@inbook{3022,
  author       = {{May, Alexander and Silverman, Joseph H.}},
  booktitle    = {{Lecture Notes in Computer Science}},
  isbn         = {{9783540424888}},
  issn         = {{0302-9743}},
  pages        = {{110--125}},
  publisher    = {{Springer Berlin Heidelberg}},
  title        = {{{Dimension Reduction Methods for Convolution Modular Lattices}}},
  doi          = {{10.1007/3-540-44670-2_10}},
  year         = {{2007}},
}

@inbook{3026,
  author       = {{Blömer, Johannes}},
  booktitle    = {{Algorithms — ESA’ 98}},
  isbn         = {{9783540648482}},
  issn         = {{0302-9743}},
  pages        = {{151--162}},
  publisher    = {{Springer Berlin Heidelberg}},
  title        = {{{A Probabilistic Zero-Test for Expressions Involving Roots of Rational Numbers}}},
  doi          = {{10.1007/3-540-68530-8_13}},
  year         = {{2007}},
}

@misc{47650,
  author       = {{Ziegert, Steffen}},
  title        = {{{Approximierbarkeit durch konstante Stichproben unter Berücksichtigung verschiedener Divergenz- und Ähnlichkeitsmaße beim k-Clustering-Problem}}},
  year         = {{2007}},
}

@misc{47651,
  author       = {{Richert, Manuel}},
  title        = {{{Sichere Kryptosysteme durch Zero-Knowledge}}},
  year         = {{2007}},
}

@misc{47688,
  author       = {{Klein, Wiebke}},
  keywords     = {{Diplomarbeit}},
  title        = {{{Angriffe auf RSA-Varianten bei partiell bekannten geheimen Schlüsseln}}},
  year         = {{2007}},
}

@misc{47690,
  author       = {{Käthler, Olga}},
  keywords     = {{Diplomarbeit}},
  title        = {{{Kryptanalyse des EAC-Protokolls biometrischer Reisepässe}}},
  year         = {{2007}},
}

@misc{47687,
  author       = {{Brieden, Benedikt}},
  keywords     = {{Diplomarbeit}},
  title        = {{{Analyse von verallgemeinerten RSA Polynomen mit Hilfe der Coppersmithschen Methode}}},
  year         = {{2007}},
}

@misc{47689,
  author       = {{Kuntze, Daniel}},
  keywords     = {{Diplomarbeit}},
  title        = {{{Untersuchung von Clusteringalgorithmen für die Kullback-Leibler Divergenz}}},
  year         = {{2007}},
}

@misc{47686,
  author       = {{Borghoff, Julia}},
  keywords     = {{Diplomarbeit}},
  title        = {{{Vergleich multivariater Varianten der Methode von Coppersmith}}},
  year         = {{2007}},
}

@misc{2887,
  author       = {{Landwehr, Andreas Cord}},
  title        = {{{Untersuchungen zur Sicherheit einzelner RSA Bits}}},
  year         = {{2007}},
}

@misc{47653,
  author       = {{Klose, Jaroslaw}},
  title        = {{{Ein erschöpfende Suche vermeidender Algorithmus für allgemeines k-SAT}}},
  year         = {{2007}},
}

@misc{47652,
  author       = {{Niemeier, Martin}},
  title        = {{{Reduktionen von CVP mit wenigen Lösungen auf CVP mit eindeutigen Lösungen}}},
  year         = {{2007}},
}

@misc{47654,
  author       = {{Birkner, Stefan}},
  title        = {{{Behandlung von Korrekturtermen in der Methode von Coppersmith}}},
  year         = {{2007}},
}

@inproceedings{55571,
  author       = {{Blömer, Johannes and  Naewe, Stefanie}},
  booktitle    = {{Proceedings of the 34th ICALP}},
  pages        = {{65--77}},
  publisher    = {{Springer Verlag}},
  title        = {{{Sampling methods for shortest vectors, closest vectors and successive minima}}},
  volume       = {{4596}},
  year         = {{2007}},
}

@article{3003,
  abstract     = {{We give a brief introduction to probabilistic encryptions. This serves as an example how randomness plays a pivotal role in cryptographic systems that satisfy advanced security concepts.}},
  author       = {{Blömer, Johannes}},
  journal      = {{Journal of Universal Computer Science (J.UCS)}},
  number       = {{6}},
  pages        = {{654----671}},
  title        = {{{Randomness and Secrecy - A Brief Introduction}}},
  doi          = {{10.3217/jucs-012-06-0654}},
  year         = {{2006}},
}

@inbook{3004,
  author       = {{Blömer, Johannes and Krummel, Volker}},
  booktitle    = {{Lecture Notes in Computer Science}},
  isbn         = {{9783540462507}},
  issn         = {{0302-9743}},
  pages        = {{106--120}},
  publisher    = {{Springer Berlin Heidelberg}},
  title        = {{{Fault Based Collision Attacks on AES}}},
  doi          = {{10.1007/11889700_11}},
  year         = {{2006}},
}

@inbook{3005,
  author       = {{Blömer, Johannes and Otto, Martin}},
  booktitle    = {{Lecture Notes in Computer Science}},
  isbn         = {{9783540462507}},
  issn         = {{0302-9743}},
  pages        = {{13--23}},
  publisher    = {{Springer Berlin Heidelberg}},
  title        = {{{Wagner’s Attack on a Secure CRT-RSA Algorithm Reconsidered}}},
  doi          = {{10.1007/11889700_2}},
  year         = {{2006}},
}

@inbook{3007,
  author       = {{Blömer, Johannes and Otto, Martin and Seifert, Jean-Pierre}},
  booktitle    = {{Lecture Notes in Computer Science}},
  isbn         = {{9783540462507}},
  issn         = {{0302-9743}},
  pages        = {{36--52}},
  publisher    = {{Springer Berlin Heidelberg}},
  title        = {{{Sign Change Fault Attacks on Elliptic Curve Cryptosystems}}},
  doi          = {{10.1007/11889700_4}},
  year         = {{2006}},
}

@misc{47649,
  author       = {{Funke, Rafael}},
  title        = {{{Implementierung und Simulation von Cache-Angriffen auf AES}}},
  year         = {{2006}},
}

@misc{47648,
  author       = {{Schrieb, Jonas}},
  title        = {{{Von identitätsbasierten Kryptosystemen zu CCA-Sicherheit}}},
  year         = {{2006}},
}

