TU Darmstadt / ULB / TUbiblio

Items in division

Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Date | Item Type | Language | No Grouping
Jump to: A | B | C | D | H | K | M | N | P | S | T | W | Z
Number of items at this level (without sub-levels): 42.

A

Alkeilani Alkadri, Nabil (2015):
Post-Quantum Commitment Schemes.
Darmstadt, Technische Universität, [Master Thesis]

B

Bindel, Nina (2018):
On the Security of Lattice-Based Signature Schemes in a Post-Quantum World.
Darmstadt, Technische Universität,
[Ph.D. Thesis]

Buchmann, Johannes ; Lauter, Kristin ; Mosca, Michele (2017):
Postquantum Cryptography - State of the Art.
In: IEEE Security & Privacy, 15, pp. 12-13. [Article]

Butin, Denis (2017):
Hash-Based Signatures: State of Play.
In: IEEE Security & Privacy, 15 (4), pp. 37-43. DOI: 10.1109/MSP.2017.3151334,
[Article]

Bansarkhani, Rachid El ; El Kaafarani, Ali (2016):
Post-Quantum Attribute-Based Signatures from Lattice Assumptions.
In: Cryptology ePrint Archive, 2016 (823), pp. 1-28. International Association for Cryptologic Research (IACR), [Article]

Bansarkhani, Rachid El ; Dagdelen, Özgür ; Buchmann, Johannes (2015):
Augmented Learning with Errors: The Untapped Potential of the Error Term.
In: Financial Cryptography and Data Security - 19th International Conference, FC 2015, Puerto Rico, January 26 - 30, 2015, p. 20,
Springer, Isla Verde, Puerto Rico, [Conference or Workshop Item]

Bansarkhani, Rachid El ; Buchmann, Johannes (2015):
High Performance Lattice-based CCA-secure Encryption.
In: Cryptology ePrint Archive, p. 20. [Article]

Butin, Denis ; Gazdag, Stefan-Lukas ; Buchmann, Johannes (2015):
Real-World Post-Quantum Digital Signatures.
In: Cybersecurity & Privacy Innovation Forum (CSP Forum 2015),
Springer CCIS, Brussels, Belgium, [Conference or Workshop Item]

Braun, Johannes ; Kiefer, Franziskus ; Hülsing, Andreas
Katsikas, Sokratis ; Agudo, Isaac (eds.) (2013):
Revocation & Non-Repudiation: When the first destroys the latter.
In: LNCS, In: Public Key Infrastructures, Services and Applications - EuroPKI 2013, pp. 31-46,
Springer Berlin Heidelberg, RHUL, Egham, UK, ISBN 978-3-642-53996-1,
DOI: 10.1007/978-3-642-53997-8_3,
[Conference or Workshop Item]

Bouyukliev, Iliya ; Bulygin, Stanislav ; Martínez-Moro, Edgar
Bouyukliev, Iliya ; Bulygin, Stanislav ; Martínez-Moro, Edgar (eds.) (2013):
Foreword: computer algebra in coding theory and cryptography.
24, In: Applicable Algebra in Engineering, Communication and Computing, pp. 157 - 158, Springer, DOI: 10.1007/s00200-013-0199-7,
[Book Section]

Buchmann, Johannes ; Dahmen, Erik ; Ereth, Sarah ; Hülsing, Andreas ; Rückert, Markus (2013):
On the security of the Winternitz one-time signature scheme.
In: International Journal of Applied Cryptography, 3 (1), pp. 84-96. [Article]

Busold, Christoph (2012):
Hash-based Signatures on Smart Cards.
TU Darmstadt, [Master Thesis]

Bansarkhani, Rachid El ; Meziani, Mohammed (2012):
An Efficient Lattice-based Secret Sharing Construction.
In: LNCS, In: WISTP - Workshop in Information Security Theory and Practice 2012,
Springer, London, UK, [Conference or Workshop Item]

Buchmann, Johannes ; Dahmen, Erik ; Hülsing, Andreas
Yang, Bo-Yin (ed.) (2011):
XMSS - A Practical Forward Secure Signature Scheme based on Minimal Security Assumptions.
In: Lecture Notes in Computer Science - LNCS, In: Post-Quantum Cryptography - Proceedings of PQCrypto 2011, pp. 117-129,
Springer Berlin / Heidelberg, ISBN 978-3-642-25404-8,
DOI: 10.1007/978-3-642-25405-5_8,
[Conference or Workshop Item]

Buchmann, Johannes ; Dahmen, Erik ; Ereth, Sarah ; Hülsing, Andreas ; Rückert, Markus
Nitaj, Abderrahmane ; Pointcheval, David (eds.) (2011):
On the security of the Winternitz one-time signature scheme.
In: Lecture Notes in Computer Science (LNCS), In: Progress in Cryptology - AFRICACRYPT 2011, pp. 363-378,
Springer Berlin / Heidelberg, Dakar, Senegal, ISBN 978-3-642-21968-9,
DOI: 10.1007/978-3-642-21969-6_23,
[Conference or Workshop Item]

C

Cabarcas, Daniel ; Demirel, Denise ; Göpfert, Florian ; Lancrenon, Jean ; Wunderer, Thomas (2015):
An Unconditionally Hiding and Long-Term Binding Post-Quantum Commitment Scheme.
[Report]

D

Demirel, Denise ; Lancrenon, Jean (2015):
How to Securely Prolong the Computational Bindingness of Pedersen Commitments.
[Report]

Ding, Jintai ; Petzoldt, Albrecht ; Wang, Lih-Chung (2014):
The Cubic Simple Matrix Encryption Scheme.
In: LNCS, In: PQCrypto 2014, pp. 76-87,
Springer, Waterloo, Canada, [Conference or Workshop Item]

Dagdelen, Özgür ; Schneider, Michael (2010):
Parallel Enumeration of Shortest Lattice Vectors.
In: LNCS, 6272, In: Euro-Par 2010, pp. 211-222,
Springer, [Conference or Workshop Item]

H

Hamann, Tobias (2013):
The BKZ Simulation Algorithm.
Tu Darmstadt, [Master Thesis]

Hülsing, Andreas ; Braun, Johannes (2013):
Langzeitsichere Signaturen durch den Einsatz hashbasierter Signaturverfahren.
In: Informationssicherheit stärken - Vertrauen in die Zukunft schaffen. Tagungsband zum 13. Deutschen IT-Sicherheitskongress, pp. 565-576,
SecuMedia Verlag, Bonn, ISBN 978-3-922746-95-9,
[Conference or Workshop Item]

Hülsing, Andreas (2013):
WOTS+ - Shorter Signatures for Hash-Based Signature Schemes.
In: Africa Crypt 2013,
Cairo, Egypt, [Conference or Workshop Item]

Hülsing, Andreas ; Rausch, L. ; Buchmann, Johannes (2013):
Optimal Parameters for XMSS^MT.
In: LNCS, In: MoCrySEn 2013, pp. 194-208, Springer, [Book Section]

Hornschuch, Marian (2012):
Multivariate-based identification and signature schemes with additional properties.
Darmstadt, Technische Universität, [Bachelor Thesis]

Hülsing, Andreas ; Busold, Christoph ; Buchmann, Johannes
Knudsen, Lars ; Wu, Huapeng (eds.) (2012):
Forward Secure Signatures on Smart Cards.
In: LNCS, In: SAC2012 - Conference on Selected Areas in Cryptography, pp. 66-80,
Springer Berlin Heidelberg, Windsor, Canada, ISBN 978-3-642-35998-9,
DOI: 10.1007/978-3-642-35999-6_5,
[Conference or Workshop Item]

Hülsing, Andreas ; Petzoldt, Albrecht ; Schneider, Michael ; Alaoui, Sidi Mohamed El Yousfi
Waldmann, Ulrich (ed.) (2012):
Post-Quantum Signaturverfahren Heute.
In: 22. SIT-Smartcard Workshop 2012,
Fraunhofer Verlag Stuttgart, ISBN 978-3-8396-0347-5,
[Conference or Workshop Item]

Hermans, Jens ; Schneider, Michael ; Buchmann, Johannes ; Vercauteren, Frederik ; Preneel, Bart
Bernstein, Daniel ; Lange, Tanja (eds.) (2010):
Parallel Shortest Lattice Vector Enumeration on Graphics Cards.
In: LNCS, 6055, In: Africacrypt 2010, pp. 52-68,
Springer, Stellenbpsch, South Africa, [Conference or Workshop Item]

K

Kuo, Po-Chun ; Schneider, Michael ; Dagdelen, Özgür ; Reichelt, Jan ; Buchmann, Johannes ; Cheng, Chen-Mou ; Yang, Bo-Yin
Preneel, Bart ; Takagi, Tsuyoshi (eds.) (2011):
Extreme Enumeration on GPU and in Clouds - How Many Dollars You Need to Break SVP Challenges -.
In: LNCS, In: Workshop on Cryptographic Hardware and Embedded Systems - CHES 2011, pp. 176-191,
Springer, [Conference or Workshop Item]

M

Mulholland, John ; Mosca, Michele ; Braun, Johannes (2017):
The Day the Cryptography Dies.
In: IEEE Security & Privacy, 15 (4), pp. 14-21. DOI: 10.1109/MSP.2017.3151325,
[Article]

Mohamed, Mohamed Saied Emam ; Bansarkhani, Rachid El ; Petzoldt, Albrecht (2016):
MQSAS - A Multivariate Sequential Aggregate Signature Scheme.
In: ISC 2016 - The 19th Information Security Conference, pp. 426-440,
Springer LNCS, Honolulu, Hi, USA, [Conference or Workshop Item]

Meziani, Mohammed ; Hoffmann, Gerhard ; Cayrel, Pierre-Louis (2012):
Improving the Performance of the SYND Stream Cipher.
In: LNCS, In: AfricaCrypt 2012,
Springer, Al Akhawayn University, Ifran, Morocco, [Conference or Workshop Item]

Milde, Benjamin ; Schneider, Michael (2011):
A Parallel Implementation of GaussSieve for the Shortest Vector Problem in Lattices.
In: PaCT 2011,
[Conference or Workshop Item]

N

Niebuhr, Robert ; Meziani, Mohammed ; Bulygin, Stanislav ; Buchmann, Johannes (2012):
Selecting Parameters for Secure McEliece-based Cryptosystems.
In: International Journal of Information Security, 11 (3), pp. 137-147. [Article]

P

Petzoldt, Albrecht ; Bulygin, Stanislav ; Buchmann, Johannes (2013):
A multivariate based threshold ring signature scheme.
In: Applicable Algebra in Engineering, Communication and Computing, 24 (3 - 4), pp. 255 - 275. DOI: 10.1007/s00200-013-0190-3,
[Article]

Petzoldt, Albrecht ; Bulygin, Stanislav ; Buchmann, Johannes
Gaborit, Philippe (ed.) (2013):
Fast Verification for Improved Versions of the UOV and Rainbow Signature Schemes.
In: LNCS, In: Fifth International Conference on Post-Quantum Cryptography - PQCrypto 2013, pp. 188-202,
Springer, Limoges, France, ISBN 978-3-642-38615-2,
[Conference or Workshop Item]

Petzoldt, Albrecht ; Bulygin, Stanislav (2012):
Linear Recurring Sequences for the UOV Key Generation Revisited.
In: Lecture Notes in Computer Science, In: The 15th Annual International Conference on Information Security and Cryptology (ICISC 2012), pp. 441-455,
Springer 2013, Seoul, Korea, ISBN 978-3-642-37681-8,
[Conference or Workshop Item]

Petzoldt, Albrecht ; Thomae, Enrico ; Bulygin, Stanislav ; Wolf, Christopher
Preneel, Bart ; Takagi, Tsuyoshi (eds.) (2011):
Small Public Keys and Fast Verification for Multivariate Quadratic Public Key Systems.
In: Lecture Notes in Computer Science, 6917, In: Proceedings of "Workshop on Cryptographic Hardware and Embedded Systems 2011 (CHES 2011)", pp. 475-490,
Springer, [Conference or Workshop Item]

S

Schneider, Michael ; Göttert, Norman
Preneel, Bart ; Takagi, Tsuyoshi (eds.) (2011):
Random Sampling for Short Lattice Vectors on Graphics Cards.
In: LNCS, In: Workshop on Cryptographic Hardware and Embedded Systems 2011 (CHES 2011), pp. 160-175,
Springer, Nara, Japan, DOI: 10.1007/978-3-642-23951-9_11,
[Conference or Workshop Item]

Schneider, Michael (2011):
Analysis of Gauss-Sieve for Solving the Shortest Vector Problem in Lattices.
In: LNCS, 6552, In: WALCOM 2011, pp. 89-97,
Springer, [Conference or Workshop Item]

T

Tao, Chengdong ; Xiang, Hong ; Petzoldt, Albrecht ; Ding, Jintai (2015):
Simple Matrix - A Multivariate Public Key Cryptosystem (MPKC) for Encryption.
In: Finite Fields and Their Applications, (35), pp. 352-368. [Article]

W

Wunderer, Thomas (2018):
On the Security of Lattice-Based Cryptography Against Lattice Reduction and Hybrid Attacks.
Darmstadt, Technische Universität,
[Ph.D. Thesis]

Z

Zhang, Jiang ; Zhang, Zhenfeng ; Ding, Jintai ; Snook, Michael ; Dagdelen, Özgür (2015):
Authenticated Key Exchange from Ideal Lattices.
In: EUROCRYPT 2015,
Sofia, Bulgaria, [Conference or Workshop Item]

This list was generated on Sun Aug 1 00:52:10 2021 CEST.