Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

5711 Publications


2015 | Book Chapter | LibreCat-ID: 2921 | OA
Blazy O, Kakvi S, Kiltz E, Pan J. Tightly-Secure Signatures from Chameleon Hash Functions. In: Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg; 2015:256-279. doi:10.1007/978-3-662-46447-2_12
LibreCat | DOI | Download (ext.)
 

2015 | Mastersthesis | LibreCat-ID: 297
Sosniak M. Evaluation of Pairing Optimization for Embedded Platforms. Universität Paderborn; 2015.
LibreCat
 

2015 | Mastersthesis | LibreCat-ID: 299
Gerken B. Elektromagnetische Seitenkanalangriffe auf paarungsbasierte Kryptographie. Universität Paderborn; 2015.
LibreCat
 

2015 | Mastersthesis | LibreCat-ID: 301 | OA
Bobolz J. Efficient Verifier-Local Revocation for Anonymous Credentials. Universität Paderborn; 2015.
LibreCat | Files available
 

2015 | Mastersthesis | LibreCat-ID: 302
Stroh C. Efficient Attributes for Pairing-Based Anonymous Credentials. Universität Paderborn; 2015.
LibreCat
 

2015 | Dissertation | LibreCat-ID: 304
Koutsopoulos A. Dynamics and Efficiency in Topological Self-Stabilization. Universität Paderborn; 2015.
LibreCat | Files available
 

2015 | Dissertation | LibreCat-ID: 305
Kniesburges S. Distributed Data Structures and the Power of Topological Self-Stabilization. Universität Paderborn; 2015.
LibreCat | Files available
 

2015 | Mastersthesis | LibreCat-ID: 312
Schleiter P. Constructions of Fully Secure Predicate Encryption Schemes. Universität Paderborn; 2015.
LibreCat | Files available
 

2015 | Journal Article | LibreCat-ID: 3120
Böhl F, Hofheinz D, Jager T, Koch J, Striecks C. Confined Guessing: New Signatures From Standard Assumptions. J Cryptology. 2015;(1):176--208. doi:10.1007/s00145-014-9183-z
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3121
Jager T, Schwenk J, Somorovsky J. On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015. ; 2015:1185--1196. doi:10.1145/2810103.2813657
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3122
Jager T, Schwenk J, Somorovsky J. Practical Invalid Curve Attacks on TLS-ECDH. In: Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I. ; 2015:407--425. doi:10.1007/978-3-319-24174-6_21
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3123
Heuer F, Jager T, Kiltz E, Schäge S. On the Selective Opening Security of Practical Public-Key Encryption Schemes. In: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings. ; 2015:27--51. doi:10.1007/978-3-662-46447-2_2
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3124
Bergsma F, Jager T, Schwenk J. One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model. In: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings. ; 2015:477--494. doi:10.1007/978-3-662-46447-2_21
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3125
Jager T. Verifiable Random Functions from Weaker Assumptions. In: Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}. ; 2015:121--143. doi:10.1007/978-3-662-46497-7_5
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3126
Bader C, Hofheinz D, Jager T, Kiltz E, Li Y. Tightly-Secure Authenticated Key Exchange. In: Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I. ; 2015:629--658. doi:10.1007/978-3-662-46494-6_26
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 313
Börding P, Bruns M, Platenius MC. Comprehensive Service Matching with MatchBox. In: 10th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE’15). ; 2015:974--977. doi:10.1145/2786805.2803181
LibreCat | Files available | DOI
 

2015 | Bachelorsthesis | LibreCat-ID: 316
Pautz J. Budget Games with Priced Strategies. Universität Paderborn; 2015.
LibreCat
 

2015 | Journal Article | LibreCat-ID: 3162
Ziegert S, Wehrheim H. Temporal plans for software architecture reconfiguration. Computer Science - R & D. 2015;(3-4):303--320. doi:10.1007/s00450-014-0259-7
LibreCat | Files available | DOI
 

2015 | Conference Paper | LibreCat-ID: 3163
Meyer R, Wehrheim H. From Program Verification to Time and Space: The Scientific Life of Ernst-R{\"{u}}diger Olderog. In: Meyer R, Platzer A, Wehrheim H, eds. Correct System Design - Symposium in Honor of Ernst-R{\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings. Lecture Notes in Computer Science. ; 2015:3--4. doi:10.1007/978-3-319-23506-6_1
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3164
Derrick J, Dongol B, Schellhorn G, Travkin O, Wehrheim H. Verifying Opacity of a Transactional Mutex Lock. In: Bj{\o}rner N, S. de Boer F, eds. {FM} 2015: Formal Methods - 20th International Symposium, Oslo, Norway, June 24-26, 2015, Proceedings. Lecture Notes in Computer Science. ; 2015:161--177. doi:10.1007/978-3-319-19249-9_11
LibreCat | DOI
 

Filters and Search Terms

department=7

Search

Filter Publications

Display / Sort

Citation Style: AMA

Export / Embed