Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

229 Publications


2019 | Mastersthesis | LibreCat-ID: 13128 | OA
Bröcher, H. (2019). Rational Secure Multiparty Computation. Universität Paderborn.
LibreCat | Files available
 

2019 | Mastersthesis | LibreCat-ID: 10306 | OA
Porzenheim, L. A. (2019). Post-Quantum Secure Group Signatures.
LibreCat | Files available
 

2019 | Conference Paper | LibreCat-ID: 13554 | OA
Blömer, J., & Löken, N. (2019). Personal Cross-Platform Reputation. In Security and Trust Management, STM 2019 (Vol. 11738). https://doi.org/10.1007/978-3-030-31511-5_9
LibreCat | Files available | DOI
 

2019 | Conference Paper | LibreCat-ID: 13557 | OA
Blömer, J., & Löken, N. (2019). Dynamic Searchable Encryption with Access Control. In 12th International Symposium on Foundations and Practice of Security, FPS 2019 (Vol. 12056). Springer.
LibreCat | Download (ext.)
 

2019 | Bachelorsthesis | LibreCat-ID: 13592
Pilot, M. (2019). Efficient Finite-Field Arithmetic for Elliptic Curve Cryptography in Java. Universität Paderborn.
LibreCat
 

2019 | Mastersthesis | LibreCat-ID: 13648 | OA
Scholz, S. (2019). Implementation and Comparison of Elliptic Curve Algorithms in Java. Universität Paderborn.
LibreCat | Files available
 

2019 | Dissertation | LibreCat-ID: 13679
Brauer, S. (2019). Classification and Approximation of Geometric Location Problems. Paderborn. https://doi.org/10.17619/UNIPB/1-816
LibreCat | DOI
 

2019 | Conference Paper | LibreCat-ID: 13904 | OA
Blömer, J., Bobolz, J., Diemert, D. P., & Eidens, F. (2019). Updatable Anonymous Credentials and Applications to Incentive Systems. Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security - CCS ’19. 26th ACM Conference on Computer and Communications Security, London. https://doi.org/10.1145/3319535.3354223
LibreCat | Files available | DOI | Download (ext.)
 

2018 | Conference Paper | LibreCat-ID: 2862 | OA
Blömer, J., Eidens, F., & Juhnke, J. (2018). Practical, Anonymous, and Publicly Linkable Universally-Composable Reputation Systems. In Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers’ Track at the {RSA} Conference 2018, Proceedings (pp. 470–490). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-76953-0_25
LibreCat | Files available | DOI | Download (ext.)
 

2018 | Journal Article | LibreCat-ID: 2685
Blömer, J., & Kohn, K. (2018). Voronoi Cells of Lattices with Respect to Arbitrary Norms. SIAM Journal on Applied Algebra and Geometry., 2(2), 314–338. https://doi.org/10.1137/17M1132045
LibreCat | Files available | DOI
 

2018 | Conference Paper | LibreCat-ID: 3265 | OA
Bemmann, K., Blömer, J., Bobolz, J., Bröcher, H., Diemert, D. P., Eidens, F., … Stienemeier, M. (n.d.). Fully-Featured Anonymous Credentials with Reputation System. In Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES ’18. New York, NY, USA: ACM. https://doi.org/10.1145/3230833.3234517
LibreCat | Files available | DOI | Download (ext.)
 

2018 | Conference Paper | LibreCat-ID: 2965
Blömer, J., & Löken, N. (n.d.). Cloud Architectures for Searchable Encryption. In Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018 (pp. 25:1--25:10). New York, NY, USA: ACM. https://doi.org/10.1145/3230833.3230853
LibreCat | Files available | DOI
 

2018 | Working Paper | LibreCat-ID: 5820
Blömer, J., Bobolz, J., Scheideler, C., & Setzer, A. (n.d.). Provably Anonymous Communication Based on Trusted Execution Environments.
LibreCat | Files available
 

2018 | Conference Paper | LibreCat-ID: 4344
Blömer, J., Brauer, S., & Bujna, K. (2018). Coresets for Fuzzy K-Means with Applications. In 29th International Symposium on Algorithms and Computation  (ISAAC 2018) (pp. 46:1--46:12). Jiaoxi, Yilan County, Taiwan: Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik. https://doi.org/10.4230/LIPIcs.ISAAC.2018.46
LibreCat | DOI
 

2018 | Bachelorsthesis | LibreCat-ID: 5426
von Heißen, O. (2018). Implementierung und Analyse von Searchable Encryption.
LibreCat
 

2018 | Dissertation | LibreCat-ID: 6597
Juhnke, J. (2018). Models and Constructions for Secure Reputation Systems. Universität Paderborn. https://doi.org/10.17619/UNIPB/1-570
LibreCat | DOI
 

2018 | Conference Paper | LibreCat-ID: 3873 | OA
Blömer, J., Eidens, F., & Juhnke, J. (2018). Enhanced Security of Attribute-Based Signatures. The International Conference on Cryptology And Network Security (CANS), 11124, 235–255. https://doi.org/10.1007/978-3-030-00434-7_12
LibreCat | Files available | DOI | Download (ext.)
 

2018 | Conference Paper | LibreCat-ID: 2379 | OA
Blömer, J., & Bobolz, J. (n.d.). Delegatable Attribute-based Anonymous Credentials from Dynamically Malleable Signatures. ACNS 2018 Applied Cryptography & Network Security. The 16th International Conference on Applied Cryptography and Network Security, Leuven, Belgium. https://doi.org/10.1007/978-3-319-93387-0_12
LibreCat | Files available | DOI | Download (ext.)
 

2017 | Dissertation | LibreCat-ID: 2908
Bujna, K. (2017). Soft Clustering Algorithms - Theoretical and Practical Improvements. Universität Paderborn. https://doi.org/10.17619/UNIPB/1-226
LibreCat | DOI | Download (ext.)
 

2017 | Conference Paper | LibreCat-ID: 2967 | OA
Blömer, J., & Liske, G. (2017). Subtleties in Security Definitions for Predicate Encryption with Public Index. In Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS) (Vol. 10693, pp. 438–453). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-72453-9_35
LibreCat | Files available | DOI | Download (ext.)
 

2017 | Dissertation | LibreCat-ID: 116
Liske, G. (2017). CCA-Security for Predicate Encryption Schemes. Universität Paderborn. https://doi.org/10.17619/UNIPB/1-220
LibreCat | DOI | Download (ext.)
 

2017 | Conference Paper | LibreCat-ID: 2343 | OA
Löken, N. (2017). Searchable Encryption with Access Control. In Proceedings of the 12th International Conference on Availability, Reliability and Security  - ARES ’17. ACM Press. https://doi.org/10.1145/3098954.3098987
LibreCat | Files available | DOI | Download (ext.)
 

2017 | Conference Paper | LibreCat-ID: 2344 | OA
Blömer, J., Günther, P., Krummel, V., & Löken, N. (2017). Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations. In Foundations and Practice of Security (pp. 3–17). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-75650-9_1
LibreCat | Files available | DOI
 

2017 | Book Chapter | LibreCat-ID: 2381
Brauer, S. (2017). Complexity of Single-Swap Heuristics for Metric Facility Location and Related Problems. In D. Fotakis, A. Pagourtzis, & V. T. Paschos (Eds.), Lecture Notes in Computer Science (Vol. 10236, pp. 116–127). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-57586-5_11
LibreCat | DOI
 

2017 | Mastersthesis | LibreCat-ID: 60
Niehus, D. (2017). Semantically Secure Attribute-based Searchable Encryption. Universität Paderborn.
LibreCat
 

2017 | Bachelorsthesis | LibreCat-ID: 88
Ganesh Athreya, A. (2017). Instantiating a Predicate Encryption Scheme via Pair Encodings. Universität Paderborn.
LibreCat
 

2017 | Bachelorsthesis | LibreCat-ID: 67
Jürgens, M. (2017). Provably Secure Key-Derivation-Functions for Certain Types of Applications. Universität Paderborn.
LibreCat
 

2017 | Bachelorsthesis | LibreCat-ID: 104
Diemert, D. (2017). EAX - An Authenticated Encryption Mode for Block Ciphers. Universität Paderborn.
LibreCat
 

2017 | Mastersthesis | LibreCat-ID: 117
Bemmann, P. (2017). Attribute-based Signatures using Structure Preserving Signatures. Universität Paderborn.
LibreCat
 

2016 | Mastersthesis | LibreCat-ID: 2898
Weis, E. (2016). Searchable Encryption.
LibreCat
 

2016 | Conference Paper | LibreCat-ID: 2947
Blömer, J., & Günther, P. (2016). Singular Curve Point Decompression Attack. In 2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC). IEEE. https://doi.org/10.1109/fdtc.2015.17
LibreCat | DOI
 

2016 | Book Chapter | LibreCat-ID: 2948
Günther, P., & Krummel, V. (2016). Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures. In Mathematical Aspects of Computer and Information Sciences (pp. 151–165). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-32859-1_13
LibreCat | DOI
 

2016 | Book Chapter | LibreCat-ID: 2968
Blömer, J., Lammersen, C., Schmidt, M., & Sohler, C. (2016). Theoretical Analysis of the k-Means Algorithm – A Survey. In Algorithm Engineering (pp. 81–116). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-49487-6_3
LibreCat | DOI
 

2016 | Preprint | LibreCat-ID: 2969 | OA
Blömer, J., Brauer, S., & Bujna, K. (2016). Hard-Clustering with Gaussian Mixture Models. Computing Research Repository.
LibreCat | Download (ext.)
 

2016 | Book Chapter | LibreCat-ID: 2970
Blömer, J., & Bujna, K. (2016). Adaptive Seeding for Gaussian Mixture Models. In Advances in Knowledge Discovery and Data Mining (pp. 296–308). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-31750-2_24
LibreCat | DOI
 

2016 | Report | LibreCat-ID: 2971
Blömer, J., & Günther, P. (2016). Effizienz und Sicherheit paarungsbasierter Kryptographie. Tagungsband des 26. Fraunhofer SIT Smartcard-Workshops.
LibreCat
 

2016 | Bachelorsthesis | LibreCat-ID: 213
Porzenheim, L. (2016). Comparison of different Definitions of Chosen-Ciphertext Security in Encryption schemes. Universität Paderborn.
LibreCat
 

2016 | Bachelorsthesis | LibreCat-ID: 214
Bemmann, K. S. (2016). Commitment Schemes - Definitions, Variants, and Security. Universität Paderborn.
LibreCat
 

2016 | Conference Paper | LibreCat-ID: 2367
Blömer, J., Brauer, S., & Bujna, K. (2016). A Theoretical Analysis of the Fuzzy K-Means Problem. In 2016 IEEE 16th International Conference on Data Mining (ICDM) (pp. 805–810). Barcelona, Spain: IEEE. https://doi.org/10.1109/icdm.2016.0094
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 208
Blömer, J., & Liske, G. (2016). Construction of Fully CCA-Secure Predicate Encryptions from Pair Encoding Schemes. In Proceedings of the CT-RSA 2016 (pp. 431–447). https://doi.org/10.1007/978-3-319-29485-8_25
LibreCat | Files available | DOI
 

2016 | Dissertation | LibreCat-ID: 167
Günther, P. (2016). Physical attacks on pairing-based cryptography. Universität Paderborn.
LibreCat | Files available | Download (ext.)
 

2016 | Mastersthesis | LibreCat-ID: 146
Hamm, J. (2016). Symmetric Anonymous Credentials with Protocols for Relations on Attributes. Universität Paderborn.
LibreCat
 

2016 | Bachelorsthesis | LibreCat-ID: 152
Dallmeier, F. (2016). Short Randomizable Aggregatable Signatures: Constructions and Security Analysis. Universität Paderborn.
LibreCat
 

2016 | Book Chapter | LibreCat-ID: 2978
Blömer, J., & Bujna, K. (2016). Adaptive Seeding for Gaussian Mixture Models. In Advances in Knowledge Discovery and Data Mining (pp. 296–308). Springer International Publishing. https://doi.org/10.1007/978-3-319-31750-2_24
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 253
Blömer, J., Juhnke, J., & Löken, N. (2015). Short Group Signatures with Distributed Traceability. In Proceedings of the Sixth International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS) (pp. 166–180). https://doi.org/10.1007/978-3-319-32859-1_14
LibreCat | Files available | DOI
 

2015 | Bachelorsthesis | LibreCat-ID: 286
Kalde, B. (2015). Implementierung eines hybriden Verschlüsselungsverfahrens nach Cramer und Shoup. Universität Paderborn.
LibreCat
 

2015 | Bachelorsthesis | LibreCat-ID: 2865
Strotmann, D. (2015). Singulärwertzerlegung für μ-ähnliche Bregman-Divergenzen.
LibreCat
 

2015 | Bachelorsthesis | LibreCat-ID: 261
Eisenhofer, T. (2015). Protokolle zur authentifizierten Schüsselvereinbarung. Universität Paderborn.
LibreCat
 

2015 | Mastersthesis | LibreCat-ID: 321
Eidens, F. (2015). Anonymous credential system based on q-Strong Diffie-Hellman Assumption. Universität Paderborn.
LibreCat | Files available
 

2015 | Conference Paper | LibreCat-ID: 322 | OA
Blömer, J., Juhnke, J., & Kolb, C. (2015). Anonymous and Publicly Linkable Reputation Systems. In Proceedings of the 18th International Conference on Financial Cryptography and Data Security (FC) (pp. 478--488). https://doi.org/10.1007/978-3-662-47854-7_29
LibreCat | Files available | DOI | Download (ext.)
 

2015 | Mastersthesis | LibreCat-ID: 325
Löken, N. (2015). A Group Signature Scheme with Distributed Group Management - An Application of Threshold Encryption. Universität Paderborn.
LibreCat | Files available
 

2015 | Bachelorsthesis | LibreCat-ID: 326
Heihoff, F. (2015). A group signature scheme based on the LSRW assumption. Universität Paderborn.
LibreCat
 

2015 | Mastersthesis | LibreCat-ID: 297
Sosniak, M. (2015). Evaluation of Pairing Optimization for Embedded Platforms. Universität Paderborn.
LibreCat
 

2015 | Mastersthesis | LibreCat-ID: 299
Gerken, B. (2015). Elektromagnetische Seitenkanalangriffe auf paarungsbasierte Kryptographie. Universität Paderborn.
LibreCat
 

2015 | Mastersthesis | LibreCat-ID: 301 | OA
Bobolz, J. (2015). Efficient Verifier-Local Revocation for Anonymous Credentials. Universität Paderborn.
LibreCat | Files available
 

2015 | Mastersthesis | LibreCat-ID: 302
Stroh, C. (2015). Efficient Attributes for Pairing-Based Anonymous Credentials. Universität Paderborn.
LibreCat
 

2015 | Mastersthesis | LibreCat-ID: 312
Schleiter, P. (2015). Constructions of Fully Secure Predicate Encryption Schemes. Universität Paderborn.
LibreCat | Files available
 

2015 | Mastersthesis | LibreCat-ID: 273
Kohn, K. (2015). Number of Voronoi-relevant vectors in lattices with respect to arbitrary norms. Universität Paderborn.
LibreCat
 

2015 | Report | LibreCat-ID: 233 | OA
Blömer, J., & Kohn, K. (2015). Voronoi Cells of Lattices with Respect to Arbitrary Norms. Universität Paderborn.
LibreCat | Files available | Download (ext.)
 

2014 | Bachelorsthesis | LibreCat-ID: 2866
Biermeier, F. (2014). Untersuchung des Erreichbarkeitsproblems in ungerichteten Graphen bezüglich den Komplexitätsklassen L und SL.
LibreCat
 

2014 | Bachelorsthesis | LibreCat-ID: 2867
Sauer, M. (2014). Evaluierung von Initialisierungsmethoden für Fuzzy-k-means Algorithmen.
LibreCat
 

2014 | Conference Paper | LibreCat-ID: 355
Blömer, J., Günther, P., & Liske, G. (2014). Tampering attacks in pairing-based cryptography. In Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC) (pp. 1--7). https://doi.org/10.1109/FDTC.2014.10
LibreCat | Files available | DOI
 

2014 | Bachelorsthesis | LibreCat-ID: 369
Rath, T. (2014). RSA-Full Domain Hash Revisited. Universität Paderborn.
LibreCat
 

2014 | Mastersthesis | LibreCat-ID: 2900
Brauer, S. (2014). A Probabilistic Expectation Maximization Algorithm for Multivariate Laplacian Mixtures.
LibreCat | Files available
 

2014 | Journal Article | LibreCat-ID: 2976
Ackermann, M. R., Blömer, J., Kuntze, D., & Sohler, C. (2014). Analysis of Agglomerative Clustering. Algorithmica, 69. https://doi.org/10.1007/s00453-012-9717-4
LibreCat | DOI
 

2014 | Conference Paper | LibreCat-ID: 2977
Blömer, J., Bujna, K., & Kuntze, D. (2014). A Theoretical and Experimental Comparison of the EM and SEM Algorithm. In 2014 22nd International Conference on Pattern Recognition. IEEE. https://doi.org/10.1109/icpr.2014.253
LibreCat | DOI
 

2014 | Preprint | LibreCat-ID: 442 | OA
Blömer, J., & Liske, G. (2014). Constructing CCA-secure predicate encapsulation schemes from CPA-secure schemes and universal one-way hash functions. Universität Paderborn.
LibreCat | Files available | Download (ext.)
 

2014 | Conference Paper | LibreCat-ID: 463
Blömer, J., Gomes da Silva, R., Günther, P., Krämer, J., & Seifert, J.-P. (2014). A Practical Second-Order Fault Attack against a Real-World Pairing Implementation. In Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC) (pp. 123--136). https://doi.org/10.1109/FDTC.2014.22
LibreCat | Files available | DOI
 

2014 | Mastersthesis | LibreCat-ID: 414
Jochheim, J. (2014). Hiding software components using functional encryption. Universität Paderborn.
LibreCat
 

2014 | Bachelorsthesis | LibreCat-ID: 416
Bemmann, P. (2014). Group Signature Schemes with Strong Exculpability. Universität Paderborn.
LibreCat
 

2014 | Bachelorsthesis | LibreCat-ID: 421
Lippert, J. (2014). Fujisaki-Okamoto Transformation. Universität Paderborn.
LibreCat
 

2013 | Bachelorsthesis | LibreCat-ID: 2868
Laudemann, S. (2013). Themenmodellierung zur Identifikation und Gruppierung von Spam-Webseiten.
LibreCat
 

2013 | Bachelorsthesis | LibreCat-ID: 2869
Leder, L. (2013). Nichtapproximierbarkeitsresultate zu Radius- und Durchmesserclustering unter Verwendung von L_p-Metriken.
LibreCat
 

2013 | Dissertation | LibreCat-ID: 2909
Kuntze, D. (2013). Practical algorithms for clustering and modeling large data sets - Analysis and improvements. Universität Paderborn.
LibreCat | Download (ext.)
 

2013 | Report | LibreCat-ID: 2917
Juhnke, J., Lefmann, H., & Strehl, V. (2013). An Approach for Determining Optimal Contrast in Visual Cryptography. Fortschritt-Berichte VDI.
LibreCat
 

2013 | Book Chapter | LibreCat-ID: 2979
Blömer, J., Günther, P., & Liske, G. (2013). Improved Side Channel Attacks on Pairing Based Cryptography. In Constructive Side-Channel Analysis and Secure Design (pp. 154–168). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-40026-1_10
LibreCat | DOI
 

2013 | Bachelorsthesis | LibreCat-ID: 471
Tezer, A. (2013). Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen. Universität Paderborn.
LibreCat
 

2013 | Bachelorsthesis | LibreCat-ID: 486
Otte, O. (2013). Seitenkanalresistenz paarungsbasierter Kryptographie. Universität Paderborn.
LibreCat
 

2013 | Bachelorsthesis | LibreCat-ID: 487 | OA
Bobolz, J. (2013). Security Proofs for Pairing-Based Cryptography in the Generic Group Model. Universität Paderborn.
LibreCat | Files available
 

2013 | Conference Paper | LibreCat-ID: 488
Blömer, J., Günther, P., & Krummel, V. (2013). Securing Critical Unattended Systems with Identity Based Cryptography - A Case Study. In Proceedings of the 5th International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS) (pp. 98–105).
LibreCat | Files available
 

2013 | Preprint | LibreCat-ID: 538 | OA
Blömer, J., & Liske, G. (2013). Direct Chosen-Ciphertext Secure Attribute-Based Key Encapsulations without Random Oracles. Universität Paderborn.
LibreCat | Files available | Download (ext.)
 

2013 | Bachelorsthesis | LibreCat-ID: 553
Kohn, K. (2013). Attributbasierte Verschlüsselung mittels Gittermethoden - Mathematische Grundlagen, Verfahren und Sicherheitsbeweise. Universität Paderborn.
LibreCat
 

2012 | Conference Paper | LibreCat-ID: 2982
Ackermann, M. R., Märtens, M., Raupach, C., Swierkot, K., Lammersen, C., & Sohler, C. (2012). StreamKM++: A clustering algorithm for data streams. New York, NY, USA: ACM. https://doi.org/10.1145/2133803.2184450
LibreCat | DOI
 

2012 | Journal Article | LibreCat-ID: 2984
Blömer, J. (2012). Turing und Kryptografie. Informatik-Spektrum, 35(4). https://doi.org/10.1007/s00287-012-0622-7
LibreCat | DOI
 

2012 | Bachelorsthesis | LibreCat-ID: 606
Löken, N. (2012). Identitätsbasierte Signaturen - Ein Sicherheitsbeweis für Signaturen auf Grundlage von Gap-Diffie-Hellman-Gruppen mit Hilfe des Forking-Lemmas. Universität Paderborn.
LibreCat
 

2012 | Bachelorsthesis | LibreCat-ID: 607
Haarhoff, T. (2012). Identitätsbasierte Kryptographie - Implementierung von Paarungen für Körper der Charakteristik 2. Universität Paderborn.
LibreCat
 

2012 | Bachelorsthesis | LibreCat-ID: 629
Schleiter, P. (2012). Attribute-basierte Verschlüsselung. Universität Paderborn.
LibreCat
 

2011 | Bachelorsthesis | LibreCat-ID: 2872
Böttger, T. (2011). Bicriteria-Approximation für das k-Median-Clustering mit Bregman-Divergenzen.
LibreCat | Files available
 

2011 | Mastersthesis | LibreCat-ID: 2902
Märtens, M. (2011). The Monotone Complexity of Computing k-Clique on Random Graphs.
LibreCat
 

2011 | Dissertation | LibreCat-ID: 2910
Naewe, S. (2011). Algorithms for lattice problems with respect to general norms. Universität Paderborn.
LibreCat | Download (ext.)
 

2011 | Conference Paper | LibreCat-ID: 2985
Ackermann, M. R., Blömer, J., & Scholz, C. (2011). Hardness and Non-Approximability of Bregman Clustering Problems.
LibreCat
 

2011 | Book Chapter | LibreCat-ID: 2986
Blömer, J. (2011). How to Share a Secret. In Algorithms Unplugged (pp. 159–168). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-15328-0_17
LibreCat | DOI
 

2011 | Preprint | LibreCat-ID: 2987
Blömer, J., & Naewe, S. (2011). Solving the Closest Vector Problem with respect to Lp Norms. ArXiv:1104.3720.
LibreCat
 

2011 | Mastersthesis | LibreCat-ID: 659
Liske, G. (2011). Fault attacks in pairing-based cryptography. Universität Paderborn.
LibreCat | Files available
 

2010 | Book Chapter | LibreCat-ID: 2988
Ackermann, M. R., & Blömer, J. (2010). Bregman Clustering for Separable Instances. In SWAT 2010 (pp. 212–223). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-13731-0_21
LibreCat | DOI
 

2010 | Journal Article | LibreCat-ID: 2990
Ackermann, M. R., Blömer, J., & Sohler, C. (2010). Clustering for Metric and Nonmetric Distance Measures. ACM Trans. Algorithms, (4), 59:1--59:26. https://doi.org/10.1145/1824777.1824779
LibreCat | DOI
 

2010 | Journal Article | LibreCat-ID: 2991
Krueger, A., Leutnant, V., Haeb-Umbach, R., Ackermann, M., & Blömer, J. (2010). On the initialization of dynamic models for speech features. Proc. of ITG Fachtagung Sprachkommunikation. ITG, Bochum, Germany.
LibreCat
 

2010 | Conference Paper | LibreCat-ID: 2993
Schrieb, J. (2010). Efficient and Compact CCA Security from Partitioned IBKEM.
LibreCat
 

2010 | Conference Paper | LibreCat-ID: 2994
Schäfer, W., Trächtler, A., Birattari, M., Blömer, J., Dorigo, M., Engels, G., … Reif, W. (2010). Engineering self-coordinating software intensive systems. In Proceedings of the FSE/SDP workshop on Future of software engineering research - FoSER ’10. ACM Press. https://doi.org/10.1145/1882362.1882428
LibreCat | DOI
 

2010 | Misc | LibreCat-ID: 47684 | OA
Postler, T. (2010). Smart Card basierte Berechnung einer Gruppensignatur als Teil einer biometrischen Authentisierung.
LibreCat | Files available
 

Filters and Search Terms

department=64

Search

Filter Publications

Display / Sort

Citation Style: APA

Export / Embed