Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

109 Publications


2016 | Conference Paper | LibreCat-ID: 2947
J. Blömer and P. Günther, “Singular Curve Point Decompression Attack,” in 2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 2016.
LibreCat | DOI
 

2016 | Book Chapter | LibreCat-ID: 2948
P. Günther and V. Krummel, “Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures,” in Mathematical Aspects of Computer and Information Sciences, Cham: Springer International Publishing, 2016, pp. 151–165.
LibreCat | DOI
 

2016 | Book Chapter | LibreCat-ID: 2968
J. Blömer, C. Lammersen, M. Schmidt, and C. Sohler, “Theoretical Analysis of the k-Means Algorithm – A Survey,” in Algorithm Engineering, Cham: Springer International Publishing, 2016, pp. 81–116.
LibreCat | DOI
 

2016 | Preprint | LibreCat-ID: 2969 | OA
J. Blömer, S. Brauer, and K. Bujna, “Hard-Clustering with Gaussian Mixture Models.” Computing Research Repository, 2016.
LibreCat | Download (ext.)
 

2016 | Book Chapter | LibreCat-ID: 2970
J. Blömer and K. Bujna, “Adaptive Seeding for Gaussian Mixture Models,” in Advances in Knowledge Discovery and Data Mining, Cham: Springer International Publishing, 2016, pp. 296–308.
LibreCat | DOI
 

2016 | Report | LibreCat-ID: 2971
J. Blömer and P. Günther, Effizienz und Sicherheit paarungsbasierter Kryptographie. Tagungsband des 26. Fraunhofer SIT Smartcard-Workshops, 2016.
LibreCat
 

2016 | Conference Paper | LibreCat-ID: 2367
J. Blömer, S. Brauer, and K. Bujna, “A Theoretical Analysis of the Fuzzy K-Means Problem,” in 2016 IEEE 16th International Conference on Data Mining (ICDM), Barcelona, Spain, 2016, pp. 805–810.
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 208
J. Blömer and G. Liske, “Construction of Fully CCA-Secure Predicate Encryptions from Pair Encoding Schemes,” in Proceedings of the CT-RSA 2016, 2016, pp. 431–447.
LibreCat | Files available | DOI
 

2016 | Dissertation | LibreCat-ID: 167
P. Günther, Physical attacks on pairing-based cryptography. Universität Paderborn, 2016.
LibreCat | Files available | Download (ext.)
 

2016 | Book Chapter | LibreCat-ID: 2978
J. Blömer and K. Bujna, “Adaptive Seeding for Gaussian Mixture Models,” in Advances in Knowledge Discovery and Data Mining, Cham: Springer International Publishing, 2016, pp. 296–308.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 253
J. Blömer, J. Juhnke, and N. Löken, “Short Group Signatures with Distributed Traceability,” in Proceedings of the Sixth International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS), 2015, pp. 166–180.
LibreCat | Files available | DOI
 

2015 | Conference Paper | LibreCat-ID: 322 | OA
J. Blömer, J. Juhnke, and C. Kolb, “Anonymous and Publicly Linkable Reputation Systems,” in Proceedings of the 18th International Conference on Financial Cryptography and Data Security (FC), 2015, pp. 478--488.
LibreCat | Files available | DOI | Download (ext.)
 

2015 | Report | LibreCat-ID: 233 | OA
J. Blömer and K. Kohn, Voronoi Cells of Lattices with Respect to Arbitrary Norms. Universität Paderborn, 2015.
LibreCat | Files available | Download (ext.)
 

2014 | Conference Paper | LibreCat-ID: 355
J. Blömer, P. Günther, and G. Liske, “Tampering attacks in pairing-based cryptography,” in Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC), 2014, pp. 1--7.
LibreCat | Files available | DOI
 

2014 | Journal Article | LibreCat-ID: 2976
M. R. Ackermann, J. Blömer, D. Kuntze, and C. Sohler, “Analysis of Agglomerative Clustering,” Algorithmica, vol. 69, 2014.
LibreCat | DOI
 

2014 | Conference Paper | LibreCat-ID: 2977
J. Blömer, K. Bujna, and D. Kuntze, “A Theoretical and Experimental Comparison of the EM and SEM Algorithm,” in 2014 22nd International Conference on Pattern Recognition, 2014.
LibreCat | DOI
 

2014 | Preprint | LibreCat-ID: 442 | OA
J. Blömer and G. Liske, “Constructing CCA-secure predicate encapsulation schemes from CPA-secure schemes and universal one-way hash functions.” Universität Paderborn, 2014.
LibreCat | Files available | Download (ext.)
 

2014 | Conference Paper | LibreCat-ID: 463
J. Blömer, R. Gomes da Silva, P. Günther, J. Krämer, and J.-P. Seifert, “A Practical Second-Order Fault Attack against a Real-World Pairing Implementation,” in Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC), 2014, pp. 123--136.
LibreCat | Files available | DOI
 

2013 | Dissertation | LibreCat-ID: 2909
D. Kuntze, Practical algorithms for clustering and modeling large data sets - Analysis and improvements. Universität Paderborn, 2013.
LibreCat | Download (ext.)
 

2013 | Report | LibreCat-ID: 2917
J. Juhnke, H. Lefmann, and V. Strehl, An Approach for Determining Optimal Contrast in Visual Cryptography. Fortschritt-Berichte VDI, 2013.
LibreCat
 

Filters and Search Terms

(department=64) AND (type=book OR type=book_editor OR type=book_chapter OR type=publicationtype_review OR type=conference_abstract OR type=conference_editor OR type=conference OR type=dissertation OR type=encyclopedia_article OR type=journal_article OR type=journal_editor OR type=newspaper_article OR type=patent OR type=preprint OR type=report OR type=translation OR type=translation_chapter OR type=working_paper OR type=research_data)

Search

Filter Publications

Display / Sort

Citation Style: IEEE

Export / Embed