Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

109 Publications


2022 | Dissertation | LibreCat-ID: 35188
Privacy-Preserving Cryptography: Attribute-Based Signatures and Updatable Credentials
F. Eidens, Privacy-Preserving Cryptography: Attribute-Based Signatures and Updatable Credentials, 2022.
LibreCat | DOI
 

2020 | Conference Paper | LibreCat-ID: 16487 | OA
Privacy-Preserving Incentive Systems with Highly Efficient Point-Collection
J. Bobolz, F. Eidens, S. Krenn, D. Slamanig, C. Striecks, in: Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (ASIA CCS ’20), ACM, New York, NY, USA, 2020.
LibreCat | Files available | DOI | Download (ext.)
 

2018 | Working Paper | LibreCat-ID: 5820
Provably Anonymous Communication Based on Trusted Execution Environments
J. Blömer, J. Bobolz, C. Scheideler, A. Setzer, Provably Anonymous Communication Based on Trusted Execution Environments, n.d.
LibreCat | Files available
 

2004 | Book Chapter | LibreCat-ID: 3011
Provably Secure Masking of AES
J. Blömer, J. Guajardo, V. Krummel, in: Selected Areas in Cryptography, Springer Berlin Heidelberg, Berlin, Heidelberg, 2004, pp. 69–83.
LibreCat | DOI
 

2006 | Journal Article | LibreCat-ID: 3003
Randomness and Secrecy - A Brief Introduction
J. Blömer, Journal of Universal Computer Science (J.UCS) (2006) 654--671.
LibreCat | DOI
 

2008 | Conference Paper | LibreCat-ID: 3001
Reliable Evidence of Data Integrity from an Untrusted Storage Service
C. Stern, P. Adelt, V. Krummel, M.R. Ackermann, in: Fourth International Conference on Networking and Services (Icns 2008), IEEE, 2008.
LibreCat | DOI
 

1992 | Book Chapter | LibreCat-ID: 3046
Resemblance and symmetries of geometric patterns
H. Alt, J. Blömer, in: Data Structures and Efficient Algorithms, Springer Berlin Heidelberg, Berlin, Heidelberg, 1992, pp. 1–24.
LibreCat | DOI
 

2009 | Journal Article | LibreCat-ID: 2999
Sampling methods for shortest vectors, closest vectors and successive minima
J. Blömer, S. Naewe, Theoretical Computer Science (2009) 1648–1665.
LibreCat | DOI
 

2017 | Conference Paper | LibreCat-ID: 2343 | OA
Searchable Encryption with Access Control
N. Löken, in: Proceedings of the 12th International Conference on Availability, Reliability and Security  - ARES ’17, ACM Press, 2017.
LibreCat | Files available | DOI | Download (ext.)
 

2004 | Book Chapter | LibreCat-ID: 3014
Secret Exponent Attacks on RSA-type Schemes with Moduli N=p^{r}q
A. May, in: Public Key Cryptography – PKC 2004, Springer Berlin Heidelberg, Berlin, Heidelberg, 2004, pp. 218–230.
LibreCat | DOI
 

2013 | Conference Paper | LibreCat-ID: 488
Securing Critical Unattended Systems with Identity Based Cryptography - A Case Study
J. Blömer, P. Günther, V. Krummel, in: Proceedings of the 5th International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS), 2013, pp. 98–105.
LibreCat | Files available
 

2015 | Conference Paper | LibreCat-ID: 253
Short Group Signatures with Distributed Traceability
J. Blömer, J. Juhnke, N. Löken, in: Proceedings of the Sixth International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS), 2015, pp. 166–180.
LibreCat | Files available | DOI
 

2006 | Book Chapter | LibreCat-ID: 3007
Sign Change Fault Attacks on Elliptic Curve Cryptosystems
J. Blömer, M. Otto, J.-P. Seifert, in: Lecture Notes in Computer Science, Springer Berlin Heidelberg, Berlin, Heidelberg, 2006, pp. 36–52.
LibreCat | Files available | DOI
 

1992 | Dissertation | LibreCat-ID: 3043
Simplifying Expressions Involving Radicals
J. Blömer, Simplifying Expressions Involving Radicals, PhD thesis, Freie Universität Berlin, Fachbereich Mathematik und Informatik, 1992.
LibreCat | Files available
 

2016 | Conference Paper | LibreCat-ID: 2947
Singular Curve Point Decompression Attack
J. Blömer, P. Günther, in: 2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), IEEE, 2016.
LibreCat | DOI
 

2017 | Dissertation | LibreCat-ID: 2908
Soft Clustering Algorithms - Theoretical and Practical Improvements
K. Bujna, Soft Clustering Algorithms - Theoretical and Practical Improvements, Universität Paderborn, 2017.
LibreCat | DOI | Download (ext.)
 

2011 | Preprint | LibreCat-ID: 2987
Solving the Closest Vector Problem with respect to Lp Norms
J. Blömer, S. Naewe, ArXiv:1104.3720 (2011).
LibreCat
 

2012 | Conference Paper | LibreCat-ID: 2982
StreamKM++: A clustering algorithm for data streams
M.R. Ackermann, M. Märtens, C. Raupach, K. Swierkot, C. Lammersen, C. Sohler, 17 (2012).
LibreCat | DOI
 

2017 | Conference Paper | LibreCat-ID: 2967 | OA
Subtleties in Security Definitions for Predicate Encryption with Public Index
J. Blömer, G. Liske, in: Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS), Springer International Publishing, Cham, 2017, pp. 438–453.
LibreCat | Files available | DOI | Download (ext.)
 

2007 | Dissertation | LibreCat-ID: 2912
Tamper Resistance of AES -- Models, Attacks and Countermeasures
V. Krummel, Tamper Resistance of AES -- Models, Attacks and Countermeasures, Universität Paderborn, 2007.
LibreCat | Download (ext.)
 

Filters and Search Terms

(department=64) AND (type=book OR type=book_editor OR type=book_chapter OR type=publicationtype_review OR type=conference_abstract OR type=conference_editor OR type=conference OR type=dissertation OR type=encyclopedia_article OR type=journal_article OR type=journal_editor OR type=newspaper_article OR type=patent OR type=preprint OR type=report OR type=translation OR type=translation_chapter OR type=working_paper OR type=research_data)

status=public

Search

Filter Publications

Display / Sort

Sorted by: Title , First Author

Export / Embed