Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
229 Publications
- 1
- 2 (current)
- 3
- 4
- 5
2016 | Preprint | LibreCat-ID: 2969 |
J. Blömer, S. Brauer, and K. Bujna, “Hard-Clustering with Gaussian Mixture Models.” Computing Research Repository, 2016.
LibreCat
| Download (ext.)
2016 | Report | LibreCat-ID: 2971
J. Blömer and P. Günther, Effizienz und Sicherheit paarungsbasierter Kryptographie. Tagungsband des 26. Fraunhofer SIT Smartcard-Workshops, 2016.
LibreCat
2016 | Bachelorsthesis | LibreCat-ID: 213
L. Porzenheim, Comparison of different Definitions of Chosen-Ciphertext Security in Encryption schemes. Universität Paderborn, 2016.
LibreCat
2016 | Bachelorsthesis | LibreCat-ID: 214
K. S. Bemmann, Commitment Schemes - Definitions, Variants, and Security. Universität Paderborn, 2016.
LibreCat
2016 | Conference Paper | LibreCat-ID: 208
J. Blömer and G. Liske, “Construction of Fully CCA-Secure Predicate Encryptions from Pair Encoding Schemes,” in Proceedings of the CT-RSA 2016, 2016, pp. 431–447.
LibreCat
| Files available
| DOI
2016 | Dissertation | LibreCat-ID: 167
P. Günther, Physical attacks on pairing-based cryptography. Universität Paderborn, 2016.
LibreCat
| Files available
| Download (ext.)
2016 | Mastersthesis | LibreCat-ID: 146
J. Hamm, Symmetric Anonymous Credentials with Protocols for Relations on Attributes. Universität Paderborn, 2016.
LibreCat
2016 | Bachelorsthesis | LibreCat-ID: 152
F. Dallmeier, Short Randomizable Aggregatable Signatures: Constructions and Security Analysis. Universität Paderborn, 2016.
LibreCat
2015 | Conference Paper | LibreCat-ID: 253
J. Blömer, J. Juhnke, and N. Löken, “Short Group Signatures with Distributed Traceability,” in Proceedings of the Sixth International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS), 2015, pp. 166–180.
LibreCat
| Files available
| DOI
2015 | Bachelorsthesis | LibreCat-ID: 286
B. Kalde, Implementierung eines hybriden Verschlüsselungsverfahrens nach Cramer und Shoup. Universität Paderborn, 2015.
LibreCat
2015 | Bachelorsthesis | LibreCat-ID: 2865
D. Strotmann, Singulärwertzerlegung für μ-ähnliche Bregman-Divergenzen. 2015.
LibreCat
2015 | Bachelorsthesis | LibreCat-ID: 261
T. Eisenhofer, Protokolle zur authentifizierten Schüsselvereinbarung. Universität Paderborn, 2015.
LibreCat
2015 | Mastersthesis | LibreCat-ID: 321
F. Eidens, Anonymous credential system based on q-Strong Diffie-Hellman Assumption. Universität Paderborn, 2015.
LibreCat
| Files available
2015 | Conference Paper | LibreCat-ID: 322 |
J. Blömer, J. Juhnke, and C. Kolb, “Anonymous and Publicly Linkable Reputation Systems,” in Proceedings of the 18th International Conference on Financial Cryptography and Data Security (FC), 2015, pp. 478--488.
LibreCat
| Files available
| DOI
| Download (ext.)
2015 | Mastersthesis | LibreCat-ID: 325
N. Löken, A Group Signature Scheme with Distributed Group Management - An Application of Threshold Encryption. Universität Paderborn, 2015.
LibreCat
| Files available
2015 | Bachelorsthesis | LibreCat-ID: 326
F. Heihoff, A group signature scheme based on the LSRW assumption. Universität Paderborn, 2015.
LibreCat
2015 | Mastersthesis | LibreCat-ID: 297
M. Sosniak, Evaluation of Pairing Optimization for Embedded Platforms. Universität Paderborn, 2015.
LibreCat
2015 | Mastersthesis | LibreCat-ID: 299
B. Gerken, Elektromagnetische Seitenkanalangriffe auf paarungsbasierte Kryptographie. Universität Paderborn, 2015.
LibreCat
2015 | Mastersthesis | LibreCat-ID: 301 |
J. Bobolz, Efficient Verifier-Local Revocation for Anonymous Credentials. Universität Paderborn, 2015.
LibreCat
| Files available
2015 | Mastersthesis | LibreCat-ID: 302
C. Stroh, Efficient Attributes for Pairing-Based Anonymous Credentials. Universität Paderborn, 2015.
LibreCat
2015 | Mastersthesis | LibreCat-ID: 312
P. Schleiter, Constructions of Fully Secure Predicate Encryption Schemes. Universität Paderborn, 2015.
LibreCat
| Files available
2015 | Mastersthesis | LibreCat-ID: 273
K. Kohn, Number of Voronoi-relevant vectors in lattices with respect to arbitrary norms. Universität Paderborn, 2015.
LibreCat
2015 | Report | LibreCat-ID: 233 |
J. Blömer and K. Kohn, Voronoi Cells of Lattices with Respect to Arbitrary Norms. Universität Paderborn, 2015.
LibreCat
| Files available
| Download (ext.)
2014 | Bachelorsthesis | LibreCat-ID: 2866
F. Biermeier, Untersuchung des Erreichbarkeitsproblems in ungerichteten Graphen bezüglich den Komplexitätsklassen L und SL. 2014.
LibreCat
2014 | Bachelorsthesis | LibreCat-ID: 2867
M. Sauer, Evaluierung von Initialisierungsmethoden für Fuzzy-k-means Algorithmen. 2014.
LibreCat
2014 | Conference Paper | LibreCat-ID: 355
J. Blömer, P. Günther, and G. Liske, “Tampering attacks in pairing-based cryptography,” in Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC), 2014, pp. 1--7.
LibreCat
| Files available
| DOI
2014 | Bachelorsthesis | LibreCat-ID: 369
T. Rath, RSA-Full Domain Hash Revisited. Universität Paderborn, 2014.
LibreCat
2014 | Mastersthesis | LibreCat-ID: 2900
S. Brauer, A Probabilistic Expectation Maximization Algorithm for Multivariate Laplacian Mixtures. 2014.
LibreCat
| Files available
2014 | Preprint | LibreCat-ID: 442 |
J. Blömer and G. Liske, “Constructing CCA-secure predicate encapsulation schemes from CPA-secure schemes and universal one-way hash functions.” Universität Paderborn, 2014.
LibreCat
| Files available
| Download (ext.)
2014 | Conference Paper | LibreCat-ID: 463
J. Blömer, R. Gomes da Silva, P. Günther, J. Krämer, and J.-P. Seifert, “A Practical Second-Order Fault Attack against a Real-World Pairing Implementation,” in Proceedings of Fault Tolerance and Diagnosis in Cryptography(FDTC), 2014, pp. 123--136.
LibreCat
| Files available
| DOI
2014 | Mastersthesis | LibreCat-ID: 414
J. Jochheim, Hiding software components using functional encryption. Universität Paderborn, 2014.
LibreCat
2014 | Bachelorsthesis | LibreCat-ID: 416
P. Bemmann, Group Signature Schemes with Strong Exculpability. Universität Paderborn, 2014.
LibreCat
2014 | Bachelorsthesis | LibreCat-ID: 421
J. Lippert, Fujisaki-Okamoto Transformation. Universität Paderborn, 2014.
LibreCat
2013 | Bachelorsthesis | LibreCat-ID: 2868
S. Laudemann, Themenmodellierung zur Identifikation und Gruppierung von Spam-Webseiten. 2013.
LibreCat
2013 | Bachelorsthesis | LibreCat-ID: 2869
L. Leder, Nichtapproximierbarkeitsresultate zu Radius- und Durchmesserclustering unter Verwendung von L_p-Metriken. 2013.
LibreCat
2013 | Dissertation | LibreCat-ID: 2909
D. Kuntze, Practical algorithms for clustering and modeling large data sets - Analysis and improvements. Universität Paderborn, 2013.
LibreCat
| Download (ext.)
2013 | Report | LibreCat-ID: 2917
J. Juhnke, H. Lefmann, and V. Strehl, An Approach for Determining Optimal Contrast in Visual Cryptography. Fortschritt-Berichte VDI, 2013.
LibreCat
2013 | Bachelorsthesis | LibreCat-ID: 471
A. Tezer, Verteilte Erstellung und Aktualisierung von Schlüsselservern in identitätsbasierten Verschlüsselungssystemen. Universität Paderborn, 2013.
LibreCat
2013 | Bachelorsthesis | LibreCat-ID: 486
O. Otte, Seitenkanalresistenz paarungsbasierter Kryptographie. Universität Paderborn, 2013.
LibreCat
2013 | Bachelorsthesis | LibreCat-ID: 487 |
J. Bobolz, Security Proofs for Pairing-Based Cryptography in the Generic Group Model. Universität Paderborn, 2013.
LibreCat
| Files available
2013 | Conference Paper | LibreCat-ID: 488
J. Blömer, P. Günther, and V. Krummel, “Securing Critical Unattended Systems with Identity Based Cryptography - A Case Study,” in Proceedings of the 5th International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS), 2013, pp. 98–105.
LibreCat
| Files available
- 1
- 2 (current)
- 3
- 4
- 5