Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

229 Publications


2019 | Mastersthesis | LibreCat-ID: 13128 | OA
Bröcher, Henrik. Rational Secure Multiparty Computation. Universität Paderborn, 2019.
LibreCat | Files available
 

2019 | Mastersthesis | LibreCat-ID: 10306 | OA
Porzenheim, Laurens Alexander. Post-Quantum Secure Group Signatures, 2019.
LibreCat | Files available
 

2019 | Conference Paper | LibreCat-ID: 13554 | OA
Blömer, Johannes, and Nils Löken. “Personal Cross-Platform Reputation.” In Security and Trust Management, STM 2019, Vol. 11738. LNCS, 2019. https://doi.org/10.1007/978-3-030-31511-5_9.
LibreCat | Files available | DOI
 

2019 | Conference Paper | LibreCat-ID: 13557 | OA
Blömer, Johannes, and Nils Löken. “Dynamic Searchable Encryption with Access Control.” In 12th International Symposium on Foundations and Practice of Security, FPS 2019, Vol. 12056. LNCS. Springer, 2019.
LibreCat | Download (ext.)
 

2019 | Bachelorsthesis | LibreCat-ID: 13592
Pilot, Matthias. Efficient Finite-Field Arithmetic for Elliptic Curve Cryptography in Java. Universität Paderborn, 2019.
LibreCat
 

2019 | Mastersthesis | LibreCat-ID: 13648 | OA
Scholz, Swante. Implementation and Comparison of Elliptic Curve Algorithms in Java. Universität Paderborn, 2019.
LibreCat | Files available
 

2019 | Dissertation | LibreCat-ID: 13679
Brauer, Sascha. Classification and Approximation of Geometric Location Problems. Paderborn, 2019. https://doi.org/10.17619/UNIPB/1-816.
LibreCat | DOI
 

2019 | Conference Paper | LibreCat-ID: 13904 | OA
Blömer, Johannes, Jan Bobolz, Denis Pascal Diemert, and Fabian Eidens. “Updatable Anonymous Credentials and Applications to Incentive Systems.” In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security - CCS ’19. Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security - CCS ’19, 2019. https://doi.org/10.1145/3319535.3354223.
LibreCat | Files available | DOI | Download (ext.)
 

2018 | Conference Paper | LibreCat-ID: 2862 | OA
Blömer, Johannes, Fabian Eidens, and Jakob Juhnke. “Practical, Anonymous, and Publicly Linkable Universally-Composable Reputation Systems.” In Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers’ Track at the {RSA} Conference 2018, Proceedings, 470–90. Cham: Springer International Publishing, 2018. https://doi.org/10.1007/978-3-319-76953-0_25.
LibreCat | Files available | DOI | Download (ext.)
 

2018 | Journal Article | LibreCat-ID: 2685
Blömer, Johannes, and Kathlén Kohn. “Voronoi Cells of Lattices with Respect to Arbitrary Norms.” SIAM Journal on Applied Algebra and Geometry. 2, no. 2 (2018): 314–38. https://doi.org/10.1137/17M1132045.
LibreCat | Files available | DOI
 

2018 | Conference Paper | LibreCat-ID: 3265 | OA
Bemmann, Kai, Johannes Blömer, Jan Bobolz, Henrik Bröcher, Denis Pascal Diemert, Fabian Eidens, Lukas Eilers, et al. “Fully-Featured Anonymous Credentials with Reputation System.” In Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES ’18. New York, NY, USA: ACM, n.d. https://doi.org/10.1145/3230833.3234517.
LibreCat | Files available | DOI | Download (ext.)
 

2018 | Conference Paper | LibreCat-ID: 2965
Blömer, Johannes, and Nils Löken. “Cloud Architectures for Searchable Encryption.” In Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, 25:1--25:10. New York, NY, USA: ACM, n.d. https://doi.org/10.1145/3230833.3230853.
LibreCat | Files available | DOI
 

2018 | Working Paper | LibreCat-ID: 5820
Blömer, Johannes, Jan Bobolz, Christian Scheideler, and Alexander Setzer. Provably Anonymous Communication Based on Trusted Execution Environments, n.d.
LibreCat | Files available
 

2018 | Conference Paper | LibreCat-ID: 4344
Blömer, Johannes, Sascha Brauer, and Kathrin Bujna. “Coresets for Fuzzy K-Means with Applications.” In 29th International Symposium on Algorithms and Computation  (ISAAC 2018), 46:1--46:12. Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, 2018. https://doi.org/10.4230/LIPIcs.ISAAC.2018.46.
LibreCat | DOI
 

2018 | Bachelorsthesis | LibreCat-ID: 5426
Heißen, Oliver von. Implementierung und Analyse von Searchable Encryption, 2018.
LibreCat
 

2018 | Dissertation | LibreCat-ID: 6597
Juhnke, Jakob. Models and Constructions for Secure Reputation Systems. Universität Paderborn, 2018. https://doi.org/10.17619/UNIPB/1-570.
LibreCat | DOI
 

2018 | Conference Paper | LibreCat-ID: 3873 | OA
Blömer, Johannes, Fabian Eidens, and Jakob Juhnke. “Enhanced Security of Attribute-Based Signatures.” In The International Conference on Cryptology And Network Security (CANS), 11124:235–55. Lecture Notes in Computer Science. Springer, 2018. https://doi.org/10.1007/978-3-030-00434-7_12.
LibreCat | Files available | DOI | Download (ext.)
 

2018 | Conference Paper | LibreCat-ID: 2379 | OA
Blömer, Johannes, and Jan Bobolz. “Delegatable Attribute-Based Anonymous Credentials from Dynamically Malleable Signatures.” In ACNS 2018 Applied Cryptography & Network Security. LNCS, n.d. https://doi.org/10.1007/978-3-319-93387-0_12.
LibreCat | Files available | DOI | Download (ext.)
 

2017 | Dissertation | LibreCat-ID: 2908
Bujna, Kathrin. Soft Clustering Algorithms - Theoretical and Practical Improvements. Universität Paderborn, 2017. https://doi.org/10.17619/UNIPB/1-226.
LibreCat | DOI | Download (ext.)
 

2017 | Conference Paper | LibreCat-ID: 2967 | OA
Blömer, Johannes, and Gennadij Liske. “Subtleties in Security Definitions for Predicate Encryption with Public Index.” In Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS), 10693:438–53. Lecture Notes in Computer Science. Cham: Springer International Publishing, 2017. https://doi.org/10.1007/978-3-319-72453-9_35.
LibreCat | Files available | DOI | Download (ext.)
 

2017 | Dissertation | LibreCat-ID: 116
Liske, Gennadij. CCA-Security for Predicate Encryption Schemes. Universität Paderborn, 2017. https://doi.org/10.17619/UNIPB/1-220.
LibreCat | DOI | Download (ext.)
 

2017 | Conference Paper | LibreCat-ID: 2343 | OA
Löken, Nils. “Searchable Encryption with Access Control.” In Proceedings of the 12th International Conference on Availability, Reliability and Security  - ARES ’17. ICPS. ACM Press, 2017. https://doi.org/10.1145/3098954.3098987.
LibreCat | Files available | DOI | Download (ext.)
 

2017 | Conference Paper | LibreCat-ID: 2344 | OA
Blömer, Johannes, Peter Günther, Volker Krummel, and Nils Löken. “Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations.” In Foundations and Practice of Security, 3–17. Cham: Springer International Publishing, 2017. https://doi.org/10.1007/978-3-319-75650-9_1.
LibreCat | Files available | DOI
 

2017 | Book Chapter | LibreCat-ID: 2381
Brauer, Sascha. “Complexity of Single-Swap Heuristics for Metric Facility Location and Related Problems.” In Lecture Notes in Computer Science, edited by Dimitris Fotakis, Aris Pagourtzis, and Vangelis Th. Paschos, 10236:116–27. Cham: Springer International Publishing, 2017. https://doi.org/10.1007/978-3-319-57586-5_11.
LibreCat | DOI
 

2017 | Mastersthesis | LibreCat-ID: 60
Niehus, David. Semantically Secure Attribute-Based Searchable Encryption. Universität Paderborn, 2017.
LibreCat
 

2017 | Bachelorsthesis | LibreCat-ID: 88
Ganesh Athreya, Advait. Instantiating a Predicate Encryption Scheme via Pair Encodings. Universität Paderborn, 2017.
LibreCat
 

2017 | Bachelorsthesis | LibreCat-ID: 67
Jürgens, Mirko. Provably Secure Key-Derivation-Functions for Certain Types of Applications. Universität Paderborn, 2017.
LibreCat
 

2017 | Bachelorsthesis | LibreCat-ID: 104
Diemert, Denis. EAX - An Authenticated Encryption Mode for Block Ciphers. Universität Paderborn, 2017.
LibreCat
 

2017 | Mastersthesis | LibreCat-ID: 117
Bemmann, Pascal. Attribute-Based Signatures Using Structure Preserving Signatures. Universität Paderborn, 2017.
LibreCat
 

2016 | Mastersthesis | LibreCat-ID: 2898
Weis, Eduard. Searchable Encryption, 2016.
LibreCat
 

2016 | Conference Paper | LibreCat-ID: 2947
Blömer, Johannes, and Peter Günther. “Singular Curve Point Decompression Attack.” In 2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC). IEEE, 2016. https://doi.org/10.1109/fdtc.2015.17.
LibreCat | DOI
 

2016 | Book Chapter | LibreCat-ID: 2948
Günther, Peter, and Volker Krummel. “Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures.” In Mathematical Aspects of Computer and Information Sciences, 151–65. Cham: Springer International Publishing, 2016. https://doi.org/10.1007/978-3-319-32859-1_13.
LibreCat | DOI
 

2016 | Book Chapter | LibreCat-ID: 2968
Blömer, Johannes, Christiane Lammersen, Melanie Schmidt, and Christian Sohler. “Theoretical Analysis of the K-Means Algorithm – A Survey.” In Algorithm Engineering, 81–116. Cham: Springer International Publishing, 2016. https://doi.org/10.1007/978-3-319-49487-6_3.
LibreCat | DOI
 

2016 | Preprint | LibreCat-ID: 2969 | OA
Blömer, Johannes, Sascha Brauer, and Kathrin Bujna. “Hard-Clustering with Gaussian Mixture Models.” Computing Research Repository, 2016.
LibreCat | Download (ext.)
 

2016 | Book Chapter | LibreCat-ID: 2970
Blömer, Johannes, and Kathrin Bujna. “Adaptive Seeding for Gaussian Mixture Models.” In Advances in Knowledge Discovery and Data Mining, 296–308. Cham: Springer International Publishing, 2016. https://doi.org/10.1007/978-3-319-31750-2_24.
LibreCat | DOI
 

2016 | Report | LibreCat-ID: 2971
Blömer, Johannes, and Peter Günther. Effizienz Und Sicherheit Paarungsbasierter Kryptographie. Tagungsband des 26. Fraunhofer SIT Smartcard-Workshops, 2016.
LibreCat
 

2016 | Bachelorsthesis | LibreCat-ID: 213
Porzenheim, Laurens. Comparison of Different Definitions of Chosen-Ciphertext Security in Encryption Schemes. Universität Paderborn, 2016.
LibreCat
 

2016 | Bachelorsthesis | LibreCat-ID: 214
Bemmann, Kai Sören. Commitment Schemes - Definitions, Variants, and Security. Universität Paderborn, 2016.
LibreCat
 

2016 | Conference Paper | LibreCat-ID: 2367
Blömer, Johannes, Sascha Brauer, and Kathrin Bujna. “A Theoretical Analysis of the Fuzzy K-Means Problem.” In 2016 IEEE 16th International Conference on Data Mining (ICDM), 805–10. IEEE, 2016. https://doi.org/10.1109/icdm.2016.0094.
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 208
Blömer, Johannes, and Gennadij Liske. “Construction of Fully CCA-Secure Predicate Encryptions from Pair Encoding Schemes.” In Proceedings of the CT-RSA 2016, 431–47. LNCS, 2016. https://doi.org/10.1007/978-3-319-29485-8_25.
LibreCat | Files available | DOI
 

2016 | Dissertation | LibreCat-ID: 167
Günther, Peter. Physical Attacks on Pairing-Based Cryptography. Universität Paderborn, 2016.
LibreCat | Files available | Download (ext.)
 

2016 | Mastersthesis | LibreCat-ID: 146
Hamm, Julian. Symmetric Anonymous Credentials with Protocols for Relations on Attributes. Universität Paderborn, 2016.
LibreCat
 

2016 | Bachelorsthesis | LibreCat-ID: 152
Dallmeier, Fynn. Short Randomizable Aggregatable Signatures: Constructions and Security Analysis. Universität Paderborn, 2016.
LibreCat
 

2016 | Book Chapter | LibreCat-ID: 2978
Blömer, Johannes, and Kathrin Bujna. “Adaptive Seeding for Gaussian Mixture Models.” In Advances in Knowledge Discovery and Data Mining, 296–308. Cham: Springer International Publishing, 2016. https://doi.org/10.1007/978-3-319-31750-2_24.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 253
Blömer, Johannes, Jakob Juhnke, and Nils Löken. “Short Group Signatures with Distributed Traceability.” In Proceedings of the Sixth International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS), 166–80. LNCS, 2015. https://doi.org/10.1007/978-3-319-32859-1_14.
LibreCat | Files available | DOI
 

2015 | Bachelorsthesis | LibreCat-ID: 286
Kalde, Benedikt. Implementierung eines hybriden Verschlüsselungsverfahrens nach Cramer und Shoup. Universität Paderborn, 2015.
LibreCat
 

2015 | Bachelorsthesis | LibreCat-ID: 2865
Strotmann, Daniela. Singulärwertzerlegung Für μ-Ähnliche Bregman-Divergenzen, 2015.
LibreCat
 

2015 | Bachelorsthesis | LibreCat-ID: 261
Eisenhofer, Thorsten. Protokolle zur authentifizierten Schüsselvereinbarung. Universität Paderborn, 2015.
LibreCat
 

2015 | Mastersthesis | LibreCat-ID: 321
Eidens, Fabian. Anonymous Credential System Based on Q-Strong Diffie-Hellman Assumption. Universität Paderborn, 2015.
LibreCat | Files available
 

2015 | Conference Paper | LibreCat-ID: 322 | OA
Blömer, Johannes, Jakob Juhnke, and Christina Kolb. “Anonymous and Publicly Linkable Reputation Systems.” In Proceedings of the 18th International Conference on Financial Cryptography and Data Security (FC), 478--488. LNCS, 2015. https://doi.org/10.1007/978-3-662-47854-7_29.
LibreCat | Files available | DOI | Download (ext.)
 

2015 | Mastersthesis | LibreCat-ID: 325
Löken, Nils. A Group Signature Scheme with Distributed Group Management - An Application of Threshold Encryption. Universität Paderborn, 2015.
LibreCat | Files available
 

2015 | Bachelorsthesis | LibreCat-ID: 326
Heihoff, Frederic. A Group Signature Scheme Based on the LSRW Assumption. Universität Paderborn, 2015.
LibreCat
 

2015 | Mastersthesis | LibreCat-ID: 297
Sosniak, Martin. Evaluation of Pairing Optimization for Embedded Platforms. Universität Paderborn, 2015.
LibreCat
 

2015 | Mastersthesis | LibreCat-ID: 299
Gerken, Britta. Elektromagnetische Seitenkanalangriffe auf paarungsbasierte Kryptographie. Universität Paderborn, 2015.
LibreCat
 

2015 | Mastersthesis | LibreCat-ID: 301 | OA
Bobolz, Jan. Efficient Verifier-Local Revocation for Anonymous Credentials. Universität Paderborn, 2015.
LibreCat | Files available
 

2015 | Mastersthesis | LibreCat-ID: 302
Stroh, Christian. Efficient Attributes for Pairing-Based Anonymous Credentials. Universität Paderborn, 2015.
LibreCat
 

2015 | Mastersthesis | LibreCat-ID: 312
Schleiter, Patrick. Constructions of Fully Secure Predicate Encryption Schemes. Universität Paderborn, 2015.
LibreCat | Files available
 

2015 | Mastersthesis | LibreCat-ID: 273
Kohn, Kathlén. Number of Voronoi-Relevant Vectors in Lattices with Respect to Arbitrary Norms. Universität Paderborn, 2015.
LibreCat
 

2015 | Report | LibreCat-ID: 233 | OA
Blömer, Johannes, and Kathlén Kohn. Voronoi Cells of Lattices with Respect to Arbitrary Norms. Universität Paderborn, 2015.
LibreCat | Files available | Download (ext.)
 

2014 | Bachelorsthesis | LibreCat-ID: 2866
Biermeier, Felix. Untersuchung Des Erreichbarkeitsproblems in Ungerichteten Graphen Bezüglich Den Komplexitätsklassen L Und SL, 2014.
LibreCat
 

2014 | Bachelorsthesis | LibreCat-ID: 2867
Sauer, Malte. Evaluierung von Initialisierungsmethoden Für Fuzzy-k-Means Algorithmen, 2014.
LibreCat
 

2014 | Conference Paper | LibreCat-ID: 355
Blömer, Johannes, Peter Günther, and Gennadij Liske. “Tampering Attacks in Pairing-Based Cryptography.” In Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC), 1--7, 2014. https://doi.org/10.1109/FDTC.2014.10.
LibreCat | Files available | DOI
 

2014 | Bachelorsthesis | LibreCat-ID: 369
Rath, Timo. RSA-Full Domain Hash Revisited. Universität Paderborn, 2014.
LibreCat
 

2014 | Mastersthesis | LibreCat-ID: 2900
Brauer, Sascha. A Probabilistic Expectation Maximization Algorithm for Multivariate Laplacian Mixtures, 2014.
LibreCat | Files available
 

2014 | Journal Article | LibreCat-ID: 2976
Ackermann, Marcel Rudolf, Johannes Blömer, Daniel Kuntze, and Christian Sohler. “Analysis of Agglomerative Clustering.” Algorithmica 69 (2014). https://doi.org/10.1007/s00453-012-9717-4.
LibreCat | DOI
 

2014 | Conference Paper | LibreCat-ID: 2977
Blömer, Johannes, Kathrin Bujna, and Daniel Kuntze. “A Theoretical and Experimental Comparison of the EM and SEM Algorithm.” In 2014 22nd International Conference on Pattern Recognition. IEEE, 2014. https://doi.org/10.1109/icpr.2014.253.
LibreCat | DOI
 

2014 | Preprint | LibreCat-ID: 442 | OA
Blömer, Johannes, and Gennadij Liske. “Constructing CCA-Secure Predicate Encapsulation Schemes from CPA-Secure Schemes and Universal One-Way Hash Functions.” Universität Paderborn, 2014.
LibreCat | Files available | Download (ext.)
 

2014 | Conference Paper | LibreCat-ID: 463
Blömer, Johannes, Ricardo Gomes da Silva, Peter Günther, Juliane Krämer, and Jean-Pierre Seifert. “A Practical Second-Order Fault Attack against a Real-World Pairing Implementation.” In Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC), 123--136, 2014. https://doi.org/10.1109/FDTC.2014.22.
LibreCat | Files available | DOI
 

2014 | Mastersthesis | LibreCat-ID: 414
Jochheim, Janek. Hiding Software Components Using Functional Encryption. Universität Paderborn, 2014.
LibreCat
 

2014 | Bachelorsthesis | LibreCat-ID: 416
Bemmann, Pascal. Group Signature Schemes with Strong Exculpability. Universität Paderborn, 2014.
LibreCat
 

2014 | Bachelorsthesis | LibreCat-ID: 421
Lippert, Jan. Fujisaki-Okamoto Transformation. Universität Paderborn, 2014.
LibreCat
 

2013 | Bachelorsthesis | LibreCat-ID: 2868
Laudemann, Stefan. Themenmodellierung Zur Identifikation Und Gruppierung von Spam-Webseiten, 2013.
LibreCat
 

2013 | Bachelorsthesis | LibreCat-ID: 2869
Leder, Lennart. Nichtapproximierbarkeitsresultate Zu Radius- Und Durchmesserclustering Unter Verwendung von L_p-Metriken, 2013.
LibreCat
 

2013 | Dissertation | LibreCat-ID: 2909
Kuntze, Daniel. Practical Algorithms for Clustering and Modeling Large Data Sets - Analysis and Improvements. Universität Paderborn, 2013.
LibreCat | Download (ext.)
 

2013 | Report | LibreCat-ID: 2917
Juhnke, Jakob, Hanno Lefmann, and Volker Strehl. An Approach for Determining Optimal Contrast in Visual Cryptography. Fortschritt-Berichte VDI, 2013.
LibreCat
 

2013 | Book Chapter | LibreCat-ID: 2979
Blömer, Johannes, Peter Günther, and Gennadij Liske. “Improved Side Channel Attacks on Pairing Based Cryptography.” In Constructive Side-Channel Analysis and Secure Design, 154–68. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. https://doi.org/10.1007/978-3-642-40026-1_10.
LibreCat | DOI
 

2013 | Bachelorsthesis | LibreCat-ID: 471
Tezer, Alina. Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen. Universität Paderborn, 2013.
LibreCat
 

2013 | Bachelorsthesis | LibreCat-ID: 486
Otte, Oliver. Seitenkanalresistenz paarungsbasierter Kryptographie. Universität Paderborn, 2013.
LibreCat
 

2013 | Bachelorsthesis | LibreCat-ID: 487 | OA
Bobolz, Jan. Security Proofs for Pairing-Based Cryptography in the Generic Group Model. Universität Paderborn, 2013.
LibreCat | Files available
 

2013 | Conference Paper | LibreCat-ID: 488
Blömer, Johannes, Peter Günther, and Volker Krummel. “Securing Critical Unattended Systems with Identity Based Cryptography - A Case Study.” In Proceedings of the 5th International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS), 98–105, 2013.
LibreCat | Files available
 

2013 | Preprint | LibreCat-ID: 538 | OA
Blömer, Johannes, and Gennadij Liske. “Direct Chosen-Ciphertext Secure Attribute-Based Key Encapsulations without Random Oracles.” Universität Paderborn, 2013.
LibreCat | Files available | Download (ext.)
 

2013 | Bachelorsthesis | LibreCat-ID: 553
Kohn, Kathlén. Attributbasierte Verschlüsselung mittels Gittermethoden - Mathematische Grundlagen, Verfahren und Sicherheitsbeweise. Universität Paderborn, 2013.
LibreCat
 

2012 | Conference Paper | LibreCat-ID: 2982
Ackermann, Marcel Rudolf, Marcus Märtens, Christoph Raupach, Kamil Swierkot, Christiane Lammersen, and Christian Sohler. “StreamKM++: A Clustering Algorithm for Data Streams.” ACM Journal of Experimental Algorithmics. New York, NY, USA: ACM, 2012. https://doi.org/10.1145/2133803.2184450.
LibreCat | DOI
 

2012 | Journal Article | LibreCat-ID: 2984
Blömer, Johannes. “Turing Und Kryptografie.” Informatik-Spektrum 35, no. 4 (2012). https://doi.org/10.1007/s00287-012-0622-7.
LibreCat | DOI
 

2012 | Bachelorsthesis | LibreCat-ID: 606
Löken, Nils. Identitätsbasierte Signaturen - Ein Sicherheitsbeweis für Signaturen auf Grundlage von Gap-Diffie-Hellman-Gruppen mit Hilfe des Forking-Lemmas. Universität Paderborn, 2012.
LibreCat
 

2012 | Bachelorsthesis | LibreCat-ID: 607
Haarhoff, Thomas. Identitätsbasierte Kryptographie - Implementierung von Paarungen für Körper der Charakteristik 2. Universität Paderborn, 2012.
LibreCat
 

2012 | Bachelorsthesis | LibreCat-ID: 629
Schleiter, Patrick. Attribute-basierte Verschlüsselung. Universität Paderborn, 2012.
LibreCat
 

2011 | Bachelorsthesis | LibreCat-ID: 2872
Böttger, Timm. Bicriteria-Approximation Für Das k-Median-Clustering Mit Bregman-Divergenzen, 2011.
LibreCat | Files available
 

2011 | Mastersthesis | LibreCat-ID: 2902
Märtens, Marcus. The Monotone Complexity of Computing K-Clique on Random Graphs, 2011.
LibreCat
 

2011 | Dissertation | LibreCat-ID: 2910
Naewe, Stefanie. Algorithms for Lattice Problems with Respect to General Norms. Universität Paderborn, 2011.
LibreCat | Download (ext.)
 

2011 | Conference Paper | LibreCat-ID: 2985
Ackermann, Marcel R, Johannes Blömer, and Christoph Scholz. “Hardness and Non-Approximability of Bregman Clustering Problems.” Electronic Colloquium on Computational Complexity (ECCC), 2011.
LibreCat
 

2011 | Book Chapter | LibreCat-ID: 2986
Blömer, Johannes. “How to Share a Secret.” In Algorithms Unplugged, 159–68. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. https://doi.org/10.1007/978-3-642-15328-0_17.
LibreCat | DOI
 

2011 | Preprint | LibreCat-ID: 2987
Blömer, Johannes, and Stefanie Naewe. “Solving the Closest Vector Problem with Respect to Lp Norms.” ArXiv:1104.3720, 2011.
LibreCat
 

2011 | Mastersthesis | LibreCat-ID: 659
Liske, Gennadij. Fault Attacks in Pairing-Based Cryptography. Universität Paderborn, 2011.
LibreCat | Files available
 

2010 | Book Chapter | LibreCat-ID: 2988
Ackermann, Marcel R., and Johannes Blömer. “Bregman Clustering for Separable Instances.” In SWAT 2010, 212–23. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. https://doi.org/10.1007/978-3-642-13731-0_21.
LibreCat | DOI
 

2010 | Journal Article | LibreCat-ID: 2990
Ackermann, Marcel R., Johannes Blömer, and Christian Sohler. “Clustering for Metric and Nonmetric Distance Measures.” ACM Trans. Algorithms, no. 4 (2010): 59:1--59:26. https://doi.org/10.1145/1824777.1824779.
LibreCat | DOI
 

2010 | Journal Article | LibreCat-ID: 2991
Krueger, Alexander, Volker Leutnant, Reinhold Haeb-Umbach, Marcel Ackermann, and Johannes Blömer. “On the Initialization of Dynamic Models for Speech Features.” Proc. of ITG Fachtagung Sprachkommunikation. ITG, Bochum, Germany, 2010.
LibreCat
 

2010 | Conference Paper | LibreCat-ID: 2993
Schrieb, Jonas. “Efficient and Compact CCA Security from Partitioned IBKEM.” Proceedings of the 3rd Western European Workshop on Research in Cryptology, 2010.
LibreCat
 

2010 | Conference Paper | LibreCat-ID: 2994
Schäfer, Wilhelm, Ansgar Trächtler, Mauro Birattari, Johannes Blömer, Marco Dorigo, Gregor Engels, Rehan O’Grady, Marco Platzner, Franz Rammig, and Wolfgang Reif. “Engineering Self-Coordinating Software Intensive Systems.” In Proceedings of the FSE/SDP Workshop on Future of Software Engineering Research - FoSER ’10. ACM Press, 2010. https://doi.org/10.1145/1882362.1882428.
LibreCat | DOI
 

2010 | Misc | LibreCat-ID: 47684 | OA
Postler, Tim. Smart Card basierte Berechnung einer Gruppensignatur als Teil einer biometrischen Authentisierung, 2010.
LibreCat | Files available
 

Filters and Search Terms

department=64

Search

Filter Publications

Display / Sort

Citation Style: Chicago

Export / Embed