150 Publications

2023 | Mastersthesis | LibreCat-ID: 40440
Updatable Privacy-Preserving Reputation System based on Blockchain
M. Pilot, Updatable Privacy-Preserving Reputation System Based on Blockchain, 2023.
LibreCat
 
2023 | Mastersthesis | LibreCat-ID: 43374 | OA
A Formal Comparison of Advanced Digital Signature Primitives
P. Schürmann, A Formal Comparison of Advanced Digital Signature Primitives, 2023.
LibreCat | Files available
 
2023 | Conference Paper | LibreCat-ID: 44855
Designing Business Reputation Ecosystems — A Method for Issuing and Trading Monetary Ratings on a Blockchain
S. Hemmrich, J. Bobolz, D. Beverungen, J. Blömer, in: ECIS 2023 Research Papers, 2023.
LibreCat | Files available | Download (ext.)
 
2023 | Journal Article | LibreCat-ID: 45192
Time-Optimal Construction of Overlays
T. Götte, K. Hinnenthal, C. Scheideler, J. Werthmann, Distributed Computing (2023).
LibreCat | DOI
 
2023 | Bachelorsthesis | LibreCat-ID: 43375 | OA
Privacy-Preserving Collection and Evaluation of Log Files
A. Koch, Privacy-Preserving Collection and Evaluation of Log Files, 2023.
LibreCat | Files available
 
2023 | Book Chapter | LibreCat-ID: 45891 | OA
Robustness and Security
J. Blömer, F. Eidens, T. Jager, D. Niehues, C. Scheideler, in: C.-J. Haake, F. Meyer auf der Heide, M. Platzner, H. Wachsmuth, H. Wehrheim (Eds.), On-The-Fly Computing -- Individualized IT-Services in Dynamic Markets, Heinz Nixdorf Institut, Universität Paderborn, Paderborn, 2023, pp. 145–164.
LibreCat | Files available | DOI
 
2023 | Bachelorsthesis | LibreCat-ID: 46053
Utilizing Redundancy in Distributed Heterogeneous Storage
F. Schneider, Utilizing Redundancy in Distributed Heterogeneous Storage, 2023.
LibreCat | Files available
 
2023 | Book | LibreCat-ID: 45863 | OA
On-The-Fly Computing -- Individualized IT-services in dynamic markets
C.-J. Haake, F. Meyer auf der Heide, M. Platzner, H. Wachsmuth, H. Wehrheim, On-The-Fly Computing -- Individualized IT-Services in Dynamic Markets, Heinz Nixdorf Institut, Universität Paderborn, Paderborn, 2023.
LibreCat | Files available | DOI
 
2023 | Conference Paper | LibreCat-ID: 35014 | OA LibreCat | Download (ext.)
 
2023 | Conference Paper | LibreCat-ID: 43458 | OA LibreCat | Download (ext.)
 
2022 | Bachelorsthesis | LibreCat-ID: 30198
Aufarbeitung und lmplementierung von DAG-Rider
S. Korzeczek, Aufarbeitung Und Lmplementierung von DAG-Rider, 2022.
LibreCat
 
2022 | Bachelorsthesis | LibreCat-ID: 32399
Modelling and Proving Security for a Secure MPC Protocol for Stable Matching
E. Vahle, Modelling and Proving Security for a Secure MPC Protocol for Stable Matching, 2022.
LibreCat
 
2022 | Conference Paper | LibreCat-ID: 32602
The Structural Power of Reconfigurable Circuits in the Amoebot Model
A. Padalkin, C. Scheideler, D. Warner, in: T.E. Ouldridge, S.F.J. Wickham (Eds.), 28th International Conference on DNA Computing and Molecular Programming (DNA 28), Schloss Dagstuhl – Leibniz-Zentrum für Informatik, Dagstuhl, Germany, 2022, p. 8:1–8:22.
LibreCat | DOI
 
2022 | Conference Paper | LibreCat-ID: 32603
Fault-Tolerant Shape Formation in the Amoebot Model
I. Kostitsyna, C. Scheideler, D. Warner, in: T.E. Ouldridge, S.F.J. Wickham (Eds.), 28th International Conference on DNA Computing and Molecular Programming (DNA 28), Schloss Dagstuhl – Leibniz-Zentrum für Informatik, Dagstuhl, Germany, 2022, p. 9:1–9:22.
LibreCat | DOI
 
2022 | Bachelorsthesis | LibreCat-ID: 32398
Bringing Structure to Structure-Preserving Signatures: Overview, Implementation and Comparison of Selected SPS Schemes
H. Siek, Bringing Structure to Structure-Preserving Signatures: Overview, Implementation and Comparison of Selected SPS Schemes, 2022.
LibreCat
 
2022 | Mastersthesis | LibreCat-ID: 31485
On Transforming Lattice-Based Cryptography to the Ring Setting
P. Kramer, On Transforming Lattice-Based Cryptography to the Ring Setting, 2022.
LibreCat
 
2022 | Dissertation | LibreCat-ID: 29763 | OA
More Efficient Techniques for Adaptively-Secure Cryptography
D. Niehues, More Efficient Techniques for Adaptively-Secure Cryptography, 2022.
LibreCat | Files available | DOI | Download (ext.)
 
2022 | Conference Paper | LibreCat-ID: 33240
Brief Announcement: The (Limited) Power of Multiple Identities: Asynchronous Byzantine Reliable Broadcast with Improved Resilience through Collusion
T. Götte, C. Scheideler, in: K. Agrawal, I.-T.A. Lee (Eds.), SPAA ’22: 34th ACM Symposium on Parallelism in Algorithms and Architectures, Philadelphia, PA, USA, July 11 - 14, 2022, ACM, 2022, pp. 99–101.
LibreCat | DOI
 
2022 | Conference Paper | LibreCat-ID: 30987
Brief Announcement: Fault-Tolerant Shape Formation in the Amoebot Model
I. Kostitsyna, C. Scheideler, D. Warner, in: J. Aspnes, O. Michail (Eds.), 1st Symposium on Algorithmic Foundations of Dynamic Networks (SAND 2022), Schloss Dagstuhl – Leibniz-Zentrum für Informatik, Dagstuhl, Germany, 2022, p. 23:1–23:3.
LibreCat | DOI
 
2022 | Bachelorsthesis | LibreCat-ID: 34962
Evaluating database systems relying on secure multiparty computation
A. Anonymous, Evaluating Database Systems Relying on Secure Multiparty Computation, 2022.
LibreCat
 
2022 | Mastersthesis | LibreCat-ID: 34963
Cost of Privacy-preserving SMPC Protocols for NN-Based Inference
A. Anonymous, Cost of Privacy-Preserving SMPC Protocols for NN-Based Inference, 2022.
LibreCat
 
2021 | Bachelorsthesis | LibreCat-ID: 28998
Schutz und Stabilisierung von Overlay-Netzwerken mithilfe des Relay-Layers
D. Suermann, Schutz Und Stabilisierung von Overlay-Netzwerken Mithilfe Des Relay-Layers, 2021.
LibreCat
 
2021 | Bachelorsthesis | LibreCat-ID: 21197
Self-stabilizing Arrow Protocol on Spanning Trees with a Low Diameter
M. Mengshi, Self-Stabilizing Arrow Protocol on Spanning Trees with a Low Diameter, 2021.
LibreCat
 
2021 | Conference Paper | LibreCat-ID: 22283
Time-Optimal Construction of Overlays
T. Götte, K. Hinnenthal, C. Scheideler, J. Werthmann, in: K. Censor-Hillel (Ed.), Proc. of the 40th ACM Symposium on Principles of Distributed Computing (PODC ’21), ACM, New York, n.d.
LibreCat | Files available | DOI
 
2021 | Book Chapter | LibreCat-ID: 22057
Efficient Adaptively-Secure IB-KEMs and VRFs via Near-Collision Resistance
T. Jager, R. Kurek, D. Niehues, in: Public-Key Cryptography – PKC 2021, Cham, 2021.
LibreCat | Files available | DOI
 
2021 | Book Chapter | LibreCat-ID: 22059
Verifiable Random Functions with Optimal Tightness
D. Niehues, in: Public-Key Cryptography – PKC 2021, Cham, 2021.
LibreCat | Files available | DOI
 
2021 | Preprint | LibreCat-ID: 26645 | OA LibreCat | Download (ext.)
 
2021 | Conference Paper | LibreCat-ID: 29566
Issuer-Hiding Attribute-Based Credentials
J. Bobolz, F. Eidens, S. Krenn, S. Ramacher, K. Samelin, in: Cryptology and Network Security, Springer International Publishing, Cham, 2021.
LibreCat | DOI
 
2020 | Conference Paper | LibreCat-ID: 19551
Efficient Forward-Secure Threshold Public Key Encryption
R. Kurek, in: J. K. Liu, H. Cui (Eds.), Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings, Springer, 2020, pp. 330–349.
LibreCat | DOI
 
2020 | Conference Paper | LibreCat-ID: 19553
Efficient Forward-Secure Threshold Signatures
R. Kurek, in: K. Aoki, A. Kanaoka (Eds.), Advances in Information and Computer Security - 15th International Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020, Proceedings, Springer, 2020, pp. 239–260.
LibreCat | DOI
 
2020 | Dissertation | LibreCat-ID: 24710
Efficient Cryptographic Constructions with Strong Security Guarantees
R. Kurek, Efficient Cryptographic Constructions with Strong Security Guarantees, 2020.
LibreCat | Files available
 
2020 | Book Chapter | LibreCat-ID: 21396
On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions
T. Jager, D. Niehues, in: Lecture Notes in Computer Science, Cham, 2020.
LibreCat | Files available | DOI | Download (ext.)
 
2020 | Dissertation | LibreCat-ID: 18520
Local Graph Transformation Primitives For Some Basic Problems In Overlay Networks
A. Setzer, Local Graph Transformation Primitives For Some Basic Problems In Overlay Networks, Universität Paderborn, 2020.
LibreCat | DOI
 
2020 | Bachelorsthesis | LibreCat-ID: 18637 | OA
A Group Signature Scheme from Flexible Public Key Signatures and Structure-Preserving Signatures on Equivalence Classes
P. Schürmann, A Group Signature Scheme from Flexible Public Key Signatures and Structure-Preserving Signatures on Equivalence Classes, Universität Paderborn, 2020.
LibreCat | Files available
 
2020 | Bachelorsthesis | LibreCat-ID: 18639
Enhancing Security by Usage of Universal One-Way Hash Functions
T. Terfort, Enhancing Security by Usage of Universal One-Way Hash Functions, Universität Paderborn, 2020.
LibreCat
 
2020 | Mastersthesis | LibreCat-ID: 15770
On the complexity of local transformations in SDN overlays
D. Warner, On the Complexity of Local Transformations in SDN Overlays, Universität Paderborn, 2020.
LibreCat
 
2020 | Journal Article | LibreCat-ID: 13770
A Case for a New IT Ecosystem: On-The-Fly Computing
H. Karl, D. Kundisch, F. Meyer auf der Heide, H. Wehrheim, Business & Information Systems Engineering 62 (2020) 467–481.
LibreCat | Files available | DOI
 
2020 | Bachelorsthesis | LibreCat-ID: 18638
Comparison of Zero-Knowledge Range Proofs
P. Kramer, Comparison of Zero-Knowledge Range Proofs, Universität Paderborn, 2020.
LibreCat
 
2019 | Conference Paper | LibreCat-ID: 6976
Always be Two Steps Ahead of Your Enemy - Maintaining a Routable Overlay under Massive Churn with an Almost Up-to-date Adversary
T. Götte, V.R. Vijayalakshmi, C. Scheideler, in: Proceedings of the 2019 IEEE 33rd International Parallel  and Distributed Processing Symposium (IPDPS ’19), IEEE, n.d.
LibreCat | Files available
 
2019 | Journal Article | LibreCat-ID: 14830
Self-Stabilizing Metric Graphs
R. Gmyr, J. Lefevre, C. Scheideler, Theory Comput. Syst. 63 (2019) 177–199.
LibreCat | DOI
 
2019 | Mastersthesis | LibreCat-ID: 13128 | OA
Rational Secure Multiparty Computation
H. Bröcher, Rational Secure Multiparty Computation, Universität Paderborn, 2019.
LibreCat | Files available
 
2019 | Mastersthesis | LibreCat-ID: 10271
Implementation and Evaluation of Authenticated Data Structures Using Intel SGX Enclaves
N. N., Implementation and Evaluation of Authenticated Data Structures Using Intel SGX Enclaves, Universität Paderborn, 2019.
LibreCat
 
2019 | Bachelorsthesis | LibreCat-ID: 13592
Efficient Finite-Field Arithmetic for Elliptic Curve Cryptography in Java
M. Pilot, Efficient Finite-Field Arithmetic for Elliptic Curve Cryptography in Java, Universität Paderborn, 2019.
LibreCat
 
2019 | Mastersthesis | LibreCat-ID: 13648 | OA
Implementation and Comparison of Elliptic Curve Algorithms in Java
S. Scholz, Implementation and Comparison of Elliptic Curve Algorithms in Java, Universität Paderborn, 2019.
LibreCat | Files available
 
2019 | Conference Paper | LibreCat-ID: 13904 | OA
Updatable Anonymous Credentials and Applications to Incentive Systems
J. Blömer, J. Bobolz, D.P. Diemert, F. Eidens, in: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security - CCS ’19, 2019.
LibreCat | Files available | DOI | Download (ext.)
 
2018 | Conference Paper | LibreCat-ID: 2862 | OA
Practical, Anonymous, and Publicly Linkable Universally-Composable Reputation Systems
J. Blömer, F. Eidens, J. Juhnke, in: Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers’ Track at the {RSA} Conference 2018, Proceedings, Springer International Publishing, Cham, 2018, pp. 470–490.
LibreCat | Files available | DOI | Download (ext.)
 
2018 | Journal Article | LibreCat-ID: 2685
Voronoi Cells of Lattices with Respect to Arbitrary Norms
J. Blömer, K. Kohn, SIAM Journal on Applied Algebra and Geometry. 2 (2018) 314–338.
LibreCat | Files available | DOI
 
2018 | Conference Paper | LibreCat-ID: 3265 | OA
Fully-Featured Anonymous Credentials with Reputation System
K. Bemmann, J. Blömer, J. Bobolz, H. Bröcher, D.P. Diemert, F. Eidens, L. Eilers, J.F. Haltermann, J. Juhnke, B. Otour, L.A. Porzenheim, S. Pukrop, E. Schilling, M. Schlichtig, M. Stienemeier, in: Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES ’18, ACM, New York, NY, USA, n.d.
LibreCat | Files available | DOI | Download (ext.)
 
2018 | Conference Paper | LibreCat-ID: 3422
Breaking the $\tilde\Omega(\sqrt{n})$ Barrier: Fast Consensus under a Late Adversary
P. Robinson, C. Scheideler, A. Setzer, in: Proceedings of the 30th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), n.d.
LibreCat | Files available | DOI
 
2018 | Conference Paper | LibreCat-ID: 2965
Cloud Architectures for Searchable Encryption
J. Blömer, N. Löken, in: Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, ACM, New York, NY, USA, n.d., pp. 25:1--25:10.
LibreCat | Files available | DOI
 
2018 | Dissertation | LibreCat-ID: 1138
Distributed Algorithms for Overlay Networks and Programmable Matter
R. Gmyr, Distributed Algorithms for Overlay Networks and Programmable Matter, Universität Paderborn, 2018.
LibreCat | DOI
 
2018 | Working Paper | LibreCat-ID: 5820
Provably Anonymous Communication Based on Trusted Execution Environments
J. Blömer, J. Bobolz, C. Scheideler, A. Setzer, Provably Anonymous Communication Based on Trusted Execution Environments, n.d.
LibreCat | Files available
 
2018 | Conference Paper | LibreCat-ID: 5985
Relays: Towards a Link Layer for Robust and Secure Fog Computing
C. Scheideler, in: Proceedings of the 2018 Workshop on Theory and Practice for Integrated Cloud, Fog and Edge Computing Paradigms, TOPIC@PODC 2018, Egham, United Kingdom, July 27, 2018, 2018, pp. 1–2.
LibreCat | Files available | DOI
 
2018 | Conference Paper | LibreCat-ID: 5216
Relays: A New Approach for the Finite Departure Problem in Overlay Networks
C. Scheideler, A. Setzer, in: Proceedings of the 20th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS 2018), 2018.
LibreCat | Files available | DOI
 
2018 | Dissertation | LibreCat-ID: 6597
Models and Constructions for Secure Reputation Systems
J. Juhnke, Models and Constructions for Secure Reputation Systems, Universität Paderborn, 2018.
LibreCat | DOI
 
2018 | Conference Paper | LibreCat-ID: 3873 | OA
Enhanced Security of Attribute-Based Signatures
J. Blömer, F. Eidens, J. Juhnke, in: The International Conference on Cryptology And Network Security (CANS), Springer, 2018, pp. 235–255.
LibreCat | Files available | DOI | Download (ext.)
 
2018 | Conference Paper | LibreCat-ID: 2379 | OA
Delegatable Attribute-based Anonymous Credentials from Dynamically Malleable Signatures
J. Blömer, J. Bobolz, in: ACNS 2018 Applied Cryptography & Network Security, n.d.
LibreCat | Files available | DOI | Download (ext.)
 
2017 | Conference Paper | LibreCat-ID: 2967 | OA
Subtleties in Security Definitions for Predicate Encryption with Public Index
J. Blömer, G. Liske, in: Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS), Springer International Publishing, Cham, 2017, pp. 438–453.
LibreCat | Files available | DOI | Download (ext.)
 
2017 | Dissertation | LibreCat-ID: 116
CCA-Security for Predicate Encryption Schemes
G. Liske, CCA-Security for Predicate Encryption Schemes, Universität Paderborn, 2017.
LibreCat | DOI | Download (ext.)
 
2017 | Conference Paper | LibreCat-ID: 2344 | OA
Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations
J. Blömer, P. Günther, V. Krummel, N. Löken, in: Foundations and Practice of Security, Springer International Publishing, Cham, 2017, pp. 3–17.
LibreCat | Files available | DOI
 
2017 | Bachelorsthesis | LibreCat-ID: 18027
An Asynchronous Adaption of a Churn-resistant Overlay Network
N.C. Banh, An Asynchronous Adaption of a Churn-Resistant Overlay Network, Universität Paderborn, 2017.
LibreCat
 
2017 | Mastersthesis | LibreCat-ID: 60
Semantically Secure Attribute-based Searchable Encryption
D. Niehus, Semantically Secure Attribute-Based Searchable Encryption, Universität Paderborn, 2017.
LibreCat
 
2017 | Mastersthesis | LibreCat-ID: 62
Searchable Encryption
E. Weis, Searchable Encryption, Universität Paderborn, 2017.
LibreCat
 
2017 | Bachelorsthesis | LibreCat-ID: 698
As Asynchronous Adaption of a Churn-resistant Overlay Network
N.C. Banh, As Asynchronous Adaption of a Churn-Resistant Overlay Network, Universität Paderborn, 2017.
LibreCat
 
2017 | Bachelorsthesis | LibreCat-ID: 88
Instantiating a Predicate Encryption Scheme via Pair Encodings
A. Ganesh Athreya, Instantiating a Predicate Encryption Scheme via Pair Encodings, Universität Paderborn, 2017.
LibreCat
 
2017 | Bachelorsthesis | LibreCat-ID: 67
Provably Secure Key-Derivation-Functions for Certain Types of Applications
M. Jürgens, Provably Secure Key-Derivation-Functions for Certain Types of Applications, Universität Paderborn, 2017.
LibreCat
 
2017 | Bachelorsthesis | LibreCat-ID: 104
EAX - An Authenticated Encryption Mode for Block Ciphers
D. Diemert, EAX - An Authenticated Encryption Mode for Block Ciphers, Universität Paderborn, 2017.
LibreCat
 
2017 | Bachelorsthesis | LibreCat-ID: 1049
Visualisierung zu Algorithmen verteilter Netzwerksysteme
B. Beckendorfer, Visualisierung zu Algorithmen verteilter Netzwerksysteme, Universität Paderborn, 2017.
LibreCat
 
2017 | Mastersthesis | LibreCat-ID: 117
Attribute-based Signatures using Structure Preserving Signatures
P. Bemmann, Attribute-Based Signatures Using Structure Preserving Signatures, Universität Paderborn, 2017.
LibreCat
 
2017 | Bachelorsthesis | LibreCat-ID: 118
An Asynchronous Adaptation of a Churn-resistant Overlay Network
N. Chi Banh, An Asynchronous Adaptation of a Churn-Resistant Overlay Network, Universität Paderborn, 2017.
LibreCat
 
2016 | Bachelorsthesis | LibreCat-ID: 213
Comparison of different Definitions of Chosen-Ciphertext Security in Encryption schemes
L. Porzenheim, Comparison of Different Definitions of Chosen-Ciphertext Security in Encryption Schemes, Universität Paderborn, 2016.
LibreCat
 
2016 | Bachelorsthesis | LibreCat-ID: 214
Commitment Schemes - Definitions, Variants, and Security
K.S. Bemmann, Commitment Schemes - Definitions, Variants, and Security, Universität Paderborn, 2016.
LibreCat
 
2016 | Conference Paper | LibreCat-ID: 215
Churn- and DoS-resistant Overlay Networks Based on Network Reconfiguration
M. Drees, R. Gmyr, C. Scheideler, in: Proceedings of the 28th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), 2016, pp. 417--427.
LibreCat | Files available | DOI
 
2016 | Conference Paper | LibreCat-ID: 208
Construction of Fully CCA-Secure Predicate Encryptions from Pair Encoding Schemes
J. Blömer, G. Liske, in: Proceedings of the CT-RSA 2016, 2016, pp. 431–447.
LibreCat | Files available | DOI
 
2016 | Mastersthesis | LibreCat-ID: 223
Aggregation in Overlay Networks
K. Hinnenthal, Aggregation in Overlay Networks, Universität Paderborn, 2016.
LibreCat | Files available
 
2016 | Dissertation | LibreCat-ID: 167
Physical attacks on pairing-based cryptography
P. Günther, Physical Attacks on Pairing-Based Cryptography, Universität Paderborn, 2016.
LibreCat | Files available | Download (ext.)
 
2016 | Conference Paper | LibreCat-ID: 155
Self-stabilizing Metric Graphs
R. Gmyr, J. Lefèvre, C. Scheideler, in: Proceedings of the 18th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS), 2016, pp. 248--262.
LibreCat | Files available | DOI
 
2016 | Mastersthesis | LibreCat-ID: 146
Symmetric Anonymous Credentials with Protocols for Relations on Attributes
J. Hamm, Symmetric Anonymous Credentials with Protocols for Relations on Attributes, Universität Paderborn, 2016.
LibreCat
 
2016 | Bachelorsthesis | LibreCat-ID: 152
Short Randomizable Aggregatable Signatures: Constructions and Security Analysis
F. Dallmeier, Short Randomizable Aggregatable Signatures: Constructions and Security Analysis, Universität Paderborn, 2016.
LibreCat
 
2016 | Dissertation | LibreCat-ID: 10136
Insider-resistent Distributed Storage Systems
M. Eikel, Insider-Resistent Distributed Storage Systems, Universität Paderborn, 2016.
LibreCat | Files available
 
2015 | Conference Paper | LibreCat-ID: 253
Short Group Signatures with Distributed Traceability
J. Blömer, J. Juhnke, N. Löken, in: Proceedings of the Sixth International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS), 2015, pp. 166–180.
LibreCat | Files available | DOI
 
2015 | Journal Article | LibreCat-ID: 284
IRIS: A Robust Information System Against Insider DoS Attacks
M. Eikel, C. Scheideler, Transactions on Parallel Computing (2015) 18:1--18:33.
LibreCat | Files available | DOI
 
2015 | Bachelorsthesis | LibreCat-ID: 286
Implementierung eines hybriden Verschlüsselungsverfahrens nach Cramer und Shoup
B. Kalde, Implementierung eines hybriden Verschlüsselungsverfahrens nach Cramer und Shoup, Universität Paderborn, 2015.
LibreCat
 
2015 | Bachelorsthesis | LibreCat-ID: 261
Protokolle zur authentifizierten Schüsselvereinbarung
T. Eisenhofer, Protokolle zur authentifizierten Schüsselvereinbarung, Universität Paderborn, 2015.
LibreCat
 
2015 | Mastersthesis | LibreCat-ID: 321
Anonymous credential system based on q-Strong Diffie-Hellman Assumption
F. Eidens, Anonymous Credential System Based on Q-Strong Diffie-Hellman Assumption, Universität Paderborn, 2015.
LibreCat | Files available
 
2015 | Conference Paper | LibreCat-ID: 322 | OA
Anonymous and Publicly Linkable Reputation Systems
J. Blömer, J. Juhnke, C. Kolb, in: Proceedings of the 18th International Conference on Financial Cryptography and Data Security (FC), 2015, pp. 478--488.
LibreCat | Files available | DOI | Download (ext.)
 
2015 | Mastersthesis | LibreCat-ID: 325
A Group Signature Scheme with Distributed Group Management - An Application of Threshold Encryption
N. Löken, A Group Signature Scheme with Distributed Group Management - An Application of Threshold Encryption, Universität Paderborn, 2015.
LibreCat | Files available
 
2015 | Bachelorsthesis | LibreCat-ID: 326
A group signature scheme based on the LSRW assumption
F. Heihoff, A Group Signature Scheme Based on the LSRW Assumption, Universität Paderborn, 2015.
LibreCat
 
2015 | Mastersthesis | LibreCat-ID: 297
Evaluation of Pairing Optimization for Embedded Platforms
M. Sosniak, Evaluation of Pairing Optimization for Embedded Platforms, Universität Paderborn, 2015.
LibreCat
 
2015 | Mastersthesis | LibreCat-ID: 299
Elektromagnetische Seitenkanalangriffe auf paarungsbasierte Kryptographie
B. Gerken, Elektromagnetische Seitenkanalangriffe auf paarungsbasierte Kryptographie, Universität Paderborn, 2015.
LibreCat
 
2015 | Mastersthesis | LibreCat-ID: 301 | OA
Efficient Verifier-Local Revocation for Anonymous Credentials
J. Bobolz, Efficient Verifier-Local Revocation for Anonymous Credentials, Universität Paderborn, 2015.
LibreCat | Files available
 
2015 | Mastersthesis | LibreCat-ID: 302
Efficient Attributes for Pairing-Based Anonymous Credentials
C. Stroh, Efficient Attributes for Pairing-Based Anonymous Credentials, Universität Paderborn, 2015.
LibreCat
 
2015 | Dissertation | LibreCat-ID: 305
Distributed Data Structures and the Power of topological Self-Stabilization
S. Kniesburges, Distributed Data Structures and the Power of Topological Self-Stabilization, Universität Paderborn, 2015.
LibreCat | Files available
 
2015 | Mastersthesis | LibreCat-ID: 312
Constructions of Fully Secure Predicate Encryption Schemes
P. Schleiter, Constructions of Fully Secure Predicate Encryption Schemes, Universität Paderborn, 2015.
LibreCat | Files available
 
2015 | Mastersthesis | LibreCat-ID: 273
Number of Voronoi-relevant vectors in lattices with respect to arbitrary norms
K. Kohn, Number of Voronoi-Relevant Vectors in Lattices with Respect to Arbitrary Norms, Universität Paderborn, 2015.
LibreCat
 
2015 | Report | LibreCat-ID: 233 | OA
Voronoi Cells of Lattices with Respect to Arbitrary Norms
J. Blömer, K. Kohn, Voronoi Cells of Lattices with Respect to Arbitrary Norms, Universität Paderborn, 2015.
LibreCat | Files available | Download (ext.)
 
2014 | Conference Paper | LibreCat-ID: 346
Towards a Flexible and Privacy-Preserving Reputation System for Markets of Composed Services
S. Brangewitz, A. Jungmann, R. Petrlic, M.C. Platenius, in: Proceedings of the 6th International Conferences on Advanced Service Computing (SERVICE COMPUTATION), 2014, pp. 49–57.
LibreCat | Files available
 
2014 | Report | LibreCat-ID: 349
The Legal Classification of Identity-Based Signatures
C. Sorge, The Legal Classification of Identity-Based Signatures, 2014.
LibreCat | Files available
 
2014 | Conference Paper | LibreCat-ID: 355
Tampering attacks in pairing-based cryptography
J. Blömer, P. Günther, G. Liske, in: Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC), 2014, pp. 1--7.
LibreCat | Files available | DOI
 
2014 | Conference Paper | LibreCat-ID: 366
Security and Privacy Challenges in On-The-Fly Computing
R. Petrlic, A. Jungmann, M.C. Platenius, W. Schäfer, C. Sorge, in: Tagungsband Der 4. Konferenz Software-Technologien Und -Prozesse (STeP 2014), 2014, pp. 131–142.
LibreCat | Files available
 
2014 | Bachelorsthesis | LibreCat-ID: 369
RSA-Full Domain Hash Revisited
T. Rath, RSA-Full Domain Hash Revisited, Universität Paderborn, 2014.
LibreCat
 
2014 | Conference Paper | LibreCat-ID: 371
RoBuSt: A Crash-Failure-Resistant Distributed Storage System
C. Scheideler, A. Setzer, M. Eikel, in: Proceedings of the 18th International Conference on Principles of Distributed Systems (OPODIS), 2014, pp. 107--122.
LibreCat | Files available | DOI
 
2014 | Journal Article | LibreCat-ID: 378
Re-Chord: A Self-stabilizing Chord Overlay Network
S. Kniesburges, A. Koutsopoulos, C. Scheideler, Theory of Computing Systems (2014) 591–612.
LibreCat | Files available | DOI
 
2014 | Conference Paper | LibreCat-ID: 384
Privacy-Preserving Reputation Management
R. Petrlic, S. Lutters, C. Sorge, in: Proceedings of the 29th Symposium On Applied Computing (SAC), 2014, pp. 1712–1718.
LibreCat | Files available | DOI
 
2014 | Dissertation | LibreCat-ID: 385
Privacy-Preserving Multiparty Digital Rights Management
R. Petrlic, Privacy-Preserving Multiparty Digital Rights Management, Universität Paderborn, 2014.
LibreCat | Files available
 
2014 | Conference Paper | LibreCat-ID: 386
Privacy-Preserving Digital Rights Management based on Attribute-based Encryption
R. Petrlic, C. Sorge, in: Proceedings of the Sixth IFIP International Conference on New Technologies, Mobility and Security (NTMS), 2014, pp. 1–5.
LibreCat | Files available | DOI
 
2014 | Journal Article | LibreCat-ID: 387
Principles of Robust Medium Access and an Application to Leader Election
B. Awerbuch, A.W. Richa, C. Scheideler, S. Schmid, J. Zhang, Transactions on Algorithms (2014).
LibreCat | Files available | DOI
 
2014 | Bachelorsthesis | LibreCat-ID: 18001
Ein selbst-stabilisierender Algorithmus für das Finite Sleep Problem in Skip+ Graphen
L. Luo, Ein Selbst-Stabilisierender Algorithmus Für Das Finite Sleep Problem in Skip+ Graphen, Universität Paderborn, 2014.
LibreCat
 
2014 | Conference Paper | LibreCat-ID: 441
Datenschutz im Future Internet: rechtliche Aspekte und technische Maßnahmen
C. Sorge, R. Petrlic, in: Tagungsband Des 17. Internationalen Rechtsinformatik Symposions, 2014.
LibreCat | Files available
 
 
2014 | Conference Paper | LibreCat-ID: 446
Competitive MAC under adversarial SINR
A. Ogierman, A.W. Richa, C. Scheideler, S. Schmid, J. Zhang, in: Proceedings of the 33rd Annual IEEE International Conference on Computer Communications (INFOCOM), 2014, pp. 2751--2759.
LibreCat | Files available | DOI
 
2014 | Mastersthesis | LibreCat-ID: 460
Advanced AES-key recovery from decayed RAM-dumps using multi-threading and FPGAs
R. Mittendorf, Advanced AES-Key Recovery from Decayed RAM-Dumps Using Multi-Threading and FPGAs, Universität Paderborn, 2014.
LibreCat
 
2014 | Conference Paper | LibreCat-ID: 463
A Practical Second-Order Fault Attack against a Real-World Pairing Implementation
J. Blömer, R. Gomes da Silva, P. Günther, J. Krämer, J.-P. Seifert, in: Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC), 2014, pp. 123--136.
LibreCat | Files available | DOI
 
2014 | Journal Article | LibreCat-ID: 479
The Legal Classification of Identity-Based Signatures
C. Sorge, Computer Law & Security Review 30 (2014) 126–136.
LibreCat | Files available | DOI
 
2014 | Conference Paper | LibreCat-ID: 401
Matching of Incomplete Service Specifications Exemplified by Privacy Policy Matching
M.C. Platenius, S. Arifulina, R. Petrlic, W. Schäfer, in: Proceedings of the 4th International Workshop on Adaptive Services for the Future Internet, 2014, pp. 6–17.
LibreCat | Files available | DOI
 
2014 | Journal Article | LibreCat-ID: 410
Incorporating Reputation Information into Decision-Making Processes in Markets of Composed Services
A. Jungmann, S. Brangewitz, R. Petrlic, M.C. Platenius, International Journal On Advances in Intelligent Systems (IntSys) 7 (2014) 572--594.
LibreCat | Files available | Download (ext.)
 
2014 | Mastersthesis | LibreCat-ID: 414
Hiding software components using functional encryption
J. Jochheim, Hiding Software Components Using Functional Encryption, Universität Paderborn, 2014.
LibreCat
 
2014 | Bachelorsthesis | LibreCat-ID: 416
Group Signature Schemes with Strong Exculpability
P. Bemmann, Group Signature Schemes with Strong Exculpability, Universität Paderborn, 2014.
LibreCat
 
2014 | Bachelorsthesis | LibreCat-ID: 421
Fujisaki-Okamoto Transformation
J. Lippert, Fujisaki-Okamoto Transformation, Universität Paderborn, 2014.
LibreCat
 
2014 | Bachelorsthesis | LibreCat-ID: 438
Designing an Anonymous and Secure Reputation System Using a Group Signature Variant
A. Kokoschka, Designing an Anonymous and Secure Reputation System Using a Group Signature Variant, Universität Paderborn, 2014.
LibreCat
 
2013 | Bachelorsthesis | LibreCat-ID: 471
Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen
A. Tezer, Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen, Universität Paderborn, 2013.
LibreCat
 
2013 | Conference Paper | LibreCat-ID: 473
Unlinkable content playbacks in a multiparty DRM system
R. Petrlic, S. Sekula, in: L. Wang, B. Shafiq (Eds.), Data and Applications Security and Privacy XXVII, 2013, pp. 289–296.
LibreCat | Files available | DOI
 
2013 | Conference Paper | LibreCat-ID: 475
Towards practical privacy-preserving Digital Rights Management for Cloud Computing
N. Joshi, R. Petrlic, in: Proceedings of the 10th Annual IEEE Consumer Communications & Networking Conference (CCNC), 2013, pp. 259–264.
LibreCat | Files available | DOI
 
2013 | Bachelorsthesis | LibreCat-ID: 486
Seitenkanalresistenz paarungsbasierter Kryptographie
O. Otte, Seitenkanalresistenz paarungsbasierter Kryptographie, Universität Paderborn, 2013.
LibreCat
 
2013 | Bachelorsthesis | LibreCat-ID: 487 | OA
Security Proofs for Pairing-Based Cryptography in the Generic Group Model
J. Bobolz, Security Proofs for Pairing-Based Cryptography in the Generic Group Model, Universität Paderborn, 2013.
LibreCat | Files available
 
2013 | Conference Paper | LibreCat-ID: 488
Securing Critical Unattended Systems with Identity Based Cryptography - A Case Study
J. Blömer, P. Günther, V. Krummel, in: Proceedings of the 5th International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS), 2013, pp. 98–105.
LibreCat | Files available
 
2013 | Conference Paper | LibreCat-ID: 519
IRIS: A Robust Information System Against Insider DoS-Attacks
M. Eikel, C. Scheideler, in: Proceedings of the 25th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), 2013, pp. 119–129.
LibreCat | Files available | DOI
 
2013 | Mastersthesis | LibreCat-ID: 521
Identifikation und Wiederherstellung von kryptographischen Schlüsseln mit FPGAs
H. Riebler, Identifikation und Wiederherstellung von kryptographischen Schlüsseln mit FPGAs, Universität Paderborn, 2013.
LibreCat
 
2013 | Mastersthesis | LibreCat-ID: 531
Entwurf eines datenschutzgerechten Reputationssystems
S. Lutters, Entwurf eines datenschutzgerechten Reputationssystems, Universität Paderborn, 2013.
LibreCat
 
2013 | Bachelorsthesis | LibreCat-ID: 532
Entwicklung und Analyse einer verteilten Speicherverwaltung für dynamische heterogene Speichersysteme
H. Hilleckes, Entwicklung und Analyse einer verteilten Speicherverwaltung für dynamische heterogene Speichersysteme, Universität Paderborn, 2013.
LibreCat
 
 
2013 | Conference Paper | LibreCat-ID: 542
CONE-DHT: A distributed self-stabilizing algorithm for a heterogeneous storage system
S. Kniesburges, A. Koutsopoulos, C. Scheideler, in: Proceedings of the 27th International Symposium on Distributed Computing (DISC), 2013, pp. 537–549.
LibreCat | Files available | DOI
 
2013 | Conference Paper | LibreCat-ID: 546
Ca-Re-Chord: A Churn Resistant Self-stabilizing Chord Overlay Network
K. Graffi, M. Benter, M. Divband, S. Kniesburges, A. Koutsopoulos, in: Proceedings of the Conference on Networked Systems (NetSys), 2013, pp. 27–34.
LibreCat | Files available | DOI
 
2013 | Bachelorsthesis | LibreCat-ID: 553
Attributbasierte Verschlüsselung mittels Gittermethoden - Mathematische Grundlagen, Verfahren und Sicherheitsbeweise
K. Kohn, Attributbasierte Verschlüsselung mittels Gittermethoden - Mathematische Grundlagen, Verfahren und Sicherheitsbeweise, Universität Paderborn, 2013.
LibreCat
 
2013 | Journal Article | LibreCat-ID: 561
A privacy-friendly Architecture for future Cloud Computing
R. Petrlic, S. Sekula, C. Sorge, International Journal of Grid and Utility Computing (2013) 265–277.
LibreCat | Files available | DOI | Download (ext.)
 
2013 | Conference Paper | LibreCat-ID: 528
FPGA-accelerated Key Search for Cold-Boot Attacks against AES
H. Riebler, T. Kenter, C. Sorge, C. Plessl, in: Proceedings of the International Conference on Field-Programmable Technology (FPT), IEEE, 2013, pp. 386–389.
LibreCat | Files available | DOI
 
2012 | Conference (Editor) | LibreCat-ID: 577
Stabilization, Safety, and Security of Distributed Systems
A.W. Richa, C. Scheideler, eds., Stabilization, Safety, and Security of Distributed Systems, 2012.
LibreCat | Files available | DOI
 
2012 | Conference Paper | LibreCat-ID: 581
Self-Organizing Particle Systems
M. Drees, M. Hüllmann (married name: Eikel), A. Koutsopoulos, C. Scheideler, in: Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium (IPDPS), 2012, pp. 1272–1283.
LibreCat | Files available | DOI
 
2012 | Conference Paper | LibreCat-ID: 585
Proxy Re-Encryption in a Privacy-Preserving Cloud Computing DRM Scheme
R. Petrlic, in: Proceedings of 4th International Symposium on Cyberspace Safety and Security (CSS), 2012, pp. 194–211.
LibreCat | Files available | DOI
 
2012 | Conference Paper | LibreCat-ID: 588
Privacy-Preserving DRM for Cloud Computing
R. Petrlic, C. Sorge, in: Proceedings of the 26th IEEE International Conference on Advanced Information Networking and Applications (AINA), 2012, pp. 1286–1291.
LibreCat | Files available | DOI
 
2012 | Conference Paper | LibreCat-ID: 589
Privacy-Preserving Digital Rights Management in a Trusted Cloud Environment
R. Petrlic, in: Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2012, pp. 958–963.
LibreCat | Files available | DOI
 
2012 | Bachelorsthesis | LibreCat-ID: 606
Identitätsbasierte Signaturen - Ein Sicherheitsbeweis für Signaturen auf Grundlage von Gap-Diffie-Hellman-Gruppen mit Hilfe des Forking-Lemmas
N. Löken, Identitätsbasierte Signaturen - Ein Sicherheitsbeweis für Signaturen auf Grundlage von Gap-Diffie-Hellman-Gruppen mit Hilfe des Forking-Lemmas, Universität Paderborn, 2012.
LibreCat
 
2012 | Bachelorsthesis | LibreCat-ID: 607
Identitätsbasierte Kryptographie - Implementierung von Paarungen für Körper der Charakteristik 2
T. Haarhoff, Identitätsbasierte Kryptographie - Implementierung von Paarungen für Körper der Charakteristik 2, Universität Paderborn, 2012.
LibreCat
 
2012 | Bachelorsthesis | LibreCat-ID: 620
Datenschutzgerechtes DRM im Cloud Computing
R. Mittendorf, Datenschutzgerechtes DRM im Cloud Computing, Universität Paderborn, 2012.
LibreCat
 
2012 | Bachelorsthesis | LibreCat-ID: 621
Datenschutzgerechte E-Payment-Schemata im On-The-Fly Computing
S. Sekula, Datenschutzgerechte E-Payment-Schemata im On-The-Fly Computing, Universität Paderborn, 2012.
LibreCat
 
2012 | Conference Paper | LibreCat-ID: 623
Competitive and fair throughput for co-existing networks under adversarial interference
A.W. Richa, C. Scheideler, S. Schmid, J. Zhang, in: Proceedings of the 31st Annual ACM SIGACT-SIGOPS Symposium on Principles and Distributed Computing (PODC), 2012, pp. 291–300.
LibreCat | Files available | DOI
 
2012 | Bachelorsthesis | LibreCat-ID: 629
Attribute-basierte Verschlüsselung
P. Schleiter, Attribute-basierte Verschlüsselung, Universität Paderborn, 2012.
LibreCat
 
2011 | Conference Paper | LibreCat-ID: 645
Stabilizing consensus with the power of two choices
B. Doerr, L.A. Goldberg, L. Minder, T. Sauerwald, C. Scheideler, in: Proceedings of the 23rd ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), 2011, pp. 149–158.
LibreCat | Files available | DOI
 
2011 | Conference Paper | LibreCat-ID: 646
Self-Stabilizing DeBruijn Networks
A.W. Richa, C. Scheideler, in: Proceedings of the 13th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS), 2011, pp. 416–430.
LibreCat | Files available | DOI
 
2011 | Mastersthesis | LibreCat-ID: 659
Fault attacks in pairing-based cryptography
G. Liske, Fault Attacks in Pairing-Based Cryptography, Universität Paderborn, 2011.
LibreCat | Files available
 

Filters and Search Terms

project=13

Search

Filter Publications

Display / Sort

Export