150 Publications

2023 | Mastersthesis | LibreCat-ID: 40440
Pilot M. Updatable Privacy-Preserving Reputation System Based on Blockchain.; 2023.
LibreCat
 
2023 | Mastersthesis | LibreCat-ID: 43374 | OA
Schürmann P. A Formal Comparison of Advanced Digital Signature Primitives.; 2023.
LibreCat | Files available
 
2023 | Conference Paper | LibreCat-ID: 44855
Hemmrich S, Bobolz J, Beverungen D, Blömer J. Designing Business Reputation Ecosystems — A Method for Issuing and Trading Monetary Ratings on a Blockchain. In: ECIS 2023 Research Papers. ; 2023.
LibreCat | Files available | Download (ext.)
 
2023 | Journal Article | LibreCat-ID: 45192
Götte T, Hinnenthal K, Scheideler C, Werthmann J. Time-Optimal Construction of Overlays. Distributed Computing. Published online 2023. doi:https://doi.org/10.1007/s00446-023-00442-4
LibreCat | DOI
 
2023 | Bachelorsthesis | LibreCat-ID: 43375 | OA
Koch A. Privacy-Preserving Collection and Evaluation of Log Files.; 2023.
LibreCat | Files available
 
2023 | Book Chapter | LibreCat-ID: 45891 | OA
Blömer J, Eidens F, Jager T, Niehues D, Scheideler C. Robustness and Security. In: Haake C-J, Meyer auf der Heide F, Platzner M, Wachsmuth H, Wehrheim H, eds. On-The-Fly Computing -- Individualized IT-Services in Dynamic Markets. Vol 412. Verlagsschriftenreihe des Heinz Nixdorf Instituts. Heinz Nixdorf Institut, Universität Paderborn; 2023:145-164. doi:10.5281/zenodo.8068629
LibreCat | Files available | DOI
 
2023 | Bachelorsthesis | LibreCat-ID: 46053
Schneider F. Utilizing Redundancy in Distributed Heterogeneous Storage.; 2023.
LibreCat | Files available
 
2023 | Conference Paper | LibreCat-ID: 35014 | OA
Blömer J, Bobolz J, Bröcher H. On the impossibility of surviving (iterated) deletion of weakly dominated strategies in rational MPC. In: ; 2023.
LibreCat | Download (ext.)
 
2023 | Conference Paper | LibreCat-ID: 43458 | OA
Blömer J, Bobolz J, Porzenheim LA. A Generic Construction of an Anonymous Reputation System and Instantiations from Lattices. In: ; 2023.
LibreCat | Download (ext.)
 
2023 | Book | LibreCat-ID: 45863 | OA
Haake C-J, Meyer auf der Heide F, Platzner M, Wachsmuth H, Wehrheim H. On-The-Fly Computing -- Individualized IT-Services in Dynamic Markets. Vol 412. Heinz Nixdorf Institut, Universität Paderborn; 2023. doi:10.17619/UNIPB/1-1797
LibreCat | Files available | DOI
 
2022 | Bachelorsthesis | LibreCat-ID: 30198
Korzeczek S. Aufarbeitung Und Lmplementierung von DAG-Rider.; 2022.
LibreCat
 
2022 | Bachelorsthesis | LibreCat-ID: 32399
Vahle E. Modelling and Proving Security for a Secure MPC Protocol for Stable Matching.; 2022.
LibreCat
 
2022 | Conference Paper | LibreCat-ID: 32602
Padalkin A, Scheideler C, Warner D. The Structural Power of Reconfigurable Circuits in the Amoebot Model. In: Ouldridge TE, Wickham SFJ, eds. 28th International Conference on DNA Computing and Molecular Programming (DNA 28). Vol 238. Leibniz International Proceedings in Informatics (LIPIcs). Schloss Dagstuhl – Leibniz-Zentrum für Informatik; 2022:8:1–8:22. doi:10.4230/LIPIcs.DNA.28.8
LibreCat | DOI
 
2022 | Conference Paper | LibreCat-ID: 32603
Kostitsyna I, Scheideler C, Warner D. Fault-Tolerant Shape Formation in the Amoebot Model. In: Ouldridge TE, Wickham SFJ, eds. 28th International Conference on DNA Computing and Molecular Programming (DNA 28). Vol 238. Leibniz International Proceedings in Informatics (LIPIcs). Schloss Dagstuhl – Leibniz-Zentrum für Informatik; 2022:9:1–9:22. doi:10.4230/LIPIcs.DNA.28.9
LibreCat | DOI
 
2022 | Bachelorsthesis | LibreCat-ID: 32398
Siek H. Bringing Structure to Structure-Preserving Signatures: Overview, Implementation and Comparison of Selected SPS Schemes.; 2022.
LibreCat
 
2022 | Mastersthesis | LibreCat-ID: 31485
Kramer P. On Transforming Lattice-Based Cryptography to the Ring Setting.; 2022.
LibreCat
 
2022 | Dissertation | LibreCat-ID: 29763 | OA
Niehues D. More Efficient Techniques for Adaptively-Secure Cryptography.; 2022. doi:10.25926/rdtq-jw45
LibreCat | Files available | DOI | Download (ext.)
 
2022 | Conference Paper | LibreCat-ID: 33240
Götte T, Scheideler C. Brief Announcement: The (Limited) Power of Multiple Identities: Asynchronous Byzantine Reliable Broadcast with Improved Resilience through Collusion. In: Agrawal K, Lee I-TA, eds. SPAA ’22: 34th ACM Symposium on Parallelism in Algorithms and Architectures, Philadelphia, PA, USA, July 11 - 14, 2022. ACM; 2022:99–101. doi:10.1145/3490148.3538556
LibreCat | DOI
 
2022 | Conference Paper | LibreCat-ID: 30987
Kostitsyna I, Scheideler C, Warner D. Brief Announcement: Fault-Tolerant Shape Formation in the Amoebot Model. In: Aspnes J, Michail O, eds. 1st Symposium on Algorithmic Foundations of Dynamic Networks (SAND 2022). Vol 221. Leibniz International Proceedings in Informatics (LIPIcs). Schloss Dagstuhl – Leibniz-Zentrum für Informatik; 2022:23:1–23:3. doi:10.4230/LIPIcs.SAND.2022.23
LibreCat | DOI
 
2022 | Bachelorsthesis | LibreCat-ID: 34962
Anonymous A. Evaluating Database Systems Relying on Secure Multiparty Computation.; 2022.
LibreCat
 
2022 | Mastersthesis | LibreCat-ID: 34963
Anonymous A. Cost of Privacy-Preserving SMPC Protocols for NN-Based Inference.; 2022.
LibreCat
 
2021 | Bachelorsthesis | LibreCat-ID: 28998
Suermann D. Schutz Und Stabilisierung von Overlay-Netzwerken Mithilfe Des Relay-Layers.; 2021.
LibreCat
 
2021 | Bachelorsthesis | LibreCat-ID: 21197
Mengshi M. Self-Stabilizing Arrow Protocol on Spanning Trees with a Low Diameter.; 2021.
LibreCat
 
2021 | Conference Paper | LibreCat-ID: 22283
Götte T, Hinnenthal K, Scheideler C, Werthmann J. Time-Optimal Construction of Overlays. In: Censor-Hillel K, ed. Proc. of the 40th ACM Symposium on Principles of Distributed Computing (PODC ’21). New York: ACM. doi:10.1145/3465084.3467932
LibreCat | Files available | DOI
 
2021 | Book Chapter | LibreCat-ID: 22057
Jager T, Kurek R, Niehues D. Efficient Adaptively-Secure IB-KEMs and VRFs via Near-Collision Resistance. In: Public-Key Cryptography – PKC 2021. Cham; 2021. doi:10.1007/978-3-030-75245-3_22
LibreCat | Files available | DOI
 
2021 | Book Chapter | LibreCat-ID: 22059
Niehues D. Verifiable Random Functions with Optimal Tightness. In: Public-Key Cryptography – PKC 2021. Cham; 2021. doi:10.1007/978-3-030-75248-4_3
LibreCat | Files available | DOI
 
2021 | Preprint | LibreCat-ID: 26645 | OA
Bobolz J, Eidens F, Heitjohann R, Fell J. Cryptimeleon: A Library for Fast Prototyping of Privacy-Preserving Cryptographic Schemes. Published online 2021.
LibreCat | Download (ext.)
 
2021 | Conference Paper | LibreCat-ID: 29566
Bobolz J, Eidens F, Krenn S, Ramacher S, Samelin K. Issuer-Hiding Attribute-Based Credentials. In: Cryptology and Network Security. Springer International Publishing; 2021. doi:10.1007/978-3-030-92548-2_9
LibreCat | DOI
 
2020 | Conference Paper | LibreCat-ID: 19551
Kurek R. Efficient Forward-Secure Threshold Public Key Encryption. In: K. Liu J, Cui H, eds. Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings. Vol 12248. Lecture Notes in Computer Science. Springer; 2020:330-349. doi:10.1007/978-3-030-55304-3\_17
LibreCat | DOI
 
2020 | Conference Paper | LibreCat-ID: 19553
Kurek R. Efficient Forward-Secure Threshold Signatures. In: Aoki K, Kanaoka A, eds. Advances in Information and Computer Security - 15th International Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020, Proceedings. Vol 12231. Lecture Notes in Computer Science. Springer; 2020:239-260. doi:10.1007/978-3-030-58208-1\_14
LibreCat | DOI
 
2020 | Dissertation | LibreCat-ID: 24710
Kurek R. Efficient Cryptographic Constructions with Strong Security Guarantees.; 2020.
LibreCat | Files available
 
2020 | Book Chapter | LibreCat-ID: 21396
Jager T, Niehues D. On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions. In: Lecture Notes in Computer Science. Cham; 2020. doi:10.1007/978-3-030-38471-5_13
LibreCat | Files available | DOI | Download (ext.)
 
2020 | Dissertation | LibreCat-ID: 18520
Setzer A. Local Graph Transformation Primitives For Some Basic Problems In Overlay Networks. Universität Paderborn; 2020. doi:10.17619/UNIPB/1-1026
LibreCat | DOI
 
2020 | Bachelorsthesis | LibreCat-ID: 18637 | OA
Schürmann P. A Group Signature Scheme from Flexible Public Key Signatures and Structure-Preserving Signatures on Equivalence Classes. Universität Paderborn; 2020.
LibreCat | Files available
 
2020 | Bachelorsthesis | LibreCat-ID: 18639
Terfort T. Enhancing Security by Usage of Universal One-Way Hash Functions. Universität Paderborn; 2020.
LibreCat
 
2020 | Mastersthesis | LibreCat-ID: 15770
Warner D. On the Complexity of Local Transformations in SDN Overlays. Universität Paderborn; 2020.
LibreCat
 
2020 | Journal Article | LibreCat-ID: 13770
Karl H, Kundisch D, Meyer auf der Heide F, Wehrheim H. A Case for a New IT Ecosystem: On-The-Fly Computing. Business & Information Systems Engineering. 2020;62(6):467-481. doi:10.1007/s12599-019-00627-x
LibreCat | Files available | DOI
 
2020 | Bachelorsthesis | LibreCat-ID: 18638
Kramer P. Comparison of Zero-Knowledge Range Proofs. Universität Paderborn; 2020.
LibreCat
 
2019 | Conference Paper | LibreCat-ID: 6976
Götte T, Vijayalakshmi VR, Scheideler C. Always be Two Steps Ahead of Your Enemy - Maintaining a Routable Overlay under Massive Churn with an Almost Up-to-date Adversary. In: Proceedings of the 2019 IEEE 33rd International Parallel  and Distributed Processing Symposium (IPDPS ’19). IEEE.
LibreCat | Files available
 
2019 | Journal Article | LibreCat-ID: 14830
Gmyr R, Lefevre J, Scheideler C. Self-Stabilizing Metric Graphs. Theory Comput Syst. 2019;63(2):177-199. doi:10.1007/s00224-017-9823-4
LibreCat | DOI
 
2019 | Mastersthesis | LibreCat-ID: 13128 | OA
Bröcher H. Rational Secure Multiparty Computation. Universität Paderborn; 2019.
LibreCat | Files available
 
2019 | Mastersthesis | LibreCat-ID: 10271
N. N. Implementation and Evaluation of Authenticated Data Structures Using Intel SGX Enclaves. Universität Paderborn; 2019.
LibreCat
 
2019 | Bachelorsthesis | LibreCat-ID: 13592
Pilot M. Efficient Finite-Field Arithmetic for Elliptic Curve Cryptography in Java. Universität Paderborn; 2019.
LibreCat
 
2019 | Mastersthesis | LibreCat-ID: 13648 | OA
Scholz S. Implementation and Comparison of Elliptic Curve Algorithms in Java. Universität Paderborn; 2019.
LibreCat | Files available
 
2019 | Conference Paper | LibreCat-ID: 13904 | OA
Blömer J, Bobolz J, Diemert DP, Eidens F. Updatable Anonymous Credentials and Applications to Incentive Systems. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security - CCS ’19. Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security - CCS ’19. ; 2019. doi:10.1145/3319535.3354223
LibreCat | Files available | DOI | Download (ext.)
 
2018 | Conference Paper | LibreCat-ID: 2862 | OA
Blömer J, Eidens F, Juhnke J. Practical, Anonymous, and Publicly Linkable Universally-Composable Reputation Systems. In: Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers’ Track at the {RSA} Conference 2018, Proceedings. Cham: Springer International Publishing; 2018:470-490. doi:10.1007/978-3-319-76953-0_25
LibreCat | Files available | DOI | Download (ext.)
 
2018 | Journal Article | LibreCat-ID: 2685
Blömer J, Kohn K. Voronoi Cells of Lattices with Respect to Arbitrary Norms. SIAM Journal on Applied Algebra and Geometry. 2018;2(2):314-338. doi:10.1137/17M1132045
LibreCat | Files available | DOI
 
2018 | Conference Paper | LibreCat-ID: 3265 | OA
Bemmann K, Blömer J, Bobolz J, et al. Fully-Featured Anonymous Credentials with Reputation System. In: Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES ’18. New York, NY, USA: ACM. doi:10.1145/3230833.3234517
LibreCat | Files available | DOI | Download (ext.)
 
2018 | Conference Paper | LibreCat-ID: 3422
Robinson P, Scheideler C, Setzer A. Breaking the $\tilde\Omega(\sqrt{n})$ Barrier: Fast Consensus under a Late Adversary. In: Proceedings of the 30th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA). doi:10.1145/3210377.3210399
LibreCat | Files available | DOI
 
2018 | Conference Paper | LibreCat-ID: 2965
Blömer J, Löken N. Cloud Architectures for Searchable Encryption. In: Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018. New York, NY, USA: ACM; :25:1--25:10. doi:10.1145/3230833.3230853
LibreCat | Files available | DOI
 
2018 | Dissertation | LibreCat-ID: 1138
Gmyr R. Distributed Algorithms for Overlay Networks and Programmable Matter. Universität Paderborn; 2018. doi:10.17619/UNIPB/1-265
LibreCat | DOI
 
2018 | Working Paper | LibreCat-ID: 5820
Blömer J, Bobolz J, Scheideler C, Setzer A. Provably Anonymous Communication Based on Trusted Execution Environments.
LibreCat | Files available
 
2018 | Conference Paper | LibreCat-ID: 5985
Scheideler C. Relays: Towards a Link Layer for Robust and Secure Fog Computing. In: Proceedings of the 2018 Workshop on Theory and Practice for Integrated Cloud, Fog and Edge Computing Paradigms, TOPIC@PODC 2018, Egham, United Kingdom, July 27, 2018. ; 2018:1-2. doi:10.1145/3229774.3229781
LibreCat | Files available | DOI
 
2018 | Conference Paper | LibreCat-ID: 5216
Scheideler C, Setzer A. Relays: A New Approach for the Finite Departure Problem in Overlay Networks. In: Proceedings of the 20th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS 2018). ; 2018. doi:10.1007/978-3-030-03232-6_16
LibreCat | Files available | DOI
 
2018 | Dissertation | LibreCat-ID: 6597
Juhnke J. Models and Constructions for Secure Reputation Systems. Universität Paderborn; 2018. doi:10.17619/UNIPB/1-570
LibreCat | DOI
 
2018 | Conference Paper | LibreCat-ID: 3873 | OA
Blömer J, Eidens F, Juhnke J. Enhanced Security of Attribute-Based Signatures. In: The International Conference on Cryptology And Network Security (CANS). Vol 11124. Lecture Notes in Computer Science. Springer; 2018:235-255. doi:10.1007/978-3-030-00434-7_12
LibreCat | Files available | DOI | Download (ext.)
 
2018 | Conference Paper | LibreCat-ID: 2379 | OA
Blömer J, Bobolz J. Delegatable Attribute-based Anonymous Credentials from Dynamically Malleable Signatures. In: ACNS 2018 Applied Cryptography & Network Security. LNCS. doi:10.1007/978-3-319-93387-0_12
LibreCat | Files available | DOI | Download (ext.)
 
2017 | Conference Paper | LibreCat-ID: 2967 | OA
Blömer J, Liske G. Subtleties in Security Definitions for Predicate Encryption with Public Index. In: Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS). Vol 10693. Lecture Notes in Computer Science. Cham: Springer International Publishing; 2017:438-453. doi:10.1007/978-3-319-72453-9_35
LibreCat | Files available | DOI | Download (ext.)
 
2017 | Dissertation | LibreCat-ID: 116
Liske G. CCA-Security for Predicate Encryption Schemes. Universität Paderborn; 2017. doi:10.17619/UNIPB/1-220
LibreCat | DOI | Download (ext.)
 
2017 | Conference Paper | LibreCat-ID: 2344 | OA
Blömer J, Günther P, Krummel V, Löken N. Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations. In: Foundations and Practice of Security. Cham: Springer International Publishing; 2017:3-17. doi:10.1007/978-3-319-75650-9_1
LibreCat | Files available | DOI
 
2017 | Bachelorsthesis | LibreCat-ID: 18027
Banh NC. An Asynchronous Adaption of a Churn-Resistant Overlay Network. Universität Paderborn; 2017.
LibreCat
 
2017 | Mastersthesis | LibreCat-ID: 60
Niehus D. Semantically Secure Attribute-Based Searchable Encryption. Universität Paderborn; 2017.
LibreCat
 
2017 | Mastersthesis | LibreCat-ID: 62
Weis E. Searchable Encryption. Universität Paderborn; 2017.
LibreCat
 
2017 | Bachelorsthesis | LibreCat-ID: 698
Banh NC. As Asynchronous Adaption of a Churn-Resistant Overlay Network. Universität Paderborn; 2017.
LibreCat
 
2017 | Bachelorsthesis | LibreCat-ID: 88
Ganesh Athreya A. Instantiating a Predicate Encryption Scheme via Pair Encodings. Universität Paderborn; 2017.
LibreCat
 
2017 | Bachelorsthesis | LibreCat-ID: 67
Jürgens M. Provably Secure Key-Derivation-Functions for Certain Types of Applications. Universität Paderborn; 2017.
LibreCat
 
2017 | Bachelorsthesis | LibreCat-ID: 104
Diemert D. EAX - An Authenticated Encryption Mode for Block Ciphers. Universität Paderborn; 2017.
LibreCat
 
2017 | Bachelorsthesis | LibreCat-ID: 1049
Beckendorfer B. Visualisierung zu Algorithmen verteilter Netzwerksysteme. Universität Paderborn; 2017.
LibreCat
 
2017 | Mastersthesis | LibreCat-ID: 117
Bemmann P. Attribute-Based Signatures Using Structure Preserving Signatures. Universität Paderborn; 2017.
LibreCat
 
2017 | Bachelorsthesis | LibreCat-ID: 118
Chi Banh N. An Asynchronous Adaptation of a Churn-Resistant Overlay Network. Universität Paderborn; 2017.
LibreCat
 
2016 | Bachelorsthesis | LibreCat-ID: 213
Porzenheim L. Comparison of Different Definitions of Chosen-Ciphertext Security in Encryption Schemes. Universität Paderborn; 2016.
LibreCat
 
2016 | Bachelorsthesis | LibreCat-ID: 214
Bemmann KS. Commitment Schemes - Definitions, Variants, and Security. Universität Paderborn; 2016.
LibreCat
 
2016 | Conference Paper | LibreCat-ID: 215
Drees M, Gmyr R, Scheideler C. Churn- and DoS-resistant Overlay Networks Based on Network Reconfiguration. In: Proceedings of the 28th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA). ; 2016:417--427. doi:10.1145/2935764.2935783
LibreCat | Files available | DOI
 
2016 | Conference Paper | LibreCat-ID: 208
Blömer J, Liske G. Construction of Fully CCA-Secure Predicate Encryptions from Pair Encoding Schemes. In: Proceedings of the CT-RSA 2016. LNCS. ; 2016:431-447. doi:10.1007/978-3-319-29485-8_25
LibreCat | Files available | DOI
 
2016 | Mastersthesis | LibreCat-ID: 223
Hinnenthal K. Aggregation in Overlay Networks. Universität Paderborn; 2016.
LibreCat | Files available
 
2016 | Dissertation | LibreCat-ID: 167
Günther P. Physical Attacks on Pairing-Based Cryptography. Universität Paderborn; 2016.
LibreCat | Files available | Download (ext.)
 
2016 | Conference Paper | LibreCat-ID: 155
Gmyr R, Lefèvre J, Scheideler C. Self-stabilizing Metric Graphs. In: Proceedings of the 18th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS). LNCS. ; 2016:248--262. doi:10.1007/978-3-319-49259-9_20
LibreCat | Files available | DOI
 
2016 | Mastersthesis | LibreCat-ID: 146
Hamm J. Symmetric Anonymous Credentials with Protocols for Relations on Attributes. Universität Paderborn; 2016.
LibreCat
 
2016 | Bachelorsthesis | LibreCat-ID: 152
Dallmeier F. Short Randomizable Aggregatable Signatures: Constructions and Security Analysis. Universität Paderborn; 2016.
LibreCat
 
2016 | Dissertation | LibreCat-ID: 10136
Eikel M. Insider-Resistent Distributed Storage Systems. Universität Paderborn; 2016.
LibreCat | Files available
 
2015 | Conference Paper | LibreCat-ID: 253
Blömer J, Juhnke J, Löken N. Short Group Signatures with Distributed Traceability. In: Proceedings of the Sixth International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS). LNCS. ; 2015:166-180. doi:10.1007/978-3-319-32859-1_14
LibreCat | Files available | DOI
 
2015 | Journal Article | LibreCat-ID: 284
Eikel M, Scheideler C. IRIS: A Robust Information System Against Insider DoS Attacks. Transactions on Parallel Computing. 2015;(3):18:1--18:33. doi:10.1145/2809806
LibreCat | Files available | DOI
 
2015 | Bachelorsthesis | LibreCat-ID: 286
Kalde B. Implementierung eines hybriden Verschlüsselungsverfahrens nach Cramer und Shoup. Universität Paderborn; 2015.
LibreCat
 
2015 | Bachelorsthesis | LibreCat-ID: 261
Eisenhofer T. Protokolle zur authentifizierten Schüsselvereinbarung. Universität Paderborn; 2015.
LibreCat
 
2015 | Mastersthesis | LibreCat-ID: 321
Eidens F. Anonymous Credential System Based on Q-Strong Diffie-Hellman Assumption. Universität Paderborn; 2015.
LibreCat | Files available
 
2015 | Conference Paper | LibreCat-ID: 322 | OA
Blömer J, Juhnke J, Kolb C. Anonymous and Publicly Linkable Reputation Systems. In: Proceedings of the 18th International Conference on Financial Cryptography and Data Security (FC). LNCS. ; 2015:478--488. doi:10.1007/978-3-662-47854-7_29
LibreCat | Files available | DOI | Download (ext.)
 
2015 | Mastersthesis | LibreCat-ID: 325
Löken N. A Group Signature Scheme with Distributed Group Management - An Application of Threshold Encryption. Universität Paderborn; 2015.
LibreCat | Files available
 
2015 | Bachelorsthesis | LibreCat-ID: 326
Heihoff F. A Group Signature Scheme Based on the LSRW Assumption. Universität Paderborn; 2015.
LibreCat
 
2015 | Mastersthesis | LibreCat-ID: 297
Sosniak M. Evaluation of Pairing Optimization for Embedded Platforms. Universität Paderborn; 2015.
LibreCat
 
2015 | Mastersthesis | LibreCat-ID: 299
Gerken B. Elektromagnetische Seitenkanalangriffe auf paarungsbasierte Kryptographie. Universität Paderborn; 2015.
LibreCat
 
2015 | Mastersthesis | LibreCat-ID: 301 | OA
Bobolz J. Efficient Verifier-Local Revocation for Anonymous Credentials. Universität Paderborn; 2015.
LibreCat | Files available
 
2015 | Mastersthesis | LibreCat-ID: 302
Stroh C. Efficient Attributes for Pairing-Based Anonymous Credentials. Universität Paderborn; 2015.
LibreCat
 
2015 | Dissertation | LibreCat-ID: 305
Kniesburges S. Distributed Data Structures and the Power of Topological Self-Stabilization. Universität Paderborn; 2015.
LibreCat | Files available
 
2015 | Mastersthesis | LibreCat-ID: 312
Schleiter P. Constructions of Fully Secure Predicate Encryption Schemes. Universität Paderborn; 2015.
LibreCat | Files available
 
2015 | Mastersthesis | LibreCat-ID: 273
Kohn K. Number of Voronoi-Relevant Vectors in Lattices with Respect to Arbitrary Norms. Universität Paderborn; 2015.
LibreCat
 
2015 | Report | LibreCat-ID: 233 | OA
Blömer J, Kohn K. Voronoi Cells of Lattices with Respect to Arbitrary Norms. Universität Paderborn; 2015.
LibreCat | Files available | Download (ext.)
 
2014 | Conference Paper | LibreCat-ID: 346
Brangewitz S, Jungmann A, Petrlic R, Platenius MC. Towards a Flexible and Privacy-Preserving Reputation System for Markets of Composed Services. In: Proceedings of the 6th International Conferences on Advanced Service Computing (SERVICE COMPUTATION). ; 2014:49-57.
LibreCat | Files available
 
2014 | Report | LibreCat-ID: 349
Sorge C. The Legal Classification of Identity-Based Signatures.; 2014.
LibreCat | Files available
 
2014 | Conference Paper | LibreCat-ID: 355
Blömer J, Günther P, Liske G. Tampering attacks in pairing-based cryptography. In: Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC). ; 2014:1--7. doi:10.1109/FDTC.2014.10
LibreCat | Files available | DOI
 
2014 | Conference Paper | LibreCat-ID: 366
Petrlic R, Jungmann A, Platenius MC, Schäfer W, Sorge C. Security and Privacy Challenges in On-The-Fly Computing. In: Tagungsband Der 4. Konferenz Software-Technologien Und -Prozesse (STeP 2014). ; 2014:131-142.
LibreCat | Files available
 
2014 | Bachelorsthesis | LibreCat-ID: 369
Rath T. RSA-Full Domain Hash Revisited. Universität Paderborn; 2014.
LibreCat
 
2014 | Conference Paper | LibreCat-ID: 371
Scheideler C, Setzer A, Eikel M. RoBuSt: A Crash-Failure-Resistant Distributed Storage System. In: Proceedings of the 18th International Conference on Principles of Distributed Systems (OPODIS). LNCS. ; 2014:107--122. doi:10.1007/978-3-319-14472-6_8
LibreCat | Files available | DOI
 
2014 | Journal Article | LibreCat-ID: 378
Kniesburges S, Koutsopoulos A, Scheideler C. Re-Chord: A Self-stabilizing Chord Overlay Network. Theory of Computing Systems. 2014;(3):591-612. doi:10.1007/s00224-012-9431-2
LibreCat | Files available | DOI
 
2014 | Conference Paper | LibreCat-ID: 384
Petrlic R, Lutters S, Sorge C. Privacy-Preserving Reputation Management. In: Proceedings of the 29th Symposium On Applied Computing (SAC). ; 2014:1712-1718. doi:10.1145/2554850.2554881
LibreCat | Files available | DOI
 
2014 | Dissertation | LibreCat-ID: 385
Petrlic R. Privacy-Preserving Multiparty Digital Rights Management. Universität Paderborn; 2014.
LibreCat | Files available
 
2014 | Conference Paper | LibreCat-ID: 386
Petrlic R, Sorge C. Privacy-Preserving Digital Rights Management based on Attribute-based Encryption. In: Proceedings of the Sixth IFIP International Conference on New Technologies, Mobility and Security (NTMS). ; 2014:1-5. doi:10.1109/NTMS.2014.6814044
LibreCat | Files available | DOI
 
2014 | Journal Article | LibreCat-ID: 387
Awerbuch B, Richa AW, Scheideler C, Schmid S, Zhang J. Principles of Robust Medium Access and an Application to Leader Election. Transactions on Algorithms. 2014;(4). doi:10.1145/2635818
LibreCat | Files available | DOI
 
2014 | Bachelorsthesis | LibreCat-ID: 18001
Luo L. Ein Selbst-Stabilisierender Algorithmus Für Das Finite Sleep Problem in Skip+ Graphen. Universität Paderborn; 2014.
LibreCat
 
2014 | Conference Paper | LibreCat-ID: 441
Sorge C, Petrlic R. Datenschutz im Future Internet: rechtliche Aspekte und technische Maßnahmen. In: Tagungsband Des 17. Internationalen Rechtsinformatik Symposions. ; 2014.
LibreCat | Files available
 
2014 | Preprint | LibreCat-ID: 442 | OA
Blömer J, Liske G. Constructing CCA-secure predicate encapsulation schemes from CPA-secure schemes and universal one-way hash functions. 2014.
LibreCat | Files available | Download (ext.)
 
2014 | Conference Paper | LibreCat-ID: 446
Ogierman A, Richa AW, Scheideler C, Schmid S, Zhang J. Competitive MAC under adversarial SINR. In: Proceedings of the 33rd Annual IEEE International Conference on Computer Communications (INFOCOM). ; 2014:2751--2759. doi:10.1109/INFOCOM.2014.6848224
LibreCat | Files available | DOI
 
2014 | Mastersthesis | LibreCat-ID: 460
Mittendorf R. Advanced AES-Key Recovery from Decayed RAM-Dumps Using Multi-Threading and FPGAs. Universität Paderborn; 2014.
LibreCat
 
2014 | Conference Paper | LibreCat-ID: 463
Blömer J, Gomes da Silva R, Günther P, Krämer J, Seifert J-P. A Practical Second-Order Fault Attack against a Real-World Pairing Implementation. In: Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC). ; 2014:123--136. doi:10.1109/FDTC.2014.22
LibreCat | Files available | DOI
 
2014 | Journal Article | LibreCat-ID: 479
Sorge C. The Legal Classification of Identity-Based Signatures. Computer Law & Security Review. 2014;30(2):126-136. doi:10.1016/j.clsr.2014.01.002
LibreCat | Files available | DOI
 
2014 | Conference Paper | LibreCat-ID: 401
Platenius MC, Arifulina S, Petrlic R, Schäfer W. Matching of Incomplete Service Specifications Exemplified by Privacy Policy Matching. In: Proceedings of the 4th International Workshop on Adaptive Services for the Future Internet. Communications in Computer and Information Science. ; 2014:6-17. doi:10.1007/978-3-319-14886-1_2
LibreCat | Files available | DOI
 
2014 | Journal Article | LibreCat-ID: 410
Jungmann A, Brangewitz S, Petrlic R, Platenius MC. Incorporating Reputation Information into Decision-Making Processes in Markets of Composed Services. International Journal On Advances in Intelligent Systems (IntSys). 2014;7(3&4):572--594.
LibreCat | Files available | Download (ext.)
 
2014 | Mastersthesis | LibreCat-ID: 414
Jochheim J. Hiding Software Components Using Functional Encryption. Universität Paderborn; 2014.
LibreCat
 
2014 | Bachelorsthesis | LibreCat-ID: 416
Bemmann P. Group Signature Schemes with Strong Exculpability. Universität Paderborn; 2014.
LibreCat
 
2014 | Bachelorsthesis | LibreCat-ID: 421
Lippert J. Fujisaki-Okamoto Transformation. Universität Paderborn; 2014.
LibreCat
 
2014 | Bachelorsthesis | LibreCat-ID: 438
Kokoschka A. Designing an Anonymous and Secure Reputation System Using a Group Signature Variant. Universität Paderborn; 2014.
LibreCat
 
2013 | Bachelorsthesis | LibreCat-ID: 471
Tezer A. Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen. Universität Paderborn; 2013.
LibreCat
 
2013 | Conference Paper | LibreCat-ID: 473
Petrlic R, Sekula S. Unlinkable content playbacks in a multiparty DRM system. In: Wang L, Shafiq B, eds. Data and Applications Security and Privacy XXVII. Lecture Notes in Computer Science. ; 2013:289-296. doi:10.1007/978-3-642-39256-6_21
LibreCat | Files available | DOI
 
2013 | Conference Paper | LibreCat-ID: 475
Joshi N, Petrlic R. Towards practical privacy-preserving Digital Rights Management for Cloud Computing. In: Proceedings of the 10th Annual IEEE Consumer Communications & Networking Conference (CCNC). ; 2013:259-264. doi:10.1109/CCNC.2013.6488456
LibreCat | Files available | DOI
 
2013 | Bachelorsthesis | LibreCat-ID: 486
Otte O. Seitenkanalresistenz paarungsbasierter Kryptographie. Universität Paderborn; 2013.
LibreCat
 
2013 | Bachelorsthesis | LibreCat-ID: 487 | OA
Bobolz J. Security Proofs for Pairing-Based Cryptography in the Generic Group Model. Universität Paderborn; 2013.
LibreCat | Files available
 
2013 | Conference Paper | LibreCat-ID: 488
Blömer J, Günther P, Krummel V. Securing Critical Unattended Systems with Identity Based Cryptography - A Case Study. In: Proceedings of the 5th International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS). ; 2013:98-105.
LibreCat | Files available
 
2013 | Conference Paper | LibreCat-ID: 519
Eikel M, Scheideler C. IRIS: A Robust Information System Against Insider DoS-Attacks. In: Proceedings of the 25th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA). ; 2013:119-129. doi:10.1145/2486159.2486186
LibreCat | Files available | DOI
 
2013 | Mastersthesis | LibreCat-ID: 521
Riebler H. Identifikation und Wiederherstellung von kryptographischen Schlüsseln mit FPGAs. Universität Paderborn; 2013.
LibreCat
 
2013 | Mastersthesis | LibreCat-ID: 531
Lutters S. Entwurf eines datenschutzgerechten Reputationssystems. Universität Paderborn; 2013.
LibreCat
 
2013 | Bachelorsthesis | LibreCat-ID: 532
Hilleckes H. Entwicklung und Analyse einer verteilten Speicherverwaltung für dynamische heterogene Speichersysteme. Universität Paderborn; 2013.
LibreCat
 
2013 | Preprint | LibreCat-ID: 538 | OA
Blömer J, Liske G. Direct Chosen-Ciphertext Secure Attribute-Based Key Encapsulations without Random Oracles. 2013.
LibreCat | Files available | Download (ext.)
 
2013 | Conference Paper | LibreCat-ID: 542
Kniesburges S, Koutsopoulos A, Scheideler C. CONE-DHT: A distributed self-stabilizing algorithm for a heterogeneous storage system. In: Proceedings of the 27th International Symposium on Distributed Computing (DISC). LNCS. ; 2013:537-549. doi:10.1007/978-3-642-41527-2_37
LibreCat | Files available | DOI
 
2013 | Conference Paper | LibreCat-ID: 546
Graffi K, Benter M, Divband M, Kniesburges S, Koutsopoulos A. Ca-Re-Chord: A Churn Resistant Self-stabilizing Chord Overlay Network. In: Proceedings of the Conference on Networked Systems (NetSys). ; 2013:27-34. doi:10.1109/NetSys.2013.11
LibreCat | Files available | DOI
 
2013 | Bachelorsthesis | LibreCat-ID: 553
Kohn K. Attributbasierte Verschlüsselung mittels Gittermethoden - Mathematische Grundlagen, Verfahren und Sicherheitsbeweise. Universität Paderborn; 2013.
LibreCat
 
2013 | Journal Article | LibreCat-ID: 561
Petrlic R, Sekula S, Sorge C. A privacy-friendly Architecture for future Cloud Computing. International Journal of Grid and Utility Computing. 2013;(4):265-277. doi:10.1504/IJGUC.2013.057120
LibreCat | Files available | DOI | Download (ext.)
 
2013 | Conference Paper | LibreCat-ID: 528
Riebler H, Kenter T, Sorge C, Plessl C. FPGA-accelerated Key Search for Cold-Boot Attacks against AES. In: Proceedings of the International Conference on Field-Programmable Technology (FPT). IEEE; 2013:386-389. doi:10.1109/FPT.2013.6718394
LibreCat | Files available | DOI
 
2012 | Conference (Editor) | LibreCat-ID: 577
Richa AW, Scheideler C, eds. Stabilization, Safety, and Security of Distributed Systems.; 2012. doi:10.1007/978-3-642-33536-5
LibreCat | Files available | DOI
 
2012 | Conference Paper | LibreCat-ID: 581
Drees M, Hüllmann (married name: Eikel) M, Koutsopoulos A, Scheideler C. Self-Organizing Particle Systems. In: Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium (IPDPS). ; 2012:1272-1283. doi:10.1109/IPDPS.2012.116
LibreCat | Files available | DOI
 
2012 | Conference Paper | LibreCat-ID: 585
Petrlic R. Proxy Re-Encryption in a Privacy-Preserving Cloud Computing DRM Scheme. In: Proceedings of 4th International Symposium on Cyberspace Safety and Security (CSS). LNCS. ; 2012:194-211. doi:10.1007/978-3-642-35362-8_16
LibreCat | Files available | DOI
 
2012 | Conference Paper | LibreCat-ID: 588
Petrlic R, Sorge C. Privacy-Preserving DRM for Cloud Computing. In: Proceedings of the 26th IEEE International Conference on Advanced Information Networking and Applications (AINA). ; 2012:1286-1291. doi:10.1109/WAINA.2012.92
LibreCat | Files available | DOI
 
2012 | Conference Paper | LibreCat-ID: 589
Petrlic R. Privacy-Preserving Digital Rights Management in a Trusted Cloud Environment. In: Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). ; 2012:958-963. doi:10.1109/TrustCom.2012.225
LibreCat | Files available | DOI
 
2012 | Bachelorsthesis | LibreCat-ID: 606
Löken N. Identitätsbasierte Signaturen - Ein Sicherheitsbeweis für Signaturen auf Grundlage von Gap-Diffie-Hellman-Gruppen mit Hilfe des Forking-Lemmas. Universität Paderborn; 2012.
LibreCat
 
2012 | Bachelorsthesis | LibreCat-ID: 607
Haarhoff T. Identitätsbasierte Kryptographie - Implementierung von Paarungen für Körper der Charakteristik 2. Universität Paderborn; 2012.
LibreCat
 
2012 | Bachelorsthesis | LibreCat-ID: 620
Mittendorf R. Datenschutzgerechtes DRM im Cloud Computing. Universität Paderborn; 2012.
LibreCat
 
2012 | Bachelorsthesis | LibreCat-ID: 621
Sekula S. Datenschutzgerechte E-Payment-Schemata im On-The-Fly Computing. Universität Paderborn; 2012.
LibreCat
 
2012 | Conference Paper | LibreCat-ID: 623
Richa AW, Scheideler C, Schmid S, Zhang J. Competitive and fair throughput for co-existing networks under adversarial interference. In: Proceedings of the 31st Annual ACM SIGACT-SIGOPS Symposium on Principles and Distributed Computing (PODC). ; 2012:291-300. doi:10.1145/2332432.2332488
LibreCat | Files available | DOI
 
2012 | Bachelorsthesis | LibreCat-ID: 629
Schleiter P. Attribute-basierte Verschlüsselung. Universität Paderborn; 2012.
LibreCat
 
2011 | Conference Paper | LibreCat-ID: 645
Doerr B, Goldberg LA, Minder L, Sauerwald T, Scheideler C. Stabilizing consensus with the power of two choices. In: Proceedings of the 23rd ACM Symposium on Parallelism in Algorithms and Architectures (SPAA). ; 2011:149-158. doi:10.1145/1989493.1989516
LibreCat | Files available | DOI
 
2011 | Conference Paper | LibreCat-ID: 646
Richa AW, Scheideler C. Self-Stabilizing DeBruijn Networks. In: Proceedings of the 13th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS). LNCS. ; 2011:416-430. doi:10.1007/978-3-642-24550-3_31
LibreCat | Files available | DOI
 
2011 | Mastersthesis | LibreCat-ID: 659
Liske G. Fault Attacks in Pairing-Based Cryptography. Universität Paderborn; 2011.
LibreCat | Files available
 

Filters and Search Terms

project=13

Search

Filter Publications

Display / Sort

Citation Style: AMA

Export