Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
229 Publications
2017 | Dissertation | LibreCat-ID: 116
CCA-Security for Predicate Encryption Schemes
G. Liske, CCA-Security for Predicate Encryption Schemes, Universität Paderborn, 2017.
LibreCat
| DOI
| Download (ext.)
G. Liske, CCA-Security for Predicate Encryption Schemes, Universität Paderborn, 2017.
2017 | Conference Paper | LibreCat-ID: 2343 |
Searchable Encryption with Access Control
N. Löken, in: Proceedings of the 12th International Conference on Availability, Reliability and Security - ARES ’17, ACM Press, 2017.
LibreCat
| Files available
| DOI
| Download (ext.)
N. Löken, in: Proceedings of the 12th International Conference on Availability, Reliability and Security - ARES ’17, ACM Press, 2017.
2017 | Conference Paper | LibreCat-ID: 2344 |
Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations
J. Blömer, P. Günther, V. Krummel, N. Löken, in: Foundations and Practice of Security, Springer International Publishing, Cham, 2017, pp. 3–17.
LibreCat
| Files available
| DOI
J. Blömer, P. Günther, V. Krummel, N. Löken, in: Foundations and Practice of Security, Springer International Publishing, Cham, 2017, pp. 3–17.
2017 | Book Chapter | LibreCat-ID: 2381
Complexity of Single-Swap Heuristics for Metric Facility Location and Related Problems
S. Brauer, in: D. Fotakis, A. Pagourtzis, V.T. Paschos (Eds.), Lecture Notes in Computer Science, Springer International Publishing, Cham, 2017, pp. 116–127.
LibreCat
| DOI
S. Brauer, in: D. Fotakis, A. Pagourtzis, V.T. Paschos (Eds.), Lecture Notes in Computer Science, Springer International Publishing, Cham, 2017, pp. 116–127.
2017 | Mastersthesis | LibreCat-ID: 60
Semantically Secure Attribute-based Searchable Encryption
D. Niehus, Semantically Secure Attribute-Based Searchable Encryption, Universität Paderborn, 2017.
LibreCat
D. Niehus, Semantically Secure Attribute-Based Searchable Encryption, Universität Paderborn, 2017.
2017 | Bachelorsthesis | LibreCat-ID: 88
Instantiating a Predicate Encryption Scheme via Pair Encodings
A. Ganesh Athreya, Instantiating a Predicate Encryption Scheme via Pair Encodings, Universität Paderborn, 2017.
LibreCat
A. Ganesh Athreya, Instantiating a Predicate Encryption Scheme via Pair Encodings, Universität Paderborn, 2017.
2017 | Bachelorsthesis | LibreCat-ID: 67
Provably Secure Key-Derivation-Functions for Certain Types of Applications
M. Jürgens, Provably Secure Key-Derivation-Functions for Certain Types of Applications, Universität Paderborn, 2017.
LibreCat
M. Jürgens, Provably Secure Key-Derivation-Functions for Certain Types of Applications, Universität Paderborn, 2017.
2017 | Bachelorsthesis | LibreCat-ID: 104
EAX - An Authenticated Encryption Mode for Block Ciphers
D. Diemert, EAX - An Authenticated Encryption Mode for Block Ciphers, Universität Paderborn, 2017.
LibreCat
D. Diemert, EAX - An Authenticated Encryption Mode for Block Ciphers, Universität Paderborn, 2017.
2017 | Mastersthesis | LibreCat-ID: 117
Attribute-based Signatures using Structure Preserving Signatures
P. Bemmann, Attribute-Based Signatures Using Structure Preserving Signatures, Universität Paderborn, 2017.
LibreCat
P. Bemmann, Attribute-Based Signatures Using Structure Preserving Signatures, Universität Paderborn, 2017.
2016 | Mastersthesis | LibreCat-ID: 2898
Searchable Encryption
E. Weis, Searchable Encryption, 2016.
LibreCat
E. Weis, Searchable Encryption, 2016.
2016 | Conference Paper | LibreCat-ID: 2947
Singular Curve Point Decompression Attack
J. Blömer, P. Günther, in: 2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), IEEE, 2016.
LibreCat
| DOI
J. Blömer, P. Günther, in: 2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), IEEE, 2016.
2016 | Book Chapter | LibreCat-ID: 2948
Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures
P. Günther, V. Krummel, in: Mathematical Aspects of Computer and Information Sciences, Springer International Publishing, Cham, 2016, pp. 151–165.
LibreCat
| DOI
P. Günther, V. Krummel, in: Mathematical Aspects of Computer and Information Sciences, Springer International Publishing, Cham, 2016, pp. 151–165.
2016 | Book Chapter | LibreCat-ID: 2968
Theoretical Analysis of the k-Means Algorithm – A Survey
J. Blömer, C. Lammersen, M. Schmidt, C. Sohler, in: Algorithm Engineering, Springer International Publishing, Cham, 2016, pp. 81–116.
LibreCat
| DOI
J. Blömer, C. Lammersen, M. Schmidt, C. Sohler, in: Algorithm Engineering, Springer International Publishing, Cham, 2016, pp. 81–116.
2016 | Preprint | LibreCat-ID: 2969 |
Hard-Clustering with Gaussian Mixture Models
J. Blömer, S. Brauer, K. Bujna, (2016).
LibreCat
| Download (ext.)
J. Blömer, S. Brauer, K. Bujna, (2016).
2016 | Book Chapter | LibreCat-ID: 2970
Adaptive Seeding for Gaussian Mixture Models
J. Blömer, K. Bujna, in: Advances in Knowledge Discovery and Data Mining, Springer International Publishing, Cham, 2016, pp. 296–308.
LibreCat
| DOI
J. Blömer, K. Bujna, in: Advances in Knowledge Discovery and Data Mining, Springer International Publishing, Cham, 2016, pp. 296–308.
2016 | Report | LibreCat-ID: 2971
Effizienz und Sicherheit paarungsbasierter Kryptographie
J. Blömer, P. Günther, Effizienz Und Sicherheit Paarungsbasierter Kryptographie, Tagungsband des 26. Fraunhofer SIT Smartcard-Workshops, 2016.
LibreCat
J. Blömer, P. Günther, Effizienz Und Sicherheit Paarungsbasierter Kryptographie, Tagungsband des 26. Fraunhofer SIT Smartcard-Workshops, 2016.
2016 | Bachelorsthesis | LibreCat-ID: 213
Comparison of different Definitions of Chosen-Ciphertext Security in Encryption schemes
L. Porzenheim, Comparison of Different Definitions of Chosen-Ciphertext Security in Encryption Schemes, Universität Paderborn, 2016.
LibreCat
L. Porzenheim, Comparison of Different Definitions of Chosen-Ciphertext Security in Encryption Schemes, Universität Paderborn, 2016.
2016 | Bachelorsthesis | LibreCat-ID: 214
Commitment Schemes - Definitions, Variants, and Security
K.S. Bemmann, Commitment Schemes - Definitions, Variants, and Security, Universität Paderborn, 2016.
LibreCat
K.S. Bemmann, Commitment Schemes - Definitions, Variants, and Security, Universität Paderborn, 2016.
2016 | Conference Paper | LibreCat-ID: 2367
A Theoretical Analysis of the Fuzzy K-Means Problem
J. Blömer, S. Brauer, K. Bujna, in: 2016 IEEE 16th International Conference on Data Mining (ICDM), IEEE, 2016, pp. 805–810.
LibreCat
| DOI
J. Blömer, S. Brauer, K. Bujna, in: 2016 IEEE 16th International Conference on Data Mining (ICDM), IEEE, 2016, pp. 805–810.
2016 | Conference Paper | LibreCat-ID: 208
Construction of Fully CCA-Secure Predicate Encryptions from Pair Encoding Schemes
J. Blömer, G. Liske, in: Proceedings of the CT-RSA 2016, 2016, pp. 431–447.
LibreCat
| Files available
| DOI
J. Blömer, G. Liske, in: Proceedings of the CT-RSA 2016, 2016, pp. 431–447.
2016 | Dissertation | LibreCat-ID: 167
Physical attacks on pairing-based cryptography
P. Günther, Physical Attacks on Pairing-Based Cryptography, Universität Paderborn, 2016.
LibreCat
| Files available
| Download (ext.)
P. Günther, Physical Attacks on Pairing-Based Cryptography, Universität Paderborn, 2016.
2016 | Mastersthesis | LibreCat-ID: 146
Symmetric Anonymous Credentials with Protocols for Relations on Attributes
J. Hamm, Symmetric Anonymous Credentials with Protocols for Relations on Attributes, Universität Paderborn, 2016.
LibreCat
J. Hamm, Symmetric Anonymous Credentials with Protocols for Relations on Attributes, Universität Paderborn, 2016.
2016 | Bachelorsthesis | LibreCat-ID: 152
Short Randomizable Aggregatable Signatures: Constructions and Security Analysis
F. Dallmeier, Short Randomizable Aggregatable Signatures: Constructions and Security Analysis, Universität Paderborn, 2016.
LibreCat
F. Dallmeier, Short Randomizable Aggregatable Signatures: Constructions and Security Analysis, Universität Paderborn, 2016.
2016 | Book Chapter | LibreCat-ID: 2978
Adaptive Seeding for Gaussian Mixture Models
J. Blömer, K. Bujna, in: Advances in Knowledge Discovery and Data Mining, Springer International Publishing, Cham, 2016, pp. 296–308.
LibreCat
| DOI
J. Blömer, K. Bujna, in: Advances in Knowledge Discovery and Data Mining, Springer International Publishing, Cham, 2016, pp. 296–308.
2015 | Conference Paper | LibreCat-ID: 253
Short Group Signatures with Distributed Traceability
J. Blömer, J. Juhnke, N. Löken, in: Proceedings of the Sixth International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS), 2015, pp. 166–180.
LibreCat
| Files available
| DOI
J. Blömer, J. Juhnke, N. Löken, in: Proceedings of the Sixth International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS), 2015, pp. 166–180.
2015 | Bachelorsthesis | LibreCat-ID: 286
Implementierung eines hybriden Verschlüsselungsverfahrens nach Cramer und Shoup
B. Kalde, Implementierung eines hybriden Verschlüsselungsverfahrens nach Cramer und Shoup, Universität Paderborn, 2015.
LibreCat
B. Kalde, Implementierung eines hybriden Verschlüsselungsverfahrens nach Cramer und Shoup, Universität Paderborn, 2015.
2015 | Bachelorsthesis | LibreCat-ID: 2865
Singulärwertzerlegung für μ-ähnliche Bregman-Divergenzen
D. Strotmann, Singulärwertzerlegung Für μ-Ähnliche Bregman-Divergenzen, 2015.
LibreCat
D. Strotmann, Singulärwertzerlegung Für μ-Ähnliche Bregman-Divergenzen, 2015.
2015 | Bachelorsthesis | LibreCat-ID: 261
Protokolle zur authentifizierten Schüsselvereinbarung
T. Eisenhofer, Protokolle zur authentifizierten Schüsselvereinbarung, Universität Paderborn, 2015.
LibreCat
T. Eisenhofer, Protokolle zur authentifizierten Schüsselvereinbarung, Universität Paderborn, 2015.
2015 | Mastersthesis | LibreCat-ID: 321
Anonymous credential system based on q-Strong Diffie-Hellman Assumption
F. Eidens, Anonymous Credential System Based on Q-Strong Diffie-Hellman Assumption, Universität Paderborn, 2015.
LibreCat
| Files available
F. Eidens, Anonymous Credential System Based on Q-Strong Diffie-Hellman Assumption, Universität Paderborn, 2015.
2015 | Conference Paper | LibreCat-ID: 322 |
Anonymous and Publicly Linkable Reputation Systems
J. Blömer, J. Juhnke, C. Kolb, in: Proceedings of the 18th International Conference on Financial Cryptography and Data Security (FC), 2015, pp. 478--488.
LibreCat
| Files available
| DOI
| Download (ext.)
J. Blömer, J. Juhnke, C. Kolb, in: Proceedings of the 18th International Conference on Financial Cryptography and Data Security (FC), 2015, pp. 478--488.
2015 | Mastersthesis | LibreCat-ID: 325
A Group Signature Scheme with Distributed Group Management - An Application of Threshold Encryption
N. Löken, A Group Signature Scheme with Distributed Group Management - An Application of Threshold Encryption, Universität Paderborn, 2015.
LibreCat
| Files available
N. Löken, A Group Signature Scheme with Distributed Group Management - An Application of Threshold Encryption, Universität Paderborn, 2015.
2015 | Bachelorsthesis | LibreCat-ID: 326
A group signature scheme based on the LSRW assumption
F. Heihoff, A Group Signature Scheme Based on the LSRW Assumption, Universität Paderborn, 2015.
LibreCat
F. Heihoff, A Group Signature Scheme Based on the LSRW Assumption, Universität Paderborn, 2015.
2015 | Mastersthesis | LibreCat-ID: 297
Evaluation of Pairing Optimization for Embedded Platforms
M. Sosniak, Evaluation of Pairing Optimization for Embedded Platforms, Universität Paderborn, 2015.
LibreCat
M. Sosniak, Evaluation of Pairing Optimization for Embedded Platforms, Universität Paderborn, 2015.
2015 | Mastersthesis | LibreCat-ID: 299
Elektromagnetische Seitenkanalangriffe auf paarungsbasierte Kryptographie
B. Gerken, Elektromagnetische Seitenkanalangriffe auf paarungsbasierte Kryptographie, Universität Paderborn, 2015.
LibreCat
B. Gerken, Elektromagnetische Seitenkanalangriffe auf paarungsbasierte Kryptographie, Universität Paderborn, 2015.
2015 | Mastersthesis | LibreCat-ID: 301 |
Efficient Verifier-Local Revocation for Anonymous Credentials
J. Bobolz, Efficient Verifier-Local Revocation for Anonymous Credentials, Universität Paderborn, 2015.
LibreCat
| Files available
J. Bobolz, Efficient Verifier-Local Revocation for Anonymous Credentials, Universität Paderborn, 2015.
2015 | Mastersthesis | LibreCat-ID: 302
Efficient Attributes for Pairing-Based Anonymous Credentials
C. Stroh, Efficient Attributes for Pairing-Based Anonymous Credentials, Universität Paderborn, 2015.
LibreCat
C. Stroh, Efficient Attributes for Pairing-Based Anonymous Credentials, Universität Paderborn, 2015.
2015 | Mastersthesis | LibreCat-ID: 312
Constructions of Fully Secure Predicate Encryption Schemes
P. Schleiter, Constructions of Fully Secure Predicate Encryption Schemes, Universität Paderborn, 2015.
LibreCat
| Files available
P. Schleiter, Constructions of Fully Secure Predicate Encryption Schemes, Universität Paderborn, 2015.
2015 | Mastersthesis | LibreCat-ID: 273
Number of Voronoi-relevant vectors in lattices with respect to arbitrary norms
K. Kohn, Number of Voronoi-Relevant Vectors in Lattices with Respect to Arbitrary Norms, Universität Paderborn, 2015.
LibreCat
K. Kohn, Number of Voronoi-Relevant Vectors in Lattices with Respect to Arbitrary Norms, Universität Paderborn, 2015.
2015 | Report | LibreCat-ID: 233 |
Voronoi Cells of Lattices with Respect to Arbitrary Norms
J. Blömer, K. Kohn, Voronoi Cells of Lattices with Respect to Arbitrary Norms, Universität Paderborn, 2015.
LibreCat
| Files available
| Download (ext.)
J. Blömer, K. Kohn, Voronoi Cells of Lattices with Respect to Arbitrary Norms, Universität Paderborn, 2015.
2014 | Bachelorsthesis | LibreCat-ID: 2866
Untersuchung des Erreichbarkeitsproblems in ungerichteten Graphen bezüglich den Komplexitätsklassen L und SL
F. Biermeier, Untersuchung Des Erreichbarkeitsproblems in Ungerichteten Graphen Bezüglich Den Komplexitätsklassen L Und SL, 2014.
LibreCat
F. Biermeier, Untersuchung Des Erreichbarkeitsproblems in Ungerichteten Graphen Bezüglich Den Komplexitätsklassen L Und SL, 2014.
2014 | Bachelorsthesis | LibreCat-ID: 2867
Evaluierung von Initialisierungsmethoden für Fuzzy-k-means Algorithmen
M. Sauer, Evaluierung von Initialisierungsmethoden Für Fuzzy-k-Means Algorithmen, 2014.
LibreCat
M. Sauer, Evaluierung von Initialisierungsmethoden Für Fuzzy-k-Means Algorithmen, 2014.
2014 | Conference Paper | LibreCat-ID: 355
Tampering attacks in pairing-based cryptography
J. Blömer, P. Günther, G. Liske, in: Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC), 2014, pp. 1--7.
LibreCat
| Files available
| DOI
J. Blömer, P. Günther, G. Liske, in: Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC), 2014, pp. 1--7.
2014 | Bachelorsthesis | LibreCat-ID: 369
RSA-Full Domain Hash Revisited
T. Rath, RSA-Full Domain Hash Revisited, Universität Paderborn, 2014.
LibreCat
T. Rath, RSA-Full Domain Hash Revisited, Universität Paderborn, 2014.
2014 | Mastersthesis | LibreCat-ID: 2900
A Probabilistic Expectation Maximization Algorithm for Multivariate Laplacian Mixtures
S. Brauer, A Probabilistic Expectation Maximization Algorithm for Multivariate Laplacian Mixtures, 2014.
LibreCat
| Files available
S. Brauer, A Probabilistic Expectation Maximization Algorithm for Multivariate Laplacian Mixtures, 2014.
2014 | Journal Article | LibreCat-ID: 2976
Analysis of Agglomerative Clustering
M.R. Ackermann, J. Blömer, D. Kuntze, C. Sohler, Algorithmica 69 (2014).
LibreCat
| DOI
M.R. Ackermann, J. Blömer, D. Kuntze, C. Sohler, Algorithmica 69 (2014).
2014 | Conference Paper | LibreCat-ID: 2977
A Theoretical and Experimental Comparison of the EM and SEM Algorithm
J. Blömer, K. Bujna, D. Kuntze, in: 2014 22nd International Conference on Pattern Recognition, IEEE, 2014.
LibreCat
| DOI
J. Blömer, K. Bujna, D. Kuntze, in: 2014 22nd International Conference on Pattern Recognition, IEEE, 2014.
2014 | Preprint | LibreCat-ID: 442 |
Constructing CCA-secure predicate encapsulation schemes from CPA-secure schemes and universal one-way hash functions
J. Blömer, G. Liske, (2014).
LibreCat
| Files available
| Download (ext.)
J. Blömer, G. Liske, (2014).
2014 | Conference Paper | LibreCat-ID: 463
A Practical Second-Order Fault Attack against a Real-World Pairing Implementation
J. Blömer, R. Gomes da Silva, P. Günther, J. Krämer, J.-P. Seifert, in: Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC), 2014, pp. 123--136.
LibreCat
| Files available
| DOI
J. Blömer, R. Gomes da Silva, P. Günther, J. Krämer, J.-P. Seifert, in: Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC), 2014, pp. 123--136.
2014 | Mastersthesis | LibreCat-ID: 414
Hiding software components using functional encryption
J. Jochheim, Hiding Software Components Using Functional Encryption, Universität Paderborn, 2014.
LibreCat
J. Jochheim, Hiding Software Components Using Functional Encryption, Universität Paderborn, 2014.
2014 | Bachelorsthesis | LibreCat-ID: 416
Group Signature Schemes with Strong Exculpability
P. Bemmann, Group Signature Schemes with Strong Exculpability, Universität Paderborn, 2014.
LibreCat
P. Bemmann, Group Signature Schemes with Strong Exculpability, Universität Paderborn, 2014.
2014 | Bachelorsthesis | LibreCat-ID: 421
Fujisaki-Okamoto Transformation
J. Lippert, Fujisaki-Okamoto Transformation, Universität Paderborn, 2014.
LibreCat
J. Lippert, Fujisaki-Okamoto Transformation, Universität Paderborn, 2014.
2013 | Bachelorsthesis | LibreCat-ID: 2868
Themenmodellierung zur Identifikation und Gruppierung von Spam-Webseiten
S. Laudemann, Themenmodellierung Zur Identifikation Und Gruppierung von Spam-Webseiten, 2013.
LibreCat
S. Laudemann, Themenmodellierung Zur Identifikation Und Gruppierung von Spam-Webseiten, 2013.
2013 | Bachelorsthesis | LibreCat-ID: 2869
Nichtapproximierbarkeitsresultate zu Radius- und Durchmesserclustering unter Verwendung von L_p-Metriken
L. Leder, Nichtapproximierbarkeitsresultate Zu Radius- Und Durchmesserclustering Unter Verwendung von L_p-Metriken, 2013.
LibreCat
L. Leder, Nichtapproximierbarkeitsresultate Zu Radius- Und Durchmesserclustering Unter Verwendung von L_p-Metriken, 2013.
2013 | Dissertation | LibreCat-ID: 2909
Practical algorithms for clustering and modeling large data sets - Analysis and improvements
D. Kuntze, Practical Algorithms for Clustering and Modeling Large Data Sets - Analysis and Improvements, Universität Paderborn, 2013.
LibreCat
| Download (ext.)
D. Kuntze, Practical Algorithms for Clustering and Modeling Large Data Sets - Analysis and Improvements, Universität Paderborn, 2013.
2013 | Report | LibreCat-ID: 2917
An Approach for Determining Optimal Contrast in Visual Cryptography
J. Juhnke, H. Lefmann, V. Strehl, An Approach for Determining Optimal Contrast in Visual Cryptography, Fortschritt-Berichte VDI, 2013.
LibreCat
J. Juhnke, H. Lefmann, V. Strehl, An Approach for Determining Optimal Contrast in Visual Cryptography, Fortschritt-Berichte VDI, 2013.
2013 | Book Chapter | LibreCat-ID: 2979
Improved Side Channel Attacks on Pairing Based Cryptography
J. Blömer, P. Günther, G. Liske, in: Constructive Side-Channel Analysis and Secure Design, Springer Berlin Heidelberg, Berlin, Heidelberg, 2013, pp. 154–168.
LibreCat
| DOI
J. Blömer, P. Günther, G. Liske, in: Constructive Side-Channel Analysis and Secure Design, Springer Berlin Heidelberg, Berlin, Heidelberg, 2013, pp. 154–168.
2013 | Bachelorsthesis | LibreCat-ID: 471
Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen
A. Tezer, Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen, Universität Paderborn, 2013.
LibreCat
A. Tezer, Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen, Universität Paderborn, 2013.
2013 | Bachelorsthesis | LibreCat-ID: 486
Seitenkanalresistenz paarungsbasierter Kryptographie
O. Otte, Seitenkanalresistenz paarungsbasierter Kryptographie, Universität Paderborn, 2013.
LibreCat
O. Otte, Seitenkanalresistenz paarungsbasierter Kryptographie, Universität Paderborn, 2013.
2013 | Bachelorsthesis | LibreCat-ID: 487 |
Security Proofs for Pairing-Based Cryptography in the Generic Group Model
J. Bobolz, Security Proofs for Pairing-Based Cryptography in the Generic Group Model, Universität Paderborn, 2013.
LibreCat
| Files available
J. Bobolz, Security Proofs for Pairing-Based Cryptography in the Generic Group Model, Universität Paderborn, 2013.
2013 | Conference Paper | LibreCat-ID: 488
Securing Critical Unattended Systems with Identity Based Cryptography - A Case Study
J. Blömer, P. Günther, V. Krummel, in: Proceedings of the 5th International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS), 2013, pp. 98–105.
LibreCat
| Files available
J. Blömer, P. Günther, V. Krummel, in: Proceedings of the 5th International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS), 2013, pp. 98–105.
2013 | Preprint | LibreCat-ID: 538 |
Direct Chosen-Ciphertext Secure Attribute-Based Key Encapsulations without Random Oracles
J. Blömer, G. Liske, (2013).
LibreCat
| Files available
| Download (ext.)
J. Blömer, G. Liske, (2013).
2013 | Bachelorsthesis | LibreCat-ID: 553
Attributbasierte Verschlüsselung mittels Gittermethoden - Mathematische Grundlagen, Verfahren und Sicherheitsbeweise
K. Kohn, Attributbasierte Verschlüsselung mittels Gittermethoden - Mathematische Grundlagen, Verfahren und Sicherheitsbeweise, Universität Paderborn, 2013.
LibreCat
K. Kohn, Attributbasierte Verschlüsselung mittels Gittermethoden - Mathematische Grundlagen, Verfahren und Sicherheitsbeweise, Universität Paderborn, 2013.
2012 | Conference Paper | LibreCat-ID: 2982
StreamKM++: A clustering algorithm for data streams
M.R. Ackermann, M. Märtens, C. Raupach, K. Swierkot, C. Lammersen, C. Sohler, 17 (2012).
LibreCat
| DOI
M.R. Ackermann, M. Märtens, C. Raupach, K. Swierkot, C. Lammersen, C. Sohler, 17 (2012).
2012 | Journal Article | LibreCat-ID: 2984
Turing und Kryptografie
J. Blömer, Informatik-Spektrum 35 (2012).
LibreCat
| DOI
J. Blömer, Informatik-Spektrum 35 (2012).
2012 | Bachelorsthesis | LibreCat-ID: 606
Identitätsbasierte Signaturen - Ein Sicherheitsbeweis für Signaturen auf Grundlage von Gap-Diffie-Hellman-Gruppen mit Hilfe des Forking-Lemmas
N. Löken, Identitätsbasierte Signaturen - Ein Sicherheitsbeweis für Signaturen auf Grundlage von Gap-Diffie-Hellman-Gruppen mit Hilfe des Forking-Lemmas, Universität Paderborn, 2012.
LibreCat
N. Löken, Identitätsbasierte Signaturen - Ein Sicherheitsbeweis für Signaturen auf Grundlage von Gap-Diffie-Hellman-Gruppen mit Hilfe des Forking-Lemmas, Universität Paderborn, 2012.
2012 | Bachelorsthesis | LibreCat-ID: 607
Identitätsbasierte Kryptographie - Implementierung von Paarungen für Körper der Charakteristik 2
T. Haarhoff, Identitätsbasierte Kryptographie - Implementierung von Paarungen für Körper der Charakteristik 2, Universität Paderborn, 2012.
LibreCat
T. Haarhoff, Identitätsbasierte Kryptographie - Implementierung von Paarungen für Körper der Charakteristik 2, Universität Paderborn, 2012.
2012 | Bachelorsthesis | LibreCat-ID: 629
Attribute-basierte Verschlüsselung
P. Schleiter, Attribute-basierte Verschlüsselung, Universität Paderborn, 2012.
LibreCat
P. Schleiter, Attribute-basierte Verschlüsselung, Universität Paderborn, 2012.
2011 | Bachelorsthesis | LibreCat-ID: 2872
Bicriteria-Approximation für das k-Median-Clustering mit Bregman-Divergenzen
T. Böttger, Bicriteria-Approximation Für Das k-Median-Clustering Mit Bregman-Divergenzen, 2011.
LibreCat
| Files available
T. Böttger, Bicriteria-Approximation Für Das k-Median-Clustering Mit Bregman-Divergenzen, 2011.
2011 | Mastersthesis | LibreCat-ID: 2902
The Monotone Complexity of Computing k-Clique on Random Graphs
M. Märtens, The Monotone Complexity of Computing K-Clique on Random Graphs, 2011.
LibreCat
M. Märtens, The Monotone Complexity of Computing K-Clique on Random Graphs, 2011.
2011 | Dissertation | LibreCat-ID: 2910
Algorithms for lattice problems with respect to general norms
S. Naewe, Algorithms for Lattice Problems with Respect to General Norms, Universität Paderborn, 2011.
LibreCat
| Download (ext.)
S. Naewe, Algorithms for Lattice Problems with Respect to General Norms, Universität Paderborn, 2011.
2011 | Conference Paper | LibreCat-ID: 2985
Hardness and Non-Approximability of Bregman Clustering Problems.
M.R. Ackermann, J. Blömer, C. Scholz, (2011).
LibreCat
M.R. Ackermann, J. Blömer, C. Scholz, (2011).
2011 | Book Chapter | LibreCat-ID: 2986
How to Share a Secret
J. Blömer, in: Algorithms Unplugged, Springer Berlin Heidelberg, Berlin, Heidelberg, 2011, pp. 159–168.
LibreCat
| DOI
J. Blömer, in: Algorithms Unplugged, Springer Berlin Heidelberg, Berlin, Heidelberg, 2011, pp. 159–168.
2011 | Preprint | LibreCat-ID: 2987
Solving the Closest Vector Problem with respect to Lp Norms
J. Blömer, S. Naewe, ArXiv:1104.3720 (2011).
LibreCat
J. Blömer, S. Naewe, ArXiv:1104.3720 (2011).
2011 | Mastersthesis | LibreCat-ID: 659
Fault attacks in pairing-based cryptography
G. Liske, Fault Attacks in Pairing-Based Cryptography, Universität Paderborn, 2011.
LibreCat
| Files available
G. Liske, Fault Attacks in Pairing-Based Cryptography, Universität Paderborn, 2011.
2010 | Book Chapter | LibreCat-ID: 2988
Bregman Clustering for Separable Instances
M.R. Ackermann, J. Blömer, in: SWAT 2010, Springer Berlin Heidelberg, Berlin, Heidelberg, 2010, pp. 212–223.
LibreCat
| DOI
M.R. Ackermann, J. Blömer, in: SWAT 2010, Springer Berlin Heidelberg, Berlin, Heidelberg, 2010, pp. 212–223.
2010 | Journal Article | LibreCat-ID: 2990
Clustering for Metric and Nonmetric Distance Measures
M.R. Ackermann, J. Blömer, C. Sohler, ACM Trans. Algorithms (2010) 59:1--59:26.
LibreCat
| DOI
M.R. Ackermann, J. Blömer, C. Sohler, ACM Trans. Algorithms (2010) 59:1--59:26.
2010 | Journal Article | LibreCat-ID: 2991
On the initialization of dynamic models for speech features
A. Krueger, V. Leutnant, R. Haeb-Umbach, M. Ackermann, J. Blömer, Proc. of ITG Fachtagung Sprachkommunikation. ITG, Bochum, Germany (2010).
LibreCat
A. Krueger, V. Leutnant, R. Haeb-Umbach, M. Ackermann, J. Blömer, Proc. of ITG Fachtagung Sprachkommunikation. ITG, Bochum, Germany (2010).
2010 | Conference Paper | LibreCat-ID: 2993
Efficient and Compact CCA Security from Partitioned IBKEM
J. Schrieb, (2010).
LibreCat
J. Schrieb, (2010).
2010 | Conference Paper | LibreCat-ID: 2994
Engineering self-coordinating software intensive systems
W. Schäfer, A. Trächtler, M. Birattari, J. Blömer, M. Dorigo, G. Engels, R. O’Grady, M. Platzner, F. Rammig, W. Reif, in: Proceedings of the FSE/SDP Workshop on Future of Software Engineering Research - FoSER ’10, ACM Press, 2010.
LibreCat
| DOI
W. Schäfer, A. Trächtler, M. Birattari, J. Blömer, M. Dorigo, G. Engels, R. O’Grady, M. Platzner, F. Rammig, W. Reif, in: Proceedings of the FSE/SDP Workshop on Future of Software Engineering Research - FoSER ’10, ACM Press, 2010.
2010 | Misc | LibreCat-ID: 47684 |
Smart Card basierte Berechnung einer Gruppensignatur als Teil einer biometrischen Authentisierung
T. Postler, Smart Card basierte Berechnung einer Gruppensignatur als Teil einer biometrischen Authentisierung, 2010.
LibreCat
| Files available
T. Postler, Smart Card basierte Berechnung einer Gruppensignatur als Teil einer biometrischen Authentisierung, 2010.
2009 | Bachelorsthesis | LibreCat-ID: 2880
Hierarchisches Clustering mit minimalen Cluster-Durchmessern
C. Schröer, Hierarchisches Clustering Mit Minimalen Cluster-Durchmessern, 2009.
LibreCat
| Files available
C. Schröer, Hierarchisches Clustering Mit Minimalen Cluster-Durchmessern, 2009.
2009 | Bachelorsthesis | LibreCat-ID: 2896 |
Analyse und Evaluation eines identitätsbasierten Signcryption-Verfahrens
G. Liske, Analyse Und Evaluation Eines Identitätsbasierten Signcryption-Verfahrens, 2009.
LibreCat
| Files available
G. Liske, Analyse Und Evaluation Eines Identitätsbasierten Signcryption-Verfahrens, 2009.
2009 | Mastersthesis | LibreCat-ID: 2904
Die Schwierigkeit des k-Median Clusterings für Bregman-Divergenzen
C. Scholz, Die Schwierigkeit Des K-Median Clusterings Für Bregman-Divergenzen, 2009.
LibreCat
| Files available
C. Scholz, Die Schwierigkeit Des K-Median Clusterings Für Bregman-Divergenzen, 2009.
2009 | Dissertation | LibreCat-ID: 2911
Algorithms for the Bregman k-Median Problem
M.R. Ackermann, Algorithms for the Bregman K-Median Problem, Universität Paderborn, 2009.
LibreCat
| Download (ext.)
M.R. Ackermann, Algorithms for the Bregman K-Median Problem, Universität Paderborn, 2009.
2009 | Book Chapter | LibreCat-ID: 2995
Coresets and Approximate Clustering for Bregman Divergences
M.R. Ackermann, J. Blömer, in: Proceedings of the Twentieth Annual ACM-SIAM Symposium on Discrete Algorithms, Society for Industrial and Applied Mathematics, Philadelphia, PA, 2009, pp. 1088–1097.
LibreCat
| DOI
M.R. Ackermann, J. Blömer, in: Proceedings of the Twentieth Annual ACM-SIAM Symposium on Discrete Algorithms, Society for Industrial and Applied Mathematics, Philadelphia, PA, 2009, pp. 1088–1097.
2009 | Journal Article | LibreCat-ID: 2999
Sampling methods for shortest vectors, closest vectors and successive minima
J. Blömer, S. Naewe, Theoretical Computer Science (2009) 1648–1665.
LibreCat
| DOI
J. Blömer, S. Naewe, Theoretical Computer Science (2009) 1648–1665.
2009 | Book Chapter | LibreCat-ID: 3000
Three-Valued Spotlight Abstractions
J. Schrieb, H. Wehrheim, D. Wonisch, in: FM 2009: Formal Methods, Springer Berlin Heidelberg, Berlin, Heidelberg, 2009, pp. 106–122.
LibreCat
| DOI
J. Schrieb, H. Wehrheim, D. Wonisch, in: FM 2009: Formal Methods, Springer Berlin Heidelberg, Berlin, Heidelberg, 2009, pp. 106–122.
2008 | Conference Paper | LibreCat-ID: 3001
Reliable Evidence of Data Integrity from an Untrusted Storage Service
C. Stern, P. Adelt, V. Krummel, M.R. Ackermann, in: Fourth International Conference on Networking and Services (Icns 2008), IEEE, 2008.
LibreCat
| DOI
C. Stern, P. Adelt, V. Krummel, M.R. Ackermann, in: Fourth International Conference on Networking and Services (Icns 2008), IEEE, 2008.
2008 | Misc | LibreCat-ID: 47685 |
Construction and Applications of Identity-Based Encryption without Pairings
J. Schrieb, Construction and Applications of Identity-Based Encryption without Pairings, 2008.
LibreCat
| Files available
J. Schrieb, Construction and Applications of Identity-Based Encryption without Pairings, 2008.
2007 | Dissertation | LibreCat-ID: 2912
Tamper Resistance of AES -- Models, Attacks and Countermeasures
V. Krummel, Tamper Resistance of AES -- Models, Attacks and Countermeasures, Universität Paderborn, 2007.
LibreCat
| Download (ext.)
V. Krummel, Tamper Resistance of AES -- Models, Attacks and Countermeasures, Universität Paderborn, 2007.
2007 | Book Chapter | LibreCat-ID: 3002 |
Analysis of Countermeasures Against Access Driven Cache Attacks on AES
J. Blömer, V. Krummel, in: Selected Areas in Cryptography, Springer Berlin Heidelberg, Berlin, Heidelberg, 2007, pp. 96–109.
LibreCat
| DOI
| Download (ext.)
J. Blömer, V. Krummel, in: Selected Areas in Cryptography, Springer Berlin Heidelberg, Berlin, Heidelberg, 2007, pp. 96–109.
2007 | Book Chapter | LibreCat-ID: 3019
Cryptanalysis of Unbalanced RSA with Small CRT-Exponent
A. May, in: Advances in Cryptology — CRYPTO 2002, Springer Berlin Heidelberg, Berlin, Heidelberg, 2007, pp. 242–256.
LibreCat
| DOI
A. May, in: Advances in Cryptology — CRYPTO 2002, Springer Berlin Heidelberg, Berlin, Heidelberg, 2007, pp. 242–256.
2007 | Book Chapter | LibreCat-ID: 3020
Low Secret Exponent RSA Revisited
J. Blömer, A. May, in: Lecture Notes in Computer Science, Springer Berlin Heidelberg, Berlin, Heidelberg, 2007, pp. 4–19.
LibreCat
| DOI
J. Blömer, A. May, in: Lecture Notes in Computer Science, Springer Berlin Heidelberg, Berlin, Heidelberg, 2007, pp. 4–19.
2007 | Book Chapter | LibreCat-ID: 3021
Key Revocation with Interval Cover Families
J. Blömer, A. May, in: Selected Areas in Cryptography, Springer Berlin Heidelberg, Berlin, Heidelberg, 2007, pp. 325–341.
LibreCat
| DOI
J. Blömer, A. May, in: Selected Areas in Cryptography, Springer Berlin Heidelberg, Berlin, Heidelberg, 2007, pp. 325–341.
2007 | Book Chapter | LibreCat-ID: 3022
Dimension Reduction Methods for Convolution Modular Lattices
A. May, J.H. Silverman, in: Lecture Notes in Computer Science, Springer Berlin Heidelberg, Berlin, Heidelberg, 2007, pp. 110–125.
LibreCat
| DOI
A. May, J.H. Silverman, in: Lecture Notes in Computer Science, Springer Berlin Heidelberg, Berlin, Heidelberg, 2007, pp. 110–125.
2007 | Book Chapter | LibreCat-ID: 3026
A Probabilistic Zero-Test for Expressions Involving Roots of Rational Numbers
J. Blömer, in: Algorithms — ESA’ 98, Springer Berlin Heidelberg, Berlin, Heidelberg, 2007, pp. 151–162.
LibreCat
| DOI
J. Blömer, in: Algorithms — ESA’ 98, Springer Berlin Heidelberg, Berlin, Heidelberg, 2007, pp. 151–162.
2007 | Bachelorsthesis | LibreCat-ID: 47650
Approximierbarkeit durch konstante Stichproben unter Berücksichtigung verschiedener Divergenz- und Ähnlichkeitsmaße beim k-Clustering-Problem
S. Ziegert, Approximierbarkeit durch konstante Stichproben unter Berücksichtigung verschiedener Divergenz- und Ähnlichkeitsmaße beim k-Clustering-Problem, 2007.
LibreCat
S. Ziegert, Approximierbarkeit durch konstante Stichproben unter Berücksichtigung verschiedener Divergenz- und Ähnlichkeitsmaße beim k-Clustering-Problem, 2007.
2007 | Bachelorsthesis | LibreCat-ID: 47651
Sichere Kryptosysteme durch Zero-Knowledge
M. Richert, Sichere Kryptosysteme durch Zero-Knowledge, 2007.
LibreCat
M. Richert, Sichere Kryptosysteme durch Zero-Knowledge, 2007.
2007 | Misc | LibreCat-ID: 47688
Angriffe auf RSA-Varianten bei partiell bekannten geheimen Schlüsseln
W. Klein, Angriffe auf RSA-Varianten bei partiell bekannten geheimen Schlüsseln, 2007.
LibreCat
W. Klein, Angriffe auf RSA-Varianten bei partiell bekannten geheimen Schlüsseln, 2007.
2007 | Misc | LibreCat-ID: 47690
Kryptanalyse des EAC-Protokolls biometrischer Reisepässe
O. Käthler, Kryptanalyse des EAC-Protokolls biometrischer Reisepässe, 2007.
LibreCat
O. Käthler, Kryptanalyse des EAC-Protokolls biometrischer Reisepässe, 2007.