[{"_id":"63407","user_id":"41047","department":[{"_id":"34"},{"_id":"64"}],"language":[{"iso":"eng"}],"type":"bachelorsthesis","status":"public","date_updated":"2026-02-04T14:20:08Z","date_created":"2025-12-23T11:32:25Z","author":[{"first_name":"A","last_name":"Anonymous","full_name":"Anonymous, A"}],"supervisor":[{"last_name":"Blömer","full_name":"Blömer, Johannes","id":"23","first_name":"Johannes"}],"title":"Limitations of the Random Oracle Model","year":"2025","citation":{"short":"A. Anonymous, Limitations of the Random Oracle Model, 2025.","mla":"Anonymous, A. <i>Limitations of the Random Oracle Model</i>. 2025.","bibtex":"@book{Anonymous_2025, title={Limitations of the Random Oracle Model}, author={Anonymous, A}, year={2025} }","apa":"Anonymous, A. (2025). <i>Limitations of the Random Oracle Model</i>.","chicago":"Anonymous, A. <i>Limitations of the Random Oracle Model</i>, 2025.","ieee":"A. Anonymous, <i>Limitations of the Random Oracle Model</i>. 2025.","ama":"Anonymous A. <i>Limitations of the Random Oracle Model</i>.; 2025."}},{"year":"2025","status":"public","citation":{"chicago":"Anoynmous, A. <i>BUFF Transform</i>, 2025.","ieee":"A. Anoynmous, <i>BUFF Transform</i>. 2025.","ama":"Anoynmous A. <i>BUFF Transform</i>.; 2025.","apa":"Anoynmous, A. (2025). <i>BUFF Transform</i>.","short":"A. Anoynmous, BUFF Transform, 2025.","mla":"Anoynmous, A. <i>BUFF Transform</i>. 2025.","bibtex":"@book{Anoynmous_2025, title={BUFF Transform}, author={Anoynmous, A}, year={2025} }"},"type":"bachelorsthesis","title":"BUFF Transform","language":[{"iso":"eng"}],"_id":"63406","date_updated":"2026-02-04T14:20:13Z","department":[{"_id":"34"},{"_id":"64"}],"supervisor":[{"id":"23","full_name":"Blömer, Johannes","last_name":"Blömer","first_name":"Johannes"}],"author":[{"last_name":"Anoynmous","full_name":"Anoynmous, A","first_name":"A"}],"date_created":"2025-12-23T11:31:38Z","user_id":"41047"},{"_id":"61879","department":[{"_id":"34"},{"_id":"64"}],"user_id":"41047","language":[{"iso":"eng"}],"type":"bachelorsthesis","status":"public","date_updated":"2025-10-20T08:53:28Z","date_created":"2025-10-20T08:52:45Z","author":[{"full_name":"Anonymous, A.","last_name":"Anonymous","first_name":"A."}],"supervisor":[{"last_name":"Blömer","id":"23","full_name":"Blömer, Johannes","first_name":"Johannes"}],"title":"Overview on Threshold Signature Schemes and their Applications","year":"2025","citation":{"apa":"Anonymous, A. (2025). <i>Overview on Threshold Signature Schemes and their Applications</i>.","mla":"Anonymous, A. <i>Overview on Threshold Signature Schemes and Their Applications</i>. 2025.","bibtex":"@book{Anonymous_2025, title={Overview on Threshold Signature Schemes and their Applications}, author={Anonymous, A.}, year={2025} }","short":"A. Anonymous, Overview on Threshold Signature Schemes and Their Applications, 2025.","ieee":"A. Anonymous, <i>Overview on Threshold Signature Schemes and their Applications</i>. 2025.","chicago":"Anonymous, A. <i>Overview on Threshold Signature Schemes and Their Applications</i>, 2025.","ama":"Anonymous A. <i>Overview on Threshold Signature Schemes and Their Applications</i>.; 2025."}},{"user_id":"41047","department":[{"_id":"34"},{"_id":"64"}],"_id":"61878","language":[{"iso":"eng"}],"type":"bachelorsthesis","status":"public","supervisor":[{"first_name":"Johannes","id":"23","full_name":"Blömer, Johannes","last_name":"Blömer"}],"date_created":"2025-10-20T08:51:06Z","author":[{"first_name":"A","full_name":"Anonymous, A","last_name":"Anonymous"}],"date_updated":"2025-10-20T08:53:24Z","title":"Comparison of Time-Lock Puzzle Constructions and Their Security","citation":{"apa":"Anonymous, A. (2025). <i>Comparison of Time-Lock Puzzle Constructions and Their Security</i>.","short":"A. Anonymous, Comparison of Time-Lock Puzzle Constructions and Their Security, 2025.","bibtex":"@book{Anonymous_2025, title={Comparison of Time-Lock Puzzle Constructions and Their Security}, author={Anonymous, A}, year={2025} }","mla":"Anonymous, A. <i>Comparison of Time-Lock Puzzle Constructions and Their Security</i>. 2025.","ieee":"A. Anonymous, <i>Comparison of Time-Lock Puzzle Constructions and Their Security</i>. 2025.","chicago":"Anonymous, A. <i>Comparison of Time-Lock Puzzle Constructions and Their Security</i>, 2025.","ama":"Anonymous A. <i>Comparison of Time-Lock Puzzle Constructions and Their Security</i>.; 2025."},"year":"2025"},{"title":"Privacy-Preserving Collection and Evaluation of Log Files","supervisor":[{"first_name":"Johannes","full_name":"Blömer, Johannes","id":"23","last_name":"Blömer"}],"date_created":"2023-04-03T14:09:14Z","author":[{"first_name":"Angelina","full_name":"Koch, Angelina","last_name":"Koch"}],"oa":"1","date_updated":"2023-05-30T11:43:18Z","citation":{"ama":"Koch A. <i>Privacy-Preserving Collection and Evaluation of Log Files</i>.; 2023.","chicago":"Koch, Angelina. <i>Privacy-Preserving Collection and Evaluation of Log Files</i>, 2023.","ieee":"A. Koch, <i>Privacy-Preserving Collection and Evaluation of Log Files</i>. 2023.","apa":"Koch, A. (2023). <i>Privacy-Preserving Collection and Evaluation of Log Files</i>.","short":"A. Koch, Privacy-Preserving Collection and Evaluation of Log Files, 2023.","mla":"Koch, Angelina. <i>Privacy-Preserving Collection and Evaluation of Log Files</i>. 2023.","bibtex":"@book{Koch_2023, title={Privacy-Preserving Collection and Evaluation of Log Files}, author={Koch, Angelina}, year={2023} }"},"year":"2023","has_accepted_license":"1","language":[{"iso":"eng"}],"file_date_updated":"2023-05-30T11:43:18Z","ddc":["000"],"user_id":"25078","department":[{"_id":"64"}],"project":[{"_id":"1","name":"SFB 901: SFB 901"},{"name":"SFB 901 - C: SFB 901 - Project Area C","_id":"4"},{"name":"SFB 901 - C1: SFB 901 - Subproject C1","_id":"13"}],"_id":"43375","file":[{"date_updated":"2023-05-30T11:43:18Z","date_created":"2023-05-26T07:07:39Z","creator":"feidens","file_size":2275949,"file_name":"thesis_koch.pdf","file_id":"45303","access_level":"open_access","content_type":"application/pdf","relation":"main_file"}],"status":"public","type":"bachelorsthesis"},{"_id":"32399","project":[{"_id":"1","name":"SFB 901: SFB 901"},{"name":"SFB 901 - C: SFB 901 - Project Area C","_id":"4"},{"_id":"13","name":"SFB 901 - C1: SFB 901 - Subproject C1"}],"department":[{"_id":"64"}],"user_id":"25078","language":[{"iso":"eng"}],"type":"bachelorsthesis","status":"public","date_updated":"2022-07-26T14:31:54Z","supervisor":[{"last_name":"Blömer","id":"23","full_name":"Blömer, Johannes","first_name":"Johannes"}],"date_created":"2022-07-20T09:38:39Z","author":[{"last_name":"Vahle","full_name":"Vahle, Ella","first_name":"Ella"}],"title":"Modelling and Proving Security for a Secure MPC Protocol for Stable Matching","year":"2022","citation":{"ieee":"E. Vahle, <i>Modelling and Proving Security for a Secure MPC Protocol for Stable Matching</i>. 2022.","chicago":"Vahle, Ella. <i>Modelling and Proving Security for a Secure MPC Protocol for Stable Matching</i>, 2022.","ama":"Vahle E. <i>Modelling and Proving Security for a Secure MPC Protocol for Stable Matching</i>.; 2022.","mla":"Vahle, Ella. <i>Modelling and Proving Security for a Secure MPC Protocol for Stable Matching</i>. 2022.","short":"E. Vahle, Modelling and Proving Security for a Secure MPC Protocol for Stable Matching, 2022.","bibtex":"@book{Vahle_2022, title={Modelling and Proving Security for a Secure MPC Protocol for Stable Matching}, author={Vahle, Ella}, year={2022} }","apa":"Vahle, E. (2022). <i>Modelling and Proving Security for a Secure MPC Protocol for Stable Matching</i>."}},{"project":[{"_id":"1","name":"SFB 901: SFB 901"},{"_id":"4","name":"SFB 901 - C: SFB 901 - Project Area C"},{"_id":"13","name":"SFB 901 - C1: SFB 901 - Subproject C1"},{"_id":"84","name":"SFB 901 - T2: SFB 901 -Subproject T2"},{"name":"SFB 901 - T: SFB 901 - Project Area T","_id":"82"}],"_id":"32398","user_id":"477","department":[{"_id":"64"},{"_id":"7"}],"language":[{"iso":"eng"}],"type":"bachelorsthesis","status":"public","date_updated":"2022-11-18T09:38:04Z","supervisor":[{"full_name":"Blömer, Johannes","id":"23","last_name":"Blömer","first_name":"Johannes"}],"author":[{"last_name":"Siek","full_name":"Siek, Hanna","first_name":"Hanna"}],"date_created":"2022-07-20T09:36:39Z","title":"Bringing Structure to Structure-Preserving Signatures: Overview, Implementation and Comparison of Selected SPS Schemes","year":"2022","citation":{"ama":"Siek H. <i>Bringing Structure to Structure-Preserving Signatures: Overview, Implementation and Comparison of Selected SPS Schemes</i>.; 2022.","chicago":"Siek, Hanna. <i>Bringing Structure to Structure-Preserving Signatures: Overview, Implementation and Comparison of Selected SPS Schemes</i>, 2022.","ieee":"H. Siek, <i>Bringing Structure to Structure-Preserving Signatures: Overview, Implementation and Comparison of Selected SPS Schemes</i>. 2022.","apa":"Siek, H. (2022). <i>Bringing Structure to Structure-Preserving Signatures: Overview, Implementation and Comparison of Selected SPS Schemes</i>.","mla":"Siek, Hanna. <i>Bringing Structure to Structure-Preserving Signatures: Overview, Implementation and Comparison of Selected SPS Schemes</i>. 2022.","short":"H. Siek, Bringing Structure to Structure-Preserving Signatures: Overview, Implementation and Comparison of Selected SPS Schemes, 2022.","bibtex":"@book{Siek_2022, title={Bringing Structure to Structure-Preserving Signatures: Overview, Implementation and Comparison of Selected SPS Schemes}, author={Siek, Hanna}, year={2022} }"}},{"author":[{"first_name":"A","full_name":"Anonymous, A","last_name":"Anonymous"}],"supervisor":[{"full_name":"Blömer, Johannes","id":"23","last_name":"Blömer","first_name":"Johannes"}],"date_created":"2022-12-24T00:14:34Z","date_updated":"2023-01-10T10:31:35Z","title":"Evaluating database systems relying on secure multiparty computation","citation":{"apa":"Anonymous, A. (2022). <i>Evaluating database systems relying on secure multiparty computation</i>.","short":"A. Anonymous, Evaluating Database Systems Relying on Secure Multiparty Computation, 2022.","bibtex":"@book{Anonymous_2022, title={Evaluating database systems relying on secure multiparty computation}, author={Anonymous, A}, year={2022} }","mla":"Anonymous, A. <i>Evaluating Database Systems Relying on Secure Multiparty Computation</i>. 2022.","ama":"Anonymous A. <i>Evaluating Database Systems Relying on Secure Multiparty Computation</i>.; 2022.","ieee":"A. Anonymous, <i>Evaluating database systems relying on secure multiparty computation</i>. 2022.","chicago":"Anonymous, A. <i>Evaluating Database Systems Relying on Secure Multiparty Computation</i>, 2022."},"year":"2022","department":[{"_id":"34"},{"_id":"64"}],"user_id":"41047","_id":"34962","project":[{"name":"SFB 901: SFB 901","_id":"1"},{"name":"SFB 901 - C: SFB 901 - Project Area C","_id":"4"},{"name":"SFB 901 - C1: SFB 901 - Subproject C1","_id":"13"}],"language":[{"iso":"eng"}],"type":"bachelorsthesis","status":"public"},{"date_updated":"2023-01-10T11:54:43Z","supervisor":[{"last_name":"Blömer","full_name":"Blömer, Johannes","first_name":"Johannes"}],"date_created":"2023-01-10T10:39:27Z","author":[{"first_name":"Jan","full_name":"Lohse, Jan","last_name":"Lohse"}],"title":"Lattice Revocation Mechanisms","year":"2022","citation":{"mla":"Lohse, Jan. <i>Lattice Revocation Mechanisms</i>. 2022.","short":"J. Lohse, Lattice Revocation Mechanisms, 2022.","bibtex":"@book{Lohse_2022, title={Lattice Revocation Mechanisms}, author={Lohse, Jan}, year={2022} }","apa":"Lohse, J. (2022). <i>Lattice Revocation Mechanisms</i>.","ieee":"J. Lohse, <i>Lattice Revocation Mechanisms</i>. 2022.","chicago":"Lohse, Jan. <i>Lattice Revocation Mechanisms</i>, 2022.","ama":"Lohse J. <i>Lattice Revocation Mechanisms</i>.; 2022."},"_id":"35772","user_id":"47434","department":[{"_id":"64"}],"language":[{"iso":"eng"}],"type":"bachelorsthesis","status":"public"},{"type":"bachelorsthesis","status":"public","user_id":"47434","department":[{"_id":"64"}],"_id":"45257","language":[{"iso":"eng"}],"citation":{"chicago":"Beckmann, Marvin. <i>Analysis of an Interactive Lattice Based Aggregated Signature Scheme</i>, 2022.","ieee":"M. Beckmann, <i>Analysis of an Interactive Lattice Based Aggregated Signature Scheme</i>. 2022.","ama":"Beckmann M. <i>Analysis of an Interactive Lattice Based Aggregated Signature Scheme</i>.; 2022.","bibtex":"@book{Beckmann_2022, title={Analysis of an Interactive Lattice Based Aggregated Signature Scheme}, author={Beckmann, Marvin}, year={2022} }","short":"M. Beckmann, Analysis of an Interactive Lattice Based Aggregated Signature Scheme, 2022.","mla":"Beckmann, Marvin. <i>Analysis of an Interactive Lattice Based Aggregated Signature Scheme</i>. 2022.","apa":"Beckmann, M. (2022). <i>Analysis of an Interactive Lattice Based Aggregated Signature Scheme</i>."},"year":"2022","date_created":"2023-05-24T10:01:33Z","supervisor":[{"full_name":"Blömer, Johannes","last_name":"Blömer","first_name":"Johannes"}],"author":[{"first_name":"Marvin","last_name":"Beckmann","full_name":"Beckmann, Marvin"}],"date_updated":"2023-05-24T10:01:36Z","title":"Analysis of an Interactive Lattice Based Aggregated Signature Scheme"},{"title":"Lattice reductions and their applications to cryptographic systems","supervisor":[{"last_name":"Blömer","id":"23","full_name":"Blömer, Johannes","first_name":"Johannes"}],"date_created":"2022-07-20T11:40:28Z","author":[{"full_name":"Siemer, Jan Niklas","last_name":"Siemer","first_name":"Jan Niklas"}],"date_updated":"2023-01-10T10:49:33Z","citation":{"chicago":"Siemer, Jan Niklas. <i>Lattice Reductions and Their Applications to Cryptographic Systems</i>, 2021.","ieee":"J. N. Siemer, <i>Lattice reductions and their applications to cryptographic systems</i>. 2021.","ama":"Siemer JN. <i>Lattice Reductions and Their Applications to Cryptographic Systems</i>.; 2021.","apa":"Siemer, J. N. (2021). <i>Lattice reductions and their applications to cryptographic systems</i>.","short":"J.N. Siemer, Lattice Reductions and Their Applications to Cryptographic Systems, 2021.","mla":"Siemer, Jan Niklas. <i>Lattice Reductions and Their Applications to Cryptographic Systems</i>. 2021.","bibtex":"@book{Siemer_2021, title={Lattice reductions and their applications to cryptographic systems}, author={Siemer, Jan Niklas}, year={2021} }"},"year":"2021","language":[{"iso":"eng"}],"user_id":"47434","department":[{"_id":"64"}],"_id":"32401","status":"public","type":"bachelorsthesis"},{"department":[{"_id":"64"}],"user_id":"47434","_id":"32402","language":[{"iso":"eng"}],"type":"bachelorsthesis","status":"public","date_created":"2022-07-20T11:42:08Z","author":[{"first_name":"Meret Amalia Elisabeth","full_name":"Böttger, Meret Amalia Elisabeth","last_name":"Böttger"}],"supervisor":[{"first_name":"Johannes","last_name":"Blömer","full_name":"Blömer, Johannes"}],"date_updated":"2023-01-23T13:03:05Z","title":"IND-CCA Secure PKE Schemes - Based on Lattices","citation":{"ama":"Böttger MAE. <i>IND-CCA Secure PKE Schemes - Based on Lattices</i>.; 2021.","chicago":"Böttger, Meret Amalia Elisabeth. <i>IND-CCA Secure PKE Schemes - Based on Lattices</i>, 2021.","ieee":"M. A. E. Böttger, <i>IND-CCA Secure PKE Schemes - Based on Lattices</i>. 2021.","apa":"Böttger, M. A. E. (2021). <i>IND-CCA Secure PKE Schemes - Based on Lattices</i>.","bibtex":"@book{Böttger_2021, title={IND-CCA Secure PKE Schemes - Based on Lattices}, author={Böttger, Meret Amalia Elisabeth}, year={2021} }","mla":"Böttger, Meret Amalia Elisabeth. <i>IND-CCA Secure PKE Schemes - Based on Lattices</i>. 2021.","short":"M.A.E. Böttger, IND-CCA Secure PKE Schemes - Based on Lattices, 2021."},"year":"2021"},{"status":"public","type":"bachelorsthesis","extern":"1","language":[{"iso":"eng"}],"_id":"21117","user_id":"27207","department":[{"_id":"7"},{"_id":"64"}],"year":"2020","citation":{"ieee":"P. Manegold, <i>On Batch Proofs of Partial Knowledge</i>. 2020.","chicago":"Manegold, Philipp. <i>On Batch Proofs of Partial Knowledge</i>, 2020.","ama":"Manegold P. <i>On Batch Proofs of Partial Knowledge</i>.; 2020.","apa":"Manegold, P. (2020). <i>On Batch Proofs of Partial Knowledge</i>.","short":"P. Manegold, On Batch Proofs of Partial Knowledge, 2020.","mla":"Manegold, Philipp. <i>On Batch Proofs of Partial Knowledge</i>. 2020.","bibtex":"@book{Manegold_2020, title={On Batch Proofs of Partial Knowledge}, author={Manegold, Philipp}, year={2020} }"},"title":"On Batch Proofs of Partial Knowledge","date_updated":"2022-01-06T06:54:46Z","author":[{"full_name":"Manegold, Philipp","last_name":"Manegold","first_name":"Philipp"}],"date_created":"2021-02-02T10:27:49Z"},{"extern":"1","language":[{"iso":"eng"}],"user_id":"27207","department":[{"_id":"7"},{"_id":"64"}],"_id":"21118","status":"public","type":"bachelorsthesis","title":"Measuring the Performance of SNARK Libraries","date_created":"2021-02-02T10:29:30Z","author":[{"last_name":"Anonymous","full_name":"Anonymous, Anonymous","first_name":"Anonymous"}],"date_updated":"2022-01-06T06:54:46Z","citation":{"short":"A. Anonymous, Measuring the Performance of SNARK Libraries, 2020.","mla":"Anonymous, Anonymous. <i>Measuring the Performance of SNARK Libraries</i>. 2020.","bibtex":"@book{Anonymous_2020, title={Measuring the Performance of SNARK Libraries}, author={Anonymous, Anonymous}, year={2020} }","apa":"Anonymous, A. (2020). <i>Measuring the Performance of SNARK Libraries</i>.","chicago":"Anonymous, Anonymous. <i>Measuring the Performance of SNARK Libraries</i>, 2020.","ieee":"A. Anonymous, <i>Measuring the Performance of SNARK Libraries</i>. 2020.","ama":"Anonymous A. <i>Measuring the Performance of SNARK Libraries</i>.; 2020."},"year":"2020"},{"type":"bachelorsthesis","status":"public","department":[{"_id":"64"}],"user_id":"47434","_id":"21119","language":[{"iso":"eng"}],"citation":{"apa":"Westerwelle, M. (2020). <i>Trapdoors and Sampling Procedures for Lattice-Based Cryptographic Constructions</i>.","short":"M. Westerwelle, Trapdoors and Sampling Procedures for Lattice-Based Cryptographic Constructions, 2020.","bibtex":"@book{Westerwelle_2020, title={Trapdoors and Sampling Procedures for Lattice-Based Cryptographic Constructions}, author={Westerwelle, Max}, year={2020} }","mla":"Westerwelle, Max. <i>Trapdoors and Sampling Procedures for Lattice-Based Cryptographic Constructions</i>. 2020.","ieee":"M. Westerwelle, <i>Trapdoors and Sampling Procedures for Lattice-Based Cryptographic Constructions</i>. 2020.","chicago":"Westerwelle, Max. <i>Trapdoors and Sampling Procedures for Lattice-Based Cryptographic Constructions</i>, 2020.","ama":"Westerwelle M. <i>Trapdoors and Sampling Procedures for Lattice-Based Cryptographic Constructions</i>.; 2020."},"year":"2020","author":[{"first_name":"Max","last_name":"Westerwelle","full_name":"Westerwelle, Max"}],"date_created":"2021-02-02T10:37:35Z","date_updated":"2022-01-06T06:54:46Z","title":"Trapdoors and Sampling Procedures for Lattice-Based Cryptographic Constructions"},{"type":"bachelorsthesis","status":"public","user_id":"41047","department":[{"_id":"64"},{"_id":"7"}],"_id":"21121","language":[{"iso":"eng"}],"citation":{"apa":"Anonymous, A. (2020). <i>Benchmarking the Efficiency of Secure Multiparty Computation for Real World Problems</i>.","short":"A. Anonymous, Benchmarking the Efficiency of Secure Multiparty Computation for Real World Problems, 2020.","bibtex":"@book{Anonymous_2020, title={Benchmarking the Efficiency of Secure Multiparty Computation for Real World Problems}, author={Anonymous, Anonymous}, year={2020} }","mla":"Anonymous, Anonymous. <i>Benchmarking the Efficiency of Secure Multiparty Computation for Real World Problems</i>. 2020.","ama":"Anonymous A. <i>Benchmarking the Efficiency of Secure Multiparty Computation for Real World Problems</i>.; 2020.","ieee":"A. Anonymous, <i>Benchmarking the Efficiency of Secure Multiparty Computation for Real World Problems</i>. 2020.","chicago":"Anonymous, Anonymous. <i>Benchmarking the Efficiency of Secure Multiparty Computation for Real World Problems</i>, 2020."},"year":"2020","author":[{"first_name":"Anonymous","full_name":"Anonymous, Anonymous","last_name":"Anonymous"}],"date_created":"2021-02-02T10:50:08Z","supervisor":[{"first_name":"Johannes","full_name":"Blömer, Johannes","id":"23","last_name":"Blömer"}],"date_updated":"2022-01-06T06:54:46Z","title":"Benchmarking the Efficiency of Secure Multiparty Computation for Real World Problems"},{"year":"2020","citation":{"apa":"Heimann, J. (2020). <i>Distributed Key Generation for Attribute-Based Signatures</i>.","mla":"Heimann, Jonas. <i>Distributed Key Generation for Attribute-Based Signatures</i>. 2020.","short":"J. Heimann, Distributed Key Generation for Attribute-Based Signatures, 2020.","bibtex":"@book{Heimann_2020, title={Distributed Key Generation for Attribute-Based Signatures}, author={Heimann, Jonas}, year={2020} }","ieee":"J. Heimann, <i>Distributed Key Generation for Attribute-Based Signatures</i>. 2020.","chicago":"Heimann, Jonas. <i>Distributed Key Generation for Attribute-Based Signatures</i>, 2020.","ama":"Heimann J. <i>Distributed Key Generation for Attribute-Based Signatures</i>.; 2020."},"status":"public","type":"bachelorsthesis","title":"Distributed Key Generation for Attribute-Based Signatures","language":[{"iso":"eng"}],"date_updated":"2022-01-06T06:53:26Z","_id":"18085","date_created":"2020-08-20T11:23:11Z","author":[{"last_name":"Heimann","full_name":"Heimann, Jonas","first_name":"Jonas"}],"supervisor":[{"full_name":"Blömer, Johannes","id":"23","last_name":"Blömer","first_name":"Johannes"}],"user_id":"13703","department":[{"_id":"64"}]},{"extern":"1","file_date_updated":"2020-10-23T08:36:34Z","language":[{"iso":"eng"}],"ddc":["000"],"user_id":"25078","department":[{"_id":"7"},{"_id":"64"}],"project":[{"name":"SFB 901","_id":"1"},{"_id":"4","name":"SFB 901 - Project Area C"},{"_id":"13","name":"SFB 901 - Subproject C1"}],"_id":"18637","file":[{"relation":"main_file","content_type":"application/pdf","file_size":1060142,"description":"This is a bachelor thesis.","file_id":"20186","file_name":"thesis_schuermann_published.pdf","access_level":"open_access","date_updated":"2020-10-23T08:36:34Z","creator":"feidens","date_created":"2020-10-23T08:36:34Z"}],"status":"public","type":"bachelorsthesis","title":"A Group Signature Scheme from Flexible Public Key Signatures and Structure-Preserving Signatures on Equivalence Classes","supervisor":[{"first_name":"Johannes","last_name":"Blömer","id":"23","full_name":"Blömer, Johannes"}],"author":[{"first_name":"Patrick","full_name":"Schürmann, Patrick","last_name":"Schürmann"}],"date_created":"2020-08-29T13:24:51Z","oa":"1","publisher":"Universität Paderborn","date_updated":"2022-01-06T06:53:50Z","citation":{"ama":"Schürmann P. <i>A Group Signature Scheme from Flexible Public Key Signatures and Structure-Preserving Signatures on Equivalence Classes</i>. Universität Paderborn; 2020.","ieee":"P. Schürmann, <i>A Group Signature Scheme from Flexible Public Key Signatures and Structure-Preserving Signatures on Equivalence Classes</i>. Universität Paderborn, 2020.","chicago":"Schürmann, Patrick. <i>A Group Signature Scheme from Flexible Public Key Signatures and Structure-Preserving Signatures on Equivalence Classes</i>. Universität Paderborn, 2020.","apa":"Schürmann, P. (2020). <i>A Group Signature Scheme from Flexible Public Key Signatures and Structure-Preserving Signatures on Equivalence Classes</i>. Universität Paderborn.","short":"P. Schürmann, A Group Signature Scheme from Flexible Public Key Signatures and Structure-Preserving Signatures on Equivalence Classes, Universität Paderborn, 2020.","mla":"Schürmann, Patrick. <i>A Group Signature Scheme from Flexible Public Key Signatures and Structure-Preserving Signatures on Equivalence Classes</i>. Universität Paderborn, 2020.","bibtex":"@book{Schürmann_2020, title={A Group Signature Scheme from Flexible Public Key Signatures and Structure-Preserving Signatures on Equivalence Classes}, publisher={Universität Paderborn}, author={Schürmann, Patrick}, year={2020} }"},"year":"2020","has_accepted_license":"1"},{"_id":"18639","project":[{"_id":"1","name":"SFB 901"},{"_id":"4","name":"SFB 901 - Project Area C"},{"_id":"13","name":"SFB 901 - Subproject C1"}],"department":[{"_id":"7"},{"_id":"64"}],"user_id":"477","language":[{"iso":"eng"}],"type":"bachelorsthesis","status":"public","publisher":"Universität Paderborn","date_updated":"2022-01-06T06:53:50Z","supervisor":[{"full_name":"Blömer, Johannes","id":"23","last_name":"Blömer","first_name":"Johannes"}],"date_created":"2020-08-29T13:30:56Z","author":[{"first_name":"Tobias","last_name":"Terfort","full_name":"Terfort, Tobias"}],"title":"Enhancing Security by Usage of Universal One-Way Hash Functions","year":"2020","citation":{"apa":"Terfort, T. (2020). <i>Enhancing Security by Usage of Universal One-Way Hash Functions</i>. Universität Paderborn.","mla":"Terfort, Tobias. <i>Enhancing Security by Usage of Universal One-Way Hash Functions</i>. Universität Paderborn, 2020.","bibtex":"@book{Terfort_2020, title={Enhancing Security by Usage of Universal One-Way Hash Functions}, publisher={Universität Paderborn}, author={Terfort, Tobias}, year={2020} }","short":"T. Terfort, Enhancing Security by Usage of Universal One-Way Hash Functions, Universität Paderborn, 2020.","ama":"Terfort T. <i>Enhancing Security by Usage of Universal One-Way Hash Functions</i>. Universität Paderborn; 2020.","ieee":"T. Terfort, <i>Enhancing Security by Usage of Universal One-Way Hash Functions</i>. Universität Paderborn, 2020.","chicago":"Terfort, Tobias. <i>Enhancing Security by Usage of Universal One-Way Hash Functions</i>. Universität Paderborn, 2020."}},{"year":"2020","citation":{"ama":"Kramer P. <i>Comparison of Zero-Knowledge Range Proofs</i>. Universität Paderborn; 2020.","chicago":"Kramer, Paul. <i>Comparison of Zero-Knowledge Range Proofs</i>. Universität Paderborn, 2020.","ieee":"P. Kramer, <i>Comparison of Zero-Knowledge Range Proofs</i>. Universität Paderborn, 2020.","apa":"Kramer, P. (2020). <i>Comparison of Zero-Knowledge Range Proofs</i>. Universität Paderborn.","mla":"Kramer, Paul. <i>Comparison of Zero-Knowledge Range Proofs</i>. Universität Paderborn, 2020.","short":"P. Kramer, Comparison of Zero-Knowledge Range Proofs, Universität Paderborn, 2020.","bibtex":"@book{Kramer_2020, title={Comparison of Zero-Knowledge Range Proofs}, publisher={Universität Paderborn}, author={Kramer, Paul}, year={2020} }"},"title":"Comparison of Zero-Knowledge Range Proofs","publisher":"Universität Paderborn","date_updated":"2022-10-17T10:56:59Z","supervisor":[{"first_name":"Johannes","last_name":"Blömer","full_name":"Blömer, Johannes","id":"23"}],"date_created":"2020-08-29T13:27:11Z","author":[{"first_name":"Paul","full_name":"Kramer, Paul","id":"64594","last_name":"Kramer"}],"status":"public","type":"bachelorsthesis","language":[{"iso":"eng"}],"_id":"18638","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Project Area C","_id":"4"},{"_id":"13","name":"SFB 901 - Subproject C1"}],"department":[{"_id":"7"},{"_id":"64"}],"user_id":"25078"}]
