TU Darmstadt / ULB / TUbiblio

Items in division

Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Date | Item Type | Language | No Grouping
Jump to: A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | R | S | T | V | W | Y | Z
Number of items at this level (without sub-levels): 1139.

A

Alkeilani Alkadri, Nabil (2022)
On Lattice-Based Signatures with Advanced Functionalities.
Technische Universität Darmstadt
doi: 10.26083/tuprints-00020793
Ph.D. Thesis, Primary publication, Publisher's Version

Alkim, Erdem ; Barreto, Paulo S. L. M. ; Bindel, Nina ; Krämer, Juliane ; Longa, Patrick ; Ricardini, Jefferson E. (2020)
The Lattice-Based Digital Signature Scheme qTESLA.
18th International Conference on Applied Cryptography and Network Security (ACNS 2020). virtual Conference (19-22.10.2020)
Conference or Workshop Item, Bibliographie

Alkeilani Alkadri, Nabil ; Bansarkhani, Rachid El ; Buchmann, Johannes (2020)
BLAZE: Practical Lattice-Based Blind Signatures for Privacy-Preserving Applications.
24th International Conference on Financial Cryptography and Data Security (FC'20). Kota Kinabalu, Malaysia (10.-14.02.)
Conference or Workshop Item, Bibliographie

Alkeilani Alkadri, Nabil ; Bansarkhani, Rachid El ; Buchmann, Johannes (2020)
On Lattice-Based Interactive Protocols: An Approach with Less or No Aborts.
The 25th Australasian Conference on Information Security and Privacy (ACISP'20). Perth, Australia (30.11.-02.12.)
Conference or Workshop Item, Bibliographie

Alkeilani Alkadri, Nabil ; Das, Poulami ; Erwig, Andreas ; Faust, Sebastian ; Krämer, Juliane ; Riahi, Siavash ; Struck, Patrick (2020)
Deterministic Wallets in a Quantum World.
The 27th ACM Conference on Computer and Communications Security (CCS 2020). virtual Conference (09.-13.11.)
Conference or Workshop Item, Bibliographie

Albrecht, Martin R. ; Curtis, Benjamin R. ; Deo, Amit ; Davidson, Alex ; Player, Rachel ; Postlethwaite, Eamonn W. ; Virdia, Fernando ; Wunderer, Thomas (2018)
Estimate all the {LWE, NTRU} schemes!
11th Conference on Security and Cryptography for Networks. Amalfi, Italy
Conference or Workshop Item, Bibliographie

Alexopoulos, Nikolaos ; Habib, Sheikh Mahbub ; Mühlhäuser, Max (2018)
Towards Secure Distributed Trust Management on a Global Scale.
IoT S&P’18: ACM SIGCOMM 2018 Workshop on IoT Security and Privacy. Budapest, Hungary (20.-25.08)
doi: 10.1145/3229565.3229569
Conference or Workshop Item, Bibliographie

Albrecht, Martin ; Göpfert, Florian ; Vidria, Fernando ; Wunderer, Thomas (2017)
Revisiting the Expected Cost of Solving uSVP and Applications to LWE.
Conference or Workshop Item, Bibliographie

Alkeilani Alkadri, Nabil ; Buchmann, Johannes ; Bansarkhani, Rachid El ; Krämer, Juliane (2017)
A Framework to Select Parameters for Lattice-Based Cryptography.
In: Cryptology ePrint Archive, 2017 (615)
Article, Bibliographie

Alkim, Erdem ; Bindel, Nina ; Buchmann, Johannes ; Dagdelen, Özgür ; Eaton, Edward ; Gutoski, Gus ; Krämer, Juliane ; Pawlega, Filip (2017)
Revisiting TESLA in the quantum random oracle model.
Utrecht, the Netherlands
Conference or Workshop Item, Bibliographie

Appel, Michael ; Pauer, Christof ; Wiesmaier, Alexander (2016)
Security aspects and comparison of block ciphers LED and TEA.
Report, Bibliographie

Appel, Michael ; Bossert, Andreas ; Cooper, Steven ; Kußmaul, Tobias ; Löffler, Johannes ; Pauer, Christof ; Wiesmaier, Alexander (2016)
Block ciphers for the IoT - SIMON, SPECK, KATAN, LED, TEA, PRESENT, and SEA compared.
Report, Bibliographie

Akleylek, Sedat ; Bindel, Nina ; Buchmann, Johannes ; Krämer, Juliane ; Marson, Giorgia Azzurra (2016)
An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation.
Fes, Morocco
Conference or Workshop Item, Bibliographie

Akleylek, Sedat ; Dagdelen, Özgür ; Tok, Zaliha Yüce (2016)
On the Efficiency of Polynomial Multiplication for Lattice-Based Cryptography on GPUs Using CUDA.
Koper, Slovenia
Conference or Workshop Item, Bibliographie

Appel, Michael ; Pauer, Christof ; Wiesmaier, Alexander (2016)
Sicherheitsaspekte und Vergleich der Blockchifren LED und TEA.
Report, Bibliographie

Alkim, Erdem ; Bindel, Nina ; Buchmann, Johannes ; Dagdelen, Özgür ; Schwabe, Peter (2015)
TESLA: Tightly-Secure Efficient Signatures from Standard Lattices.
In: Cryptology ePrints Archive, 2015 (755)
Article, Bibliographie

Arabadzhieva, Vladislava (2015)
Privacy Taxonomy for Verifiable Poll-site Voting Schemes.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Alkeilani Alkadri, Nabil (2015)
Post-Quantum Commitment Schemes.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Albrecht, Martin ; Fitzpatrick, Robert ; Göpfert, Florian (2013)
On the Efficacy of Solving LWE by Reduction to Unique-SVP.
Seoul, Korea
Conference or Workshop Item, Bibliographie

Abdelmageed Mohamed, Wael Said (2011)
Improvements for the XL Algorithm with Applications to Algebraic Cryptanalysis.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication

Aguilar Melchor, C. ; Cayrel, Pierre-Louis ; Gaborit, Philippe ; Laguillaumie, F. (2010)
A New Efficient Threshold Ring Signature Scheme based on Coding Theory.
In: IEEE IT
Article, Bibliographie

Adolph, Daniel (2009)
Fractional Recoding for the Shamir Method.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Arzt, Steven (2009)
Design and Implementation of a Cryptographic Plugin for E-mail Clients.
Other, Bibliographie

Araújo, Roberto dos Santos (2008)
On Remote and Voter-Verifiable Voting.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication

Araújo, Roberto ; Ryan, Peter Y. A. (2008)
Improving Farnel, Threeballot and Randell-Ryan Voting Schemes.
In: Cryptology ePrint Archive, 2008 (82)
Article, Bibliographie

Abbé, Thomas (2007)
Implementierung eines qualifiziert signierenden Timestamping-Servers.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Araújo, Roberto ; Foulle, Sébastian ; Traoré, Jacques (2007)
A practical and secure coercion-resistant scheme for remote elections.
Other, Bibliographie

Alkassar, Ammar ; Volkamer, Melanie (2007)
E-Voting and Identity -- First International Conference, VOTE-ID 2007.
Article, Bibliographie

Araújo, Roberto ; Wiesmaier, Alexander ; Buchmann, Johannes (2006)
The T-Vote Protocol.
Report, Bibliographie

Araújo, Roberto ; Custódio, Ricardo Felipe ; Wiesmaier, Alexander ; Takagi, Tsuyoshi (2006)
An Electronic Scheme for the Farnel Paper-Based Voting Protocol.
Conference or Workshop Item, Bibliographie

Alkassar, Ammar ; Krimmer, Robert ; Volkamer, Melanie (2005)
Online-Wahlen für Gremien -- Wahlen in Gremien als Einsatzgebiet für Wahlen ohne vertrauenswürdige Instanz.
In: Datenschutz und Datensicherheit, 8
Article, Bibliographie

Akishita, Toru ; Takagi, Tsuyoshi (2003)
Zero-Value Point Attacks on Elliptic Curve Cryptosystem.
Bristol, UK
Conference or Workshop Item, Bibliographie

Akishita, Toru ; Takagi, Tsuyoshi (2003)
Zero-Value Point Attacks on Elliptic Curve Cryptosystem.
Report, Bibliographie

Albert, Michael (2001)
Konzeption und Implementierung eines Remote Access {VPNs} für Außendienstarbeiter unter Einsatz einer Public-Key-Infrastruktur.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie

Appel, Helo ; Biehl, Ingrid ; Fuhrmann, Arnulph ; Ruppert, Markus ; Takagi, Tsuyoshi ; Takura, Akira ; Valentin, Christian (1999)
Ein sicherer, robuster Zeitstempeldienst auf der Basis verteilter {RSA}-Signaturen.
Report, Bibliographie

Amendola, Sandro (1995)
Effiziente Algorithmen für Probleme in Gittern über {$mathbbR^d$}.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie

Abel, Christine (1994)
Ein Algorithmus zur Berechnung der Klassenzahl und des Regulators reellquadratischer Ordnungen.
Universität des Saarlandes
Ph.D. Thesis, Bibliographie

B

Büscher, Niklas ; Demmler, Daniel ; Karvelas, Nikolaos ; Katzenbeisser, Stefan ; Krämer, Juliane ; Rathee, Deevashwer ; Schneider, Thomas ; Struck, Patrick (2020)
Secure Two-Party Computation in a Quantum world.
18th International Conference on Applied Cryptography and Network Security (ACNS'20). virtual Conference (19.-22.10.2020)
Conference or Workshop Item, Bibliographie

Bauspieß, Pia ; Kolberg, Jascha ; Demmler, Daniel ; Krämer, Juliane ; Busch, Christoph (2020)
Post-Quantum Secure Two-Party Computation for Iris Biometric Template Protection.
12th IEEE International Workshop on Information Forensics and Security (WIFS 2020). virtual Conference (06.-11.12.)
Conference or Workshop Item, Bibliographie

Buchmann, Johannes ; Geihs, Matthias ; Hamacher, Kay ; Katzenbeisser, Stefan ; Stammler, Sebastian (2019)
Long-term integrity protection of genomic data.
In: EURASIP Journal on Information Security
doi: 10.1186/s13635-019-0099-x
Article, Bibliographie

Bindel, Nina ; Braun, Johannes ; Gladiator, Luca ; Stöckert, Tobias ; Wirth, Johannes (2019)
X.509-Compliant Hybrid Certificates for the Post-Quantum Transition.
In: Journal of Open Source Software, 4 (40)
doi: 10.21105/joss.01606
Article, Bibliographie

Burger, Michael ; Bischof, Christian ; Krämer, Juliane
ed.: Khalid, Zine-Dine (2019)
A new Parallelization for p3Enum and Parallelized Generation of Optimized Pruning Functions.
HPCS 2019- International Conference on High Performance Computing & Simulation. Dublin, Irland (15.-19.07.)
Conference or Workshop Item, Bibliographie

Burger, Michael ; Bischof, Christian ; Krämer, Juliane (2019)
p3Enum: A new Parameterizable and Shared-Memory Parallelized Shortest Vector Problem Solver.
Faro, Portugal (12.-14.06.2019)
doi: 10.1007/978-3-030-22750-0_48
Conference or Workshop Item, Bibliographie

Bindel, Nina ; Brendel, Jacqueline ; Fischlin, Marc ; Goncalves, Brian ; Stebila, Douglas (2019)
Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange.
PQCrypto 2019. (May 8-10, 2019)
Conference or Workshop Item, Bibliographie

Bansarkhani, Rachid El (2019)
LARA - A Design Concept for Lattice-based Encryption.
FC 2019: 23rd International Conference on Financial Cryptography and Data Security. Frigate Bay, St. Kitts and Nevis (February 18.-22., 2019)
doi: 10.1007/978-3-030-32101-7_23
Conference or Workshop Item, Bibliographie

Burger, Michael ; Bischof, Christian ; Calotoiu, Alexandru ; Wunderer, Thomas ; Wolf, Felix (2018)
Exploring the Performance Envelope of the LLL Algorithm.
CSE 2018 – 21st IEEE International Conference on Computational Science and Engineering. Faculty of Automatic Control and Computers, University Politehnica of Bucharest, Romania (29.-31.10.2018)
Conference or Workshop Item, Bibliographie

Bindel, Nina ; Buchmann, Johannes ; Göpfert, Florian ; Schmidt, Markus (2018)
Estimation of the Hardness of the Learning with Errors Problem with a Restricted Number of Samples.
In: Journal of Mathematical Cryptology
Article, Bibliographie

Bindel, Nina (2018)
On the Security of Lattice-Based Signature Schemes in a Post-Quantum World.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication

Buchmann, Johannes ; Holzer, Patrick ; Wunderer, Thomas (2017)
Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor p^α q^β.
Conference or Workshop Item, Bibliographie

Butin, Denis ; Wälde, Julian ; Buchmann, Johannes (2017)
Post-Quantum Authentication in OpenSSL with Hash-Based Signatures.
ICMU - The Tenth International Conference on Mobile Computing and Ubiquitous Networking. Toyama International Conference Center, Toyama, Japan (October 3-5, 2017)
Conference or Workshop Item, Bibliographie

Buldas, Ahto ; Geihs, Matthias ; Buchmann, Johannes (2017)
Long-Term Secure Time-Stamping using Preimage-Aware Hash Functions.
Conference or Workshop Item, Bibliographie

Bindel, Nina ; Krämer, Juliane ; Schreiber, Johannes (2017)
Hampering fault attacks against lattice-based signature schemes - countermeasures and their efficiency.
Conference or Workshop Item, Bibliographie

Buchmann, Johannes ; Lauter, Kristin ; Mosca, Michele (2017)
Postquantum Cryptography - State of the Art.
In: IEEE Security & Privacy, 15
Article, Bibliographie

Butin, Denis (2017)
Hash-Based Signatures: State of Play.
In: IEEE Security & Privacy, 15 (4)
doi: 10.1109/MSP.2017.3151334
Article, Bibliographie

Bernhard, David ; Kulyk, Oksana ; Volkamer, Melanie (2017)
Security Proofs for Participation Privacy, Receipt-Freeness, Ballot Privacy for the Helios Voting Scheme.
doi: 10.1145/3098954.3098990
Conference or Workshop Item, Bibliographie

Buldas, Ahto ; Geihs, Matthias ; Buchmann, Johannes (2017)
Long-Term Secure Commitments via Extractable-Binding Commitments.
Auckland, New Zealand
Conference or Workshop Item, Bibliographie

Bugge, Sebastian (2017)
Solving Learning With Errors Instances Using Quantum Reductions.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Bindel, Nina ; Herath, Udyani ; McKague, Matthew ; Stebila, Douglas (2017)
Transitioning to a Quantum-Resistant Public Key Infrastructure.
Utrecht, the Netherlands
Conference or Workshop Item, Bibliographie

Buchmann, Johannes ; Braun, Johannes ; Demirel, Denise ; Geihs, Matthias (2017)
Quantum Cryptography: a view from classical cryptography.
In: Quantum Science and Technology, 2 (2)
doi: 10.1088/2058-9565/aa69cd
Article, Bibliographie

Bindel, Nina (2017)
Ein deutsches digitales Signaturverfahren auf dem Weg zum internationalen kryptographischen Standard.
Conference or Workshop Item, Bibliographie

Biemann, Chris ; Bontcheva, Kalina ; Eckart de Castilho, Richard ; Gurevych, Iryna ; Yimam, Seid Muhie
eds.: Ide, Nancy ; Pustejovsky, James (2017)
Collaborative Web-based Tools for Multi-layer Text Annotation.
In: The Handbook of Linguistic Annotation
doi: 10.1007/978-94-024-0881-2
Book Section, Bibliographie

Braun, Johannes ; Buchmann, Johannes ; Demirel, Denise ; Fujiwara, Mikio ; Geihs, Matthias ; Moriai, Shiho ; Sasaki, Masahide ; Waseda, Atsushi (2017)
SHORT PAPER: LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality.
ASIA CCS '17. Abu Dhabi, UAE (April 2-6, 2017)
doi: 10.1145/3052973.3053043
Conference or Workshop Item, Bibliographie

Buchmann, Johannes ; Demirel, Denise ; Schabhüser, Lucas ; Struck, Patrick (2017)
Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability.
Rabat, Morocco
Conference or Workshop Item, Bibliographie

Bansarkhani, Rachid El (2017)
LARA - A Design Concept for Lattice-based Encryption.
Report, Bibliographie

Brendel, Jacqueline ; Demirel, Denise (2016)
Efficient Proactive Secret Sharing.
Auckland, New Zealand
Conference or Workshop Item, Bibliographie

Brendel, J. ; Demirel, D. (2016)
Efficient proactive secret sharing.
2016 14th Annual Conference on Privacy, Security and Trust (PST).
doi: 10.1109/PST.2016.7907013
Conference or Workshop Item, Bibliographie

Bansarkhani, Rachid El ; Sturm, Jan (2016)
An Efficient Lattice-based Multisignature Scheme with Applications to Bitcoins.
Milan, Italy
Conference or Workshop Item, Bibliographie

Butin, Denis ; Demirel, Denise ; Buchmann, Johannes (2016)
Formal Policy-based Provenance Audit.
sola city Conference Center, Akihabara-Ochanomizu District, Tokyo, Japan
Conference or Workshop Item, Bibliographie

Bossert, Andreas ; Cooper, Steven ; Wiesmaier, Alexander (2016)
A comparison of block ciphers SIMON, SPECK, and KATAN.
Report, Bibliographie

Bansarkhani, Rachid El ; El Kaafarani, Ali (2016)
Post-Quantum Attribute-Based Signatures from Lattice Assumptions.
In: Cryptology ePrint Archive, 2016 (823)
Article, Bibliographie

Braun, Johannes ; Buchmann, Johannes ; Demirel, Denise ; Fujiwara, Mikio ; Geihs, Matthias ; Moriai, Shiho ; Sasaki, Masahide ; Waseda, Atsushi (2016)
LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality (Full Paper).
ASIA CCS '17. Abu Dhabi, UEA (April 2-6, 2017)
Conference or Workshop Item, Bibliographie

Bindel, Nina ; Buchmann, Johannes ; Krämer, Juliane (2016)
Lattice-Based Signature Schemes and their Sensitivity to Fault Attacks.
Santa Barbara, CA, USA
Conference or Workshop Item, Bibliographie

Bernhard, David ; Kulyk, Oksana ; Volkamer, Melanie (2016)
Security Proofs for Participation Privacy and Stronger Verifiability for Helios.
doi: 10.5445/IR/1000081968
Report, Bibliographie

Buchmann, Johannes ; Göpfert, Florian ; Güneysu, Tim ; Oder, Tobias ; Pöppelmann, Thomas (2016)
High-Performance and Lightweight Lattice-Based Public-Key Encryption.
Xi'an, China
Conference or Workshop Item, Bibliographie

Buchmann, Johannes ; Büscher, Niklas ; Katzenbeisser, Stefan ; Krämer, Juliane ; Micciancio, Daniele ; Siim, Sander ; Vredendaal, Christine van ; Walter, Michael ; Göpfert, Florian (2016)
Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge.
Xi'an, China
Conference or Workshop Item, Bibliographie

Budurushi, Jurlind ; Hilt, Annika ; Volkamer, Melanie (2016)
"E-Mail made in Germany" Untersuchung der Sicherheitsbeurteilung von E-Mail-Nutzern.
In: Datenschutz und Datensicherheit - DuD, 40 (5)
doi: 10.1007/s11623-016-0600-3
Article, Bibliographie

Buchmann, Johannes ; Demirel, Denise ; Schabhüser, Lucas (2016)
Privately and Publicly Verifiable Computing Techniques.
Book, Bibliographie

Budurushi, Jurlind ; Reanaud, Karen ; Volkamer, Melanie ; Woide, Marcel (2016)
An Investigation into the Usability of Electronic Voting Systems for Complex Elections.
In: Journal of Annals of Telecommunications: The role of telecommunications in electronic voting, 71 (7)
doi: 10.1007/s12243-016-0510-2
Article, Bibliographie

Buchmann, Johannes ; Göpfert, Florian ; Player, Rachel ; Wunderer, Thomas (2016)
On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack.
Fes, Morocco
Conference or Workshop Item, Bibliographie

Brendel, Jacqueline (2016)
Efficient Proactive Secret Sharing.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Bansarkhani, Rachid El (2015)
On the Design and Improvement of Lattice-based Cryptosystems.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication

Braun, Kristoffer ; Rack, Philipp (2015)
Shoulder-surfing resistente Authentisierung an mobilen Endgeräten.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Bansarkhani, Rachid El ; Dagdelen, Özgür ; Buchmann, Johannes (2015)
Augmented Learning with Errors: The Untapped Potential of the Error Term.
Isla Verde, Puerto Rico
Conference or Workshop Item, Bibliographie

Bansarkhani, Rachid El ; Buchmann, Johannes (2015)
High Performance Lattice-based CCA-secure Encryption.
In: Cryptology ePrint Archive
Article, Bibliographie

Braun, Johannes (2015)
Maintaining Security and Trust in Large Scale Public Key Infrastructures.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication

Butin, Denis ; Métayer, Daniel Le (2015)
A Guide to End-to-End Privacy Accountability.
Florence, Italy
Conference or Workshop Item, Bibliographie

Butin, Denis ; Gazdag, Stefan-Lukas ; Buchmann, Johannes (2015)
Real-World Post-Quantum Digital Signatures.
Brussels, Belgium
Conference or Workshop Item, Bibliographie

Braun, Johannes ; Volk, Florian ; Classen, Jiska ; Buchmann, Johannes ; Mühlhäuser, Max (2014)
CA Trust Management for the Web PKI.
In: Journal of Computer Security, 22 (6)
doi: 10.3233/JCS-140509
Article, Bibliographie

Braun, Johannes (2014)
Ubiquitous support of multi path probing: Preventing man in the middle attacks on Internet communication.
San Francisco, USA
Conference or Workshop Item, Bibliographie

Buchmann, Johannes ; Bischof, Christian ; Dagdelen, Özgür ; Fitzpatrick, Robert ; Göpfert, Florian ; Mariano, Artur (2014)
Nearest Planes in Practice.
Istanbul, Turkey
Conference or Workshop Item, Bibliographie

Budurushi, Jurlind ; Renaud, Karen ; Volkamer, Melanie ; Woide, Marcel
eds.: Krimmer, Robert ; Volkamer, Melanie (2014)
Implementation and Evaluation of the EasyVote Tallying Component and Ballot.
Lochau
doi: 10.1109/EVOTE.2014.7001140
Conference or Workshop Item, Bibliographie

Budurushi, Jurlind ; Neumann, Stephan ; Shala, Genc ; Volkamer, Melanie
eds.: Plödereder, Erhard ; Grunske, Lars ; Schneider, Eric ; Ull, Dominik (2014)
Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trail.
44. Jahrestagung der Gesellschaft für Informatik. Stuttgart, Germany (22.-26.09.2014)
Conference or Workshop Item, Bibliographie

Buchmann, Johannes ; Bansarkhani, Rachid El ; Hauke, Sascha
eds.: Brunetti, Gino ; Feld, Thomas ; Heuser, Lutz ; Schnittner, Joachim ; Webel, Christian (2014)
Towards Security Solutions for Emergent Business Software.
St. Leon-Rot, Germany
Conference or Workshop Item, Bibliographie

Bartsch, Steffen ; Boos, Carina ; Canova, Gamze ; Dyck, Dominic ; Henhapl, Birgit ; Schultheis, Michael ; Volkamer, Melanie
eds.: Plödereder, Erhard ; Grunske, Lars ; Schneider, Eric ; Ull, Dominik (2014)
Interdisziplinäres Bewertungskonzept für Risiken auf Webseiten.
Bonn
Conference or Workshop Item, Bibliographie

Braun, Johannes ; Buchmann, Johannes ; Mullan, Ciaran ; Wiesmaier, Alexander (2014)
Long Term Confidentiality: a Survey.
In: Designs, Codes and Cryptography, 71 (3)
doi: 10.1007/s10623-012-9747-6
Article, Bibliographie

Budurushi, Jurlind ; Stockhardt, Simon ; Woide, Marcel ; Volkamer, Melanie
eds.: Tryfonas, Theo ; Askoxylakis, Ioannis (2014)
Paper Audit Trails and Voters' Privacy Concerns.
Heraklion, Greece
Conference or Workshop Item, Bibliographie

Budurushi, Jurlind ; Volkamer, Melanie
eds.: Parycek, Peter ; Edelmann, Noella (2014)
Feasibility Analysis of Various Electronic Voting Systems for Complex Elections.
Danube University Krems
Conference or Workshop Item, Bibliographie

Bartsch, Steffen ; Volkamer, Melanie (2014)
Expert Knowledge for Contextualized Warnings.
Report, Bibliographie

Budurushi, Jurlind ; Jöris, Roman ; Volkamer, Melanie (2014)
Implementing and evaluating a software-independent voting system for polling station elections.
In: Journal of Information Security and Applications, 19 (2)
doi: 10.1016/j.jisa.2014.03.001
Article, Bibliographie

Bergmann, Clemens ; Canova, Gamze (2014)
Design, Implementation and Evaluation of an Anti-Phishing Education App.
Technische Universität Darmstadt
Master Thesis, Primary publication

Budurushi, Jurlind ; Woide, Marcel ; Volkamer, Melanie (2014)
Introducing Precautionary Behavior by Temporal Diversion of Voter Attention from Casting to Verifying their Vote.
San Diego
doi: 10.14722/usec.2014.23037
Conference or Workshop Item, Bibliographie

Boos, Carina ; Bartsch, Steffen ; Volkamer, Melanie (2014)
Rechtliche und technische Nutzerunterstützung bei der Button-Lösung.
In: Computer und Recht, (2)
doi: 10.9785/ovs-cr-2014-119
Article, Bibliographie

Bartsch, Steffen ; Boos, Carina ; Dyck, Dominic ; Schwarz, Christopher ; Theuerling, Heike ; Henhapl, Birgit ; Volkamer, Melanie (2014)
Unterstützung für ein risikobewusstes Verhalten im Internet.
Bremen
Conference or Workshop Item, Bibliographie

Bansarkhani, Rachid El ; Buchmann, Johannes
eds.: Pointcheval, David ; Vergnaud, Damien (2014)
Towards Lattice Based Sequential Aggregate Signatures.
Marrakesh, Morocco
Conference or Workshop Item, Bibliographie

Bansarkhani, Rachid El ; Buchmann, Johannes (2014)
LCPR: High Performance Compression Algorithm for Lattice-Based Signatures and Schnorr-like Constructions.
Conference or Workshop Item, Bibliographie

Buchmann, Johannes ; Neumann, Stephan (2014)
Tauglichkeit von Common Criteria-Schutzprofilen für Internetwahlen in Deutschland.
In: Datenschutz und Datensicherheit - DuD, 38 (2)
Article, Bibliographie

Buchmann, Johannes ; Karatsiolis, Evangelos ; Wiesmaier, Alexander (2013)
Introduction to Public Key Infrastructures.
Book, Bibliographie

Braun, Johannes ; Kiefer, Franziskus ; Hülsing, Andreas
eds.: Katsikas, Sokratis ; Agudo, Isaac (2013)
Revocation & Non-Repudiation: When the first destroys the latter.
RHUL, Egham, UK
doi: 10.1007/978-3-642-53997-8_3
Conference or Workshop Item, Bibliographie

Buchmann, Johannes ; Nebel, Maxi ; Roßnagel, Alexander ; Shirazi, Fatemeh ; Simo, Hervais ; Waidner, Michael
ed.: Hildebrandt, Mireille (2013)
Personal Information Dashboard: Putting the Individual Back in Control.
In: Digital Enlightenment Yearbook 2013
doi: 10.3233/978-1-61499-295-0-139
Book Section, Bibliographie

Braun, Johannes ; Volk, Florian ; Buchmann, Johannes ; Mühlhäuser, Max
eds.: Katsikas, Sokrates K. ; Agudo, Isaac (2013)
Trust Views for the Web PKI.
10th European Workshopon Public Key Infrastructures, Services and Applications (EuroPKI 2013). Egham, United Kingdom (12.-13.09.2013)
Conference or Workshop Item, Bibliographie

Bouyukliev, Iliya ; Bulygin, Stanislav ; Martínez-Moro, Edgar
eds.: Bouyukliev, Iliya ; Bulygin, Stanislav ; Martínez-Moro, Edgar (2013)
Foreword: computer algebra in coding theory and cryptography.
In: Applicable Algebra in Engineering, Communication and Computing
doi: 10.1007/s00200-013-0199-7
Book Section, Bibliographie

Bansarkhani, Rachid El ; Buchmann, Johannes
eds.: Lange, Tanja ; Lauter, Kristin ; Lisonek, Petr (2013)
Improvement and Efficient Implementation of a Lattice-based Signature Scheme.
Simon Fraser University, Burnaby, British Columbia, Canada
Conference or Workshop Item, Bibliographie

Braden, Kjell (2013)
XML Advanced Electronic Signatures and XML Evidence Record Syntax for Long-Term Protection of Data objects.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Bernhard, David ; Neumann, Stephan ; Volkamer, Melanie
eds.: Schneider, Steve ; Heather, James ; Teague, Vanessa (2013)
Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs.
University of Surrey, Guildford, UK
Conference or Workshop Item, Bibliographie

Budurushi, Jurlind ; Neumann, Stephan ; Olembo, Maina ; Volkamer, Melanie
eds.: Pernul, Günther ; Sandhu, Ravi (2013)
Pretty Understandable Democracy - A Secure and Understandable Internet Voting Scheme.
University of Regensburg, Germany
Conference or Workshop Item, Bibliographie

Budurushi, Jurlind ; Henning, Maria ; Volkamer, Melanie
eds.: Schneider, Steve ; Heather, James ; Teague, Vanessa (2013)
Vote Casting in Any Preferred Constituency: A New Voting Channel.
University of Surrey, Guildford, UK
Conference or Workshop Item, Bibliographie

Bartsch, Steffen ; Berger, Bernhard ; Bunke, Michaela ; Sohr, Karsten
eds.: Pernul, Günther ; Sandhu, Ravi (2013)
The Transitivity-of-Trust Problem in Android Application Interaction.
University of Surrey, Guildford, UK
Conference or Workshop Item, Bibliographie

Bartsch, Steffen ; Volkamer, Melanie ; Theuerling, Heike ; Karayumak, Fatih
ed.: Huth, Michael (2013)
Contextualized Web warnings, and how they cause distrust.
TRUST 2013. London, UK (17. - 19. Juni 2013)
Conference or Workshop Item, Bibliographie

Baumöller, Claas ; Schaaf, Joachim ; Horsch, Moritz ; Wiesmaier, Alexander ; Braun, Johannes (2013)
Identification element-based authentication and identification with decentralised service use.
Norm, patent, standard, Bibliographie

Buchmann, Johannes ; Demirel, Denise ; Graaf, Jeroen van de
ed.: Sadeghi, Ahmad-Reza (2013)
Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy.
Conference or Workshop Item, Bibliographie

Braun, Johannes ; Horsch, Moritz ; Hülsing, Andreas (2013)
Effiziente Umsetzung des Kettenmodells unter Verwendung vorwärtssicherer Signaturverfahren.
Bonn
Conference or Workshop Item, Bibliographie

Bulygin, Stanislav ; Walter, Michael ; Buchmann, Johannes
ed.: Dawson, E. (2013)
Many weak keys for PRINTcipher: fast key recovery and countermeasures.
Conference or Workshop Item, Bibliographie

Braun, Johannes ; Wiesmaier, Alexander ; Buchmann, Johannes
ed.: Sprague, Ralph H. (2013)
On the Security of Encrypted Secret Sharing.
Grand Wailea, Maui, Hawaii
doi: 10.1109/HICSS.2013.426
Conference or Workshop Item, Bibliographie

Bulygin, Stanislav ; Walter, Michael ; Buchmann, Johannes (2013)
Full analysis of PRINTcipher with respect to invariant subspace attack: efficient key recovery and countermeasures.
In: Designs, Codes, and Cryptography 73(3)
doi: 10.1007/s10623-013-9840-5
Article, Bibliographie

Buchmann, Johannes ; Dahmen, Erik ; Ereth, Sarah ; Hülsing, Andreas ; Rückert, Markus (2013)
On the security of the Winternitz one-time signature scheme.
In: International Journal of Applied Cryptography, 3 (1)
Article, Bibliographie

Buchmann, Johannes ; Cabarcas, Daniel ; Göpfert, Florian ; Hülsing, Andreas ; Weiden, Patrick
eds.: Lange, Tanja ; Lauter, Kristin ; Lisonek, Petr (2013)
Discrete Ziggurat: A Time-Memory Trade-off for Sampling from a Gaussian Distribution over the Integers.
Simon Fraser University, Burnaby, British Columbia, Canada
Conference or Workshop Item, Bibliographie

Braun, Johannes ; Rynkowski, Gregor (2013)
The Potential of an Individualized Set of trusted CAs: Defending against CA Failures in the Web PKI.
Washington D.C., USA
doi: 10.1109/SocialCom.2013.90
Conference or Workshop Item, Bibliographie

Bansarkhani, Rachid El ; Cabarcas, Daniel ; Kuo, Po-Chun ; Schmidt, Patrick ; Schneider, Michael (2012)
A Selection of Recent lattice-Based Signature and Encryption Schemes.
In: Tatra Mountains Mathematical Publications, 53
Article, Bibliographie

Braun, Johannes ; Hülsing, Andreas ; Wiesmaier, Alexander (2012)
Schlanke Infrastrukturen für den digitalen Rechtsverkehr - Vorwärtssichere Verfahren für qualifizierte elektronische Signaturen.
Report, Bibliographie

Braun, Johannes ; Horsch, Moritz ; Wiesmaier, Alexander
eds.: Ryan, Mark ; Smyth, Ben ; Wang, Guilin (2012)
iPIN and mTAN for secure eID applications.
Hangzhou, China
doi: 10.1007/978-3-642-29101-2_18
Conference or Workshop Item, Bibliographie

Braun, Johannes ; Hülsing, Andreas ; Wiesmaier, Alexander ; Vigil, Martín ; Buchmann, Johannes
eds.: De Capitani di Vimercati, Sabrina ; Mitchell, Chris (2012)
How to avoid the Breakdown of Public Key Infrastructures - Forward Secure Signatures for Certificate Authorities.
Pisa, Italy
Conference or Workshop Item, Bibliographie

Bär, Daniel ; Biemann, Chris ; Gurevych, Iryna ; Zesch, Torsten (2012)
UKP: Computing Semantic Textual Similarity by Combining Multiple Content Similarity Measures.
Conference or Workshop Item, Bibliographie

Braun, Johannes ; Buchmann, Johannes
eds.: Levi, Albert ; Badra, Mohamad ; Cesana, Matteo ; Ghassemian, Mona ; Jabeur, Nafaa ; Klonowski, Marek ; Mana, Antonio ; Sargento, Susana ; Zeadally, Sherali (2012)
Perfect Confidentiality Network - A solution for information theoretically secure key agreement.
Istanbul, Turkey
doi: 10.1109/NTMS.2012.6208676
Conference or Workshop Item, Bibliographie

Bartsch, Steffen (2012)
Policy Override in Practice: Model, Evaluation, and Decision Support.
In: Security and Communication Networks
doi: 10.1002/sec.547
Article, Bibliographie

Bartsch, Steffen ; Sasse, Angela (2012)
How Users Bypass Access Control and Why: The Impact of Authorization Problems on Individuals and the Organization.
Report, Bibliographie

Busold, Christoph (2012)
Hash-based Signatures on Smart Cards.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Bulygin, Stanislav ; Walter, Michael (2012)
Study of the invariant coset attack on PRINTcipher: more weak keys with practical key recovery.
Report, Bibliographie

Bansarkhani, Rachid El ; Meziani, Mohammed (2012)
An Efficient Lattice-based Secret Sharing Construction.
London, UK
Conference or Workshop Item, Bibliographie

Bartsch, Steffen ; Sohr, Karsten ; Bunke, Michaela ; Hofrichter, Oliver ; Berger, Bernhard (2012)
The Transitivity of Trust Problem in the Interaction of Android Applications.
doi: 10.1109/ARES.2013.39
Report, Bibliographie

Bartsch, Steffen ; Sasse, Angela (2012)
How Users Bypass Access Control – and Why: The Impact of Authorization Problems on Individuals and the Organization.
London, UK
Conference or Workshop Item, Bibliographie

Bartsch, Steffen ; Sasse, Angela
eds.: Ossowski, Sascha ; Lecca, Paola (2012)
Guiding Decisions on Authorization Policies: A Participatory Approach to Decision Support.
Trento, Italy
doi: 10.1145/2245276.2232015
Conference or Workshop Item, Bibliographie

Bulygin, Stanislav ; Buchmann, Johannes
eds.: Lin, Dongdai ; Tsudik, Gene ; Wang, Xiaoyun (2011)
Algebraic cryptanalysis of the round-reduced and side channel analysis of the full PRINTCipher-48.
Sanya, China
Conference or Workshop Item, Bibliographie

Buchmann, Johannes ; Dahmen, Erik ; Hülsing, Andreas
ed.: Yang, Bo-Yin (2011)
XMSS - A Practical Forward Secure Signature Scheme based on Minimal Security Assumptions.
doi: 10.1007/978-3-642-25405-5_8
Conference or Workshop Item, Bibliographie

Braun, Johannes ; Horsch, Moritz ; Wiesmaier, Alexander ; Hühnlein, Detlef
eds.: Schartner, Peter ; Taeger, Jürgen (2011)
Mobile Authentisierung und Signatur.
Oldenburg
Conference or Workshop Item, Bibliographie

Braun, Johannes ; Wiesmaier, Alexander ; Klieme, Eric ; Strick, Linda ; Wunderlich, Wolfgang (2011)
Der elektronische Safe als vertrauenswürdiger Cloud Service.
Report, Bibliographie

Bartsch, Steffen (2011)
Exploring Twisted Paths: Analyzing Authorization Processes in Organizations.
Milan, Italy
doi: 10.1109/ICNSS.2011.6060003
Conference or Workshop Item, Bibliographie

Bartsch, Steffen (2011)
Practitioners Perspectives on Security in Agile Development.
Vienna, Austria
doi: 10.1109/ARES.2011.82
Conference or Workshop Item, Bibliographie

Buchmann, Johannes ; Dahmen, Erik ; Ereth, Sarah ; Hülsing, Andreas ; Rückert, Markus
eds.: Nitaj, Abderrahmane ; Pointcheval, David (2011)
On the security of the Winternitz one-time signature scheme.
Dakar, Senegal
doi: 10.1007/978-3-642-21969-6_23
Conference or Workshop Item, Bibliographie

Bartsch, Steffen (2011)
An Authorization Enforcement Usability Case Study.
Madrid, Spain
doi: 10.1007/978-3-642-19125-1_16
Conference or Workshop Item, Bibliographie

Bansarkhani, Rachid El (2010)
Solving Lattice Problems with Voronoi Cells.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Bulygin, Stanislav ; Petzoldt, Albrecht ; Buchmann, Johannes
eds.: Gong, G. ; Gupta, K. C. (2010)
Towards provable security of the Unbalanced Oil and Vinegar signature scheme under direct attacks.
Conference or Workshop Item, Bibliographie

Bartsch, Steffen (2010)
A calculus for the qualitative risk assessment of policy override authorization.
Taganrog, Rostov-on-Don, Russian Federation
doi: 10.1145/1854099.1854115
Conference or Workshop Item, Bibliographie

Buchmann, Johannes ; Cabarcas, Daniel ; Ding, Jintai ; Mohamed, Mohamed Saied Emam
eds.: Bernstein, Daniel ; Lange, Tanja (2010)
Flexible Partial Enlargement to Accelerate Gröbner Basis Computation over F_2.
Stellenbosch, South Africa
Conference or Workshop Item, Bibliographie

Buchmann, Johannes ; Wiesmaier, Alexander (2010)
Eine kurze Geschichte der Schlüssel.
In: 360° -- Fachmagazin für das Management im öffentlichen Sektor, (17)
Article, Bibliographie

Belhilali, Mohamed (2010)
Entwurf und Implementierung von SCVP in Java - Simple Certificate Validation Protocol.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Bartsch, Steffen (2010)
Supporting Authorization Policy Modification in Agile Development of {Web} Applications.
Krakow, Poland
doi: 10.1109/ARES.2010.19
Conference or Workshop Item, Bibliographie

Backs, Christian (2010)
Anbindung eines externen Authentifizierungsdienstes an ein Online-Wahlsystem.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Barreto, Paulo ; Cayrel, Pierre-Louis ; Misoczki, Rafael ; Niebuhr, Robert (2010)
Quasi-dyadic CFS signatures.
Conference or Workshop Item, Bibliographie

Buchmann, Johannes (2010)
Einführung in die Kryptographie / Introduction to Cryptography.
Book, Bibliographie

Buchmann, Johannes ; Braun, Johannes ; Horsch, Moritz ; Hühnlein, Detlef ; Kiefer, Franziskus ; Strenzke, Falko ; Wiesmaier, Alexander (2010)
Towards a mobile eCard Client.
Darmstadt
Conference or Workshop Item, Bibliographie

Braun, Johannes (2009)
Nutzung des elektronischen Personalausweises im eCommerce.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie

Buchmann, Johannes ; Lindner, Richard (2009)
Secure Parameters for SWIFFT.
Conference or Workshop Item, Bibliographie

Buchmann, Johannes ; Roßnagel, Alexander (2009)
Das Bundesverfassungsgericht und Telemedienwahlen.
In: K&R, 9
Article, Bibliographie

Buchmann, Johannes ; Karatsiolis, Vangelis (2009)
Notification Services for the Server-Based Certificate Validation Protocol.
In: Int'l J. of Communications, Network and System Sciences, 2 (5)
doi: 10.4236/ijcns.2009.25042
Article, Bibliographie

Beck, Martin ; Tews, Erik (2009)
Practical attacks against WEP and WPA.
Conference or Workshop Item, Bibliographie

Bartsch, Steffen ; Sohr, Karsten ; Bormann, Carsten (2009)
Supporting Agile Development of Authorization Rules for SME Applications.
Orlando, FL, USA
doi: 10.1007/978-3-642-03354-4_35
Conference or Workshop Item, Bibliographie

Buchmann, Johannes ; Lindner, Richard ; Rückert, Markus ; Schneider, Michael (2009)
Post-quantum cryptography: lattice signatures.
In: Special Issue of Computing (CECC 2008)
Article, Bibliographie

Bergner, Martin (2008)
Minimale Voraussetzungen für blinde Signaturen.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Biadatz, Adalbert (2008)
Server gesteuerte Chipkarten Aktualisierung.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Brandl, Andreas (2008)
Implementierung eines Responders für CMP over HTTP zur Erstellung von CV- und X.509 Zertifikaten im Umfeld der elektronischen Gesundheitskarte.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Buchmann, Johannes ; Lindner, Richard ; Rückert, Markus
eds.: Buchmann, Johannes ; Ding, Jintai (2008)
Explicit Hard Instances of the Shortest Vector Problem.
Conference or Workshop Item, Bibliographie

Buchmann, Johannes ; Döring, Martin ; Lindner, Richard (2008)
Efficiency Improvement for {NTRU}.
Saarbrücken
Conference or Workshop Item, Bibliographie

Bartsch, Steffen ; Bormann, Carsten
ed.: Horster, Patrick (2008)
Berechtigungsmodellierung im Geschäftsprozessmanagement von KMU.
Conference or Workshop Item, Bibliographie

Buchmann, Johannes ; Dahmen, Erik ; Schneider, Michael
eds.: Buchmann, Johannes ; Ding, Jintai (2008)
Merkle Tree Traversal Revisited.
Conference or Workshop Item, Bibliographie

Buchmann, Johannes ; Dahmen, Erik ; Klintsevich, Elena ; Okeya, Katsuyuki ; Vuillaume, Camille (2007)
Merkle Signatures with Virtually Unlimited Signature Capacity.
doi: 10.1007/978-3-540-72738-5_3
Conference or Workshop Item, Bibliographie

Becker, Jochen (2007)
Kommunikation in einem Trustcenter Intra Trustcenter Protocol Version 1.2 Entwurf und Design.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Bennani, Younes (2007)
Optimierung de Flexsecures Online Certificate Status Protocol.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Blume, Sebastian (2007)
Efficient Java Implementation of GMSS.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Borisova, Zornitsa (2007)
Rankin Lattice Reduction for Programmers.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Buchmann, Johannes ; Vollmer, Ulrich (2007)
Binary Quadratic Forms. An Algorithmic Approach.
Book, Bibliographie

Buchmann, Johannes ; Garcia, Luis Carlos Coronado ; Dahmen, Erik ; Döring, Martin ; Klintsevich, Elena (2006)
{CMSS} - An Improved Merkle Signature Scheme.
doi: 10.1007/11941378_25
Conference or Workshop Item, Bibliographie

Buchmann, Johannes ; Ludwig, Christoph (2006)
Practical Lattice Basis Sampling Reduction.
Berlin
doi: 10.1007/11792086_17
Conference or Workshop Item, Bibliographie

Buchmann, Johannes ; Pyshkin, Andrei ; Weinmann, Ralf-Philipp (2006)
Block Ciphers Sensitive to Gröbner Basis Attacks.
Conference or Workshop Item, Bibliographie

Buchmann, Johannes ; Pyshkin, Andrei ; Weinmann, Ralf-Philipp (2006)
A Zero-Dimensional Gröbner Basis for AES-128.
Conference or Workshop Item, Bibliographie

Becker, Anja (2006)
Methods of Fault Analysis Attacks on Elliptic Curve Cryptosystems.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Buchmann, Johannes ; Vollmer, Ulrich (2006)
CLC2006 - Workshop on Codes and Lattices in Cryptography.
Other, Bibliographie

Buchmann, Johannes ; May, Alexander ; Vollmer, Ulrich (2006)
Perspectives for cryptographic long-term security.
In: >Commun. ACM, 49 (9)
doi: 10.1145/1151030.1151055
Article, Bibliographie

Buchmann, Johannes (2006)
Passwörter oder Smartcards zur Absicherung von Portalen?
Report, Bibliographie

Buchmann, Johannes ; Dahmen, Erik ; May, Alexander ; Vollmer, Ulrich (2006)
Krypto 2020.
In: >The Information Security Journal -(KES), 5
Article, Bibliographie

Buchmann, Johannes ; May, Alexander ; Vollmer, Ulrich (2006)
Perspectives for cryptographic long-term security.
In: >Commun. ACM, 49 (9)
Article, Bibliographie

Buchmann, Johannes ; Vollmer, Ulrich (2006)
A Terr algorithm for computations in the infrastructure of real-quadratic number fields.
In: >Journal de Théorie des Nombres de Bordeaux, 18 (3)
Article, Bibliographie

Baier, Harald ; Straub, Tobias (2005)
Awareness by Doing. Ein neues Konzept zur Sensibilisierung von {IT}-Anwendern.
Other, Bibliographie

Bakuri, Harini (2005)
Security Analysis and Implementation of Password-based Cryptosystem.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Buchmann, Johannes ; Coronado, Carlos ; Döring, Martin ; Engelbert, Daniela ; Ludwig, Christoph ; Overbeck, Raphael ; Schmidt, Arthur ; Vollmer, Ulrich ; Weinmann, Ralf-Philipp (2004)
Post-Quantum Signatures.
In: Cryptology ePrint Archive, 2004 (297)
Article, Bibliographie

Baier, Harald ; Ruppert, Markus (2004)
Interoperable and Flexible Digital Signatures for {E-Government} and {E-Commerce}.
Report, Bibliographie

Biehl, Ingrid ; Paulus, Sachar ; Takagi, Tsuyoshi (2004)
Efficient Undeniable Signature Schemes Based on Ideal Arithmetic in Quadratic Orders.
In: >IJDCC: Designs, Codes and Cryptography, 31 (2)
Article, Bibliographie

Buchmann, Johannes ; Takagi, Tsuyoshi ; Vollmer, Ulrich (2004)
Number field cryptography.
Conference or Workshop Item, Bibliographie

Baier, Harald ; Buchmann, Johannes ; Busch, Christoph (2003)
Aus- und Weiterbildung in IT-Sicherheit.
Conference or Workshop Item, Bibliographie

Baier, Harald (2003)
A Fast {Java} Implementation of a Provably Secure Pseudo Random Bit Generator Based on the Elliptic Curve Discrete Logarithm Problem.
Report, Bibliographie

Baier, Harald ; Buchmann, Johannes ; Busch, Christoph (2003)
{Aus-} und Weiterbildung in {IT}-Sicherheit.
Report, Bibliographie

Baier, Harald ; Köhler, Günter (2003)
How to Compute the Coefficients of the Elliptic Modular Function {j(z)}.
Report, Bibliographie

Barraci, Nima ; Becker, Sven (2003)
Generische Integration von Kryptoprozessoren in den {Java}-basierten {FlexiProvider}.
Other, Bibliographie

Buchmann, Johannes ; Schmidt, Arthur (2003)
Computing the structure of a finite abelian group.
Report, Bibliographie

Buchmann, Johannes ; Takagi, Tsuyoshi (2003)
Kryptographie - Chancen und Risiken.
Report, Bibliographie

Buchmann, Johannes ; Takagi, Tsuyoshi ; Vollmer, Ulrich (2003)
Number field cryptography.
Report, Bibliographie

Buchmann, Johannes ; Sakurai, Kouichi ; Takagi, Tsuyoshi (2002)
An IND-CCA2 Public-Key Cryptosystem with Fast Decryption.
Seoul, Korea
Conference or Workshop Item, Bibliographie

Buchmann, Johannes ; Ernst, Markus ; Henhapl, Birgit ; Huss, Sorin (2002)
Elliptische Kurven Kryptographie - hocheffizient und portabel.
In: >thema FORSCHUNG, Eingebette Systeme: Entwurf und Anwendung versteckter Computer, (1/2002)
Article, Bibliographie

Buchmann, Johannes (2002)
Theoretische Informatik.
In: 30 Jahre Informatik an deutschen Hochschulen: Festschrift
Book Section, Bibliographie

Baier, Harald (2002)
Efficient Algorithms for Generating Elliptic Curves over Finite Fields Suitable for Use in Cryptography.
Technische Universität Darmstadt
Ph.D. Thesis, Bibliographie

Biehl, Ingrid ; Buchmann, Johannes ; Hamdy, Safuat ; Meyer, Andreas (2002)
A Signature Scheme Based on the Intractability of Computing Roots.
In: >Des. Codes Cryptography, 25 (3)
Article, Bibliographie

Buchmann, Johannes (2002)
Cryptographic Protocols.
Other, Bibliographie

Baier, Harald (2001)
Elliptic Curves of Prime Order over Optimal Extension Fields for Use in Cryptography.
Chennai, India
Conference or Workshop Item, Bibliographie

Buchmann, Johannes ; Hamdy, S. (2001)
A survey on IQ cryptography.
In: Public-key cryptography and computational number theory. Hrsg.: K. Alster, J. Urbanowicz, H.C. Wiliams. - Berlin, New York: de Gruyter, 2001. S. 1-15
Book Section, Bibliographie

Baier, Harald (2001)
Efficient Computation of Fourier Series and Singular Moduli with Application in Cryptography.
Report, Bibliographie

Baier, Harald (2001)
Elliptic Curves of Prime Order over Optimal Extension Fields for Use in Cryptography.
Report, Bibliographie

Baier, Harald ; Buchmann, Johannes (2001)
Efficient Construction of Cryptographically Strong Elliptic Curves.
Report, Bibliographie

Buchmann, Johannes (2001)
Wie sicher kann Sicherheit sein?
Report, Bibliographie

Buchmann, Johannes ; Hamdy, Safuat (2001)
A Survey on {IQ} Cryptography.
Report, Bibliographie

Buchmann, Johannes ; Sakurai, Kouichi ; Takagi, Tsuyoshi (2001)
An {IND-CCA2} Public-Key Cryptosystem with Fast Decryption.
Report, Bibliographie

Baier, Harald ; Buchmann, Johannes (2000)
Efficient Construction of Cryptographically Strong Elliptic Curves.
Calcutta, India
Conference or Workshop Item, Bibliographie

Baier, Harald ; Buchmann, Johannes (2000)
Efficient construction of cryptographically strong elliptic curves.
In: Progress in cryptology: INDOCRYPT 2000. Hrsg.: B. Roy, E. Okamoto. - Berlin, Heidelberg (u.a.): Springer, 2000 = Lecture notes in computer science; 1977. S. 191-202
Book Section, Bibliographie

Buchmann, Johannes ; Maurer, M. ; Möller, B. (2000)
Cryptography based on number fields with large regulator.
In: Journal de théorie des nombres de Bordeaux, 12
Article, Bibliographie

Biehl, Ingrid ; Buchmann, Johannes ; Hamdy, Safuat ; Meyer, Andreas (2000)
A Signature Scheme Based on the Intractability of Computing Roots.
Report, Bibliographie

Buchmann, Johannes ; Maurer, Markus ; Möller, Bodo (2000)
Cryptography Based on Number Fields with Large Regulator.
Report, Bibliographie

Buchmann, Johannes ; Squirrel, D. (1999)
Kernels of integer matrices via modular arithmetic.
Book, Bibliographie

Buchmann, Johannes ; Ruppert, M. ; Tak, M. (1999)
FlexiPKI - Realisierung einer flexiblen Public-Key-Infrastruktur.
Book, Bibliographie

Biehl, Ingrid ; Buchmann, Johannes ; Hamdy, Safuat ; Meyer, Andreas (1999)
Cryptographic Protocols Based on Intractability of Extracting Roots and Computing Discrete Logarithms.
Report, Bibliographie

Biehl, Ingrid ; Paulus, Sachar ; Takagi, Tsuyoshi (1999)
Efficient Undeniable Signature Schemes based on Ideal Arithmetic in Quadratic Orders.
Report, Bibliographie

Binisik, Emre (1999)
Sieben in Zahlkörpern und Funktionenkörpern.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie

Boivin, Michele (1999)
Anwendung hyperelliptischer Kurven in der Kryptographie.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie

Breuning, Manuel (1999)
Eine topologische Struktur für die Idealgruppe.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie

Buchmann, Johannes ; Eisenbrand, Friedrich (1999)
On factor refinement in number fields.
In: >Mathematics of Computation, 68 (225)
Article, Bibliographie

Buchmann, Johannes ; Maurer, Markus (1999)
Wie sicher ist die Public-Key-Kryptographie.
Report, Bibliographie

Buchmann, Johannes ; Ruppert, Markus ; Tak, Markus (1999)
{FlexiPKI} - Realisierung einer flexiblen Public-Key-Infrastruktur.
Report, Bibliographie

Buchmann, Johannes ; Squirrel, Douglas (1999)
Kernels of Integer Matrices via Modular Arithmetic.
Report, Bibliographie

Budnick, Michael (1999)
Zur Reduktion des {DL}-Problems für elliptische Kurven auf das {DL}-Problem in endlichen Körpern.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie

Backes, Werner (1998)
Berechnung kürzester Gittervektoren.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie

Buchmann, Johannes ; Jacobson, Michael J. ; Neis, Stefan ; Theobald, Patrick ; Weber, Damian (1998)
Sieving Methods for Class Group Computation.
Report, Bibliographie

Buchmann, Johannes ; Maurer, Markus (1998)
Approximate Evaluation of {L(1,chi-delta)}.
Report, Bibliographie

Buchmann, Johannes ; Weber, Damian (1998)
Discrete Logarithms: Recent Progress.
Report, Bibliographie

Buchmann, Johannes ; Paulus, Sachar (1997)
A One Way Function Based on Ideal Arithmetic in Number Fields.
Santa Barbara, California, USA
Conference or Workshop Item, Bibliographie

Buchmann, Johannes ; Paulus, S. (1997)
A one way function based on ideal arithmetic in number fields.
Book, Bibliographie

Biehl, Ingrid ; Buchmann, Johannes (1997)
An analysis of the reduction algorithms for binary quadratic forms.
Report, Bibliographie

Buchmann, Johannes ; Jacobson, Michael J. ; Teske, Edlyn (1997)
On some computational problems in finite abelian groups.
In: >Mathematics in Computation, 66 (220)
Article, Bibliographie

Buchmann, Johannes ; Paulus, Sachar (1997)
A one way function based on ideal arithmetic in number fields.
Report, Bibliographie

Buchmann, Johannes ; Eisenbrand, F. (1996)
On factor refinement in number fields.
Book, Bibliographie

Buchmann, Johannes ; Neis, S. (1996)
Algorithms for linear algebra problems over principal ideal rings.
Book, Bibliographie

Buchmann, Johannes ; Jacobson, M. J. ; Teske, E. (1996)
On some computational problems in finite abelian groups.
Book, Bibliographie

Biehl, Ingrid ; Meyer, Bernd (1996)
Protocols for Collusion-Secure Asymmetric Fingerprintig.
Report, Bibliographie

Buchmann, Johannes ; Eisenbrand, Friedrich (1996)
On Factor Refinement in Number Fields.
Report, Bibliographie

Buchmann, Johannes ; Jacobson, Michael J. ; Teske, Edlyn (1996)
On some computational problems in finite abelian groups.
Report, Bibliographie

Buchmann, Johannes ; Neis, Stefan (1996)
Algorithms for Linear Algebra Problems over Principal Ideal Rings.
Report, Bibliographie

Bentz, Patrik (1995)
Eine effiziente Implementierung der verbesserten Buchberger Algorithmen und eine Datenstruktur für Polynome in mehreren Veründerlichen.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie

Biehl, Ingrid ; Buchmann, Johannes ; Thiel, Christoph (1994)
Cryptographic Protocols Based on Discrete Logarithms in Real-quadratic Orders.
Santa Barbara, California, USA
Conference or Workshop Item, Bibliographie

Buchmann, Johannes ; Loho, Jürgen ; Zayer, Jörg (1994)
An Implementation of the General Number Field Sieve.
Santa Barbara, California, USA
Conference or Workshop Item, Bibliographie

Biehl, Ingrid (1994)
Definition and Existence of Super Complexity Cores.
Beijing, P. R. China
Conference or Workshop Item, Bibliographie

Buchmann, Johannes (1994)
Reducing lattice bases by means of approximations.
Talence, France
Conference or Workshop Item, Bibliographie

Biehl, Ingrid ; Buchmann, Johannes (1994)
Algorithms for quadratic orders.
In: >Mathematics of Computation
Article, Bibliographie

Buchmann, Johannes ; Lenstra, Hendrik W. (1994)
Approximating rings of integers in number fields.
In: >Journal de Théorie des Nombres de Bordeaux, 6 (2)
Article, Bibliographie

Bartholomes, Jutta (1993)
Gitterbasisreduktion im Reellen.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie

Berger, Franz-Dieter (1993)
ECM - Faktorisieren mit elliptischen Kurven.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie

Biehl, Ingrid (1993)
Eine Grundlegung der Average-Case Komplexitätstheorie.
Universität des Saarlandes
Ph.D. Thesis, Bibliographie

Buchmann, Johannes ; Hollinger, Christine (1993)
On smooth ideals in number fields.
In: >Journal of Number Theory
Article, Bibliographie

Buchmann, Johannes ; Paulus, Sachar (1993)
Algorithms for finite abelian groups.
Other, Bibliographie

Biehl, Ingrid ; Buchmann, Johannes ; Meyer, Bernd ; Thiel, Christian ; Thiel, Christoph (1992)
Tools for Proving Zero Knowledge.
Balatonfüred, Hungary
Conference or Workshop Item, Bibliographie

Buchmann, Johannes ; Kessler, Volker (1992)
Computing a reduced lattice basis from a generating system.
Other, Bibliographie

Buchmann, Johannes ; Sprang, Oliver van (1992)
On short representations of orders and number fields.
Other, Bibliographie

Buchmann, Johannes ; Thiel, Christoph ; Williams, Hugh (1992)
Short representations of quadratic integers.
Other, Bibliographie

Buchmann, Johannes (1991)
Number Theoretic Algorithms and Cryptology.
Gosen, Germany
Conference or Workshop Item, Bibliographie

Buchmann, Johannes ; Düllmann, Stephan (1991)
On the Computation of Discrete Logarithms in Class Groups.
Santa Barbara, California, USA
Conference or Workshop Item, Bibliographie

Buchmann, Johannes ; Düllmann, Stephan (1991)
Distributed class group computation.
Other, Bibliographie

Buchmann, Johannes ; Müller, Volker (1991)
Computing the number of points on elliptic curves over finite prime fields.
Conference or Workshop Item, Bibliographie

Buchmann, Johannes ; Roth, Ralf ; Diehl, Matthias (1991)
{LiPS}: A System for distributed applications.
Other, Bibliographie

Buchmann, Johannes ; Williams, Hugh (1991)
Some remarks concerning the complexity of computing class groups of quadratic fields.
In: >Journal of Complexity, 7 (3)
doi: 10.1016/0885-064X(91)90039-Z
Article, Bibliographie

Buchmann, Johannes (1990)
A subexponential algorithm for the determination of class groups and regulators of algebraic number fields.
Conference or Workshop Item, Bibliographie

Buchmann, Johannes ; Shoup, Victor (1990)
Constructing Nonresidues in Finite Fields and the Extended Riemann Hypothesis.
Other, Bibliographie

Buchmann, Johannes ; Düllmann, Stephan ; Williams, Hugh (1989)
On the Complexity and Efficiency of a New Key Exchange System.
Houthalen, Belgium
Conference or Workshop Item, Bibliographie

C

Cremers, Cas ; Düzlü, Samed ; Fiedler, Rune ; Fischlin, Marc ; Janson, Christian (2021)
BUFFing signature schemes beyond unforgeability and the case of post-quantum signature.
42nd IEEE Symposium on Security and Privacy. virtual Conference (23.-27.05.2021)
Conference or Workshop Item, Bibliographie

Coudert, Fanny ; Butin, Denis ; Métayer, Daniel Le (2015)
Body-worn Cameras for Police Accountability: Opportunities and Risks.
In: Computer Law & Security Review (CLSR), 31 (6)
Article, Bibliographie

Cabarcas, Daniel ; Demirel, Denise ; Göpfert, Florian ; Lancrenon, Jean ; Wunderer, Thomas (2015)
An Unconditionally Hiding and Long-Term Binding Post-Quantum Commitment Scheme.
Report, Bibliographie

Canova, Gamze ; Volkamer, Melanie ; Bergmann, Clemens ; Borza, Roland ; Reinheimer, Benjamin ; Stockhardt, Simon ; Tenberg, Ralf (2015)
Learn To Spot Phishing URLs with the Android NoPhish App.
Hamburg, Germany
doi: 10.1007/978-3-319-18500-2_8
Conference or Workshop Item, Bibliographie

Canova, Gamze ; Volkamer, Melanie ; Bergmann, Clemens ; Reinheimer, Benjamin (2015)
NoPhish App Evaluation: Lab and Retention Study.
San Diego
Conference or Workshop Item, Bibliographie

Classen, Jiska ; Braun, Johannes ; Volk, Florian ; Hollick, Matthias ; Buchmann, Johannes ; Mühlhäuser, Max (2015)
A Distributed Reputation System for Certification Authority Trust Management.
Helsinki, Finland
Conference or Workshop Item, Bibliographie

Charfi, Ahmed (2014)
SAT-solving in Algebraic cryptanalysis.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Canova, Gamze ; Volkamer, Melanie ; Weiler, Simon (2014)
Poster: Password Entering and Transmission Security.
ACM SIGSAC Conference on Computer and Communications Security. Scottsdale, Arizona (November 3-7, 2014)
doi: 10.1145/2660267.2662387
Conference or Workshop Item, Bibliographie

Conrad, Bernd ; Shirazi, Fatemeh (2014)
Analyzing the Effectiveness of DoS Attacks on Tor.
Glasgow, UK
Conference or Workshop Item, Bibliographie

Canova, Gamze ; Volkamer, Melanie ; Bergmann, Clemens ; Borza, Roland
eds.: Mauw, Sjouke ; Jensen, Christian Damsgaard (2014)
NoPhish: An Anti-Phishing Education App.
Wroclaw, Poland
Conference or Workshop Item, Bibliographie

Conrad, Bernd ; Shirazi, Fatemeh (2014)
A Survey on Tor and I2P.
Paris, France
Conference or Workshop Item, Bibliographie

Cholakov, Kostadin ; Biemann, Chris ; Eckle-Kohler, Judith ; Gurevych, Iryna
eds.: Calzolari, Nicoletta ; Choukri, Khalid ; Declerck, Thierry ; Loftsson, Hrafn ; Maegaard, Bente ; Mariani, Joseph ; Moreno, Asuncion ; Odijk, Jan ; Piperidis, Stelios (2014)
Lexical Substitution Dataset for German.
Conference or Workshop Item, Bibliographie

Conrad, Bernd (2014)
Analyzing the Effectiveness of DoS Attacks on Tor.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Classen, Jiska (2014)
Reputation Systems for Trust Management in the Web PKI.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Cabarcas, Daniel ; Göpfert, Florian ; Weiden, Patrick (2013)
Provably Secure LWE-Encryption with Uniform Secret.
In: Cryptology ePrint Archive, 2013 (164)
Article, Bibliographie

Cayrel, Pierre-Louis ; Yousfi Alaoui, Sidi Mohamed el ; Véron, Pascal ; Hoffmann, Gerhard (2012)
An improved threshold ring signature scheme based on error correcting codes.
Conference or Workshop Item, Bibliographie

Cayrel, Pierre-Louis ; Yousfi Alaoui, Sidi Mohamed el ; Hoffmann, Gerhard ; Meziani, Mohammed ; Niebuhr, Robert
eds.: Kim, Tai-Hoon ; Adeli, Hojjat ; Robles, Rosslin John ; Balitanas, Maricel (2011)
Recent Progress in Code-Based Cryptography.
Brno University, Czech Republic
Conference or Workshop Item, Bibliographie

Cayrel, Pierre-Louis ; Yousfi Alaoui, Sidi Mohamed el ; Günther, Felix ; Hoffmann, Gerhard ; Rothe, Holger (2011)
Efficient implementation of code-based identification/signature schemes.
In: WEWoRC 2011
Article, Bibliographie

Cayrel, Pierre-Louis ; Hoffmann, Gerhard ; Schneider, Michael (2011)
GPU Implementation of the Keccak Hash Function Family.
Brno University, Czech Republic
Conference or Workshop Item, Bibliographie

Cayrel, Pierre-Louis ; Hoffmann, Gerhard ; Schneider, Michael (2011)
GPU Implementation of the Keccak Hash Function Family.
Brno University, Czech Republic
Conference or Workshop Item, Bibliographie

Cayrel, Pierre-Louis ; Lindner, Richard ; Rückert, Markus ; Silva, Rosemberg (2010)
Improved Zero-knowledge Identification with Lattices.
Malacca, Malaysia (October 13 - 15, 2010)
Conference or Workshop Item, Bibliographie

Cayrel, Pierre-Louis ; Lindner, Richard ; Rückert, Markus ; Silva, Rosemberg (2010)
A Lattice-Based Threshold Ring Signature Scheme.
Puebla, Mexico (August 8-11, 2010)
Conference or Workshop Item, Bibliographie

Cayrel, Pierre-Louis ; Véron, Pascal ; Yousfi Alaoui, Sidi Mohamed el (2010)
A zero-knowledge identification scheme based on the q-ary Syndrome Decoding problem.
SAC2010
Conference or Workshop Item, Bibliographie

Cayrel, Pierre-Louis ; Yousfi Alaoui, Sidi Mohamed el (2010)
Dual Construction of Stern-based Signature Schemes.
Conference or Workshop Item, Bibliographie

Chehimi, Nemr (2009)
Gitterbasisreduktion in Java.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Cakir-Tas, Sueheyla (2008)
Symmetrische Blockchiffren.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Clos, Johannes (2008)
Secure Client Platforms for Remote Internet Voting.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Chen, Jun (2007)
Verifiable Mixnets Techniques and Prototype Implementation.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Coronado García, Luis Carlos (2006)
Provably Secure and Practical Signature Schemes.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication

Coronado, Carlos (2005)
Can Schönhage multiplication speed up the RSA decryption or encryption?
Conference or Workshop Item, Bibliographie

Coronado, Carlos (2005)
Improvements to the Merkle signature scheme.
Conference or Workshop Item, Bibliographie

Caspary, Jan ; Weber, Martin (2001)
Hardwarebeschleunigung der Punktmultiplikation über GF(2<sup>n</sup>) mit dem Elliptic Curve KryptoProzessor {(ECP)} am Beispiel des {ECDSA}-Signaturverfahrens.
Other, Bibliographie

Coroama, Vlad ; Ruppert, Markus ; Seipel, Michael ; Tak, Markus (2001)
{Java}-basierte Kryptographie wird interoperabel.
Report, Bibliographie

Coroama, Vlad (2000)
Flexible Anbindung von SmartCards an eine {Java}-Sicherheitsinfrastruktur.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie

Carls, Robert (1999)
Punktezählalgorithmen für ordinäre elliptische Kurven über endlichen Körpern der Charakteristik 2.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie

Crnjak, Markus (1999)
{ElG}amal-Verschlüsselung mit elliptischen Kurven über Körpern der Charakteristik größer 3.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

D

Degabriele, Jean Paul ; Janson, Christian ; Struck, Patrick (2019)
Sponges Resist Leakage: The Case of Authenticated Encryption.
25th Annual International Conference on the Theory and Application of Cryptology and Information Security. Kobe, Japan (08.-12.12.2019)
Conference or Workshop Item, Bibliographie

Demmler, Daniel ; Rindal, Peter ; Rosulek, Mike ; Trieu, Ni (2018)
PIR-PSI: Scaling Private Contact Discovery.
In: Proceedings on Privacy Enhancing Technologies (PoPETs)
doi: 10.1515/popets-2018-0037
Article, Bibliographie

Deligeorgopoulos, Efstathios (2018)
Evaluation of Proactive Secret Sharing for Long-Term Secure Storage.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Dietsch, Sascha Thorsten (2017)
Integration des gitterbasierten LARA-Verschlüsselungsverfahrens in JCA.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Demirel, Denise ; Krenn, Stephan ; Loruenser, Thomas ; Traverso, Giulia (2016)
Efficient Third Party Auditing for a Distributed Storage System.
Salzburg, Austria
Conference or Workshop Item, Bibliographie

Diedrich, Lennart ; Jattke, Patrick ; Murati, Lulzim ; Senker, Matthias ; Wiesmaier, Alexander (2016)
Comparison of Lightweight Stream Ciphers: MICKEY 2.0, WG-8, Grain and Trivium.
Report, Bibliographie

Dix, Isabella (2016)
Implementation of a Reputation System for CA Trust Management.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Dagdelen, Özgür ; Gajek, Sebastian ; Göpfert, Florian (2015)
Learning With Errors in the Exponent.
Seoul, Korea
Conference or Workshop Item, Bibliographie

Diedrich, Lennart ; Murati, Lulzim ; Wiesmaier, Alexander (2015)
Stream ciphers in the IoT: Grain and Trivium.
Report, Bibliographie

Demirel, Denise ; Lancrenon, Jean (2015)
How to Securely Prolong the Computational Bindingness of Pedersen Commitments.
Report, Bibliographie

Dogan, Ferit (2015)
Design and Implementation of Plug-ins for JCrypTool.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie

Ding, Jintai ; Petzoldt, Albrecht ; Wang, Lih-Chung (2014)
The Cubic Simple Matrix Encryption Scheme.
Waterloo, Canada
Conference or Workshop Item, Bibliographie

Dagdelen, Özgür ; Venturi, Daniele (2014)
A Multi-Party Protocol for Privacy-Preserving Cooperative Linear System of Equations.
Istanbul, Turkey
doi: 10.1007/978-3-319-21356-9_11
Conference or Workshop Item, Bibliographie

Dagdelen, Özgür ; Bansarkhani, Rachid El ; Göpfert, Florian ; Güneysu, Tim ; Oder, Tobias ; Pöppelmann, Thomas ; Sanchez, Ana Helena ; Schwabe, Peter (2014)
High-speed signatures from standard lattices.
Florianópolis, Brazil
Conference or Workshop Item, Bibliographie

Demirel, Denise (2014)
Universally Verifiable Poll-Site Voting Schemes Providing Everlasting Privacy.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication

Dagdelen, Özgür ; Venturi, Daniele (2014)
A Second Look at Fischlin’s Transformation.
Marrakech, Morocco
Conference or Workshop Item, Bibliographie

Dagdelen, Özgür ; Fischlin, Marc (2014)
Intercepting Tokens in Cryptographic Protocols: The Empire Strikes Back in the Clone Wars.
Honolulu HI USA
Conference or Workshop Item, Bibliographie

Demirel, Denise ; Henning, Maria ; Graaf, Jeroen van de ; Ryan, Peter Y. A. ; Buchmann, Johannes
eds.: Heather, James ; Schneider, Steve ; Teague, Vanessa (2013)
Prêt à Voter Providing Everlasting Privacy.
University of Surrey, Guildford, UK
Conference or Workshop Item, Bibliographie

Dagdelen, Özgür ; Fischlin, Marc ; Gagliardoni, Tommaso (2013)
The Fiat-Shamir Transformation in the Quantum World.
Bangalore, India
Conference or Workshop Item, Bibliographie

Demirel, Denise ; Henning, Maria (2012)
Legal Analysis of Privacy Weaknesses in Poll-Site eVoting Systems.
In: Jusletter IT - Die Zeitschrift für IT und Recht
Article, Bibliographie

Demirel, Denise ; Graaf, Jeroen van de ; Araújo, Roberto (2012)
Improving Helios with Everlasting Privacy Towards the Public.
Bellevue, WA
Conference or Workshop Item, Bibliographie

Demirel, Denise ; Henning, Maria ; Ryan, Peter Y. A. ; Schneider, Steve ; Volkamer, Melanie (2011)
Feasibility Analysis of Pret a Voter for German Federal Elections.
Tallinn, Estonia
doi: 10.1007/978-3-642-32747-6_10
Conference or Workshop Item, Bibliographie

Demirel, Denise ; Frankland, Richard ; Popovic, Darko ; Volkamer, Melanie
eds.: Parycek, Peter ; Kripp, Melanie J. ; Edelmann, Noella (2011)
Voting software to support election preparation, counting, and tallying.
Conference for E-Democracy and Open Government (CeDEM11). Krems, Austria (05.-06.05.2011)
Conference or Workshop Item, Bibliographie

Demirel, Denise (2010)
Effizientes Lösen linearer Gleichungssysteme über GF(2) mit GPUs.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Dagdelen, Özgür ; Schneider, Michael (2010)
Parallel Enumeration of Shortest Lattice Vectors.
Conference or Workshop Item, Bibliographie

Dahmen, Erik ; Krauß, Christoph
eds.: Garay, Christoph A. ; Miyaji, Atsuko ; Otsuka, Akira (2009)
Short Hash-Based Signatures for Wireless Sensor Networks.
Kanazawa, Japan
Conference or Workshop Item, Bibliographie

Deußer, Clemens ; Reubold, Jan (2009)
Design und Implementierung kryptographischer Funktionen und Protokolle des elektronischen Personalausweises.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Dahmen, Erik (2009)
Post-quantum signatures for today.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication

Dahmen, Erik ; Okeya, Katsuyuki ; Takagi, Tsuyoshi ; Vuillaume, Camille
eds.: Buchmann, Johannes ; Ding, Jintai (2008)
Digital Signatures out of Second-Preimage Resistant Hash Functions.
Cincinnati, USA
Conference or Workshop Item, Bibliographie

Döring, Martin (2008)
On the Theory and Practice of Quantum-Immune Cryptography.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication

Ding, Jintai ; Buchmann, Johannes ; Mohamed, Mohamed Saied Emam ; Mohamed, Wael Said Abd Elmageed ; Weinmann, Ralf-Philipp (2008)
MutantXL.
Conference or Workshop Item, Bibliographie

Dietrich, Christoph (2008)
Maximale Sicherheit im Identitymanagement bei optimaler Benutzbarkeit des Systems.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Detken, Kai-Oliver ; Gitz, Stephan ; Bartsch, Steffen ; Sethmann, Richard
ed.: Horster, Patrick (2008)
Trusted Network Connect -- {Sicherer Zugang ins Unternehmensnetz}.
Conference or Workshop Item, Bibliographie

Ding, Jintai ; Lindner, Richard (2007)
Identifying Ideal Lattices.
In: Cryptology ePrint Archive, 2007 (322)
Article, Bibliographie

Dahmen, Erik ; Okeya, Katsuyuki ; Schepers, Daniel (2007)
Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography.
doi: 10.1007/978-3-540-73458-1_19
Conference or Workshop Item, Bibliographie

Dahmen, Erik ; Okeya, Katsuyuki ; Takagi, Tsuyoshi (2007)
A New Upper Bound for the Minimal Density of Joint Representations in Elliptic Curve Cryptosystems.
In: >IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, Special Section on Discrete Mathematics and Its Applications, E90-A (5)
Article, Bibliographie

Drahavets, Maryia (2006)
Flexible Anbindung von Smartcards an eine Sicherheitsinfrastruktur.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Dahmen, Erik (2005)
Efficient Algorithms for Multi-Scalar Multiplications.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Dahmen, Erik ; Okeya, Katsuyuki ; Takagi, Tsuyoshi (2005)
Efficient Left-to-Right Multi-Exponentiations.
Report, Bibliographie

Dobre, Dan ; Mühleisen, Matthias (2003)
Using the Shared {VM} Jini Utility.
Other, Bibliographie

Dambruch, Jens (2001)
Framework zur flexiblen Formularverarbeitung im Rahmen von {FlexiTRUST} Formulare, Verarbeitungslogik und Ergebnisse.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie

Denny, Thomas (1997)
Lösen dünn besetzter Gleichungssysteme über endlichen Körpern.
Universität des Saarlandes
Ph.D. Thesis, Bibliographie

Denny, Thomas ; Müller, Volker (1996)
On the reduction of composed relations from the number field sieve.
Conference or Workshop Item, Bibliographie

Denny, Thomas ; Dodson, Bruce ; Lenstra, Arjen ; Manasse, Mark (1994)
On the Factorization of {RSA}-120.
doi: 10.1007/3-540-48329-2_15
Conference or Workshop Item, Bibliographie

Denny, Thomas (1993)
Faktorisieren mit dem Quadratischen Sieb.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie

Düllmann, Stephan (1991)
Ein Algorithmus zur Bestimmumg positiv definiter binaerer quadratischer Formen.
Universität des Saarlandes
Ph.D. Thesis, Bibliographie

Düllmann, Stephan (1988)
Ein neues Verfahren zum öffentlichen Schlüsselaustausch.
Other, Bibliographie

E

Erbenich, Vanessa (2016)
On the Efficiency of Lattice-Based Encryption.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Egert, Rolf (2013)
Lattice-based Signatures.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Errabih, Abdelhafid (2008)
Entwurf und Implementierung eines Clients zur Funktionalitäts{ü}berpr{ü}fung von Chipkarten - am Beispiel des Heilberufsausweises.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Ederov, Boris (2007)
Merkle Tree Traversal Techniques.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Engelbert, Daniela ; Overbeck, Raphael ; Schmidt, Arthur (2007)
A Summary of McEliece-Type SCryptosystems and their Security.
In: >Journal of Mathematical Cryptology, 1 (2)
Article, Bibliographie

Eckart, Marc (2006)
Verwaltung von Identitäten von {PKI} -Teilnehmern in der Registration Authority.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Ehli, Oliver (2002)
{ElGamal-Signaturen} mit elliptischen Kurven.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Ender, Christoph (2002)
Verwaltung eines verteilten Systems mit {Java} und Servlets.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie

Ernst, Markus ; Henhapl, Birgit ; Huss, Sorin ; Klupsch, Steffen (2002)
{FPGA} based Hardware Acceleration for Elliptic Curve Public Key Cryptosystems.
Other, Bibliographie

Ernst, Markus ; Henhapl, Birgit (2001)
High Performance {ECDSA} over F(2<sup>n</sup>) based on {Java} with Hardware Acceleration.
Report, Bibliographie

F

Fojtik, Roman (2016)
Salt Synchronization Service.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Fleisch, Gilbert (2016)
Towards policy checks on passwords via fully homomorphic encryption.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Faraon, Montathar ; Stenberg, Georg J. H. ; Budurushi, Jurlind ; Kaipainen, Mauri
eds.: Parycek, Peter ; Sachs, Michael ; Skoric, Marko (2014)
Positive but skeptical - A study of attitudes towards Internet voting in Sweden.
Hong Kong
Conference or Workshop Item, Bibliographie

Franke, Daniel (2014)
Risk Simulations for the Web PKI.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Fontein, Felix ; Schneider, Michael ; Wagner, Urs (2013)
A Polynomial Time Version of LLL With Deep Insertions.
Bergen (Norway)
Conference or Workshop Item, Bibliographie

Fehr, Victoria (2012)
Sophisticated Public-Key Encryption.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Frankland, Richard ; Demirel, Denise ; Budurushi, Jurlind ; Volkamer, Melanie (2011)
Side-channels and eVoting machine security: Identifying vulnerabilities and defining requirements.
Trento, Italy
doi: 10.1109/REVOTE.2011.6045914
Conference or Workshop Item, Bibliographie

Fischer-Hübner, Simone ; Grimm, Rüdiger ; Lo Iacono, Luigi ; Möller, Sebastian ; Müller, Günter ; Volkamer, Melanie (2011)
Gebrauchstaugliche Informationssicherheit.
In: Die Zeitschrift für Informationssicherheit - Usable Security and Privacy
Article, Bibliographie

Fleck, Matthias (2006)
Zur Benutzbarkeit von {PKI}-Anwendungen im praktischen Einsatz.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Fritsch, Sebastian (2006)
Towards Secure Electronic Workflows Examples of Applied {PKI}.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Frommer, J. ; Wiesmaier, Alexander ; Araújo, Roberto ; Lippert, Marcus
eds.: Zhou, Jianying ; Yung, Moti ; Bao, Feng (2006)
On Firewalls and Tunneling.
Singapore
Conference or Workshop Item, Bibliographie

Fan, Rong (2005)
On the Efficiency Analysis of {wNAF} and {wMOF}.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Feldgen, Lutz (2002)
Analyse von Enterprise Application Servern und Datenbank Management Systemen für {FlexiTRUST}.
Other, Bibliographie

Feldgen, Lutz ; Winkler, Markus (2002)
Design und Implementierung der {FlexiTRUST-CA} als {Java} Enterprise Application.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie

Fischer, Mike (2002)
Angriff auf ein {PIN/TAN}-gestütztes Online-Banking-Verfahren.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie

Franke, Sylvain (2002)
Deanymisierbare elektronische Zahlungsmittel - ein Verleich zweier Implementationen.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie

Fertig, Thomas (2000)
Digitale Signaturen mit elliptischen Kurven über GF(2<sup>n</sup>).
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie

Fuhrmann, Arnulph (2000)
Verteilte effiziente RSA-Schlüsselerzeugung in JAVA.
Other, Bibliographie

Fischer, Johannes (1996)
Integration von {Ebene-1-Softwarefehlertoleranz} in {LiPS}.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie

G

Gagliardoni, Tommaso ; Krämer, Juliane ; Struck, Patrick (2021)
Quantum Indistinguishability for Public Key Encryption.
PQCrypto 2021 The Twelfth International Conference on Post-Quantum Cryptography. virtual Conference (July 20-22, 2021)
Conference or Workshop Item, Bibliographie

Graf, Holger ; Schwarz, Reinhard ; Becker, Tilman ; Mück, Jürgen
eds.: Goldstein, Denise ; Schneider, Tidarat ; Braun, Johannes (2019)
SCIKE Innovationsbericht - Innovation durch Internationalisierung.
Report, Bibliographie

Geihs, Matthias ; Nikiforov, Oleg ; Demirel, Denise ; Sauer, Alexander ; Butin, Denis ; Günther, Felix ; Alber, Gernot ; Walther, Thomas ; Buchmann, Johannes (2019)
The Status of Quantum-Based Long-Term Secure Communication over the Internet.
In: IEEE Transactions on Sustainable Computing
doi: 10.1109/TSUSC.2019.2913948
Article, Bibliographie

Geihs, Matthias ; Schabhüser, Lucas ; Buchmann, Johannes (2019)
Efficient Proactive Secret Sharing for Large Data via Concise Vector Commitments.
International Conference on Codes, Cryptology, and Information Security (C2SI) 2019. Rabat, Morocco (April 22 - 24, 2019)
Conference or Workshop Item, Bibliographie

Geihs, Matthias ; Buchmann, Johannes (2018)
ELSA: Efficient Long-Term Secure Storage of Large Datasets.
21st Annual International Conference on Information Security and Cryptology. Seoul, Korean (28.-30.11.2018)
doi: 10.1007/978-3-030-12146-4_17
Conference or Workshop Item, Bibliographie

Guski, Florian (2018)
Simulation of the Quantum Hybrid Attack in Q#.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Geihs, Matthias ; Karvelas, Nikolaos ; Katzenbeisser, Stefan ; Buchmann, Johannes (2018)
PROPYLA: Privacy Preserving Long-Term Secure Storage.
The Sixth International Workshop on Security in Cloud Computing (SCC).
Conference or Workshop Item, Bibliographie

Geihs, Matthias (2018)
Long-Term Protection of Integrity and Confidentiality – Security Foundations and System Constructions.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication

Göpfert, Florian ; Vredendaal, Christine van ; Wunderer, Thomas (2017)
A Hybrid Lattice Basis Reduction and Quantum Search Attack on LWE.
Conference or Workshop Item, Bibliographie

Geihs, Matthias ; Demirel, Denise ; Buchmann, Johannes (2016)
A security analysis of techniques for long-term integrity protection.
Auckland, New Zealand
Conference or Workshop Item, Bibliographie

Gerber, Nina ; McDermott, Ronja ; Volkamer, Melanie ; Vogt, Joachim (2016)
Understanding information security compliance - Why goal setting and rewards might be a bad idea.
Frankfurt, Germany
Conference or Workshop Item, Bibliographie

Göpfert, Florian (2016)
Securely Instantiating Cryptographic Schemes Based on the Learning with Errors Assumption.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication

Gagliotti Vigil, Martín Augusto (2015)
Trustworthy and Efficient Protection Schemes for Digital Archiving.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication

Gutmann, Andreas ; Renaud, Karen ; Volkamer, Melanie (2015)
Nudging Bank Account Holders Towards More Secure PIN Management.
doi: 10.20533/jitst.2046.3723.2015.0049
Conference or Workshop Item, Bibliographie

Ganji, Fatemeh ; Krämer, Juliane ; Seifert, Jean-Pierre ; Tajik, Shahin (2015)
Lattice Basis Reduction Attack against Physically Unclonable Functions.
Denver, Colorado, US
Conference or Workshop Item, Bibliographie

Geihs, Matthias ; Demirel, Denise ; Buchmann, Johannes (2015)
On the Security of Long-lived Archiving Systems based on the Evidence Record Syntax.
Mohammed V University, Rabat, Morocco
Conference or Workshop Item, Bibliographie

Geihs, Matthias ; Cabarcas, Daniel
eds.: Aranha, Diego F. ; Menezes, Alfred (2014)
Efficient Integer Encoding for Homomorphic Encryption via Ring Isomorphisms.
Florianópolis, Brazil
Conference or Workshop Item, Bibliographie

Gutmann, Andreas ; Matsuura, Kanta (2013)
The use of linguistics in cryptography and its application to improve the HB protocol.
Computer Security Symposium 2013. Kagawa, Japan (21-23 October, 2013)
Conference or Workshop Item, Bibliographie

Gleser, Michael (2013)
Policy-basierter Vergleich von Zertifizierungspraktiken innerhalb der Web-PKI.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Geihs, Matthias (2013)
Evaluation of homomorphic encryption for machine learning.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Guo, Sheng (2013)
Integration von vorwärtssicheren Signaturverfahren in die CA Infrastruktur.
Report, Bibliographie

Göttert, Norman ; Feller, Thomas ; Schneider, Michael ; Huss, Sorin ; Buchmann, Johannes
eds.: Prouff, Emmanuel ; Schaumont, Patrick (2012)
On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes.
Leuven, Belgium
Conference or Workshop Item, Bibliographie

Göttert, Norman (2012)
Hardware and Software Implementation of an LWE-Based Encryption Scheme.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Gharadaghy, Rojan (2010)
Funktion und Realisierung der Telematikinfrastruktur für die elektronische Gesundheitskarte unter besonderer Betrachtung der Public-Key-Infrastruktur.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Gharadaghy, Rojan ; Volkamer, Melanie (2010)
Verifiability in Electronic Voting - Explanations for Non Security Experts.
Conference or Workshop Item, Bibliographie

Grimm, Rüdiger ; Hupf, Katharina ; Volkamer, Melanie
eds.: Krimmer, Robert ; Grimm, Rüdiger (2010)
A Formal IT-Security Model for the Correction and Abort Requirement of Electronic Voting.
Conference or Workshop Item, Bibliographie

Gaber, Michael (2009)
Entwurf und Implementierung eines Plug-Ins für JCrypTool - RSA, DSA und ElGamal Visualisierungen.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Grimm, Rüdiger ; Volkamer, Melanie (2008)
Development of a Formal IT-Security Model for Remote Electronic Voting Systems.
Conference or Workshop Item, Bibliographie

Gitter, Rotraud ; Langer, Lucie ; Okunick, Susanne ; Opitz-Talidou, Zoi (2008)
Long-term retention in e-voting -- Legal requirements and technical implementation.
Conference or Workshop Item, Bibliographie

Ghiglieri, Marco (2007)
Flexible - Eine erweiterbare {GUI} für den FlexiProvider (Frontend).
Technische Universität Darmstadt
Master Thesis, Bibliographie

Grimm, Rüdiger ; Volkamer, Melanie (2007)
Robustere Anforderungen für Online-Wahlen aufbauend auf dem Schutzprofil 'Zentrale Auforderungen für Online-Wahlen'.
Report, Bibliographie

Guaadaoui, Abdellah (2006)
Sicherheitsdefinitionen für Challenge-Response-Identifikationsverfahren.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Grimm, Rüdiger ; Volkamer, Melanie
ed.: Krimmer, Robert (2006)
Multiple Cast in Online Voting - Analyzing Chances.
Conference or Workshop Item, Bibliographie

Grimm, Rüdiger ; Krimmer, Robert ; Meißner, Nils ; Reinhard, Kai ; Volkamer, Melanie ; Weinand, Marcel
eds.: Krimmer, Robert ; LNI, GI (2006)
Security Requirements for Non-political Internet Voting.
In: Electronic Voting (EVOTE) 2006
Book Section, Bibliographie

Ginkel, Thilo-Alexander (2004)
Entwurf und Implementierung eines Authentifikations-Proxys für das World Wide Web.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Grahl, Alexander ; Kiss, Tekla (2004)
Entwurf und Implementierung einer {Web-Test} Anwendung und Integrierung in die Eclipse {IDE}.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Groß, Clemens (2000)
Ein Verschlüsselungsprotokoll auf Basis von reellquadratischen Zahlkörpern.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie

Galbraith, Steven ; Paulus, Sachar ; Smart, Nigel (1998)
Arithmetic on Superelliptic Curves.
Report, Bibliographie

Gross, Olaf (1994)
Der Block Lanczos Algorithmus über {$GF(2)$}.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie

Ganzinger, Harald ; Paul, Wolfgang ; Buchmann, Johannes
eds.: Ganzinger, Harald ; Paul, Wolfgang ; Buchmann, Johannes (1992)
Informatik - Festschrift zum 60. Geburtstag von Günter Hotz.
Book, Bibliographie

H

Horsch, Moritz (2018)
Generating and Managing Secure Passwords for Online Accounts.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication

Horsch, Moritz ; Braun, Johannes ; Buchmann, Johannes (2017)
Password Assistance.
Karlstad, Sweden
Conference or Workshop Item, Bibliographie

Horsch, Moritz ; Braun, Johannes ; Metz, Dominique ; Buchmann, Johannes (2017)
Update-tolerant and Revocable Password Backup.
Auckland, New Zealand
Conference or Workshop Item, Bibliographie

Holzer, Patrick (2017)
Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor p^α q^β.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Horsch, Moritz ; Schlipf, Mario ; Haas, Stefan ; Braun, Johannes ; Buchmann, Johannes (2016)
Password Policy Markup Language.
Conference or Workshop Item, Bibliographie

Horsch, Moritz ; Schlipf, Mario ; Braun, Johannes ; Buchmann, Johannes (2016)
Password Requirements Markup Language.
Melbourne, Australia
Conference or Workshop Item, Bibliographie

Horsch, Moritz ; Hülsing, Andreas ; Buchmann, Johannes (2015)
PALPAS - PAsswordLess PAssword Synchronization.
Université Paul Sabatier, Toulouse, France
Conference or Workshop Item, Bibliographie

Horsch, Moritz ; Tuengerthal, Max ; Wich, Tobias (2014)
SAML Privacy-Enhancing Profile.
Stuttgart, Germany
Conference or Workshop Item, Bibliographie

Henning, Maria ; Budurushi, Jurlind ; Volkamer, Melanie (2014)
Öffentlichkeitsgrundsatz und Stimmzettelbelege.
Report, Bibliographie

Horsch, Moritz ; Derler, David ; Rath, Christof ; Haase, Hans-Martin ; Wich, Tobias (2014)
Open Source für europäische Signaturen.
In: >Datenschutz und Datensicherheit, 38 (4)
doi: 10.1007/s11623-014-0098-5
Article, Bibliographie

Henning, Maria ; Budurushi, Jurlind ; Volkamer, Melanie (2014)
Elektronsiche Wahlen durch Stimmzettelbelege? Untersuchung möglicher Umsetzungen des Öffentlichkeitsgrundsatzes bei elektronischen Wahlen.
In: MultiMedia und Recht (MMR)
Article, Bibliographie

Hühnlein, Detlef ; Schwenk, Jörg ; Wich, Tobias ; Mladenov, Vladislav ; Feldmann, Florian ; Schmölz, Johannes ; Brügger, Bud ; Horsch, Moritz (2013)
Options for integrating eID and SAML.
Berlin, Germany
doi: 10.1145/2517881.2517892
Conference or Workshop Item, Bibliographie

Hülsing, Andreas (2013)
Practical Forward Secure Signatures using Minimal Security Assumptions.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication

Hamann, Tobias (2013)
The BKZ Simulation Algorithm.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Hülsing, Andreas ; Braun, Johannes (2013)
Langzeitsichere Signaturen durch den Einsatz hashbasierter Signaturverfahren.
Bonn
Conference or Workshop Item, Bibliographie

Horsch, Moritz ; Hühnlein, Detlef ; Breitenstrom, Christian ; Wieland, Thomas ; Wiesmaier, Alexander ; Biallowons, Benedikt ; Petrautzki, Dirk ; Potzernheim, Simon ; Schmölz, Johannes ; Wesner, Alexander ; Wich, Tobias (2013)
Die Open eCard App für mehr Transparenz, Vertrauen und Benutzerfreundlichkeit beim elektronischen Identitätsnachweis.
Conference or Workshop Item, Bibliographie

Hülsing, Andreas ; Rausch, L. ; Buchmann, Johannes (2013)
Optimal parameters for XMSS-MT.
Conference or Workshop Item, Bibliographie

Horsch, Moritz ; Hühnlein, Detlef ; Lehmann, Anja ; Schmölz, Johannes ; Wich, Tobias (2013)
Authentisierung mit der Open eCard App.
In: >Datenschutz und Datensicherheit, 37 (8)
doi: 10.1007/s11623-013-0208-9
Article, Bibliographie

Hülsing, Andreas (2013)
WOTS+ - Shorter Signatures for Hash-Based Signature Schemes.
Cairo, Egypt
Conference or Workshop Item, Bibliographie

Hülsing, Andreas ; Rausch, L. ; Buchmann, Johannes (2013)
Optimal Parameters for XMSS^MT.
In: MoCrySEn 2013
Book Section, Bibliographie

Hornschuch, Marian (2012)
Multivariate-based identification and signature schemes with additional properties.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Horsch, Moritz ; Braun, Johannes ; Wiesmaier, Alexander (2012)
Decoupling Authentication from the Usage of Services.
Report, Bibliographie

Hülsing, Andreas ; Busold, Christoph ; Buchmann, Johannes
eds.: Knudsen, Lars ; Wu, Huapeng (2012)
Forward Secure Signatures on Smart Cards.
Windsor, Canada
doi: 10.1007/978-3-642-35999-6_5
Conference or Workshop Item, Bibliographie

Hülsing, Andreas ; Petzoldt, Albrecht ; Schneider, Michael ; Yousfi Alaoui, Sidi Mohamed el
ed.: Waldmann, Ulrich (2012)
Post-Quantum Signaturverfahren Heute.
Conference or Workshop Item, Bibliographie

Hühnlein, Detlef ; Petrautzki, Dirk ; Schmölz, Johannes ; Wich, Tobias ; Horsch, Moritz ; Wieland, Thomas ; Eichholz, Jan ; Wiesmaier, Alexander ; Braun, Johannes ; Feldmann, Florian ; Potzernheim, Simon ; Schwenk, Jörg ; Kahlo, Christian ; Kühne, Andreas ; Veit, Heiko (2012)
On the design and implementation of the Open eCard App.
Darmstadt
Conference or Workshop Item, Bibliographie

Horsch, Moritz ; Braun, Johannes ; Wiesmaier, Alexander ; Schaaf, Joachim ; Baumöller, Claas (2012)
Verteilte Dienstnutzung mit dem neuen Personalausweis.
Conference or Workshop Item, Bibliographie

Henning, Maria ; Demirel, Denise ; Volkamer, Melanie (2012)
Öffentlichkeit vs. Verifizierbarkeit – Inwieweit erfüllt mathematische Verifizierbarkeit den Grundsatz der Öffentlichkeit der Wahl.
Salzburg, Austria
Conference or Workshop Item, Bibliographie

Horsch, Moritz ; Braun, Johannes ; Wiesmaier, Alexander (2011)
Mobile eID application for the German identity card.
Report, Bibliographie

Hoffmann, Gerhard (2011)
Implementation of McEliece using quasi-dyadic Goppa codes.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Horsch, Moritz ; Stopczynski, Martin (2011)
The German eCard-Strategy.
Report, Bibliographie

Horsch, Moritz (2011)
Mobile Authentisierung mit dem neuen Personalausweis (MONA).
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Hermans, Jens ; Schneider, Michael ; Buchmann, Johannes ; Vercauteren, Frederik ; Preneel, Bart
eds.: Bernstein, Daniel ; Lange, Tanja (2010)
Parallel Shortest Lattice Vector Enumeration on Graphics Cards.
Stellenbpsch, South Africa
Conference or Workshop Item, Bibliographie

Heuser, Annelie (2010)
Chess reduction - Using Artificial Intelligence for Lattice Reduction.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Hartmann, Frank (2010)
Probability Distribution of Gram-Schmidt Coefficients after LLL-Reduction.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Hühnlein, Detlef ; Korte, Ulrike ; Langer, Lucie ; Wiesmaier, Alexander (2009)
A Comprehensive Reference Architecture for Trustworthy Long-Term Archiving of Sensitive Data.
doi: 10.1109/NTMS.2009.5384830
Conference or Workshop Item, Bibliographie

Horsch, Moritz (2009)
MobilePACE - Password Authenticated Connection Establishment implementation on mobile devices.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Huthmann, Jan (2007)
Datengesteuerte Initialisierung komplexer Softwaresysteme als Voraussetzung zentralisierter Konfiguration.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Helbach, Jörg ; Krimmer, Robert ; Meletiadou, Anastasia ; Meissner, Nils ; Volkamer, Melanie (2007)
Zukunft von Online-Wahlen - Aktuelle rechtliche, politische, soziale und technisch-organisatorische Fragen.
In: Datenschutz und Datensicherheit, 31 (6)
Article, Bibliographie

Hühnlein, Detlef (2005)
Kryptosysteme auf Basis imaginärquadratischer Nichtmaximalordnungen.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication

Homann, Frank (2004)
Flexibles Datenbankmodell für {TrustCenter}.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Hagedorn, Axel (2003)
{IEEE 802.11i} Sicherheit in drahtlosen lokalen Netzen.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie

Hähnle, Jochen (2003)
Design und Entwicklung eines Testframeworks für {JLiPSD}.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie

Hechler, Jochen (2003)
Primzahlnachweis mit Hilfe elliptischer Kurven.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie

Henhapl, Birgit (2003)
Zur Effizienz von elliptische Kurven Kryptographie.
Technische Universität Darmstadt
Ph.D. Thesis, Bibliographie

Hölzer, Christina (2003)
Quantenalgorithmus für das Hauptidealproblem.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie

Heinemann, Andreas ; Straub, Tobias (2003)
Mund-zu-Mund-Propaganda mit Bonussystem in mobilen Ad-Hoc-Netzen.
Conference or Workshop Item, Bibliographie

Hamdy, Safuat (2002)
Über die Sicherheit und Effizienz kryptographischer Verfahren mit Klassengruppen imaginär-quadratischer Zahlkörper.
Technische Universität Darmstadt
Ph.D. Thesis, Bibliographie

Hammen, Ralf (2002)
Integrationskonzept für Trustcenter-Software.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie

Henge-Ernst, Jürgen ; Linke, Sebastian (2002)
Anbindung einer Personalisierungssstrasse an das {FlexiTRUST}-System.
Other, Bibliographie

Henhapl, Birgit (2002)
Platform Independant Elliptic Curve Cryptography over Fp.
Report, Bibliographie

Hornung, Heiko (2002)
Ein Framework zur Automatisierung von Tests formularbasierter Web-Anwendungen.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie

Hühnlein, Detlef (2001)
Faster Generation of NICE-Schnorr-Type Signatures.
San Francisco, CA, USA
Conference or Workshop Item, Bibliographie

Hartmann, Michael ; Maseberg, Sönke (2001)
Smart Cards for the {FlexiPKI} Environment.
Report, Bibliographie

Hamdy, Safuat ; Möller, Bodo (2000)
Security of Cryptosystems Based on Class Groups of Imaginary Quadratic Orders.
Kyoto, Japan
Conference or Workshop Item, Bibliographie

Hühnlein, Detlef (2000)
Efficient Implementation of Cryptosystems Based on Non-maximal Imaginary Quadratic Orders.
Kingston, Ontario, Canada
Conference or Workshop Item, Bibliographie

Hühnlein, Detlef ; Merkle, Johannes (2000)
An Efficient NICE-Schnorr-Type Signature Scheme.
Melbourne, Victoria, Australia
Conference or Workshop Item, Bibliographie

Hamdy, Safuat ; Möller, Bodo (2000)
Security of Crytosystems Based on Class Groups of Imaginary Quadratic Orders.
Report, Bibliographie

Hartmann, Michael ; Maseberg, Sönke (2000)
Fail-Safe-Konzept für {FlexiPKI}.
Report, Bibliographie

Hühnlein, Detlef (2000)
Quadratic orders for {NESSIE} - Overview and parameter sizes of three public key families.
Report, Bibliographie

Hühnlein, Detlef (2000)
Faster Generation of {NICE}-{Schnorr}-type Signatures.
Report, Bibliographie

Hühnlein, Detlef ; Merkle, Johannes (1999)
Secure and Cost Efficient Electronic Stamps.
Düsseldorf, Germany
Conference or Workshop Item, Bibliographie

Hühnlein, Detlef ; Takagi, Tsuyoshi (1999)
Reducing Logarithms in Totally Non-maximal Imaginary Quadratic Orders to Logarithms in Finite Fields.
Singapore
Conference or Workshop Item, Bibliographie

Hartmann, Michael ; Paulus, Sachar ; Takagi, Tsuyoshi (1999)
NICE - New Ideal Coset Encryption.
Worcester, MA, USA
Conference or Workshop Item, Bibliographie

Hahn, Tobias ; Meyer, Andreas ; Neis, Stefan ; Pfahler, Thomas (1999)
Implementing Cryptographic Protocols Based on Algebraic Number Fields.
Report, Bibliographie

Hamdy, Safuat (1999)
Elliptische Kurven - Neue Wege in der Public-Key-Kryptographie.
Report, Bibliographie

Hamdy, Safuat ; Maurer, Markus (1999)
Feige-Fiat-Shamir Identification Based on Real Quadratic Fields.
Report, Bibliographie

Hartmann, Michael (1999)
Implementierung der Entschlüsselung des {NICE}-Kryptosystems auf einer Smartcard.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie

Hartmann, Michael ; Paulus, Sachar ; Takagi, Tsuyoshi (1999)
{NICE} - New Ideal Coset Encryption.
Report, Bibliographie

Henhapl, Birgit (1999)
Digitales Signieren mit Elliptischen Kurven über Primkörpern großer Charakteristik.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie

Hühnlein, Detlef (1999)
A survey of crytosystems based on imaginary quadratic orders.
Report, Bibliographie

Hühnlein, Detlef (1999)
Elliptische Kurven in {HBCI} - ein Backup zu {RSA}.
Report, Bibliographie

Hühnlein, Detlef (1999)
Efficient implementation of cryptosystems based on non-maximal imaginary quadratic orders.
Report, Bibliographie

Hühnlein, Detlef ; Merkle, Johannes (1999)
Secure and cost efficient electronic stamps.
Report, Bibliographie

Hühnlein, Detlef ; Merkle, Johannes (1999)
An efficient {NICE}-{Schnorr}-type signature.
Report, Bibliographie

Hühnlein, Detlef ; Meyer, Andreas ; Takagi, Tsuyoshi (1999)
Rabin and {RSA} analogues based on non-maximal imaginary quadratic orders.
Report, Bibliographie

Hühnlein, Detlef ; Takagi, Tsuyoshi (1999)
Reducing logarithms in totally non-maximal imaginary quadratic orders to logarithms in finite fields.
Report, Bibliographie

Hühnlein, Detlef ; Meyer, Andreas ; Takagi, Tsuyoshi (1998)
Rabin and {RSA} analogues based on non-maximal imaginary quadratic orders.
Seoul, Korea
Conference or Workshop Item, Bibliographie

Hühnlein, Detlef ; Jacobson, Michael J. ; Paulus, Sachar ; Takagi, Tsuyoshi (1998)
A Cryptosystem Based on Non-maximal Imaginary Quadratic Orders with Fast Decryption.
Espoo, Finland
Conference or Workshop Item, Bibliographie

Haible, Bruno ; Papanikolaou, Thomas (1998)
Fast Multiprecision Evaluation of Series of Rational Numbers.
Portland, Oregon, USA
Conference or Workshop Item, Bibliographie

Haible, Bruno ; Papanikolaou, Thomas (1997)
Fast multiprecision evaluation of series of rational numbers.
Report, Bibliographie

Hühnlein, Detlef (1997)
Credential Management and Secure Single Login for {SPKM}.
Report, Bibliographie

Hühnlein, Detlef ; Jacobson, Michael J. ; Paulus, Sachar (1997)
A cryptosystem based on non-maximal imaginary quadratic orders with fast decryption.
Report, Bibliographie

Hiber, Carmen (1995)
Eine Untersuchung der verbesserten Buchberger Algorithmen zur Gröbnerbasen-Konstruktion.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie

Handl, Ralf (1994)
Sicherheit kryptographischer Protokolle.
Universität des Saarlandes
Ph.D. Thesis, Bibliographie

Hürter, Michael (1994)
Modifikationen zum Number Field Sieve.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie

I

Inel, Miray (2014)
Entwurf und Implementierung von Plug-ins für JCrypTool.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Ivanova, Vanya (2010)
Lattice Basis Reduction in Infinity Norm.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Inel, Oryal (2009)
Entwurf und Implementierung von Plug-ins für JCrypTool-Visualisierung von kryptographischen Grundlagen.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Izu, Tetsuya ; Möller, Bodo ; Takagi, Tsuyoshi (2002)
Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks.
Hyderabad, India
Conference or Workshop Item, Bibliographie

Izu, Tetsuya ; Takagi, Tsuyoshi (2002)
On the Security of Brier-Joye{'}s Addition Formula for Weierstrass-form Elliptic Curves.
Report, Bibliographie

J

Jattke, Patrick ; Senker, Matthias ; Wiesmaier, Alexander (2016)
Comparison of two Lightweight Stream Ciphers: MICKEY 2.0 & WG-8.
Report, Bibliographie

Jiang, Biqiang (2010)
Design and Implementation of Plug-ins for JCrypTool - Visualization of the Cryptographic SPA and DPA Attacks.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Jonker, Hugo ; Volkamer, Melanie
eds.: Alkassar, Ammar ; Volkamer, Melanie (2007)
Compliance of RIES to the proposed e-voting protection profile.
Bochum, Germany
Conference or Workshop Item, Bibliographie

Joye, Marc ; Quisquater, Jean-Jacques ; Takagi, Tsuyoshi (2001)
How to Choose Secret Parameters for {RSA}-Type Cryptosystems over Elliptic Curves.
In: >Designs, Codes and Cryptography, 23 (3)
Article, Bibliographie

Jacobson, Michael J. (1999)
Subexponential class group computation in quadratic orders.
Technische Universität Darmstadt
Ph.D. Thesis, Bibliographie

Jacobson, Michael J. (1999)
Applying sieving to the computation of quadratic class groups.
In: >Mathematics of Computation, 68 (226)
Article, Bibliographie

Joye, Marc ; Quisquater, Jean-Jacques ; Takagi, Tsuyoshi (1997)
How to Choose Secret Parameters for {RSA}-Type Cryptosystems over Elliptic Curves.
Report, Bibliographie

Jacobson, Michael J. (1997)
Applying Sieving to the Computation of Quadratic Class Groups.
Report, Bibliographie

K

Krämer, Juliane ; Struck, Patrick (2020)
Encryption Schemes using Random Oracles: from Classical to Post-Quantum Security.
11th International Conference on Post-Quantum Cryptography (PQCrypto 2020). virtual Conference (21.-23.09.2020)
Conference or Workshop Item, Bibliographie

Krämer, Juliane ; Struck, Patrick (2020)
Leakage-Resilient Authenticated Encryption from Leakage-Resilient Pseudorandom Functions.
11th International Workshop on Constructive Side-Channel Analysis and Secure Design(COSADE 2020). Lugano, Switzerland (05.-07.10.2020)
Conference or Workshop Item, Bibliographie

Krämer, Juliane ; Struck, Patrick (2020)
Security of Public Key Encryption against Resetting Attacks.
21st International Conference on Cryptology in India (Indocrypt 2020). virtual Conference (13.-16.12.)
Conference or Workshop Item, Bibliographie

Krämer, Juliane ; Marzougui, Soundes (2019)
Post-Quantum Cryptography in Embedded Systems.
14th International Conference on Availability, Reliability and Security. Canterbury, United Kingdom (26.-29.08.2019)
doi: 10.1145/3339252.3341475
Conference or Workshop Item, Bibliographie

Krämer, Juliane (2019)
Post-Quantum Cryptography and its Application to the IoT.
In: Informatik Spektrum, 42 (5)
doi: 10.1007/s00287-019-01200-2
Article, Bibliographie

Krämer, Juliane ; Loiero, Mirjam (2019)
Fault Attacks on UOV and Rainbow.
10th International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2019). Darmstadt, Germany (03.-05.04.)
Conference or Workshop Item, Bibliographie

Kannwischer, Matthias ; Genêt, Aymeric ; Butin, Denis ; Krämer, Juliane ; Buchmann, Johannes (2018)
Differential Power Analysis of XMSS and SPHINCS.
9th International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2018). Singapore (23.-24.04.)
doi: 10.1007/978-3-319-89641-0_10
Conference or Workshop Item, Bibliographie

Krüger, Stefan ; Nadi, Sarah ; Reif, Michael ; Ali, Karim ; Mezini, Mira ; Bodden, Eric ; Göpfert, Florian ; Günther, Felix ; Weinert, Christian ; Demmler, Daniel ; Kamath, Ram (2017)
CogniCrypt: Supporting Developers in using Cryptography.
Piscataway, NJ, USA
doi: 10.1109/ASE.2017.8115707
Conference or Workshop Item, Bibliographie

Kannwischer, Matthias (2017)
Physical Attack Vulnerability of Hash-Based Signature Schemes.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Kulyk, Oksana ; Marky, Karola ; Neumann, Stephan ; Volkamer, Melanie (2016)
Introducing Proxy Voting to Helios.
Salzburg
doi: 10.1109/ARES.2016.38
Conference or Workshop Item, Bibliographie

Klir, Thomas (2016)
Design and Implementation of an Archiving System Providing Long-Term Integrity and Long-Term Confidentiality.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Kunz, Alexandra ; Volkamer, Melanie ; Stockhardt, Simon ; Palberg, Sven ; Lottermann, Tessa ; Piegert, Eric (2016)
NoPhish: Evaluation of a web application that teaches people being aware of phishing attacks.
Bonn, Germany
Conference or Workshop Item, Bibliographie

Kulyk, Oksana ; Neumann, Stephan ; Marky, Karola ; Budurushi, Jurlind ; Volkamer, Melanie (2016)
Coercion-resistant Proxy Voting.
Ghent, Belgium
Conference or Workshop Item, Bibliographie

Kulyk, Oksana ; Volkamer, Melanie (2016)
Efficiency Comparison of Various Approaches in E-Voting Protocols.
Barbados
Conference or Workshop Item, Bibliographie

Kulyk, Oksana ; Gerber, Paul ; Reinheimer, Benjamin ; Renaud, Karen ; Volkamer, Melanie (2016)
Encouraging Privacy-Aware Smartphone App Installation: What Would the Technically-Adept Do.
San Diego, California
Conference or Workshop Item, Bibliographie

Krämer, Juliane ; Kiss, Ágnes ; Stüber, Anke (2015)
On the Optimality of Differential Fault Analyses on CLEFIA.
doi: 10.1007/978-3-319-32859-1_15
Conference or Workshop Item, Bibliographie

Kulyk, Oksana ; Teague, Vanessa ; Volkamer, Melanie
eds.: Haenni, Rolf ; Koenig, Reto ; Wikström, Douglas (2015)
Extending Helios Towards Private Eligibility Verifiability.
Bern, Switzerland
Conference or Workshop Item, Bibliographie

Kulyk, Oksana ; Neumann, Stephan ; Budurushi, Jurlind ; Volkamer, Melanie ; Haenni, Rolf ; Koenig, Reto ; Bergen, Philemon von (2015)
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.
Toulouse, France
doi: 10.1109/ARES.2015.75
Conference or Workshop Item, Bibliographie

Kußmaul, Tobias ; Löffler, Johannes ; Wiesmaier, Alexander (2015)
Block ciphers PRESENT and SEA in comparison.
Report, Bibliographie

Kulyk, Oksana ; Neumann, Stephan ; Budurushi, Jurlind ; Volkamer, Melanie ; Haenni, Rolf ; Koenig, Reto ; Bergen, Philemon von (2015)
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.
In: Cryptology ePrint Archive, 2015 (558)
Article, Bibliographie

Kulyk, Oksana ; Feier, Christian ; Köster, Thorben (2014)
Electronic Voting with Fully Distributed Trust and Maximized Flexibility Regarding Ballot Design.
Lochau
doi: 10.1109/EVOTE.2014.7001142
Conference or Workshop Item, Bibliographie

Klos, Christian (2013)
Design and deployment of a public key infrastructure.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Kreutzer, Michael ; Waidner, Michael ; Buchmann, Johannes (2012)
IT-Sicherheitsforschung in Darmstadt - von den Grundlagen bis zur Anwendung.
In: Praxis der Informationsverarbeitung und Kommunikation, 35 (4)
Article, Bibliographie

Kelbert, Florian ; Shirazi, Fatemeh ; Simo, Hervais ; Wüchner, Tobias ; Buchmann, Johannes ; Pretschner, Alexander ; Waidner, Michael
ed.: Buchmann, Johannes (2012)
State of Online Privacy: A Technical Perspective.
In: Internet Privacy. Eine multidisziplinäre Bestandsaufnahme/ A multidisciplinary analysis (acatech STUDIE)
Book Section, Bibliographie

Kiefer, Franziskus ; Wiesmaier, Alexander ; Fritz, Christian (2012)
Practical Security in E-Mail Applications.
Las Vegas, USA
Conference or Workshop Item, Bibliographie

Kauer, Michaela ; Pfeiffer, Thomas ; Volkamer, Melanie ; Theuerling, Heike ; Bruder, Ralph
eds.: Suri, Neeraj ; Waidner, Michael (2012)
It is not about the design – it is about the content! Making warnings more efficient by communicating risks appropriately.
Sicherheit 2012. Sicherheit, Schutz und Zuverlässigkeit . Beiträge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI). Darmstadt, Germany (7. - 9. März 2012)
Conference or Workshop Item, Bibliographie

Kauer, Michaela ; Kiesel, Florian ; Ueberschaer, Felix ; Volkamer, Melanie ; Bruder, Ralph
eds.: Jähnke, Jochen ; Mühlen, Nicolas von zur ; Rechert, Klaus ; Suchodoletz, Dirk von ; Max-Planck Institut für ausländisches und internationales Strafrecht (2012)
The Influence of trustworthiness of website layout on security perception of websites.
In: Current Issues in IT Security 2012 Schriftenreihe des Max-Planck-Instituts für ausländisches und internationales Strafrecht. Reihe I: Interdisziplinäre Forschungen aus Strafrecht und Kriminologie
Book Section, Bibliographie

Kuo, Po-Chun ; Schneider, Michael ; Dagdelen, Özgür ; Reichelt, Jan ; Buchmann, Johannes ; Cheng, Chen-Mou ; Yang, Bo-Yin
eds.: Preneel, Bart ; Takagi, Tsuyoshi (2011)
Extreme Enumeration on GPU and in Clouds - How Many Dollars You Need to Break SVP Challenges -.
Conference or Workshop Item, Bibliographie

Kiefer, Franziskus (2010)
Effiziente Implementierung des PACE - und EAC-Protokolls für mobile Geräte.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Karatsiolis, Vangelis ; Langer, Lucie ; Schmidt, Axel ; Tews, Erik ; Wiesmaier, Alexander (2010)
Cryptographic Application Scenarios.
Report, Bibliographie

Kaiser, Markus (2010)
Computer verification of algorithms using a formal proof system.
Technische Universität Darmstadt
Ph.D. Thesis, Bibliographie

Kühn, Ulrich ; Pyshkin, Andrei ; Tews, Erik ; Weinmann, Ralf-Philipp (2008)
Variants of Bleichenbacher's Low-Exponent Attack on PKCS#1 RSA Signatures.
Saarbrücken, Germany
Conference or Workshop Item, Bibliographie

Kern, Tobias (2008)
Next Generation Usability of Cryptography - Combining FlexiProvider and JCrypToo.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Krimmer, Robert ; Volkamer, Melanie (2008)
Challenges Posted by Distance Voting in General: Postal Voting, and in Particular eVoting.
Report, Bibliographie

Krimmer, Robert ; Volkamer, Melanie
eds.: Krishna, Jaya ; Agarwal, Naveen Kumar (2008)
Observing Threats to Voters Anonymity: Election Observation of Electronic Voting.
Conference or Workshop Item, Bibliographie

Karatsiolis, Evangelos (2007)
Flexible Certificate Management in Public Key Infrastructures.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication

Kutscher, Dirk ; Ott, Jörg ; Bartsch, Steffen (2007)
Supporting network access and service location in dynamic environments.
In: Campus-Wide Information Systems, 24 (4)
doi: 10.1108/10650740710834626
Article, Bibliographie

Krimmer, Robert ; Triessnig, Stefan ; Volkamer, Melanie
eds.: Alkassar, Ammar ; Volkamer, Melanie (2007)
The Development of Remote E-Voting Around the World: A Review of Roads and Directions.
Bochum, Germany
Conference or Workshop Item, Bibliographie

Kurosawa, Kaoru ; Schmidt-Samoa, Katja (2006)
New Online/Offline Signature Schemes Without Random Oracles.
New York, NY, USA
doi: 10.1007/11745853_22
Conference or Workshop Item, Bibliographie

Kaiser, Markus ; Buchmann, Johannes (2006)
Computer Verification in Cryptography.
Conference or Workshop Item, Bibliographie

Kaiser, Markus ; Buchmann, Johannes (2006)
A Formal Approach for Proof Constructions in Cryptography.
In: >International Journal of Computer Science, 1
Article, Bibliographie

Klink, Alexander (2006)
Cryptographic Voting Protocols - A Prototype Design and Implementation for University Elections at {TU} Darmstadt.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Köhler, Sabine (2006)
Sicherheitsparameter für das Okamoto-Tanaka-Uchiyama Quanten-Public-Key-Kryptosystem.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Kotchourova, Inna (2006)
An Approach for Formal and Computer Verification in Cryptography.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Kusch, Sebastian (2006)
Formalizing the {DSA} Signature Scheme in Isabelle/{HOL}.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Karatsiolis, Evangelos ; Lippert, Marcus ; Wiesmaier, Alexander (2005)
Planning for Directory Services in Public Key Infrastructures.
Regensburg
Conference or Workshop Item, Bibliographie

Kraatz, Sarah (2005)
Generische Konstruktion von Fail-Stop Signatur Schemata.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Kramer, Kai (2005)
Trustcentermigration - Umstellung von {LiDIA-CA} auf evaluierte Prozesse.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Krimmer, Robert ; Volkamer, Melanie
eds.: Schweighöfer, Erich ; Liebwald, Doris ; Augeneder, Silvia ; Menzel, Thomas (2005)
Wählen auf Distanz: Ein Vergleich zwischen elektronischen und nicht elektronischen Verfahren.
Conference or Workshop Item, Bibliographie

Karatsiolis, Vangelis ; Lippert, Marcus ; Wiesmaier, Alexander (2004)
Using {LDAP} Directories for Management of {PKI} Processes.
Conference or Workshop Item, Bibliographie

Karatsiolis, Vangelis ; Lippert, Marcus ; Wiesmaier, Alexander ; Pitaev, Anna ; Ruppert, Markus ; Buchmann, Johannes (2004)
Towards a Flexible {Intra-Trustcenter} Management Protocol.
In: >CoRR, cs.CR/0411067
Article, Bibliographie

Kurosawa, Kaoru ; Schmidt-Samoa, Katja ; Takagi, Tsuyoshi (2003)
A Complete and Explicit Security Reduction Algorithm for RSA-Based Cryptosystems.
Taipei, Taiwan
doi: 10.1007/b94617
Conference or Workshop Item, Bibliographie

Kastell, Kira ; Meyer, Ulrike ; Jakoby, Rolf (2003)
Secure Handover Procedures.
Report, Bibliographie

Kastell, Kira ; Meyer, Ulrike ; Jakoby, Rolf (2003)
Secure Handover Procedures.
Conference or Workshop Item, Bibliographie

Kreuder, Alexander (2003)
Ein neuer Reduktionsbeweis für das {RSA}-Paillier Kryptosystem.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie

Kurosawa, Kaoru ; Schmidt-Samoa, Katja ; Takagi, Tsuyoshi (2003)
A Complete and Explicit Security Reduction Algorithm for RSA-Based Cryptosystems.
Report, Bibliographie

Kügler, Dennis ; Vogt, Holger (2002)
Fair Tracing without Trustees.
Grand Cayman, British West Indies
Conference or Workshop Item, Bibliographie

Kügler, Dennis (2002)
Ein mißbrauchfreies anonymes elektonisches Zahlungssystem.
Technische Universität Darmstadt
Ph.D. Thesis, Bibliographie

Kügler, Dennis ; Vogt, Holger (2002)
Off-line Payments with Auditable Tracing.
Report, Bibliographie

Kwiotek, Daniel (2002)
Entwicklung einer sicheren Web-Schnittstelle für eine bestehende Enterprise-Anwendung basierend auf {PKI}-Technologien am Beispiel der {ERP}-Software {ProAd}.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie

Kügler, Dennis ; Vogt, Holger (2001)
Marking: A Privacy Protecting Approach Against Blackmailing.
Cheju Island, Korea
Conference or Workshop Item, Bibliographie

Kalenderian, Igor (2001)
Implementierung des Austausches kryptographischer Komponenten in {FlexiPKI} mittels Update Management Protocol.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Kügler, Dennis ; Vogt, Holger (2001)
Fair Tracing without Trustees.
Report, Bibliographie

Kügler, Dennis ; Vogt, Holger (2001)
Auditable Tracing with Unconditional Anonymity.
Report, Bibliographie

Kügler, Dennis ; Vogt, Holger (2001)
Unsichtbare Markierungen in elektronischem Geld.
Report, Bibliographie

Kügler, Dennis ; Vogt, Holger (2000)
Marking: A Privacy Protecting Approach against Blackmailing.
Report, Bibliographie

Knabe, Thorsten (1999)
LiPS} basiertes Job Queueing System für {LiDIA.
Report, Bibliographie

Kügler, Dennis ; Maurer, Markus (1999)
A Note on the Weakness of the Maurer-Yacobi Squaring Method.
Report, Bibliographie

Kügler, Dennis ; Maurer, Markus ; Paulus, Sachar (1999)
Identitätsbasierte Kryptosysteme als Alternative zu Public Key Infrastrukturen.
Report, Bibliographie

Kügler, Dennis (1998)
Eine Aufwandsanalyse für identitätsbasierte Kryptosysteme.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie

Kenn, Holger (1996)
Entwurf eines einfachen Client-Server-Systems zur Verteilung von Schlüsseldaten asymmetrischer Kryptosysteme.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie

Keuschen, Patrick (1996)
Entwurf und Implementierung von ojekt-orientierten Bibliotheksroutinen zur Realisierung von Secret Sharing Schemata.
Technische Hochschule Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie

L

Liu, Mo-meng ; Krämer, Juliane ; Hu, Yu-pu ; Buchmann, Johannes (2018)
Quantum security analysis of a lattice-based oblivious transfer protocol.
In: Frontiers of Information Technology & Electronic Engineering, 18 (9)
Article, Bibliographie

Loiero, Mirjam (2018)
Fault Attacks on Multivariate Signature Schemes.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Lato, Ellen (2016)
Fault Attacks on Lattice-Based Encryption Schemes.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Lieb, Patrick ; Schmidt, Markus ; Wiesmaier, Alexander (2016)
ECDSA and QUARTZ in Comparison with RSA.
Report, Bibliographie

Loruenser, Thomas ; Rodriguez, Charles Bastos ; Demirel, Denise ; Fischer-Hübner, Simone ; Gross, Thomas R. ; Langer, Thomas ; des Noes, Mathieu ; Poehls, Henrich ; Rozenberg, Boris ; Slamanig, Daniel (2015)
Towards a New Paradigm for Privacy and Security in Cloud Services.
In: CoRR abs/1506.05980 (2015)
Article, Bibliographie

Letzkus, Fabian (2015)
NotaryCache: Preventing man-in-the-middle attacks through ubiquitous multi-path probing.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Likavec, Lena (2011)
Application of Lattice Basis Reduction.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Lindner, Richard (2011)
Towards Efficient Lattice-Based Cryptography.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication

Langer, Lucie ; Wiesmaier, Alexander ; Buchmann, Johannes (2011)
Secure Long-term Record Keeping in the Public Sector.
In: EGovernement Review, (7)
Article, Bibliographie

Lindner, Richard ; Peikert, Chris (2011)
Better Key Sizes (and Attacks) for LWE-Based Encryption.
Conference or Workshop Item, Bibliographie

Langer, Lucie (2010)
Privacy and Verifiability in Electronic Voting.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication

Langer, Lucie ; Schmidt, Axel ; Wiesmaier, Alexander (2010)
INNOVATIVE PERSONALAUSWEIS‐ANWENDUNGEN Mehrwert des elektronischen Personalausweises jenseits von Portal‐ und Formularanwendungen: Technische Machbarkeit und langfristige Sicherheit.
Report, Bibliographie

Langer, Lucie ; Volkamer, Melanie ; Schmidt, Axel ; Buchmann, Johannes (2010)
A Taxonomy Refining the Security Requirements for Electronic Voting: Analyzing Helios as a Proof of Concept.
5th International Conference on Availability, Reliability and Security. Krakow, Poland (15.-18.02.2010)
Conference or Workshop Item, Bibliographie

Langer, Lucie ; Jonker, Hugo ; Pieters, Wolter (2010)
Anonymity and Verifiability in Voting: Understanding (Un)Linkability.
Barcelona, Spain
Conference or Workshop Item, Bibliographie

Langer, Lucie ; Weber, Stefan ; Schmidt, Axel ; Buchmann, Johannes ; Volkamer, Melanie (2009)
Towards Long-Term Free and Secret Electronic Elections Providing Voter-Verifiability in the Bulletin Board Model.
Bogota, Colombia
Conference or Workshop Item, Bibliographie

Langer, Lucie ; Volkamer, Melanie ; Weber, Stefan ; Schmidt, Axel ; Buchmann, Johannes
eds.: Davies, Jim ; Janowski, Tomasz (2009)
Towards Long-Term Free and Secret Electronic Elections Providing Voter-Verifiability in the Bulletin Board Model.
Bogota
Conference or Workshop Item, Bibliographie

Langer, Lucie ; Wiesmaier, Alexander (2009)
Der Lifetime eSafe -- ein sicheres elektronisches Schließfach.
Geneva, Switzerland
Conference or Workshop Item, Bibliographie

Langer, Lucie ; Schmidt, Axel ; Wiesmaier, Alexander (2009)
Projekt Campuspilot -- Akzeptanzbericht.
Report, Bibliographie

Langer, Lucie ; Schmidt, Axel ; Buchmann, Johannes ; Volkamer, Melanie ; Stolfik, Alexander (2009)
Towards a Framework on the Security Requirements for Electronic Voting Protocols.
Atlanta, GA, USA
doi: 10.1109/RE-VOTE.2009.9
Conference or Workshop Item, Bibliographie

Langer, Lucie ; Schmidt, Axel ; Volkamer, Melanie ; Buchmann, Johannes
eds.: Fischer, Stefan ; Maehle, Erik ; Reischuk, Rüdiger (2009)
Classifying Privacy and Verifiability Requirements for Electronic Voting.
Conference or Workshop Item, Bibliographie

Langer, Lucie ; Schmidt, Axel ; Volkamer, Melanie (2009)
Verifizierbarkeit elektronischer Wahlen.
In: eGovernement Review, 4
Article, Bibliographie

Langer, Lucie ; Wiesmaier, Alexander (2009)
Langfristige Sicherheit am Beispiel eines virtuellen Tresors.
Report, Bibliographie

Lucks, Stefan ; Schuler, Andreas ; Tews, Erik ; Weinmann, Ralf-Philipp ; Wenzel, Matthias
ed.: Fischlin, Marc (2009)
Attacks on the DECT authentication mechanisms.
San Francisco, CA, USA
Conference or Workshop Item, Bibliographie

Langer, Lucie ; Schmidt, Axel ; Wiesmaier, Alexander (2009)
From Student Smartcard Applications to the German Electronic Identity Card.
Conference or Workshop Item, Bibliographie

Langer, Lucie ; Opitz-Talidou, Zoi (2009)
Elektronische Aufbewahrung von Wahldokumenten bei Onlinewahlverfahren.
Conference or Workshop Item, Bibliographie

Langer, Lucie ; Opitz-Talidou, Zoi (2009)
Elektronische Aufbewahrung von Wahldokumenten bei Onlinewahlen: Beweggründe, rechtliche Anforderungen und technische Umsetzung.
In: DuD, 9
Article, Bibliographie

Langer, Lucie (2009)
Long-term verifiability of remote electronic elections.
In: Practical studies in e-Governement
Book Section, Bibliographie

Langer, Lucie ; Schmidt, Axel ; Volkamer, Melanie (2009)
Verifizierbarkeit elektronischer Wahlen.
In: eGovernment Review, 4
Article, Bibliographie

Langer, Lucie ; Schmidt, Axel ; Volkamer, Melanie ; Buchmann, Johannes
eds.: Prosser, Alexander ; Parycek, Peter (2009)
Ein PKI-basiertes Protokoll für sichere und praktikable Onlinewahlen.
Conference or Workshop Item, Bibliographie

Langer, Lucie ; Schmidt, Axel (2008)
Onlinewahlen mit Wahldiensteanbieter - das Verbundprojekt voteremote.
Conference or Workshop Item, Bibliographie

Langer, Lucie ; Schmidt, Axel ; Buchmann, Johannes (2008)
Secure Online Elections in Practice.
Other, Bibliographie

Lei, Qin (2008)
Design and Implementation of Secure Email for BlackBerry Devices - Solutions in the enterprise contex.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Langer, Lucie ; Schmidt, Axel ; Araújo, Roberto (2008)
A pervasively verifiable online voting scheme.
Conference or Workshop Item, Bibliographie

Lehmann, Julian (2008)
Fast Elliptic Curve Operation Costs and Comparison of Sole Inversion Precomputation Schemes.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Längsfeld, Carsten (2008)
Entwurf und Implementierung eines OpenPGP Clients.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Langer, Lucie ; Schmidt, Axel ; Buchmann, Johannes
ed.: Remenyi, Dan (2008)
Secure and Practical Online Elections via Voting Service Provider.
Conference or Workshop Item, Bibliographie

Langer, Lucie
ed.: Remenyi, Dan (2008)
Towards Legally Binding Online Elections in Germany.
Conference or Workshop Item, Bibliographie

Liu, Fen ; Ji, Wen ; Hu, Lei ; Ding, Jintai ; Lv, Shuwang ; Pyshkin, Andrei ; Weinmann, Ralf-Philipp (2007)
Analysis of the SMS4 Block Cipher.
Conference or Workshop Item, Bibliographie

Lulev, Hristo (2007)
Overview of Bit Commitment Schemes.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Lippert, Marcus ; Karatsiolis, Evangelos ; Wiesmaier, Alexander ; Buchmann, Johannes (2006)
Life-Cycle Management of X.509 Certifcates Based on LDAP Directories.
In: >Journal of Computer Security, 14 (5)
Article, Bibliographie

Lindner, Richard (2006)
Current Attacks on NTRU.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Langer, Lucie (2006)
Stromchiffren - Entwurf, Einsatz und Schwächen.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Lippert, Marcus ; Karatsiolis, Evangelos ; Wiesmaier, Alexander ; Buchmann, Johannes (2005)
Directory Based Registration in Public Key Infrastructures.
Conference or Workshop Item, Bibliographie

Laabs, M. ; Merz, M. ; Wunderlich, J. ; Straub, T. (2005)
Benutzbarkeitsevaluation von Trustcenter-Software am Beispiel der Windows 2003 Server {CA}.
Conference or Workshop Item, Bibliographie

Ludwig, Christoph (2005)
Practical Lattice Basis Sampling Reduction.
Technische Universität Darmstadt
Ph.D. Thesis, Bibliographie

Lue, Feng (2004)
Security Analysis of {RSA} Cryptosystem Against Side Channel Attacks.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Ludwig, Christoph (2003)
A Faster Lattice Reduction Method Using Quantum Search.
Kyoto, Japan
Conference or Workshop Item, Bibliographie

Liese, Thorsten (2003)
Eine Software zur automatisierten Erstellung von {IEEE829}-Testdokumentationen.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie

Ludwig, Christoph (2003)
A Faster Lattice Reduction Method Using Quantum Search.
Report, Bibliographie

Ludwig, Christoph (2002)
The Security and Efficiency of Micciancio{'}s Cryptosystem.
Report, Bibliographie

Lippert, Marcus (2000)
Ein beweisbar sicherer Pseudoufallsbit-Generator auf der Basis des {DL}-Problems in elliptischen Kurven.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie

Liefke, Thomas ; Rodeh, Ohad ; Setz, Thomas (1999)
First Steps in the Implementation of a Fault-Tolerant Tuple - Space Machine for Volatile Data.
Report, Bibliographie

Liefke, Thomas ; Setz, Thomas (1999)
Extension of the {TRIPS} Prototype.
Report, Bibliographie

Liefke, Thomas (1997)
Tupleview: towards a Monitoring, Debugging and Profiling Tool for {LiPS}.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie

Liefke, Thomas ; Setz, Thomas (1997)
Tupleview - ein Monitoring-, Debugging- und Profiling-Tool für {LiPS}.
Report, Bibliographie

Lippmann, Jens (1997)
Integration einer Testumgebung in {LiPS}.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie

Lehmann, Frank (1994)
Implementierung von Algorithmen zur Berechnung modularer Polynome und deren Anwendung im Algorithmus von Atkin.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie

Loho, Jürgen (1991)
Die Implementierung des Number Field Sieve.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie

M

Mulholland, John ; Mosca, Michele ; Braun, Johannes (2017)
The Day the Cryptography Dies.
In: IEEE Security & Privacy, 15 (4)
doi: 10.1109/MSP.2017.3151325
Article, Bibliographie

Mohamed, Mohamed Saied Emam ; Bansarkhani, Rachid El ; Petzoldt, Albrecht (2016)
MQSAS - A Multivariate Sequential Aggregate Signature Scheme.
Honolulu, Hi, USA
Conference or Workshop Item, Bibliographie

McGrew, David ; Kampanakis, Panos ; Fluhrer, Scott ; Gazdag, Stefan-Lukas ; Butin, Denis ; Buchmann, Johannes (2016)
State Management for Hash-Based Signatures.
Gaithersburg, USA
Conference or Workshop Item, Bibliographie

Marky, Karola ; Gutmann, Andreas ; Rack, Philipp ; Volkamer, Melanie (2016)
Privacy Friendly Apps-Making Developers Aware of Privacy Violations.
Conference or Workshop Item, Bibliographie

Mayer, Christoph (2016)
Implementing a Toolkit for Ring-LWE Cryptography.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Meuser, Tobias ; Schmidt, Larissa ; Wiesmaier, Alexander (2015)
Comparing Lightweight Hash Functions – PHOTON & Quark.
Report, Bibliographie

Mayer, Peter ; Volkamer, Melanie ; Kauer, Michaela
eds.: Prakash, Atul ; Shyamasundar, Rudrapatna (2014)
Authentication Schemes - Comparison and Effective Password Spaces.
International Conference on Information Systems Security (ICISS). Hyderabad, India (16-20.12.2014)
doi: 10.1007/978-3-319-13841-1_12
Conference or Workshop Item, Bibliographie

Meziani, Mohammed (2014)
Designing and Improving Code-based Cryptosystems.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication

Mohamed, Mohamed Saied Emam ; Buchmann, Johannes (2014)
Mutant Differential Fault Analysis of Trivium MDFA.
Conference or Workshop Item, Bibliographie

Mohamed, Mohamed Saied Emam ; Bulygin, Stanislav ; Zohner, Michael ; Heuser, Annelie ; Walter, Michael ; Buchmann, Johannes (2013)
Improved Algebraic Side-Channel Attack on AES.
In: Journal of Cryptographic Engineering
Article, Bibliographie

Mohamed, Mohamed Saied Emam ; Bulygin, Stanislav ; Zohner, Michael ; Heuser, Annelie ; Walter, Michael ; Buchmann, Johannes (2012)
Improved Algebraic Side-Channel Attack on AES.
doi: 10.1109/HST.2012.6224335
Conference or Workshop Item, Bibliographie

Moecke, Cristian Thiago ; Volkamer, Melanie (2012)
Usable Secure Email Communications - Criteria and evaluation of existing approaches.
In: Information and Computer Security
doi: 10.1108/09685221311314419
Article, Bibliographie

Meziani, Mohammed (2012)
SBS: A Fast and Secure Syndrome Based Stream Cipher.
Other, Bibliographie

Meziani, Mohammed ; Hoffmann, Gerhard ; Cayrel, Pierre-Louis (2012)
Improving the Performance of the SYND Stream Cipher.
Al Akhawayn University, Ifran, Morocco
Conference or Workshop Item, Bibliographie

Meziani, Mohammed ; Bansarkhani, Rachid El (2012)
An Efficient and Secure Coding-based Authenticated Encryption.
Pisa, Italy
Conference or Workshop Item, Bibliographie

Mohamed, Mohamed Saied Emam ; Ding, Jintai ; Buchmann, Johannes
eds.: Kim, Tai-Hoon ; Adeli, Hojjat ; Robles, Rosslin John ; Balitanas, Maricel (2011)
Towards Algebraic Cryptanalysis of HFE Challenge 2.
Brno University, Czech Republic
doi: 10.1007/978-3-642-23141-4_12
Conference or Workshop Item, Bibliographie

Mohamed, Mohamed Saied Emam ; Bulygin, Stanislav ; Buchmann, Johannes
eds.: Kim, Tai-Hoon ; Adeli, Hojjat ; Robles, Rosslin John ; Balitanas, Maricel (2011)
Using SAT Solving to Improve Differential Fault Analysis of Trivium.
Brno, Czech Republic
doi: 10.1007/978-3-642-23141-4_7
Conference or Workshop Item, Bibliographie

Mohamed, Mohamed Saied Emam (2011)
Improved Strategies for Solving Multivariate Polynomial Equation Systems over Finite Fields.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication

McHardy, Patrick ; Schuler, Andreas ; Tews, Erik (2011)
Interactive decryption of DECT phone calls.
Hamburg
Conference or Workshop Item, Bibliographie

Meziani, M. ; Yousfi Alaoui, Sidi Mohamed el ; Cayrel, Pierre-Louis (2011)
Hash Functions Based on Coding Theory.
Conference or Workshop Item, Bibliographie

Mönkehues, Stephan (2011)
SWIFFT-Modifikationen, Korrektur von Operm5.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Mohamed, Mohamed Saied Emam ; Bulygin, Stanislav ; Buchmann, Johannes (2011)
Improved Differential Fault Analysis of Trivium.
Darmstadt
Conference or Workshop Item, Bibliographie

Milde, Benjamin ; Schneider, Michael (2011)
A Parallel Implementation of GaussSieve for the Shortest Vector Problem in Lattices.
Conference or Workshop Item, Bibliographie

Mohamed, Mohamed Saied Emam ; Ding, Jintai ; Buchmann, Johannes (2011)
The Complexity Analysis of the MutantXL Family.
In: IACR Cryptology ePrint Archive
Article, Bibliographie

Meziani, Mohammed ; Cayrel, Pierre-Louis ; Yousfi Alaoui, Sidi Mohamed el
eds.: Kim, Tai-Hoon ; Adeli, Hojjat ; Robles, Rosslin John ; Balitanas, Maricel (2011)
2SC: An Efficient Code-Based Stream Cipher.
Conference or Workshop Item, Bibliographie

Mohamed, Mohamed Saied Emam ; Cabarcas, Daniel ; Ding, Jintai ; Buchmann, Johannes ; Bulygin, Stanislav
eds.: Lee, Donghoon ; Hong, Seokhie (2010)
MXL3: An efficient algorithm for computing Gröbner bases of zero-dimensional ideals.
Seoul, Korea
doi: 10.1007/978-3-642-14423-3_7
Conference or Workshop Item, Bibliographie

Mohamed, Wael Said Abd Elmageed ; Bulygin, Stanislav ; Ding, Jintai ; Buchmann, Johannes ; Werner, Fabian
eds.: Heng, S.-H. ; Wright, R. N. ; Goi, B.-M. (2010)
Practical Algebraic Cryptanalysis for Dragon-based Cryptosystems.
Kuala Lumpur, Malaysia
doi: 10.1007/978-3-642-17619-7_11
Conference or Workshop Item, Bibliographie

Mohamed, Wael Said Abd Elmageed ; Ding, Jintai ; Kleinjung, Thorsten ; Bulygin, Stanislav ; Buchmann, Johannes
eds.: Cid, Carlos ; Faugere, Jean-Charles (2010)
PWXL: A Parallel Wiedemann-XL Algorithm for Solving Polynomial Equations over GF(2).
Conference or Workshop Item, Bibliographie

Marinov, Veselin (2010)
ECDSA Plug-in for the E-learning Platform JCrypTool.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Mohamed, Mohamed Saied Emam ; Ding, Jintai ; Buchmann, Johannes ; Werner, Fabian (2009)
Algebraic Attack on the MQQ Public Key Cryptosystem.
Kanazawa, Japan
doi: 10.1007/978-3-642-10433-6_26
Conference or Workshop Item, Bibliographie

Molter, Gregor ; Ogata, Kei ; Tews, Erik ; Weinmann, Ralf-Philipp (2009)
An Efficient FPGA Implementation for an DECT Brute-Force Attacking Scenario.
doi: 10.1109/ICWMC.2009.20
Conference or Workshop Item, Bibliographie

Mengele, Alexandra (2009)
Digital Enhanced Cordless Telecommunication (DECT) devices for residential use.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Mohamed, Mohamed Saied Emam ; Mohamed, Wael Said Abd Elmageed ; Ding, Jintai ; Buchmann, Johannes (2008)
MXL2: Solving Polynomial Equations over GF(2) Using an Improved Mutant Strategy.
doi: 10.1007/978-3-540-88403-3_14
Conference or Workshop Item, Bibliographie

Möller, Marco (2008)
Information Theoretical Models for Hierarchical Structured Agents and their Computation</a> - Informationtheoretische Modelle für hierarchisch strukturierte Agenten und ihre Berechnung (deutsche Zusammenfassung).
Technische Universität Darmstadt
Master Thesis, Bibliographie

Matzies, Alexander (2007)
Implementierung flexibler Skalarmultiplikation auf Elliptischen Kurven.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Meziani, Mohammed (2007)
Konstruktion von Hashfunktionen.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Meyer, Ulrike ; Wetzel, Susanne (2006)
Introducing History Enriched Security Context Transfer to Enhance the Security of Susequent Handover.
Pisa, Italy
doi: 10.1109/PERCOMW.2006.70
Conference or Workshop Item, Bibliographie

Meyer, Andreas (2006)
{"U}ber die Sicherheit und Effizienz kryptographischer Verfahren in algebraischen Zahlkörpern.
Technische Universität Darmstadt
Ph.D. Thesis, Bibliographie

Meyer, Ulrike (2005)
Secure Roaming and Handover Procedures in Wireless Access Networks.
Technische Universität Darmstadt
Ph.D. Thesis, Bibliographie

Meyer, Ulrike ; Cordasco, Jared ; Wetzel, Susanne
eds.: Choi, Sunghyun ; Buddhikot, Milind ; Cigno, Renato Lo (2005)
An approach to enhance inter-provider roaming through secret sharing and its application to {WLAN}s.
Conference or Workshop Item, Bibliographie

Meyer, Ulrike ; Wetzel, Susanne (2004)
A man-in-the-middle attack on {UMTS}.
Philadelphia, PA, USA
doi: 10.1145/1023646.1023662
Conference or Workshop Item, Bibliographie

Meyer, Ulrike ; Kastell, Kira ; Fernandez-Pello, Adrian ; Perez, Diego ; Jakoby, Rolf (2004)
Advantage and Use of a Location Based Handover Algorithm.
Conference or Workshop Item, Bibliographie

Meyer, Ulrike ; Wetzel, Susanne (2004)
On the Impact of GSMs Encryption and Man-in-the-middle Attacks on the Security of Interoperating GSM/UMTS Networks.
The 15th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications - PIMRC 2004. Barcelona, Spain (5-8 September 2004)
doi: 10.1109/PIMRC.2004.1368846
Conference or Workshop Item, Bibliographie

Müller, Tobias (2004)
Sicherheitsparameter für Regevs Kryptosystem.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Möller, Bodo (2003)
Improved Techniques for Fast Exponentiation.
Conference or Workshop Item, Bibliographie

Möller, Bodo (2003)
Provably Secure Public-Key Encryptionfor Length-Preserving Chaumian Mixes.
San Francisco, CA, USA
Conference or Workshop Item, Bibliographie

Möller, Bodo (2003)
Improved Techniques for Fast Exponentiation.
Seoul, Korea
Conference or Workshop Item, Bibliographie

Möller, Bodo (2003)
Public-Key Cryptography - Theory and Practice.
Technische Universität Darmstadt
Ph.D. Thesis, Bibliographie

Möller, Bodo (2002)
Parallelizable Elliptic Curve Point Multiplication Method with Resistance against Side-Channel Attacks.
Sao Paulo, Brazil
Conference or Workshop Item, Bibliographie

Maseberg, Jan Sönke (2002)
Fail-Safe-Konzept für Public-Key-Infrastrukturen.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication

Möller, Bodo (2002)
Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes.
Report, Bibliographie

Müller, Andreas Rudolf (2002)
JLiPSD} - eine Portierung des lipsd nach {Java.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie

Möller, Bodo (2001)
Securing Elliptic Curve Point Multiplication against Side-Channel Attacks.
Malaga, Spain
Conference or Workshop Item, Bibliographie

Meyer, Andreas ; Neis, Stefan ; Pfahler, Thomas (2001)
First Implementation of Cryptographic Protocols Based on Algebraic Number Fields.
doi: 10.1007/3-540-47719-5_9
Conference or Workshop Item, Bibliographie

Maurer, Markus (2000)
Regulator approximation and fundamental unit computation for real-quadratic orders.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication

Müller, Volker ; Stein, Andreas ; Thiel, Christoph (1999)
Computing discrete logarithms in real quadratic congruence function fields of large genus.
In: >Mathematics of Computation, 68 (226)
Article, Bibliographie

Müller, Volker ; Paulus, Sachar (1998)
Elliptische Kurven und Public Key Kryptographie.
Other, Bibliographie

Müller, Volker (1998)
Fast Multiplication on Elliptic Curves over Small Fields of Characteristic Two.
In: >Journal of Cryptology, 11 (4)
Article, Bibliographie

Müller, Volker ; Vanstone, Scott ; Zuccherato, Robert (1998)
Discrete Logarithm Based Cryptosystems in Quadratic Function Fields of Characteristic 2.
In: >Designs, Codes and Cryptography, 14 (2)
Article, Bibliographie

Maurer, Markus (1997)
The logarithm function in LiDIA's bigfloat class.
Report, Bibliographie

Meyer, Andreas (1997)
Ein neues Identifikations- und Signaturverfahren über imaginär-quadratischen Klassengruppen.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie

Müller, Volker (1997)
Fast Multiplication on Elliptic Curves over Small Fields of Characteristic Two.
Report, Bibliographie

Müller, Volker (1997)
Efficient Algorithms for Multiplication on Elliptic Curves.
Report, Bibliographie

Müller, Volker (1997)
Efficient Algorithms for Multiplication on Elliptic Curves.
Other, Bibliographie

Müller, Volker ; Paulus, Sachar (1997)
On the Generation of Cryptographically Strong Elliptic Curves.
Report, Bibliographie

Meyer, Bernd ; Müller, Volker (1996)
A Public Key Cryptosystem Based on Elliptic Curves over {Z/nZ} Equivalent to Factoring.
Saragossa, Spain
Conference or Workshop Item, Bibliographie

Mignotte, Maurice ; Pethö, Attila ; Roth, Ralf (1996)
Complete solutions of a family of quartic Thue and index form equations.
In: >Mathematics of Computation, 65 (213)
Article, Bibliographie

Monstadt, Andreas (1996)
Eine Entwicklungsumgebung für die objektorientierte Bibliothek {LiDIA}.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie

Meyer, Bernd (1995)
Zur Trennung von Klassen ununterscheidbarer Ensembles.
Universität des Saarlandes
Ph.D. Thesis, Bibliographie

Müller, Andreas (1995)
Eine {FFT}-Continuation für die elliptische Kurvenmethode.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie

Müller, Volker (1995)
Ein Algorithmus zur Bestimmung der Punktanzahl elliptischer Kurven über Körpern der Charakteristik größer drei.
Universität des Saarlandes
Ph.D. Thesis, Bibliographie

Maurer, Markus (1994)
Eine Implementierung des Algorithmus von Atkin zur Berechnung der Punktanzahl elliptischer Kurven über endlichen Primkörpern der Charakteristik größer drei.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie

Müller, Achim (1994)
Effiziente Algorithmen für Probleme der linearen Algebra über {$mathbbZ$}.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie

Merscher, Patrick (1992)
Standards für objektorientiertes Programmieren in der Computeralgebra.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie

Meyer, Bernd (1992)
Bit-Commitment-Schemes und Zero-Knowledge.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie

Müller, Volker (1991)
Berechnung der Punktanzahl Elliptischer Kurven über endlichen Primkörpern.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie

N

Neumann, Stephan ; Volkamer, Melanie ; Budurushi, Jurlind ; Prandini, Marco (2016)
SecIVo: a quantitative security evaluation framework for internet voting schemes.
In: >Annals of Telecommunications
doi: 10.1007/s12243-016-0520-0
Article, Bibliographie

Neumann, Stephan ; Volkamer, Melanie ; Strube, Moritz ; Jung, Wolfgang ; Brelle, Achim (2015)
Cast-as-intended-Verifizierbarkeit für das Polyas-Internetwahlsystem.
In: Datenschutz und Datensicherheit, 2015 (11)
doi: 10.1007/s11623-015-0512-7
Article, Bibliographie

Neumann, Stephan ; Feier, Christian ; Sahin, Perihan ; Fach, Sebastian (2014)
Pretty Understandable Democracy 2.0.
Lochau
Conference or Workshop Item, Bibliographie

Neumann, Stephan ; Olembo, Maina ; Renaud, Karen ; Volkamer, Melanie
eds.: Kö, Andrea ; Francesconi, Enrico (2014)
Helios Verification: To Alleviate, or to Nominate: Is That The Question, Or Shall We Have Both?
München
Conference or Workshop Item, Bibliographie

Neumann, Stephan ; Kulyk, Oksana ; Volkamer, Melanie (2014)
A Usable Android Application Implementing Distributed Cryptography For Election Authorities.
Fribourg, Switzerland
Conference or Workshop Item, Bibliographie

Neumann, Stephan ; Budurushi, Jurlind ; Volkamer, Melanie
eds.: Zissis, Dimitrios ; Lekkas, Dimitrios (2014)
Analysis of Security and Cryptographic Approaches to Provide Secret and Verifiable Electronic Voting.
Book Section, Bibliographie

Neumann, Stephan ; Kahlert, Anna ; Henning, Maria ; Richter, Philipp ; Jonker, Hugo ; Volkamer, Melanie
eds.: Wimmer, Maria ; Tambouris, Efthimios ; Macintosh, Ann (2013)
Modeling the German Legal Latitude Principles.
Koblenz, Germany
Conference or Workshop Item, Bibliographie

Neumann, Stephan ; Kulyk, Oksana ; Murati, Lulzim ; Volkamer, Melanie (2013)
Towards a Practical Mobile Application for Election Authorities (Demo).
Conference or Workshop Item, Bibliographie

Neumann, Stephan ; Kahlert, Anna ; Henning, Maria ; Jonker, Hugo ; Volkamer, Melanie (2013)
Informatische Modellierung der Prinzipien des gesetzlichen Gestaltungsspielraums im Hinblick auf Wahlsysteme.
Salzburg, Austria
Conference or Workshop Item, Bibliographie

Nie, Xuyun ; Xu, Zhaohu ; Buchmann, Johannes
ed.: Gaborit, Philippe (2013)
Cryptanalysis of Hash-based Tamed Transformation and Minus Signature Scheme.
Limoges, France
Conference or Workshop Item, Bibliographie

Nie, Xuyun ; Petzoldt, Albrecht ; Buchmann, Johannes (2013)
Cryptanalysis of 2-layer Nonlinear Piece In Hand Method.
Regensburg, Germany
Conference or Workshop Item, Bibliographie

Neumann, Stephan ; Volkamer, Melanie (2012)
Civitas and the Real World: Problems and Solutions from a Practical Point of View.
Prague, Czech Republic
doi: 10.1109/ARES.2012.75
Conference or Workshop Item, Bibliographie

Niebuhr, Robert (2012)
Attacking and Defending Code-based Cryptosystems.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication

Nickel, Claudia (2012)
Accelerometer-based Biometric Gait Recognition for Authentication on Smartphones.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication

Niebuhr, Robert ; Meziani, Mohammed ; Bulygin, Stanislav ; Buchmann, Johannes (2012)
Selecting Parameters for Secure McEliece-based Cryptosystems.
In: International Journal of Information Security, 11 (3)
Article, Bibliographie

Neumann, Stephan ; Volkamer, Melanie (2012)
Formal Treatment of Distributed Trust in Electronic Voting.
Stuttgart. Germany
Conference or Workshop Item, Bibliographie

Niebuhr, Robert ; Cayrel, Pierre-Louis (2011)
Broadcast Attacks against Code-Based Schemes.
Weimar, Germany
Conference or Workshop Item, Bibliographie

Niebuhr, Robert ; Cayrel, Pierre-Louis ; Buchmann, Johannes (2011)
Improving the effciency of Generalized Birthday Attacks against certain structured cryptosystems.
Conference or Workshop Item, Bibliographie

Nohl, Karsten ; Tews, Erik (2010)
Kann man mit DECT noch vertraulich telefonieren?
In: >Datenschutz und Datensicherheit (DuD), 34 (11)
Article, Bibliographie

Niebuhr, Robert ; Cayrel, Pierre-Louis ; Bulygin, Stanislav ; Buchmann, Johannes (2010)
On lower bounds for Information Set Decoding over F_q.
Conference or Workshop Item, Bibliographie

Nohl, Karsten ; Tews, Erik ; Weinmann, Ralf-Philipp (2010)
Cryptanalysis of the DECT Standard Cipher.
Seoul
Conference or Workshop Item, Bibliographie

Niebuhr, Robert ; Cayrel, Pierre-Louis ; Bulygin, Stanislav ; Buchmann, Johannes (2010)
Attacking code/lattice-based cryptosystems using Partial Knowledge.
Conference or Workshop Item, Bibliographie

Nussbaumer, Mihaela (2008)
Elektronische (Langzeit-)Archivierung mit Hilfe digitaler Signaturen.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Nauheimer, Frank (2007)
Development of a lattice based blind signature scheme.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Nguentcheu, Paul Cesar (2007)
Analyse, Design und Implementierung von Krypto-Verfahren zur sicheren Netzwerkkommunikation.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Niebuhr, Robert (2006)
Application of Algebraic-Geometric Codes in Cryptography.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Neis, Stefan (2002)
Zur Berechnung von Klassengruppen.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication

Neis, Stefan (1998)
Reducing Ideal Arithmetic to Linear Albebra Problems.
Report, Bibliographie

Nüsseler, Markus (1998)
Sicherer Zugangsschutz mit Hilfe eines Einmalpaßwortgenerators auf einer Chipkarte.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie

Neis, Stefan (1994)
Kurze Darstellungen von Ordnungen.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie

Naumann-Kipper, Petra (1992)
Interaktive Beweissysteme und {Arthur-Merlin- Beweissysteme}.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie

O

Olembo, Maina ; Renaud, Karen ; Bartsch, Steffen ; Volkamer, Melanie (2014)
Voter, What Message Will Motivate You to Verify Your Vote?
San Diego
doi: 10.14722/usec.2014.23038
Conference or Workshop Item, Bibliographie

Olembo, Maina ; Bartsch, Steffen ; Volkamer, Melanie
eds.: Schneider, Steve ; Heather, James ; Teague, Vanessa (2013)
Mental Models of Verifiability in Voting.
University of Surrey, Guildford, UK
Conference or Workshop Item, Bibliographie

Olembo, Maina ; Volkamer, Melanie
eds.: Saeed, Saqib ; Reddick, Christopher (2013)
E-Voting System Usability: Lessons for Interface Design, User Studies, and Usability Criteria.
doi: 10.4018/978-1-4666-3640-8.ch011
Book Section, Bibliographie

Olembo, Maina ; Stockhardt, Simon ; Hülsing, Andreas ; Volkamer, Melanie
ed.: University, Plymouth (2013)
Developing and Testing a Visual Hash Scheme.
Conference or Workshop Item, Bibliographie

Olembo, Maina ; Volkamer, Melanie (2012)
Recommendations For E-Voting System Usability: Lessons From Literature For Interface Design, User Studies, and Usability Criteria.
Report, Bibliographie

Olembo, Maina ; Kahlert, Anna ; Neumann, Stephan ; Volkamer, Melanie
eds.: Kripp, Melanie J. ; Volkamer, Melanie ; Grimm, Rüdiger (2012)
Partial Verifiability in POLYAS for the GI Elections.
Castle Hofen, Bregenz, Austria
Conference or Workshop Item, Bibliographie

Olembo, Maina ; Volkamer, Melanie (2011)
Authentication Techniques, Client-Side Voting Software, and Secure Platform Mechanisms.
Report, Bibliographie

Olembo, Maina ; Schmidt, Patrick ; Volkamer, Melanie (2011)
Introducing Verifiability in the POLYAS Remote Electronic Voting System.
Vienna, Austria
Conference or Workshop Item, Bibliographie

Overbeck, Raphael (2007)
Public Key Cryptography based on Coding Theory.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication

Oberender, Jens ; Volkamer, Melanie ; Meer, Hermann de (2007)
Denial-of-Service Flooding Detection in Anonymity Networks.
Conference or Workshop Item, Bibliographie

Overbeck, Raphael (2006)
Statistical Decoding Revisited.
doi: 10.1007/11780656_24
Conference or Workshop Item, Bibliographie

Overbeck, Raphael (2006)
Extending Gibson's attacks on the {GPT} Cryptosystem.
doi: 10.1007/11779360_15
Conference or Workshop Item, Bibliographie

Overbeck, Raphael (2005)
A New Structural Attack for GPT and Variants.
Kuala Lumpur, Malaysia
doi: 10.1007/11554868_5
Conference or Workshop Item, Bibliographie

Okeya, Katsuyuki ; Takagi, Tsuyoshi ; Vuillaume, Camille (2004)
On the Importance of Protecting {$Delta$} in {SFLASH} against Side Channel Attacks.
Las Vegas, Nevada, USA
Conference or Workshop Item, Bibliographie

Okeya, Katsuyuki ; Schmidt-Samoa, Katja ; Spahn, Christian ; Takagi, Tsuyoshi (2004)
Signed Binary Representations Revisited.
Advances in cryptology : proceedings / CRYPTO 2004, 24th Annual International Cryptology Conference. Santa Barbara, California, USA (August 15 - 19, 2004)
Conference or Workshop Item, Bibliographie

Okeya, Katsuyuki ; Takagi, Tsuyoshi ; Vuillaume, Camille (2004)
On the Importance of Protecting {$Delta$} in {SFLASH} against Side Channel Attack.
Report, Bibliographie

Overbeck, Raphael (2004)
Potential und Grenzen der Anwendung von Gitterreduktionsalgorithmen in der Kryptographie.
Technische Universität Darmstadt
Master Thesis, Bibliographie

P

Petzoldt, Albrecht ; Szepieniec, Alan ; Mohamed, Mohamed Saied Emam (2017)
A Practical Multivariate Blind Signature Scheme.
Malta
Conference or Workshop Item, Bibliographie

Petzoldt, Albrecht ; Cheng, Ming-Shing ; Yang, Bo-Yin ; Chengdong, Tao ; Ding, Jintai (2015)
Design Principles for HFEv- based Signature Schemes.
Auckland, New Zealand
Conference or Workshop Item, Bibliographie

Petzoldt, Albrecht ; Bulygin, Stanislav ; Buchmann, Johannes (2013)
A multivariate based threshold ring signature scheme.
In: Applicable Algebra in Engineering, Communication and Computing, 24 (3 - 4)
doi: 10.1007/s00200-013-0190-3
Article, Bibliographie

Petzoldt, Albrecht (2013)
Selecting and Reducing Key Sizes for Multivariate Cryptography.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication

Petzoldt, Albrecht ; Bulygin, Stanislav ; Buchmann, Johannes
ed.: Gaborit, Philippe (2013)
Fast Verification for Improved Versions of the UOV and Rainbow Signature Schemes.
Limoges, France
Conference or Workshop Item, Bibliographie

Petzoldt, Albrecht ; Bulygin, Stanislav (2012)
Linear Recurring Sequences for the UOV Key Generation Revisited.
Seoul, Korea
Conference or Workshop Item, Bibliographie

Petzoldt, Albrecht ; Thomae, Enrico ; Bulygin, Stanislav ; Wolf, Christopher
eds.: Preneel, Bart ; Takagi, Tsuyoshi (2011)
Small Public Keys and Fast Verification for Multivariate Quadratic Public Key Systems.
Conference or Workshop Item, Bibliographie

Petzoldt, Albrecht ; Bulygin, Stanislav ; Buchmann, Johannes
eds.: Catalano, Dario ; Fazio, Nelly ; Gennaro, Rosario ; Nicolosi, Antonio (2011)
Linear Recurring Sequences for the UOV Key Generation.
Conference or Workshop Item, Bibliographie

Popovic, Darko (2011)
Kosten-Nutzen-Analyse von elektronischen Wahlen an der TU Darmstadt.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Petzoldt, Albrecht ; Bulygin, Stanislav ; Buchmann, Johannes
eds.: Gong, G. ; Gupta, K. C. (2010)
CyclicRainbow - A multivariate Signature Scheme with a Partially Cyclic Public Key.
Conference or Workshop Item, Bibliographie

Petzoldt, Albrecht ; Bulygin, Stanislav ; Buchmann, Johannes
eds.: Cid, Carlos ; Faugere, Jean-Charles (2010)
A Multivariate Signature Scheme with a Partially Cyclic Public Key.
Conference or Workshop Item, Bibliographie

Popall, Enrico (2010)
Wirtschaftlicher Nutzen des neuen Personalausweises.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Petzoldt, Albrecht ; Bulygin, Stanislav ; Buchmann, Johannes
ed.: Sendrier, Nicolas (2010)
Selecting Parameters for the Rainbow Signature Scheme.
Conference or Workshop Item, Bibliographie

Pyshkin, Andrey (2008)
Algebraic Cryptanalysis in Block Ciphers Using Gröbner Bases.
Technische Universität Darmstadt
Ph.D. Thesis, Bibliographie

Pancheva, Krasimira (2007)
On Lattices, Codes and Regev{'}s Cryptosystem.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Peter, Markus (2006)
Angriffe auf das {McEliece} Kryptosystem.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Penev, Tsvetan (2005)
Identity Based Public Key Infrastructures.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Peter, Markus (2005)
Effizienz- und Sicherheitsanalyse von Micropayment Systemen.
Other, Bibliographie

Poeplau, Lea (2005)
Counting Points on Elliptic Curves.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Pape, Sebastian (2004)
Sicherheitsmodelle für das Ajtai-Dwork-Kryptosystem.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Pitaev, Anna (2004)
Entwurf und Implementierung einer Revokationskomponente für ein {Java}-basiertes Trustcenter.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Planz, Thilo (2002)
Entwurf und Implementierung einer Infrastruktur für ein {Java}-basiertes Trustcenter.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie

Planz, Thilo (2002)
Konzepte für eine sichere Schlüsselverwaltung.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie

Petter, Andreas (2001)
Kryptographie mit algebraischen Zahlkörpern: Relevante Schlüssellängen.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie

Paulus, Sachar ; Takagi, Tsuyoshi (2000)
A New Public-Key Cryptosystem over a Quadratic Order with Quadratic Decryption Time.
In: >Journal of Cryptology, 13
Article, Bibliographie

Paulus, Sachar ; Rück, Hans-Georg (1999)
Real and imaginary quadratic representations of hyperelliptic function fields.
In: >Mathematics in Computation, 68 (227)
Article, Bibliographie

Paulus, Sachar ; Takagi, Tsuyoshi (1999)
A new public-key cryptosystem over quadratic orders with quadratic decryption time.
Report, Bibliographie

Paulus, Sachar ; Takagi, Tsuyoshi (1998)
A generalization of the Diffie-Hellman problem and related cryptosystems allowing fast decryption.
Seoul, Korea
Conference or Workshop Item, Bibliographie

Paulus, Sachar (1998)
Lattice Basis Reduction in Function Fields.
Portland, Oregon, USA
Conference or Workshop Item, Bibliographie

Paulus, Sachar (1998)
Lattice Basis Reduction in Function Fields.
Report, Bibliographie

Paulus, Sachar ; Takagi, Tsuyoshi (1998)
A generalization of the Diffie-Hellman problem and related cryptosystems allowing fast decryption.
Report, Bibliographie

Pfahler, Thomas (1998)
Polynomfaktorisierung über endlichen Körpern.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie

Papanikolaou, Thomas (1997)
Technical documentation using a {C++} to {LaTeX} formatting program.
Report, Bibliographie

Papanikolaou, Thomas (1997)
Entwurf und Entwicklung einer objektorientierten Bibliothek für algorithmische Zahlentheorie.
Universität des Saarlandes
Ph.D. Thesis, Bibliographie

Papanikolaou, Thomas ; Zayer, Jörg (1997)
{ALGO.STY} - a {LaTeX} style for algorithm editing.
Report, Bibliographie

Paulus, Sachar (1997)
{MAJA} - Das Konzept eines Multi Application {JavaCard} Environment.
Report, Bibliographie

Paulus, Sachar ; Rück, Hans-Georg (1997)
Real and imaginary quadratic representations of hyperelliptic function fields.
Report, Bibliographie

Paulus, Sachar ; Setz, Thomas (1997)
Developing and Testing a Smart Card Application.
Report, Bibliographie

Paulus, Sachar (1996)
Ein Algorithmus zur Berechnung der Klassengruppe quadratischer Ordnungen über Hauptidealringen.
Report, Bibliographie

Papanikolaou, Thomas (1993)
libF - Eine lange Gleitpunktarithmetik.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie

Paulus, Sachar (1992)
Algorithmen für endliche abelsche Gruppen.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie

R

Roth, Johannes ; Karatsiolis, Vangelis ; Krämer, Juliane (2020)
Classic McEliece Implementation with Low Memory Footprint.
19th Smart Card Research and Advanced Application Conference (CARDIS 2020). virtual Conference (18.-19.11.)
Conference or Workshop Item, Bibliographie

Ranly, Paul Moritz (2019)
On the feasibility of hierarchical secret sharing-based distributed storage systems.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Roepke, Rene ; Thraem, Timo ; Wagener, Johannes ; Wiesmaier, Alexander (2016)
A Survey on Protocols securing the Internet of Things: DTLS, IPSec and IEEE 802.11i.
Report, Bibliographie

Roth, Johannes (2016)
Analyse von TLS Bibliotheken basierend auf Fuzz Testing.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Rauzy, Pablo ; Kiss, Ágnes ; Krämer, Juliane ; Seifert, Jean-Pierre (2016)
Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT.
doi: 10.1007/978-3-319-43283-0_7
Conference or Workshop Item, Bibliographie

Rieß, Susanne (2016)
An Analysis of Lattice-Based Key Exchange Protocols.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Radeck-Arneth, Stephan ; Milde, Benjamin ; Lange, Arvid ; Gouvea, Evandro ; Radomski, Stefan ; Biemann, Chris ; Mühlhäuser, Max
eds.: Král, Pavel ; Matoušek, Václav (2015)
Open-Source German Distant Speech Recognition: Corpus and Acoustic Model.
doi: 10.1007/978-3-319-24033-6
Conference or Workshop Item, Bibliographie

Renaud, Karen ; Volkamer, Melanie (2015)
Exploring Mental Models Underlying PIN Management Strategies.
Conference or Workshop Item, Bibliographie

Radeck-Arneth, Stephan ; Biemann, Chris ; Schnelle-Walka, Dirk (2014)
Towards Ambient Search.
Conference or Workshop Item, Bibliographie

Riecker, Michael ; Yuan, Dingwen ; Bansarkhani, Rachid El ; Hollick, Matthias (2014)
Patrolling wireless sensor networks: Randomized intrusion detection.
Montreal, QC, Canada
Conference or Workshop Item, Bibliographie

Riecker, Michael ; Biedermann, Sebastian ; Bansarkhani, Rachid El ; Hollick, Matthias (2014)
Lightweight Energy Consumption Based Intrusion Detection System for Wireless Sensor Networks.
In: International Journal of Information Security, 14 (2)
Article, Bibliographie

Rynkowski, Gregor (2013)
Individuell angepasstes Vertrauen in die Web-PKI: Eine Analyse des Einsparungspotentials an vertrauenswürdigen CAs.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Rothenberg, Christian Esteve ; Macapuna, Carlos A. B. ; Magalhães, Maurício F. ; Verdi, Fábio ; Wiesmaier, Alexander (2011)
In-packet Bloom Filters: Design and Networking Applications.
In: Computer Networks - The International Journal of Computer and Telecommunications Networking, 55 (6)
Article, Bibliographie

Rückert, Markus (2011)
Lattice-based Signature Schemes with Additional Features.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication

Rückert, Markus
ed.: Abe, Masayuki (2010)
Lattice-based Blind Signatures.
Singapore
Conference or Workshop Item, Bibliographie

Rückert, Markus
eds.: Garay, Markus A. ; Prisco, Roberto De (2010)
Adaptively Secure Identity-based Identification from Lattices without Random Oracles.
Amalfi, Italy
Conference or Workshop Item, Bibliographie

Rückert, Markus (2010)
Strongly Unforgeable Signatures and Hierarchical Identity-based Signatures from Lattices Without Random Oracles.
Darmstadt
Conference or Workshop Item, Bibliographie

Rückert, Markus ; Schröder, Dominique
eds.: Bernstein, Daniel ; Lange, Tanja (2010)
Fair Partially Blind Signatures.
Conference or Workshop Item, Bibliographie

Rückert, Markus ; Schneider, Michael ; Schröder, Dominique
eds.: Zhou, Jianying ; Yung, Moti (2010)
Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs.
Beijing, China
Conference or Workshop Item, Bibliographie

Röhrig, Rouven (2010)
Entwurf und Implementierung eines Plug-ins für JCrypTool - S/MIME-Visualisierung.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Richter, Philipp ; Langer, Lucie ; Hupf, Katharina ; Volkamer, Melanie ; Buchmann, Johannes
eds.: Schweighöfer, Erich ; Geist, Anton ; Staufer, Ines (2010)
Verifizierbarkeit und Öffentlichkeitsgrundsatz bei elektronischen Wahlen.
Salzburg
Conference or Workshop Item, Bibliographie

Rückert, Markus ; Schröder, Dominique
eds.: Shacham, Hovav ; Waters, Brent (2009)
Security of Verifiably Encrypted Signatures and a Construction Without Random Oracles.
Palo Alto, USA
Conference or Workshop Item, Bibliographie

Rückert, Markus
eds.: Roy, Bimal ; Sendrier, Nicolas (2009)
Verifiably Encrypted Signatures from RSA without NIZKs.
New Delhi, India
Conference or Workshop Item, Bibliographie

Roch, Steffen (2009)
Konzeption und Integration eines sicheren drahtlosen Netzwerks im Unternehmensumfeld (am Beispiel des Heraeus Konzerns).
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Rückert, Markus ; Schröder, Dominique (2009)
Aggregate and Verifiably Encrypted Signatures from Multilinear Maps Without Random Oracles.
Seoul
Conference or Workshop Item, Bibliographie

Rupp, Andy ; Leander, Gregor ; Bangerter, Endre ; Dent, Alexander ; Sadeghi, Ahmad-Reza (2008)
Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems.
Conference or Workshop Item, Bibliographie

Richter, Peter (2008)
Optimierung des Merkle-Signaturverfahrens auf System z.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Rohde, Sebastian ; Eisenbarth, Thomas ; Dahmen, Erik ; Buchmann, Johannes ; Paar, Christof
eds.: Grimaud, Gilles ; Standaert, François-Xavier (2008)
Fast Hash-Based Signatures on Constrained Devices.
London, GB
Conference or Workshop Item, Bibliographie

Roth, Adrian (2008)
Implementierung von Applikationen für den FINREAD Kartenleser.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Rohde, Sebastian ; Eisenbarth, Thomas ; Dahmen, Erik ; Buchmann, Johannes ; Paar, Christof (2008)
Efficient Hash-Based Signatures on Embedded Devices.
Conference or Workshop Item, Bibliographie

Ruseva, Desislava (2008)
Security Analysis of Quaternion Signatures.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Rexroth, Peer ; Wiesmaier, Alexander (2007)
MAVA - Modular Security for Distributed Applications.
Report, Bibliographie

Roth, Andreas (2007)
Flexible - Eine erweiterbare {GUI} f{\"u}r den FlexiProvider (Backend).
Technische Universität Darmstadt
Master Thesis, Bibliographie

Rückert, Markus (2007)
Implementierung und Analyse von gitterbasierten Angriffen auf {NTRU}.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Rauchschwalbe, Ulrich ; Wiesmaier, Alexander ; Ludwig, Christoph ; Buchmann, Johannes (2006)
Digital Signierte Wägeresultate - Neue Wege in der Sicherung eichfähiger Messwerte.
In: Wägen, Dosieren, Mischen - (WDM), (3)
Article, Bibliographie

Roth, Volker ; Straub, Tobias ; Richter, Kai (2005)
Security and usability engineering with particular attention to electronic mail.
In: >International Journal of Man-Machine Studies, 63 (1-2)
Article, Bibliographie

Ruppert, Markus ; Tak, Markus (2001)
Sicherheitsmanagement durch generische, objektorientierte Modellierung einer TrustCenter Software.
Report, Bibliographie

Rauch, Katja (2000)
Implementierung von symmetrischen Verschlüsselungsverfahren.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie

Rau, Andrea (1999)
Bestimmung der Anzahl rationaler Punkte elliptischer Kurven über endlichen Körpern der Charakteristik 2.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie

Roth, Bärbel (1996)
Pseudozufallszahlengeneratoren in {LiSA}.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie

Roth, Ralf ; Setz, Thomas (1993)
Distributed Processing with {LiPS}.
Other, Bibliographie

Roth, Ralf ; Setz, Thomas (1993)
{LiPS}: a system for distibuted processing on workstations.
Book, Bibliographie

Roth, Ralf (1992)
{LiPS} Ein System für verteilte Anwendungen.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie

S

Schneider, Tidarat ; Kerber, Jens ; Goldstein, Denise ; Takeva, Savina ; Stemmler, Elisabeth
eds.: Braun, Johannes ; Schneider, Tidarat ; Goldstein, Denise (2019)
Software-Cluster international - Innovation durch Internationalisierung: Ein Leitfaden.
Report, Bibliographie

Schwind, Julian (2019)
Sicherheits- und Datenschutzkonzept für die zentrale Verteilung von PPDs.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Schabhüser, Lucas ; Butin, Denis ; Buchmann, Johannes (2019)
Context Hiding Multi-Key Linearly Homomorphic Authenticators.
San Francisco, CA, USA (March 4–8, 2019)
Conference or Workshop Item, Bibliographie

Schabhüser, Lucas ; Butin, Denis ; Buchmann, Johannes (2019)
Function-Dependent Commitments from Homomorphic Authenticators.
24th Australasian Conference, ACISP 2019. Christchurch, New Zealand (3-5 July 2019)
Conference or Workshop Item, Bibliographie

Schabhüser, Lucas (2019)
Information-Theoretic Privacy in Verifiable Outsourced Computation.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication

Schabhüser, Lucas ; Butin, Denis ; Buchmann, Johannes (2018)
CHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear Case.
Information Security Practice and Experience - 14th International Conference, ISPEC 2018. Tokyo, Japan
Conference or Workshop Item, Bibliographie

Schabhüser, Lucas ; Butin, Denis ; Demirel, Denise ; Buchmann, Johannes (2018)
Function-Dependent Commitments for Verifiable Multi-Party Computation.
Conference or Workshop Item, Bibliographie

Schabhüser, Lucas ; Buchmann, Johannes ; Struck, Patrick (2017)
A Linearly Homomorphic Signature Scheme From Weaker Assumptions.
16th IMA International Conference on Cryptography and Coding (IMACC 2017). Oxford, UK (12.-14. Dec., 2017)
doi: 10.1007/978-3-319-71045-7
Conference or Workshop Item, Bibliographie

Schreiber, Johannes (2017)
Countermeasures Against First Order Fault Attacks Using the Example of ring-TESLA.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Schmidt, Markus (2017)
Estimation of the Hardness of the Learning with Errors Problem with a Given Number of Samples.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Schabhüser, Lucas ; Demirel, Denise ; Buchmann, Johannes (2016)
An Unconditionally Hiding Auditing Procedure for Computations over Distributed Data.
Philadelphia, PA USA
Conference or Workshop Item, Bibliographie

Schabhüser, Lucas ; Demirel, Denise ; Buchmann, Johannes (2016)
An Unconditionally Hiding Auditing Procedure for Multi-Party Computations.
In: IACR - Cryptology ePrint Archive
Article, Bibliographie

Stockhardt, Simon ; Reinheimer, Benjamin ; Volkamer, Melanie ; Mayer, Peter ; Kunz, Alexandra ; Rack, Philipp ; Lehmann, Daniel (2016)
Teaching Phishing-Security: Which Way is Best?
Ghent, Belgium
Conference or Workshop Item, Bibliographie

Schochlow, Verena ; Neumann, Stephan ; Braun, Kristoffer ; Volkamer, Melanie (2016)
Bewertung der GMX/Mailvelope-Ende-zu-Ende-Verschlüsselung.
doi: 10.1007/s11623-016-0599-5
Conference or Workshop Item, Bibliographie

Schlipf, Mario (2015)
Password Policy Crawler.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Struck, Patrick (2015)
On the difference between hardness and security: a comparison of lattice-based signature schemes.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Shirazi, Fatemeh ; Goehring, Matthias ; Diaz, Claudia (2015)
Tor Experimentation Tools.
FAIRMONT, SAN JOSE, CA
Conference or Workshop Item, Bibliographie

Schreiner, Steffen (2015)
A Security Architecture for e-Science Grid Computing.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication

Shirazi, Fatemeh ; Volkamer, Melanie (2014)
What Deters Jane from Preventing Identification and Tracking on the Web?
Scottsdale, Arizona, USA
doi: 10.1145/2665943.2665963
Conference or Workshop Item, Bibliographie

Schlipf, Mario (2014)
Passwort-Richtlinien.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Strenzke, Falko (2013)
Efficiency and Implementation Security of Code-based Cryptosystems.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication

Strenzke, Falko (2013)
Timing Attacks against the Syndrome Inversion in Code-Based Cryptosystems.
Limoges, France
Conference or Workshop Item, Bibliographie

Schnelle-Walka, Dirk ; Radomski, Stefan ; Radeck-Arneth, Stephan (2013)
Probabilistic Dialog Management.
Conference or Workshop Item, Bibliographie

Schneider, Michael (2013)
Sieving for Shortest Vectors in Ideal Lattices.
Cairo, Egypt
Conference or Workshop Item, Bibliographie

Shirazi, Fatemeh ; Diaz, Claudia ; Mullan, Ciaran ; Wright, Joss ; Buchmann, Johannes (2013)
Towards Measuring Resilience in Anonymous Communication Networks.
In: HotPETs 2013
Article, Bibliographie

Schläpfer, Michael ; Volkamer, Melanie (2012)
The Secure Platform Problem - Taxonomy and Analysis of Existing Proposals to Address this Problem.
Albany, NY, USA
doi: 10.1145/2463728.2463807
Conference or Workshop Item, Bibliographie

Schreiner, Steffen ; Grigoras, Costin ; Grigoras, Alina ; Betev, Latchezar ; Buchmann, Johannes (2012)
A Grid security architecture for AliEn.
Taipei, Taiwan
Conference or Workshop Item, Bibliographie

Schreiner, Steffen ; Grigoras, Costin ; Litmaath, Maarten ; Betev, Latchezar ; Buchmann, Johannes (2012)
Certified Grid Job Submission in the ALICE Grid Services.
In: Open Access Journal of Physics: Conference Series (JPCS), International Conference on Computing in High Energy and Nuclear Physics (CHEP) 2012
Article, Bibliographie

Schmidt, Axel (2012)
Enabling Secure Online Elections with the Voting Service Provider.
Technische Universität Darmstadt
Ph.D. Thesis, Bibliographie

Schneider, Michael (2011)
Computing Shortest Lattice Vectors on Special Hardware.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication

Schreiner, Steffen ; Bagnasco, Stefano ; Banerjee, Subho Sankar ; Betev, Latchezar ; Carminati, Federico ; Datskova, Olga Vladimirovna ; Furano, Fabrizio ; Grigoras, Alina ; Grigoras, Costin ; Lorenzo, Patricia Mendez ; Peters, Andreas Joachim ; Saiz, Pablo ; Zhu, Jianlin (2011)
Securing the AliEn File Catalogue - Enforcing authorization with accountable file operations.
In: Journal of Physics: Conference Series (JPCS), 331:062044, International Conference on Computing in High Energy and Nuclear Physics (CHEP) 2010
Article, Bibliographie

Schneider, Michael ; Göttert, Norman
eds.: Preneel, Bart ; Takagi, Tsuyoshi (2011)
Random Sampling for Short Lattice Vectors on Graphics Cards.
Nara, Japan
doi: 10.1007/978-3-642-23951-9_11
Conference or Workshop Item, Bibliographie

Shirazi, Fatemeh ; Neumann, Stephan ; Ciolacu, Ines ; Volkamer, Melanie (2011)
Robust Electronic Voting: Introducing robustness in Civitas.
Trento, Italy
doi: 10.1109/REVOTE.2011.6045915
Conference or Workshop Item, Bibliographie

Schmidt, Patrick (2011)
Fully Homomorphic Encryption: Overview and Cryptanalysis.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Schryen, Guido ; Volkamer, Melanie ; Habib, Sheikh Mahbub ; Ries, Sebastian (2011)
A Formal Approach Towards Measuring Trust in Distributed Systems.
Taichung, Taiwan
doi: 10.1145/1982185.1982548
Conference or Workshop Item, Bibliographie

Schneider, Michael (2011)
Analysis of Gauss-Sieve for Solving the Shortest Vector Problem in Lattices.
Conference or Workshop Item, Bibliographie

Spycher, Oliver ; Volkamer, Melanie ; Koenig, Reto
eds.: Lipmaa, Helger ; Kiayias, Aggelos (2011)
Transparency and Technical Measures to Establish Trust in Norwegian Internet Voting.
doi: 10.1007/978-3-642-32747-6_2
Conference or Workshop Item, Bibliographie

Sami, Arif ; Karabulut, Murat (2010)
Analyse von homomorpher Verschlüsselung und MIX Netzen für elektronische Wahlsysteme.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Strenzke, Falko (2010)
Manger's Attack revisited.
Conference or Workshop Item, Bibliographie

Schneider, Michael ; Buchmann, Johannes (2010)
Extended Lattice Reduction Experiments using the BKZ Algorithm.
Berlin
Conference or Workshop Item, Bibliographie

Schmidt, Axel ; Volkamer, Melanie ; Buchmann, Johannes
eds.: Krimmer, Robert ; Grimm, Rüdiger (2010)
An Evaluation and Certification Approach to Enable Voting Service Providers.
Conference or Workshop Item, Bibliographie

Schmidt, Axel ; Heinson, Dennis ; Langer, Lucie ; Opitz-Talidou, Zoi ; Richter, Philipp ; Volkamer, Melanie ; Buchmann, Johannes
eds.: Ryan, Johannes Y. A. ; Schoenmakers, Berry (2009)
Developing a Legal Framework for Remote Electronic Voting.
Luxembourg
doi: 10.1007/978-3-642-04135-8_6
Conference or Workshop Item, Bibliographie

Schmidt, Axel ; Langer, Lucie ; Buchmann, Johannes ; Volkamer, Melanie (2009)
Specification of a Voting Service Provider.
doi: 10.1109/RE-VOTE.2009.8
Conference or Workshop Item, Bibliographie

Schneider, Michael ; Buchmann, Johannes ; Lindner, Richard (2009)
Probabilistic Analysis of LLL Reduced Bases.
Graz University of Technology, Austria
Conference or Workshop Item, Bibliographie

Stopczynski, Martin (2009)
Erweiterte Benutzerführung für den Umgang mit sicheren Verbindungen in Browsern.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Schreiner, Steffen (2009)
The Impact of Linux Superuser Privileges on System and Data Security within a Cloud Computing Storage Architecture.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Schmidt, Axel ; Volkamer, Melanie ; Langer, Lucie ; Buchmann, Johannes
eds.: Fischer, Stefan ; Maehle, Erik ; Reischuk, Rüdiger (2009)
Towards the impact of the operational environment on the security of e-voting.
Conference or Workshop Item, Bibliographie

Schelten, Kevin (2008)
On a Special Class of Lattices, Computational Problems, and Hash Functions.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Schneider, Michael (2008)
Improved Authentication Path Computation for Merkle Trees.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Siebenhaar, Melanie ; Lehrig, Tim ; Braun, Johannes ; Görge, Thomas (2008)
Entwicklung einer SOA-basierten Webanwendung zur Buchung und Verwaltung von Segeltouren: Proprietäre Software vs. Open Source.
In: Wirtschaftsinformatik, 50 (4)
doi: 10.1365/s11576-008-0069-2
Article, Bibliographie

Sögüt, Gökhan (2007)
Kombinierte Schwachstellenanalyse für schnelle Exponentiationen.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Stifi, Musab Haj (2007)
{GMSS} Signatur Generation für {RFID} Tags.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Schmidt, Arthur (2007)
Zur Lösung von zahlentheoretischen Problemen mit klassischen und Quantencomputern.
Technische Universität Darmstadt
Ph.D. Thesis, Bibliographie

Schuster, Dieter (2007)
Multivariate Interpolationsangriffe auf symmetrische Chiffren.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Schweickert, Ralf (2007)
Längerfristiger Zugriff auf verschlüsselte Daten bei Smartcard-basierten {PKI}-Lösungen.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Schmidt, Arthur (2006)
Quantum Algorithm for Solving the Discrete Logarithm Problem in the Class Group of an Imaginary Quadratic Field and Security Comparison of Current Cryptosystems at the Beginning of Quantum Computer.
doi: 10.1007/11766155_34
Conference or Workshop Item, Bibliographie

Schmidt-Samoa, Katja (2006)
Contributions to Provable Security and Efficient Cryptography.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication

Straub, Tobias (2006)
Usability Challenges of PKI.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication

Straub, Tobias ; Hartl, Manuel ; Ruppert, Markus (2006)
Digitale Reisepässe in Deutschland . Prozesse und Sicherheits-Infrastruktur.
Conference or Workshop Item, Bibliographie

Schmidt-Samoa, Katja (2006)
A New Rabin-type Trapdoor Permutation Equivalent to Factoring.
In: >Electronic Notes in Theoretical Computer Science, 157 (3)
Article, Bibliographie

Schmidt-Samoa, Katja ; Semay, Olivier ; Takagi, Tsuyoshi (2006)
Analysis of Fractional Window Recoding Methods and Their Application to Elliptic Curve Cryptosystems.
In: >IEEE Transactions on Computers, 55 (1)
Article, Bibliographie

Schmidt, Axel (2006)
Analyse von auf {C*} basierenden Public Key Chiffren.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Seipp, Michele-Yvonne (2006)
Formalisation of Proofs in Cryptography.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Schmidt-Samoa, Katja ; Takagi, Tsuyoshi (2005)
Paillier's Cryptosystem Modulo p2q and Its Applications to Trapdoor Commitment Schemes.
Kuala Lumpur, Malaysia
doi: 10.1007/11554868_21
Conference or Workshop Item, Bibliographie

Straub, Tobias ; Ginkel, Thilo-Alexander ; Buchmann, Johannes (2005)
A Multipurpose Delegation Proxy for WWW/ Credentials.
Conference or Workshop Item, Bibliographie

Schmidt, Arthur ; Vollmer, Ulrich (2005)
Polynomial time quantum algorithm for the computation of the unit group of a number field.
Baltimore, MD, USA
doi: 10.1145/1060590.1060661
Conference or Workshop Item, Bibliographie

Seudié, Hervé (2005)
Anwendungen von Digitalen Identitäten an einer Hochschule.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Stegers, Till (2005)
Analysis of Faug&eacute;re&rsquo;s F5 Algorithm.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Satanovski, Vladislav (2005)
Zentralisierte Konfigurationsverwaltung komplexer IT-Systeme.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Sato, Hisayoshi ; Schepers, Daniel ; Takagi, Tsuyoshi (2004)
Exact Analysis of Montgomery Multiplication.
Chennai, India
Conference or Workshop Item, Bibliographie

Straub, Tobias ; Heinemann, Andreas (2004)
An anonymous bonus point system for mobile commerce based on word-of-mouth recommendation.
Nicosia, Cyprus
doi: 10.1145/967900.968059
Conference or Workshop Item, Bibliographie

Stögbauer, Marcus (2004)
Efficient Algorithms for Pairing-Based Cryptosystems.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Straub, Tobias (2004)
A Method for Strengthening Certificate Enrollment.
Bedlewo, Poland
Conference or Workshop Item, Bibliographie

Straub, Tobias ; Baier, Harald (2004)
A Framework for Evaluating the Usability and the Utility of PKI-enabled Applications.
Report, Bibliographie

Straub, Tobias ; Baier, Harald (2004)
A Framework for Evaluating the Usability and the Utility of {PKI}-enabled Applications.
Conference or Workshop Item, Bibliographie

Sato, Hisayoshi ; Schepers, Daniel ; Takagi, Tsuyoshi (2004)
Exact Analysis of Montgomery Multiplication.
Report, Bibliographie

Schmidt-Samoa, Katja (2004)
Factorization-based Fail-Stop Signatures Revisited.
Report, Bibliographie

Schmidt-Samoa, Katja ; Semay, Olivier ; Takagi, Tsuyoshi (2004)
Analysis of Some Efficient Window Methods and their Application to Elliptic Curve Cryptosystems.
Report, Bibliographie

Schmidt, Arthur ; Vollmer, Ulrich (2004)
Polynomial Time Quantum Algorithm for the Computation of the Unit Group of a Number Field.
Report, Bibliographie

Schwierz, Sebastian (2004)
Sicherheitsanalyse für Langzeitsicherheit von Public-Key Verfahren.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Seiffert, Björn (2004)
Erweiterung der {Flexi-PKI} um einen {UMP}-Update-Service.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Semay, Olivier (2004)
Efficiency analysis of window methods using {Markov} chains.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Straub, Tobias (2003)
Efficient Two Party Multi-Prime {RSA} Key Generation.
Conference or Workshop Item, Bibliographie

Sakurai, Kouichi ; Takagi, Tsuyoshi (2002)
On the Security of a Modified Paillier Public-Key Primitive.
Melbourne, Australia
Conference or Workshop Item, Bibliographie

Sakurai, Kouichi ; Takagi, Tsuyoshi (2002)
New Semantically Secure Public-Key Cryptosystems from the {RSA}-Primitive.
Paris, France
Conference or Workshop Item, Bibliographie

Sakurai, Kouichi ; Takagi, Tsuyoshi (2002)
On the Security of a Modified Paillier Public-Key Primitive.
Report, Bibliographie

Sandner, Tobias (2002)
Signaturverfahren mittels hyperelliptischen Kurven und deren effiziente Implementierung.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie

Schmidt, Arthur (2002)
Zur Berechnung der Struktur endlicher abelscher Gruppen.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie

Sakurai, Kouichi ; Takagi, Tsuyoshi (2001)
New Semantically Secure Public-Key Cryptosystems from the {RSA}-Primitive.
Report, Bibliographie

Schramm, Dirk (2001)
Entwicklung einer flexiblen {Java}-basierten {S/MIME}-Erweiterung für Microsoft Outlook.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie

Schuster, Markus (2001)
{OpenRA} - Framework zur flexiblen Formularverarbeitung Darstellung, Transport und Produktion.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie

Seiler, Oliver (2001)
Signaturverfahren mit Elliptischen Kurven über Körpern der Charakteristik 2 und deren Arithmetik.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie

Seiler, Patrick (2001)
Konzept und Aufbau einer prototypischen Public Key Infrastruktur auf Basis von FlexiTrust.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie

Sesterhenn, Christoph (2000)
Design und Implementierung eines Kryptographie-Plugin für Email-Clients basierend auf {S/MIME} und {JAVA}.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie

Seipel, Michael (2000)
Die Java Cryptographic Architecture {(JCA)} als Implementierung der Generic Security Service {(GSS-API)} am Beispiel von {SAP R/3} Konzept und Prototyp.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie

Schaub, Joachim (1999)
Implementierung von Public-Key-Kryptosystemen über imaginär-quadratische Ordnungen.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie

Setz, Thomas (1998)
Dynamic-Load-Adaption in {LiPS}.
Report, Bibliographie

Süssmann, Boris (1998)
Entwicklung eines sicheren Telearbeitsplatzes.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie

Setz, Thomas (1997)
Experience with Literate Programming or Towards Qualified Programming.
Report, Bibliographie

Setz, Thomas (1997)
Design, Implementation and Performance of a Mutex-Token based Fault- Tolerant Tuple Space Machine.
Report, Bibliographie

Setz, Thomas ; Fischer, Johannes ; Liefke, Thomas (1997)
libtracer: Eine komfortable Bibliothek zum Generieren levelbasierter Tracing-Ausgaben.
Report, Bibliographie

Setz, Thomas ; Liefke, Thomas (1997)
The {LiPS} Runtime Systems.
Report, Bibliographie

Setz, Thomas ; Lippmann, Jens (1997)
Softwaretesten in {LiPS}.
Report, Bibliographie

Sauer, Michael (1997)
Eine Block-Lanczos Implementierung für {LiDIA}.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie

Schank, Eric (1997)
Probabilistische Beweisverifikation.
Technische Universität Darmstadt
Ph.D. Thesis, Bibliographie

Schwarz, Jochen (1997)
Entwurf und Implementierung einer objektorientierten Softwarebibliothek kryptographischer Algorithmen.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie

Setz, Thomas (1996)
Integration von Mechanismen zur Unterstützung der Fehlertoleranz in {LiPS}.
Universität des Saarlandes
Ph.D. Thesis, Bibliographie

Setz, Thomas ; Fischer, Johannes (1996)
Fault-tolerant Distributed Applications in {LiPS}.
Report, Bibliographie

Setz, Thomas ; Levy, Zohar (1996)
Requirements for {TRIPS}.
Report, Bibliographie

Schirokauer, Oliver ; Weber, Damian ; Denny, Thomas (1996)
Discrete Logarithms: The Effectiveness of the Index Calculus Method.
In: >Algorithmic Number Theory-(ANTS), 1122
Article, Bibliographie

Sosnowski, Thomas (1994)
Faktorisieren mit dem Quadratischen Sieb auf dem Hypercube.
Universitä;t des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie

Sprang, Oliver van (1994)
Basisreduktionsalgorithmen für Gitter kleiner Dimension.
Universität des Saarlandes
Ph.D. Thesis, Bibliographie

Sprang, Oliver van (1994)
Lower Bounds for the {LLL} Lattice Reduction Algorithm.
Conference or Workshop Item, Bibliographie

Scheid, Erik (1993)
Ein neuer Algorithmus zur Berechnung der Klassenzahl algebraischer Zahlkörper.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie

Schank, Eric (1991)
Zur probabilistischen Berechenbarkeitstheorie.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie

T

Traverso, Giulia (2019)
Long-Term Confidential Secret Sharing-Based Distributed Storage Systems.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication

Traverso, Giulia ; Butin, Denis ; Buchmann, Johannes ; Palesandro, Alex (2018)
Coalition-Resistant Peer Rating for Long-Term Confidentiality.
PST 2018 - 16th Annual Conference on Privacy, Security and Trust. Belfast, Northern Ireland, United Kingdom (August 28-30, 2018)
Conference or Workshop Item, Bibliographie

Traverso, Giulia ; Garcia Cordero, Carlos ; Nojoumian, Mehrdad ; Azarderakhsh, Reza ; Demirel, Denise ; Habib, Sheikh Mahbub ; Buchmann, Johannes (2017)
Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems.
15th Annual Conference on Privacy, Security and Trust (PST). Calgary, Canada (28.-30.8. 2017)
doi: 10.1109/pst.2017.00040
Conference or Workshop Item, Bibliographie

Traverso, Giulia ; Demirel, Denise ; Habib, Sheikh Mahbub ; Buchmann, Johannes (2016)
AS³: Adaptive Social Secret Sharing for Distributed Storage Systems.
Auckland, New Zealand
Conference or Workshop Item, Bibliographie

Traverso, Giulia ; Demirel, Denise ; Buchmann, Johannes (2016)
Dynamic and Verifiable Hierarchical Secret Sharing.
Tacoma, Washington, USA
Conference or Workshop Item, Bibliographie

Traverso, Giulia ; Demirel, Denise ; Buchmann, Johannes (2016)
Homomorphic Signature Schemes - A survey.
doi: 10.1007/978-3-319-32115-8
Book, Bibliographie

Ta, Vinh-Thong ; Butin, Denis ; Métayer, Daniel Le (2015)
Formal Accountability for Biometric Surveillance: A Case Study.
Luxembourg
Conference or Workshop Item, Bibliographie

Tao, Chengdong ; Xiang, Hong ; Petzoldt, Albrecht ; Ding, Jintai (2015)
Simple Matrix - A Multivariate Public Key Cryptosystem (MPKC) for Encryption.
In: Finite Fields and Their Applications, (35)
Article, Bibliographie

Tews, Erik (2012)
DECT Security Analysis.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication

Tews, Erik ; Wälde, Julian ; Weiner, Michael (2011)
Breaking DVB-CSA.
Weimar
Conference or Workshop Item, Bibliographie

Tzvetkov, Vesselin Dimitrov (2010)
Virtual Private Networks for mobile environments. Development of protocol for mobile security and algorithms for location update.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication

Tserovski, Lyudmil (2008)
Practical Security of Micciancios's Hash Function.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Tews, Erik (2007)
Attacks on the WEP protocol.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Tews, Erik ; Weinmann, Ralf-Philipp ; Pyshkin, Andrei (2007)
Breaking 104 Bit WEP in Less Than 60 Seconds.
Conference or Workshop Item, Bibliographie

Tischhauser, Elmar (2007)
T-Funktionsbasierte Blockchiffren.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Tomova, Iskra (2007)
Implementierung eines Selbstbedienungsclients f{ü}r eine dezentral administrierbare Trustcenter-Lösung.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Tomova, Iskra (2005)
Card Manager: Entwurf und Implementierung.
Other, Bibliographie

Tak, Markus (2002)
Ein {S/MIME}-Plugin für Outlook zur Verwendung alternativer kryptographischer Algorithmen.
Report, Bibliographie

Takagi, Tsuyoshi (2001)
New public-key cryptosystems with fast decryption.
Technische Universität Darmstadt
Ph.D. Thesis, Bibliographie

Theobald, Patrick (2000)
Ein Framework zur Berechnung der Hermite-Normalform von großen, dünnbesetzten, ganzzahligen Matrizen.
Technische Universität Darmstadt
Ph.D. Thesis, Bibliographie

Tak, Markus (1999)
Public Key Infrastrukturen - ein {Java}-basiertes Trustcenter.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie

Teske, Edlyn (1999)
The Pohlig-Hellman Method Generalized for Group Structure Computation.
In: >Journal of Symbolic Computation, 27 (6)
Article, Bibliographie

Teske, Edlyn (1998)
Speeding Up Pollard's Rho Method for Computing Discrete Logarithms.
Portland, Oregon, USA
Conference or Workshop Item, Bibliographie

Teske, Edlyn (1998)
A space efficient algorithm for group structure computation.
In: >Mathematics of Computation, 67 (224)
Article, Bibliographie

Teske, Edlyn (1998)
The Pohlig-Hellman Method Generalized for Group Structure Computation.
Report, Bibliographie

Teske, Edlyn (1998)
Algorithms for Finite Abelian Groups.
Technische Universität Darmstadt
Ph.D. Thesis, Bibliographie

Teske, Edlyn (1998)
Speeding up Pollard's Rho Method for Computing Discrete Logarithms.
Report, Bibliographie

Teske, Edlyn (1997)
A Space Efficient Algorithm for Group Structure Computation.
Report, Bibliographie

Theobald, Patrick ; Wetzel, Susanne ; Backes, Werner (1997)
Design concepts for matrices and lattices in LiDIA.
doi: 10.1145/331697.332344
Conference or Workshop Item, Bibliographie

Theobald, Patrick ; Wetzel, Susanne ; Setz, Thomas (1997)
LiDIA, LiPS - Erste gemeinsame Schritte.
Report, Bibliographie

Theobald, Patrick ; Wetzel, Susanne ; Backes, Werner (1996)
Design Concepts for Matrices and Lattices in {LiDIA}.
Report, Bibliographie

Theobald, Patrick (1995)
Eine Implementierung von Algorithmen der linearen Algebra über {$mathbbZ$}.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie

Thiel, Christoph (1995)
On the complexity of some problems in algorithmic algebraic number theory.
Universität des Saarlandes
Ph.D. Thesis, Bibliographie

Thiel, Christoph (1994)
Under the Assumption of the Generalized {Riemann} Hypothesis Verifying the Class Number Belongs To {NP} $cap$ co-{NP}.
Conference or Workshop Item, Bibliographie

Thiel, Christoph (1992)
Zur Theorie interaktiver Beweissysteme mit mehreren Provern.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie

Thiel, Christian (1992)
Zur Identität von {IP} und {ZK}.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie

V

Volkamer, Melanie ; Renaud, Karen ; Gerber, Paul (2016)
Spot the phish by checking the pruned URL.
In: Information and Computer Security, 24 (4)
doi: 10.1108/ICS-07-2015-0032
Article, Bibliographie

Volkamer, Melanie ; Renaud, Karen ; Reinheimer, Benjamin (2016)
TORPEDO: TOoltip-poweRed Phishing Email DetectiOn.
Ghent, Belgium
Conference or Workshop Item, Bibliographie

Vigil, Martín ; Demirel, Denise ; Habib, Sheikh Mahbub ; Hauke, Sascha ; Buchmann, Johannes ; Mühlhäuser, Max (2016)
LoT: a Reputation-based Trust System for Long-term Archiving.
Nice, France
Conference or Workshop Item, Bibliographie

Volkamer, Melanie ; Renaud, Karen ; Kulyk, Oksana ; Emeröz, Sinem
ed.: Foresti, Sara (2015)
A Socio-Technical Investigation into Smartphone Security.
Conference or Workshop Item, Bibliographie

Volkamer, Melanie ; Renaud, Karen ; Braun, Kristoffer ; Canova, Gamze ; Reinheimer, Benjamin
eds.: Conti, Mauro ; Schunter, Matthias ; Askoxylakis, Ioannis (2015)
Design and Field Evaluation of PassSec: Raising and Sustaining Web Surfer Risk Awareness.
Heraklion, Crete, Greece
doi: 10.1007/978-3-319-22846-4_7
Conference or Workshop Item, Bibliographie

Volkamer, Melanie ; Renaud, Karen ; Kulyk, Oksana ; Emeröz, Sinem (2015)
An Investigation into the "Other" Barriers to Adoption of Smartphone Security Precautions (Poor Usability being a Given).
Report, Bibliographie

Vigil, Martín ; Buchmann, Johannes ; Cabarcas, Daniel ; Weinert, Christian ; Wiesmaier, Alexander (2015)
Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: a survey.
In: Computers & Security, 50
Article, Bibliographie

Vigil, Martín ; Weinert, Christian ; Demirel, Denise ; Buchmann, Johannes (2014)
An efficient time-stamping solution for long-term digital archiving.
Austin, TX, USA
doi: 10.1109/PCCC.2014.7017099
Conference or Workshop Item, Bibliographie

Vieten, Jannik (2014)
Evaluierung des U-LP Verschlüsselungsverfahrens in der Praxis.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Vigil, Martín ; Weinert, Christian ; Braden, Kjell ; Demirel, Denise ; Buchmann, Johannes (2014)
A performance analysis of long-term archiving techniques.
Paris, France
Conference or Workshop Item, Bibliographie

Volkamer, Melanie ; Renaud, Karen
eds.: Fischlin, Marc ; Katzenbeisser, Stefan (2013)
Mental Models – General Introduction and Review of Their Application to Human-Centred Security.
In: Number Theory and Cryptography
doi: 10.1007/978-3-642-42001-6_18
Book Section, Bibliographie

Vigil, Martín ; Cabarcas, Daniel ; Huang, Jingwei ; Buchmann, Johannes (2013)
Assessing Trust in the Long-Term Protection of Documents.
Split, Croatia
Conference or Workshop Item, Bibliographie

Volkamer, Melanie ; Stockhardt, Simon ; Bartsch, Steffen ; Kauer, Michaela (2013)
Adopting the CMU/APWG Anti-Phishing Landing Page idea for Germany.
New Orleans, LA, USA
doi: 10.1109/STAST.2013.12
Conference or Workshop Item, Bibliographie

Volkamer, Melanie ; Bartsch, Steffen ; Kauer, Michaela
ed.: University Plymouth (2013)
Contextualized Security Interventions in Password Transmission Scenarios.
Lisbon, Spain
Conference or Workshop Item, Bibliographie

Vigil, Martín ; Custódio, Ricardo Felipe (2012)
Cleaning up the PKI for Long-term Signatures.
Curitiba PR, Brazil
Conference or Workshop Item, Bibliographie

Vigil, Martín ; Moecke, Cristian Thiago ; Custódio, Ricardo Felipe ; Volkamer, Melanie
eds.: De Capitani di Vimercati, Sabrina ; Mitchell, Chris (2012)
The Notary Based PKI -- A Lightweight PKI for Long-term Signatures on Documents.
Pisa, Italy
Conference or Workshop Item, Bibliographie

Vigil, Martín Gagliotti ; Cabarcas, Daniel ; Wiesmaier, Alexander ; Buchmann, Johannes (2012)
Authenticity, Integrity and Proof-of-Existence for Long-Term Archiving: a Survey.
In: IACR Cryptology ePrint Archive
Article, Bibliographie

Volkamer, Melanie ; Karayumak, Fatih ; Kauer, Michaela ; Halim, Dhanish ; Bruder, Ralph (2012)
Security versus Trust Indicators in 2011 in Germany.
Freiburg
Conference or Workshop Item, Bibliographie

Volkamer, Melanie ; Budurushi, Jurlind ; Demirel, Denise (2011)
Vote casting device with VV-SV-PAT for elections with complicated ballot papers.
Trento, Italy
doi: 10.1109/REVOTE.2011.6045910
Conference or Workshop Item, Bibliographie

Volkamer, Melanie ; Spycher, Oliver ; Dubuis, Eric (2011)
Measures to Establish Trust in Internet Voting.
Tallinn, Estonia
doi: 10.1145/2072069.2072071
Conference or Workshop Item, Bibliographie

Volkamer, Melanie ; Schryen, Guido (2010)
Measuring eTrust in distributed systems - General Concept and Application to Internet Voting.
Conference or Workshop Item, Bibliographie

Volkamer, Melanie (2010)
Evaluierungsverfahren für Internetwahlsysteme.
In: IT-Information Technology, 52 (3)
doi: 10.1524/itit.2010.0587
Article, Bibliographie

Volkamer, Melanie
eds.: Gutwirth, Serge ; Poullet, Yves ; Hert, Paul De (2010)
Data Protection in a Profiled World.
Book Section, Bibliographie

Volkamer, Melanie ; Schryen, Guido ; Langer, Lucie ; Schmidt, Axel ; Buchmann, Johannes
eds.: Fischer, Stefan ; Maehle, Erik ; Reischuk, Rüdiger (2009)
Elektronische Wahlen: Verifizierung vs. Zertifizierung.
Conference or Workshop Item, Bibliographie

Volkamer, Melanie ; Grimm, Rüdiger (2009)
Determine the Resilience of Evaluated Internet Voting Systems.
First International Workshop on Requirements Engineering for E-Voting Systems. (2009)
doi: 10.1109/RE-VOTE.2009.2
Conference or Workshop Item, Bibliographie

Volkamer, Melanie
eds.: Wagner, Dorothea ; Bernstein, Abraham (2009)
Evaluation von Internetwahlsystemen.
Conference or Workshop Item, Bibliographie

Volkamer, Melanie (2009)
Evaluation of Electronic Voting : Requirements and Evaluation Procedures to Support Responsible Election Authorities.
Book, Bibliographie

Vuillaume, Camille ; Okeya, Katsuyuki ; Dahmen, Erik ; Buchmann, Johannes
eds.: Chung, Kyo-Il ; Sohn, Kiwook ; Yung, Moti (2008)
Public Key Authentication with Memory Tokens.
Jeju Island, Korea
Conference or Workshop Item, Bibliographie

Velyanova, Veneta (2008)
An Analysis of the Neff's Voter Verifiable Election Scheme.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Velikov, Aleksandar (2008)
Provable Security of Merkle-Micciancio-Lyubashevsky's Signature.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Volkamer, Melanie ; Vogt, Roland (2008)
Basissatz von Sicherheitsanforderungen an Online-Wahlprodukte.
(BSI-PP-0037-2008)
Article, Bibliographie

Vizev, Nikolay Vasilev (2007)
Side Channel Attacks on NTRUEncrypt.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Volkamer, Melanie ; McGaley, Margaret (2007)
Requirements and Evaluation Procedures for eVoting.
Conference or Workshop Item, Bibliographie

Volkamer, Melanie ; Hauff, Harald (2007)
Zum Nutzen hoher Zertifizierungsstufen nach den Common Criteria (II).
In: Datenschutz und Datensicherheit, 10
Article, Bibliographie

Volkamer, Melanie ; Hauff, Harald (2007)
Zum Nutzen hoher Zertifizierungsstufen nach den Common Criteria (I).
In: Datenschutz und Datensicherheit, 9
Article, Bibliographie

Volkamer, Melanie ; Krimmer, Robert
eds.: Grönlund, Ake ; Scholl, Jochen ; Wimmer, Maria (2007)
Requirements and Evaluation Techniques for Online-Voting.
Conference or Workshop Item, Bibliographie

Volkamer, Melanie ; Krimmer, Robert ; Grimm, Rüdiger
eds.: Prosser, Alexander ; Parycek, Peter (2007)
Independent Audits of Remote Electronic Voting -- Developing a Common Criteria Protection Profile.
Conference or Workshop Item, Bibliographie

Velikova, Zaharina (2006)
A Lattice Attack on the McEliece Public Key Cryptosystem.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Volkamer, Melanie ; Alkassar, Ammar ; Sadeghi, Ahmad-Reza ; Schulz, Stefan (2006)
Enabling the Application of Open Systems like PCs for Online Voting.
In: Frontiers in Electronic Elections
doi: 10.5445/IR/1000081833
Book Section, Bibliographie

Volkamer, Melanie ; Krimmer, Robert (2006)
Secrecy forever? Analysis of Anonymity in Internet-based Voting Protocols.
Conference or Workshop Item, Bibliographie

Volkamer, Melanie ; Vogt, Roland (2006)
New Generation of Voting Machines in Germany The Hamburg Way to Verify Correctness.
Conference or Workshop Item, Bibliographie

Volkamer, Melanie ; Krimmer, Robert (2006)
Observing Voter's Anonymity: Guide on how to Observe Electronic Voting.
Report, Bibliographie

Volkamer, Melanie ; Reinhard, Walter ; Vogt, Roland
ed.: Dittmann, Jana (2006)
FUSE - ein Internetwahlsystem für zeitlich unbegrenzt geheime Betriebswahlen.
Conference or Workshop Item, Bibliographie

Volkamer, Melanie ; Krimmer, Robert (2006)
Die Online-Wahl auf dem Weg zum Durchbruch.
In: Informatik Spektrum, 29 (2)
Article, Bibliographie

Vogt, Holger (2004)
Fairer Austausch.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication

Vuillaume, Camille (2004)
Side Channel Attacks on Elliptic Curve Cryptosystems.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Volkamer, Melanie ; Hutter, Dieter
eds.: Prosser, Alexander ; Krimmer, Robert (2004)
From Legal Principles to an Internet Voting System.
Conference or Workshop Item, Bibliographie

Vollmer, Ulrich (2003)
A note on the hermite basis computation of large integer matrices.
Philadelphia, PA, USA
Conference or Workshop Item, Bibliographie

Vollmer, Ulrich (2003)
A note on the hermite basis computation of large integer matrices.
Report, Bibliographie

Vollmer, Ulrich (2003)
Rigorously Analyzed Algorithms for the Discrete Logarithm Problem in Quadratic Number Fields.
Technische Universität Darmstadt
Ph.D. Thesis, Bibliographie

Vuillaume, Camille (2003)
Efficiency Comparison of Several {RSA} Variants.
Other, Bibliographie

Vollmer, Ulrich (2002)
An accelerated Buchmann algorithm for regulator computation in real quadratic fields.
Report, Bibliographie

Vollmer, Ulrich (2002)
An accelerated Buchmann algorithm for regulator computation in real quadratic fields.
Conference or Workshop Item, Bibliographie

Valentin, Christian (2001)
Ein verteilter Zeitstempeldienst basierend auf {RSA} in {Java}.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie

Vest, Torsten (2001)
Design und Implementierung eines {CSP} zur Anbindung der {JCA} an die Microsoft {CryptoAPI}.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie

Vollmer, Ulrich (2000)
Asymptotically Fast Discrete Logarithms in Quadratic Number Fields.
Leiden, The Netherlands
Conference or Workshop Item, Bibliographie

Vollmer, Ulrich (2000)
Asymptotically Fast Discrete Logarithms in Quadratic Number Fields.
Report, Bibliographie

W

Wunderer, Thomas ; Burger, Michael ; Nguyen, Giang Nam (2018)
Parallelizing the Hybrid Lattice Reduction and Meet-in-the-Middle Attack.
CSE 2018 – 21st IEEE International Conference on Computational Science and Engineering. Faculty of Automatic Control and Computers, University Politehnica of Bucharest, Romania (29.-31.10.2018)
Conference or Workshop Item, Bibliographie

Wunderer, Thomas (2018)
A Detailed Analysis of the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack.
In: Journal of Mathematical Cryptology (JMC)
Article, Bibliographie

Wunderer, Thomas ; Wang, Yuntao (2018)
Revisiting the Sparsification Technique in Kannan’s Embedding Attack on LWE.
14th International Conference on Information Security Practice and Experience (ISPEC 2018).
Conference or Workshop Item, Bibliographie

Wunderer, Thomas (2018)
On the Security of Lattice-Based Cryptography Against Lattice Reduction and Hybrid Attacks.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication

Weinert, Christian ; Demirel, Denise ; Vigil, Martín ; Geihs, Matthias ; Buchmann, Johannes (2017)
MoPS: A Modular Protection Scheme for Long-Term Storage.
doi: 10.1145/3052973.3053025
Conference or Workshop Item, Bibliographie

Wunderer, Thomas (2016)
Revisiting the Hybrid Attack: Improved Analysis and Refined Security Estimates.
In: Cryptology ePrint Archive, 2016 (733)
Article, Bibliographie

Weinert, Christian (2016)
Building a Modular Long-Term Archiving System.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Wolf, Peter ; Barrat, Jordi ; Bolo, Eden ; Bravo, Alejandro ; Krimmer, Robert ; Neumann, Stephan ; Parreño, Al ; Schürmann, Carsten ; Volkamer, Melanie (2015)
Certification of ICTs in Elections.
Book, Bibliographie

Wiesmaier, Alexander ; Braun, Johannes ; Horsch, Moritz (2014)
Method and system for secure access of a first computer to a second computer.
Norm, patent, standard, Bibliographie

Weinert, Christian (2013)
Content Integrity System and Notarisation for Long-Term Protection of Data Objects.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Wich, Tobias ; Horsch, Moritz ; Petrautzki, Dirk ; Schmölz, Johannes ; Wieland, Thomas ; Potzernheim, Simon (2013)
An extensible platform for eID, signatures and more.
Kloster Banz, Germany
Conference or Workshop Item, Bibliographie

Weiden, Patrick ; Hülsing, Andreas ; Cabarcas, Daniel ; Buchmann, Johannes (2013)
Instantiating Treeless Signature Schemes.
In: Cryptology ePrint Archive, 2013 (65)
Article, Bibliographie

Wälde, Julian (2013)
Algebraic Cryptanalysis of Round Reduced Versions of CSA and the LED Family of Block Ciphers.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Werlang, Felipe ; Vigil, Martín ; Custódio, Ricardo Felipe (2013)
A User-Centric Digital Signature Scheme.
Conference or Workshop Item, Bibliographie

Walter, Michael ; Bulygin, Stanislav ; Buchmann, Johannes
eds.: Kutylowski, Miroslaw ; Yung, Moti (2012)
Optimizing Guessing Strategies for Algebraic Cryptanalysis with Applications to EPCBC.
Beijing, China
Conference or Workshop Item, Bibliographie

Walter, Michael (2012)
Algebraic methods in analyzing lightweight cryptographic symmetric primitives.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Warta, Simon (2011)
Deriving Signature Schemes from Public-Key Cryptosystems.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Wiesmaier, Alexander ; Horsch, Moritz ; Braun, Johannes ; Kiefer, Franziskus ; Hühnlein, Detlef ; Strenzke, Falko ; Buchmann, Johannes
eds.: Cheung, Bruce ; Hui, Lucas Chi Kwong ; Sandhu, Ravi ; Wong, Duncan (2011)
An efficient mobile PACE implementation.
Hong Kong
doi: 10.1145/1966913.1966936
Conference or Workshop Item, Bibliographie

Weiner, Michael ; Tews, Erik ; Heinz, Benedikt ; Heyszl, Johann (2010)
FPGA Implementation of an Improved Attack Against the DECT Standard Cipher.
Seoul, Korea
Conference or Workshop Item, Bibliographie

Weinmann, Ralf-Philipp (2009)
Algebraic Methods in Block Cipher Cryptanalysis.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication

Wiesmaier, Alexander (2009)
Secure private key management in adaptable public key infrastructures.
Book, Bibliographie

Weber, Pia (2008)
Einsatzgebiete Digitaler Signaturen.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Weber, Stefan (2008)
Coercion-Resistant Cryptographic Voting: Implementing Free and Secret Electronic Elections.
Book, Bibliographie

Weber, Stefan Georg ; Araujo, Roberto ; Buchmann, Johannes (2007)
On coercion-resistant electronic elections with linear work.
In: The Second International Conference on Availability, Reliability and Security, 2007 : ARES 2007 ; 2nd International Workshop Dependability and Security in e-Government (DeSeGov 2007)...ISBN 0-7695-2775-2, 978-0-7695-2775-8 [Online-Ressource]
Book Section, Bibliographie

Weber, Stefan ; Araújo, Roberto ; Buchmann, Johannes (2007)
On Coercion-Resistant Electronic Elections with Linear Work.
In: >ares, 1
doi: 10.1109/ARES.2007.108
Article, Bibliographie

Wiesmaier, Alexander ; Rauchschwalbe, Ulrich ; Ludwig, Christoph ; Henhapl, Birgit ; Ruppert, Markus ; Buchmann, Johannes (2006)
Intrinsically Legal-For-Trade Objects by Digital Signatures.
Magdeburg
Conference or Workshop Item, Bibliographie

Wiesmaier, Alexander ; Ludwig, Christoph ; Rauchschwalbe, Ulrich ; Henhapl, Birgit ; Ruppert, Markus ; Buchmann, Johannes (2006)
Intrinsically Legal-For-Trade Objects by Digital Signatures.
Darmstadt
Conference or Workshop Item, Bibliographie

Weber, Stefan (2006)
A Coercion-Resistant Cryptographic Voting Protocol - Evaluation and Prototype Implementation.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Wiesmaier, Alexander (2006)
The State of the Art in Algorithmic Encryption.
Report, Bibliographie

Weber, Stefan (2006)
A Coercion-Resistant Cryptographic Voting Protocol - Evaluation and Prototype Implementation.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Wiesmaier, Alexander ; Karatsiolis, Vangelis ; Lippert, Marcus ; Buchmann, Johannes (2005)
The Workshop - Implementing Well Structured Enterprise Applications.
Las Vegas, Nevada, USA
Conference or Workshop Item, Bibliographie

Wiesmaier, Alexander ; Lippert, Marcus ; Karatsiolis, Vangelis ; Raptis, Georgios ; Buchmann, Johannes (2005)
An Evaluated Certification Services System for the German National Root CA - Legally binding and trustworthy Transactions in E-Business and E-Government.
Las Vegas, Nevada, USA
Conference or Workshop Item, Bibliographie

Wirt, Kai (2005)
Fault Attack on the {DVB} Common Scrambling Algorithm.
Singapore
doi: 10.1007/11424826_61
Conference or Workshop Item, Bibliographie

Wiesmaier, Alexander ; Fischer, Mike ; Lippert, Marcus ; Buchmann, Johannes (2005)
Outflanking and Securely Using the PIN/TAN-System.
Las Vegas, Nevada, USA
Conference or Workshop Item, Bibliographie

Weinmann, Ralf-Philipp (2005)
3. Krypto-Tag - Workshop über Kryptographie.
Report, Bibliographie

Weinmann, Ralf-Philipp ; Wirt, Kai (2005)
Analysis of the {DVB} Common Scrambling Algorithm.
doi: 10.1007/b105674
Conference or Workshop Item, Bibliographie

Wiesmaier, Alexander ; Lippert, Marcus ; Karatsiolis, Vangelis (2004)
The Key Authority - Secure Key Management in Hierarchical Public Key Infrastructures.
Las Vegas, Nevada, USA
Conference or Workshop Item, Bibliographie

Weimer, Daniel (2004)
An Adaption of the {NICE} Crytosystem to Real Quadratic Orders.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Wolthusen, Stephen (2003)
A Model-Independent Security Architecture for Distributed Heterogeneous Systems.
Technische Universität Darmstadt
Ph.D. Thesis, Bibliographie

Winkler, Markus (2002)
Analyse der {Enterprise-Java-Beans} Spezifikation Version 2.0 als Basis für {FlexiTRUST}.
Other, Bibliographie

Wahrenbruch, Thomas (2001)
Elliptische Kurven Kryptographie auf {Java} Cards.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Wiesmaier, Alexander (2001)
{FlexiTRUST CA} Ein flexibles, skalierbares und dynamisch erweiterbares Trustcenter.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie

Wetzel, Susanne (1998)
Lattice Basis Reduction Algorithms and their Applications.
Universität des Saarlandes
Ph.D. Thesis, Bibliographie

Weber, Damian (1997)
Diskrete Logarithmen in {GF(p)} mit dem Number Field Sieve.
Universität des Saarlandes
Ph.D. Thesis, Bibliographie

Weber, Damian (1996)
Computing Discrete Logarithms with the General Number Field Sieve.
Talence, France
Conference or Workshop Item, Bibliographie

Weber, Damian (1995)
An Implementation of the General Number Field Sieve to Compute Discrete Logarithms mod p.
Saint-Malo, France
Conference or Workshop Item, Bibliographie

Wiese, Kay (1994)
Parallelisierung von {LLL}-Algorithmen zur Gitterbasisreduktion.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie

Weber, Damian (1993)
Ein Algorithmus zur Zerlegung von Primzahlen in Primideale.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie

Wellner, Ingrid (1990)
Zur Theorie der Zero Knowledge Proofs.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie

Y

Yousfi Alaoui, Sidi Mohamed el ; Bansarkhani, Rachid El ; Cayrel, Pierre-Louis ; Hoffmann, Gerhard (2013)
Code based Identification and Signature Schemes in Software.
University of Regensburg, Regensburg, Germany
Conference or Workshop Item, Bibliographie

Yousfi Alaoui, Sidi Mohamed el (2013)
Code-based Identification and Signature Schemes.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication

Yousfi Alaoui, Sidi Mohamed el ; Cayrel, Pierre-Louis ; Meziani, Mohammed
eds.: Kim, Tai-Hoon ; Adeli, Hojjat ; Robles, Rosslin John ; Balitanas, Maricel (2011)
Improved Identity-Based Identification and Signature Schemes Using Quasi-Dyadic Goppa Codes.
Conference or Workshop Item, Bibliographie

Yoseph, Berhane (2007)
Gegenmaßnahmen zu Seitenkanalangriffen.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie

Yousfi Alaoui, Sidi Mohamed el (2007)
Konstruktion von Hashfunktionen.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Z

Zibuschka, Jan ; Horsch, Moritz ; Kubach, Michael
eds.: Roßnagel, Heiko ; Wagner, Sven ; Hühnlein, Detlef (2019)
The ENTOURAGE Privacy and Security Reference Architecture for Internet of Things Ecosystems.
Garmisch-Partenkirchen (28.-29.03.2019)
Conference or Workshop Item, Bibliographie

Zhang, Qi (2015)
Mutant Algebraic Side-Channel Attack.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Zhang, Jiang ; Zhang, Zhenfeng ; Ding, Jintai ; Snook, Michael ; Dagdelen, Özgür (2015)
Authenticated Key Exchange from Ideal Lattices.
Sofia, Bulgaria
Conference or Workshop Item, Bibliographie

Zörkler, Jens (2003)
Einführung einer Public-Key-Infrastruktur in einer Universität.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie

Zieschang, Thilo (1997)
Combinatorial Properties of Basic Encryption Operations.
Konstanz, Germany
Conference or Workshop Item, Bibliographie

Zieschang, Thilo (1997)
Finite groups and graphs in cryptanalysis.
Technische Universität Darmstadt
Ph.D. Thesis, Bibliographie

Zieschang, Thilo (1997)
On the Number of Cycles in Permutations.
Report, Bibliographie

Zieschang, Thilo (1997)
Security Properties of Public Key Certification Networks.
Report, Bibliographie

Zieschang, Thilo (1996)
Combinatorial Properties of Basic Encryption Operations.
Report, Bibliographie

Zieschang, Thilo (1996)
Breaking an Oblivious Transfer with Low Exponents.
Report, Bibliographie

Zayer, Jörg (1995)
Faktorisieren mit dem Number Field Sieve.
Universität des Saarlandes
Ph.D. Thesis, Bibliographie

Zayer, Jörg (1991)
Die Theorie des Number Field Sieve.
Universität des Saarlandes
Diploma Thesis or Magisterarbeit, Bibliographie

This list was generated on Thu Feb 22 01:27:47 2024 CET.