti, Sara (2015)
A Socio-Technical Investigation into Smartphone Security.
Conference or Workshop Item, Bibliographie
Volkamer, Melanie ; Renaud, Karen ; Braun, Kristoffer ; Canova, Gamze ; Reinheimer, Benjamin
eds.: Conti, Mauro ; Schunter, Matthias ; Askoxylakis, Ioannis (2015)
Design and Field Evaluation of PassSec: Raising and Sustaining Web Surfer Risk Awareness.
Heraklion, Crete, Greece
doi: 10.1007/978-3-319-22846-4_7
Conference or Workshop Item, Bibliographie
Volkamer, Melanie ; Renaud, Karen ; Kulyk, Oksana ; Emeröz, Sinem (2015)
An Investigation into the "Other" Barriers to Adoption of Smartphone Security Precautions (Poor Usability being a Given).
Report, Bibliographie
Vigil, Martín ; Buchmann, Johannes ; Cabarcas, Daniel ; Weinert, Christian ; Wiesmaier, Alexander (2015)
Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: a survey.
In: Computers & Security, 50
Article, Bibliographie
Vigil, Martín ; Weinert, Christian ; Demirel, Denise ; Buchmann, Johannes (2014)
An efficient time-stamping solution for long-term digital archiving.
Austin, TX, USA
doi: 10.1109/PCCC.2014.7017099
Conference or Workshop Item, Bibliographie
Vieten, Jannik (2014)
Evaluierung des U-LP Verschlüsselungsverfahrens in der Praxis.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Vigil, Martín ; Weinert, Christian ; Braden, Kjell ; Demirel, Denise ; Buchmann, Johannes (2014)
A performance analysis of long-term archiving techniques.
Paris, France
Conference or Workshop Item, Bibliographie
Volkamer, Melanie ; Renaud, Karen
eds.: Fischlin, Marc ; Katzenbeisser, Stefan (2013)
Mental Models – General Introduction and Review of Their Application to Human-Centred Security.
In: Number Theory and Cryptography
doi: 10.1007/978-3-642-42001-6_18
Book Section, Bibliographie
Vigil, Martín ; Cabarcas, Daniel ; Huang, Jingwei ; Buchmann, Johannes (2013)
Assessing Trust in the Long-Term Protection of Documents.
Split, Croatia
Conference or Workshop Item, Bibliographie
Volkamer, Melanie ; Stockhardt, Simon ; Bartsch, Steffen ; Kauer, Michaela (2013)
Adopting the CMU/APWG Anti-Phishing Landing Page idea for Germany.
New Orleans, LA, USA
doi: 10.1109/STAST.2013.12
Conference or Workshop Item, Bibliographie
Volkamer, Melanie ; Bartsch, Steffen ; Kauer, Michaela
ed.: University Plymouth (2013)
Contextualized Security Interventions in Password Transmission Scenarios.
Lisbon, Spain
Conference or Workshop Item, Bibliographie
Vigil, Martín ; Custódio, Ricardo Felipe (2012)
Cleaning up the PKI for Long-term Signatures.
Curitiba PR, Brazil
Conference or Workshop Item, Bibliographie
Vigil, Martín ; Moecke, Cristian Thiago ; Custódio, Ricardo Felipe ; Volkamer, Melanie
eds.: De Capitani di Vimercati, Sabrina ; Mitchell, Chris (2012)
The Notary Based PKI -- A Lightweight PKI for Long-term Signatures on Documents.
Pisa, Italy
Conference or Workshop Item, Bibliographie
Vigil, Martín Gagliotti ; Cabarcas, Daniel ; Wiesmaier, Alexander ; Buchmann, Johannes (2012)
Authenticity, Integrity and Proof-of-Existence for Long-Term Archiving: a Survey.
In: IACR Cryptology ePrint Archive
Article, Bibliographie
Volkamer, Melanie ; Karayumak, Fatih ; Kauer, Michaela ; Halim, Dhanish ; Bruder, Ralph (2012)
Security versus Trust Indicators in 2011 in Germany.
Freiburg
Conference or Workshop Item, Bibliographie
Volkamer, Melanie ; Budurushi, Jurlind ; Demirel, Denise (2011)
Vote casting device with VV-SV-PAT for elections with complicated ballot papers.
Trento, Italy
doi: 10.1109/REVOTE.2011.6045910
Conference or Workshop Item, Bibliographie
Volkamer, Melanie ; Spycher, Oliver ; Dubuis, Eric (2011)
Measures to Establish Trust in Internet Voting.
Tallinn, Estonia
doi: 10.1145/2072069.2072071
Conference or Workshop Item, Bibliographie
Volkamer, Melanie ; Schryen, Guido (2010)
Measuring eTrust in distributed systems - General Concept and Application to Internet Voting.
Conference or Workshop Item, Bibliographie
Volkamer, Melanie (2010)
Evaluierungsverfahren für Internetwahlsysteme.
In: IT-Information Technology, 52 (3)
doi: 10.1524/itit.2010.0587
Article, Bibliographie
Volkamer, Melanie
eds.: Gutwirth, Serge ; Poullet, Yves ; Hert, Paul De (2010)
Data Protection in a Profiled World.
Book Section, Bibliographie
Volkamer, Melanie ; Schryen, Guido ; Langer, Lucie ; Schmidt, Axel ; Buchmann, Johannes
eds.: Fischer, Stefan ; Maehle, Erik ; Reischuk, Rüdiger (2009)
Elektronische Wahlen: Verifizierung vs. Zertifizierung.
Conference or Workshop Item, Bibliographie
Volkamer, Melanie ; Grimm, Rüdiger (2009)
Determine the Resilience of Evaluated Internet Voting Systems.
First International Workshop on Requirements Engineering for E-Voting Systems. Atlanta, Georgia, USA (31.08.2009-31.08.2009)
doi: 10.1109/RE-VOTE.2009.2
Conference or Workshop Item, Bibliographie
Volkamer, Melanie
eds.: Wagner, Dorothea ; Bernstein, Abraham (2009)
Evaluation von Internetwahlsystemen.
Conference or Workshop Item, Bibliographie
Volkamer, Melanie (2009)
Evaluation of Electronic Voting : Requirements and Evaluation Procedures to Support Responsible Election Authorities.
Book, Bibliographie
Vuillaume, Camille ; Okeya, Katsuyuki ; Dahmen, Erik ; Buchmann, Johannes
eds.: Chung, Kyo-Il ; Sohn, Kiwook ; Yung, Moti (2008)
Public Key Authentication with Memory Tokens.
Jeju Island, Korea
Conference or Workshop Item, Bibliographie
Velyanova, Veneta (2008)
An Analysis of the Neff's Voter Verifiable Election Scheme.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Velikov, Aleksandar (2008)
Provable Security of
Merkle-Micciancio-Lyubashevsky's Signature.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Volkamer, Melanie ; Vogt, Roland (2008)
Basissatz von Sicherheitsanforderungen an Online-Wahlprodukte.
(BSI-PP-0037-2008)
Article, Bibliographie
Vizev, Nikolay Vasilev (2007)
Side Channel Attacks on NTRUEncrypt.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Volkamer, Melanie ; McGaley, Margaret (2007)
Requirements and Evaluation Procedures for eVoting.
Conference or Workshop Item, Bibliographie
Volkamer, Melanie ; Hauff, Harald (2007)
Zum Nutzen hoher Zertifizierungsstufen nach den Common Criteria (II).
In: Datenschutz und Datensicherheit, 10
Article, Bibliographie
Volkamer, Melanie ; Hauff, Harald (2007)
Zum Nutzen hoher Zertifizierungsstufen nach den Common Criteria (I).
In: Datenschutz und Datensicherheit, 9
Article, Bibliographie
Volkamer, Melanie ; Krimmer, Robert
eds.: Grönlund, Ake ; Scholl, Jochen ; Wimmer, Maria (2007)
Requirements and Evaluation Techniques for Online-Voting.
Conference or Workshop Item, Bibliographie
Volkamer, Melanie ; Krimmer, Robert ; Grimm, Rüdiger
eds.: Prosser, Alexander ; Parycek, Peter (2007)
Independent Audits of Remote Electronic Voting -- Developing a Common Criteria Protection Profile.
Conference or Workshop Item, Bibliographie
Velikova, Zaharina (2006)
A Lattice Attack on the McEliece
Public Key Cryptosystem.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Volkamer, Melanie ; Alkassar, Ammar ; Sadeghi, Ahmad-Reza ; Schulz, Stefan (2006)
Enabling the Application of Open Systems like PCs for Online Voting.
In: Frontiers in Electronic Elections
doi: 10.5445/IR/1000081833
Book Section, Bibliographie
Volkamer, Melanie ; Krimmer, Robert (2006)
Secrecy forever? Analysis of Anonymity in Internet-based Voting
Protocols.
Conference or Workshop Item, Bibliographie
Volkamer, Melanie ; Vogt, Roland (2006)
New Generation of Voting Machines in Germany The Hamburg Way to Verify Correctness.
Conference or Workshop Item, Bibliographie
Volkamer, Melanie ; Krimmer, Robert (2006)
Observing Voter's Anonymity: Guide on how to Observe Electronic Voting.
Report, Bibliographie
Volkamer, Melanie ; Reinhard, Walter ; Vogt, Roland
ed.: Dittmann, Jana (2006)
FUSE - ein Internetwahlsystem für zeitlich unbegrenzt geheime Betriebswahlen.
Conference or Workshop Item, Bibliographie
Volkamer, Melanie ; Krimmer, Robert (2006)
Die Online-Wahl auf dem Weg zum Durchbruch.
In: Informatik Spektrum, 29 (2)
Article, Bibliographie
Vogt, Holger (2004)
Fairer Austausch.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication
Vuillaume, Camille (2004)
Side Channel Attacks on Elliptic Curve
Cryptosystems.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Volkamer, Melanie ; Hutter, Dieter
eds.: Prosser, Alexander ; Krimmer, Robert (2004)
From Legal Principles to an Internet Voting System.
Conference or Workshop Item, Bibliographie
Vollmer, Ulrich (2003)
A note on the hermite basis
computation of large integer matrices.
Philadelphia, PA, USA
Conference or Workshop Item, Bibliographie
Vollmer, Ulrich (2003)
A note on the hermite basis
computation of large integer matrices.
Report, Bibliographie
Vollmer, Ulrich (2003)
Rigorously Analyzed Algorithms for the
Discrete Logarithm Problem in Quadratic Number Fields.
Technische Universität Darmstadt
Ph.D. Thesis, Bibliographie
Vuillaume, Camille (2003)
Efficiency Comparison of Several {RSA}
Variants.
Other, Bibliographie
Vollmer, Ulrich (2002)
An accelerated Buchmann algorithm for
regulator computation in real quadratic fields.
Report, Bibliographie
Vollmer, Ulrich (2002)
An accelerated Buchmann algorithm for
regulator computation in real quadratic fields.
Conference or Workshop Item, Bibliographie
Valentin, Christian (2001)
Ein verteilter Zeitstempeldienst
basierend auf {RSA} in {Java}.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie
Vest, Torsten (2001)
Design und Implementierung eines {CSP}
zur Anbindung der {JCA} an die Microsoft {CryptoAPI}.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie
Vollmer, Ulrich (2000)
Asymptotically Fast Discrete
Logarithms in Quadratic Number Fields.
Leiden, The Netherlands
Conference or Workshop Item, Bibliographie
Vollmer, Ulrich (2000)
Asymptotically Fast Discrete
Logarithms in Quadratic Number Fields.
Report, Bibliographie
W
Wunderer, Thomas ; Burger, Michael ; Nguyen, Giang Nam (2018)
Parallelizing the Hybrid Lattice Reduction and Meet-in-the-Middle Attack.
CSE 2018 – 21st IEEE International Conference on Computational Science and Engineering. Faculty of Automatic Control and Computers, University Politehnica of Bucharest, Romania (29.10.2018-31.10.2018)
Conference or Workshop Item, Bibliographie
Wunderer, Thomas (2018)
A Detailed Analysis of the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack.
In: Journal of Mathematical Cryptology (JMC)
Article, Bibliographie
Wunderer, Thomas ; Wang, Yuntao (2018)
Revisiting the Sparsification Technique in Kannan’s Embedding Attack on LWE.
14th International Conference on Information Security Practice and Experience (ISPEC 2018).
Conference or Workshop Item, Bibliographie
Wunderer, Thomas (2018)
On the Security of Lattice-Based Cryptography Against Lattice Reduction and Hybrid Attacks.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication
Weinert, Christian ; Demirel, Denise ; Vigil, Martín ; Geihs, Matthias ; Buchmann, Johannes (2017)
MoPS: A Modular Protection Scheme for Long-Term Storage.
12. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'17). Abu Dhabi United Arab Emirates (02.04.2017-06.04.2017)
doi: 10.1145/3052973.3053025
Conference or Workshop Item, Bibliographie
Wunderer, Thomas (2016)
Revisiting the Hybrid Attack: Improved Analysis and Refined Security Estimates.
In: Cryptology ePrint Archive, 2016 (733)
Article, Bibliographie
Weinert, Christian (2016)
Building a Modular Long-Term Archiving System.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Wolf, Peter ; Barrat, Jordi ; Bolo, Eden ; Bravo, Alejandro ; Krimmer, Robert ; Neumann, Stephan ; Parreño, Al ; Schürmann, Carsten ; Volkamer, Melanie (2015)
Certification of ICTs in Elections.
Book, Bibliographie
Wiesmaier, Alexander ; Braun, Johannes ; Horsch, Moritz (2014)
Method and system for secure access of a first computer to a second computer.
Norm, patent, standard, Bibliographie
Weinert, Christian (2013)
Content Integrity System and Notarisation for Long-Term Protection of Data Objects.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Wich, Tobias ; Horsch, Moritz ; Petrautzki, Dirk ; Schmölz, Johannes ; Wieland, Thomas ; Potzernheim, Simon (2013)
An extensible platform for eID, signatures and more.
Kloster Banz, Germany
Conference or Workshop Item, Bibliographie
Weiden, Patrick ; Hülsing, Andreas ; Cabarcas, Daniel ; Buchmann, Johannes (2013)
Instantiating Treeless Signature Schemes.
In: Cryptology ePrint Archive, 2013 (65)
Article, Bibliographie
Wälde, Julian (2013)
Algebraic Cryptanalysis of Round Reduced Versions of CSA and the LED Family of Block Ciphers.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Werlang, Felipe ; Vigil, Martín ; Custódio, Ricardo Felipe (2013)
A User-Centric Digital Signature Scheme.
Conference or Workshop Item, Bibliographie
Walter, Michael ; Bulygin, Stanislav ; Buchmann, Johannes
eds.: Kutylowski, Miroslaw ; Yung, Moti (2012)
Optimizing Guessing Strategies for Algebraic Cryptanalysis with Applications to EPCBC.
Beijing, China
Conference or Workshop Item, Bibliographie
Walter, Michael (2012)
Algebraic methods in analyzing lightweight cryptographic symmetric primitives.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Warta, Simon (2011)
Deriving Signature Schemes from Public-Key Cryptosystems.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Wiesmaier, Alexander ; Horsch, Moritz ; Braun, Johannes ; Kiefer, Franziskus ; Hühnlein, Detlef ; Strenzke, Falko ; Buchmann, Johannes
eds.: Cheung, Bruce ; Hui, Lucas Chi Kwong ; Sandhu, Ravi ; Wong, Duncan (2011)
An efficient mobile PACE implementation.
Hong Kong
doi: 10.1145/1966913.1966936
Conference or Workshop Item, Bibliographie
Weiner, Michael ; Tews, Erik ; Heinz, Benedikt ; Heyszl, Johann (2010)
FPGA Implementation of an Improved Attack Against the DECT Standard Cipher.
Seoul, Korea
Conference or Workshop Item, Bibliographie
Weinmann, Ralf-Philipp (2009)
Algebraic Methods in Block Cipher Cryptanalysis.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication
Wiesmaier, Alexander (2009)
Secure private key management in adaptable public key infrastructures.
Book, Bibliographie
Weber, Pia (2008)
Einsatzgebiete Digitaler Signaturen.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Weber, Stefan (2008)
Coercion-Resistant Cryptographic Voting: Implementing Free and Secret Electronic Elections.
Book, Bibliographie
Weber, Stefan Georg ; Araujo, Roberto ; Buchmann, Johannes (2007)
On coercion-resistant electronic elections with linear work.
In: The Second International Conference on Availability, Reliability and Security, 2007 : ARES 2007 ; 2nd International Workshop Dependability and Security in e-Government (DeSeGov 2007)...ISBN 0-7695-2775-2, 978-0-7695-2775-8 [Online-Ressource]
Book Section, Bibliographie
Weber, Stefan ; Araújo, Roberto ; Buchmann, Johannes (2007)
On Coercion-Resistant Electronic Elections with Linear
Work.
In: >ares, 1
doi: 10.1109/ARES.2007.108
Article, Bibliographie
Wiesmaier, Alexander ; Rauchschwalbe, Ulrich ; Ludwig, Christoph ; Henhapl, Birgit ; Ruppert, Markus ; Buchmann, Johannes (2006)
Intrinsically Legal-For-Trade Objects
by Digital Signatures.
Magdeburg
Conference or Workshop Item, Bibliographie
Wiesmaier, Alexander ; Ludwig, Christoph ; Rauchschwalbe, Ulrich ; Henhapl, Birgit ; Ruppert, Markus ; Buchmann, Johannes (2006)
Intrinsically Legal-For-Trade Objects by Digital Signatures.
Darmstadt
Conference or Workshop Item, Bibliographie
Weber, Stefan (2006)
A Coercion-Resistant Cryptographic
Voting Protocol - Evaluation and Prototype Implementation.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Wiesmaier, Alexander (2006)
The State of the Art in Algorithmic
Encryption.
Report, Bibliographie
Weber, Stefan (2006)
A Coercion-Resistant Cryptographic Voting Protocol - Evaluation and Prototype Implementation.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Wiesmaier, Alexander ; Karatsiolis, Vangelis ; Lippert, Marcus ; Buchmann, Johannes (2005)
The Workshop - Implementing Well
Structured Enterprise Applications.
Las Vegas, Nevada, USA
Conference or Workshop Item, Bibliographie
Wiesmaier, Alexander ; Lippert, Marcus ; Karatsiolis, Vangelis ; Raptis, Georgios ; Buchmann, Johannes (2005)
An Evaluated Certification Services System for the German National Root CA - Legally binding and trustworthy Transactions in E-Business and E-Government.
Las Vegas, Nevada, USA
Conference or Workshop Item, Bibliographie
Wirt, Kai (2005)
Fault Attack on the {DVB} Common
Scrambling Algorithm.
Singapore
doi: 10.1007/11424826_61
Conference or Workshop Item, Bibliographie
Wiesmaier, Alexander ; Fischer, Mike ; Lippert, Marcus ; Buchmann, Johannes (2005)
Outflanking and Securely Using the PIN/TAN-System.
Las Vegas, Nevada, USA
Conference or Workshop Item, Bibliographie
Weinmann, Ralf-Philipp (2005)
3. Krypto-Tag - Workshop über
Kryptographie.
Report, Bibliographie
Weinmann, Ralf-Philipp ; Wirt, Kai (2005)
Analysis of the {DVB} Common
Scrambling Algorithm.
doi: 10.1007/b105674
Conference or Workshop Item, Bibliographie
Wiesmaier, Alexander ; Lippert, Marcus ; Karatsiolis, Vangelis (2004)
The Key Authority - Secure Key
Management in Hierarchical Public Key Infrastructures.
Las Vegas, Nevada, USA
Conference or Workshop Item, Bibliographie
Weimer, Daniel (2004)
An Adaption of the {NICE} Crytosystem
to Real Quadratic Orders.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Wolthusen, Stephen (2003)
A Model-Independent Security
Architecture for Distributed Heterogeneous Systems.
Technische Universität Darmstadt
Ph.D. Thesis, Bibliographie
Winkler, Markus (2002)
Analyse der {Enterprise-Java-Beans}
Spezifikation Version 2.0 als Basis für {FlexiTRUST}.
Other, Bibliographie
Wahrenbruch, Thomas (2001)
Elliptische Kurven Kryptographie auf
{Java} Cards.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Wiesmaier, Alexander (2001)
{FlexiTRUST CA} Ein flexibles, skalierbares und dynamisch erweiterbares Trustcenter.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie
Wetzel, Susanne (1998)
Lattice Basis Reduction Algorithms and their Applications.
Universität des Saarlandes
Ph.D. Thesis, Bibliographie
Weber, Damian (1997)
Diskrete Logarithmen in {GF(p)} mit dem Number Field Sieve.
Universität des Saarlandes
Ph.D. Thesis, Bibliographie
Weber, Damian (1996)
Computing Discrete Logarithms with the
General Number Field Sieve.
Talence, France
Conference or Workshop Item, Bibliographie
Weber, Damian (1995)
An Implementation of the General
Number Field Sieve to Compute Discrete Logarithms mod p.
Saint-Malo, France
Conference or Workshop Item, Bibliographie
Wiese, Kay (1994)
Parallelisierung von {LLL}-Algorithmen
zur Gitterbasisreduktion.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie
Weber, Damian (1993)
Ein Algorithmus zur Zerlegung von Primzahlen in Primideale.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie
Wellner, Ingrid (1990)
Zur Theorie der Zero Knowledge Proofs.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie
Y
Yousfi Alaoui, Sidi Mohamed el ; Bansarkhani, Rachid El ; Cayrel, Pierre-Louis ; Hoffmann, Gerhard (2013)
Code based Identification and Signature Schemes in Software.
University of Regensburg, Regensburg, Germany
Conference or Workshop Item, Bibliographie
Yousfi Alaoui, Sidi Mohamed el (2013)
Code-based Identification and Signature Schemes.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication
Yousfi Alaoui, Sidi Mohamed el ; Cayrel, Pierre-Louis ; Meziani, Mohammed
eds.: Kim, Tai-Hoon ; Adeli, Hojjat ; Robles, Rosslin John ; Balitanas, Maricel (2011)
Improved Identity-Based Identification and Signature Schemes Using Quasi-Dyadic Goppa Codes.
Conference or Workshop Item, Bibliographie
Yoseph, Berhane (2007)
Gegenmaßnahmen zu Seitenkanalangriffen.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie
Yousfi Alaoui, Sidi Mohamed el (2007)
Konstruktion von Hashfunktionen.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Z
Zibuschka, Jan ; Horsch, Moritz ; Kubach, Michael
eds.: Roßnagel, Heiko ; Wagner, Sven ; Hühnlein, Detlef (2019)
The ENTOURAGE Privacy and Security Reference Architecture for Internet of Things Ecosystems.
Garmisch-Partenkirchen (28.03.2019-29.03.2019)
Conference or Workshop Item, Bibliographie
Zhang, Qi (2015)
Mutant Algebraic Side-Channel Attack.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Zhang, Jiang ; Zhang, Zhenfeng ; Ding, Jintai ; Snook, Michael ; Dagdelen, Özgür (2015)
Authenticated Key Exchange from Ideal Lattices.
Sofia, Bulgaria
Conference or Workshop Item, Bibliographie
Zörkler, Jens (2003)
Einführung einer
Public-Key-Infrastruktur in einer Universität.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie
Zieschang, Thilo (1997)
Combinatorial Properties of Basic
Encryption Operations.
Konstanz, Germany
Conference or Workshop Item, Bibliographie
Zieschang, Thilo (1997)
Finite groups and graphs in
cryptanalysis.
Technische Universität Darmstadt
Ph.D. Thesis, Bibliographie
Zieschang, Thilo (1997)
On the Number of Cycles in
Permutations.
Report, Bibliographie
Zieschang, Thilo (1997)
Security Properties of Public Key
Certification Networks.
Report, Bibliographie
Zieschang, Thilo (1996)
Combinatorial Properties of Basic
Encryption Operations.
Report, Bibliographie
Zieschang, Thilo (1996)
Breaking an Oblivious Transfer with
Low Exponents.
Report, Bibliographie
Zayer, Jörg (1995)
Faktorisieren mit dem Number Field Sieve.
Universität des Saarlandes
Ph.D. Thesis, Bibliographie
Zayer, Jörg (1991)
Die Theorie des Number Field Sieve.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie