[{"has_accepted_license":"1","author":[{"full_name":"Postler, Tim","first_name":"Tim","last_name":"Postler"}],"file":[{"date_updated":"2023-10-05T16:55:11Z","relation":"main_file","date_created":"2023-10-05T16:21:25Z","access_level":"open_access","content_type":"application/pdf","file_id":"47706","file_name":"2010_Postler_SmartCardBasierteBerechnungEinerGruppensignatur.pdf","file_size":1192529,"creator":"bhenrik"}],"title":"Smart Card basierte Berechnung einer Gruppensignatur als Teil einer biometrischen Authentisierung","department":[{"_id":"34"},{"_id":"64"}],"user_id":"41047","oa":"1","keyword":["Diplomarbeit"],"citation":{"bibtex":"@book{Postler_2010, title={Smart Card basierte Berechnung einer Gruppensignatur als Teil einer biometrischen Authentisierung}, author={Postler, Tim}, year={2010} }","mla":"Postler, Tim. <i>Smart Card basierte Berechnung einer Gruppensignatur als Teil einer biometrischen Authentisierung</i>. 2010.","short":"T. Postler, Smart Card basierte Berechnung einer Gruppensignatur als Teil einer biometrischen Authentisierung, 2010.","apa":"Postler, T. (2010). <i>Smart Card basierte Berechnung einer Gruppensignatur als Teil einer biometrischen Authentisierung</i>.","ama":"Postler T. <i>Smart Card basierte Berechnung einer Gruppensignatur als Teil einer biometrischen Authentisierung</i>.; 2010.","ieee":"T. Postler, <i>Smart Card basierte Berechnung einer Gruppensignatur als Teil einer biometrischen Authentisierung</i>. 2010.","chicago":"Postler, Tim. <i>Smart Card basierte Berechnung einer Gruppensignatur als Teil einer biometrischen Authentisierung</i>, 2010."},"status":"public","type":"misc","year":"2010","language":[{"iso":"ger"}],"ddc":["000"],"date_created":"2023-10-05T16:23:48Z","date_updated":"2023-10-05T16:55:11Z","_id":"47684","file_date_updated":"2023-10-05T16:55:11Z"},{"department":[{"_id":"34"},{"_id":"64"}],"citation":{"short":"J. Schrieb, Construction and Applications of Identity-Based Encryption without Pairings, 2008.","mla":"Schrieb, Jonas. <i>Construction and Applications of Identity-Based Encryption without Pairings</i>. 2008.","bibtex":"@book{Schrieb_2008, title={Construction and Applications of Identity-Based Encryption without Pairings}, author={Schrieb, Jonas}, year={2008} }","chicago":"Schrieb, Jonas. <i>Construction and Applications of Identity-Based Encryption without Pairings</i>, 2008.","ieee":"J. Schrieb, <i>Construction and Applications of Identity-Based Encryption without Pairings</i>. 2008.","apa":"Schrieb, J. (2008). <i>Construction and Applications of Identity-Based Encryption without Pairings</i>.","ama":"Schrieb J. <i>Construction and Applications of Identity-Based Encryption without Pairings</i>.; 2008."},"keyword":["Diplomarbeit"],"oa":"1","user_id":"41047","has_accepted_license":"1","title":"Construction and Applications of Identity-Based Encryption without Pairings","author":[{"last_name":"Schrieb","first_name":"Jonas","full_name":"Schrieb, Jonas"}],"file":[{"relation":"main_file","date_updated":"2023-10-05T16:55:04Z","date_created":"2023-10-05T16:29:32Z","content_type":"application/pdf","access_level":"open_access","file_id":"47710","file_size":1055931,"file_name":"2008_Schrieb_ConstructionAndApplicationsOfIBEWithoutPairings.pdf","creator":"bhenrik"}],"date_updated":"2023-10-05T16:55:04Z","_id":"47685","file_date_updated":"2023-10-05T16:55:04Z","language":[{"iso":"eng"}],"type":"misc","year":"2008","status":"public","date_created":"2023-10-05T16:29:40Z","ddc":["000"]},{"_id":"47688","date_updated":"2023-10-05T16:42:53Z","date_created":"2023-10-05T16:32:56Z","status":"public","language":[{"iso":"ger"}],"year":"2007","type":"misc","keyword":["Diplomarbeit"],"user_id":"41047","citation":{"mla":"Klein, Wiebke. <i>Angriffe auf RSA-Varianten bei partiell bekannten geheimen Schlüsseln</i>. 2007.","bibtex":"@book{Klein_2007, title={Angriffe auf RSA-Varianten bei partiell bekannten geheimen Schlüsseln}, author={Klein, Wiebke}, year={2007} }","short":"W. Klein, Angriffe auf RSA-Varianten bei partiell bekannten geheimen Schlüsseln, 2007.","apa":"Klein, W. (2007). <i>Angriffe auf RSA-Varianten bei partiell bekannten geheimen Schlüsseln</i>.","ama":"Klein W. <i>Angriffe auf RSA-Varianten bei partiell bekannten geheimen Schlüsseln</i>.; 2007.","chicago":"Klein, Wiebke. <i>Angriffe auf RSA-Varianten bei partiell bekannten geheimen Schlüsseln</i>, 2007.","ieee":"W. Klein, <i>Angriffe auf RSA-Varianten bei partiell bekannten geheimen Schlüsseln</i>. 2007."},"department":[{"_id":"34"},{"_id":"64"}],"author":[{"first_name":"Wiebke","full_name":"Klein, Wiebke","last_name":"Klein"}],"title":"Angriffe auf RSA-Varianten bei partiell bekannten geheimen Schlüsseln"},{"citation":{"apa":"Käthler, O. (2007). <i>Kryptanalyse des EAC-Protokolls biometrischer Reisepässe</i>.","ama":"Käthler O. <i>Kryptanalyse des EAC-Protokolls biometrischer Reisepässe</i>.; 2007.","ieee":"O. Käthler, <i>Kryptanalyse des EAC-Protokolls biometrischer Reisepässe</i>. 2007.","chicago":"Käthler, Olga. <i>Kryptanalyse des EAC-Protokolls biometrischer Reisepässe</i>, 2007.","bibtex":"@book{Käthler_2007, title={Kryptanalyse des EAC-Protokolls biometrischer Reisepässe}, author={Käthler, Olga}, year={2007} }","mla":"Käthler, Olga. <i>Kryptanalyse des EAC-Protokolls biometrischer Reisepässe</i>. 2007.","short":"O. Käthler, Kryptanalyse des EAC-Protokolls biometrischer Reisepässe, 2007."},"user_id":"41047","keyword":["Diplomarbeit"],"department":[{"_id":"34"},{"_id":"64"}],"title":"Kryptanalyse des EAC-Protokolls biometrischer Reisepässe","author":[{"first_name":"Olga","full_name":"Käthler, Olga","last_name":"Käthler"}],"_id":"47690","date_updated":"2023-10-05T16:42:51Z","date_created":"2023-10-05T16:34:07Z","year":"2007","type":"misc","language":[{"iso":"ger"}],"status":"public"},{"ddc":["000"],"date_created":"2023-10-05T16:32:37Z","year":"2007","type":"misc","language":[{"iso":"ger"}],"status":"public","file_date_updated":"2023-10-05T16:53:56Z","_id":"47687","date_updated":"2023-10-05T16:53:56Z","title":"Analyse von verallgemeinerten RSA Polynomen mit Hilfe der Coppersmithschen Methode","author":[{"last_name":"Brieden","first_name":"Benedikt","full_name":"Brieden, Benedikt"}],"file":[{"relation":"main_file","date_updated":"2023-10-05T16:53:56Z","file_id":"47713","content_type":"application/pdf","access_level":"open_access","date_created":"2023-10-05T16:32:30Z","creator":"bhenrik","file_size":612732,"file_name":"2007_Brieden_AnalyseVonVerallgemeinertenRSAPolynomenMitHilfeDerCoppersmithschenMethode.pdf"}],"has_accepted_license":"1","citation":{"ieee":"B. Brieden, <i>Analyse von verallgemeinerten RSA Polynomen mit Hilfe der Coppersmithschen Methode</i>. 2007.","chicago":"Brieden, Benedikt. <i>Analyse von verallgemeinerten RSA Polynomen mit Hilfe der Coppersmithschen Methode</i>, 2007.","ama":"Brieden B. <i>Analyse von verallgemeinerten RSA Polynomen mit Hilfe der Coppersmithschen Methode</i>.; 2007.","apa":"Brieden, B. (2007). <i>Analyse von verallgemeinerten RSA Polynomen mit Hilfe der Coppersmithschen Methode</i>.","short":"B. Brieden, Analyse von verallgemeinerten RSA Polynomen mit Hilfe der Coppersmithschen Methode, 2007.","bibtex":"@book{Brieden_2007, title={Analyse von verallgemeinerten RSA Polynomen mit Hilfe der Coppersmithschen Methode}, author={Brieden, Benedikt}, year={2007} }","mla":"Brieden, Benedikt. <i>Analyse von verallgemeinerten RSA Polynomen mit Hilfe der Coppersmithschen Methode</i>. 2007."},"oa":"1","user_id":"41047","keyword":["Diplomarbeit"],"department":[{"_id":"34"},{"_id":"64"}]},{"_id":"47689","file_date_updated":"2023-10-05T16:54:04Z","date_updated":"2023-10-05T16:54:04Z","date_created":"2023-10-05T16:33:44Z","ddc":["000"],"status":"public","language":[{"iso":"ger"}],"year":"2007","type":"misc","keyword":["Diplomarbeit"],"user_id":"41047","oa":"1","citation":{"chicago":"Kuntze, Daniel. <i>Untersuchung von Clusteringalgorithmen für die Kullback-Leibler Divergenz</i>, 2007.","ieee":"D. Kuntze, <i>Untersuchung von Clusteringalgorithmen für die Kullback-Leibler Divergenz</i>. 2007.","apa":"Kuntze, D. (2007). <i>Untersuchung von Clusteringalgorithmen für die Kullback-Leibler Divergenz</i>.","ama":"Kuntze D. <i>Untersuchung von Clusteringalgorithmen für die Kullback-Leibler Divergenz</i>.; 2007.","short":"D. Kuntze, Untersuchung von Clusteringalgorithmen für die Kullback-Leibler Divergenz, 2007.","mla":"Kuntze, Daniel. <i>Untersuchung von Clusteringalgorithmen für die Kullback-Leibler Divergenz</i>. 2007.","bibtex":"@book{Kuntze_2007, title={Untersuchung von Clusteringalgorithmen für die Kullback-Leibler Divergenz}, author={Kuntze, Daniel}, year={2007} }"},"department":[{"_id":"34"},{"_id":"64"}],"file":[{"date_updated":"2023-10-05T16:54:04Z","relation":"main_file","file_name":"2007_Kuntze_UntersuchungVonClusteringalgorithmenFuerDieKLD.pdf","file_size":1078135,"creator":"bhenrik","date_created":"2023-10-05T16:33:38Z","content_type":"application/pdf","access_level":"open_access","file_id":"47715"}],"author":[{"full_name":"Kuntze, Daniel","first_name":"Daniel","last_name":"Kuntze"}],"title":"Untersuchung von Clusteringalgorithmen für die Kullback-Leibler Divergenz","has_accepted_license":"1"},{"language":[{"iso":"ger"}],"year":"2007","type":"misc","status":"public","date_created":"2023-10-05T16:31:03Z","ddc":["000"],"date_updated":"2023-10-05T16:53:40Z","_id":"47686","file_date_updated":"2023-10-05T16:53:40Z","has_accepted_license":"1","title":"Vergleich multivariater Varianten der Methode von Coppersmith","file":[{"date_updated":"2023-10-05T16:53:40Z","relation":"main_file","file_name":"2007_Borghoff_VergleichMultivariaterVariantenDerMethodeVonCoppersmith.pdf","file_size":550560,"creator":"bhenrik","date_created":"2023-10-05T16:30:56Z","content_type":"application/pdf","access_level":"open_access","file_id":"47711"}],"author":[{"last_name":"Borghoff","first_name":"Julia","full_name":"Borghoff, Julia"}],"department":[{"_id":"34"},{"_id":"64"}],"citation":{"bibtex":"@book{Borghoff_2007, title={Vergleich multivariater Varianten der Methode von Coppersmith}, author={Borghoff, Julia}, year={2007} }","mla":"Borghoff, Julia. <i>Vergleich multivariater Varianten der Methode von Coppersmith</i>. 2007.","short":"J. Borghoff, Vergleich multivariater Varianten der Methode von Coppersmith, 2007.","ama":"Borghoff J. <i>Vergleich multivariater Varianten der Methode von Coppersmith</i>.; 2007.","apa":"Borghoff, J. (2007). <i>Vergleich multivariater Varianten der Methode von Coppersmith</i>.","ieee":"J. Borghoff, <i>Vergleich multivariater Varianten der Methode von Coppersmith</i>. 2007.","chicago":"Borghoff, Julia. <i>Vergleich multivariater Varianten der Methode von Coppersmith</i>, 2007."},"keyword":["Diplomarbeit"],"oa":"1","user_id":"41047"},{"keyword":["Diplomarbeit"],"user_id":"41047","oa":"1","citation":{"ieee":"M. Gorski, <i>Boomerang- und Rechteckangriff auf AES</i>. 2006.","chicago":"Gorski, Michael. <i>Boomerang- Und Rechteckangriff Auf AES</i>, 2006.","apa":"Gorski, M. (2006). <i>Boomerang- und Rechteckangriff auf AES</i>.","ama":"Gorski M. <i>Boomerang- Und Rechteckangriff Auf AES</i>.; 2006.","short":"M. Gorski, Boomerang- Und Rechteckangriff Auf AES, 2006.","bibtex":"@book{Gorski_2006, title={Boomerang- und Rechteckangriff auf AES}, author={Gorski, Michael}, year={2006} }","mla":"Gorski, Michael. <i>Boomerang- Und Rechteckangriff Auf AES</i>. 2006."},"department":[{"_id":"34"},{"_id":"64"}],"author":[{"last_name":"Gorski","full_name":"Gorski, Michael","first_name":"Michael"}],"file":[{"relation":"main_file","date_updated":"2023-10-05T16:54:18Z","file_size":4311037,"file_name":"2006_Gorski_BoomerangUndRechteckangriffAufAES.pdf","creator":"bhenrik","date_created":"2023-10-05T16:34:54Z","access_level":"open_access","file_id":"47719","content_type":"application/pdf"}],"title":"Boomerang- und Rechteckangriff auf AES","has_accepted_license":"1","_id":"47691","file_date_updated":"2023-10-05T16:54:18Z","date_updated":"2023-10-05T16:54:18Z","date_created":"2023-10-05T16:35:30Z","ddc":["000"],"status":"public","language":[{"iso":"eng"}],"year":"2006","type":"misc"},{"file_date_updated":"2023-10-05T16:54:10Z","_id":"47692","date_updated":"2024-08-08T12:16:01Z","date_created":"2023-10-05T16:35:23Z","ddc":["000"],"status":"public","language":[{"iso":"ger"}],"year":"2006","type":"misc","publication_status":"published","keyword":["Diplomarbeit"],"oa":"1","user_id":"49063","citation":{"short":"S.  Naewe, Samplemethoden in der algorithmischen Geometrie der Zahlen, Diplomarbeit, Universität Paderborn, 2006.","chicago":"Naewe, Stefanie. <i>Samplemethoden in der algorithmischen Geometrie der Zahlen, Diplomarbeit</i>. Universität Paderborn, 2006.","ieee":"S.  Naewe, <i>Samplemethoden in der algorithmischen Geometrie der Zahlen, Diplomarbeit</i>. Universität Paderborn, 2006.","mla":"Naewe, Stefanie. <i>Samplemethoden in der algorithmischen Geometrie der Zahlen, Diplomarbeit</i>. 2006.","ama":"Naewe S. <i>Samplemethoden in der algorithmischen Geometrie der Zahlen, Diplomarbeit</i>.; 2006.","bibtex":"@book{ Naewe_2006, place={Universität Paderborn}, title={Samplemethoden in der algorithmischen Geometrie der Zahlen, Diplomarbeit}, author={ Naewe, Stefanie}, year={2006} }","apa":"Naewe, S. (2006). <i>Samplemethoden in der algorithmischen Geometrie der Zahlen, Diplomarbeit</i>."},"department":[{"_id":"34"},{"_id":"64"}],"author":[{"id":"1971","last_name":" Naewe","first_name":"Stefanie","full_name":" Naewe, Stefanie"}],"file":[{"file_id":"47718","access_level":"open_access","content_type":"application/pdf","date_created":"2023-10-05T16:35:17Z","creator":"bhenrik","file_name":"2006_Naewe_SamplemethodenInDerAlgorithmischenGeometrieDerZahlen.pdf","file_size":612147,"relation":"main_file","date_updated":"2023-10-05T16:54:10Z"}],"title":"Samplemethoden in der algorithmischen Geometrie der Zahlen, Diplomarbeit","has_accepted_license":"1","place":"Universität Paderborn"},{"date_created":"2023-10-05T16:35:58Z","year":"2005","type":"misc","language":[{"iso":"ger"}],"status":"public","_id":"47693","date_updated":"2023-10-05T16:42:46Z","title":"Analyse von RSA mittels Coppersmith Methode","author":[{"last_name":"Ernst","full_name":"Ernst, Matthias","first_name":"Matthias"}],"citation":{"short":"M. Ernst, Analyse von RSA mittels Coppersmith Methode, 2005.","bibtex":"@book{Ernst_2005, title={Analyse von RSA mittels Coppersmith Methode}, author={Ernst, Matthias}, year={2005} }","mla":"Ernst, Matthias. <i>Analyse von RSA mittels Coppersmith Methode</i>. 2005.","ieee":"M. Ernst, <i>Analyse von RSA mittels Coppersmith Methode</i>. 2005.","chicago":"Ernst, Matthias. <i>Analyse von RSA mittels Coppersmith Methode</i>, 2005.","ama":"Ernst M. <i>Analyse von RSA mittels Coppersmith Methode</i>.; 2005.","apa":"Ernst, M. (2005). <i>Analyse von RSA mittels Coppersmith Methode</i>."},"user_id":"41047","keyword":["Diplomarbeit"],"department":[{"_id":"34"},{"_id":"64"}]},{"date_created":"2023-10-05T16:36:44Z","ddc":["000"],"language":[{"iso":"ger"}],"year":"2005","type":"misc","status":"public","file_date_updated":"2023-10-05T16:54:25Z","_id":"47694","date_updated":"2023-10-05T16:54:25Z","title":"Implementierung der Coppersmith-Methode zur Untersuchung von Schwachstellen bei RSA","file":[{"date_updated":"2023-10-05T16:54:25Z","relation":"main_file","content_type":"application/postscript","access_level":"open_access","file_id":"47720","date_created":"2023-10-05T16:36:33Z","creator":"bhenrik","file_size":783523,"file_name":"2005_Spanke_ImplemetierungCoppersmith.ps"}],"author":[{"full_name":"Spanke, Christoph","first_name":"Christoph","last_name":"Spanke"}],"has_accepted_license":"1","citation":{"mla":"Spanke, Christoph. <i>Implementierung der Coppersmith-Methode zur Untersuchung von Schwachstellen bei RSA</i>. 2005.","bibtex":"@book{Spanke_2005, title={Implementierung der Coppersmith-Methode zur Untersuchung von Schwachstellen bei RSA}, author={Spanke, Christoph}, year={2005} }","short":"C. Spanke, Implementierung der Coppersmith-Methode zur Untersuchung von Schwachstellen bei RSA, 2005.","ama":"Spanke C. <i>Implementierung der Coppersmith-Methode zur Untersuchung von Schwachstellen bei RSA</i>.; 2005.","apa":"Spanke, C. (2005). <i>Implementierung der Coppersmith-Methode zur Untersuchung von Schwachstellen bei RSA</i>.","chicago":"Spanke, Christoph. <i>Implementierung der Coppersmith-Methode zur Untersuchung von Schwachstellen bei RSA</i>, 2005.","ieee":"C. Spanke, <i>Implementierung der Coppersmith-Methode zur Untersuchung von Schwachstellen bei RSA</i>. 2005."},"keyword":["Diplomarbeit"],"oa":"1","user_id":"41047","department":[{"_id":"34"},{"_id":"64"}]},{"date_updated":"2023-10-05T16:54:38Z","_id":"47696","file_date_updated":"2023-10-05T16:54:38Z","status":"public","type":"misc","year":"2003","language":[{"iso":"ger"}],"ddc":["000"],"date_created":"2023-10-05T16:38:19Z","department":[{"_id":"34"},{"_id":"64"}],"oa":"1","user_id":"41047","keyword":["Diplomarbeit"],"citation":{"bibtex":"@book{Hoppe_2003, title={Markovprozesse zur Modellierung bei Codekompression}, author={Hoppe, Ulrich}, year={2003} }","mla":"Hoppe, Ulrich. <i>Markovprozesse zur Modellierung bei Codekompression</i>. 2003.","short":"U. Hoppe, Markovprozesse zur Modellierung bei Codekompression, 2003.","apa":"Hoppe, U. (2003). <i>Markovprozesse zur Modellierung bei Codekompression</i>.","ama":"Hoppe U. <i>Markovprozesse zur Modellierung bei Codekompression</i>.; 2003.","ieee":"U. Hoppe, <i>Markovprozesse zur Modellierung bei Codekompression</i>. 2003.","chicago":"Hoppe, Ulrich. <i>Markovprozesse zur Modellierung bei Codekompression</i>, 2003."},"has_accepted_license":"1","file":[{"creator":"bhenrik","file_name":"2003_Hoppe_MarkowprozesseZurModellierungBeiCodekompression.ps","file_size":1902248,"access_level":"open_access","file_id":"47724","content_type":"application/postscript","date_created":"2023-10-05T16:38:12Z","date_updated":"2023-10-05T16:54:38Z","relation":"main_file"}],"author":[{"last_name":"Hoppe","full_name":"Hoppe, Ulrich","first_name":"Ulrich"}],"title":"Markovprozesse zur Modellierung bei Codekompression"},{"department":[{"_id":"34"},{"_id":"64"}],"citation":{"ama":"Ackermann MR. <i>Tabellenbasierte arithmetische Kodierung bei allgemeinen Alphabeten</i>.; 2003.","apa":"Ackermann, M. R. (2003). <i>Tabellenbasierte arithmetische Kodierung bei allgemeinen Alphabeten</i>.","ieee":"M. R. Ackermann, <i>Tabellenbasierte arithmetische Kodierung bei allgemeinen Alphabeten</i>. 2003.","chicago":"Ackermann, Marcel R. <i>Tabellenbasierte arithmetische Kodierung bei allgemeinen Alphabeten</i>, 2003.","bibtex":"@book{Ackermann_2003, title={Tabellenbasierte arithmetische Kodierung bei allgemeinen Alphabeten}, author={Ackermann, Marcel R.}, year={2003} }","mla":"Ackermann, Marcel R. <i>Tabellenbasierte arithmetische Kodierung bei allgemeinen Alphabeten</i>. 2003.","short":"M.R. Ackermann, Tabellenbasierte arithmetische Kodierung bei allgemeinen Alphabeten, 2003."},"user_id":"41047","oa":"1","keyword":["Diplomarbeit"],"has_accepted_license":"1","title":"Tabellenbasierte arithmetische Kodierung bei allgemeinen Alphabeten","author":[{"last_name":"Ackermann","full_name":"Ackermann, Marcel R.","first_name":"Marcel R."}],"file":[{"access_level":"open_access","file_id":"47722","content_type":"application/postscript","date_created":"2023-10-05T16:37:41Z","creator":"bhenrik","file_size":8764824,"file_name":"2003_Ackermann_TabellenbasierteArithmetischeKodierungBeiAllgemeinenAlphabeten.ps","date_updated":"2023-10-05T16:54:32Z","relation":"main_file"}],"date_updated":"2023-10-05T16:54:32Z","file_date_updated":"2023-10-05T16:54:32Z","_id":"47695","type":"misc","year":"2003","language":[{"iso":"ger"}],"status":"public","ddc":["000"],"date_created":"2023-10-05T16:37:47Z"},{"date_updated":"2023-10-05T16:54:44Z","_id":"47698","file_date_updated":"2023-10-05T16:54:44Z","status":"public","language":[{"iso":"eng"}],"year":"2002","type":"misc","date_created":"2023-10-05T16:39:34Z","ddc":["000"],"department":[{"_id":"34"},{"_id":"64"}],"keyword":["Diplomarbeit"],"user_id":"41047","oa":"1","citation":{"chicago":"Fricke, Birgitta. <i>Construction of Pseudorandom Functions</i>, 2002.","ieee":"B. Fricke, <i>Construction of Pseudorandom Functions</i>. 2002.","apa":"Fricke, B. (2002). <i>Construction of Pseudorandom Functions</i>.","ama":"Fricke B. <i>Construction of Pseudorandom Functions</i>.; 2002.","short":"B. Fricke, Construction of Pseudorandom Functions, 2002.","mla":"Fricke, Birgitta. <i>Construction of Pseudorandom Functions</i>. 2002.","bibtex":"@book{Fricke_2002, title={Construction of Pseudorandom Functions}, author={Fricke, Birgitta}, year={2002} }"},"has_accepted_license":"1","file":[{"date_updated":"2023-10-05T16:54:44Z","relation":"main_file","file_size":3696785,"file_name":"2002_Fricke_Pseudorandom.ps","creator":"bhenrik","date_created":"2023-10-05T16:39:26Z","file_id":"47726","access_level":"open_access","content_type":"application/postscript"}],"author":[{"first_name":"Birgitta","full_name":"Fricke, Birgitta","last_name":"Fricke"}],"title":"Construction of Pseudorandom Functions"},{"author":[{"first_name":"Deniz","full_name":"Deveci, Deniz","last_name":"Deveci"}],"title":"Evaluierung und Implementierung eines vollständig verteilten RSA-Kryptographiesystems","user_id":"41047","keyword":["Diplomarbeit"],"citation":{"chicago":"Deveci, Deniz. <i>Evaluierung und Implementierung eines vollständig verteilten RSA-Kryptographiesystems</i>, 2002.","ieee":"D. Deveci, <i>Evaluierung und Implementierung eines vollständig verteilten RSA-Kryptographiesystems</i>. 2002.","ama":"Deveci D. <i>Evaluierung und Implementierung eines vollständig verteilten RSA-Kryptographiesystems</i>.; 2002.","apa":"Deveci, D. (2002). <i>Evaluierung und Implementierung eines vollständig verteilten RSA-Kryptographiesystems</i>.","short":"D. Deveci, Evaluierung und Implementierung eines vollständig verteilten RSA-Kryptographiesystems, 2002.","mla":"Deveci, Deniz. <i>Evaluierung und Implementierung eines vollständig verteilten RSA-Kryptographiesystems</i>. 2002.","bibtex":"@book{Deveci_2002, title={Evaluierung und Implementierung eines vollständig verteilten RSA-Kryptographiesystems}, author={Deveci, Deniz}, year={2002} }"},"department":[{"_id":"34"},{"_id":"64"}],"date_created":"2023-10-05T16:38:45Z","status":"public","type":"misc","year":"2002","language":[{"iso":"ger"}],"_id":"47697","date_updated":"2023-10-05T16:42:39Z"},{"author":[{"first_name":"Anke","full_name":"Helbich, Anke","last_name":"Helbich"}],"title":"The Weil-Pairing and Signature Schemes in Elliptic Curve Cryptography","keyword":["Diplomarbeit"],"user_id":"41047","citation":{"apa":"Helbich, A. (2002). <i>The Weil-Pairing and Signature Schemes in Elliptic Curve Cryptography</i>.","ama":"Helbich A. <i>The Weil-Pairing and Signature Schemes in Elliptic Curve Cryptography</i>.; 2002.","ieee":"A. Helbich, <i>The Weil-Pairing and Signature Schemes in Elliptic Curve Cryptography</i>. 2002.","chicago":"Helbich, Anke. <i>The Weil-Pairing and Signature Schemes in Elliptic Curve Cryptography</i>, 2002.","bibtex":"@book{Helbich_2002, title={The Weil-Pairing and Signature Schemes in Elliptic Curve Cryptography}, author={Helbich, Anke}, year={2002} }","mla":"Helbich, Anke. <i>The Weil-Pairing and Signature Schemes in Elliptic Curve Cryptography</i>. 2002.","short":"A. Helbich, The Weil-Pairing and Signature Schemes in Elliptic Curve Cryptography, 2002."},"department":[{"_id":"34"},{"_id":"64"}],"date_created":"2023-10-05T16:40:05Z","status":"public","language":[{"iso":"eng"}],"year":"2002","type":"misc","_id":"47699","date_updated":"2023-10-05T16:42:35Z"},{"department":[{"_id":"34"},{"_id":"64"}],"keyword":["Diplomarbeit"],"user_id":"41047","citation":{"bibtex":"@book{Schepers_2002, title={Timing Attacks for Cryptosystems based on Elliptic Curves}, author={Schepers, Daniel}, year={2002} }","mla":"Schepers, Daniel. <i>Timing Attacks for Cryptosystems Based on Elliptic Curves</i>. 2002.","short":"D. Schepers, Timing Attacks for Cryptosystems Based on Elliptic Curves, 2002.","apa":"Schepers, D. (2002). <i>Timing Attacks for Cryptosystems based on Elliptic Curves</i>.","ama":"Schepers D. <i>Timing Attacks for Cryptosystems Based on Elliptic Curves</i>.; 2002.","ieee":"D. Schepers, <i>Timing Attacks for Cryptosystems based on Elliptic Curves</i>. 2002.","chicago":"Schepers, Daniel. <i>Timing Attacks for Cryptosystems Based on Elliptic Curves</i>, 2002."},"author":[{"last_name":"Schepers","full_name":"Schepers, Daniel","first_name":"Daniel"}],"title":"Timing Attacks for Cryptosystems based on Elliptic Curves","date_updated":"2023-10-05T16:42:34Z","_id":"47700","status":"public","language":[{"iso":"eng"}],"type":"misc","year":"2002","date_created":"2023-10-05T16:41:01Z"},{"status":"public","language":[{"iso":"eng"}],"year":"2001","type":"misc","date_created":"2023-10-05T16:41:47Z","ddc":["000"],"date_updated":"2023-10-05T16:54:52Z","file_date_updated":"2023-10-05T16:54:52Z","_id":"47701","has_accepted_license":"1","file":[{"relation":"main_file","date_updated":"2023-10-05T16:54:52Z","file_name":"2001_Krummel_AES.ps","file_size":1580787,"creator":"bhenrik","date_created":"2023-10-05T16:41:41Z","content_type":"application/postscript","access_level":"open_access","file_id":"47729"}],"author":[{"last_name":"Krummel","first_name":"Volker","full_name":"Krummel, Volker"}],"title":"Sicherheit und Anwendungen des Advanced Encryption Standard (AES) Rijndael","department":[{"_id":"34"},{"_id":"64"}],"keyword":["Diplomarbeit"],"user_id":"41047","oa":"1","citation":{"mla":"Krummel, Volker. <i>Sicherheit Und Anwendungen Des Advanced Encryption Standard (AES) Rijndael</i>. 2001.","bibtex":"@book{Krummel_2001, title={Sicherheit und Anwendungen des Advanced Encryption Standard (AES) Rijndael}, author={Krummel, Volker}, year={2001} }","short":"V. Krummel, Sicherheit Und Anwendungen Des Advanced Encryption Standard (AES) Rijndael, 2001.","apa":"Krummel, V. (2001). <i>Sicherheit und Anwendungen des Advanced Encryption Standard (AES) Rijndael</i>.","ama":"Krummel V. <i>Sicherheit Und Anwendungen Des Advanced Encryption Standard (AES) Rijndael</i>.; 2001.","chicago":"Krummel, Volker. <i>Sicherheit Und Anwendungen Des Advanced Encryption Standard (AES) Rijndael</i>, 2001.","ieee":"V. Krummel, <i>Sicherheit und Anwendungen des Advanced Encryption Standard (AES) Rijndael</i>. 2001."}},{"date_created":"2023-10-05T16:42:24Z","ddc":["000"],"status":"public","language":[{"iso":"eng"}],"type":"misc","year":"2001","_id":"47702","file_date_updated":"2023-10-05T16:54:58Z","date_updated":"2023-10-05T16:54:58Z","file":[{"relation":"main_file","date_updated":"2023-10-05T16:54:58Z","content_type":"application/postscript","access_level":"open_access","file_id":"47730","date_created":"2023-10-05T16:42:18Z","creator":"bhenrik","file_name":"2001_Otto_BrauerAddition-SubtractionChains_Diplom.ps","file_size":2275300}],"author":[{"full_name":"Otto, Martin","first_name":"Martin","last_name":"Otto"}],"title":"Brauer Addition-Subtraction Chains","has_accepted_license":"1","keyword":["Diplomarbeit"],"oa":"1","user_id":"41047","citation":{"bibtex":"@book{Otto_2001, title={Brauer Addition-Subtraction Chains}, author={Otto, Martin}, year={2001} }","mla":"Otto, Martin. <i>Brauer Addition-Subtraction Chains</i>. 2001.","short":"M. Otto, Brauer Addition-Subtraction Chains, 2001.","ama":"Otto M. <i>Brauer Addition-Subtraction Chains</i>.; 2001.","apa":"Otto, M. (2001). <i>Brauer Addition-Subtraction Chains</i>.","ieee":"M. Otto, <i>Brauer Addition-Subtraction Chains</i>. 2001.","chicago":"Otto, Martin. <i>Brauer Addition-Subtraction Chains</i>, 2001."},"department":[{"_id":"34"},{"_id":"64"}]}]
