Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

109 Publications


2022 | Dissertation | LibreCat-ID: 35188
Eidens F. Privacy-Preserving Cryptography: Attribute-Based Signatures and Updatable Credentials.; 2022. doi:10.17619/UNIPB/1-1653
LibreCat | DOI
 

2020 | Conference Paper | LibreCat-ID: 16487 | OA
Bobolz J, Eidens F, Krenn S, Slamanig D, Striecks C. Privacy-Preserving Incentive Systems with Highly Efficient Point-Collection. In: Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (ASIA CCS ’20),. New York, NY, USA: ACM; 2020. doi:10.1145/3320269.3384769
LibreCat | Files available | DOI | Download (ext.)
 

2018 | Working Paper | LibreCat-ID: 5820
Blömer J, Bobolz J, Scheideler C, Setzer A. Provably Anonymous Communication Based on Trusted Execution Environments.
LibreCat | Files available
 

2004 | Book Chapter | LibreCat-ID: 3011
Blömer J, Guajardo J, Krummel V. Provably Secure Masking of AES. In: Selected Areas in Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg; 2004:69-83. doi:10.1007/978-3-540-30564-4_5
LibreCat | DOI
 

2006 | Journal Article | LibreCat-ID: 3003
Blömer J. Randomness and Secrecy - A Brief Introduction. Journal of Universal Computer Science (JUCS). 2006;(6):654--671. doi:10.3217/jucs-012-06-0654
LibreCat | DOI
 

2008 | Conference Paper | LibreCat-ID: 3001
Stern C, Adelt P, Krummel V, Ackermann MR. Reliable Evidence of Data Integrity from an Untrusted Storage Service. In: Fourth International Conference on Networking and Services (Icns 2008). IEEE; 2008. doi:10.1109/icns.2008.28
LibreCat | DOI
 

1992 | Book Chapter | LibreCat-ID: 3046
Alt H, Blömer J. Resemblance and symmetries of geometric patterns. In: Data Structures and Efficient Algorithms. Berlin, Heidelberg: Springer Berlin Heidelberg; 1992:1-24. doi:10.1007/3-540-55488-2_19
LibreCat | DOI
 

2009 | Journal Article | LibreCat-ID: 2999
Blömer J, Naewe S. Sampling methods for shortest vectors, closest vectors and successive minima. Theoretical Computer Science. 2009;(18):1648-1665. doi:10.1016/j.tcs.2008.12.045
LibreCat | DOI
 

2017 | Conference Paper | LibreCat-ID: 2343 | OA
Löken N. Searchable Encryption with Access Control. In: Proceedings of the 12th International Conference on Availability, Reliability and Security  - ARES ’17. ICPS. ACM Press; 2017. doi:10.1145/3098954.3098987
LibreCat | Files available | DOI | Download (ext.)
 

2004 | Book Chapter | LibreCat-ID: 3014
May A. Secret Exponent Attacks on RSA-type Schemes with Moduli N=p^{r}q. In: Public Key Cryptography – PKC 2004. Berlin, Heidelberg: Springer Berlin Heidelberg; 2004:218-230. doi:10.1007/978-3-540-24632-9_16
LibreCat | DOI
 

2013 | Conference Paper | LibreCat-ID: 488
Blömer J, Günther P, Krummel V. Securing Critical Unattended Systems with Identity Based Cryptography - A Case Study. In: Proceedings of the 5th International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS). ; 2013:98-105.
LibreCat | Files available
 

2015 | Conference Paper | LibreCat-ID: 253
Blömer J, Juhnke J, Löken N. Short Group Signatures with Distributed Traceability. In: Proceedings of the Sixth International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS). LNCS. ; 2015:166-180. doi:10.1007/978-3-319-32859-1_14
LibreCat | Files available | DOI
 

2006 | Book Chapter | LibreCat-ID: 3007
Blömer J, Otto M, Seifert J-P. Sign Change Fault Attacks on Elliptic Curve Cryptosystems. In: Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg; 2006:36-52. doi:10.1007/11889700_4
LibreCat | Files available | DOI
 

1992 | Dissertation | LibreCat-ID: 3043
Blömer J. Simplifying Expressions Involving Radicals. PhD thesis, Freie Universität Berlin, Fachbereich Mathematik und Informatik; 1992.
LibreCat | Files available
 

2016 | Conference Paper | LibreCat-ID: 2947
Blömer J, Günther P. Singular Curve Point Decompression Attack. In: 2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC). IEEE; 2016. doi:10.1109/fdtc.2015.17
LibreCat | DOI
 

2017 | Dissertation | LibreCat-ID: 2908
Bujna K. Soft Clustering Algorithms - Theoretical and Practical Improvements. Universität Paderborn; 2017. doi:10.17619/UNIPB/1-226
LibreCat | DOI | Download (ext.)
 

2011 | Preprint | LibreCat-ID: 2987
Blömer J, Naewe S. Solving the Closest Vector Problem with respect to Lp Norms. arXiv:11043720. 2011.
LibreCat
 

2012 | Conference Paper | LibreCat-ID: 2982
Ackermann MR, Märtens M, Raupach C, Swierkot K, Lammersen C, Sohler C. StreamKM++: A clustering algorithm for data streams. 2012;17. doi:10.1145/2133803.2184450
LibreCat | DOI
 

2017 | Conference Paper | LibreCat-ID: 2967 | OA
Blömer J, Liske G. Subtleties in Security Definitions for Predicate Encryption with Public Index. In: Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS). Vol 10693. Lecture Notes in Computer Science. Cham: Springer International Publishing; 2017:438-453. doi:10.1007/978-3-319-72453-9_35
LibreCat | Files available | DOI | Download (ext.)
 

2007 | Dissertation | LibreCat-ID: 2912
Krummel V. Tamper Resistance of AES -- Models, Attacks and Countermeasures. Universität Paderborn; 2007.
LibreCat | Download (ext.)
 

Filters and Search Terms

(department=64) AND (type=book OR type=book_editor OR type=book_chapter OR type=publicationtype_review OR type=conference_abstract OR type=conference_editor OR type=conference OR type=dissertation OR type=encyclopedia_article OR type=journal_article OR type=journal_editor OR type=newspaper_article OR type=patent OR type=preprint OR type=report OR type=translation OR type=translation_chapter OR type=working_paper OR type=research_data)

status=public

Search

Filter Publications

Display / Sort

Sorted by: Title , First Author
Citation Style: AMA

Export / Embed