TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 20.

Möller, Bodo (2003)
Improved Techniques for Fast Exponentiation.
Conference or Workshop Item, Bibliographie

Möller, Bodo (2003)
Public-Key Cryptography.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication

Möller, Bodo (2003)
Provably Secure Public-Key Encryptionfor Length-Preserving Chaumian Mixes.
San Francisco, CA, USA
Conference or Workshop Item, Bibliographie

Möller, Bodo (2003)
Improved Techniques for Fast Exponentiation.
Seoul, Korea
Conference or Workshop Item, Bibliographie

Möller, Bodo (2003)
Improved techniques for fast exponentiation.
Conference or Workshop Item, Bibliographie

Möller, Bodo (2003)
Public key cryptography.
Technische Universität Darmstadt
Ph.D. Thesis, Bibliographie

Möller, Bodo (2003)
Public-Key Cryptography - Theory and Practice.
Technische Universität Darmstadt
Ph.D. Thesis, Bibliographie

Izu, Tetsuya ; Möller, Bodo ; Takagi, Tsuyoshi (2002)
Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks.
Hyderabad, India
Conference or Workshop Item, Bibliographie

Möller, Bodo (2002)
Parallelizable Elliptic Curve Point Multiplication Method with Resistance against Side-Channel Attacks.
Sao Paulo, Brazil
Conference or Workshop Item, Bibliographie

Izu, Tetsuya ; Möller, Bodo ; Takagi, Tsuyoshi (2002)
Improved elliptic curve multiplication methods resistant against side channel attacks.
Conference or Workshop Item, Bibliographie

Möller, Bodo (2002)
Parallelizable elliptic curve point multiplication method with resistance against side-channel attacks.
Conference or Workshop Item, Bibliographie

Möller, Bodo (2002)
Provably secure public key encryption for length preserving Chaumian mixes.
Book, Bibliographie

Möller, Bodo (2002)
Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes.
Report, Bibliographie

Möller, Bodo (2001)
Securing Elliptic Curve Point Multiplication against Side-Channel Attacks.
Malaga, Spain
Conference or Workshop Item, Bibliographie

Möller, Bodo (2001)
Algorithms for multi-exponentiation.
Book, Bibliographie

Möller, Bodo (2001)
Securing elliptic curve point multiplication against side-channel attacks.
In: Information security - ISC 2001. Hrsg.: G.I. Davida, Y. Frankel. - Berlin [u.a.]: Springer, 2001 (Lecture notes in computer science; 2000). S. 324-334
Book Section, Bibliographie

Hamdy, Safuat ; Möller, Bodo (2000)
Security of Cryptosystems Based on Class Groups of Imaginary Quadratic Orders.
Kyoto, Japan
Conference or Workshop Item, Bibliographie

Möller, Bodo (2000)
Sicherheit durch Open Source.
Conference or Workshop Item, Bibliographie

Buchmann, Johannes ; Maurer, Markus ; Möller, Bodo (2000)
Cryptography Based on Number Fields with Large Regulator.
Report, Bibliographie

Hamdy, Safuat ; Möller, Bodo (2000)
Security of Crytosystems Based on Class Groups of Imaginary Quadratic Orders.
Report, Bibliographie

This list was generated on Tue Feb 27 01:49:47 2024 CET.