Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

229 Publications


2018 | Conference Paper | LibreCat-ID: 3265 | OA
Bemmann, Kai, Johannes Blömer, Jan Bobolz, Henrik Bröcher, Denis Pascal Diemert, Fabian Eidens, Lukas Eilers, et al. “Fully-Featured Anonymous Credentials with Reputation System.” In Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES ’18. New York, NY, USA: ACM, n.d. https://doi.org/10.1145/3230833.3234517.
LibreCat | Files available | DOI | Download (ext.)
 

2018 | Conference Paper | LibreCat-ID: 2965
Blömer, Johannes, and Nils Löken. “Cloud Architectures for Searchable Encryption.” In Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, 25:1--25:10. New York, NY, USA: ACM, n.d. https://doi.org/10.1145/3230833.3230853.
LibreCat | Files available | DOI
 

2018 | Working Paper | LibreCat-ID: 5820
Blömer, Johannes, Jan Bobolz, Christian Scheideler, and Alexander Setzer. Provably Anonymous Communication Based on Trusted Execution Environments, n.d.
LibreCat | Files available
 

2018 | Conference Paper | LibreCat-ID: 4344
Blömer, Johannes, Sascha Brauer, and Kathrin Bujna. “Coresets for Fuzzy K-Means with Applications.” In 29th International Symposium on Algorithms and Computation  (ISAAC 2018), 46:1--46:12. Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, 2018. https://doi.org/10.4230/LIPIcs.ISAAC.2018.46.
LibreCat | DOI
 

2018 | Bachelorsthesis | LibreCat-ID: 5426
Heißen, Oliver von. Implementierung und Analyse von Searchable Encryption, 2018.
LibreCat
 

2018 | Dissertation | LibreCat-ID: 6597
Juhnke, Jakob. Models and Constructions for Secure Reputation Systems. Universität Paderborn, 2018. https://doi.org/10.17619/UNIPB/1-570.
LibreCat | DOI
 

2018 | Conference Paper | LibreCat-ID: 3873 | OA
Blömer, Johannes, Fabian Eidens, and Jakob Juhnke. “Enhanced Security of Attribute-Based Signatures.” In The International Conference on Cryptology And Network Security (CANS), 11124:235–55. Lecture Notes in Computer Science. Springer, 2018. https://doi.org/10.1007/978-3-030-00434-7_12.
LibreCat | Files available | DOI | Download (ext.)
 

2018 | Conference Paper | LibreCat-ID: 2379 | OA
Blömer, Johannes, and Jan Bobolz. “Delegatable Attribute-Based Anonymous Credentials from Dynamically Malleable Signatures.” In ACNS 2018 Applied Cryptography & Network Security. LNCS, n.d. https://doi.org/10.1007/978-3-319-93387-0_12.
LibreCat | Files available | DOI | Download (ext.)
 

2017 | Dissertation | LibreCat-ID: 2908
Bujna, Kathrin. Soft Clustering Algorithms - Theoretical and Practical Improvements. Universität Paderborn, 2017. https://doi.org/10.17619/UNIPB/1-226.
LibreCat | DOI | Download (ext.)
 

2017 | Conference Paper | LibreCat-ID: 2967 | OA
Blömer, Johannes, and Gennadij Liske. “Subtleties in Security Definitions for Predicate Encryption with Public Index.” In Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS), 10693:438–53. Lecture Notes in Computer Science. Cham: Springer International Publishing, 2017. https://doi.org/10.1007/978-3-319-72453-9_35.
LibreCat | Files available | DOI | Download (ext.)
 

2017 | Dissertation | LibreCat-ID: 116
Liske, Gennadij. CCA-Security for Predicate Encryption Schemes. Universität Paderborn, 2017. https://doi.org/10.17619/UNIPB/1-220.
LibreCat | DOI | Download (ext.)
 

2017 | Conference Paper | LibreCat-ID: 2343 | OA
Löken, Nils. “Searchable Encryption with Access Control.” In Proceedings of the 12th International Conference on Availability, Reliability and Security  - ARES ’17. ICPS. ACM Press, 2017. https://doi.org/10.1145/3098954.3098987.
LibreCat | Files available | DOI | Download (ext.)
 

2017 | Conference Paper | LibreCat-ID: 2344 | OA
Blömer, Johannes, Peter Günther, Volker Krummel, and Nils Löken. “Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations.” In Foundations and Practice of Security, 3–17. Cham: Springer International Publishing, 2017. https://doi.org/10.1007/978-3-319-75650-9_1.
LibreCat | Files available | DOI
 

2017 | Book Chapter | LibreCat-ID: 2381
Brauer, Sascha. “Complexity of Single-Swap Heuristics for Metric Facility Location and Related Problems.” In Lecture Notes in Computer Science, edited by Dimitris Fotakis, Aris Pagourtzis, and Vangelis Th. Paschos, 10236:116–27. Cham: Springer International Publishing, 2017. https://doi.org/10.1007/978-3-319-57586-5_11.
LibreCat | DOI
 

2017 | Mastersthesis | LibreCat-ID: 60
Niehus, David. Semantically Secure Attribute-Based Searchable Encryption. Universität Paderborn, 2017.
LibreCat
 

2017 | Bachelorsthesis | LibreCat-ID: 88
Ganesh Athreya, Advait. Instantiating a Predicate Encryption Scheme via Pair Encodings. Universität Paderborn, 2017.
LibreCat
 

2017 | Bachelorsthesis | LibreCat-ID: 67
Jürgens, Mirko. Provably Secure Key-Derivation-Functions for Certain Types of Applications. Universität Paderborn, 2017.
LibreCat
 

2017 | Bachelorsthesis | LibreCat-ID: 104
Diemert, Denis. EAX - An Authenticated Encryption Mode for Block Ciphers. Universität Paderborn, 2017.
LibreCat
 

2017 | Mastersthesis | LibreCat-ID: 117
Bemmann, Pascal. Attribute-Based Signatures Using Structure Preserving Signatures. Universität Paderborn, 2017.
LibreCat
 

2016 | Mastersthesis | LibreCat-ID: 2898
Weis, Eduard. Searchable Encryption, 2016.
LibreCat
 

2016 | Conference Paper | LibreCat-ID: 2947
Blömer, Johannes, and Peter Günther. “Singular Curve Point Decompression Attack.” In 2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC). IEEE, 2016. https://doi.org/10.1109/fdtc.2015.17.
LibreCat | DOI
 

2016 | Book Chapter | LibreCat-ID: 2948
Günther, Peter, and Volker Krummel. “Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures.” In Mathematical Aspects of Computer and Information Sciences, 151–65. Cham: Springer International Publishing, 2016. https://doi.org/10.1007/978-3-319-32859-1_13.
LibreCat | DOI
 

2016 | Book Chapter | LibreCat-ID: 2968
Blömer, Johannes, Christiane Lammersen, Melanie Schmidt, and Christian Sohler. “Theoretical Analysis of the K-Means Algorithm – A Survey.” In Algorithm Engineering, 81–116. Cham: Springer International Publishing, 2016. https://doi.org/10.1007/978-3-319-49487-6_3.
LibreCat | DOI
 

2016 | Preprint | LibreCat-ID: 2969 | OA
Blömer, Johannes, Sascha Brauer, and Kathrin Bujna. “Hard-Clustering with Gaussian Mixture Models.” Computing Research Repository, 2016.
LibreCat | Download (ext.)
 

2016 | Book Chapter | LibreCat-ID: 2970
Blömer, Johannes, and Kathrin Bujna. “Adaptive Seeding for Gaussian Mixture Models.” In Advances in Knowledge Discovery and Data Mining, 296–308. Cham: Springer International Publishing, 2016. https://doi.org/10.1007/978-3-319-31750-2_24.
LibreCat | DOI
 

2016 | Report | LibreCat-ID: 2971
Blömer, Johannes, and Peter Günther. Effizienz Und Sicherheit Paarungsbasierter Kryptographie. Tagungsband des 26. Fraunhofer SIT Smartcard-Workshops, 2016.
LibreCat
 

2016 | Bachelorsthesis | LibreCat-ID: 213
Porzenheim, Laurens. Comparison of Different Definitions of Chosen-Ciphertext Security in Encryption Schemes. Universität Paderborn, 2016.
LibreCat
 

2016 | Bachelorsthesis | LibreCat-ID: 214
Bemmann, Kai Sören. Commitment Schemes - Definitions, Variants, and Security. Universität Paderborn, 2016.
LibreCat
 

2016 | Conference Paper | LibreCat-ID: 2367
Blömer, Johannes, Sascha Brauer, and Kathrin Bujna. “A Theoretical Analysis of the Fuzzy K-Means Problem.” In 2016 IEEE 16th International Conference on Data Mining (ICDM), 805–10. IEEE, 2016. https://doi.org/10.1109/icdm.2016.0094.
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 208
Blömer, Johannes, and Gennadij Liske. “Construction of Fully CCA-Secure Predicate Encryptions from Pair Encoding Schemes.” In Proceedings of the CT-RSA 2016, 431–47. LNCS, 2016. https://doi.org/10.1007/978-3-319-29485-8_25.
LibreCat | Files available | DOI
 

2016 | Dissertation | LibreCat-ID: 167
Günther, Peter. Physical Attacks on Pairing-Based Cryptography. Universität Paderborn, 2016.
LibreCat | Files available | Download (ext.)
 

2016 | Mastersthesis | LibreCat-ID: 146
Hamm, Julian. Symmetric Anonymous Credentials with Protocols for Relations on Attributes. Universität Paderborn, 2016.
LibreCat
 

2016 | Bachelorsthesis | LibreCat-ID: 152
Dallmeier, Fynn. Short Randomizable Aggregatable Signatures: Constructions and Security Analysis. Universität Paderborn, 2016.
LibreCat
 

2016 | Book Chapter | LibreCat-ID: 2978
Blömer, Johannes, and Kathrin Bujna. “Adaptive Seeding for Gaussian Mixture Models.” In Advances in Knowledge Discovery and Data Mining, 296–308. Cham: Springer International Publishing, 2016. https://doi.org/10.1007/978-3-319-31750-2_24.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 253
Blömer, Johannes, Jakob Juhnke, and Nils Löken. “Short Group Signatures with Distributed Traceability.” In Proceedings of the Sixth International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS), 166–80. LNCS, 2015. https://doi.org/10.1007/978-3-319-32859-1_14.
LibreCat | Files available | DOI
 

2015 | Bachelorsthesis | LibreCat-ID: 286
Kalde, Benedikt. Implementierung eines hybriden Verschlüsselungsverfahrens nach Cramer und Shoup. Universität Paderborn, 2015.
LibreCat
 

2015 | Bachelorsthesis | LibreCat-ID: 2865
Strotmann, Daniela. Singulärwertzerlegung Für μ-Ähnliche Bregman-Divergenzen, 2015.
LibreCat
 

2015 | Bachelorsthesis | LibreCat-ID: 261
Eisenhofer, Thorsten. Protokolle zur authentifizierten Schüsselvereinbarung. Universität Paderborn, 2015.
LibreCat
 

2015 | Mastersthesis | LibreCat-ID: 321
Eidens, Fabian. Anonymous Credential System Based on Q-Strong Diffie-Hellman Assumption. Universität Paderborn, 2015.
LibreCat | Files available
 

2015 | Conference Paper | LibreCat-ID: 322 | OA
Blömer, Johannes, Jakob Juhnke, and Christina Kolb. “Anonymous and Publicly Linkable Reputation Systems.” In Proceedings of the 18th International Conference on Financial Cryptography and Data Security (FC), 478--488. LNCS, 2015. https://doi.org/10.1007/978-3-662-47854-7_29.
LibreCat | Files available | DOI | Download (ext.)
 

2015 | Mastersthesis | LibreCat-ID: 325
Löken, Nils. A Group Signature Scheme with Distributed Group Management - An Application of Threshold Encryption. Universität Paderborn, 2015.
LibreCat | Files available
 

2015 | Bachelorsthesis | LibreCat-ID: 326
Heihoff, Frederic. A Group Signature Scheme Based on the LSRW Assumption. Universität Paderborn, 2015.
LibreCat
 

2015 | Mastersthesis | LibreCat-ID: 297
Sosniak, Martin. Evaluation of Pairing Optimization for Embedded Platforms. Universität Paderborn, 2015.
LibreCat
 

2015 | Mastersthesis | LibreCat-ID: 299
Gerken, Britta. Elektromagnetische Seitenkanalangriffe auf paarungsbasierte Kryptographie. Universität Paderborn, 2015.
LibreCat
 

2015 | Mastersthesis | LibreCat-ID: 301 | OA
Bobolz, Jan. Efficient Verifier-Local Revocation for Anonymous Credentials. Universität Paderborn, 2015.
LibreCat | Files available
 

2015 | Mastersthesis | LibreCat-ID: 302
Stroh, Christian. Efficient Attributes for Pairing-Based Anonymous Credentials. Universität Paderborn, 2015.
LibreCat
 

2015 | Mastersthesis | LibreCat-ID: 312
Schleiter, Patrick. Constructions of Fully Secure Predicate Encryption Schemes. Universität Paderborn, 2015.
LibreCat | Files available
 

2015 | Mastersthesis | LibreCat-ID: 273
Kohn, Kathlén. Number of Voronoi-Relevant Vectors in Lattices with Respect to Arbitrary Norms. Universität Paderborn, 2015.
LibreCat
 

2015 | Report | LibreCat-ID: 233 | OA
Blömer, Johannes, and Kathlén Kohn. Voronoi Cells of Lattices with Respect to Arbitrary Norms. Universität Paderborn, 2015.
LibreCat | Files available | Download (ext.)
 

2014 | Bachelorsthesis | LibreCat-ID: 2866
Biermeier, Felix. Untersuchung Des Erreichbarkeitsproblems in Ungerichteten Graphen Bezüglich Den Komplexitätsklassen L Und SL, 2014.
LibreCat
 

Filters and Search Terms

department=64

Search

Filter Publications

Display / Sort

Citation Style: Chicago

Export / Embed