Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

109 Publications


2010 | Conference Paper | LibreCat-ID: 2994
@inproceedings{Schäfer_Trächtler_Birattari_Blömer_Dorigo_Engels_O’Grady_Platzner_Rammig_Reif_2010, title={Engineering self-coordinating software intensive systems}, DOI={10.1145/1882362.1882428}, booktitle={Proceedings of the FSE/SDP workshop on Future of software engineering research - FoSER ’10}, publisher={ACM Press}, author={Schäfer, Wilhelm and Trächtler, Ansgar and Birattari, Mauro and Blömer, Johannes and Dorigo, Marco and Engels, Gregor and O’Grady, Rehan and Platzner, Marco and Rammig, Franz and Reif, Wolfgang}, year={2010} }
LibreCat | DOI
 

2018 | Conference Paper | LibreCat-ID: 3873 | OA
@inproceedings{Blömer_Eidens_Juhnke_2018, series={Lecture Notes in Computer Science}, title={Enhanced Security of Attribute-Based Signatures}, volume={11124}, DOI={10.1007/978-3-030-00434-7_12}, booktitle={The International Conference on Cryptology And Network Security (CANS)}, publisher={Springer}, author={Blömer, Johannes and Eidens, Fabian and Juhnke, Jakob}, year={2018}, pages={235–255}, collection={Lecture Notes in Computer Science} }
LibreCat | Files available | DOI | Download (ext.)
 

2005 | Dissertation | LibreCat-ID: 2913
@book{Otto_2005, title={Fault Attacks and Countermeasures}, publisher={Universität Paderborn}, author={Otto, Martin}, year={2005} }
LibreCat | Download (ext.)
 

2006 | Book Chapter | LibreCat-ID: 3004
@inbook{Blömer_Krummel_2006, place={Berlin, Heidelberg}, title={Fault Based Collision Attacks on AES}, DOI={10.1007/11889700_11}, booktitle={Lecture Notes in Computer Science}, publisher={Springer Berlin Heidelberg}, author={Blömer, Johannes and Krummel, Volker}, year={2006}, pages={106–120} }
LibreCat | DOI
 

2003 | Book Chapter | LibreCat-ID: 3018
@inbook{Blömer_Seifert_2003, place={Berlin, Heidelberg}, title={Fault Based Cryptanalysis of the Advanced Encryption Standard (AES)}, DOI={10.1007/978-3-540-45126-6_12}, booktitle={Financial Cryptography}, publisher={Springer Berlin Heidelberg}, author={Blömer, Johannes and Seifert, Jean-Pierre}, year={2003}, pages={162–181} }
LibreCat | DOI
 

2018 | Conference Paper | LibreCat-ID: 3265 | OA
@inproceedings{Bemmann_Blömer_Bobolz_Bröcher_Diemert_Eidens_Eilers_Haltermann_Juhnke_Otour_et al., place={New York, NY, USA}, title={Fully-Featured Anonymous Credentials with Reputation System}, DOI={10.1145/3230833.3234517}, booktitle={Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES ’18}, publisher={ACM}, author={Bemmann, Kai and Blömer, Johannes and Bobolz, Jan and Bröcher, Henrik and Diemert, Denis Pascal and Eidens, Fabian and Eilers, Lukas and Haltermann, Jan Frederik and Juhnke, Jakob and Otour, Burhan and et al.} }
LibreCat | Files available | DOI | Download (ext.)
 

2016 | Preprint | LibreCat-ID: 2969 | OA
@article{Blömer_Brauer_Bujna_2016, title={Hard-Clustering with Gaussian Mixture Models}, publisher={Computing Research Repository}, author={Blömer, Johannes and Brauer, Sascha and Bujna, Kathrin}, year={2016} }
LibreCat | Download (ext.)
 

2011 | Conference Paper | LibreCat-ID: 2985
@article{Ackermann_Blömer_Scholz_2011, series={Electronic Colloquium on Computational Complexity (ECCC)}, title={Hardness and Non-Approximability of Bregman Clustering Problems.}, author={Ackermann, Marcel R and Blömer, Johannes and Scholz, Christoph}, year={2011}, collection={Electronic Colloquium on Computational Complexity (ECCC)} }
LibreCat
 

1992 | Conference Paper | LibreCat-ID: 3047
@inproceedings{Blömer_1992, title={How to denest Ramanujan’s nested radicals}, DOI={10.1109/sfcs.1992.267807}, booktitle={Proceedings., 33rd Annual Symposium on Foundations of Computer Science}, publisher={IEEE}, author={Blömer, Johannes}, year={1992} }
LibreCat | DOI
 

2011 | Book Chapter | LibreCat-ID: 2986
@inbook{Blömer_2011, place={Berlin, Heidelberg}, title={How to Share a Secret}, DOI={10.1007/978-3-642-15328-0_17}, booktitle={Algorithms Unplugged}, publisher={Springer Berlin Heidelberg}, author={Blömer, Johannes}, year={2011}, pages={159–168} }
LibreCat | DOI
 

2020 | Journal Article | LibreCat-ID: 10790
@article{Blömer_Brauer_Bujna_Kuntze_2020, title={How well do SEM algorithms imitate EM algorithms? A non-asymptotic analysis for mixture models}, volume={14}, DOI={10.1007/s11634-019-00366-7}, journal={Advances in Data Analysis and Classification}, author={Blömer, Johannes and Brauer, Sascha and Bujna, Kathrin and Kuntze, Daniel}, year={2020}, pages={147–173} }
LibreCat | DOI
 

2016 | Book Chapter | LibreCat-ID: 2948
@inbook{Günther_Krummel_2016, place={Cham}, title={Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures}, DOI={10.1007/978-3-319-32859-1_13}, booktitle={Mathematical Aspects of Computer and Information Sciences}, publisher={Springer International Publishing}, author={Günther, Peter and Krummel, Volker}, year={2016}, pages={151–165} }
LibreCat | DOI
 

2013 | Book Chapter | LibreCat-ID: 2979
@inbook{Blömer_Günther_Liske_2013, place={Berlin, Heidelberg}, title={Improved Side Channel Attacks on Pairing Based Cryptography}, DOI={10.1007/978-3-642-40026-1_10}, booktitle={Constructive Side-Channel Analysis and Secure Design}, publisher={Springer Berlin Heidelberg}, author={Blömer, Johannes and Günther, Peter and Liske, Gennadij}, year={2013}, pages={154–168} }
LibreCat | DOI
 

2021 | Conference Paper | LibreCat-ID: 29566
@inproceedings{Bobolz_Eidens_Krenn_Ramacher_Samelin_2021, place={Cham}, title={Issuer-Hiding Attribute-Based Credentials}, DOI={10.1007/978-3-030-92548-2_9}, booktitle={Cryptology and Network Security}, publisher={Springer International Publishing}, author={Bobolz, Jan and Eidens, Fabian and Krenn, Stephan and Ramacher, Sebastian and Samelin, Kai}, year={2021} }
LibreCat | DOI
 

2007 | Book Chapter | LibreCat-ID: 3021
@inbook{Blömer_May_2007, place={Berlin, Heidelberg}, title={Key Revocation with Interval Cover Families}, DOI={10.1007/3-540-45537-x_26}, booktitle={Selected Areas in Cryptography}, publisher={Springer Berlin Heidelberg}, author={Blömer, Johannes and May, Alexander}, year={2007}, pages={325–341} }
LibreCat | DOI
 

2007 | Book Chapter | LibreCat-ID: 3020
@inbook{Blömer_May_2007, place={Berlin, Heidelberg}, title={Low Secret Exponent RSA Revisited}, DOI={10.1007/3-540-44670-2_2}, booktitle={Lecture Notes in Computer Science}, publisher={Springer Berlin Heidelberg}, author={Blömer, Johannes and May, Alexander}, year={2007}, pages={4–19} }
LibreCat | DOI
 

2018 | Dissertation | LibreCat-ID: 6597
@book{Juhnke_2018, title={Models and Constructions for Secure Reputation Systems}, DOI={10.17619/UNIPB/1-570}, publisher={Universität Paderborn}, author={Juhnke, Jakob}, year={2018} }
LibreCat | DOI
 

2003 | Book Chapter | LibreCat-ID: 3016
@inbook{Blömer_May_2003, place={Berlin, Heidelberg}, title={New Partial Key Exposure Attacks on RSA}, DOI={10.1007/978-3-540-45146-4_2}, booktitle={Advances in Cryptology - CRYPTO 2003}, publisher={Springer Berlin Heidelberg}, author={Blömer, Johannes and May, Alexander}, year={2003}, pages={27–43} }
LibreCat | DOI
 

2003 | Dissertation | LibreCat-ID: 2914
@book{May_2003, title={New RSA Vulnerabilities Using Lattice Reduction Methods}, publisher={Universität Paderborn}, author={May, Alexander}, year={2003} }
LibreCat | Download (ext.)
 

1993 | Report | LibreCat-ID: 3045
@book{Blömer_1993, title={On Kummer theory and the number of roots of unity in radical extensions of Q}, publisher={Technical Report, Freie Universität Berlin, Fachbereich Mathematik und Informatik}, author={Blömer, Johannes}, year={1993} }
LibreCat
 

1999 | Conference Paper | LibreCat-ID: 3024
@inproceedings{Blömer_Seifert_1999, title={On the complexity of computing short linearly independent vectors and short bases in a lattice}, DOI={10.1145/301250.301441}, booktitle={Proceedings of the thirty-first annual ACM symposium on Theory of computing  - STOC ’99}, publisher={ACM Press}, author={Blömer, Johannes and Seifert, Jean-Pierre}, year={1999} }
LibreCat | Files available | DOI
 

2023 | Conference Paper | LibreCat-ID: 35014 | OA
@inproceedings{Blömer_Bobolz_Bröcher_2023, title={On the impossibility of surviving (iterated) deletion of weakly dominated strategies in rational MPC}, author={Blömer, Johannes and Bobolz, Jan and Bröcher, Henrik}, year={2023} }
LibreCat | Download (ext.)
 

2010 | Journal Article | LibreCat-ID: 2991
@article{Krueger_Leutnant_Haeb-Umbach_Ackermann_Blömer_2010, title={On the initialization of dynamic models for speech features}, journal={Proc. of ITG Fachtagung Sprachkommunikation. ITG, Bochum, Germany}, author={Krueger, Alexander and Leutnant, Volker and Haeb-Umbach, Reinhold and Ackermann, Marcel and Blömer, Johannes}, year={2010} }
LibreCat
 

2005 | Book Chapter | LibreCat-ID: 3010
@inbook{Ernst_Jochemsz_May_de Weger_2005, place={Berlin, Heidelberg}, series={LNCS}, title={Partial Key Exposure Attacks on RSA up to Full Size Exponents}, DOI={10.1007/11426639_22}, booktitle={EUROCRYPT 2005}, publisher={Springer Berlin Heidelberg}, author={Ernst, Matthias and Jochemsz, Ellen and May, Alexander and de Weger, Benne}, year={2005}, pages={371–386}, collection={LNCS} }
LibreCat | DOI
 

2019 | Conference Paper | LibreCat-ID: 13554 | OA
@inproceedings{Blömer_Löken_2019, series={LNCS}, title={Personal Cross-Platform Reputation}, volume={11738}, DOI={10.1007/978-3-030-31511-5_9}, booktitle={Security and Trust Management, STM 2019}, author={Blömer, Johannes and Löken, Nils}, year={2019}, collection={LNCS} }
LibreCat | Files available | DOI
 

2016 | Dissertation | LibreCat-ID: 167
@book{Günther_2016, title={Physical attacks on pairing-based cryptography}, publisher={Universität Paderborn}, author={Günther, Peter}, year={2016} }
LibreCat | Files available | Download (ext.)
 

2013 | Dissertation | LibreCat-ID: 2909
@book{Kuntze_2013, title={Practical algorithms for clustering and modeling large data sets - Analysis and improvements}, publisher={Universität Paderborn}, author={Kuntze, Daniel}, year={2013} }
LibreCat | Download (ext.)
 

2018 | Conference Paper | LibreCat-ID: 2862 | OA
@inproceedings{Blömer_Eidens_Juhnke_2018, place={Cham}, title={Practical, Anonymous, and Publicly Linkable Universally-Composable Reputation Systems}, DOI={10.1007/978-3-319-76953-0_25}, booktitle={Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers’ Track at the {RSA} Conference 2018, Proceedings}, publisher={Springer International Publishing}, author={Blömer, Johannes and Eidens, Fabian and Juhnke, Jakob}, year={2018}, pages={470–490} }
LibreCat | Files available | DOI | Download (ext.)
 

2002 | Journal Article | LibreCat-ID: 3034
@article{Albanese_Blömer_Edmonds_Luby_Sudan_2002, title={Priority encoding transmission}, volume={42}, DOI={10.1109/18.556670}, number={6}, journal={IEEE Transactions on Information Theory}, publisher={Institute of Electrical and Electronics Engineers (IEEE)}, author={Albanese, Andres and Blömer, Johannes and Edmonds, Jeff and Luby, Michael and Sudan, Madhu}, year={2002}, pages={1737–1744} }
LibreCat | Files available | DOI
 

2002 | Conference Paper | LibreCat-ID: 3040
@inproceedings{Albanese_Blömer_Edmonds_Luby_Sudan_2002, title={Priority encoding transmission}, DOI={10.1109/sfcs.1994.365731}, booktitle={Proceedings 35th Annual Symposium on Foundations of Computer Science}, publisher={IEEE Comput. Soc. Press}, author={Albanese, A. and Blömer, Johannes and Edmonds, J. and Luby, M. and Sudan, M.}, year={2002} }
LibreCat | DOI
 

2022 | Dissertation | LibreCat-ID: 35188
@book{Eidens_2022, title={Privacy-Preserving Cryptography: Attribute-Based Signatures and Updatable Credentials}, DOI={10.17619/UNIPB/1-1653}, author={Eidens, Fabian}, year={2022} }
LibreCat | DOI
 

2020 | Conference Paper | LibreCat-ID: 16487 | OA
@inproceedings{Bobolz_Eidens_Krenn_Slamanig_Striecks_2020, place={New York, NY, USA}, title={Privacy-Preserving Incentive Systems with Highly Efficient Point-Collection}, DOI={10.1145/3320269.3384769}, booktitle={Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (ASIA CCS ’20),}, publisher={ACM}, author={Bobolz, Jan and Eidens, Fabian and Krenn, Stephan and Slamanig, Daniel and Striecks, Christoph}, year={2020} }
LibreCat | Files available | DOI | Download (ext.)
 

2018 | Working Paper | LibreCat-ID: 5820
@book{Blömer_Bobolz_Scheideler_Setzer, title={Provably Anonymous Communication Based on Trusted Execution Environments}, author={Blömer, Johannes and Bobolz, Jan and Scheideler, Christian and Setzer, Alexander} }
LibreCat | Files available
 

2004 | Book Chapter | LibreCat-ID: 3011
@inbook{Blömer_Guajardo_Krummel_2004, place={Berlin, Heidelberg}, title={Provably Secure Masking of AES}, DOI={10.1007/978-3-540-30564-4_5}, booktitle={Selected Areas in Cryptography}, publisher={Springer Berlin Heidelberg}, author={Blömer, Johannes and Guajardo, Jorge and Krummel, Volker}, year={2004}, pages={69–83} }
LibreCat | DOI
 

2006 | Journal Article | LibreCat-ID: 3003
@article{Blömer_2006, title={Randomness and Secrecy - A Brief Introduction}, DOI={10.3217/jucs-012-06-0654}, number={6}, journal={Journal of Universal Computer Science (J.UCS)}, author={Blömer, Johannes}, year={2006}, pages={654--671} }
LibreCat | DOI
 

2008 | Conference Paper | LibreCat-ID: 3001
@inproceedings{Stern_Adelt_Krummel_Ackermann_2008, title={Reliable Evidence of Data Integrity from an Untrusted Storage Service}, DOI={10.1109/icns.2008.28}, booktitle={Fourth International Conference on Networking and Services (icns 2008)}, publisher={IEEE}, author={Stern, Claudius and Adelt, Philipp and Krummel, Volker and Ackermann, Marcel Rudolf}, year={2008} }
LibreCat | DOI
 

1992 | Book Chapter | LibreCat-ID: 3046
@inbook{Alt_Blömer_1992, place={Berlin, Heidelberg}, title={Resemblance and symmetries of geometric patterns}, DOI={10.1007/3-540-55488-2_19}, booktitle={Data structures and efficient algorithms}, publisher={Springer Berlin Heidelberg}, author={Alt, Helmut and Blömer, Johannes}, year={1992}, pages={1–24} }
LibreCat | DOI
 

2009 | Journal Article | LibreCat-ID: 2999
@article{Blömer_Naewe_2009, title={Sampling methods for shortest vectors, closest vectors and successive minima}, DOI={10.1016/j.tcs.2008.12.045}, number={18}, journal={Theoretical Computer Science}, author={Blömer, Johannes and Naewe, Stefanie}, year={2009}, pages={1648–1665} }
LibreCat | DOI
 

2017 | Conference Paper | LibreCat-ID: 2343 | OA
@inproceedings{Löken_2017, series={ICPS}, title={Searchable Encryption with Access Control}, DOI={10.1145/3098954.3098987}, number={24}, booktitle={Proceedings of the 12th International Conference on Availability, Reliability and Security  - ARES ’17}, publisher={ACM Press}, author={Löken, Nils}, year={2017}, collection={ICPS} }
LibreCat | Files available | DOI | Download (ext.)
 

2004 | Book Chapter | LibreCat-ID: 3014
@inbook{May_2004, place={Berlin, Heidelberg}, title={Secret Exponent Attacks on RSA-type Schemes with Moduli N=p^{r}q}, DOI={10.1007/978-3-540-24632-9_16}, booktitle={Public Key Cryptography – PKC 2004}, publisher={Springer Berlin Heidelberg}, author={May, Alexander}, year={2004}, pages={218–230} }
LibreCat | DOI
 

2013 | Conference Paper | LibreCat-ID: 488
@inproceedings{Blömer_Günther_Krummel_2013, title={Securing Critical Unattended Systems with Identity Based Cryptography - A Case Study}, booktitle={Proceedings of the 5th International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS)}, author={Blömer, Johannes and Günther, Peter and Krummel, Volker}, year={2013}, pages={98–105} }
LibreCat | Files available
 

2015 | Conference Paper | LibreCat-ID: 253
@inproceedings{Blömer_Juhnke_Löken_2015, series={LNCS}, title={Short Group Signatures with Distributed Traceability}, DOI={10.1007/978-3-319-32859-1_14}, booktitle={Proceedings of the Sixth International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS)}, author={Blömer, Johannes and Juhnke, Jakob and Löken, Nils}, year={2015}, pages={166–180}, collection={LNCS} }
LibreCat | Files available | DOI
 

2006 | Book Chapter | LibreCat-ID: 3007
@inbook{Blömer_Otto_Seifert_2006, place={Berlin, Heidelberg}, title={Sign Change Fault Attacks on Elliptic Curve Cryptosystems}, DOI={10.1007/11889700_4}, booktitle={Lecture Notes in Computer Science}, publisher={Springer Berlin Heidelberg}, author={Blömer, Johannes and Otto, Martin and Seifert, Jean-Pierre}, year={2006}, pages={36–52} }
LibreCat | Files available | DOI
 

1992 | Dissertation | LibreCat-ID: 3043
@book{Blömer_1992, title={Simplifying Expressions Involving Radicals}, publisher={PhD thesis, Freie Universität Berlin, Fachbereich Mathematik und Informatik}, author={Blömer, Johannes}, year={1992} }
LibreCat | Files available
 

2016 | Conference Paper | LibreCat-ID: 2947
@inproceedings{Blömer_Günther_2016, title={Singular Curve Point Decompression Attack}, DOI={10.1109/fdtc.2015.17}, booktitle={2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)}, publisher={IEEE}, author={Blömer, Johannes and Günther, Peter}, year={2016} }
LibreCat | DOI
 

2017 | Dissertation | LibreCat-ID: 2908
@book{Bujna_2017, title={Soft Clustering Algorithms - Theoretical and Practical Improvements}, DOI={10.17619/UNIPB/1-226}, publisher={Universität Paderborn}, author={Bujna, Kathrin}, year={2017} }
LibreCat | DOI | Download (ext.)
 

2011 | Preprint | LibreCat-ID: 2987
@article{Blömer_Naewe_2011, title={Solving the Closest Vector Problem with respect to Lp Norms}, journal={arXiv:1104.3720}, author={Blömer, Johannes and Naewe, Stefanie}, year={2011} }
LibreCat
 

2012 | Conference Paper | LibreCat-ID: 2982
@article{Ackermann_Märtens_Raupach_Swierkot_Lammersen_Sohler_2012, place={New York, NY, USA}, series={ACM Journal of Experimental Algorithmics}, title={StreamKM++: A clustering algorithm for data streams}, volume={17}, DOI={10.1145/2133803.2184450}, publisher={ACM}, author={Ackermann, Marcel Rudolf and Märtens, Marcus and Raupach, Christoph and Swierkot, Kamil and Lammersen, Christiane and Sohler, Christian}, year={2012}, collection={ACM Journal of Experimental Algorithmics} }
LibreCat | DOI
 

2017 | Conference Paper | LibreCat-ID: 2967 | OA
@inproceedings{Blömer_Liske_2017, place={Cham}, series={Lecture Notes in Computer Science}, title={Subtleties in Security Definitions for Predicate Encryption with Public Index}, volume={10693}, DOI={10.1007/978-3-319-72453-9_35}, booktitle={Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS)}, publisher={Springer International Publishing}, author={Blömer, Johannes and Liske, Gennadij}, year={2017}, pages={438–453}, collection={Lecture Notes in Computer Science} }
LibreCat | Files available | DOI | Download (ext.)
 

2007 | Dissertation | LibreCat-ID: 2912
@book{Krummel_2007, title={Tamper Resistance of AES -- Models, Attacks and Countermeasures}, publisher={Universität Paderborn}, author={Krummel, Volker}, year={2007} }
LibreCat | Download (ext.)
 

Filters and Search Terms

(department=64) AND (type=book OR type=book_editor OR type=book_chapter OR type=publicationtype_review OR type=conference_abstract OR type=conference_editor OR type=conference OR type=dissertation OR type=encyclopedia_article OR type=journal_article OR type=journal_editor OR type=newspaper_article OR type=patent OR type=preprint OR type=report OR type=translation OR type=translation_chapter OR type=working_paper OR type=research_data)

status=public

Search

Filter Publications

Display / Sort

Sorted by: Title , First Author
Citation Style: BibTeX

Export / Embed