Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
76 Publications
2015 | Bachelorsthesis | LibreCat-ID: 326
Heihoff F. A Group Signature Scheme Based on the LSRW Assumption. Universität Paderborn; 2015.
LibreCat
2015 | Mastersthesis | LibreCat-ID: 297
Sosniak M. Evaluation of Pairing Optimization for Embedded Platforms. Universität Paderborn; 2015.
LibreCat
2015 | Mastersthesis | LibreCat-ID: 299
Gerken B. Elektromagnetische Seitenkanalangriffe auf paarungsbasierte Kryptographie. Universität Paderborn; 2015.
LibreCat
2015 | Mastersthesis | LibreCat-ID: 301 |
Bobolz J. Efficient Verifier-Local Revocation for Anonymous Credentials. Universität Paderborn; 2015.
LibreCat
| Files available
2015 | Mastersthesis | LibreCat-ID: 302
Stroh C. Efficient Attributes for Pairing-Based Anonymous Credentials. Universität Paderborn; 2015.
LibreCat
2015 | Mastersthesis | LibreCat-ID: 312
Schleiter P. Constructions of Fully Secure Predicate Encryption Schemes. Universität Paderborn; 2015.
LibreCat
| Files available
2015 | Mastersthesis | LibreCat-ID: 273
Kohn K. Number of Voronoi-Relevant Vectors in Lattices with Respect to Arbitrary Norms. Universität Paderborn; 2015.
LibreCat
2015 | Report | LibreCat-ID: 233 |
Blömer J, Kohn K. Voronoi Cells of Lattices with Respect to Arbitrary Norms. Universität Paderborn; 2015.
LibreCat
| Files available
| Download (ext.)
2014 | Conference Paper | LibreCat-ID: 355
Blömer J, Günther P, Liske G. Tampering attacks in pairing-based cryptography. In: Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC). ; 2014:1--7. doi:10.1109/FDTC.2014.10
LibreCat
| Files available
| DOI
2014 | Bachelorsthesis | LibreCat-ID: 369
Rath T. RSA-Full Domain Hash Revisited. Universität Paderborn; 2014.
LibreCat
2014 | Preprint | LibreCat-ID: 442 |
Blömer J, Liske G. Constructing CCA-secure predicate encapsulation schemes from CPA-secure schemes and universal one-way hash functions. 2014.
LibreCat
| Files available
| Download (ext.)
2014 | Conference Paper | LibreCat-ID: 463
Blömer J, Gomes da Silva R, Günther P, Krämer J, Seifert J-P. A Practical Second-Order Fault Attack against a Real-World Pairing Implementation. In: Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC). ; 2014:123--136. doi:10.1109/FDTC.2014.22
LibreCat
| Files available
| DOI
2014 | Mastersthesis | LibreCat-ID: 414
Jochheim J. Hiding Software Components Using Functional Encryption. Universität Paderborn; 2014.
LibreCat
2014 | Bachelorsthesis | LibreCat-ID: 416
Bemmann P. Group Signature Schemes with Strong Exculpability. Universität Paderborn; 2014.
LibreCat
2014 | Bachelorsthesis | LibreCat-ID: 421
Lippert J. Fujisaki-Okamoto Transformation. Universität Paderborn; 2014.
LibreCat
2013 | Bachelorsthesis | LibreCat-ID: 471
Tezer A. Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen. Universität Paderborn; 2013.
LibreCat
2013 | Bachelorsthesis | LibreCat-ID: 486
Otte O. Seitenkanalresistenz paarungsbasierter Kryptographie. Universität Paderborn; 2013.
LibreCat
2013 | Bachelorsthesis | LibreCat-ID: 487 |
Bobolz J. Security Proofs for Pairing-Based Cryptography in the Generic Group Model. Universität Paderborn; 2013.
LibreCat
| Files available
2013 | Conference Paper | LibreCat-ID: 488
Blömer J, Günther P, Krummel V. Securing Critical Unattended Systems with Identity Based Cryptography - A Case Study. In: Proceedings of the 5th International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS). ; 2013:98-105.
LibreCat
| Files available
2013 | Preprint | LibreCat-ID: 538 |
Blömer J, Liske G. Direct Chosen-Ciphertext Secure Attribute-Based Key Encapsulations without Random Oracles. 2013.
LibreCat
| Files available
| Download (ext.)