Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

44 Publications


2014 | Bachelorsthesis | LibreCat-ID: 421
Lippert, J. (2014). Fujisaki-Okamoto Transformation. Universität Paderborn.
LibreCat
 

2018 | Conference Paper | LibreCat-ID: 3265 | OA
Bemmann, K., Blömer, J., Bobolz, J., Bröcher, H., Diemert, D. P., Eidens, F., … Stienemeier, M. (n.d.). Fully-Featured Anonymous Credentials with Reputation System. In Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES ’18. New York, NY, USA: ACM. https://doi.org/10.1145/3230833.3234517
LibreCat | Files available | DOI | Download (ext.)
 

2014 | Mastersthesis | LibreCat-ID: 414
Jochheim, J. (2014). Hiding software components using functional encryption. Universität Paderborn.
LibreCat
 

2012 | Bachelorsthesis | LibreCat-ID: 607
Haarhoff, T. (2012). Identitätsbasierte Kryptographie - Implementierung von Paarungen für Körper der Charakteristik 2. Universität Paderborn.
LibreCat
 

2012 | Bachelorsthesis | LibreCat-ID: 606
Löken, N. (2012). Identitätsbasierte Signaturen - Ein Sicherheitsbeweis für Signaturen auf Grundlage von Gap-Diffie-Hellman-Gruppen mit Hilfe des Forking-Lemmas. Universität Paderborn.
LibreCat
 

2015 | Bachelorsthesis | LibreCat-ID: 286
Kalde, B. (2015). Implementierung eines hybriden Verschlüsselungsverfahrens nach Cramer und Shoup. Universität Paderborn.
LibreCat
 

2021 | Conference Paper | LibreCat-ID: 29566
Bobolz, J., Eidens, F., Krenn, S., Ramacher, S., & Samelin, K. (2021). Issuer-Hiding Attribute-Based Credentials. Cryptology and Network Security. https://doi.org/10.1007/978-3-030-92548-2_9
LibreCat | DOI
 

2018 | Dissertation | LibreCat-ID: 6597
Juhnke, J. (2018). Models and Constructions for Secure Reputation Systems. Universität Paderborn. https://doi.org/10.17619/UNIPB/1-570
LibreCat | DOI
 

2015 | Mastersthesis | LibreCat-ID: 273
Kohn, K. (2015). Number of Voronoi-relevant vectors in lattices with respect to arbitrary norms. Universität Paderborn.
LibreCat
 

2023 | Conference Paper | LibreCat-ID: 35014 | OA
Blömer, J., Bobolz, J., & Bröcher, H. (2023). On the impossibility of surviving (iterated) deletion of weakly dominated strategies in rational MPC. TCC 2023, Taipeh, Taiwan.
LibreCat | Download (ext.)
 

2016 | Dissertation | LibreCat-ID: 167
Günther, P. (2016). Physical attacks on pairing-based cryptography. Universität Paderborn.
LibreCat | Files available | Download (ext.)
 

2018 | Conference Paper | LibreCat-ID: 2862 | OA
Blömer, J., Eidens, F., & Juhnke, J. (2018). Practical, Anonymous, and Publicly Linkable Universally-Composable Reputation Systems. In Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers’ Track at the {RSA} Conference 2018, Proceedings (pp. 470–490). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-76953-0_25
LibreCat | Files available | DOI | Download (ext.)
 

2018 | Working Paper | LibreCat-ID: 5820
Blömer, J., Bobolz, J., Scheideler, C., & Setzer, A. (n.d.). Provably Anonymous Communication Based on Trusted Execution Environments.
LibreCat | Files available
 

2014 | Bachelorsthesis | LibreCat-ID: 369
Rath, T. (2014). RSA-Full Domain Hash Revisited. Universität Paderborn.
LibreCat
 

2013 | Conference Paper | LibreCat-ID: 488
Blömer, J., Günther, P., & Krummel, V. (2013). Securing Critical Unattended Systems with Identity Based Cryptography - A Case Study. In Proceedings of the 5th International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS) (pp. 98–105).
LibreCat | Files available
 

2013 | Bachelorsthesis | LibreCat-ID: 487 | OA
Bobolz, J. (2013). Security Proofs for Pairing-Based Cryptography in the Generic Group Model. Universität Paderborn.
LibreCat | Files available
 

2013 | Bachelorsthesis | LibreCat-ID: 486
Otte, O. (2013). Seitenkanalresistenz paarungsbasierter Kryptographie. Universität Paderborn.
LibreCat
 

2015 | Conference Paper | LibreCat-ID: 253
Blömer, J., Juhnke, J., & Löken, N. (2015). Short Group Signatures with Distributed Traceability. In Proceedings of the Sixth International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS) (pp. 166–180). https://doi.org/10.1007/978-3-319-32859-1_14
LibreCat | Files available | DOI
 

2017 | Conference Paper | LibreCat-ID: 2967 | OA
Blömer, J., & Liske, G. (2017). Subtleties in Security Definitions for Predicate Encryption with Public Index. In Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS) (Vol. 10693, pp. 438–453). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-72453-9_35
LibreCat | Files available | DOI | Download (ext.)
 

2014 | Conference Paper | LibreCat-ID: 355
Blömer, J., Günther, P., & Liske, G. (2014). Tampering attacks in pairing-based cryptography. In Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC) (pp. 1--7). https://doi.org/10.1109/FDTC.2014.10
LibreCat | Files available | DOI
 

Filters and Search Terms

(person=23 OR person=48090 OR person=25078 OR person=27207 OR person=13703) AND (project=13) OR (id=116 OR id=659 OR id=167 OR id=629 OR id=312 OR id=607 OR id=471 OR id=486 OR id=233 OR id=273 OR id=553 OR id=369 OR id=421 OR id=414 OR id=286 OR id=0) AND (department=64)

status=public

Search

Filter Publications

Display / Sort

Sorted by: Title , Publishing Year
Citation Style: APA

Export / Embed