Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

5711 Publications


2015 | Conference Paper | LibreCat-ID: 3122
Practical Invalid Curve Attacks on TLS-ECDH
T. Jager, J. Schwenk, J. Somorovsky, in: Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I, 2015, pp. 407--425.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3123
On the Selective Opening Security of Practical Public-Key Encryption Schemes
F. Heuer, T. Jager, E. Kiltz, S. Schäge, in: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, 2015, pp. 27--51.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3124
One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model
F. Bergsma, T. Jager, J. Schwenk, in: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, 2015, pp. 477--494.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3125
Verifiable Random Functions from Weaker Assumptions
T. Jager, in: Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}, 2015, pp. 121--143.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3126
Tightly-Secure Authenticated Key Exchange
C. Bader, D. Hofheinz, T. Jager, E. Kiltz, Y. Li, in: Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I, 2015, pp. 629--658.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 313
Comprehensive Service Matching with MatchBox
P. Börding, M. Bruns, M.C. Platenius, in: 10th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE’15), 2015, pp. 974--977.
LibreCat | Files available | DOI
 

2015 | Bachelorsthesis | LibreCat-ID: 316
Budget Games with priced strategies
J. Pautz, Budget Games with Priced Strategies, Universität Paderborn, 2015.
LibreCat
 

2015 | Journal Article | LibreCat-ID: 3162
Temporal plans for software architecture reconfiguration
S. Ziegert, H. Wehrheim, Computer Science - R & D (2015) 303--320.
LibreCat | Files available | DOI
 

2015 | Conference Paper | LibreCat-ID: 3163
From Program Verification to Time and Space: The Scientific Life of Ernst-R{\"{u}}diger Olderog
R. Meyer, H. Wehrheim, in: R. Meyer, A. Platzer, H. Wehrheim (Eds.), Correct System Design - Symposium in Honor of Ernst-R{\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings, 2015, pp. 3--4.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3164
Verifying Opacity of a Transactional Mutex Lock
J. Derrick, B. Dongol, G. Schellhorn, O. Travkin, H. Wehrheim, in: N. Bj{\o}rner, F. S. de Boer (Eds.), {FM} 2015: Formal Methods - 20th International Symposium, Oslo, Norway, June 24-26, 2015, Proceedings, 2015, pp. 161--177.
LibreCat | DOI
 

Filters and Search Terms

department=7

Search

Filter Publications

Display / Sort

Export / Embed