@misc{47691,
  author       = {{Gorski, Michael}},
  keywords     = {{Diplomarbeit}},
  title        = {{{Boomerang- und Rechteckangriff auf AES}}},
  year         = {{2006}},
}

@misc{47692,
  author       = {{ Naewe, Stefanie}},
  keywords     = {{Diplomarbeit}},
  title        = {{{Samplemethoden in der algorithmischen Geometrie der Zahlen, Diplomarbeit}}},
  year         = {{2006}},
}

@phdthesis{2913,
  author       = {{Otto, Martin}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Fault Attacks and Countermeasures}}},
  year         = {{2005}},
}

@inbook{3006,
  author       = {{Blömer, Johannes and May, Alexander}},
  booktitle    = {{EUROCRYPT 2005}},
  isbn         = {{9783540259107}},
  issn         = {{0302-9743}},
  pages        = {{251--267}},
  publisher    = {{Springer Berlin Heidelberg}},
  title        = {{{A Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers}}},
  doi          = {{10.1007/11426639_15}},
  year         = {{2005}},
}

@inbook{3010,
  author       = {{Ernst, Matthias and Jochemsz, Ellen and May, Alexander and de Weger, Benne}},
  booktitle    = {{EUROCRYPT 2005}},
  isbn         = {{9783540259107}},
  issn         = {{0302-9743}},
  pages        = {{371--386}},
  publisher    = {{Springer Berlin Heidelberg}},
  title        = {{{Partial Key Exposure Attacks on RSA up to Full Size Exponents}}},
  doi          = {{10.1007/11426639_22}},
  year         = {{2005}},
}

@misc{47647,
  author       = {{Hornkamp, Christian}},
  title        = {{{Implementierung von wichtigen Teilen des Schoof-Elkies-Atkin Algorithmus zum Bestimmen der Punktanzahl einer elliptischen Kurve}}},
  year         = {{2005}},
}

@misc{47646,
  author       = {{Süß, Tim}},
  title        = {{{Laufzeitanalyse- und vergleich verschiedener Algorithmen zur schnellen skalaren Multiplikation auf elliptischen Kurven}}},
  year         = {{2005}},
}

@misc{47693,
  author       = {{Ernst, Matthias}},
  keywords     = {{Diplomarbeit}},
  title        = {{{Analyse von RSA mittels Coppersmith Methode}}},
  year         = {{2005}},
}

@misc{47694,
  author       = {{Spanke, Christoph}},
  keywords     = {{Diplomarbeit}},
  title        = {{{Implementierung der Coppersmith-Methode zur Untersuchung von Schwachstellen bei RSA}}},
  year         = {{2005}},
}

@inbook{3011,
  author       = {{Blömer, Johannes and Guajardo, Jorge and Krummel, Volker}},
  booktitle    = {{Selected Areas in Cryptography}},
  isbn         = {{9783540243274}},
  issn         = {{0302-9743}},
  pages        = {{69--83}},
  publisher    = {{Springer Berlin Heidelberg}},
  title        = {{{Provably Secure Masking of AES}}},
  doi          = {{10.1007/978-3-540-30564-4_5}},
  year         = {{2004}},
}

@inbook{3012,
  author       = {{Blömer, Johannes and May, Alexander}},
  booktitle    = {{Public Key Cryptography – PKC 2004}},
  isbn         = {{9783540210184}},
  issn         = {{0302-9743}},
  pages        = {{1--13}},
  publisher    = {{Springer Berlin Heidelberg}},
  title        = {{{A Generalized Wiener Attack on RSA}}},
  doi          = {{10.1007/978-3-540-24632-9_1}},
  year         = {{2004}},
}

@inbook{3014,
  author       = {{May, Alexander}},
  booktitle    = {{Public Key Cryptography – PKC 2004}},
  isbn         = {{9783540210184}},
  issn         = {{0302-9743}},
  pages        = {{218--230}},
  publisher    = {{Springer Berlin Heidelberg}},
  title        = {{{Secret Exponent Attacks on RSA-type Schemes with Moduli N=p^{r}q}}},
  doi          = {{10.1007/978-3-540-24632-9_16}},
  year         = {{2004}},
}

@inbook{3015,
  author       = {{May, Alexander}},
  booktitle    = {{Advances in Cryptology – CRYPTO 2004}},
  isbn         = {{9783540226680}},
  issn         = {{0302-9743}},
  pages        = {{213--219}},
  publisher    = {{Springer Berlin Heidelberg}},
  title        = {{{Computing the RSA Secret Key Is Deterministic Polynomial Time Equivalent to Factoring}}},
  doi          = {{10.1007/978-3-540-28628-8_13}},
  year         = {{2004}},
}

@inproceedings{3017,
  author       = {{Blömer, Johannes and Otto, Martin and Seifert, Jean-Pierre}},
  booktitle    = {{Proceedings of the 10th ACM conference on Computer and communication security  - CCS '03}},
  isbn         = {{1581137389}},
  publisher    = {{ACM Press}},
  title        = {{{A new CRT-RSA algorithm secure against bellcore attacks}}},
  doi          = {{10.1145/948109.948151}},
  year         = {{2004}},
}

@misc{47645,
  author       = {{Dumrauf, Dominic}},
  title        = {{{Neue Schranken für die Coppersmith-Methode über den ganzen Zahlen}}},
  year         = {{2004}},
}

@misc{47642,
  author       = {{Herden, Tim}},
  title        = {{{Implementierung und Evaluierung eines Angriffs auf DSA}}},
  year         = {{2004}},
}

@misc{47644,
  author       = {{Gesemann, Sebastian}},
  title        = {{{Implementierung eines Verfahrens zur Berechnung optimaler längenbeschränkter Präfix-Codes}}},
  year         = {{2004}},
}

@misc{47643,
  author       = {{Gorski, Michael}},
  title        = {{{Implementierung und Evaluation einiger Algorithmen für Kryptosysteme auf elliptischen Kurven}}},
  year         = {{2004}},
}

@phdthesis{2914,
  author       = {{May, Alexander}},
  publisher    = {{Universität Paderborn}},
  title        = {{{New RSA Vulnerabilities Using Lattice Reduction Methods}}},
  year         = {{2003}},
}

@inbook{3016,
  author       = {{Blömer, Johannes and May, Alexander}},
  booktitle    = {{Advances in Cryptology - CRYPTO 2003}},
  isbn         = {{9783540406747}},
  issn         = {{0302-9743}},
  pages        = {{27--43}},
  publisher    = {{Springer Berlin Heidelberg}},
  title        = {{{New Partial Key Exposure Attacks on RSA}}},
  doi          = {{10.1007/978-3-540-45146-4_2}},
  year         = {{2003}},
}

