[{"status":"public","file":[{"date_updated":"2023-10-05T16:55:11Z","date_created":"2023-10-05T16:21:25Z","creator":"bhenrik","file_size":1192529,"access_level":"open_access","file_id":"47706","file_name":"2010_Postler_SmartCardBasierteBerechnungEinerGruppensignatur.pdf","content_type":"application/pdf","relation":"main_file"}],"type":"misc","keyword":["Diplomarbeit"],"ddc":["000"],"file_date_updated":"2023-10-05T16:55:11Z","language":[{"iso":"ger"}],"_id":"47684","department":[{"_id":"34"},{"_id":"64"}],"user_id":"41047","year":"2010","citation":{"apa":"Postler, T. (2010). <i>Smart Card basierte Berechnung einer Gruppensignatur als Teil einer biometrischen Authentisierung</i>.","mla":"Postler, Tim. <i>Smart Card basierte Berechnung einer Gruppensignatur als Teil einer biometrischen Authentisierung</i>. 2010.","short":"T. Postler, Smart Card basierte Berechnung einer Gruppensignatur als Teil einer biometrischen Authentisierung, 2010.","bibtex":"@book{Postler_2010, title={Smart Card basierte Berechnung einer Gruppensignatur als Teil einer biometrischen Authentisierung}, author={Postler, Tim}, year={2010} }","ama":"Postler T. <i>Smart Card basierte Berechnung einer Gruppensignatur als Teil einer biometrischen Authentisierung</i>.; 2010.","ieee":"T. Postler, <i>Smart Card basierte Berechnung einer Gruppensignatur als Teil einer biometrischen Authentisierung</i>. 2010.","chicago":"Postler, Tim. <i>Smart Card basierte Berechnung einer Gruppensignatur als Teil einer biometrischen Authentisierung</i>, 2010."},"has_accepted_license":"1","title":"Smart Card basierte Berechnung einer Gruppensignatur als Teil einer biometrischen Authentisierung","oa":"1","date_updated":"2023-10-05T16:55:11Z","author":[{"first_name":"Tim","last_name":"Postler","full_name":"Postler, Tim"}],"date_created":"2023-10-05T16:23:48Z"},{"has_accepted_license":"1","year":"2008","citation":{"ama":"Schrieb J. <i>Construction and Applications of Identity-Based Encryption without Pairings</i>.; 2008.","chicago":"Schrieb, Jonas. <i>Construction and Applications of Identity-Based Encryption without Pairings</i>, 2008.","ieee":"J. Schrieb, <i>Construction and Applications of Identity-Based Encryption without Pairings</i>. 2008.","apa":"Schrieb, J. (2008). <i>Construction and Applications of Identity-Based Encryption without Pairings</i>.","short":"J. Schrieb, Construction and Applications of Identity-Based Encryption without Pairings, 2008.","bibtex":"@book{Schrieb_2008, title={Construction and Applications of Identity-Based Encryption without Pairings}, author={Schrieb, Jonas}, year={2008} }","mla":"Schrieb, Jonas. <i>Construction and Applications of Identity-Based Encryption without Pairings</i>. 2008."},"oa":"1","date_updated":"2023-10-05T16:55:04Z","author":[{"first_name":"Jonas","full_name":"Schrieb, Jonas","last_name":"Schrieb"}],"date_created":"2023-10-05T16:29:40Z","title":"Construction and Applications of Identity-Based Encryption without Pairings","type":"misc","status":"public","file":[{"relation":"main_file","content_type":"application/pdf","file_name":"2008_Schrieb_ConstructionAndApplicationsOfIBEWithoutPairings.pdf","access_level":"open_access","file_id":"47710","file_size":1055931,"date_created":"2023-10-05T16:29:32Z","creator":"bhenrik","date_updated":"2023-10-05T16:55:04Z"}],"_id":"47685","department":[{"_id":"34"},{"_id":"64"}],"user_id":"41047","keyword":["Diplomarbeit"],"ddc":["000"],"language":[{"iso":"eng"}],"file_date_updated":"2023-10-05T16:55:04Z"},{"type":"misc","status":"public","user_id":"41047","department":[{"_id":"34"},{"_id":"64"}],"_id":"47688","language":[{"iso":"ger"}],"keyword":["Diplomarbeit"],"citation":{"apa":"Klein, W. (2007). <i>Angriffe auf RSA-Varianten bei partiell bekannten geheimen Schlüsseln</i>.","short":"W. Klein, Angriffe auf RSA-Varianten bei partiell bekannten geheimen Schlüsseln, 2007.","bibtex":"@book{Klein_2007, title={Angriffe auf RSA-Varianten bei partiell bekannten geheimen Schlüsseln}, author={Klein, Wiebke}, year={2007} }","mla":"Klein, Wiebke. <i>Angriffe auf RSA-Varianten bei partiell bekannten geheimen Schlüsseln</i>. 2007.","ieee":"W. Klein, <i>Angriffe auf RSA-Varianten bei partiell bekannten geheimen Schlüsseln</i>. 2007.","chicago":"Klein, Wiebke. <i>Angriffe auf RSA-Varianten bei partiell bekannten geheimen Schlüsseln</i>, 2007.","ama":"Klein W. <i>Angriffe auf RSA-Varianten bei partiell bekannten geheimen Schlüsseln</i>.; 2007."},"year":"2007","author":[{"first_name":"Wiebke","last_name":"Klein","full_name":"Klein, Wiebke"}],"date_created":"2023-10-05T16:32:56Z","date_updated":"2023-10-05T16:42:53Z","title":"Angriffe auf RSA-Varianten bei partiell bekannten geheimen Schlüsseln"},{"user_id":"41047","department":[{"_id":"34"},{"_id":"64"}],"_id":"47690","language":[{"iso":"ger"}],"keyword":["Diplomarbeit"],"type":"misc","status":"public","author":[{"first_name":"Olga","full_name":"Käthler, Olga","last_name":"Käthler"}],"date_created":"2023-10-05T16:34:07Z","date_updated":"2023-10-05T16:42:51Z","title":"Kryptanalyse des EAC-Protokolls biometrischer Reisepässe","citation":{"apa":"Käthler, O. (2007). <i>Kryptanalyse des EAC-Protokolls biometrischer Reisepässe</i>.","mla":"Käthler, Olga. <i>Kryptanalyse des EAC-Protokolls biometrischer Reisepässe</i>. 2007.","short":"O. Käthler, Kryptanalyse des EAC-Protokolls biometrischer Reisepässe, 2007.","bibtex":"@book{Käthler_2007, title={Kryptanalyse des EAC-Protokolls biometrischer Reisepässe}, author={Käthler, Olga}, year={2007} }","ama":"Käthler O. <i>Kryptanalyse des EAC-Protokolls biometrischer Reisepässe</i>.; 2007.","chicago":"Käthler, Olga. <i>Kryptanalyse des EAC-Protokolls biometrischer Reisepässe</i>, 2007.","ieee":"O. Käthler, <i>Kryptanalyse des EAC-Protokolls biometrischer Reisepässe</i>. 2007."},"year":"2007"},{"author":[{"last_name":"Brieden","full_name":"Brieden, Benedikt","first_name":"Benedikt"}],"date_created":"2023-10-05T16:32:37Z","oa":"1","date_updated":"2023-10-05T16:53:56Z","title":"Analyse von verallgemeinerten RSA Polynomen mit Hilfe der Coppersmithschen Methode","has_accepted_license":"1","citation":{"apa":"Brieden, B. (2007). <i>Analyse von verallgemeinerten RSA Polynomen mit Hilfe der Coppersmithschen Methode</i>.","short":"B. Brieden, Analyse von verallgemeinerten RSA Polynomen mit Hilfe der Coppersmithschen Methode, 2007.","mla":"Brieden, Benedikt. <i>Analyse von verallgemeinerten RSA Polynomen mit Hilfe der Coppersmithschen Methode</i>. 2007.","bibtex":"@book{Brieden_2007, title={Analyse von verallgemeinerten RSA Polynomen mit Hilfe der Coppersmithschen Methode}, author={Brieden, Benedikt}, year={2007} }","chicago":"Brieden, Benedikt. <i>Analyse von verallgemeinerten RSA Polynomen mit Hilfe der Coppersmithschen Methode</i>, 2007.","ieee":"B. Brieden, <i>Analyse von verallgemeinerten RSA Polynomen mit Hilfe der Coppersmithschen Methode</i>. 2007.","ama":"Brieden B. <i>Analyse von verallgemeinerten RSA Polynomen mit Hilfe der Coppersmithschen Methode</i>.; 2007."},"year":"2007","department":[{"_id":"34"},{"_id":"64"}],"user_id":"41047","_id":"47687","language":[{"iso":"ger"}],"file_date_updated":"2023-10-05T16:53:56Z","keyword":["Diplomarbeit"],"ddc":["000"],"type":"misc","status":"public","file":[{"date_updated":"2023-10-05T16:53:56Z","creator":"bhenrik","date_created":"2023-10-05T16:32:30Z","file_size":612732,"access_level":"open_access","file_id":"47713","file_name":"2007_Brieden_AnalyseVonVerallgemeinertenRSAPolynomenMitHilfeDerCoppersmithschenMethode.pdf","content_type":"application/pdf","relation":"main_file"}]},{"oa":"1","date_updated":"2023-10-05T16:54:04Z","date_created":"2023-10-05T16:33:44Z","author":[{"first_name":"Daniel","last_name":"Kuntze","full_name":"Kuntze, Daniel"}],"title":"Untersuchung von Clusteringalgorithmen für die Kullback-Leibler Divergenz","has_accepted_license":"1","year":"2007","citation":{"apa":"Kuntze, D. (2007). <i>Untersuchung von Clusteringalgorithmen für die Kullback-Leibler Divergenz</i>.","short":"D. Kuntze, Untersuchung von Clusteringalgorithmen für die Kullback-Leibler Divergenz, 2007.","mla":"Kuntze, Daniel. <i>Untersuchung von Clusteringalgorithmen für die Kullback-Leibler Divergenz</i>. 2007.","bibtex":"@book{Kuntze_2007, title={Untersuchung von Clusteringalgorithmen für die Kullback-Leibler Divergenz}, author={Kuntze, Daniel}, year={2007} }","ama":"Kuntze D. <i>Untersuchung von Clusteringalgorithmen für die Kullback-Leibler Divergenz</i>.; 2007.","chicago":"Kuntze, Daniel. <i>Untersuchung von Clusteringalgorithmen für die Kullback-Leibler Divergenz</i>, 2007.","ieee":"D. Kuntze, <i>Untersuchung von Clusteringalgorithmen für die Kullback-Leibler Divergenz</i>. 2007."},"_id":"47689","department":[{"_id":"34"},{"_id":"64"}],"user_id":"41047","keyword":["Diplomarbeit"],"ddc":["000"],"language":[{"iso":"ger"}],"file_date_updated":"2023-10-05T16:54:04Z","type":"misc","status":"public","file":[{"date_updated":"2023-10-05T16:54:04Z","creator":"bhenrik","date_created":"2023-10-05T16:33:38Z","file_size":1078135,"file_name":"2007_Kuntze_UntersuchungVonClusteringalgorithmenFuerDieKLD.pdf","access_level":"open_access","file_id":"47715","content_type":"application/pdf","relation":"main_file"}]},{"date_created":"2023-10-05T16:31:03Z","author":[{"full_name":"Borghoff, Julia","last_name":"Borghoff","first_name":"Julia"}],"date_updated":"2023-10-05T16:53:40Z","oa":"1","title":"Vergleich multivariater Varianten der Methode von Coppersmith","has_accepted_license":"1","citation":{"ama":"Borghoff J. <i>Vergleich multivariater Varianten der Methode von Coppersmith</i>.; 2007.","chicago":"Borghoff, Julia. <i>Vergleich multivariater Varianten der Methode von Coppersmith</i>, 2007.","ieee":"J. Borghoff, <i>Vergleich multivariater Varianten der Methode von Coppersmith</i>. 2007.","apa":"Borghoff, J. (2007). <i>Vergleich multivariater Varianten der Methode von Coppersmith</i>.","short":"J. Borghoff, Vergleich multivariater Varianten der Methode von Coppersmith, 2007.","bibtex":"@book{Borghoff_2007, title={Vergleich multivariater Varianten der Methode von Coppersmith}, author={Borghoff, Julia}, year={2007} }","mla":"Borghoff, Julia. <i>Vergleich multivariater Varianten der Methode von Coppersmith</i>. 2007."},"year":"2007","department":[{"_id":"34"},{"_id":"64"}],"user_id":"41047","_id":"47686","file_date_updated":"2023-10-05T16:53:40Z","language":[{"iso":"ger"}],"keyword":["Diplomarbeit"],"ddc":["000"],"type":"misc","status":"public","file":[{"content_type":"application/pdf","relation":"main_file","creator":"bhenrik","date_created":"2023-10-05T16:30:56Z","date_updated":"2023-10-05T16:53:40Z","file_id":"47711","access_level":"open_access","file_name":"2007_Borghoff_VergleichMultivariaterVariantenDerMethodeVonCoppersmith.pdf","file_size":550560}]},{"citation":{"ama":"Gorski M. <i>Boomerang- Und Rechteckangriff Auf AES</i>.; 2006.","chicago":"Gorski, Michael. <i>Boomerang- Und Rechteckangriff Auf AES</i>, 2006.","ieee":"M. Gorski, <i>Boomerang- und Rechteckangriff auf AES</i>. 2006.","short":"M. Gorski, Boomerang- Und Rechteckangriff Auf AES, 2006.","bibtex":"@book{Gorski_2006, title={Boomerang- und Rechteckangriff auf AES}, author={Gorski, Michael}, year={2006} }","mla":"Gorski, Michael. <i>Boomerang- Und Rechteckangriff Auf AES</i>. 2006.","apa":"Gorski, M. (2006). <i>Boomerang- und Rechteckangriff auf AES</i>."},"year":"2006","has_accepted_license":"1","title":"Boomerang- und Rechteckangriff auf AES","author":[{"first_name":"Michael","full_name":"Gorski, Michael","last_name":"Gorski"}],"date_created":"2023-10-05T16:35:30Z","oa":"1","date_updated":"2023-10-05T16:54:18Z","file":[{"content_type":"application/pdf","relation":"main_file","date_updated":"2023-10-05T16:54:18Z","creator":"bhenrik","date_created":"2023-10-05T16:34:54Z","file_size":4311037,"file_id":"47719","access_level":"open_access","file_name":"2006_Gorski_BoomerangUndRechteckangriffAufAES.pdf"}],"status":"public","type":"misc","language":[{"iso":"eng"}],"file_date_updated":"2023-10-05T16:54:18Z","ddc":["000"],"keyword":["Diplomarbeit"],"user_id":"41047","department":[{"_id":"34"},{"_id":"64"}],"_id":"47691"},{"_id":"47692","department":[{"_id":"34"},{"_id":"64"}],"user_id":"49063","keyword":["Diplomarbeit"],"ddc":["000"],"file_date_updated":"2023-10-05T16:54:10Z","language":[{"iso":"ger"}],"type":"misc","status":"public","file":[{"file_size":612147,"access_level":"open_access","file_id":"47718","file_name":"2006_Naewe_SamplemethodenInDerAlgorithmischenGeometrieDerZahlen.pdf","date_updated":"2023-10-05T16:54:10Z","date_created":"2023-10-05T16:35:17Z","creator":"bhenrik","relation":"main_file","content_type":"application/pdf"}],"date_updated":"2024-08-08T12:16:01Z","oa":"1","author":[{"last_name":" Naewe","full_name":" Naewe, Stefanie","id":"1971","first_name":"Stefanie"}],"date_created":"2023-10-05T16:35:23Z","title":"Samplemethoden in der algorithmischen Geometrie der Zahlen, Diplomarbeit","has_accepted_license":"1","publication_status":"published","place":"Universität Paderborn","year":"2006","citation":{"ama":"Naewe S. <i>Samplemethoden in der algorithmischen Geometrie der Zahlen, Diplomarbeit</i>.; 2006.","ieee":"S.  Naewe, <i>Samplemethoden in der algorithmischen Geometrie der Zahlen, Diplomarbeit</i>. Universität Paderborn, 2006.","chicago":"Naewe, Stefanie. <i>Samplemethoden in der algorithmischen Geometrie der Zahlen, Diplomarbeit</i>. Universität Paderborn, 2006.","bibtex":"@book{ Naewe_2006, place={Universität Paderborn}, title={Samplemethoden in der algorithmischen Geometrie der Zahlen, Diplomarbeit}, author={ Naewe, Stefanie}, year={2006} }","mla":"Naewe, Stefanie. <i>Samplemethoden in der algorithmischen Geometrie der Zahlen, Diplomarbeit</i>. 2006.","short":"S.  Naewe, Samplemethoden in der algorithmischen Geometrie der Zahlen, Diplomarbeit, Universität Paderborn, 2006.","apa":"Naewe, S. (2006). <i>Samplemethoden in der algorithmischen Geometrie der Zahlen, Diplomarbeit</i>."}},{"author":[{"full_name":"Ernst, Matthias","last_name":"Ernst","first_name":"Matthias"}],"user_id":"41047","date_created":"2023-10-05T16:35:58Z","department":[{"_id":"34"},{"_id":"64"}],"date_updated":"2023-10-05T16:42:46Z","_id":"47693","language":[{"iso":"ger"}],"title":"Analyse von RSA mittels Coppersmith Methode","keyword":["Diplomarbeit"],"type":"misc","citation":{"apa":"Ernst, M. (2005). <i>Analyse von RSA mittels Coppersmith Methode</i>.","short":"M. Ernst, Analyse von RSA mittels Coppersmith Methode, 2005.","bibtex":"@book{Ernst_2005, title={Analyse von RSA mittels Coppersmith Methode}, author={Ernst, Matthias}, year={2005} }","mla":"Ernst, Matthias. <i>Analyse von RSA mittels Coppersmith Methode</i>. 2005.","ama":"Ernst M. <i>Analyse von RSA mittels Coppersmith Methode</i>.; 2005.","chicago":"Ernst, Matthias. <i>Analyse von RSA mittels Coppersmith Methode</i>, 2005.","ieee":"M. Ernst, <i>Analyse von RSA mittels Coppersmith Methode</i>. 2005."},"status":"public","year":"2005"},{"type":"misc","status":"public","file":[{"file_name":"2005_Spanke_ImplemetierungCoppersmith.ps","access_level":"open_access","file_id":"47720","file_size":783523,"creator":"bhenrik","date_created":"2023-10-05T16:36:33Z","date_updated":"2023-10-05T16:54:25Z","relation":"main_file","content_type":"application/postscript"}],"_id":"47694","department":[{"_id":"34"},{"_id":"64"}],"user_id":"41047","keyword":["Diplomarbeit"],"ddc":["000"],"file_date_updated":"2023-10-05T16:54:25Z","language":[{"iso":"ger"}],"has_accepted_license":"1","year":"2005","citation":{"apa":"Spanke, C. (2005). <i>Implementierung der Coppersmith-Methode zur Untersuchung von Schwachstellen bei RSA</i>.","mla":"Spanke, Christoph. <i>Implementierung der Coppersmith-Methode zur Untersuchung von Schwachstellen bei RSA</i>. 2005.","bibtex":"@book{Spanke_2005, title={Implementierung der Coppersmith-Methode zur Untersuchung von Schwachstellen bei RSA}, author={Spanke, Christoph}, year={2005} }","short":"C. Spanke, Implementierung der Coppersmith-Methode zur Untersuchung von Schwachstellen bei RSA, 2005.","chicago":"Spanke, Christoph. <i>Implementierung der Coppersmith-Methode zur Untersuchung von Schwachstellen bei RSA</i>, 2005.","ieee":"C. Spanke, <i>Implementierung der Coppersmith-Methode zur Untersuchung von Schwachstellen bei RSA</i>. 2005.","ama":"Spanke C. <i>Implementierung der Coppersmith-Methode zur Untersuchung von Schwachstellen bei RSA</i>.; 2005."},"oa":"1","date_updated":"2023-10-05T16:54:25Z","author":[{"full_name":"Spanke, Christoph","last_name":"Spanke","first_name":"Christoph"}],"date_created":"2023-10-05T16:36:44Z","title":"Implementierung der Coppersmith-Methode zur Untersuchung von Schwachstellen bei RSA"},{"status":"public","file":[{"relation":"main_file","content_type":"application/postscript","file_name":"2003_Hoppe_MarkowprozesseZurModellierungBeiCodekompression.ps","file_id":"47724","access_level":"open_access","file_size":1902248,"creator":"bhenrik","date_created":"2023-10-05T16:38:12Z","date_updated":"2023-10-05T16:54:38Z"}],"type":"misc","file_date_updated":"2023-10-05T16:54:38Z","language":[{"iso":"ger"}],"keyword":["Diplomarbeit"],"ddc":["000"],"department":[{"_id":"34"},{"_id":"64"}],"user_id":"41047","_id":"47696","citation":{"ieee":"U. Hoppe, <i>Markovprozesse zur Modellierung bei Codekompression</i>. 2003.","chicago":"Hoppe, Ulrich. <i>Markovprozesse zur Modellierung bei Codekompression</i>, 2003.","ama":"Hoppe U. <i>Markovprozesse zur Modellierung bei Codekompression</i>.; 2003.","bibtex":"@book{Hoppe_2003, title={Markovprozesse zur Modellierung bei Codekompression}, author={Hoppe, Ulrich}, year={2003} }","mla":"Hoppe, Ulrich. <i>Markovprozesse zur Modellierung bei Codekompression</i>. 2003.","short":"U. Hoppe, Markovprozesse zur Modellierung bei Codekompression, 2003.","apa":"Hoppe, U. (2003). <i>Markovprozesse zur Modellierung bei Codekompression</i>."},"year":"2003","has_accepted_license":"1","title":"Markovprozesse zur Modellierung bei Codekompression","date_created":"2023-10-05T16:38:19Z","author":[{"first_name":"Ulrich","full_name":"Hoppe, Ulrich","last_name":"Hoppe"}],"oa":"1","date_updated":"2023-10-05T16:54:38Z"},{"year":"2003","citation":{"apa":"Ackermann, M. R. (2003). <i>Tabellenbasierte arithmetische Kodierung bei allgemeinen Alphabeten</i>.","bibtex":"@book{Ackermann_2003, title={Tabellenbasierte arithmetische Kodierung bei allgemeinen Alphabeten}, author={Ackermann, Marcel R.}, year={2003} }","mla":"Ackermann, Marcel R. <i>Tabellenbasierte arithmetische Kodierung bei allgemeinen Alphabeten</i>. 2003.","short":"M.R. Ackermann, Tabellenbasierte arithmetische Kodierung bei allgemeinen Alphabeten, 2003.","ama":"Ackermann MR. <i>Tabellenbasierte arithmetische Kodierung bei allgemeinen Alphabeten</i>.; 2003.","chicago":"Ackermann, Marcel R. <i>Tabellenbasierte arithmetische Kodierung bei allgemeinen Alphabeten</i>, 2003.","ieee":"M. R. Ackermann, <i>Tabellenbasierte arithmetische Kodierung bei allgemeinen Alphabeten</i>. 2003."},"has_accepted_license":"1","title":"Tabellenbasierte arithmetische Kodierung bei allgemeinen Alphabeten","date_updated":"2023-10-05T16:54:32Z","oa":"1","date_created":"2023-10-05T16:37:47Z","author":[{"last_name":"Ackermann","full_name":"Ackermann, Marcel R.","first_name":"Marcel R."}],"status":"public","file":[{"creator":"bhenrik","date_created":"2023-10-05T16:37:41Z","date_updated":"2023-10-05T16:54:32Z","file_id":"47722","access_level":"open_access","file_name":"2003_Ackermann_TabellenbasierteArithmetischeKodierungBeiAllgemeinenAlphabeten.ps","file_size":8764824,"content_type":"application/postscript","relation":"main_file"}],"type":"misc","keyword":["Diplomarbeit"],"ddc":["000"],"file_date_updated":"2023-10-05T16:54:32Z","language":[{"iso":"ger"}],"_id":"47695","department":[{"_id":"34"},{"_id":"64"}],"user_id":"41047"},{"ddc":["000"],"keyword":["Diplomarbeit"],"language":[{"iso":"eng"}],"file_date_updated":"2023-10-05T16:54:44Z","_id":"47698","user_id":"41047","department":[{"_id":"34"},{"_id":"64"}],"file":[{"relation":"main_file","content_type":"application/postscript","file_id":"47726","access_level":"open_access","file_name":"2002_Fricke_Pseudorandom.ps","file_size":3696785,"creator":"bhenrik","date_created":"2023-10-05T16:39:26Z","date_updated":"2023-10-05T16:54:44Z"}],"status":"public","type":"misc","title":"Construction of Pseudorandom Functions","oa":"1","date_updated":"2023-10-05T16:54:44Z","author":[{"last_name":"Fricke","full_name":"Fricke, Birgitta","first_name":"Birgitta"}],"date_created":"2023-10-05T16:39:34Z","year":"2002","citation":{"ieee":"B. Fricke, <i>Construction of Pseudorandom Functions</i>. 2002.","chicago":"Fricke, Birgitta. <i>Construction of Pseudorandom Functions</i>, 2002.","ama":"Fricke B. <i>Construction of Pseudorandom Functions</i>.; 2002.","apa":"Fricke, B. (2002). <i>Construction of Pseudorandom Functions</i>.","mla":"Fricke, Birgitta. <i>Construction of Pseudorandom Functions</i>. 2002.","short":"B. Fricke, Construction of Pseudorandom Functions, 2002.","bibtex":"@book{Fricke_2002, title={Construction of Pseudorandom Functions}, author={Fricke, Birgitta}, year={2002} }"},"has_accepted_license":"1"},{"status":"public","type":"misc","language":[{"iso":"ger"}],"keyword":["Diplomarbeit"],"user_id":"41047","department":[{"_id":"34"},{"_id":"64"}],"_id":"47697","citation":{"ama":"Deveci D. <i>Evaluierung und Implementierung eines vollständig verteilten RSA-Kryptographiesystems</i>.; 2002.","ieee":"D. Deveci, <i>Evaluierung und Implementierung eines vollständig verteilten RSA-Kryptographiesystems</i>. 2002.","chicago":"Deveci, Deniz. <i>Evaluierung und Implementierung eines vollständig verteilten RSA-Kryptographiesystems</i>, 2002.","short":"D. Deveci, Evaluierung und Implementierung eines vollständig verteilten RSA-Kryptographiesystems, 2002.","mla":"Deveci, Deniz. <i>Evaluierung und Implementierung eines vollständig verteilten RSA-Kryptographiesystems</i>. 2002.","bibtex":"@book{Deveci_2002, title={Evaluierung und Implementierung eines vollständig verteilten RSA-Kryptographiesystems}, author={Deveci, Deniz}, year={2002} }","apa":"Deveci, D. (2002). <i>Evaluierung und Implementierung eines vollständig verteilten RSA-Kryptographiesystems</i>."},"year":"2002","title":"Evaluierung und Implementierung eines vollständig verteilten RSA-Kryptographiesystems","date_created":"2023-10-05T16:38:45Z","author":[{"first_name":"Deniz","last_name":"Deveci","full_name":"Deveci, Deniz"}],"date_updated":"2023-10-05T16:42:39Z"},{"citation":{"apa":"Helbich, A. (2002). <i>The Weil-Pairing and Signature Schemes in Elliptic Curve Cryptography</i>.","short":"A. Helbich, The Weil-Pairing and Signature Schemes in Elliptic Curve Cryptography, 2002.","bibtex":"@book{Helbich_2002, title={The Weil-Pairing and Signature Schemes in Elliptic Curve Cryptography}, author={Helbich, Anke}, year={2002} }","mla":"Helbich, Anke. <i>The Weil-Pairing and Signature Schemes in Elliptic Curve Cryptography</i>. 2002.","ama":"Helbich A. <i>The Weil-Pairing and Signature Schemes in Elliptic Curve Cryptography</i>.; 2002.","chicago":"Helbich, Anke. <i>The Weil-Pairing and Signature Schemes in Elliptic Curve Cryptography</i>, 2002.","ieee":"A. Helbich, <i>The Weil-Pairing and Signature Schemes in Elliptic Curve Cryptography</i>. 2002."},"year":"2002","date_created":"2023-10-05T16:40:05Z","author":[{"last_name":"Helbich","full_name":"Helbich, Anke","first_name":"Anke"}],"date_updated":"2023-10-05T16:42:35Z","title":"The Weil-Pairing and Signature Schemes in Elliptic Curve Cryptography","type":"misc","status":"public","department":[{"_id":"34"},{"_id":"64"}],"user_id":"41047","_id":"47699","language":[{"iso":"eng"}],"keyword":["Diplomarbeit"]},{"title":"Timing Attacks for Cryptosystems based on Elliptic Curves","date_created":"2023-10-05T16:41:01Z","author":[{"first_name":"Daniel","last_name":"Schepers","full_name":"Schepers, Daniel"}],"date_updated":"2023-10-05T16:42:34Z","citation":{"short":"D. Schepers, Timing Attacks for Cryptosystems Based on Elliptic Curves, 2002.","mla":"Schepers, Daniel. <i>Timing Attacks for Cryptosystems Based on Elliptic Curves</i>. 2002.","bibtex":"@book{Schepers_2002, title={Timing Attacks for Cryptosystems based on Elliptic Curves}, author={Schepers, Daniel}, year={2002} }","apa":"Schepers, D. (2002). <i>Timing Attacks for Cryptosystems based on Elliptic Curves</i>.","ama":"Schepers D. <i>Timing Attacks for Cryptosystems Based on Elliptic Curves</i>.; 2002.","ieee":"D. Schepers, <i>Timing Attacks for Cryptosystems based on Elliptic Curves</i>. 2002.","chicago":"Schepers, Daniel. <i>Timing Attacks for Cryptosystems Based on Elliptic Curves</i>, 2002."},"year":"2002","language":[{"iso":"eng"}],"keyword":["Diplomarbeit"],"user_id":"41047","department":[{"_id":"34"},{"_id":"64"}],"_id":"47700","status":"public","type":"misc"},{"status":"public","file":[{"file_id":"47729","file_name":"2001_Krummel_AES.ps","access_level":"open_access","file_size":1580787,"date_created":"2023-10-05T16:41:41Z","creator":"bhenrik","date_updated":"2023-10-05T16:54:52Z","relation":"main_file","content_type":"application/postscript"}],"type":"misc","keyword":["Diplomarbeit"],"ddc":["000"],"file_date_updated":"2023-10-05T16:54:52Z","language":[{"iso":"eng"}],"_id":"47701","department":[{"_id":"34"},{"_id":"64"}],"user_id":"41047","year":"2001","citation":{"ama":"Krummel V. <i>Sicherheit Und Anwendungen Des Advanced Encryption Standard (AES) Rijndael</i>.; 2001.","chicago":"Krummel, Volker. <i>Sicherheit Und Anwendungen Des Advanced Encryption Standard (AES) Rijndael</i>, 2001.","ieee":"V. Krummel, <i>Sicherheit und Anwendungen des Advanced Encryption Standard (AES) Rijndael</i>. 2001.","apa":"Krummel, V. (2001). <i>Sicherheit und Anwendungen des Advanced Encryption Standard (AES) Rijndael</i>.","mla":"Krummel, Volker. <i>Sicherheit Und Anwendungen Des Advanced Encryption Standard (AES) Rijndael</i>. 2001.","short":"V. Krummel, Sicherheit Und Anwendungen Des Advanced Encryption Standard (AES) Rijndael, 2001.","bibtex":"@book{Krummel_2001, title={Sicherheit und Anwendungen des Advanced Encryption Standard (AES) Rijndael}, author={Krummel, Volker}, year={2001} }"},"has_accepted_license":"1","title":"Sicherheit und Anwendungen des Advanced Encryption Standard (AES) Rijndael","oa":"1","date_updated":"2023-10-05T16:54:52Z","author":[{"first_name":"Volker","full_name":"Krummel, Volker","last_name":"Krummel"}],"date_created":"2023-10-05T16:41:47Z"},{"date_created":"2023-10-05T16:42:24Z","author":[{"full_name":"Otto, Martin","last_name":"Otto","first_name":"Martin"}],"oa":"1","date_updated":"2023-10-05T16:54:58Z","title":"Brauer Addition-Subtraction Chains","has_accepted_license":"1","citation":{"mla":"Otto, Martin. <i>Brauer Addition-Subtraction Chains</i>. 2001.","short":"M. Otto, Brauer Addition-Subtraction Chains, 2001.","bibtex":"@book{Otto_2001, title={Brauer Addition-Subtraction Chains}, author={Otto, Martin}, year={2001} }","apa":"Otto, M. (2001). <i>Brauer Addition-Subtraction Chains</i>.","chicago":"Otto, Martin. <i>Brauer Addition-Subtraction Chains</i>, 2001.","ieee":"M. Otto, <i>Brauer Addition-Subtraction Chains</i>. 2001.","ama":"Otto M. <i>Brauer Addition-Subtraction Chains</i>.; 2001."},"year":"2001","user_id":"41047","department":[{"_id":"34"},{"_id":"64"}],"_id":"47702","language":[{"iso":"eng"}],"file_date_updated":"2023-10-05T16:54:58Z","ddc":["000"],"keyword":["Diplomarbeit"],"type":"misc","file":[{"relation":"main_file","content_type":"application/postscript","file_name":"2001_Otto_BrauerAddition-SubtractionChains_Diplom.ps","access_level":"open_access","file_id":"47730","file_size":2275300,"creator":"bhenrik","date_created":"2023-10-05T16:42:18Z","date_updated":"2023-10-05T16:54:58Z"}],"status":"public"}]
