150 Publications

2023 | Mastersthesis | LibreCat-ID: 40440
M. Pilot, Updatable Privacy-Preserving Reputation System based on Blockchain. 2023.
LibreCat
 
2023 | Mastersthesis | LibreCat-ID: 43374 | OA
P. Schürmann, A Formal Comparison of Advanced Digital Signature Primitives. 2023.
LibreCat | Files available
 
2023 | Conference Paper | LibreCat-ID: 44855
S. Hemmrich, J. Bobolz, D. Beverungen, and J. Blömer, “Designing Business Reputation Ecosystems — A Method for Issuing and Trading Monetary Ratings on a Blockchain,” presented at the ECIS 2023, 2023.
LibreCat | Files available | Download (ext.)
 
2023 | Journal Article | LibreCat-ID: 45192
T. Götte, K. Hinnenthal, C. Scheideler, and J. Werthmann, “Time-Optimal Construction of Overlays,” Distributed Computing, 2023, doi: https://doi.org/10.1007/s00446-023-00442-4.
LibreCat | DOI
 
2023 | Bachelorsthesis | LibreCat-ID: 43375 | OA
A. Koch, Privacy-Preserving Collection and Evaluation of Log Files. 2023.
LibreCat | Files available
 
2023 | Book Chapter | LibreCat-ID: 45891 | OA
J. Blömer, F. Eidens, T. Jager, D. Niehues, and C. Scheideler, “Robustness and Security,” in On-The-Fly Computing -- Individualized IT-services in dynamic markets, vol. 412, C.-J. Haake, F. Meyer auf der Heide, M. Platzner, H. Wachsmuth, and H. Wehrheim, Eds. Paderborn: Heinz Nixdorf Institut, Universität Paderborn, 2023, pp. 145–164.
LibreCat | Files available | DOI
 
2023 | Bachelorsthesis | LibreCat-ID: 46053
F. Schneider, Utilizing Redundancy in Distributed Heterogeneous Storage. 2023.
LibreCat | Files available
 
2023 | Conference Paper | LibreCat-ID: 35014 | OA
J. Blömer, J. Bobolz, and H. Bröcher, “On the impossibility of surviving (iterated) deletion of weakly dominated strategies in rational MPC,” presented at the TCC 2023, Taipeh, Taiwan, 2023.
LibreCat | Download (ext.)
 
2023 | Conference Paper | LibreCat-ID: 43458 | OA
J. Blömer, J. Bobolz, and L. A. Porzenheim, “A Generic Construction of an Anonymous Reputation System and Instantiations from Lattices,” presented at the Asiacrypt 2023, Guangzhou, China, 2023.
LibreCat | Download (ext.)
 
2023 | Book | LibreCat-ID: 45863 | OA
C.-J. Haake, F. Meyer auf der Heide, M. Platzner, H. Wachsmuth, and H. Wehrheim, On-The-Fly Computing -- Individualized IT-services in dynamic markets, vol. 412. Paderborn: Heinz Nixdorf Institut, Universität Paderborn, 2023.
LibreCat | Files available | DOI
 
2022 | Bachelorsthesis | LibreCat-ID: 30198
S. Korzeczek, Aufarbeitung und lmplementierung von DAG-Rider. 2022.
LibreCat
 
2022 | Bachelorsthesis | LibreCat-ID: 32399
E. Vahle, Modelling and Proving Security for a Secure MPC Protocol for Stable Matching. 2022.
LibreCat
 
2022 | Conference Paper | LibreCat-ID: 32602
A. Padalkin, C. Scheideler, and D. Warner, “The Structural Power of Reconfigurable Circuits in the Amoebot Model,” in 28th International Conference on DNA Computing and Molecular Programming (DNA 28), 2022, vol. 238, p. 8:1–8:22, doi: 10.4230/LIPIcs.DNA.28.8.
LibreCat | DOI
 
2022 | Conference Paper | LibreCat-ID: 32603
I. Kostitsyna, C. Scheideler, and D. Warner, “Fault-Tolerant Shape Formation in the Amoebot Model,” in 28th International Conference on DNA Computing and Molecular Programming (DNA 28), 2022, vol. 238, p. 9:1–9:22, doi: 10.4230/LIPIcs.DNA.28.9.
LibreCat | DOI
 
2022 | Bachelorsthesis | LibreCat-ID: 32398
H. Siek, Bringing Structure to Structure-Preserving Signatures: Overview, Implementation and Comparison of Selected SPS Schemes. 2022.
LibreCat
 
2022 | Mastersthesis | LibreCat-ID: 31485
P. Kramer, On Transforming Lattice-Based Cryptography to the Ring Setting. 2022.
LibreCat
 
2022 | Dissertation | LibreCat-ID: 29763 | OA
D. Niehues, More Efficient Techniques for Adaptively-Secure Cryptography. 2022.
LibreCat | Files available | DOI | Download (ext.)
 
2022 | Conference Paper | LibreCat-ID: 33240
T. Götte and C. Scheideler, “Brief Announcement: The (Limited) Power of Multiple Identities: Asynchronous Byzantine Reliable Broadcast with Improved Resilience through Collusion,” in SPAA ’22: 34th ACM Symposium on Parallelism in Algorithms and Architectures, Philadelphia, PA, USA, July 11 - 14, 2022, 2022, pp. 99–101, doi: 10.1145/3490148.3538556.
LibreCat | DOI
 
2022 | Conference Paper | LibreCat-ID: 30987
I. Kostitsyna, C. Scheideler, and D. Warner, “Brief Announcement: Fault-Tolerant Shape Formation in the Amoebot Model,” in 1st Symposium on Algorithmic Foundations of Dynamic Networks (SAND 2022), 2022, vol. 221, p. 23:1–23:3, doi: 10.4230/LIPIcs.SAND.2022.23.
LibreCat | DOI
 
2022 | Bachelorsthesis | LibreCat-ID: 34962
A. Anonymous, Evaluating database systems relying on secure multiparty computation. 2022.
LibreCat
 
2022 | Mastersthesis | LibreCat-ID: 34963
A. Anonymous, Cost of Privacy-preserving SMPC Protocols for NN-Based Inference. 2022.
LibreCat
 
2021 | Bachelorsthesis | LibreCat-ID: 28998
D. Suermann, Schutz und Stabilisierung von Overlay-Netzwerken mithilfe des Relay-Layers. 2021.
LibreCat
 
2021 | Bachelorsthesis | LibreCat-ID: 21197
M. Mengshi, Self-stabilizing Arrow Protocol on Spanning Trees with a Low Diameter. 2021.
LibreCat
 
2021 | Conference Paper | LibreCat-ID: 22283
T. Götte, K. Hinnenthal, C. Scheideler, and J. Werthmann, “Time-Optimal Construction of Overlays,” in Proc. of the 40th ACM Symposium on Principles of Distributed Computing (PODC ’21), Virtual.
LibreCat | Files available | DOI
 
2021 | Book Chapter | LibreCat-ID: 22057
T. Jager, R. Kurek, and D. Niehues, “Efficient Adaptively-Secure IB-KEMs and VRFs via Near-Collision Resistance,” in Public-Key Cryptography – PKC 2021, Cham, 2021.
LibreCat | Files available | DOI
 
2021 | Book Chapter | LibreCat-ID: 22059
D. Niehues, “Verifiable Random Functions with Optimal Tightness,” in Public-Key Cryptography – PKC 2021, Cham, 2021.
LibreCat | Files available | DOI
 
2021 | Preprint | LibreCat-ID: 26645 | OA
J. Bobolz, F. Eidens, R. Heitjohann, and J. Fell, “Cryptimeleon: A Library for Fast Prototyping of Privacy-Preserving Cryptographic Schemes.” IACR eprint, 2021.
LibreCat | Download (ext.)
 
2021 | Conference Paper | LibreCat-ID: 29566
J. Bobolz, F. Eidens, S. Krenn, S. Ramacher, and K. Samelin, “Issuer-Hiding Attribute-Based Credentials,” 2021, doi: 10.1007/978-3-030-92548-2_9.
LibreCat | DOI
 
2020 | Conference Paper | LibreCat-ID: 19551
R. Kurek, “Efficient Forward-Secure Threshold Public Key Encryption,” in Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings, 2020, vol. 12248, pp. 330–349.
LibreCat | DOI
 
2020 | Conference Paper | LibreCat-ID: 19553
R. Kurek, “Efficient Forward-Secure Threshold Signatures,” in Advances in Information and Computer Security - 15th International Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020, Proceedings, 2020, vol. 12231, pp. 239–260.
LibreCat | DOI
 
2020 | Dissertation | LibreCat-ID: 24710
R. Kurek, Efficient Cryptographic Constructions with Strong Security Guarantees. 2020.
LibreCat | Files available
 
2020 | Book Chapter | LibreCat-ID: 21396
T. Jager and D. Niehues, “On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions,” in Lecture Notes in Computer Science, Cham, 2020.
LibreCat | Files available | DOI | Download (ext.)
 
2020 | Dissertation | LibreCat-ID: 18520
A. Setzer, Local Graph Transformation Primitives For Some Basic Problems In Overlay Networks. Universität Paderborn, 2020.
LibreCat | DOI
 
2020 | Bachelorsthesis | LibreCat-ID: 18637 | OA
P. Schürmann, A Group Signature Scheme from Flexible Public Key Signatures and Structure-Preserving Signatures on Equivalence Classes. Universität Paderborn, 2020.
LibreCat | Files available
 
2020 | Bachelorsthesis | LibreCat-ID: 18639
T. Terfort, Enhancing Security by Usage of Universal One-Way Hash Functions. Universität Paderborn, 2020.
LibreCat
 
2020 | Mastersthesis | LibreCat-ID: 15770
D. Warner, On the complexity of local transformations in SDN overlays. Universität Paderborn, 2020.
LibreCat
 
2020 | Journal Article | LibreCat-ID: 13770
H. Karl, D. Kundisch, F. Meyer auf der Heide, and H. Wehrheim, “A Case for a New IT Ecosystem: On-The-Fly Computing,” Business & Information Systems Engineering, vol. 62, no. 6, pp. 467–481, 2020, doi: 10.1007/s12599-019-00627-x.
LibreCat | Files available | DOI
 
2020 | Bachelorsthesis | LibreCat-ID: 18638
P. Kramer, Comparison of Zero-Knowledge Range Proofs. Universität Paderborn, 2020.
LibreCat
 
2019 | Conference Paper | LibreCat-ID: 6976
T. Götte, V. R. Vijayalakshmi, and C. Scheideler, “Always be Two Steps Ahead of Your Enemy - Maintaining a Routable Overlay under Massive Churn with an Almost Up-to-date Adversary,” in Proceedings of the 2019 IEEE 33rd International Parallel  and Distributed Processing Symposium (IPDPS ’19), Rio de Janeiro, Brazil.
LibreCat | Files available
 
2019 | Journal Article | LibreCat-ID: 14830
R. Gmyr, J. Lefevre, and C. Scheideler, “Self-Stabilizing Metric Graphs,” Theory Comput. Syst., vol. 63, no. 2, pp. 177–199, 2019.
LibreCat | DOI
 
2019 | Mastersthesis | LibreCat-ID: 13128 | OA
H. Bröcher, Rational Secure Multiparty Computation. Universität Paderborn, 2019.
LibreCat | Files available
 
2019 | Mastersthesis | LibreCat-ID: 10271
N. N., Implementation and Evaluation of Authenticated Data Structures Using Intel SGX Enclaves. Universität Paderborn, 2019.
LibreCat
 
2019 | Bachelorsthesis | LibreCat-ID: 13592
M. Pilot, Efficient Finite-Field Arithmetic for Elliptic Curve Cryptography in Java. Universität Paderborn, 2019.
LibreCat
 
2019 | Mastersthesis | LibreCat-ID: 13648 | OA
S. Scholz, Implementation and Comparison of Elliptic Curve Algorithms in Java. Universität Paderborn, 2019.
LibreCat | Files available
 
2019 | Conference Paper | LibreCat-ID: 13904 | OA
J. Blömer, J. Bobolz, D. P. Diemert, and F. Eidens, “Updatable Anonymous Credentials and Applications to Incentive Systems,” presented at the 26th ACM Conference on Computer and Communications Security, London, 2019, doi: 10.1145/3319535.3354223.
LibreCat | Files available | DOI | Download (ext.)
 
2018 | Conference Paper | LibreCat-ID: 2862 | OA
J. Blömer, F. Eidens, and J. Juhnke, “Practical, Anonymous, and Publicly Linkable Universally-Composable Reputation Systems,” in Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers’ Track at the {RSA} Conference 2018, Proceedings, San Francisco, CA, USA, 2018, pp. 470–490.
LibreCat | Files available | DOI | Download (ext.)
 
2018 | Journal Article | LibreCat-ID: 2685
J. Blömer and K. Kohn, “Voronoi Cells of Lattices with Respect to Arbitrary Norms,” SIAM Journal on Applied Algebra and Geometry., vol. 2, no. 2, pp. 314–338, 2018.
LibreCat | Files available | DOI
 
2018 | Conference Paper | LibreCat-ID: 3265 | OA
K. Bemmann et al., “Fully-Featured Anonymous Credentials with Reputation System,” in Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES ’18, Hamburg, Germany.
LibreCat | Files available | DOI | Download (ext.)
 
2018 | Conference Paper | LibreCat-ID: 3422
P. Robinson, C. Scheideler, and A. Setzer, “Breaking the $\tilde\Omega(\sqrt{n})$ Barrier: Fast Consensus under a Late Adversary,” in Proceedings of the 30th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), Wien.
LibreCat | Files available | DOI
 
2018 | Conference Paper | LibreCat-ID: 2965
J. Blömer and N. Löken, “Cloud Architectures for Searchable Encryption,” in Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, Hamburg, Germany, pp. 25:1--25:10.
LibreCat | Files available | DOI
 
2018 | Dissertation | LibreCat-ID: 1138
R. Gmyr, Distributed Algorithms for Overlay Networks and Programmable Matter. Universität Paderborn, 2018.
LibreCat | DOI
 
2018 | Working Paper | LibreCat-ID: 5820
J. Blömer, J. Bobolz, C. Scheideler, and A. Setzer, Provably Anonymous Communication Based on Trusted Execution Environments. .
LibreCat | Files available
 
2018 | Conference Paper | LibreCat-ID: 5985
C. Scheideler, “Relays: Towards a Link Layer for Robust and Secure Fog Computing,” in Proceedings of the 2018 Workshop on Theory and Practice for Integrated Cloud, Fog and Edge Computing Paradigms, TOPIC@PODC 2018, Egham, United Kingdom, July 27, 2018, 2018, pp. 1–2.
LibreCat | Files available | DOI
 
2018 | Conference Paper | LibreCat-ID: 5216
C. Scheideler and A. Setzer, “Relays: A New Approach for the Finite Departure Problem in Overlay Networks,” in Proceedings of the 20th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS 2018), Tokyo, Japan, 2018.
LibreCat | Files available | DOI
 
2018 | Dissertation | LibreCat-ID: 6597
J. Juhnke, Models and Constructions for Secure Reputation Systems. Universität Paderborn, 2018.
LibreCat | DOI
 
2018 | Conference Paper | LibreCat-ID: 3873 | OA
J. Blömer, F. Eidens, and J. Juhnke, “Enhanced Security of Attribute-Based Signatures,” in The International Conference on Cryptology And Network Security (CANS), Naples, Italy, 2018, vol. 11124, pp. 235–255, doi: 10.1007/978-3-030-00434-7_12.
LibreCat | Files available | DOI | Download (ext.)
 
2018 | Conference Paper | LibreCat-ID: 2379 | OA
J. Blömer and J. Bobolz, “Delegatable Attribute-based Anonymous Credentials from Dynamically Malleable Signatures,” presented at the The 16th International Conference on Applied Cryptography and Network Security, Leuven, Belgium, doi: 10.1007/978-3-319-93387-0_12.
LibreCat | Files available | DOI | Download (ext.)
 
2017 | Conference Paper | LibreCat-ID: 2967 | OA
J. Blömer and G. Liske, “Subtleties in Security Definitions for Predicate Encryption with Public Index,” in Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS), 2017, vol. 10693, pp. 438–453.
LibreCat | Files available | DOI | Download (ext.)
 
2017 | Dissertation | LibreCat-ID: 116
G. Liske, CCA-Security for Predicate Encryption Schemes. Universität Paderborn, 2017.
LibreCat | DOI | Download (ext.)
 
2017 | Conference Paper | LibreCat-ID: 2344 | OA
J. Blömer, P. Günther, V. Krummel, and N. Löken, “Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations,” in Foundations and Practice of Security, 2017, pp. 3–17.
LibreCat | Files available | DOI
 
2017 | Bachelorsthesis | LibreCat-ID: 18027
N. C. Banh, An Asynchronous Adaption of a Churn-resistant Overlay Network. Universität Paderborn, 2017.
LibreCat
 
2017 | Mastersthesis | LibreCat-ID: 60
D. Niehus, Semantically Secure Attribute-based Searchable Encryption. Universität Paderborn, 2017.
LibreCat
 
2017 | Mastersthesis | LibreCat-ID: 62
E. Weis, Searchable Encryption. Universität Paderborn, 2017.
LibreCat
 
2017 | Bachelorsthesis | LibreCat-ID: 698
N. C. Banh, As Asynchronous Adaption of a Churn-resistant Overlay Network. Universität Paderborn, 2017.
LibreCat
 
2017 | Bachelorsthesis | LibreCat-ID: 88
A. Ganesh Athreya, Instantiating a Predicate Encryption Scheme via Pair Encodings. Universität Paderborn, 2017.
LibreCat
 
2017 | Bachelorsthesis | LibreCat-ID: 67
M. Jürgens, Provably Secure Key-Derivation-Functions for Certain Types of Applications. Universität Paderborn, 2017.
LibreCat
 
2017 | Bachelorsthesis | LibreCat-ID: 104
D. Diemert, EAX - An Authenticated Encryption Mode for Block Ciphers. Universität Paderborn, 2017.
LibreCat
 
2017 | Bachelorsthesis | LibreCat-ID: 1049
B. Beckendorfer, Visualisierung zu Algorithmen verteilter Netzwerksysteme. Universität Paderborn, 2017.
LibreCat
 
2017 | Mastersthesis | LibreCat-ID: 117
P. Bemmann, Attribute-based Signatures using Structure Preserving Signatures. Universität Paderborn, 2017.
LibreCat
 
2017 | Bachelorsthesis | LibreCat-ID: 118
N. Chi Banh, An Asynchronous Adaptation of a Churn-resistant Overlay Network. Universität Paderborn, 2017.
LibreCat
 
2016 | Bachelorsthesis | LibreCat-ID: 213
L. Porzenheim, Comparison of different Definitions of Chosen-Ciphertext Security in Encryption schemes. Universität Paderborn, 2016.
LibreCat
 
2016 | Bachelorsthesis | LibreCat-ID: 214
K. S. Bemmann, Commitment Schemes - Definitions, Variants, and Security. Universität Paderborn, 2016.
LibreCat
 
2016 | Conference Paper | LibreCat-ID: 215
M. Drees, R. Gmyr, and C. Scheideler, “Churn- and DoS-resistant Overlay Networks Based on Network Reconfiguration,” in Proceedings of the 28th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), 2016, pp. 417--427.
LibreCat | Files available | DOI
 
2016 | Conference Paper | LibreCat-ID: 208
J. Blömer and G. Liske, “Construction of Fully CCA-Secure Predicate Encryptions from Pair Encoding Schemes,” in Proceedings of the CT-RSA 2016, 2016, pp. 431–447.
LibreCat | Files available | DOI
 
2016 | Mastersthesis | LibreCat-ID: 223
K. Hinnenthal, Aggregation in Overlay Networks. Universität Paderborn, 2016.
LibreCat | Files available
 
2016 | Dissertation | LibreCat-ID: 167
P. Günther, Physical attacks on pairing-based cryptography. Universität Paderborn, 2016.
LibreCat | Files available | Download (ext.)
 
2016 | Conference Paper | LibreCat-ID: 155
R. Gmyr, J. Lefèvre, and C. Scheideler, “Self-stabilizing Metric Graphs,” in Proceedings of the 18th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS), 2016, pp. 248--262.
LibreCat | Files available | DOI
 
2016 | Mastersthesis | LibreCat-ID: 146
J. Hamm, Symmetric Anonymous Credentials with Protocols for Relations on Attributes. Universität Paderborn, 2016.
LibreCat
 
2016 | Bachelorsthesis | LibreCat-ID: 152
F. Dallmeier, Short Randomizable Aggregatable Signatures: Constructions and Security Analysis. Universität Paderborn, 2016.
LibreCat
 
2016 | Dissertation | LibreCat-ID: 10136
M. Eikel, Insider-resistent Distributed Storage Systems. Universität Paderborn, 2016.
LibreCat | Files available
 
2015 | Conference Paper | LibreCat-ID: 253
J. Blömer, J. Juhnke, and N. Löken, “Short Group Signatures with Distributed Traceability,” in Proceedings of the Sixth International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS), 2015, pp. 166–180.
LibreCat | Files available | DOI
 
2015 | Journal Article | LibreCat-ID: 284
M. Eikel and C. Scheideler, “IRIS: A Robust Information System Against Insider DoS Attacks,” Transactions on Parallel Computing, no. 3, pp. 18:1--18:33, 2015.
LibreCat | Files available | DOI
 
2015 | Bachelorsthesis | LibreCat-ID: 286
B. Kalde, Implementierung eines hybriden Verschlüsselungsverfahrens nach Cramer und Shoup. Universität Paderborn, 2015.
LibreCat
 
2015 | Bachelorsthesis | LibreCat-ID: 261
T. Eisenhofer, Protokolle zur authentifizierten Schüsselvereinbarung. Universität Paderborn, 2015.
LibreCat
 
2015 | Mastersthesis | LibreCat-ID: 321
F. Eidens, Anonymous credential system based on q-Strong Diffie-Hellman Assumption. Universität Paderborn, 2015.
LibreCat | Files available
 
2015 | Conference Paper | LibreCat-ID: 322 | OA
J. Blömer, J. Juhnke, and C. Kolb, “Anonymous and Publicly Linkable Reputation Systems,” in Proceedings of the 18th International Conference on Financial Cryptography and Data Security (FC), 2015, pp. 478--488.
LibreCat | Files available | DOI | Download (ext.)
 
2015 | Mastersthesis | LibreCat-ID: 325
N. Löken, A Group Signature Scheme with Distributed Group Management - An Application of Threshold Encryption. Universität Paderborn, 2015.
LibreCat | Files available
 
2015 | Bachelorsthesis | LibreCat-ID: 326
F. Heihoff, A group signature scheme based on the LSRW assumption. Universität Paderborn, 2015.
LibreCat
 
2015 | Mastersthesis | LibreCat-ID: 297
M. Sosniak, Evaluation of Pairing Optimization for Embedded Platforms. Universität Paderborn, 2015.
LibreCat
 
2015 | Mastersthesis | LibreCat-ID: 299
B. Gerken, Elektromagnetische Seitenkanalangriffe auf paarungsbasierte Kryptographie. Universität Paderborn, 2015.
LibreCat
 
2015 | Mastersthesis | LibreCat-ID: 301 | OA
J. Bobolz, Efficient Verifier-Local Revocation for Anonymous Credentials. Universität Paderborn, 2015.
LibreCat | Files available
 
2015 | Mastersthesis | LibreCat-ID: 302
C. Stroh, Efficient Attributes for Pairing-Based Anonymous Credentials. Universität Paderborn, 2015.
LibreCat
 
2015 | Dissertation | LibreCat-ID: 305
S. Kniesburges, Distributed Data Structures and the Power of topological Self-Stabilization. Universität Paderborn, 2015.
LibreCat | Files available
 
2015 | Mastersthesis | LibreCat-ID: 312
P. Schleiter, Constructions of Fully Secure Predicate Encryption Schemes. Universität Paderborn, 2015.
LibreCat | Files available
 
2015 | Mastersthesis | LibreCat-ID: 273
K. Kohn, Number of Voronoi-relevant vectors in lattices with respect to arbitrary norms. Universität Paderborn, 2015.
LibreCat
 
2015 | Report | LibreCat-ID: 233 | OA
J. Blömer and K. Kohn, Voronoi Cells of Lattices with Respect to Arbitrary Norms. Universität Paderborn, 2015.
LibreCat | Files available | Download (ext.)
 
2014 | Conference Paper | LibreCat-ID: 346
S. Brangewitz, A. Jungmann, R. Petrlic, and M. C. Platenius, “Towards a Flexible and Privacy-Preserving Reputation System for Markets of Composed Services,” in Proceedings of the 6th International Conferences on Advanced Service Computing (SERVICE COMPUTATION), 2014, pp. 49–57.
LibreCat | Files available
 
2014 | Report | LibreCat-ID: 349
C. Sorge, The Legal Classification of Identity-Based Signatures. 2014.
LibreCat | Files available
 
2014 | Conference Paper | LibreCat-ID: 355
J. Blömer, P. Günther, and G. Liske, “Tampering attacks in pairing-based cryptography,” in Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC), 2014, pp. 1--7.
LibreCat | Files available | DOI
 
2014 | Conference Paper | LibreCat-ID: 366
R. Petrlic, A. Jungmann, M. C. Platenius, W. Schäfer, and C. Sorge, “Security and Privacy Challenges in On-The-Fly Computing,” in Tagungsband der 4. Konferenz Software-Technologien und -Prozesse (STeP 2014), 2014, pp. 131–142.
LibreCat | Files available
 
2014 | Bachelorsthesis | LibreCat-ID: 369
T. Rath, RSA-Full Domain Hash Revisited. Universität Paderborn, 2014.
LibreCat
 
2014 | Conference Paper | LibreCat-ID: 371
C. Scheideler, A. Setzer, and M. Eikel, “RoBuSt: A Crash-Failure-Resistant Distributed Storage System,” in Proceedings of the 18th International Conference on Principles of Distributed Systems (OPODIS), 2014, pp. 107--122.
LibreCat | Files available | DOI
 
2014 | Journal Article | LibreCat-ID: 378
S. Kniesburges, A. Koutsopoulos, and C. Scheideler, “Re-Chord: A Self-stabilizing Chord Overlay Network,” Theory of Computing Systems, no. 3, pp. 591–612, 2014.
LibreCat | Files available | DOI
 
2014 | Conference Paper | LibreCat-ID: 384
R. Petrlic, S. Lutters, and C. Sorge, “Privacy-Preserving Reputation Management,” in Proceedings of the 29th Symposium On Applied Computing (SAC), 2014, pp. 1712–1718.
LibreCat | Files available | DOI
 
2014 | Dissertation | LibreCat-ID: 385
R. Petrlic, Privacy-Preserving Multiparty Digital Rights Management. Universität Paderborn, 2014.
LibreCat | Files available
 
2014 | Conference Paper | LibreCat-ID: 386
R. Petrlic and C. Sorge, “Privacy-Preserving Digital Rights Management based on Attribute-based Encryption,” in Proceedings of the Sixth IFIP International Conference on New Technologies, Mobility and Security (NTMS), 2014, pp. 1–5.
LibreCat | Files available | DOI
 
2014 | Journal Article | LibreCat-ID: 387
B. Awerbuch, A. W. Richa, C. Scheideler, S. Schmid, and J. Zhang, “Principles of Robust Medium Access and an Application to Leader Election,” Transactions on Algorithms, no. 4, 2014.
LibreCat | Files available | DOI
 
2014 | Bachelorsthesis | LibreCat-ID: 18001
L. Luo, Ein selbst-stabilisierender Algorithmus für das Finite Sleep Problem in Skip+ Graphen. Universität Paderborn, 2014.
LibreCat
 
2014 | Conference Paper | LibreCat-ID: 441
C. Sorge and R. Petrlic, “Datenschutz im Future Internet: rechtliche Aspekte und technische Maßnahmen,” in Tagungsband des 17. Internationalen Rechtsinformatik Symposions, 2014.
LibreCat | Files available
 
2014 | Preprint | LibreCat-ID: 442 | OA
J. Blömer and G. Liske, “Constructing CCA-secure predicate encapsulation schemes from CPA-secure schemes and universal one-way hash functions.” Universität Paderborn, 2014.
LibreCat | Files available | Download (ext.)
 
2014 | Conference Paper | LibreCat-ID: 446
A. Ogierman, A. W. Richa, C. Scheideler, S. Schmid, and J. Zhang, “Competitive MAC under adversarial SINR,” in Proceedings of the 33rd Annual IEEE International Conference on Computer Communications (INFOCOM), 2014, pp. 2751--2759.
LibreCat | Files available | DOI
 
2014 | Mastersthesis | LibreCat-ID: 460
R. Mittendorf, Advanced AES-key recovery from decayed RAM-dumps using multi-threading and FPGAs. Universität Paderborn, 2014.
LibreCat
 
2014 | Conference Paper | LibreCat-ID: 463
J. Blömer, R. Gomes da Silva, P. Günther, J. Krämer, and J.-P. Seifert, “A Practical Second-Order Fault Attack against a Real-World Pairing Implementation,” in Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC), 2014, pp. 123--136.
LibreCat | Files available | DOI
 
2014 | Journal Article | LibreCat-ID: 479
C. Sorge, “The Legal Classification of Identity-Based Signatures,” Computer Law & Security Review, vol. 30, no. 2, pp. 126–136, 2014.
LibreCat | Files available | DOI
 
2014 | Conference Paper | LibreCat-ID: 401
M. C. Platenius, S. Arifulina, R. Petrlic, and W. Schäfer, “Matching of Incomplete Service Specifications Exemplified by Privacy Policy Matching,” in Proceedings of the 4th International Workshop on Adaptive Services for the Future Internet, 2014, pp. 6–17.
LibreCat | Files available | DOI
 
2014 | Journal Article | LibreCat-ID: 410
A. Jungmann, S. Brangewitz, R. Petrlic, and M. C. Platenius, “Incorporating Reputation Information into Decision-Making Processes in Markets of Composed Services,” International Journal On Advances in Intelligent Systems (IntSys), vol. 7, no. 3&4, pp. 572--594, 2014.
LibreCat | Files available | Download (ext.)
 
2014 | Mastersthesis | LibreCat-ID: 414
J. Jochheim, Hiding software components using functional encryption. Universität Paderborn, 2014.
LibreCat
 
2014 | Bachelorsthesis | LibreCat-ID: 416
P. Bemmann, Group Signature Schemes with Strong Exculpability. Universität Paderborn, 2014.
LibreCat
 
2014 | Bachelorsthesis | LibreCat-ID: 421
J. Lippert, Fujisaki-Okamoto Transformation. Universität Paderborn, 2014.
LibreCat
 
2014 | Bachelorsthesis | LibreCat-ID: 438
A. Kokoschka, Designing an Anonymous and Secure Reputation System Using a Group Signature Variant. Universität Paderborn, 2014.
LibreCat
 
2013 | Bachelorsthesis | LibreCat-ID: 471
A. Tezer, Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen. Universität Paderborn, 2013.
LibreCat
 
2013 | Conference Paper | LibreCat-ID: 473
R. Petrlic and S. Sekula, “Unlinkable content playbacks in a multiparty DRM system,” in Data and Applications Security and Privacy XXVII, 2013, pp. 289–296.
LibreCat | Files available | DOI
 
2013 | Conference Paper | LibreCat-ID: 475
N. Joshi and R. Petrlic, “Towards practical privacy-preserving Digital Rights Management for Cloud Computing,” in Proceedings of the 10th Annual IEEE Consumer Communications & Networking Conference (CCNC), 2013, pp. 259–264.
LibreCat | Files available | DOI
 
2013 | Bachelorsthesis | LibreCat-ID: 486
O. Otte, Seitenkanalresistenz paarungsbasierter Kryptographie. Universität Paderborn, 2013.
LibreCat
 
2013 | Bachelorsthesis | LibreCat-ID: 487 | OA
J. Bobolz, Security Proofs for Pairing-Based Cryptography in the Generic Group Model. Universität Paderborn, 2013.
LibreCat | Files available
 
2013 | Conference Paper | LibreCat-ID: 488
J. Blömer, P. Günther, and V. Krummel, “Securing Critical Unattended Systems with Identity Based Cryptography - A Case Study,” in Proceedings of the 5th International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS), 2013, pp. 98–105.
LibreCat | Files available
 
2013 | Conference Paper | LibreCat-ID: 519
M. Eikel and C. Scheideler, “IRIS: A Robust Information System Against Insider DoS-Attacks,” in Proceedings of the 25th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), 2013, pp. 119–129.
LibreCat | Files available | DOI
 
2013 | Mastersthesis | LibreCat-ID: 521
H. Riebler, Identifikation und Wiederherstellung von kryptographischen Schlüsseln mit FPGAs. Universität Paderborn, 2013.
LibreCat
 
2013 | Mastersthesis | LibreCat-ID: 531
S. Lutters, Entwurf eines datenschutzgerechten Reputationssystems. Universität Paderborn, 2013.
LibreCat
 
2013 | Bachelorsthesis | LibreCat-ID: 532
H. Hilleckes, Entwicklung und Analyse einer verteilten Speicherverwaltung für dynamische heterogene Speichersysteme. Universität Paderborn, 2013.
LibreCat
 
2013 | Preprint | LibreCat-ID: 538 | OA
J. Blömer and G. Liske, “Direct Chosen-Ciphertext Secure Attribute-Based Key Encapsulations without Random Oracles.” Universität Paderborn, 2013.
LibreCat | Files available | Download (ext.)
 
2013 | Conference Paper | LibreCat-ID: 542
S. Kniesburges, A. Koutsopoulos, and C. Scheideler, “CONE-DHT: A distributed self-stabilizing algorithm for a heterogeneous storage system,” in Proceedings of the 27th International Symposium on Distributed Computing (DISC), 2013, pp. 537–549.
LibreCat | Files available | DOI
 
2013 | Conference Paper | LibreCat-ID: 546
K. Graffi, M. Benter, M. Divband, S. Kniesburges, and A. Koutsopoulos, “Ca-Re-Chord: A Churn Resistant Self-stabilizing Chord Overlay Network,” in Proceedings of the Conference on Networked Systems (NetSys), 2013, pp. 27–34.
LibreCat | Files available | DOI
 
2013 | Bachelorsthesis | LibreCat-ID: 553
K. Kohn, Attributbasierte Verschlüsselung mittels Gittermethoden - Mathematische Grundlagen, Verfahren und Sicherheitsbeweise. Universität Paderborn, 2013.
LibreCat
 
2013 | Journal Article | LibreCat-ID: 561
R. Petrlic, S. Sekula, and C. Sorge, “A privacy-friendly Architecture for future Cloud Computing,” International Journal of Grid and Utility Computing, no. 4, pp. 265–277, 2013.
LibreCat | Files available | DOI | Download (ext.)
 
2013 | Conference Paper | LibreCat-ID: 528
H. Riebler, T. Kenter, C. Sorge, and C. Plessl, “FPGA-accelerated Key Search for Cold-Boot Attacks against AES,” in Proceedings of the International Conference on Field-Programmable Technology (FPT), 2013, pp. 386–389, doi: 10.1109/FPT.2013.6718394.
LibreCat | Files available | DOI
 
2012 | Conference (Editor) | LibreCat-ID: 577
A. W. Richa and C. Scheideler, Eds., Stabilization, Safety, and Security of Distributed Systems. 2012.
LibreCat | Files available | DOI
 
2012 | Conference Paper | LibreCat-ID: 581
M. Drees, M. Hüllmann (married name: Eikel), A. Koutsopoulos, and C. Scheideler, “Self-Organizing Particle Systems,” in Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium (IPDPS), 2012, pp. 1272–1283.
LibreCat | Files available | DOI
 
2012 | Conference Paper | LibreCat-ID: 585
R. Petrlic, “Proxy Re-Encryption in a Privacy-Preserving Cloud Computing DRM Scheme,” in Proceedings of 4th International Symposium on Cyberspace Safety and Security (CSS), 2012, pp. 194–211.
LibreCat | Files available | DOI
 
2012 | Conference Paper | LibreCat-ID: 588
R. Petrlic and C. Sorge, “Privacy-Preserving DRM for Cloud Computing,” in Proceedings of the 26th IEEE International Conference on Advanced Information Networking and Applications (AINA), 2012, pp. 1286–1291.
LibreCat | Files available | DOI
 
2012 | Conference Paper | LibreCat-ID: 589
R. Petrlic, “Privacy-Preserving Digital Rights Management in a Trusted Cloud Environment,” in Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2012, pp. 958–963.
LibreCat | Files available | DOI
 
2012 | Bachelorsthesis | LibreCat-ID: 606
N. Löken, Identitätsbasierte Signaturen - Ein Sicherheitsbeweis für Signaturen auf Grundlage von Gap-Diffie-Hellman-Gruppen mit Hilfe des Forking-Lemmas. Universität Paderborn, 2012.
LibreCat
 
2012 | Bachelorsthesis | LibreCat-ID: 607
T. Haarhoff, Identitätsbasierte Kryptographie - Implementierung von Paarungen für Körper der Charakteristik 2. Universität Paderborn, 2012.
LibreCat
 
2012 | Bachelorsthesis | LibreCat-ID: 620
R. Mittendorf, Datenschutzgerechtes DRM im Cloud Computing. Universität Paderborn, 2012.
LibreCat
 
2012 | Bachelorsthesis | LibreCat-ID: 621
S. Sekula, Datenschutzgerechte E-Payment-Schemata im On-The-Fly Computing. Universität Paderborn, 2012.
LibreCat
 
2012 | Conference Paper | LibreCat-ID: 623
A. W. Richa, C. Scheideler, S. Schmid, and J. Zhang, “Competitive and fair throughput for co-existing networks under adversarial interference,” in Proceedings of the 31st Annual ACM SIGACT-SIGOPS Symposium on Principles and Distributed Computing (PODC), 2012, pp. 291–300.
LibreCat | Files available | DOI
 
2012 | Bachelorsthesis | LibreCat-ID: 629
P. Schleiter, Attribute-basierte Verschlüsselung. Universität Paderborn, 2012.
LibreCat
 
2011 | Conference Paper | LibreCat-ID: 645
B. Doerr, L. A. Goldberg, L. Minder, T. Sauerwald, and C. Scheideler, “Stabilizing consensus with the power of two choices,” in Proceedings of the 23rd ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), 2011, pp. 149–158.
LibreCat | Files available | DOI
 
2011 | Conference Paper | LibreCat-ID: 646
A. W. Richa and C. Scheideler, “Self-Stabilizing DeBruijn Networks,” in Proceedings of the 13th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS), 2011, pp. 416–430.
LibreCat | Files available | DOI
 
2011 | Mastersthesis | LibreCat-ID: 659
G. Liske, Fault attacks in pairing-based cryptography. Universität Paderborn, 2011.
LibreCat | Files available
 

Filters and Search Terms

project=13

Search

Filter Publications

Display / Sort

Citation Style: IEEE

Export