[{"date_updated":"2022-01-06T06:58:17Z","_id":"2869","supervisor":[{"full_name":"Blömer, Johannes","first_name":"Johannes","id":"23","last_name":"Blömer"}],"year":"2013","type":"bachelorsthesis","citation":{"short":"L. Leder, Nichtapproximierbarkeitsresultate Zu Radius- Und Durchmesserclustering Unter Verwendung von L_p-Metriken, 2013.","ieee":"L. Leder, Nichtapproximierbarkeitsresultate zu Radius- und Durchmesserclustering unter Verwendung von L_p-Metriken. 2013.","chicago":"Leder, Lennart. Nichtapproximierbarkeitsresultate Zu Radius- Und Durchmesserclustering Unter Verwendung von L_p-Metriken, 2013.","ama":"Leder L. Nichtapproximierbarkeitsresultate Zu Radius- Und Durchmesserclustering Unter Verwendung von L_p-Metriken.; 2013.","apa":"Leder, L. (2013). Nichtapproximierbarkeitsresultate zu Radius- und Durchmesserclustering unter Verwendung von L_p-Metriken.","bibtex":"@book{Leder_2013, title={Nichtapproximierbarkeitsresultate zu Radius- und Durchmesserclustering unter Verwendung von L_p-Metriken}, author={Leder, Lennart}, year={2013} }","mla":"Leder, Lennart. Nichtapproximierbarkeitsresultate Zu Radius- Und Durchmesserclustering Unter Verwendung von L_p-Metriken. 2013."},"user_id":"25078","title":"Nichtapproximierbarkeitsresultate zu Radius- und Durchmesserclustering unter Verwendung von L_p-Metriken","date_created":"2018-05-24T13:17:53Z","status":"public","department":[{"_id":"64"}],"author":[{"first_name":"Lennart","full_name":"Leder, Lennart","last_name":"Leder"}]},{"date_updated":"2022-01-06T06:58:46Z","_id":"2909","main_file_link":[{"url":"http://nbn-resolving.de/urn:nbn:de:hbz:466:2-12721"}],"year":"2013","type":"dissertation","citation":{"ieee":"D. Kuntze, Practical algorithms for clustering and modeling large data sets - Analysis and improvements. Universität Paderborn, 2013.","short":"D. Kuntze, Practical Algorithms for Clustering and Modeling Large Data Sets - Analysis and Improvements, Universität Paderborn, 2013.","mla":"Kuntze, Daniel. Practical Algorithms for Clustering and Modeling Large Data Sets - Analysis and Improvements. Universität Paderborn, 2013.","bibtex":"@book{Kuntze_2013, title={Practical algorithms for clustering and modeling large data sets - Analysis and improvements}, publisher={Universität Paderborn}, author={Kuntze, Daniel}, year={2013} }","apa":"Kuntze, D. (2013). Practical algorithms for clustering and modeling large data sets - Analysis and improvements. Universität Paderborn.","ama":"Kuntze D. Practical Algorithms for Clustering and Modeling Large Data Sets - Analysis and Improvements. Universität Paderborn; 2013.","chicago":"Kuntze, Daniel. Practical Algorithms for Clustering and Modeling Large Data Sets - Analysis and Improvements. Universität Paderborn, 2013."},"supervisor":[{"last_name":"Blömer","id":"23","first_name":"Johannes","full_name":"Blömer, Johannes"}],"title":"Practical algorithms for clustering and modeling large data sets - Analysis and improvements","user_id":"25078","department":[{"_id":"64"}],"publisher":"Universität Paderborn","author":[{"last_name":"Kuntze","full_name":"Kuntze, Daniel","first_name":"Daniel"}],"date_created":"2018-05-25T10:07:42Z","status":"public"},{"status":"public","project":[{"_id":"1","name":"SFB 901"},{"_id":"13","name":"SFB 901 - Subprojekt C1"},{"name":"SFB 901 - Project Area C","_id":"4"},{"name":"Securing the Financial Cloud","_id":"43"}],"date_created":"2017-10-17T12:42:23Z","publisher":"Universität Paderborn","author":[{"last_name":"Tezer","first_name":"Alina","full_name":"Tezer, Alina"}],"department":[{"_id":"64"}],"user_id":"477","title":"Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen","language":[{"iso":"ger"}],"supervisor":[{"full_name":"Blömer, Johannes","first_name":"Johannes","id":"23","last_name":"Blömer"}],"year":"2013","citation":{"ieee":"A. Tezer, Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen. Universität Paderborn, 2013.","short":"A. Tezer, Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen, Universität Paderborn, 2013.","mla":"Tezer, Alina. Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen. Universität Paderborn, 2013.","bibtex":"@book{Tezer_2013, title={Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen}, publisher={Universität Paderborn}, author={Tezer, Alina}, year={2013} }","apa":"Tezer, A. (2013). Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen. Universität Paderborn.","ama":"Tezer A. Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen. Universität Paderborn; 2013.","chicago":"Tezer, Alina. Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen. Universität Paderborn, 2013."},"type":"bachelorsthesis","_id":"471","date_updated":"2022-01-06T07:01:19Z"},{"department":[{"_id":"64"}],"author":[{"full_name":"Otte, Oliver","first_name":"Oliver","last_name":"Otte"}],"publisher":"Universität Paderborn","date_created":"2017-10-17T12:42:27Z","project":[{"_id":"1","name":"SFB 901"},{"_id":"13","name":"SFB 901 - Subprojekt C1"},{"_id":"4","name":"SFB 901 - Project Area C"},{"name":"Securing the Financial Cloud","_id":"43"}],"status":"public","title":"Seitenkanalresistenz paarungsbasierter Kryptographie","user_id":"477","year":"2013","type":"bachelorsthesis","citation":{"bibtex":"@book{Otte_2013, title={Seitenkanalresistenz paarungsbasierter Kryptographie}, publisher={Universität Paderborn}, author={Otte, Oliver}, year={2013} }","mla":"Otte, Oliver. Seitenkanalresistenz paarungsbasierter Kryptographie. Universität Paderborn, 2013.","chicago":"Otte, Oliver. Seitenkanalresistenz paarungsbasierter Kryptographie. Universität Paderborn, 2013.","apa":"Otte, O. (2013). Seitenkanalresistenz paarungsbasierter Kryptographie. Universität Paderborn.","ama":"Otte O. Seitenkanalresistenz paarungsbasierter Kryptographie. Universität Paderborn; 2013.","ieee":"O. Otte, Seitenkanalresistenz paarungsbasierter Kryptographie. Universität Paderborn, 2013.","short":"O. Otte, Seitenkanalresistenz paarungsbasierter Kryptographie, Universität Paderborn, 2013."},"language":[{"iso":"ger"}],"supervisor":[{"first_name":"Johannes","full_name":"Blömer, Johannes","last_name":"Blömer","id":"23"}],"_id":"486","date_updated":"2022-01-06T07:01:27Z"},{"_id":"553","date_updated":"2022-01-06T07:01:57Z","language":[{"iso":"ger"}],"supervisor":[{"full_name":"Blömer, Johannes","first_name":"Johannes","id":"23","last_name":"Blömer"}],"type":"bachelorsthesis","year":"2013","citation":{"ieee":"K. Kohn, Attributbasierte Verschlüsselung mittels Gittermethoden - Mathematische Grundlagen, Verfahren und Sicherheitsbeweise. Universität Paderborn, 2013.","short":"K. Kohn, Attributbasierte Verschlüsselung mittels Gittermethoden - Mathematische Grundlagen, Verfahren und Sicherheitsbeweise, Universität Paderborn, 2013.","mla":"Kohn, Kathlén. Attributbasierte Verschlüsselung mittels Gittermethoden - Mathematische Grundlagen, Verfahren und Sicherheitsbeweise. Universität Paderborn, 2013.","bibtex":"@book{Kohn_2013, title={Attributbasierte Verschlüsselung mittels Gittermethoden - Mathematische Grundlagen, Verfahren und Sicherheitsbeweise}, publisher={Universität Paderborn}, author={Kohn, Kathlén}, year={2013} }","chicago":"Kohn, Kathlén. Attributbasierte Verschlüsselung mittels Gittermethoden - Mathematische Grundlagen, Verfahren und Sicherheitsbeweise. Universität Paderborn, 2013.","ama":"Kohn K. Attributbasierte Verschlüsselung mittels Gittermethoden - Mathematische Grundlagen, Verfahren und Sicherheitsbeweise. Universität Paderborn; 2013.","apa":"Kohn, K. (2013). Attributbasierte Verschlüsselung mittels Gittermethoden - Mathematische Grundlagen, Verfahren und Sicherheitsbeweise. Universität Paderborn."},"user_id":"477","title":"Attributbasierte Verschlüsselung mittels Gittermethoden - Mathematische Grundlagen, Verfahren und Sicherheitsbeweise","status":"public","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt C1","_id":"13"},{"name":"SFB 901 - Project Area C","_id":"4"},{"name":"Securing the Financial Cloud","_id":"43"}],"date_created":"2017-10-17T12:42:40Z","author":[{"last_name":"Kohn","full_name":"Kohn, Kathlén","first_name":"Kathlén"}],"publisher":"Universität Paderborn","department":[{"_id":"64"}]},{"_id":"606","date_updated":"2022-01-06T07:02:51Z","type":"bachelorsthesis","citation":{"ama":"Löken N. Identitätsbasierte Signaturen - Ein Sicherheitsbeweis für Signaturen auf Grundlage von Gap-Diffie-Hellman-Gruppen mit Hilfe des Forking-Lemmas. Universität Paderborn; 2012.","apa":"Löken, N. (2012). Identitätsbasierte Signaturen - Ein Sicherheitsbeweis für Signaturen auf Grundlage von Gap-Diffie-Hellman-Gruppen mit Hilfe des Forking-Lemmas. Universität Paderborn.","chicago":"Löken, Nils. Identitätsbasierte Signaturen - Ein Sicherheitsbeweis für Signaturen auf Grundlage von Gap-Diffie-Hellman-Gruppen mit Hilfe des Forking-Lemmas. Universität Paderborn, 2012.","mla":"Löken, Nils. Identitätsbasierte Signaturen - Ein Sicherheitsbeweis für Signaturen auf Grundlage von Gap-Diffie-Hellman-Gruppen mit Hilfe des Forking-Lemmas. Universität Paderborn, 2012.","bibtex":"@book{Löken_2012, title={Identitätsbasierte Signaturen - Ein Sicherheitsbeweis für Signaturen auf Grundlage von Gap-Diffie-Hellman-Gruppen mit Hilfe des Forking-Lemmas}, publisher={Universität Paderborn}, author={Löken, Nils}, year={2012} }","short":"N. Löken, Identitätsbasierte Signaturen - Ein Sicherheitsbeweis für Signaturen auf Grundlage von Gap-Diffie-Hellman-Gruppen mit Hilfe des Forking-Lemmas, Universität Paderborn, 2012.","ieee":"N. Löken, Identitätsbasierte Signaturen - Ein Sicherheitsbeweis für Signaturen auf Grundlage von Gap-Diffie-Hellman-Gruppen mit Hilfe des Forking-Lemmas. Universität Paderborn, 2012."},"year":"2012","supervisor":[{"first_name":"Johannes","full_name":"Blömer, Johannes","last_name":"Blömer","id":"23"}],"language":[{"iso":"ger"}],"title":"Identitätsbasierte Signaturen - Ein Sicherheitsbeweis für Signaturen auf Grundlage von Gap-Diffie-Hellman-Gruppen mit Hilfe des Forking-Lemmas","user_id":"13703","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt C1","_id":"13"},{"_id":"4","name":"SFB 901 - Project Area C"}],"date_created":"2017-10-17T12:42:50Z","status":"public","department":[{"_id":"64"}],"author":[{"last_name":"Löken","id":"13703","first_name":"Nils","full_name":"Löken, Nils"}],"publisher":"Universität Paderborn"},{"_id":"607","date_updated":"2022-01-06T07:02:51Z","language":[{"iso":"ger"}],"supervisor":[{"full_name":"Blömer, Johannes","first_name":"Johannes","id":"23","last_name":"Blömer"}],"type":"bachelorsthesis","year":"2012","citation":{"mla":"Haarhoff, Thomas. Identitätsbasierte Kryptographie - Implementierung von Paarungen für Körper der Charakteristik 2. Universität Paderborn, 2012.","bibtex":"@book{Haarhoff_2012, title={Identitätsbasierte Kryptographie - Implementierung von Paarungen für Körper der Charakteristik 2}, publisher={Universität Paderborn}, author={Haarhoff, Thomas}, year={2012} }","apa":"Haarhoff, T. (2012). Identitätsbasierte Kryptographie - Implementierung von Paarungen für Körper der Charakteristik 2. Universität Paderborn.","ama":"Haarhoff T. Identitätsbasierte Kryptographie - Implementierung von Paarungen für Körper der Charakteristik 2. Universität Paderborn; 2012.","chicago":"Haarhoff, Thomas. Identitätsbasierte Kryptographie - Implementierung von Paarungen für Körper der Charakteristik 2. Universität Paderborn, 2012.","ieee":"T. Haarhoff, Identitätsbasierte Kryptographie - Implementierung von Paarungen für Körper der Charakteristik 2. Universität Paderborn, 2012.","short":"T. Haarhoff, Identitätsbasierte Kryptographie - Implementierung von Paarungen für Körper der Charakteristik 2, Universität Paderborn, 2012."},"user_id":"477","title":"Identitätsbasierte Kryptographie - Implementierung von Paarungen für Körper der Charakteristik 2","status":"public","date_created":"2017-10-17T12:42:50Z","project":[{"_id":"1","name":"SFB 901"},{"_id":"13","name":"SFB 901 - Subprojekt C1"},{"_id":"4","name":"SFB 901 - Project Area C"}],"author":[{"last_name":"Haarhoff","full_name":"Haarhoff, Thomas","first_name":"Thomas"}],"publisher":"Universität Paderborn","department":[{"_id":"64"}]},{"status":"public","date_created":"2017-10-17T12:42:54Z","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt C1","_id":"13"},{"name":"SFB 901 - Project Area C","_id":"4"},{"name":"Securing the Financial Cloud","_id":"43"}],"publisher":"Universität Paderborn","author":[{"last_name":"Schleiter","first_name":"Patrick","full_name":"Schleiter, Patrick"}],"department":[{"_id":"64"}],"user_id":"477","title":"Attribute-basierte Verschlüsselung","language":[{"iso":"ger"}],"supervisor":[{"full_name":"Blömer, Johannes","first_name":"Johannes","id":"23","last_name":"Blömer"}],"citation":{"short":"P. Schleiter, Attribute-basierte Verschlüsselung, Universität Paderborn, 2012.","ieee":"P. Schleiter, Attribute-basierte Verschlüsselung. Universität Paderborn, 2012.","ama":"Schleiter P. Attribute-basierte Verschlüsselung. Universität Paderborn; 2012.","apa":"Schleiter, P. (2012). Attribute-basierte Verschlüsselung. Universität Paderborn.","chicago":"Schleiter, Patrick. Attribute-basierte Verschlüsselung. Universität Paderborn, 2012.","mla":"Schleiter, Patrick. Attribute-basierte Verschlüsselung. Universität Paderborn, 2012.","bibtex":"@book{Schleiter_2012, title={Attribute-basierte Verschlüsselung}, publisher={Universität Paderborn}, author={Schleiter, Patrick}, year={2012} }"},"year":"2012","type":"bachelorsthesis","date_updated":"2022-01-06T07:03:00Z","_id":"629"},{"_id":"2902","date_updated":"2022-01-06T06:58:44Z","citation":{"bibtex":"@book{Märtens_2011, title={The Monotone Complexity of Computing k-Clique on Random Graphs}, author={Märtens, Marcus}, year={2011} }","mla":"Märtens, Marcus. The Monotone Complexity of Computing K-Clique on Random Graphs. 2011.","apa":"Märtens, M. (2011). The Monotone Complexity of Computing k-Clique on Random Graphs.","ama":"Märtens M. The Monotone Complexity of Computing K-Clique on Random Graphs.; 2011.","chicago":"Märtens, Marcus. The Monotone Complexity of Computing K-Clique on Random Graphs, 2011.","ieee":"M. Märtens, The Monotone Complexity of Computing k-Clique on Random Graphs. 2011.","short":"M. Märtens, The Monotone Complexity of Computing K-Clique on Random Graphs, 2011."},"year":"2011","type":"mastersthesis","supervisor":[{"id":"23","last_name":"Blömer","full_name":"Blömer, Johannes","first_name":"Johannes"}],"title":"The Monotone Complexity of Computing k-Clique on Random Graphs","user_id":"25078","author":[{"full_name":"Märtens, Marcus","first_name":"Marcus","last_name":"Märtens"}],"department":[{"_id":"64"}],"status":"public","date_created":"2018-05-25T09:46:27Z"},{"supervisor":[{"last_name":"Blömer","id":"23","first_name":"Johannes","full_name":"Blömer, Johannes"}],"citation":{"bibtex":"@book{Liske_2011, title={Fault attacks in pairing-based cryptography}, publisher={Universität Paderborn}, author={Liske, Gennadij}, year={2011} }","mla":"Liske, Gennadij. Fault Attacks in Pairing-Based Cryptography. Universität Paderborn, 2011.","chicago":"Liske, Gennadij. Fault Attacks in Pairing-Based Cryptography. Universität Paderborn, 2011.","apa":"Liske, G. (2011). Fault attacks in pairing-based cryptography. Universität Paderborn.","ama":"Liske G. Fault Attacks in Pairing-Based Cryptography. Universität Paderborn; 2011.","ieee":"G. Liske, Fault attacks in pairing-based cryptography. Universität Paderborn, 2011.","short":"G. Liske, Fault Attacks in Pairing-Based Cryptography, Universität Paderborn, 2011."},"year":"2011","type":"mastersthesis","date_updated":"2022-01-06T07:03:13Z","_id":"659","status":"public","has_accepted_license":"1","date_created":"2017-10-17T12:43:00Z","project":[{"_id":"1","name":"SFB 901"},{"_id":"13","name":"SFB 901 - Subprojekt C1"},{"_id":"4","name":"SFB 901 - Project Area C"},{"name":"Securing the Financial Cloud","_id":"43"}],"file":[{"content_type":"application/pdf","date_updated":"2018-03-14T13:47:44Z","relation":"main_file","success":1,"file_size":1795920,"creator":"florida","file_id":"1218","access_level":"closed","date_created":"2018-03-14T13:47:44Z","file_name":"659-MA_Fault_attacks_in_pairing-based_cryptography_01.pdf"}],"author":[{"last_name":"Liske","first_name":"Gennadij","full_name":"Liske, Gennadij"}],"publisher":"Universität Paderborn","department":[{"_id":"64"}],"file_date_updated":"2018-03-14T13:47:44Z","user_id":"25078","ddc":["040"],"title":"Fault attacks in pairing-based cryptography"},{"status":"public","has_accepted_license":"1","date_created":"2018-05-25T09:07:25Z","author":[{"full_name":"Schröer, Carsten","first_name":"Carsten","last_name":"Schröer"}],"file_date_updated":"2018-05-25T09:07:18Z","department":[{"_id":"64"}],"file":[{"access_level":"closed","file_name":"2009_Schroeer_HierarchischesDurchmesserClustering.pdf","date_created":"2018-05-25T09:07:18Z","success":1,"relation":"main_file","content_type":"application/pdf","date_updated":"2018-05-25T09:07:18Z","creator":"feidens","file_id":"2881","file_size":626531}],"title":"Hierarchisches Clustering mit minimalen Cluster-Durchmessern","ddc":["000"],"user_id":"25078","year":"2009","citation":{"bibtex":"@book{Schröer_2009, title={Hierarchisches Clustering mit minimalen Cluster-Durchmessern}, author={Schröer, Carsten}, year={2009} }","mla":"Schröer, Carsten. Hierarchisches Clustering Mit Minimalen Cluster-Durchmessern. 2009.","ama":"Schröer C. Hierarchisches Clustering Mit Minimalen Cluster-Durchmessern.; 2009.","apa":"Schröer, C. (2009). Hierarchisches Clustering mit minimalen Cluster-Durchmessern.","chicago":"Schröer, Carsten. Hierarchisches Clustering Mit Minimalen Cluster-Durchmessern, 2009.","ieee":"C. Schröer, Hierarchisches Clustering mit minimalen Cluster-Durchmessern. 2009.","short":"C. Schröer, Hierarchisches Clustering Mit Minimalen Cluster-Durchmessern, 2009."},"type":"bachelorsthesis","supervisor":[{"id":"23","last_name":"Blömer","full_name":"Blömer, Johannes","first_name":"Johannes"}],"_id":"2880","date_updated":"2022-01-06T06:58:25Z"},{"_id":"2904","date_updated":"2022-01-06T06:58:44Z","supervisor":[{"last_name":"Blömer","id":"23","first_name":"Johannes","full_name":"Blömer, Johannes"}],"type":"mastersthesis","year":"2009","citation":{"ieee":"C. Scholz, Die Schwierigkeit des k-Median Clusterings für Bregman-Divergenzen. 2009.","short":"C. Scholz, Die Schwierigkeit Des K-Median Clusterings Für Bregman-Divergenzen, 2009.","mla":"Scholz, Christoph. Die Schwierigkeit Des K-Median Clusterings Für Bregman-Divergenzen. 2009.","bibtex":"@book{Scholz_2009, title={Die Schwierigkeit des k-Median Clusterings für Bregman-Divergenzen}, author={Scholz, Christoph}, year={2009} }","apa":"Scholz, C. (2009). Die Schwierigkeit des k-Median Clusterings für Bregman-Divergenzen.","ama":"Scholz C. Die Schwierigkeit Des K-Median Clusterings Für Bregman-Divergenzen.; 2009.","chicago":"Scholz, Christoph. Die Schwierigkeit Des K-Median Clusterings Für Bregman-Divergenzen, 2009."},"user_id":"25078","title":"Die Schwierigkeit des k-Median Clusterings für Bregman-Divergenzen","ddc":["000"],"file":[{"access_level":"closed","file_name":"2009_Scholz_DieSchwierigkeitDesKMedianClusteringsFuerBregmanDivergenzen.pdf","date_created":"2018-05-25T09:48:10Z","date_updated":"2018-05-25T09:48:10Z","content_type":"application/pdf","success":1,"relation":"main_file","file_size":844164,"file_id":"2905","creator":"feidens"}],"author":[{"full_name":"Scholz, Christoph","first_name":"Christoph","last_name":"Scholz"}],"department":[{"_id":"64"}],"file_date_updated":"2018-05-25T09:48:10Z","status":"public","has_accepted_license":"1","date_created":"2018-05-25T09:48:17Z"},{"department":[{"_id":"64"}],"author":[{"first_name":"Marcel Rudolf","full_name":"Ackermann, Marcel Rudolf","last_name":"Ackermann"}],"publisher":"Universität Paderborn","date_created":"2018-05-25T10:48:51Z","status":"public","title":"Algorithms for the Bregman k-Median Problem","user_id":"25078","main_file_link":[{"url":"http://digital.ub.uni-paderborn.de/hs/content/titleinfo/1561"}],"type":"dissertation","year":"2009","citation":{"apa":"Ackermann, M. R. (2009). Algorithms for the Bregman k-Median Problem. Universität Paderborn.","ama":"Ackermann MR. Algorithms for the Bregman K-Median Problem. Universität Paderborn; 2009.","chicago":"Ackermann, Marcel Rudolf. Algorithms for the Bregman K-Median Problem. Universität Paderborn, 2009.","mla":"Ackermann, Marcel Rudolf. Algorithms for the Bregman K-Median Problem. Universität Paderborn, 2009.","bibtex":"@book{Ackermann_2009, title={Algorithms for the Bregman k-Median Problem}, publisher={Universität Paderborn}, author={Ackermann, Marcel Rudolf}, year={2009} }","short":"M.R. Ackermann, Algorithms for the Bregman K-Median Problem, Universität Paderborn, 2009.","ieee":"M. R. Ackermann, Algorithms for the Bregman k-Median Problem. Universität Paderborn, 2009."},"supervisor":[{"id":"23","last_name":"Blömer","full_name":"Blömer, Johannes","first_name":"Johannes"}],"_id":"2911","date_updated":"2022-01-06T06:58:46Z"},{"date_updated":"2022-01-06T06:58:46Z","_id":"2912","main_file_link":[{"url":"http://nbn-resolving.de/urn:nbn:de:hbz:466-20080110018"}],"supervisor":[{"first_name":"Johannes","full_name":"Blömer, Johannes","last_name":"Blömer","id":"23"}],"year":"2007","type":"dissertation","citation":{"short":"V. Krummel, Tamper Resistance of AES -- Models, Attacks and Countermeasures, Universität Paderborn, 2007.","ieee":"V. Krummel, Tamper Resistance of AES -- Models, Attacks and Countermeasures. Universität Paderborn, 2007.","apa":"Krummel, V. (2007). Tamper Resistance of AES -- Models, Attacks and Countermeasures. Universität Paderborn.","ama":"Krummel V. Tamper Resistance of AES -- Models, Attacks and Countermeasures. Universität Paderborn; 2007.","chicago":"Krummel, Volker. Tamper Resistance of AES -- Models, Attacks and Countermeasures. Universität Paderborn, 2007.","mla":"Krummel, Volker. Tamper Resistance of AES -- Models, Attacks and Countermeasures. Universität Paderborn, 2007.","bibtex":"@book{Krummel_2007, title={Tamper Resistance of AES -- Models, Attacks and Countermeasures}, publisher={Universität Paderborn}, author={Krummel, Volker}, year={2007} }"},"user_id":"25078","title":"Tamper Resistance of AES -- Models, Attacks and Countermeasures","department":[{"_id":"64"}],"author":[{"first_name":"Volker","full_name":"Krummel, Volker","last_name":"Krummel"}],"publisher":"Universität Paderborn","date_created":"2018-05-25T10:49:53Z","status":"public"},{"year":"2007","type":"bachelorsthesis","citation":{"short":"A.C. Landwehr, Untersuchungen zur Sicherheit einzelner RSA Bits, 2007.","ieee":"A. C. Landwehr, Untersuchungen zur Sicherheit einzelner RSA Bits. 2007.","ama":"Landwehr AC. Untersuchungen zur Sicherheit einzelner RSA Bits.; 2007.","apa":"Landwehr, A. C. (2007). Untersuchungen zur Sicherheit einzelner RSA Bits.","chicago":"Landwehr, Andreas Cord. Untersuchungen zur Sicherheit einzelner RSA Bits, 2007.","bibtex":"@book{Landwehr_2007, title={Untersuchungen zur Sicherheit einzelner RSA Bits}, author={Landwehr, Andreas Cord}, year={2007} }","mla":"Landwehr, Andreas Cord. Untersuchungen zur Sicherheit einzelner RSA Bits. 2007."},"supervisor":[{"full_name":"Blömer, Johannes","first_name":"Johannes","id":"23","last_name":"Blömer"}],"language":[{"iso":"ger"}],"oa":"1","date_updated":"2023-10-05T22:10:22Z","_id":"2887","date_created":"2018-05-25T09:12:40Z","status":"public","has_accepted_license":"1","file_date_updated":"2023-10-05T22:10:21Z","department":[{"_id":"64"}],"author":[{"full_name":"Landwehr, Andreas Cord","first_name":"Andreas Cord","last_name":"Landwehr"}],"file":[{"file_size":889440,"creator":"feidens","file_id":"2888","date_updated":"2023-10-05T22:10:21Z","content_type":"application/pdf","relation":"main_file","date_created":"2018-05-25T09:12:31Z","file_name":"2007_CordLandwehr_UntersuchungenZurSicherheitEinzelnerRSABits.pdf","access_level":"open_access"}],"ddc":["000"],"title":"Untersuchungen zur Sicherheit einzelner RSA Bits","user_id":"41047"},{"user_id":"25078","title":"Fault Attacks and Countermeasures","date_created":"2018-05-25T10:50:49Z","status":"public","department":[{"_id":"64"}],"publisher":"Universität Paderborn","author":[{"last_name":"Otto","first_name":"Martin","full_name":"Otto, Martin"}],"date_updated":"2022-01-06T06:58:46Z","_id":"2913","supervisor":[{"last_name":"Blömer","id":"23","first_name":"Johannes","full_name":"Blömer, Johannes"}],"type":"dissertation","year":"2005","citation":{"apa":"Otto, M. (2005). Fault Attacks and Countermeasures. Universität Paderborn.","ama":"Otto M. Fault Attacks and Countermeasures. Universität Paderborn; 2005.","chicago":"Otto, Martin. Fault Attacks and Countermeasures. Universität Paderborn, 2005.","bibtex":"@book{Otto_2005, title={Fault Attacks and Countermeasures}, publisher={Universität Paderborn}, author={Otto, Martin}, year={2005} }","mla":"Otto, Martin. Fault Attacks and Countermeasures. Universität Paderborn, 2005.","short":"M. Otto, Fault Attacks and Countermeasures, Universität Paderborn, 2005.","ieee":"M. Otto, Fault Attacks and Countermeasures. Universität Paderborn, 2005."},"main_file_link":[{"url":"http://nbn-resolving.de/urn:nbn:de:hbz:466-20040101308"}]},{"citation":{"ieee":"A. May, New RSA Vulnerabilities Using Lattice Reduction Methods. Universität Paderborn, 2003.","short":"A. May, New RSA Vulnerabilities Using Lattice Reduction Methods, Universität Paderborn, 2003.","bibtex":"@book{May_2003, title={New RSA Vulnerabilities Using Lattice Reduction Methods}, publisher={Universität Paderborn}, author={May, Alexander}, year={2003} }","mla":"May, Alexander. New RSA Vulnerabilities Using Lattice Reduction Methods. Universität Paderborn, 2003.","ama":"May A. New RSA Vulnerabilities Using Lattice Reduction Methods. Universität Paderborn; 2003.","apa":"May, A. (2003). New RSA Vulnerabilities Using Lattice Reduction Methods. Universität Paderborn.","chicago":"May, Alexander. New RSA Vulnerabilities Using Lattice Reduction Methods. Universität Paderborn, 2003."},"year":"2003","type":"dissertation","supervisor":[{"first_name":"Johannes","full_name":"Blömer, Johannes","last_name":"Blömer","id":"23"}],"main_file_link":[{"url":"http://nbn-resolving.de/urn:nbn:de:hbz:466-20030101205"}],"_id":"2914","date_updated":"2022-01-06T06:58:46Z","date_created":"2018-05-25T10:51:42Z","status":"public","department":[{"_id":"64"}],"publisher":"Universität Paderborn","author":[{"last_name":"May","first_name":"Alexander","full_name":"May, Alexander"}],"title":"New RSA Vulnerabilities Using Lattice Reduction Methods","user_id":"25078"}]