Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

109 Publications


2013 | Conference Paper | LibreCat-ID: 488
Blömer J, Günther P, Krummel V. Securing Critical Unattended Systems with Identity Based Cryptography - A Case Study. In: Proceedings of the 5th International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS). ; 2013:98-105.
LibreCat | Files available
 

2015 | Conference Paper | LibreCat-ID: 253
Blömer J, Juhnke J, Löken N. Short Group Signatures with Distributed Traceability. In: Proceedings of the Sixth International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS). LNCS. ; 2015:166-180. doi:10.1007/978-3-319-32859-1_14
LibreCat | Files available | DOI
 

2006 | Book Chapter | LibreCat-ID: 3007
Blömer J, Otto M, Seifert J-P. Sign Change Fault Attacks on Elliptic Curve Cryptosystems. In: Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg; 2006:36-52. doi:10.1007/11889700_4
LibreCat | Files available | DOI
 

1992 | Dissertation | LibreCat-ID: 3043
Blömer J. Simplifying Expressions Involving Radicals. PhD thesis, Freie Universität Berlin, Fachbereich Mathematik und Informatik; 1992.
LibreCat | Files available
 

2016 | Conference Paper | LibreCat-ID: 2947
Blömer J, Günther P. Singular Curve Point Decompression Attack. In: 2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC). IEEE; 2016. doi:10.1109/fdtc.2015.17
LibreCat | DOI
 

2017 | Dissertation | LibreCat-ID: 2908
Bujna K. Soft Clustering Algorithms - Theoretical and Practical Improvements. Universität Paderborn; 2017. doi:10.17619/UNIPB/1-226
LibreCat | DOI | Download (ext.)
 

2011 | Preprint | LibreCat-ID: 2987
Blömer J, Naewe S. Solving the Closest Vector Problem with respect to Lp Norms. arXiv:11043720. 2011.
LibreCat
 

2012 | Conference Paper | LibreCat-ID: 2982
Ackermann MR, Märtens M, Raupach C, Swierkot K, Lammersen C, Sohler C. StreamKM++: A clustering algorithm for data streams. 2012;17. doi:10.1145/2133803.2184450
LibreCat | DOI
 

2017 | Conference Paper | LibreCat-ID: 2967 | OA
Blömer J, Liske G. Subtleties in Security Definitions for Predicate Encryption with Public Index. In: Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS). Vol 10693. Lecture Notes in Computer Science. Cham: Springer International Publishing; 2017:438-453. doi:10.1007/978-3-319-72453-9_35
LibreCat | Files available | DOI | Download (ext.)
 

2007 | Dissertation | LibreCat-ID: 2912
Krummel V. Tamper Resistance of AES -- Models, Attacks and Countermeasures. Universität Paderborn; 2007.
LibreCat | Download (ext.)
 

Filters and Search Terms

(department=64) AND (type=book OR type=book_editor OR type=book_chapter OR type=publicationtype_review OR type=conference_abstract OR type=conference_editor OR type=conference OR type=dissertation OR type=encyclopedia_article OR type=journal_article OR type=journal_editor OR type=newspaper_article OR type=patent OR type=preprint OR type=report OR type=translation OR type=translation_chapter OR type=working_paper OR type=research_data)

status=public

Search

Filter Publications

Display / Sort

Sorted by: Title , First Author
Citation Style: AMA

Export / Embed