[{"year":"2006","citation":{"apa":"Gorski, M. (2006). <i>Boomerang- und Rechteckangriff auf AES</i>.","bibtex":"@book{Gorski_2006, title={Boomerang- und Rechteckangriff auf AES}, author={Gorski, Michael}, year={2006} }","short":"M. Gorski, Boomerang- Und Rechteckangriff Auf AES, 2006.","mla":"Gorski, Michael. <i>Boomerang- Und Rechteckangriff Auf AES</i>. 2006.","ama":"Gorski M. <i>Boomerang- Und Rechteckangriff Auf AES</i>.; 2006.","ieee":"M. Gorski, <i>Boomerang- und Rechteckangriff auf AES</i>. 2006.","chicago":"Gorski, Michael. <i>Boomerang- Und Rechteckangriff Auf AES</i>, 2006."},"has_accepted_license":"1","title":"Boomerang- und Rechteckangriff auf AES","date_updated":"2023-10-05T16:54:18Z","oa":"1","date_created":"2023-10-05T16:35:30Z","author":[{"first_name":"Michael","full_name":"Gorski, Michael","last_name":"Gorski"}],"file":[{"content_type":"application/pdf","relation":"main_file","date_created":"2023-10-05T16:34:54Z","creator":"bhenrik","date_updated":"2023-10-05T16:54:18Z","access_level":"open_access","file_id":"47719","file_name":"2006_Gorski_BoomerangUndRechteckangriffAufAES.pdf","file_size":4311037}],"status":"public","type":"misc","ddc":["000"],"keyword":["Diplomarbeit"],"language":[{"iso":"eng"}],"file_date_updated":"2023-10-05T16:54:18Z","_id":"47691","user_id":"41047","department":[{"_id":"34"},{"_id":"64"}]},{"title":"Samplemethoden in der algorithmischen Geometrie der Zahlen, Diplomarbeit","oa":"1","date_updated":"2024-08-08T12:16:01Z","author":[{"last_name":" Naewe","id":"1971","full_name":" Naewe, Stefanie","first_name":"Stefanie"}],"date_created":"2023-10-05T16:35:23Z","year":"2006","place":"Universität Paderborn","citation":{"mla":"Naewe, Stefanie. <i>Samplemethoden in der algorithmischen Geometrie der Zahlen, Diplomarbeit</i>. 2006.","bibtex":"@book{ Naewe_2006, place={Universität Paderborn}, title={Samplemethoden in der algorithmischen Geometrie der Zahlen, Diplomarbeit}, author={ Naewe, Stefanie}, year={2006} }","short":"S.  Naewe, Samplemethoden in der algorithmischen Geometrie der Zahlen, Diplomarbeit, Universität Paderborn, 2006.","apa":"Naewe, S. (2006). <i>Samplemethoden in der algorithmischen Geometrie der Zahlen, Diplomarbeit</i>.","ama":"Naewe S. <i>Samplemethoden in der algorithmischen Geometrie der Zahlen, Diplomarbeit</i>.; 2006.","ieee":"S.  Naewe, <i>Samplemethoden in der algorithmischen Geometrie der Zahlen, Diplomarbeit</i>. Universität Paderborn, 2006.","chicago":"Naewe, Stefanie. <i>Samplemethoden in der algorithmischen Geometrie der Zahlen, Diplomarbeit</i>. Universität Paderborn, 2006."},"has_accepted_license":"1","publication_status":"published","keyword":["Diplomarbeit"],"ddc":["000"],"file_date_updated":"2023-10-05T16:54:10Z","language":[{"iso":"ger"}],"_id":"47692","department":[{"_id":"34"},{"_id":"64"}],"user_id":"49063","status":"public","file":[{"relation":"main_file","content_type":"application/pdf","file_size":612147,"access_level":"open_access","file_id":"47718","file_name":"2006_Naewe_SamplemethodenInDerAlgorithmischenGeometrieDerZahlen.pdf","date_updated":"2023-10-05T16:54:10Z","creator":"bhenrik","date_created":"2023-10-05T16:35:17Z"}],"type":"misc"},{"supervisor":[{"first_name":"Johannes","last_name":"Blömer","id":"23","full_name":"Blömer, Johannes"}],"date_created":"2018-05-25T10:50:49Z","author":[{"full_name":"Otto, Martin","last_name":"Otto","first_name":"Martin"}],"publisher":"Universität Paderborn","date_updated":"2022-01-06T06:58:46Z","main_file_link":[{"url":"http://nbn-resolving.de/urn:nbn:de:hbz:466-20040101308"}],"title":"Fault Attacks and Countermeasures","citation":{"apa":"Otto, M. (2005). <i>Fault Attacks and Countermeasures</i>. Universität Paderborn.","mla":"Otto, Martin. <i>Fault Attacks and Countermeasures</i>. Universität Paderborn, 2005.","short":"M. Otto, Fault Attacks and Countermeasures, Universität Paderborn, 2005.","bibtex":"@book{Otto_2005, title={Fault Attacks and Countermeasures}, publisher={Universität Paderborn}, author={Otto, Martin}, year={2005} }","chicago":"Otto, Martin. <i>Fault Attacks and Countermeasures</i>. Universität Paderborn, 2005.","ieee":"M. Otto, <i>Fault Attacks and Countermeasures</i>. Universität Paderborn, 2005.","ama":"Otto M. <i>Fault Attacks and Countermeasures</i>. Universität Paderborn; 2005."},"year":"2005","user_id":"25078","department":[{"_id":"64"}],"_id":"2913","type":"dissertation","status":"public"},{"title":"A Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers","publisher":"Springer Berlin Heidelberg","date_created":"2018-06-05T08:16:47Z","year":"2005","ddc":["000"],"file":[{"success":1,"relation":"main_file","content_type":"application/pdf","file_size":333655,"file_id":"3008","file_name":"toolkit.pdf","access_level":"closed","date_updated":"2018-06-05T08:18:20Z","date_created":"2018-06-05T08:18:20Z","creator":"feidens"}],"publication":"EUROCRYPT 2005","doi":"10.1007/11426639_15","date_updated":"2022-01-06T06:58:50Z","author":[{"first_name":"Johannes","full_name":"Blömer, Johannes","id":"23","last_name":"Blömer"},{"first_name":"Alexander","last_name":"May","full_name":"May, Alexander"}],"place":"Berlin, Heidelberg","page":"251-267","citation":{"mla":"Blömer, Johannes, and Alexander May. “A Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers.” <i>EUROCRYPT 2005</i>, Springer Berlin Heidelberg, 2005, pp. 251–67, doi:<a href=\"https://doi.org/10.1007/11426639_15\">10.1007/11426639_15</a>.","bibtex":"@inbook{Blömer_May_2005, place={Berlin, Heidelberg}, series={Lecture Notes in Computer Science}, title={A Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers}, DOI={<a href=\"https://doi.org/10.1007/11426639_15\">10.1007/11426639_15</a>}, booktitle={EUROCRYPT 2005}, publisher={Springer Berlin Heidelberg}, author={Blömer, Johannes and May, Alexander}, year={2005}, pages={251–267}, collection={Lecture Notes in Computer Science} }","short":"J. Blömer, A. May, in: EUROCRYPT 2005, Springer Berlin Heidelberg, Berlin, Heidelberg, 2005, pp. 251–267.","apa":"Blömer, J., &#38; May, A. (2005). A Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers. In <i>EUROCRYPT 2005</i> (pp. 251–267). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/11426639_15\">https://doi.org/10.1007/11426639_15</a>","ama":"Blömer J, May A. A Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers. In: <i>EUROCRYPT 2005</i>. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg; 2005:251-267. doi:<a href=\"https://doi.org/10.1007/11426639_15\">10.1007/11426639_15</a>","chicago":"Blömer, Johannes, and Alexander May. “A Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers.” In <i>EUROCRYPT 2005</i>, 251–67. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. <a href=\"https://doi.org/10.1007/11426639_15\">https://doi.org/10.1007/11426639_15</a>.","ieee":"J. Blömer and A. May, “A Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers,” in <i>EUROCRYPT 2005</i>, Berlin, Heidelberg: Springer Berlin Heidelberg, 2005, pp. 251–267."},"publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783540259107","9783540320555"]},"has_accepted_license":"1","publication_status":"published","file_date_updated":"2018-06-05T08:18:20Z","_id":"3006","department":[{"_id":"64"}],"series_title":"Lecture Notes in Computer Science","user_id":"25078","status":"public","type":"book_chapter"},{"publication":"EUROCRYPT 2005","type":"book_chapter","status":"public","_id":"3010","department":[{"_id":"64"}],"series_title":"LNCS","user_id":"25078","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783540259107","9783540320555"]},"publication_status":"published","year":"2005","place":"Berlin, Heidelberg","page":"371-386","citation":{"mla":"Ernst, Matthias, et al. “Partial Key Exposure Attacks on RSA up to Full Size Exponents.” <i>EUROCRYPT 2005</i>, Springer Berlin Heidelberg, 2005, pp. 371–86, doi:<a href=\"https://doi.org/10.1007/11426639_22\">10.1007/11426639_22</a>.","bibtex":"@inbook{Ernst_Jochemsz_May_de Weger_2005, place={Berlin, Heidelberg}, series={LNCS}, title={Partial Key Exposure Attacks on RSA up to Full Size Exponents}, DOI={<a href=\"https://doi.org/10.1007/11426639_22\">10.1007/11426639_22</a>}, booktitle={EUROCRYPT 2005}, publisher={Springer Berlin Heidelberg}, author={Ernst, Matthias and Jochemsz, Ellen and May, Alexander and de Weger, Benne}, year={2005}, pages={371–386}, collection={LNCS} }","short":"M. Ernst, E. Jochemsz, A. May, B. de Weger, in: EUROCRYPT 2005, Springer Berlin Heidelberg, Berlin, Heidelberg, 2005, pp. 371–386.","apa":"Ernst, M., Jochemsz, E., May, A., &#38; de Weger, B. (2005). Partial Key Exposure Attacks on RSA up to Full Size Exponents. In <i>EUROCRYPT 2005</i> (pp. 371–386). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/11426639_22\">https://doi.org/10.1007/11426639_22</a>","ama":"Ernst M, Jochemsz E, May A, de Weger B. Partial Key Exposure Attacks on RSA up to Full Size Exponents. In: <i>EUROCRYPT 2005</i>. LNCS. Berlin, Heidelberg: Springer Berlin Heidelberg; 2005:371-386. doi:<a href=\"https://doi.org/10.1007/11426639_22\">10.1007/11426639_22</a>","ieee":"M. Ernst, E. Jochemsz, A. May, and B. de Weger, “Partial Key Exposure Attacks on RSA up to Full Size Exponents,” in <i>EUROCRYPT 2005</i>, Berlin, Heidelberg: Springer Berlin Heidelberg, 2005, pp. 371–386.","chicago":"Ernst, Matthias, Ellen Jochemsz, Alexander May, and Benne de Weger. “Partial Key Exposure Attacks on RSA up to Full Size Exponents.” In <i>EUROCRYPT 2005</i>, 371–86. LNCS. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. <a href=\"https://doi.org/10.1007/11426639_22\">https://doi.org/10.1007/11426639_22</a>."},"date_updated":"2022-01-06T06:58:51Z","publisher":"Springer Berlin Heidelberg","date_created":"2018-06-05T08:19:48Z","author":[{"last_name":"Ernst","full_name":"Ernst, Matthias","first_name":"Matthias"},{"full_name":"Jochemsz, Ellen","last_name":"Jochemsz","first_name":"Ellen"},{"first_name":"Alexander","full_name":"May, Alexander","last_name":"May"},{"full_name":"de Weger, Benne","last_name":"de Weger","first_name":"Benne"}],"title":"Partial Key Exposure Attacks on RSA up to Full Size Exponents","doi":"10.1007/11426639_22"},{"year":"2005","citation":{"ama":"Hornkamp C. <i>Implementierung von wichtigen Teilen des Schoof-Elkies-Atkin Algorithmus zum Bestimmen der Punktanzahl einer elliptischen Kurve</i>.; 2005.","ieee":"C. Hornkamp, <i>Implementierung von wichtigen Teilen des Schoof-Elkies-Atkin Algorithmus zum Bestimmen der Punktanzahl einer elliptischen Kurve</i>. 2005.","chicago":"Hornkamp, Christian. <i>Implementierung von wichtigen Teilen des Schoof-Elkies-Atkin Algorithmus zum Bestimmen der Punktanzahl einer elliptischen Kurve</i>, 2005.","apa":"Hornkamp, C. (2005). <i>Implementierung von wichtigen Teilen des Schoof-Elkies-Atkin Algorithmus zum Bestimmen der Punktanzahl einer elliptischen Kurve</i>.","short":"C. Hornkamp, Implementierung von wichtigen Teilen des Schoof-Elkies-Atkin Algorithmus zum Bestimmen der Punktanzahl einer elliptischen Kurve, 2005.","bibtex":"@book{Hornkamp_2005, title={Implementierung von wichtigen Teilen des Schoof-Elkies-Atkin Algorithmus zum Bestimmen der Punktanzahl einer elliptischen Kurve}, author={Hornkamp, Christian}, year={2005} }","mla":"Hornkamp, Christian. <i>Implementierung von wichtigen Teilen des Schoof-Elkies-Atkin Algorithmus zum Bestimmen der Punktanzahl einer elliptischen Kurve</i>. 2005."},"title":"Implementierung von wichtigen Teilen des Schoof-Elkies-Atkin Algorithmus zum Bestimmen der Punktanzahl einer elliptischen Kurve","date_updated":"2023-10-05T13:38:50Z","author":[{"first_name":"Christian","last_name":"Hornkamp","full_name":"Hornkamp, Christian"}],"date_created":"2023-10-05T13:35:07Z","status":"public","type":"bachelorsthesis","language":[{"iso":"ger"}],"_id":"47647","department":[{"_id":"34"},{"_id":"64"}],"user_id":"41047"},{"type":"bachelorsthesis","status":"public","department":[{"_id":"34"},{"_id":"64"}],"user_id":"41047","_id":"47646","language":[{"iso":"ger"}],"citation":{"ieee":"T. Süß, <i>Laufzeitanalyse- und vergleich verschiedener Algorithmen zur schnellen skalaren Multiplikation auf elliptischen Kurven</i>. 2005.","chicago":"Süß, Tim. <i>Laufzeitanalyse- und vergleich verschiedener Algorithmen zur schnellen skalaren Multiplikation auf elliptischen Kurven</i>, 2005.","ama":"Süß T. <i>Laufzeitanalyse- und vergleich verschiedener Algorithmen zur schnellen skalaren Multiplikation auf elliptischen Kurven</i>.; 2005.","mla":"Süß, Tim. <i>Laufzeitanalyse- und vergleich verschiedener Algorithmen zur schnellen skalaren Multiplikation auf elliptischen Kurven</i>. 2005.","short":"T. Süß, Laufzeitanalyse- und vergleich verschiedener Algorithmen zur schnellen skalaren Multiplikation auf elliptischen Kurven, 2005.","bibtex":"@book{Süß_2005, title={Laufzeitanalyse- und vergleich verschiedener Algorithmen zur schnellen skalaren Multiplikation auf elliptischen Kurven}, author={Süß, Tim}, year={2005} }","apa":"Süß, T. (2005). <i>Laufzeitanalyse- und vergleich verschiedener Algorithmen zur schnellen skalaren Multiplikation auf elliptischen Kurven</i>."},"year":"2005","author":[{"first_name":"Tim","full_name":"Süß, Tim","last_name":"Süß"}],"date_created":"2023-10-05T13:34:48Z","date_updated":"2023-10-05T13:38:52Z","title":"Laufzeitanalyse- und vergleich verschiedener Algorithmen zur schnellen skalaren Multiplikation auf elliptischen Kurven"},{"status":"public","citation":{"ieee":"M. Ernst, <i>Analyse von RSA mittels Coppersmith Methode</i>. 2005.","chicago":"Ernst, Matthias. <i>Analyse von RSA mittels Coppersmith Methode</i>, 2005.","ama":"Ernst M. <i>Analyse von RSA mittels Coppersmith Methode</i>.; 2005.","short":"M. Ernst, Analyse von RSA mittels Coppersmith Methode, 2005.","mla":"Ernst, Matthias. <i>Analyse von RSA mittels Coppersmith Methode</i>. 2005.","bibtex":"@book{Ernst_2005, title={Analyse von RSA mittels Coppersmith Methode}, author={Ernst, Matthias}, year={2005} }","apa":"Ernst, M. (2005). <i>Analyse von RSA mittels Coppersmith Methode</i>."},"year":"2005","type":"misc","language":[{"iso":"ger"}],"title":"Analyse von RSA mittels Coppersmith Methode","keyword":["Diplomarbeit"],"department":[{"_id":"34"},{"_id":"64"}],"date_created":"2023-10-05T16:35:58Z","author":[{"full_name":"Ernst, Matthias","last_name":"Ernst","first_name":"Matthias"}],"user_id":"41047","_id":"47693","date_updated":"2023-10-05T16:42:46Z"},{"department":[{"_id":"34"},{"_id":"64"}],"user_id":"41047","_id":"47694","language":[{"iso":"ger"}],"file_date_updated":"2023-10-05T16:54:25Z","keyword":["Diplomarbeit"],"ddc":["000"],"type":"misc","status":"public","file":[{"access_level":"open_access","file_name":"2005_Spanke_ImplemetierungCoppersmith.ps","file_id":"47720","file_size":783523,"creator":"bhenrik","date_created":"2023-10-05T16:36:33Z","date_updated":"2023-10-05T16:54:25Z","relation":"main_file","content_type":"application/postscript"}],"date_created":"2023-10-05T16:36:44Z","author":[{"first_name":"Christoph","last_name":"Spanke","full_name":"Spanke, Christoph"}],"date_updated":"2023-10-05T16:54:25Z","oa":"1","title":"Implementierung der Coppersmith-Methode zur Untersuchung von Schwachstellen bei RSA","has_accepted_license":"1","citation":{"chicago":"Spanke, Christoph. <i>Implementierung der Coppersmith-Methode zur Untersuchung von Schwachstellen bei RSA</i>, 2005.","ieee":"C. Spanke, <i>Implementierung der Coppersmith-Methode zur Untersuchung von Schwachstellen bei RSA</i>. 2005.","ama":"Spanke C. <i>Implementierung der Coppersmith-Methode zur Untersuchung von Schwachstellen bei RSA</i>.; 2005.","apa":"Spanke, C. (2005). <i>Implementierung der Coppersmith-Methode zur Untersuchung von Schwachstellen bei RSA</i>.","bibtex":"@book{Spanke_2005, title={Implementierung der Coppersmith-Methode zur Untersuchung von Schwachstellen bei RSA}, author={Spanke, Christoph}, year={2005} }","short":"C. Spanke, Implementierung der Coppersmith-Methode zur Untersuchung von Schwachstellen bei RSA, 2005.","mla":"Spanke, Christoph. <i>Implementierung der Coppersmith-Methode zur Untersuchung von Schwachstellen bei RSA</i>. 2005."},"year":"2005"},{"publication":"Selected Areas in Cryptography","type":"book_chapter","status":"public","_id":"3011","department":[{"_id":"64"}],"user_id":"25078","publication_identifier":{"isbn":["9783540243274","9783540305644"],"issn":["0302-9743","1611-3349"]},"publication_status":"published","place":"Berlin, Heidelberg","year":"2004","page":"69-83","citation":{"apa":"Blömer, J., Guajardo, J., &#38; Krummel, V. (2004). Provably Secure Masking of AES. In <i>Selected Areas in Cryptography</i> (pp. 69–83). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/978-3-540-30564-4_5\">https://doi.org/10.1007/978-3-540-30564-4_5</a>","mla":"Blömer, Johannes, et al. “Provably Secure Masking of AES.” <i>Selected Areas in Cryptography</i>, Springer Berlin Heidelberg, 2004, pp. 69–83, doi:<a href=\"https://doi.org/10.1007/978-3-540-30564-4_5\">10.1007/978-3-540-30564-4_5</a>.","short":"J. Blömer, J. Guajardo, V. Krummel, in: Selected Areas in Cryptography, Springer Berlin Heidelberg, Berlin, Heidelberg, 2004, pp. 69–83.","bibtex":"@inbook{Blömer_Guajardo_Krummel_2004, place={Berlin, Heidelberg}, title={Provably Secure Masking of AES}, DOI={<a href=\"https://doi.org/10.1007/978-3-540-30564-4_5\">10.1007/978-3-540-30564-4_5</a>}, booktitle={Selected Areas in Cryptography}, publisher={Springer Berlin Heidelberg}, author={Blömer, Johannes and Guajardo, Jorge and Krummel, Volker}, year={2004}, pages={69–83} }","ama":"Blömer J, Guajardo J, Krummel V. Provably Secure Masking of AES. In: <i>Selected Areas in Cryptography</i>. Berlin, Heidelberg: Springer Berlin Heidelberg; 2004:69-83. doi:<a href=\"https://doi.org/10.1007/978-3-540-30564-4_5\">10.1007/978-3-540-30564-4_5</a>","ieee":"J. Blömer, J. Guajardo, and V. Krummel, “Provably Secure Masking of AES,” in <i>Selected Areas in Cryptography</i>, Berlin, Heidelberg: Springer Berlin Heidelberg, 2004, pp. 69–83.","chicago":"Blömer, Johannes, Jorge Guajardo, and Volker Krummel. “Provably Secure Masking of AES.” In <i>Selected Areas in Cryptography</i>, 69–83. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. <a href=\"https://doi.org/10.1007/978-3-540-30564-4_5\">https://doi.org/10.1007/978-3-540-30564-4_5</a>."},"date_updated":"2022-01-06T06:58:51Z","publisher":"Springer Berlin Heidelberg","date_created":"2018-06-05T08:20:20Z","author":[{"last_name":"Blömer","id":"23","full_name":"Blömer, Johannes","first_name":"Johannes"},{"last_name":"Guajardo","full_name":"Guajardo, Jorge","first_name":"Jorge"},{"first_name":"Volker","full_name":"Krummel, Volker","last_name":"Krummel"}],"title":"Provably Secure Masking of AES","doi":"10.1007/978-3-540-30564-4_5"},{"citation":{"ama":"Blömer J, May A. A Generalized Wiener Attack on RSA. In: <i>Public Key Cryptography – PKC 2004</i>. Berlin, Heidelberg: Springer Berlin Heidelberg; 2004:1-13. doi:<a href=\"https://doi.org/10.1007/978-3-540-24632-9_1\">10.1007/978-3-540-24632-9_1</a>","ieee":"J. Blömer and A. May, “A Generalized Wiener Attack on RSA,” in <i>Public Key Cryptography – PKC 2004</i>, Berlin, Heidelberg: Springer Berlin Heidelberg, 2004, pp. 1–13.","chicago":"Blömer, Johannes, and Alexander May. “A Generalized Wiener Attack on RSA.” In <i>Public Key Cryptography – PKC 2004</i>, 1–13. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. <a href=\"https://doi.org/10.1007/978-3-540-24632-9_1\">https://doi.org/10.1007/978-3-540-24632-9_1</a>.","short":"J. Blömer, A. May, in: Public Key Cryptography – PKC 2004, Springer Berlin Heidelberg, Berlin, Heidelberg, 2004, pp. 1–13.","bibtex":"@inbook{Blömer_May_2004, place={Berlin, Heidelberg}, title={A Generalized Wiener Attack on RSA}, DOI={<a href=\"https://doi.org/10.1007/978-3-540-24632-9_1\">10.1007/978-3-540-24632-9_1</a>}, booktitle={Public Key Cryptography – PKC 2004}, publisher={Springer Berlin Heidelberg}, author={Blömer, Johannes and May, Alexander}, year={2004}, pages={1–13} }","mla":"Blömer, Johannes, and Alexander May. “A Generalized Wiener Attack on RSA.” <i>Public Key Cryptography – PKC 2004</i>, Springer Berlin Heidelberg, 2004, pp. 1–13, doi:<a href=\"https://doi.org/10.1007/978-3-540-24632-9_1\">10.1007/978-3-540-24632-9_1</a>.","apa":"Blömer, J., &#38; May, A. (2004). A Generalized Wiener Attack on RSA. In <i>Public Key Cryptography – PKC 2004</i> (pp. 1–13). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/978-3-540-24632-9_1\">https://doi.org/10.1007/978-3-540-24632-9_1</a>"},"page":"1-13","year":"2004","place":"Berlin, Heidelberg","publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783540210184","9783540246329"]},"has_accepted_license":"1","doi":"10.1007/978-3-540-24632-9_1","title":"A Generalized Wiener Attack on RSA","date_created":"2018-06-05T08:20:59Z","author":[{"first_name":"Johannes","full_name":"Blömer, Johannes","id":"23","last_name":"Blömer"},{"full_name":"May, Alexander","last_name":"May","first_name":"Alexander"}],"publisher":"Springer Berlin Heidelberg","date_updated":"2022-01-06T06:58:51Z","file":[{"file_size":198120,"file_name":"keys.pdf","file_id":"3013","access_level":"closed","date_updated":"2018-06-05T08:21:31Z","creator":"feidens","date_created":"2018-06-05T08:21:31Z","success":1,"relation":"main_file","content_type":"application/pdf"}],"status":"public","type":"book_chapter","publication":"Public Key Cryptography – PKC 2004","file_date_updated":"2018-06-05T08:21:31Z","ddc":["000"],"user_id":"25078","department":[{"_id":"64"}],"_id":"3012"},{"status":"public","publication":"Public Key Cryptography – PKC 2004","type":"book_chapter","department":[{"_id":"64"}],"user_id":"25078","_id":"3014","page":"218-230","citation":{"ama":"May A. Secret Exponent Attacks on RSA-type Schemes with Moduli N=p^{r}q. In: <i>Public Key Cryptography – PKC 2004</i>. Berlin, Heidelberg: Springer Berlin Heidelberg; 2004:218-230. doi:<a href=\"https://doi.org/10.1007/978-3-540-24632-9_16\">10.1007/978-3-540-24632-9_16</a>","ieee":"A. May, “Secret Exponent Attacks on RSA-type Schemes with Moduli N=p^{r}q,” in <i>Public Key Cryptography – PKC 2004</i>, Berlin, Heidelberg: Springer Berlin Heidelberg, 2004, pp. 218–230.","chicago":"May, Alexander. “Secret Exponent Attacks on RSA-Type Schemes with Moduli N=p^{r}q.” In <i>Public Key Cryptography – PKC 2004</i>, 218–30. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. <a href=\"https://doi.org/10.1007/978-3-540-24632-9_16\">https://doi.org/10.1007/978-3-540-24632-9_16</a>.","short":"A. May, in: Public Key Cryptography – PKC 2004, Springer Berlin Heidelberg, Berlin, Heidelberg, 2004, pp. 218–230.","bibtex":"@inbook{May_2004, place={Berlin, Heidelberg}, title={Secret Exponent Attacks on RSA-type Schemes with Moduli N=p^{r}q}, DOI={<a href=\"https://doi.org/10.1007/978-3-540-24632-9_16\">10.1007/978-3-540-24632-9_16</a>}, booktitle={Public Key Cryptography – PKC 2004}, publisher={Springer Berlin Heidelberg}, author={May, Alexander}, year={2004}, pages={218–230} }","mla":"May, Alexander. “Secret Exponent Attacks on RSA-Type Schemes with Moduli N=p^{r}q.” <i>Public Key Cryptography – PKC 2004</i>, Springer Berlin Heidelberg, 2004, pp. 218–30, doi:<a href=\"https://doi.org/10.1007/978-3-540-24632-9_16\">10.1007/978-3-540-24632-9_16</a>.","apa":"May, A. (2004). Secret Exponent Attacks on RSA-type Schemes with Moduli N=p^{r}q. In <i>Public Key Cryptography – PKC 2004</i> (pp. 218–230). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/978-3-540-24632-9_16\">https://doi.org/10.1007/978-3-540-24632-9_16</a>"},"year":"2004","place":"Berlin, Heidelberg","publication_identifier":{"isbn":["9783540210184","9783540246329"],"issn":["0302-9743","1611-3349"]},"publication_status":"published","doi":"10.1007/978-3-540-24632-9_16","title":"Secret Exponent Attacks on RSA-type Schemes with Moduli N=p^{r}q","author":[{"full_name":"May, Alexander","last_name":"May","first_name":"Alexander"}],"date_created":"2018-06-05T08:22:02Z","publisher":"Springer Berlin Heidelberg","date_updated":"2022-01-06T06:58:51Z"},{"doi":"10.1007/978-3-540-28628-8_13","title":"Computing the RSA Secret Key Is Deterministic Polynomial Time Equivalent to Factoring","date_created":"2018-06-05T08:23:43Z","author":[{"first_name":"Alexander","last_name":"May","full_name":"May, Alexander"}],"date_updated":"2022-01-06T06:58:51Z","publisher":"Springer Berlin Heidelberg","page":"213-219","citation":{"chicago":"May, Alexander. “Computing the RSA Secret Key Is Deterministic Polynomial Time Equivalent to Factoring.” In <i>Advances in Cryptology – CRYPTO 2004</i>, 213–19. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. <a href=\"https://doi.org/10.1007/978-3-540-28628-8_13\">https://doi.org/10.1007/978-3-540-28628-8_13</a>.","ieee":"A. May, “Computing the RSA Secret Key Is Deterministic Polynomial Time Equivalent to Factoring,” in <i>Advances in Cryptology – CRYPTO 2004</i>, Berlin, Heidelberg: Springer Berlin Heidelberg, 2004, pp. 213–219.","ama":"May A. Computing the RSA Secret Key Is Deterministic Polynomial Time Equivalent to Factoring. In: <i>Advances in Cryptology – CRYPTO 2004</i>. Berlin, Heidelberg: Springer Berlin Heidelberg; 2004:213-219. doi:<a href=\"https://doi.org/10.1007/978-3-540-28628-8_13\">10.1007/978-3-540-28628-8_13</a>","mla":"May, Alexander. “Computing the RSA Secret Key Is Deterministic Polynomial Time Equivalent to Factoring.” <i>Advances in Cryptology – CRYPTO 2004</i>, Springer Berlin Heidelberg, 2004, pp. 213–19, doi:<a href=\"https://doi.org/10.1007/978-3-540-28628-8_13\">10.1007/978-3-540-28628-8_13</a>.","short":"A. May, in: Advances in Cryptology – CRYPTO 2004, Springer Berlin Heidelberg, Berlin, Heidelberg, 2004, pp. 213–219.","bibtex":"@inbook{May_2004, place={Berlin, Heidelberg}, title={Computing the RSA Secret Key Is Deterministic Polynomial Time Equivalent to Factoring}, DOI={<a href=\"https://doi.org/10.1007/978-3-540-28628-8_13\">10.1007/978-3-540-28628-8_13</a>}, booktitle={Advances in Cryptology – CRYPTO 2004}, publisher={Springer Berlin Heidelberg}, author={May, Alexander}, year={2004}, pages={213–219} }","apa":"May, A. (2004). Computing the RSA Secret Key Is Deterministic Polynomial Time Equivalent to Factoring. In <i>Advances in Cryptology – CRYPTO 2004</i> (pp. 213–219). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/978-3-540-28628-8_13\">https://doi.org/10.1007/978-3-540-28628-8_13</a>"},"year":"2004","place":"Berlin, Heidelberg","publication_identifier":{"isbn":["9783540226680","9783540286288"],"issn":["0302-9743","1611-3349"]},"publication_status":"published","department":[{"_id":"64"}],"user_id":"25078","_id":"3015","status":"public","publication":"Advances in Cryptology – CRYPTO 2004","type":"book_chapter"},{"publication":"Proceedings of the 10th ACM conference on Computer and communication security  - CCS '03","type":"conference","status":"public","department":[{"_id":"64"}],"user_id":"25078","_id":"3017","publication_identifier":{"isbn":["1581137389"]},"publication_status":"published","citation":{"ieee":"J. Blömer, M. Otto, and J.-P. Seifert, “A new CRT-RSA algorithm secure against bellcore attacks,” in <i>Proceedings of the 10th ACM conference on Computer and communication security  - CCS ’03</i>, 2004.","chicago":"Blömer, Johannes, Martin Otto, and Jean-Pierre Seifert. “A New CRT-RSA Algorithm Secure against Bellcore Attacks.” In <i>Proceedings of the 10th ACM Conference on Computer and Communication Security  - CCS ’03</i>. ACM Press, 2004. <a href=\"https://doi.org/10.1145/948109.948151\">https://doi.org/10.1145/948109.948151</a>.","ama":"Blömer J, Otto M, Seifert J-P. A new CRT-RSA algorithm secure against bellcore attacks. In: <i>Proceedings of the 10th ACM Conference on Computer and Communication Security  - CCS ’03</i>. ACM Press; 2004. doi:<a href=\"https://doi.org/10.1145/948109.948151\">10.1145/948109.948151</a>","apa":"Blömer, J., Otto, M., &#38; Seifert, J.-P. (2004). A new CRT-RSA algorithm secure against bellcore attacks. In <i>Proceedings of the 10th ACM conference on Computer and communication security  - CCS ’03</i>. ACM Press. <a href=\"https://doi.org/10.1145/948109.948151\">https://doi.org/10.1145/948109.948151</a>","short":"J. Blömer, M. Otto, J.-P. Seifert, in: Proceedings of the 10th ACM Conference on Computer and Communication Security  - CCS ’03, ACM Press, 2004.","bibtex":"@inproceedings{Blömer_Otto_Seifert_2004, title={A new CRT-RSA algorithm secure against bellcore attacks}, DOI={<a href=\"https://doi.org/10.1145/948109.948151\">10.1145/948109.948151</a>}, booktitle={Proceedings of the 10th ACM conference on Computer and communication security  - CCS ’03}, publisher={ACM Press}, author={Blömer, Johannes and Otto, Martin and Seifert, Jean-Pierre}, year={2004} }","mla":"Blömer, Johannes, et al. “A New CRT-RSA Algorithm Secure against Bellcore Attacks.” <i>Proceedings of the 10th ACM Conference on Computer and Communication Security  - CCS ’03</i>, ACM Press, 2004, doi:<a href=\"https://doi.org/10.1145/948109.948151\">10.1145/948109.948151</a>."},"year":"2004","date_created":"2018-06-05T08:24:48Z","author":[{"last_name":"Blömer","id":"23","full_name":"Blömer, Johannes","first_name":"Johannes"},{"first_name":"Martin","last_name":"Otto","full_name":"Otto, Martin"},{"first_name":"Jean-Pierre","full_name":"Seifert, Jean-Pierre","last_name":"Seifert"}],"publisher":"ACM Press","date_updated":"2022-01-06T06:58:51Z","doi":"10.1145/948109.948151","title":"A new CRT-RSA algorithm secure against bellcore attacks"},{"language":[{"iso":"ger"}],"title":"Neue Schranken für die Coppersmith-Methode über den ganzen Zahlen","department":[{"_id":"34"},{"_id":"64"}],"date_created":"2023-10-05T13:34:24Z","author":[{"last_name":"Dumrauf","full_name":"Dumrauf, Dominic","first_name":"Dominic"}],"user_id":"41047","_id":"47645","date_updated":"2023-10-05T13:38:53Z","status":"public","citation":{"bibtex":"@book{Dumrauf_2004, title={Neue Schranken für die Coppersmith-Methode über den ganzen Zahlen}, author={Dumrauf, Dominic}, year={2004} }","short":"D. Dumrauf, Neue Schranken für die Coppersmith-Methode über den ganzen Zahlen, 2004.","mla":"Dumrauf, Dominic. <i>Neue Schranken für die Coppersmith-Methode über den ganzen Zahlen</i>. 2004.","apa":"Dumrauf, D. (2004). <i>Neue Schranken für die Coppersmith-Methode über den ganzen Zahlen</i>.","ama":"Dumrauf D. <i>Neue Schranken für die Coppersmith-Methode über den ganzen Zahlen</i>.; 2004.","chicago":"Dumrauf, Dominic. <i>Neue Schranken für die Coppersmith-Methode über den ganzen Zahlen</i>, 2004.","ieee":"D. Dumrauf, <i>Neue Schranken für die Coppersmith-Methode über den ganzen Zahlen</i>. 2004."},"year":"2004","type":"bachelorsthesis"},{"user_id":"41047","department":[{"_id":"34"},{"_id":"64"}],"_id":"47642","language":[{"iso":"ger"}],"type":"bachelorsthesis","status":"public","date_created":"2023-10-05T13:33:32Z","author":[{"first_name":"Tim","last_name":"Herden","full_name":"Herden, Tim"}],"date_updated":"2023-10-05T13:39:00Z","title":"Implementierung und Evaluierung eines Angriffs auf DSA","citation":{"ama":"Herden T. <i>Implementierung und Evaluierung eines Angriffs auf DSA</i>.; 2004.","ieee":"T. Herden, <i>Implementierung und Evaluierung eines Angriffs auf DSA</i>. 2004.","chicago":"Herden, Tim. <i>Implementierung und Evaluierung eines Angriffs auf DSA</i>, 2004.","bibtex":"@book{Herden_2004, title={Implementierung und Evaluierung eines Angriffs auf DSA}, author={Herden, Tim}, year={2004} }","short":"T. Herden, Implementierung und Evaluierung eines Angriffs auf DSA, 2004.","mla":"Herden, Tim. <i>Implementierung und Evaluierung eines Angriffs auf DSA</i>. 2004.","apa":"Herden, T. (2004). <i>Implementierung und Evaluierung eines Angriffs auf DSA</i>."},"year":"2004"},{"type":"bachelorsthesis","status":"public","file":[{"date_updated":"2023-10-05T22:09:01Z","creator":"bhenrik","date_created":"2023-10-05T22:04:42Z","file_size":236287,"access_level":"open_access","file_id":"47790","file_name":"2004_Gesemann_ImplementierungEinesVerfahrensZurBerechnungOptimalerLaengenbeschraenkterPraefixCodes.ps","content_type":"application/postscript","relation":"main_file"}],"department":[{"_id":"34"},{"_id":"64"}],"user_id":"41047","_id":"47644","language":[{"iso":"ger"}],"file_date_updated":"2023-10-05T22:09:01Z","ddc":["000"],"has_accepted_license":"1","citation":{"bibtex":"@book{Gesemann_2004, title={Implementierung eines Verfahrens zur Berechnung optimaler längenbeschränkter Präfix-Codes}, author={Gesemann, Sebastian}, year={2004} }","short":"S. Gesemann, Implementierung eines Verfahrens zur Berechnung optimaler längenbeschränkter Präfix-Codes, 2004.","mla":"Gesemann, Sebastian. <i>Implementierung eines Verfahrens zur Berechnung optimaler längenbeschränkter Präfix-Codes</i>. 2004.","apa":"Gesemann, S. (2004). <i>Implementierung eines Verfahrens zur Berechnung optimaler längenbeschränkter Präfix-Codes</i>.","ieee":"S. Gesemann, <i>Implementierung eines Verfahrens zur Berechnung optimaler längenbeschränkter Präfix-Codes</i>. 2004.","chicago":"Gesemann, Sebastian. <i>Implementierung eines Verfahrens zur Berechnung optimaler längenbeschränkter Präfix-Codes</i>, 2004.","ama":"Gesemann S. <i>Implementierung eines Verfahrens zur Berechnung optimaler längenbeschränkter Präfix-Codes</i>.; 2004."},"year":"2004","date_created":"2023-10-05T13:34:08Z","author":[{"first_name":"Sebastian","last_name":"Gesemann","full_name":"Gesemann, Sebastian"}],"oa":"1","date_updated":"2023-10-05T22:09:01Z","title":"Implementierung eines Verfahrens zur Berechnung optimaler längenbeschränkter Präfix-Codes"},{"title":"Implementierung und Evaluation einiger Algorithmen für Kryptosysteme auf elliptischen Kurven","author":[{"last_name":"Gorski","full_name":"Gorski, Michael","first_name":"Michael"}],"date_created":"2023-10-05T13:33:51Z","oa":"1","date_updated":"2023-10-05T22:09:09Z","citation":{"ama":"Gorski M. <i>Implementierung und Evaluation einiger Algorithmen für Kryptosysteme auf elliptischen Kurven</i>.; 2004.","ieee":"M. Gorski, <i>Implementierung und Evaluation einiger Algorithmen für Kryptosysteme auf elliptischen Kurven</i>. 2004.","chicago":"Gorski, Michael. <i>Implementierung und Evaluation einiger Algorithmen für Kryptosysteme auf elliptischen Kurven</i>, 2004.","apa":"Gorski, M. (2004). <i>Implementierung und Evaluation einiger Algorithmen für Kryptosysteme auf elliptischen Kurven</i>.","mla":"Gorski, Michael. <i>Implementierung und Evaluation einiger Algorithmen für Kryptosysteme auf elliptischen Kurven</i>. 2004.","bibtex":"@book{Gorski_2004, title={Implementierung und Evaluation einiger Algorithmen für Kryptosysteme auf elliptischen Kurven}, author={Gorski, Michael}, year={2004} }","short":"M. Gorski, Implementierung und Evaluation einiger Algorithmen für Kryptosysteme auf elliptischen Kurven, 2004."},"year":"2004","has_accepted_license":"1","language":[{"iso":"ger"}],"file_date_updated":"2023-10-05T22:09:09Z","ddc":["000"],"user_id":"41047","department":[{"_id":"34"},{"_id":"64"}],"_id":"47643","file":[{"file_size":567686,"access_level":"open_access","file_name":"2004_Gorski_Schoof-Algorithmus.zip","file_id":"47789","date_updated":"2023-10-05T22:09:09Z","creator":"bhenrik","date_created":"2023-10-05T22:04:24Z","relation":"main_file","content_type":"application/zip"}],"status":"public","type":"bachelorsthesis"},{"_id":"2914","user_id":"25078","department":[{"_id":"64"}],"type":"dissertation","status":"public","date_updated":"2022-01-06T06:58:46Z","publisher":"Universität Paderborn","author":[{"last_name":"May","full_name":"May, Alexander","first_name":"Alexander"}],"supervisor":[{"first_name":"Johannes","last_name":"Blömer","id":"23","full_name":"Blömer, Johannes"}],"date_created":"2018-05-25T10:51:42Z","title":"New RSA Vulnerabilities Using Lattice Reduction Methods","main_file_link":[{"url":"http://nbn-resolving.de/urn:nbn:de:hbz:466-20030101205"}],"year":"2003","citation":{"chicago":"May, Alexander. <i>New RSA Vulnerabilities Using Lattice Reduction Methods</i>. Universität Paderborn, 2003.","ieee":"A. May, <i>New RSA Vulnerabilities Using Lattice Reduction Methods</i>. Universität Paderborn, 2003.","ama":"May A. <i>New RSA Vulnerabilities Using Lattice Reduction Methods</i>. Universität Paderborn; 2003.","apa":"May, A. (2003). <i>New RSA Vulnerabilities Using Lattice Reduction Methods</i>. Universität Paderborn.","short":"A. May, New RSA Vulnerabilities Using Lattice Reduction Methods, Universität Paderborn, 2003.","bibtex":"@book{May_2003, title={New RSA Vulnerabilities Using Lattice Reduction Methods}, publisher={Universität Paderborn}, author={May, Alexander}, year={2003} }","mla":"May, Alexander. <i>New RSA Vulnerabilities Using Lattice Reduction Methods</i>. Universität Paderborn, 2003."}},{"_id":"3016","user_id":"25078","department":[{"_id":"64"}],"type":"book_chapter","publication":"Advances in Cryptology - CRYPTO 2003","status":"public","date_updated":"2022-01-06T06:58:51Z","publisher":"Springer Berlin Heidelberg","date_created":"2018-06-05T08:24:11Z","author":[{"first_name":"Johannes","id":"23","full_name":"Blömer, Johannes","last_name":"Blömer"},{"last_name":"May","full_name":"May, Alexander","first_name":"Alexander"}],"title":"New Partial Key Exposure Attacks on RSA","doi":"10.1007/978-3-540-45146-4_2","publication_status":"published","publication_identifier":{"isbn":["9783540406747","9783540451464"],"issn":["0302-9743","1611-3349"]},"place":"Berlin, Heidelberg","year":"2003","citation":{"mla":"Blömer, Johannes, and Alexander May. “New Partial Key Exposure Attacks on RSA.” <i>Advances in Cryptology - CRYPTO 2003</i>, Springer Berlin Heidelberg, 2003, pp. 27–43, doi:<a href=\"https://doi.org/10.1007/978-3-540-45146-4_2\">10.1007/978-3-540-45146-4_2</a>.","bibtex":"@inbook{Blömer_May_2003, place={Berlin, Heidelberg}, title={New Partial Key Exposure Attacks on RSA}, DOI={<a href=\"https://doi.org/10.1007/978-3-540-45146-4_2\">10.1007/978-3-540-45146-4_2</a>}, booktitle={Advances in Cryptology - CRYPTO 2003}, publisher={Springer Berlin Heidelberg}, author={Blömer, Johannes and May, Alexander}, year={2003}, pages={27–43} }","short":"J. Blömer, A. May, in: Advances in Cryptology - CRYPTO 2003, Springer Berlin Heidelberg, Berlin, Heidelberg, 2003, pp. 27–43.","apa":"Blömer, J., &#38; May, A. (2003). New Partial Key Exposure Attacks on RSA. In <i>Advances in Cryptology - CRYPTO 2003</i> (pp. 27–43). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/978-3-540-45146-4_2\">https://doi.org/10.1007/978-3-540-45146-4_2</a>","ieee":"J. Blömer and A. May, “New Partial Key Exposure Attacks on RSA,” in <i>Advances in Cryptology - CRYPTO 2003</i>, Berlin, Heidelberg: Springer Berlin Heidelberg, 2003, pp. 27–43.","chicago":"Blömer, Johannes, and Alexander May. “New Partial Key Exposure Attacks on RSA.” In <i>Advances in Cryptology - CRYPTO 2003</i>, 27–43. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. <a href=\"https://doi.org/10.1007/978-3-540-45146-4_2\">https://doi.org/10.1007/978-3-540-45146-4_2</a>.","ama":"Blömer J, May A. New Partial Key Exposure Attacks on RSA. In: <i>Advances in Cryptology - CRYPTO 2003</i>. Berlin, Heidelberg: Springer Berlin Heidelberg; 2003:27-43. doi:<a href=\"https://doi.org/10.1007/978-3-540-45146-4_2\">10.1007/978-3-540-45146-4_2</a>"},"page":"27-43"}]
