Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

229 Publications


2021 | Bachelorsthesis | LibreCat-ID: 32401
Siemer JN. Lattice Reductions and Their Applications to Cryptographic Systems.; 2021.
LibreCat
 

2021 | Mastersthesis | LibreCat-ID: 32400
Anonymous A. Performance Analysis of FHE Libraries.; 2021.
LibreCat
 

2021 | Bachelorsthesis | LibreCat-ID: 32402
Böttger MAE. IND-CCA Secure PKE Schemes - Based on Lattices.; 2021.
LibreCat
 

2021 | Mastersthesis | LibreCat-ID: 45254
Anonymous A. Device-Independent Security Proofs Via Entropy Accumulation.; 2021.
LibreCat
 

2020 | Bachelorsthesis | LibreCat-ID: 21117
Manegold P. On Batch Proofs of Partial Knowledge.; 2020.
LibreCat
 

2020 | Bachelorsthesis | LibreCat-ID: 21118
Anonymous A. Measuring the Performance of SNARK Libraries.; 2020.
LibreCat
 

2020 | Bachelorsthesis | LibreCat-ID: 21119
Westerwelle M. Trapdoors and Sampling Procedures for Lattice-Based Cryptographic Constructions.; 2020.
LibreCat
 

2020 | Bachelorsthesis | LibreCat-ID: 21121
Anonymous A. Benchmarking the Efficiency of Secure Multiparty Computation for Real World Problems.; 2020.
LibreCat
 

2020 | Journal Article | LibreCat-ID: 20888
Blömer J, Brauer S, Bujna K. A Complexity Theoretical Study of Fuzzy K-Means. ACM Transactions on Algorithms. 2020;16(4):1-25. doi:10.1145/3409385
LibreCat | DOI
 

2020 | Bachelorsthesis | LibreCat-ID: 18085
Heimann J. Distributed Key Generation for Attribute-Based Signatures.; 2020.
LibreCat
 

2020 | Bachelorsthesis | LibreCat-ID: 18637 | OA
Schürmann P. A Group Signature Scheme from Flexible Public Key Signatures and Structure-Preserving Signatures on Equivalence Classes. Universität Paderborn; 2020.
LibreCat | Files available
 

2020 | Bachelorsthesis | LibreCat-ID: 18639
Terfort T. Enhancing Security by Usage of Universal One-Way Hash Functions. Universität Paderborn; 2020.
LibreCat
 

2020 | Conference Paper | LibreCat-ID: 16487 | OA
Bobolz J, Eidens F, Krenn S, Slamanig D, Striecks C. Privacy-Preserving Incentive Systems with Highly Efficient Point-Collection. In: Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (ASIA CCS ’20),. New York, NY, USA: ACM; 2020. doi:10.1145/3320269.3384769
LibreCat | Files available | DOI | Download (ext.)
 

2020 | Journal Article | LibreCat-ID: 10790
Blömer J, Brauer S, Bujna K, Kuntze D. How well do SEM algorithms imitate EM algorithms? A non-asymptotic analysis for mixture models. Advances in Data Analysis and Classification. 2020;14:147–173. doi:10.1007/s11634-019-00366-7
LibreCat | DOI
 

2020 | Dissertation | LibreCat-ID: 15482
Löken N. Cryptography for the Crowd — A Study of Cryptographic Schemes with Applications to Crowd Work.; 2020. doi:10.17619/UNIPB/1-854
LibreCat | DOI
 

2020 | Bachelorsthesis | LibreCat-ID: 18638
Kramer P. Comparison of Zero-Knowledge Range Proofs. Universität Paderborn; 2020.
LibreCat
 

2019 | Journal Article | LibreCat-ID: 2916
Brauer S. Complexity of single-swap heuristics for metric facility location and related problems. Theoretical Computer Science. 2019;754:88-106. doi:10.1016/j.tcs.2018.04.048
LibreCat | DOI
 

2019 | Mastersthesis | LibreCat-ID: 15746
Otte O. Outsourced Decryption of Attribute-Based Ciphertexts.; 2019.
LibreCat
 

2019 | Bachelorsthesis | LibreCat-ID: 15747
Wördenweber NC. On the Security of the Rouselakis-Waters Ciphertext-Policy Attribute-Based Encryption Scheme in the Random Oracle Model.; 2019.
LibreCat
 

2019 | Bachelorsthesis | LibreCat-ID: 15819
Leutnant M. Experimentelle Untersuchung Des SEM-Algorithmus.; 2019.
LibreCat
 

2019 | Mastersthesis | LibreCat-ID: 13128 | OA
Bröcher H. Rational Secure Multiparty Computation. Universität Paderborn; 2019.
LibreCat | Files available
 

2019 | Mastersthesis | LibreCat-ID: 10306 | OA
Porzenheim LA. Post-Quantum Secure Group Signatures.; 2019.
LibreCat | Files available
 

2019 | Conference Paper | LibreCat-ID: 13554 | OA
Blömer J, Löken N. Personal Cross-Platform Reputation. In: Security and Trust Management, STM 2019. Vol 11738. LNCS. ; 2019. doi:10.1007/978-3-030-31511-5_9
LibreCat | Files available | DOI
 

2019 | Conference Paper | LibreCat-ID: 13557 | OA
Blömer J, Löken N. Dynamic Searchable Encryption with Access Control. In: 12th International Symposium on Foundations and Practice of Security, FPS 2019. Vol 12056. LNCS. Springer; 2019.
LibreCat | Download (ext.)
 

2019 | Bachelorsthesis | LibreCat-ID: 13592
Pilot M. Efficient Finite-Field Arithmetic for Elliptic Curve Cryptography in Java. Universität Paderborn; 2019.
LibreCat
 

2019 | Mastersthesis | LibreCat-ID: 13648 | OA
Scholz S. Implementation and Comparison of Elliptic Curve Algorithms in Java. Universität Paderborn; 2019.
LibreCat | Files available
 

2019 | Dissertation | LibreCat-ID: 13679
Brauer S. Classification and Approximation of Geometric Location Problems. Paderborn; 2019. doi:10.17619/UNIPB/1-816
LibreCat | DOI
 

2019 | Conference Paper | LibreCat-ID: 13904 | OA
Blömer J, Bobolz J, Diemert DP, Eidens F. Updatable Anonymous Credentials and Applications to Incentive Systems. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security - CCS ’19. Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security - CCS ’19. ; 2019. doi:10.1145/3319535.3354223
LibreCat | Files available | DOI | Download (ext.)
 

2018 | Conference Paper | LibreCat-ID: 2862 | OA
Blömer J, Eidens F, Juhnke J. Practical, Anonymous, and Publicly Linkable Universally-Composable Reputation Systems. In: Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers’ Track at the {RSA} Conference 2018, Proceedings. Cham: Springer International Publishing; 2018:470-490. doi:10.1007/978-3-319-76953-0_25
LibreCat | Files available | DOI | Download (ext.)
 

2018 | Journal Article | LibreCat-ID: 2685
Blömer J, Kohn K. Voronoi Cells of Lattices with Respect to Arbitrary Norms. SIAM Journal on Applied Algebra and Geometry. 2018;2(2):314-338. doi:10.1137/17M1132045
LibreCat | Files available | DOI
 

2018 | Conference Paper | LibreCat-ID: 3265 | OA
Bemmann K, Blömer J, Bobolz J, et al. Fully-Featured Anonymous Credentials with Reputation System. In: Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES ’18. New York, NY, USA: ACM. doi:10.1145/3230833.3234517
LibreCat | Files available | DOI | Download (ext.)
 

2018 | Conference Paper | LibreCat-ID: 2965
Blömer J, Löken N. Cloud Architectures for Searchable Encryption. In: Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018. New York, NY, USA: ACM; :25:1--25:10. doi:10.1145/3230833.3230853
LibreCat | Files available | DOI
 

2018 | Working Paper | LibreCat-ID: 5820
Blömer J, Bobolz J, Scheideler C, Setzer A. Provably Anonymous Communication Based on Trusted Execution Environments.
LibreCat | Files available
 

2018 | Conference Paper | LibreCat-ID: 4344
Blömer J, Brauer S, Bujna K. Coresets for Fuzzy K-Means with Applications. In: 29th International Symposium on Algorithms and Computation  (ISAAC 2018). Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik; 2018:46:1--46:12. doi:10.4230/LIPIcs.ISAAC.2018.46
LibreCat | DOI
 

2018 | Bachelorsthesis | LibreCat-ID: 5426
von Heißen O. Implementierung und Analyse von Searchable Encryption.; 2018.
LibreCat
 

2018 | Dissertation | LibreCat-ID: 6597
Juhnke J. Models and Constructions for Secure Reputation Systems. Universität Paderborn; 2018. doi:10.17619/UNIPB/1-570
LibreCat | DOI
 

2018 | Conference Paper | LibreCat-ID: 3873 | OA
Blömer J, Eidens F, Juhnke J. Enhanced Security of Attribute-Based Signatures. In: The International Conference on Cryptology And Network Security (CANS). Vol 11124. Lecture Notes in Computer Science. Springer; 2018:235-255. doi:10.1007/978-3-030-00434-7_12
LibreCat | Files available | DOI | Download (ext.)
 

2018 | Conference Paper | LibreCat-ID: 2379 | OA
Blömer J, Bobolz J. Delegatable Attribute-based Anonymous Credentials from Dynamically Malleable Signatures. In: ACNS 2018 Applied Cryptography & Network Security. LNCS. doi:10.1007/978-3-319-93387-0_12
LibreCat | Files available | DOI | Download (ext.)
 

2017 | Dissertation | LibreCat-ID: 2908
Bujna K. Soft Clustering Algorithms - Theoretical and Practical Improvements. Universität Paderborn; 2017. doi:10.17619/UNIPB/1-226
LibreCat | DOI | Download (ext.)
 

2017 | Conference Paper | LibreCat-ID: 2967 | OA
Blömer J, Liske G. Subtleties in Security Definitions for Predicate Encryption with Public Index. In: Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS). Vol 10693. Lecture Notes in Computer Science. Cham: Springer International Publishing; 2017:438-453. doi:10.1007/978-3-319-72453-9_35
LibreCat | Files available | DOI | Download (ext.)
 

2017 | Dissertation | LibreCat-ID: 116
Liske G. CCA-Security for Predicate Encryption Schemes. Universität Paderborn; 2017. doi:10.17619/UNIPB/1-220
LibreCat | DOI | Download (ext.)
 

2017 | Conference Paper | LibreCat-ID: 2343 | OA
Löken N. Searchable Encryption with Access Control. In: Proceedings of the 12th International Conference on Availability, Reliability and Security  - ARES ’17. ICPS. ACM Press; 2017. doi:10.1145/3098954.3098987
LibreCat | Files available | DOI | Download (ext.)
 

2017 | Conference Paper | LibreCat-ID: 2344 | OA
Blömer J, Günther P, Krummel V, Löken N. Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations. In: Foundations and Practice of Security. Cham: Springer International Publishing; 2017:3-17. doi:10.1007/978-3-319-75650-9_1
LibreCat | Files available | DOI
 

2017 | Book Chapter | LibreCat-ID: 2381
Brauer S. Complexity of Single-Swap Heuristics for Metric Facility Location and Related Problems. In: Fotakis D, Pagourtzis A, Paschos VT, eds. Lecture Notes in Computer Science. Vol 10236. Cham: Springer International Publishing; 2017:116-127. doi:10.1007/978-3-319-57586-5_11
LibreCat | DOI
 

2017 | Mastersthesis | LibreCat-ID: 60
Niehus D. Semantically Secure Attribute-Based Searchable Encryption. Universität Paderborn; 2017.
LibreCat
 

2017 | Bachelorsthesis | LibreCat-ID: 88
Ganesh Athreya A. Instantiating a Predicate Encryption Scheme via Pair Encodings. Universität Paderborn; 2017.
LibreCat
 

2017 | Bachelorsthesis | LibreCat-ID: 67
Jürgens M. Provably Secure Key-Derivation-Functions for Certain Types of Applications. Universität Paderborn; 2017.
LibreCat
 

2017 | Bachelorsthesis | LibreCat-ID: 104
Diemert D. EAX - An Authenticated Encryption Mode for Block Ciphers. Universität Paderborn; 2017.
LibreCat
 

2017 | Mastersthesis | LibreCat-ID: 117
Bemmann P. Attribute-Based Signatures Using Structure Preserving Signatures. Universität Paderborn; 2017.
LibreCat
 

2016 | Mastersthesis | LibreCat-ID: 2898
Weis E. Searchable Encryption.; 2016.
LibreCat
 

2016 | Conference Paper | LibreCat-ID: 2947
Blömer J, Günther P. Singular Curve Point Decompression Attack. In: 2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC). IEEE; 2016. doi:10.1109/fdtc.2015.17
LibreCat | DOI
 

2016 | Book Chapter | LibreCat-ID: 2948
Günther P, Krummel V. Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures. In: Mathematical Aspects of Computer and Information Sciences. Cham: Springer International Publishing; 2016:151-165. doi:10.1007/978-3-319-32859-1_13
LibreCat | DOI
 

2016 | Book Chapter | LibreCat-ID: 2968
Blömer J, Lammersen C, Schmidt M, Sohler C. Theoretical Analysis of the k-Means Algorithm – A Survey. In: Algorithm Engineering. Cham: Springer International Publishing; 2016:81-116. doi:10.1007/978-3-319-49487-6_3
LibreCat | DOI
 

2016 | Preprint | LibreCat-ID: 2969 | OA
Blömer J, Brauer S, Bujna K. Hard-Clustering with Gaussian Mixture Models. 2016.
LibreCat | Download (ext.)
 

2016 | Book Chapter | LibreCat-ID: 2970
Blömer J, Bujna K. Adaptive Seeding for Gaussian Mixture Models. In: Advances in Knowledge Discovery and Data Mining. Cham: Springer International Publishing; 2016:296-308. doi:10.1007/978-3-319-31750-2_24
LibreCat | DOI
 

2016 | Report | LibreCat-ID: 2971
Blömer J, Günther P. Effizienz Und Sicherheit Paarungsbasierter Kryptographie. Tagungsband des 26. Fraunhofer SIT Smartcard-Workshops; 2016.
LibreCat
 

2016 | Bachelorsthesis | LibreCat-ID: 213
Porzenheim L. Comparison of Different Definitions of Chosen-Ciphertext Security in Encryption Schemes. Universität Paderborn; 2016.
LibreCat
 

2016 | Bachelorsthesis | LibreCat-ID: 214
Bemmann KS. Commitment Schemes - Definitions, Variants, and Security. Universität Paderborn; 2016.
LibreCat
 

2016 | Conference Paper | LibreCat-ID: 2367
Blömer J, Brauer S, Bujna K. A Theoretical Analysis of the Fuzzy K-Means Problem. In: 2016 IEEE 16th International Conference on Data Mining (ICDM). IEEE; 2016:805-810. doi:10.1109/icdm.2016.0094
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 208
Blömer J, Liske G. Construction of Fully CCA-Secure Predicate Encryptions from Pair Encoding Schemes. In: Proceedings of the CT-RSA 2016. LNCS. ; 2016:431-447. doi:10.1007/978-3-319-29485-8_25
LibreCat | Files available | DOI
 

2016 | Dissertation | LibreCat-ID: 167
Günther P. Physical Attacks on Pairing-Based Cryptography. Universität Paderborn; 2016.
LibreCat | Files available | Download (ext.)
 

2016 | Mastersthesis | LibreCat-ID: 146
Hamm J. Symmetric Anonymous Credentials with Protocols for Relations on Attributes. Universität Paderborn; 2016.
LibreCat
 

2016 | Bachelorsthesis | LibreCat-ID: 152
Dallmeier F. Short Randomizable Aggregatable Signatures: Constructions and Security Analysis. Universität Paderborn; 2016.
LibreCat
 

2016 | Book Chapter | LibreCat-ID: 2978
Blömer J, Bujna K. Adaptive Seeding for Gaussian Mixture Models. In: Advances in Knowledge Discovery and Data Mining. Springer International Publishing; 2016:296-308. doi:10.1007/978-3-319-31750-2_24
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 253
Blömer J, Juhnke J, Löken N. Short Group Signatures with Distributed Traceability. In: Proceedings of the Sixth International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS). LNCS. ; 2015:166-180. doi:10.1007/978-3-319-32859-1_14
LibreCat | Files available | DOI
 

2015 | Bachelorsthesis | LibreCat-ID: 286
Kalde B. Implementierung eines hybriden Verschlüsselungsverfahrens nach Cramer und Shoup. Universität Paderborn; 2015.
LibreCat
 

2015 | Bachelorsthesis | LibreCat-ID: 2865
Strotmann D. Singulärwertzerlegung Für μ-Ähnliche Bregman-Divergenzen.; 2015.
LibreCat
 

2015 | Bachelorsthesis | LibreCat-ID: 261
Eisenhofer T. Protokolle zur authentifizierten Schüsselvereinbarung. Universität Paderborn; 2015.
LibreCat
 

2015 | Mastersthesis | LibreCat-ID: 321
Eidens F. Anonymous Credential System Based on Q-Strong Diffie-Hellman Assumption. Universität Paderborn; 2015.
LibreCat | Files available
 

2015 | Conference Paper | LibreCat-ID: 322 | OA
Blömer J, Juhnke J, Kolb C. Anonymous and Publicly Linkable Reputation Systems. In: Proceedings of the 18th International Conference on Financial Cryptography and Data Security (FC). LNCS. ; 2015:478--488. doi:10.1007/978-3-662-47854-7_29
LibreCat | Files available | DOI | Download (ext.)
 

2015 | Mastersthesis | LibreCat-ID: 325
Löken N. A Group Signature Scheme with Distributed Group Management - An Application of Threshold Encryption. Universität Paderborn; 2015.
LibreCat | Files available
 

2015 | Bachelorsthesis | LibreCat-ID: 326
Heihoff F. A Group Signature Scheme Based on the LSRW Assumption. Universität Paderborn; 2015.
LibreCat
 

2015 | Mastersthesis | LibreCat-ID: 297
Sosniak M. Evaluation of Pairing Optimization for Embedded Platforms. Universität Paderborn; 2015.
LibreCat
 

2015 | Mastersthesis | LibreCat-ID: 299
Gerken B. Elektromagnetische Seitenkanalangriffe auf paarungsbasierte Kryptographie. Universität Paderborn; 2015.
LibreCat
 

2015 | Mastersthesis | LibreCat-ID: 301 | OA
Bobolz J. Efficient Verifier-Local Revocation for Anonymous Credentials. Universität Paderborn; 2015.
LibreCat | Files available
 

2015 | Mastersthesis | LibreCat-ID: 302
Stroh C. Efficient Attributes for Pairing-Based Anonymous Credentials. Universität Paderborn; 2015.
LibreCat
 

2015 | Mastersthesis | LibreCat-ID: 312
Schleiter P. Constructions of Fully Secure Predicate Encryption Schemes. Universität Paderborn; 2015.
LibreCat | Files available
 

2015 | Mastersthesis | LibreCat-ID: 273
Kohn K. Number of Voronoi-Relevant Vectors in Lattices with Respect to Arbitrary Norms. Universität Paderborn; 2015.
LibreCat
 

2015 | Report | LibreCat-ID: 233 | OA
Blömer J, Kohn K. Voronoi Cells of Lattices with Respect to Arbitrary Norms. Universität Paderborn; 2015.
LibreCat | Files available | Download (ext.)
 

2014 | Bachelorsthesis | LibreCat-ID: 2866
Biermeier F. Untersuchung Des Erreichbarkeitsproblems in Ungerichteten Graphen Bezüglich Den Komplexitätsklassen L Und SL.; 2014.
LibreCat
 

2014 | Bachelorsthesis | LibreCat-ID: 2867
Sauer M. Evaluierung von Initialisierungsmethoden Für Fuzzy-k-Means Algorithmen.; 2014.
LibreCat
 

2014 | Conference Paper | LibreCat-ID: 355
Blömer J, Günther P, Liske G. Tampering attacks in pairing-based cryptography. In: Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC). ; 2014:1--7. doi:10.1109/FDTC.2014.10
LibreCat | Files available | DOI
 

2014 | Bachelorsthesis | LibreCat-ID: 369
Rath T. RSA-Full Domain Hash Revisited. Universität Paderborn; 2014.
LibreCat
 

2014 | Mastersthesis | LibreCat-ID: 2900
Brauer S. A Probabilistic Expectation Maximization Algorithm for Multivariate Laplacian Mixtures.; 2014.
LibreCat | Files available
 

2014 | Journal Article | LibreCat-ID: 2976
Ackermann MR, Blömer J, Kuntze D, Sohler C. Analysis of Agglomerative Clustering. Algorithmica. 2014;69. doi:10.1007/s00453-012-9717-4
LibreCat | DOI
 

2014 | Conference Paper | LibreCat-ID: 2977
Blömer J, Bujna K, Kuntze D. A Theoretical and Experimental Comparison of the EM and SEM Algorithm. In: 2014 22nd International Conference on Pattern Recognition. IEEE; 2014. doi:10.1109/icpr.2014.253
LibreCat | DOI
 

2014 | Preprint | LibreCat-ID: 442 | OA
Blömer J, Liske G. Constructing CCA-secure predicate encapsulation schemes from CPA-secure schemes and universal one-way hash functions. 2014.
LibreCat | Files available | Download (ext.)
 

2014 | Conference Paper | LibreCat-ID: 463
Blömer J, Gomes da Silva R, Günther P, Krämer J, Seifert J-P. A Practical Second-Order Fault Attack against a Real-World Pairing Implementation. In: Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC). ; 2014:123--136. doi:10.1109/FDTC.2014.22
LibreCat | Files available | DOI
 

2014 | Mastersthesis | LibreCat-ID: 414
Jochheim J. Hiding Software Components Using Functional Encryption. Universität Paderborn; 2014.
LibreCat
 

2014 | Bachelorsthesis | LibreCat-ID: 416
Bemmann P. Group Signature Schemes with Strong Exculpability. Universität Paderborn; 2014.
LibreCat
 

2014 | Bachelorsthesis | LibreCat-ID: 421
Lippert J. Fujisaki-Okamoto Transformation. Universität Paderborn; 2014.
LibreCat
 

2013 | Bachelorsthesis | LibreCat-ID: 2868
Laudemann S. Themenmodellierung Zur Identifikation Und Gruppierung von Spam-Webseiten.; 2013.
LibreCat
 

2013 | Bachelorsthesis | LibreCat-ID: 2869
Leder L. Nichtapproximierbarkeitsresultate Zu Radius- Und Durchmesserclustering Unter Verwendung von L_p-Metriken.; 2013.
LibreCat
 

2013 | Dissertation | LibreCat-ID: 2909
Kuntze D. Practical Algorithms for Clustering and Modeling Large Data Sets - Analysis and Improvements. Universität Paderborn; 2013.
LibreCat | Download (ext.)
 

2013 | Report | LibreCat-ID: 2917
Juhnke J, Lefmann H, Strehl V. An Approach for Determining Optimal Contrast in Visual Cryptography. Fortschritt-Berichte VDI; 2013.
LibreCat
 

2013 | Book Chapter | LibreCat-ID: 2979
Blömer J, Günther P, Liske G. Improved Side Channel Attacks on Pairing Based Cryptography. In: Constructive Side-Channel Analysis and Secure Design. Berlin, Heidelberg: Springer Berlin Heidelberg; 2013:154-168. doi:10.1007/978-3-642-40026-1_10
LibreCat | DOI
 

2013 | Bachelorsthesis | LibreCat-ID: 471
Tezer A. Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen. Universität Paderborn; 2013.
LibreCat
 

2013 | Bachelorsthesis | LibreCat-ID: 486
Otte O. Seitenkanalresistenz paarungsbasierter Kryptographie. Universität Paderborn; 2013.
LibreCat
 

2013 | Bachelorsthesis | LibreCat-ID: 487 | OA
Bobolz J. Security Proofs for Pairing-Based Cryptography in the Generic Group Model. Universität Paderborn; 2013.
LibreCat | Files available
 

2013 | Conference Paper | LibreCat-ID: 488
Blömer J, Günther P, Krummel V. Securing Critical Unattended Systems with Identity Based Cryptography - A Case Study. In: Proceedings of the 5th International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS). ; 2013:98-105.
LibreCat | Files available
 

Filters and Search Terms

department=64

Search

Filter Publications

Display / Sort

Citation Style: AMA

Export / Embed