Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

229 Publications


2014 | Bachelorsthesis | LibreCat-ID: 2867
Sauer M. Evaluierung von Initialisierungsmethoden Für Fuzzy-k-Means Algorithmen.; 2014.
LibreCat
 

2014 | Conference Paper | LibreCat-ID: 355
Blömer J, Günther P, Liske G. Tampering attacks in pairing-based cryptography. In: Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC). ; 2014:1--7. doi:10.1109/FDTC.2014.10
LibreCat | Files available | DOI
 

2014 | Bachelorsthesis | LibreCat-ID: 369
Rath T. RSA-Full Domain Hash Revisited. Universität Paderborn; 2014.
LibreCat
 

2014 | Mastersthesis | LibreCat-ID: 2900
Brauer S. A Probabilistic Expectation Maximization Algorithm for Multivariate Laplacian Mixtures.; 2014.
LibreCat | Files available
 

2014 | Journal Article | LibreCat-ID: 2976
Ackermann MR, Blömer J, Kuntze D, Sohler C. Analysis of Agglomerative Clustering. Algorithmica. 2014;69. doi:10.1007/s00453-012-9717-4
LibreCat | DOI
 

2014 | Conference Paper | LibreCat-ID: 2977
Blömer J, Bujna K, Kuntze D. A Theoretical and Experimental Comparison of the EM and SEM Algorithm. In: 2014 22nd International Conference on Pattern Recognition. IEEE; 2014. doi:10.1109/icpr.2014.253
LibreCat | DOI
 

2014 | Preprint | LibreCat-ID: 442 | OA
Blömer J, Liske G. Constructing CCA-secure predicate encapsulation schemes from CPA-secure schemes and universal one-way hash functions. 2014.
LibreCat | Files available | Download (ext.)
 

2014 | Conference Paper | LibreCat-ID: 463
Blömer J, Gomes da Silva R, Günther P, Krämer J, Seifert J-P. A Practical Second-Order Fault Attack against a Real-World Pairing Implementation. In: Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC). ; 2014:123--136. doi:10.1109/FDTC.2014.22
LibreCat | Files available | DOI
 

2014 | Mastersthesis | LibreCat-ID: 414
Jochheim J. Hiding Software Components Using Functional Encryption. Universität Paderborn; 2014.
LibreCat
 

2014 | Bachelorsthesis | LibreCat-ID: 416
Bemmann P. Group Signature Schemes with Strong Exculpability. Universität Paderborn; 2014.
LibreCat
 

2014 | Bachelorsthesis | LibreCat-ID: 421
Lippert J. Fujisaki-Okamoto Transformation. Universität Paderborn; 2014.
LibreCat
 

2013 | Bachelorsthesis | LibreCat-ID: 2868
Laudemann S. Themenmodellierung Zur Identifikation Und Gruppierung von Spam-Webseiten.; 2013.
LibreCat
 

2013 | Bachelorsthesis | LibreCat-ID: 2869
Leder L. Nichtapproximierbarkeitsresultate Zu Radius- Und Durchmesserclustering Unter Verwendung von L_p-Metriken.; 2013.
LibreCat
 

2013 | Dissertation | LibreCat-ID: 2909
Kuntze D. Practical Algorithms for Clustering and Modeling Large Data Sets - Analysis and Improvements. Universität Paderborn; 2013.
LibreCat | Download (ext.)
 

2013 | Report | LibreCat-ID: 2917
Juhnke J, Lefmann H, Strehl V. An Approach for Determining Optimal Contrast in Visual Cryptography. Fortschritt-Berichte VDI; 2013.
LibreCat
 

2013 | Book Chapter | LibreCat-ID: 2979
Blömer J, Günther P, Liske G. Improved Side Channel Attacks on Pairing Based Cryptography. In: Constructive Side-Channel Analysis and Secure Design. Berlin, Heidelberg: Springer Berlin Heidelberg; 2013:154-168. doi:10.1007/978-3-642-40026-1_10
LibreCat | DOI
 

2013 | Bachelorsthesis | LibreCat-ID: 471
Tezer A. Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen. Universität Paderborn; 2013.
LibreCat
 

2013 | Bachelorsthesis | LibreCat-ID: 486
Otte O. Seitenkanalresistenz paarungsbasierter Kryptographie. Universität Paderborn; 2013.
LibreCat
 

2013 | Bachelorsthesis | LibreCat-ID: 487 | OA
Bobolz J. Security Proofs for Pairing-Based Cryptography in the Generic Group Model. Universität Paderborn; 2013.
LibreCat | Files available
 

2013 | Conference Paper | LibreCat-ID: 488
Blömer J, Günther P, Krummel V. Securing Critical Unattended Systems with Identity Based Cryptography - A Case Study. In: Proceedings of the 5th International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS). ; 2013:98-105.
LibreCat | Files available
 

2013 | Preprint | LibreCat-ID: 538 | OA
Blömer J, Liske G. Direct Chosen-Ciphertext Secure Attribute-Based Key Encapsulations without Random Oracles. 2013.
LibreCat | Files available | Download (ext.)
 

2013 | Bachelorsthesis | LibreCat-ID: 553
Kohn K. Attributbasierte Verschlüsselung mittels Gittermethoden - Mathematische Grundlagen, Verfahren und Sicherheitsbeweise. Universität Paderborn; 2013.
LibreCat
 

2012 | Conference Paper | LibreCat-ID: 2982
Ackermann MR, Märtens M, Raupach C, Swierkot K, Lammersen C, Sohler C. StreamKM++: A clustering algorithm for data streams. 2012;17. doi:10.1145/2133803.2184450
LibreCat | DOI
 

2012 | Journal Article | LibreCat-ID: 2984
Blömer J. Turing und Kryptografie. Informatik-Spektrum. 2012;35(4). doi:10.1007/s00287-012-0622-7
LibreCat | DOI
 

2012 | Bachelorsthesis | LibreCat-ID: 606
Löken N. Identitätsbasierte Signaturen - Ein Sicherheitsbeweis für Signaturen auf Grundlage von Gap-Diffie-Hellman-Gruppen mit Hilfe des Forking-Lemmas. Universität Paderborn; 2012.
LibreCat
 

2012 | Bachelorsthesis | LibreCat-ID: 607
Haarhoff T. Identitätsbasierte Kryptographie - Implementierung von Paarungen für Körper der Charakteristik 2. Universität Paderborn; 2012.
LibreCat
 

2012 | Bachelorsthesis | LibreCat-ID: 629
Schleiter P. Attribute-basierte Verschlüsselung. Universität Paderborn; 2012.
LibreCat
 

2011 | Bachelorsthesis | LibreCat-ID: 2872
Böttger T. Bicriteria-Approximation Für Das k-Median-Clustering Mit Bregman-Divergenzen.; 2011.
LibreCat | Files available
 

2011 | Mastersthesis | LibreCat-ID: 2902
Märtens M. The Monotone Complexity of Computing K-Clique on Random Graphs.; 2011.
LibreCat
 

2011 | Dissertation | LibreCat-ID: 2910
Naewe S. Algorithms for Lattice Problems with Respect to General Norms. Universität Paderborn; 2011.
LibreCat | Download (ext.)
 

2011 | Conference Paper | LibreCat-ID: 2985
Ackermann MR, Blömer J, Scholz C. Hardness and Non-Approximability of Bregman Clustering Problems. 2011.
LibreCat
 

2011 | Book Chapter | LibreCat-ID: 2986
Blömer J. How to Share a Secret. In: Algorithms Unplugged. Berlin, Heidelberg: Springer Berlin Heidelberg; 2011:159-168. doi:10.1007/978-3-642-15328-0_17
LibreCat | DOI
 

2011 | Preprint | LibreCat-ID: 2987
Blömer J, Naewe S. Solving the Closest Vector Problem with respect to Lp Norms. arXiv:11043720. 2011.
LibreCat
 

2011 | Mastersthesis | LibreCat-ID: 659
Liske G. Fault Attacks in Pairing-Based Cryptography. Universität Paderborn; 2011.
LibreCat | Files available
 

2010 | Book Chapter | LibreCat-ID: 2988
Ackermann MR, Blömer J. Bregman Clustering for Separable Instances. In: SWAT 2010. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg; 2010:212-223. doi:10.1007/978-3-642-13731-0_21
LibreCat | DOI
 

2010 | Journal Article | LibreCat-ID: 2990
Ackermann MR, Blömer J, Sohler C. Clustering for Metric and Nonmetric Distance Measures. ACM Trans Algorithms. 2010;(4):59:1--59:26. doi:10.1145/1824777.1824779
LibreCat | DOI
 

2010 | Journal Article | LibreCat-ID: 2991
Krueger A, Leutnant V, Haeb-Umbach R, Ackermann M, Blömer J. On the initialization of dynamic models for speech features. Proc of ITG Fachtagung Sprachkommunikation ITG, Bochum, Germany. 2010.
LibreCat
 

2010 | Conference Paper | LibreCat-ID: 2993
Schrieb J. Efficient and Compact CCA Security from Partitioned IBKEM. 2010.
LibreCat
 

2010 | Conference Paper | LibreCat-ID: 2994
Schäfer W, Trächtler A, Birattari M, et al. Engineering self-coordinating software intensive systems. In: Proceedings of the FSE/SDP Workshop on Future of Software Engineering Research - FoSER ’10. ACM Press; 2010. doi:10.1145/1882362.1882428
LibreCat | DOI
 

2010 | Misc | LibreCat-ID: 47684 | OA
Postler T. Smart Card basierte Berechnung einer Gruppensignatur als Teil einer biometrischen Authentisierung.; 2010.
LibreCat | Files available
 

2009 | Bachelorsthesis | LibreCat-ID: 2880
Schröer C. Hierarchisches Clustering Mit Minimalen Cluster-Durchmessern.; 2009.
LibreCat | Files available
 

2009 | Bachelorsthesis | LibreCat-ID: 2896 | OA
Liske G. Analyse Und Evaluation Eines Identitätsbasierten Signcryption-Verfahrens.; 2009.
LibreCat | Files available
 

2009 | Mastersthesis | LibreCat-ID: 2904
Scholz C. Die Schwierigkeit Des K-Median Clusterings Für Bregman-Divergenzen.; 2009.
LibreCat | Files available
 

2009 | Dissertation | LibreCat-ID: 2911
Ackermann MR. Algorithms for the Bregman K-Median Problem. Universität Paderborn; 2009.
LibreCat | Download (ext.)
 

2009 | Book Chapter | LibreCat-ID: 2995
Ackermann MR, Blömer J. Coresets and Approximate Clustering for Bregman Divergences. In: Proceedings of the Twentieth Annual ACM-SIAM Symposium on Discrete Algorithms. Philadelphia, PA: Society for Industrial and Applied Mathematics; 2009:1088-1097. doi:10.1137/1.9781611973068.118
LibreCat | DOI
 

2009 | Journal Article | LibreCat-ID: 2999
Blömer J, Naewe S. Sampling methods for shortest vectors, closest vectors and successive minima. Theoretical Computer Science. 2009;(18):1648-1665. doi:10.1016/j.tcs.2008.12.045
LibreCat | DOI
 

2009 | Book Chapter | LibreCat-ID: 3000
Schrieb J, Wehrheim H, Wonisch D. Three-Valued Spotlight Abstractions. In: FM 2009: Formal Methods. Berlin, Heidelberg: Springer Berlin Heidelberg; 2009:106-122. doi:10.1007/978-3-642-05089-3_8
LibreCat | DOI
 

2008 | Conference Paper | LibreCat-ID: 3001
Stern C, Adelt P, Krummel V, Ackermann MR. Reliable Evidence of Data Integrity from an Untrusted Storage Service. In: Fourth International Conference on Networking and Services (Icns 2008). IEEE; 2008. doi:10.1109/icns.2008.28
LibreCat | DOI
 

2008 | Misc | LibreCat-ID: 47685 | OA
Schrieb J. Construction and Applications of Identity-Based Encryption without Pairings.; 2008.
LibreCat | Files available
 

2007 | Dissertation | LibreCat-ID: 2912
Krummel V. Tamper Resistance of AES -- Models, Attacks and Countermeasures. Universität Paderborn; 2007.
LibreCat | Download (ext.)
 

Filters and Search Terms

department=64

Search

Filter Publications

Display / Sort

Citation Style: AMA

Export / Embed