[{"title":"Limitations of the Random Oracle Model","supervisor":[{"first_name":"Johannes","id":"23","full_name":"Blömer, Johannes","last_name":"Blömer"}],"author":[{"first_name":"A","full_name":"Anonymous, A","last_name":"Anonymous"}],"date_created":"2025-12-23T11:32:25Z","date_updated":"2026-02-04T14:20:08Z","citation":{"short":"A. Anonymous, Limitations of the Random Oracle Model, 2025.","mla":"Anonymous, A. <i>Limitations of the Random Oracle Model</i>. 2025.","bibtex":"@book{Anonymous_2025, title={Limitations of the Random Oracle Model}, author={Anonymous, A}, year={2025} }","apa":"Anonymous, A. (2025). <i>Limitations of the Random Oracle Model</i>.","ama":"Anonymous A. <i>Limitations of the Random Oracle Model</i>.; 2025.","ieee":"A. Anonymous, <i>Limitations of the Random Oracle Model</i>. 2025.","chicago":"Anonymous, A. <i>Limitations of the Random Oracle Model</i>, 2025."},"year":"2025","language":[{"iso":"eng"}],"user_id":"41047","department":[{"_id":"34"},{"_id":"64"}],"_id":"63407","status":"public","type":"bachelorsthesis"},{"language":[{"iso":"eng"}],"title":"BUFF Transform","author":[{"first_name":"A","full_name":"Anoynmous, A","last_name":"Anoynmous"}],"user_id":"41047","supervisor":[{"first_name":"Johannes","id":"23","full_name":"Blömer, Johannes","last_name":"Blömer"}],"date_created":"2025-12-23T11:31:38Z","department":[{"_id":"34"},{"_id":"64"}],"date_updated":"2026-02-04T14:20:13Z","_id":"63406","citation":{"ieee":"A. Anoynmous, <i>BUFF Transform</i>. 2025.","chicago":"Anoynmous, A. <i>BUFF Transform</i>, 2025.","ama":"Anoynmous A. <i>BUFF Transform</i>.; 2025.","apa":"Anoynmous, A. (2025). <i>BUFF Transform</i>.","mla":"Anoynmous, A. <i>BUFF Transform</i>. 2025.","bibtex":"@book{Anoynmous_2025, title={BUFF Transform}, author={Anoynmous, A}, year={2025} }","short":"A. Anoynmous, BUFF Transform, 2025."},"status":"public","year":"2025","type":"bachelorsthesis"},{"user_id":"41047","department":[{"_id":"34"},{"_id":"64"}],"_id":"61879","language":[{"iso":"eng"}],"type":"bachelorsthesis","status":"public","author":[{"full_name":"Anonymous, A.","last_name":"Anonymous","first_name":"A."}],"date_created":"2025-10-20T08:52:45Z","supervisor":[{"first_name":"Johannes","last_name":"Blömer","full_name":"Blömer, Johannes","id":"23"}],"date_updated":"2025-10-20T08:53:28Z","title":"Overview on Threshold Signature Schemes and their Applications","citation":{"apa":"Anonymous, A. (2025). <i>Overview on Threshold Signature Schemes and their Applications</i>.","mla":"Anonymous, A. <i>Overview on Threshold Signature Schemes and Their Applications</i>. 2025.","short":"A. Anonymous, Overview on Threshold Signature Schemes and Their Applications, 2025.","bibtex":"@book{Anonymous_2025, title={Overview on Threshold Signature Schemes and their Applications}, author={Anonymous, A.}, year={2025} }","ama":"Anonymous A. <i>Overview on Threshold Signature Schemes and Their Applications</i>.; 2025.","ieee":"A. Anonymous, <i>Overview on Threshold Signature Schemes and their Applications</i>. 2025.","chicago":"Anonymous, A. <i>Overview on Threshold Signature Schemes and Their Applications</i>, 2025."},"year":"2025"},{"status":"public","type":"bachelorsthesis","language":[{"iso":"eng"}],"_id":"61878","department":[{"_id":"34"},{"_id":"64"}],"user_id":"41047","year":"2025","citation":{"apa":"Anonymous, A. (2025). <i>Comparison of Time-Lock Puzzle Constructions and Their Security</i>.","bibtex":"@book{Anonymous_2025, title={Comparison of Time-Lock Puzzle Constructions and Their Security}, author={Anonymous, A}, year={2025} }","short":"A. Anonymous, Comparison of Time-Lock Puzzle Constructions and Their Security, 2025.","mla":"Anonymous, A. <i>Comparison of Time-Lock Puzzle Constructions and Their Security</i>. 2025.","ieee":"A. Anonymous, <i>Comparison of Time-Lock Puzzle Constructions and Their Security</i>. 2025.","chicago":"Anonymous, A. <i>Comparison of Time-Lock Puzzle Constructions and Their Security</i>, 2025.","ama":"Anonymous A. <i>Comparison of Time-Lock Puzzle Constructions and Their Security</i>.; 2025."},"title":"Comparison of Time-Lock Puzzle Constructions and Their Security","date_updated":"2025-10-20T08:53:24Z","date_created":"2025-10-20T08:51:06Z","author":[{"full_name":"Anonymous, A","last_name":"Anonymous","first_name":"A"}],"supervisor":[{"last_name":"Blömer","id":"23","full_name":"Blömer, Johannes","first_name":"Johannes"}]},{"file":[{"date_updated":"2023-05-30T11:43:18Z","date_created":"2023-05-26T07:07:39Z","creator":"feidens","file_size":2275949,"file_id":"45303","file_name":"thesis_koch.pdf","access_level":"open_access","content_type":"application/pdf","relation":"main_file"}],"status":"public","type":"bachelorsthesis","ddc":["000"],"language":[{"iso":"eng"}],"file_date_updated":"2023-05-30T11:43:18Z","project":[{"_id":"1","name":"SFB 901: SFB 901"},{"_id":"4","name":"SFB 901 - C: SFB 901 - Project Area C"},{"name":"SFB 901 - C1: SFB 901 - Subproject C1","_id":"13"}],"_id":"43375","user_id":"25078","department":[{"_id":"64"}],"year":"2023","citation":{"apa":"Koch, A. (2023). <i>Privacy-Preserving Collection and Evaluation of Log Files</i>.","short":"A. Koch, Privacy-Preserving Collection and Evaluation of Log Files, 2023.","mla":"Koch, Angelina. <i>Privacy-Preserving Collection and Evaluation of Log Files</i>. 2023.","bibtex":"@book{Koch_2023, title={Privacy-Preserving Collection and Evaluation of Log Files}, author={Koch, Angelina}, year={2023} }","ama":"Koch A. <i>Privacy-Preserving Collection and Evaluation of Log Files</i>.; 2023.","chicago":"Koch, Angelina. <i>Privacy-Preserving Collection and Evaluation of Log Files</i>, 2023.","ieee":"A. Koch, <i>Privacy-Preserving Collection and Evaluation of Log Files</i>. 2023."},"has_accepted_license":"1","title":"Privacy-Preserving Collection and Evaluation of Log Files","oa":"1","date_updated":"2023-05-30T11:43:18Z","date_created":"2023-04-03T14:09:14Z","author":[{"first_name":"Angelina","full_name":"Koch, Angelina","last_name":"Koch"}],"supervisor":[{"first_name":"Johannes","last_name":"Blömer","full_name":"Blömer, Johannes","id":"23"}]},{"date_updated":"2022-07-26T14:31:54Z","date_created":"2022-07-20T09:38:39Z","supervisor":[{"first_name":"Johannes","last_name":"Blömer","id":"23","full_name":"Blömer, Johannes"}],"author":[{"full_name":"Vahle, Ella","last_name":"Vahle","first_name":"Ella"}],"title":"Modelling and Proving Security for a Secure MPC Protocol for Stable Matching","year":"2022","citation":{"apa":"Vahle, E. (2022). <i>Modelling and Proving Security for a Secure MPC Protocol for Stable Matching</i>.","mla":"Vahle, Ella. <i>Modelling and Proving Security for a Secure MPC Protocol for Stable Matching</i>. 2022.","bibtex":"@book{Vahle_2022, title={Modelling and Proving Security for a Secure MPC Protocol for Stable Matching}, author={Vahle, Ella}, year={2022} }","short":"E. Vahle, Modelling and Proving Security for a Secure MPC Protocol for Stable Matching, 2022.","ieee":"E. Vahle, <i>Modelling and Proving Security for a Secure MPC Protocol for Stable Matching</i>. 2022.","chicago":"Vahle, Ella. <i>Modelling and Proving Security for a Secure MPC Protocol for Stable Matching</i>, 2022.","ama":"Vahle E. <i>Modelling and Proving Security for a Secure MPC Protocol for Stable Matching</i>.; 2022."},"project":[{"name":"SFB 901: SFB 901","_id":"1"},{"name":"SFB 901 - C: SFB 901 - Project Area C","_id":"4"},{"name":"SFB 901 - C1: SFB 901 - Subproject C1","_id":"13"}],"_id":"32399","user_id":"25078","department":[{"_id":"64"}],"language":[{"iso":"eng"}],"type":"bachelorsthesis","status":"public"},{"language":[{"iso":"eng"}],"department":[{"_id":"64"},{"_id":"7"}],"user_id":"477","_id":"32398","project":[{"name":"SFB 901: SFB 901","_id":"1"},{"name":"SFB 901 - C: SFB 901 - Project Area C","_id":"4"},{"name":"SFB 901 - C1: SFB 901 - Subproject C1","_id":"13"},{"name":"SFB 901 - T2: SFB 901 -Subproject T2","_id":"84"},{"_id":"82","name":"SFB 901 - T: SFB 901 - Project Area T"}],"status":"public","type":"bachelorsthesis","title":"Bringing Structure to Structure-Preserving Signatures: Overview, Implementation and Comparison of Selected SPS Schemes","date_created":"2022-07-20T09:36:39Z","author":[{"full_name":"Siek, Hanna","last_name":"Siek","first_name":"Hanna"}],"supervisor":[{"first_name":"Johannes","id":"23","full_name":"Blömer, Johannes","last_name":"Blömer"}],"date_updated":"2022-11-18T09:38:04Z","citation":{"ama":"Siek H. <i>Bringing Structure to Structure-Preserving Signatures: Overview, Implementation and Comparison of Selected SPS Schemes</i>.; 2022.","ieee":"H. Siek, <i>Bringing Structure to Structure-Preserving Signatures: Overview, Implementation and Comparison of Selected SPS Schemes</i>. 2022.","chicago":"Siek, Hanna. <i>Bringing Structure to Structure-Preserving Signatures: Overview, Implementation and Comparison of Selected SPS Schemes</i>, 2022.","apa":"Siek, H. (2022). <i>Bringing Structure to Structure-Preserving Signatures: Overview, Implementation and Comparison of Selected SPS Schemes</i>.","bibtex":"@book{Siek_2022, title={Bringing Structure to Structure-Preserving Signatures: Overview, Implementation and Comparison of Selected SPS Schemes}, author={Siek, Hanna}, year={2022} }","mla":"Siek, Hanna. <i>Bringing Structure to Structure-Preserving Signatures: Overview, Implementation and Comparison of Selected SPS Schemes</i>. 2022.","short":"H. Siek, Bringing Structure to Structure-Preserving Signatures: Overview, Implementation and Comparison of Selected SPS Schemes, 2022."},"year":"2022"},{"_id":"34962","project":[{"_id":"1","name":"SFB 901: SFB 901"},{"_id":"4","name":"SFB 901 - C: SFB 901 - Project Area C"},{"_id":"13","name":"SFB 901 - C1: SFB 901 - Subproject C1"}],"department":[{"_id":"34"},{"_id":"64"}],"user_id":"41047","language":[{"iso":"eng"}],"type":"bachelorsthesis","status":"public","date_updated":"2023-01-10T10:31:35Z","date_created":"2022-12-24T00:14:34Z","supervisor":[{"first_name":"Johannes","last_name":"Blömer","full_name":"Blömer, Johannes","id":"23"}],"author":[{"full_name":"Anonymous, A","last_name":"Anonymous","first_name":"A"}],"title":"Evaluating database systems relying on secure multiparty computation","year":"2022","citation":{"chicago":"Anonymous, A. <i>Evaluating Database Systems Relying on Secure Multiparty Computation</i>, 2022.","ieee":"A. Anonymous, <i>Evaluating database systems relying on secure multiparty computation</i>. 2022.","ama":"Anonymous A. <i>Evaluating Database Systems Relying on Secure Multiparty Computation</i>.; 2022.","short":"A. Anonymous, Evaluating Database Systems Relying on Secure Multiparty Computation, 2022.","bibtex":"@book{Anonymous_2022, title={Evaluating database systems relying on secure multiparty computation}, author={Anonymous, A}, year={2022} }","mla":"Anonymous, A. <i>Evaluating Database Systems Relying on Secure Multiparty Computation</i>. 2022.","apa":"Anonymous, A. (2022). <i>Evaluating database systems relying on secure multiparty computation</i>."}},{"date_updated":"2023-01-10T11:54:43Z","date_created":"2023-01-10T10:39:27Z","author":[{"first_name":"Jan","last_name":"Lohse","full_name":"Lohse, Jan"}],"supervisor":[{"first_name":"Johannes","full_name":"Blömer, Johannes","last_name":"Blömer"}],"title":"Lattice Revocation Mechanisms","year":"2022","citation":{"ama":"Lohse J. <i>Lattice Revocation Mechanisms</i>.; 2022.","ieee":"J. Lohse, <i>Lattice Revocation Mechanisms</i>. 2022.","chicago":"Lohse, Jan. <i>Lattice Revocation Mechanisms</i>, 2022.","mla":"Lohse, Jan. <i>Lattice Revocation Mechanisms</i>. 2022.","short":"J. Lohse, Lattice Revocation Mechanisms, 2022.","bibtex":"@book{Lohse_2022, title={Lattice Revocation Mechanisms}, author={Lohse, Jan}, year={2022} }","apa":"Lohse, J. (2022). <i>Lattice Revocation Mechanisms</i>."},"_id":"35772","department":[{"_id":"64"}],"user_id":"47434","language":[{"iso":"eng"}],"type":"bachelorsthesis","status":"public"},{"year":"2022","citation":{"apa":"Beckmann, M. (2022). <i>Analysis of an Interactive Lattice Based Aggregated Signature Scheme</i>.","bibtex":"@book{Beckmann_2022, title={Analysis of an Interactive Lattice Based Aggregated Signature Scheme}, author={Beckmann, Marvin}, year={2022} }","mla":"Beckmann, Marvin. <i>Analysis of an Interactive Lattice Based Aggregated Signature Scheme</i>. 2022.","short":"M. Beckmann, Analysis of an Interactive Lattice Based Aggregated Signature Scheme, 2022.","ieee":"M. Beckmann, <i>Analysis of an Interactive Lattice Based Aggregated Signature Scheme</i>. 2022.","chicago":"Beckmann, Marvin. <i>Analysis of an Interactive Lattice Based Aggregated Signature Scheme</i>, 2022.","ama":"Beckmann M. <i>Analysis of an Interactive Lattice Based Aggregated Signature Scheme</i>.; 2022."},"date_updated":"2023-05-24T10:01:36Z","author":[{"first_name":"Marvin","last_name":"Beckmann","full_name":"Beckmann, Marvin"}],"date_created":"2023-05-24T10:01:33Z","supervisor":[{"first_name":"Johannes","last_name":"Blömer","full_name":"Blömer, Johannes"}],"title":"Analysis of an Interactive Lattice Based Aggregated Signature Scheme","type":"bachelorsthesis","status":"public","_id":"45257","user_id":"47434","department":[{"_id":"64"}],"language":[{"iso":"eng"}]},{"language":[{"iso":"eng"}],"_id":"32401","department":[{"_id":"64"}],"user_id":"47434","status":"public","type":"bachelorsthesis","title":"Lattice reductions and their applications to cryptographic systems","date_updated":"2023-01-10T10:49:33Z","supervisor":[{"last_name":"Blömer","full_name":"Blömer, Johannes","id":"23","first_name":"Johannes"}],"author":[{"full_name":"Siemer, Jan Niklas","last_name":"Siemer","first_name":"Jan Niklas"}],"date_created":"2022-07-20T11:40:28Z","year":"2021","citation":{"ieee":"J. N. Siemer, <i>Lattice reductions and their applications to cryptographic systems</i>. 2021.","chicago":"Siemer, Jan Niklas. <i>Lattice Reductions and Their Applications to Cryptographic Systems</i>, 2021.","ama":"Siemer JN. <i>Lattice Reductions and Their Applications to Cryptographic Systems</i>.; 2021.","apa":"Siemer, J. N. (2021). <i>Lattice reductions and their applications to cryptographic systems</i>.","bibtex":"@book{Siemer_2021, title={Lattice reductions and their applications to cryptographic systems}, author={Siemer, Jan Niklas}, year={2021} }","mla":"Siemer, Jan Niklas. <i>Lattice Reductions and Their Applications to Cryptographic Systems</i>. 2021.","short":"J.N. Siemer, Lattice Reductions and Their Applications to Cryptographic Systems, 2021."}},{"citation":{"apa":"Böttger, M. A. E. (2021). <i>IND-CCA Secure PKE Schemes - Based on Lattices</i>.","mla":"Böttger, Meret Amalia Elisabeth. <i>IND-CCA Secure PKE Schemes - Based on Lattices</i>. 2021.","bibtex":"@book{Böttger_2021, title={IND-CCA Secure PKE Schemes - Based on Lattices}, author={Böttger, Meret Amalia Elisabeth}, year={2021} }","short":"M.A.E. Böttger, IND-CCA Secure PKE Schemes - Based on Lattices, 2021.","ieee":"M. A. E. Böttger, <i>IND-CCA Secure PKE Schemes - Based on Lattices</i>. 2021.","chicago":"Böttger, Meret Amalia Elisabeth. <i>IND-CCA Secure PKE Schemes - Based on Lattices</i>, 2021.","ama":"Böttger MAE. <i>IND-CCA Secure PKE Schemes - Based on Lattices</i>.; 2021."},"year":"2021","title":"IND-CCA Secure PKE Schemes - Based on Lattices","date_created":"2022-07-20T11:42:08Z","author":[{"first_name":"Meret Amalia Elisabeth","full_name":"Böttger, Meret Amalia Elisabeth","last_name":"Böttger"}],"supervisor":[{"last_name":"Blömer","full_name":"Blömer, Johannes","first_name":"Johannes"}],"date_updated":"2023-01-23T13:03:05Z","status":"public","type":"bachelorsthesis","language":[{"iso":"eng"}],"department":[{"_id":"64"}],"user_id":"47434","_id":"32402"},{"author":[{"last_name":"Manegold","full_name":"Manegold, Philipp","first_name":"Philipp"}],"date_created":"2021-02-02T10:27:49Z","date_updated":"2022-01-06T06:54:46Z","title":"On Batch Proofs of Partial Knowledge","citation":{"chicago":"Manegold, Philipp. <i>On Batch Proofs of Partial Knowledge</i>, 2020.","ieee":"P. Manegold, <i>On Batch Proofs of Partial Knowledge</i>. 2020.","ama":"Manegold P. <i>On Batch Proofs of Partial Knowledge</i>.; 2020.","mla":"Manegold, Philipp. <i>On Batch Proofs of Partial Knowledge</i>. 2020.","short":"P. Manegold, On Batch Proofs of Partial Knowledge, 2020.","bibtex":"@book{Manegold_2020, title={On Batch Proofs of Partial Knowledge}, author={Manegold, Philipp}, year={2020} }","apa":"Manegold, P. (2020). <i>On Batch Proofs of Partial Knowledge</i>."},"year":"2020","user_id":"27207","department":[{"_id":"7"},{"_id":"64"}],"_id":"21117","language":[{"iso":"eng"}],"extern":"1","type":"bachelorsthesis","status":"public"},{"type":"bachelorsthesis","status":"public","_id":"21118","user_id":"27207","department":[{"_id":"7"},{"_id":"64"}],"language":[{"iso":"eng"}],"extern":"1","year":"2020","citation":{"chicago":"Anonymous, Anonymous. <i>Measuring the Performance of SNARK Libraries</i>, 2020.","ieee":"A. Anonymous, <i>Measuring the Performance of SNARK Libraries</i>. 2020.","ama":"Anonymous A. <i>Measuring the Performance of SNARK Libraries</i>.; 2020.","apa":"Anonymous, A. (2020). <i>Measuring the Performance of SNARK Libraries</i>.","mla":"Anonymous, Anonymous. <i>Measuring the Performance of SNARK Libraries</i>. 2020.","bibtex":"@book{Anonymous_2020, title={Measuring the Performance of SNARK Libraries}, author={Anonymous, Anonymous}, year={2020} }","short":"A. Anonymous, Measuring the Performance of SNARK Libraries, 2020."},"date_updated":"2022-01-06T06:54:46Z","date_created":"2021-02-02T10:29:30Z","author":[{"full_name":"Anonymous, Anonymous","last_name":"Anonymous","first_name":"Anonymous"}],"title":"Measuring the Performance of SNARK Libraries"},{"year":"2020","citation":{"apa":"Westerwelle, M. (2020). <i>Trapdoors and Sampling Procedures for Lattice-Based Cryptographic Constructions</i>.","mla":"Westerwelle, Max. <i>Trapdoors and Sampling Procedures for Lattice-Based Cryptographic Constructions</i>. 2020.","bibtex":"@book{Westerwelle_2020, title={Trapdoors and Sampling Procedures for Lattice-Based Cryptographic Constructions}, author={Westerwelle, Max}, year={2020} }","short":"M. Westerwelle, Trapdoors and Sampling Procedures for Lattice-Based Cryptographic Constructions, 2020.","ama":"Westerwelle M. <i>Trapdoors and Sampling Procedures for Lattice-Based Cryptographic Constructions</i>.; 2020.","chicago":"Westerwelle, Max. <i>Trapdoors and Sampling Procedures for Lattice-Based Cryptographic Constructions</i>, 2020.","ieee":"M. Westerwelle, <i>Trapdoors and Sampling Procedures for Lattice-Based Cryptographic Constructions</i>. 2020."},"date_updated":"2022-01-06T06:54:46Z","author":[{"last_name":"Westerwelle","full_name":"Westerwelle, Max","first_name":"Max"}],"date_created":"2021-02-02T10:37:35Z","title":"Trapdoors and Sampling Procedures for Lattice-Based Cryptographic Constructions","type":"bachelorsthesis","status":"public","_id":"21119","department":[{"_id":"64"}],"user_id":"47434","language":[{"iso":"eng"}]},{"language":[{"iso":"eng"}],"department":[{"_id":"64"},{"_id":"7"}],"user_id":"41047","_id":"21121","status":"public","type":"bachelorsthesis","title":"Benchmarking the Efficiency of Secure Multiparty Computation for Real World Problems","supervisor":[{"full_name":"Blömer, Johannes","id":"23","last_name":"Blömer","first_name":"Johannes"}],"author":[{"first_name":"Anonymous","last_name":"Anonymous","full_name":"Anonymous, Anonymous"}],"date_created":"2021-02-02T10:50:08Z","date_updated":"2022-01-06T06:54:46Z","citation":{"ama":"Anonymous A. <i>Benchmarking the Efficiency of Secure Multiparty Computation for Real World Problems</i>.; 2020.","chicago":"Anonymous, Anonymous. <i>Benchmarking the Efficiency of Secure Multiparty Computation for Real World Problems</i>, 2020.","ieee":"A. Anonymous, <i>Benchmarking the Efficiency of Secure Multiparty Computation for Real World Problems</i>. 2020.","apa":"Anonymous, A. (2020). <i>Benchmarking the Efficiency of Secure Multiparty Computation for Real World Problems</i>.","bibtex":"@book{Anonymous_2020, title={Benchmarking the Efficiency of Secure Multiparty Computation for Real World Problems}, author={Anonymous, Anonymous}, year={2020} }","short":"A. Anonymous, Benchmarking the Efficiency of Secure Multiparty Computation for Real World Problems, 2020.","mla":"Anonymous, Anonymous. <i>Benchmarking the Efficiency of Secure Multiparty Computation for Real World Problems</i>. 2020."},"year":"2020"},{"language":[{"iso":"eng"}],"title":"Distributed Key Generation for Attribute-Based Signatures","supervisor":[{"id":"23","full_name":"Blömer, Johannes","last_name":"Blömer","first_name":"Johannes"}],"date_created":"2020-08-20T11:23:11Z","author":[{"first_name":"Jonas","full_name":"Heimann, Jonas","last_name":"Heimann"}],"user_id":"13703","department":[{"_id":"64"}],"date_updated":"2022-01-06T06:53:26Z","_id":"18085","citation":{"ama":"Heimann J. <i>Distributed Key Generation for Attribute-Based Signatures</i>.; 2020.","ieee":"J. Heimann, <i>Distributed Key Generation for Attribute-Based Signatures</i>. 2020.","chicago":"Heimann, Jonas. <i>Distributed Key Generation for Attribute-Based Signatures</i>, 2020.","short":"J. Heimann, Distributed Key Generation for Attribute-Based Signatures, 2020.","mla":"Heimann, Jonas. <i>Distributed Key Generation for Attribute-Based Signatures</i>. 2020.","bibtex":"@book{Heimann_2020, title={Distributed Key Generation for Attribute-Based Signatures}, author={Heimann, Jonas}, year={2020} }","apa":"Heimann, J. (2020). <i>Distributed Key Generation for Attribute-Based Signatures</i>."},"status":"public","year":"2020","type":"bachelorsthesis"},{"extern":"1","file_date_updated":"2020-10-23T08:36:34Z","language":[{"iso":"eng"}],"ddc":["000"],"department":[{"_id":"7"},{"_id":"64"}],"user_id":"25078","_id":"18637","project":[{"name":"SFB 901","_id":"1"},{"_id":"4","name":"SFB 901 - Project Area C"},{"name":"SFB 901 - Subproject C1","_id":"13"}],"status":"public","file":[{"relation":"main_file","content_type":"application/pdf","file_size":1060142,"description":"This is a bachelor thesis.","access_level":"open_access","file_id":"20186","file_name":"thesis_schuermann_published.pdf","date_updated":"2020-10-23T08:36:34Z","date_created":"2020-10-23T08:36:34Z","creator":"feidens"}],"type":"bachelorsthesis","title":"A Group Signature Scheme from Flexible Public Key Signatures and Structure-Preserving Signatures on Equivalence Classes","supervisor":[{"first_name":"Johannes","full_name":"Blömer, Johannes","id":"23","last_name":"Blömer"}],"date_created":"2020-08-29T13:24:51Z","author":[{"first_name":"Patrick","last_name":"Schürmann","full_name":"Schürmann, Patrick"}],"publisher":"Universität Paderborn","oa":"1","date_updated":"2022-01-06T06:53:50Z","citation":{"apa":"Schürmann, P. (2020). <i>A Group Signature Scheme from Flexible Public Key Signatures and Structure-Preserving Signatures on Equivalence Classes</i>. Universität Paderborn.","bibtex":"@book{Schürmann_2020, title={A Group Signature Scheme from Flexible Public Key Signatures and Structure-Preserving Signatures on Equivalence Classes}, publisher={Universität Paderborn}, author={Schürmann, Patrick}, year={2020} }","short":"P. Schürmann, A Group Signature Scheme from Flexible Public Key Signatures and Structure-Preserving Signatures on Equivalence Classes, Universität Paderborn, 2020.","mla":"Schürmann, Patrick. <i>A Group Signature Scheme from Flexible Public Key Signatures and Structure-Preserving Signatures on Equivalence Classes</i>. Universität Paderborn, 2020.","ieee":"P. Schürmann, <i>A Group Signature Scheme from Flexible Public Key Signatures and Structure-Preserving Signatures on Equivalence Classes</i>. Universität Paderborn, 2020.","chicago":"Schürmann, Patrick. <i>A Group Signature Scheme from Flexible Public Key Signatures and Structure-Preserving Signatures on Equivalence Classes</i>. Universität Paderborn, 2020.","ama":"Schürmann P. <i>A Group Signature Scheme from Flexible Public Key Signatures and Structure-Preserving Signatures on Equivalence Classes</i>. Universität Paderborn; 2020."},"year":"2020","has_accepted_license":"1"},{"type":"bachelorsthesis","status":"public","user_id":"477","department":[{"_id":"7"},{"_id":"64"}],"project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Project Area C","_id":"4"},{"name":"SFB 901 - Subproject C1","_id":"13"}],"_id":"18639","language":[{"iso":"eng"}],"citation":{"mla":"Terfort, Tobias. <i>Enhancing Security by Usage of Universal One-Way Hash Functions</i>. Universität Paderborn, 2020.","bibtex":"@book{Terfort_2020, title={Enhancing Security by Usage of Universal One-Way Hash Functions}, publisher={Universität Paderborn}, author={Terfort, Tobias}, year={2020} }","short":"T. Terfort, Enhancing Security by Usage of Universal One-Way Hash Functions, Universität Paderborn, 2020.","apa":"Terfort, T. (2020). <i>Enhancing Security by Usage of Universal One-Way Hash Functions</i>. Universität Paderborn.","ieee":"T. Terfort, <i>Enhancing Security by Usage of Universal One-Way Hash Functions</i>. Universität Paderborn, 2020.","chicago":"Terfort, Tobias. <i>Enhancing Security by Usage of Universal One-Way Hash Functions</i>. Universität Paderborn, 2020.","ama":"Terfort T. <i>Enhancing Security by Usage of Universal One-Way Hash Functions</i>. Universität Paderborn; 2020."},"year":"2020","author":[{"last_name":"Terfort","full_name":"Terfort, Tobias","first_name":"Tobias"}],"date_created":"2020-08-29T13:30:56Z","supervisor":[{"first_name":"Johannes","last_name":"Blömer","full_name":"Blömer, Johannes","id":"23"}],"publisher":"Universität Paderborn","date_updated":"2022-01-06T06:53:50Z","title":"Enhancing Security by Usage of Universal One-Way Hash Functions"},{"supervisor":[{"last_name":"Blömer","full_name":"Blömer, Johannes","id":"23","first_name":"Johannes"}],"date_created":"2020-08-29T13:27:11Z","author":[{"last_name":"Kramer","full_name":"Kramer, Paul","id":"64594","first_name":"Paul"}],"publisher":"Universität Paderborn","date_updated":"2022-10-17T10:56:59Z","title":"Comparison of Zero-Knowledge Range Proofs","citation":{"short":"P. Kramer, Comparison of Zero-Knowledge Range Proofs, Universität Paderborn, 2020.","mla":"Kramer, Paul. <i>Comparison of Zero-Knowledge Range Proofs</i>. Universität Paderborn, 2020.","bibtex":"@book{Kramer_2020, title={Comparison of Zero-Knowledge Range Proofs}, publisher={Universität Paderborn}, author={Kramer, Paul}, year={2020} }","apa":"Kramer, P. (2020). <i>Comparison of Zero-Knowledge Range Proofs</i>. Universität Paderborn.","chicago":"Kramer, Paul. <i>Comparison of Zero-Knowledge Range Proofs</i>. Universität Paderborn, 2020.","ieee":"P. Kramer, <i>Comparison of Zero-Knowledge Range Proofs</i>. Universität Paderborn, 2020.","ama":"Kramer P. <i>Comparison of Zero-Knowledge Range Proofs</i>. Universität Paderborn; 2020."},"year":"2020","department":[{"_id":"7"},{"_id":"64"}],"user_id":"25078","_id":"18638","project":[{"name":"SFB 901","_id":"1"},{"_id":"4","name":"SFB 901 - Project Area C"},{"name":"SFB 901 - Subproject C1","_id":"13"}],"language":[{"iso":"eng"}],"type":"bachelorsthesis","status":"public"}]
