Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

5711 Publications


2015 | Book Chapter | LibreCat-ID: 2921 | OA
Blazy, O., Kakvi, S., Kiltz, E., & Pan, J. (2015). Tightly-Secure Signatures from Chameleon Hash Functions. In Lecture Notes in Computer Science (pp. 256–279). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-662-46447-2_12
LibreCat | DOI | Download (ext.)
 

2015 | Mastersthesis | LibreCat-ID: 297
Sosniak, M. (2015). Evaluation of Pairing Optimization for Embedded Platforms. Universität Paderborn.
LibreCat
 

2015 | Mastersthesis | LibreCat-ID: 299
Gerken, B. (2015). Elektromagnetische Seitenkanalangriffe auf paarungsbasierte Kryptographie. Universität Paderborn.
LibreCat
 

2015 | Mastersthesis | LibreCat-ID: 301 | OA
Bobolz, J. (2015). Efficient Verifier-Local Revocation for Anonymous Credentials. Universität Paderborn.
LibreCat | Files available
 

2015 | Mastersthesis | LibreCat-ID: 302
Stroh, C. (2015). Efficient Attributes for Pairing-Based Anonymous Credentials. Universität Paderborn.
LibreCat
 

2015 | Dissertation | LibreCat-ID: 304
Koutsopoulos, A. (2015). Dynamics and Efficiency in Topological Self-Stabilization. Universität Paderborn.
LibreCat | Files available
 

2015 | Dissertation | LibreCat-ID: 305
Kniesburges, S. (2015). Distributed Data Structures and the Power of topological Self-Stabilization. Universität Paderborn.
LibreCat | Files available
 

2015 | Mastersthesis | LibreCat-ID: 312
Schleiter, P. (2015). Constructions of Fully Secure Predicate Encryption Schemes. Universität Paderborn.
LibreCat | Files available
 

2015 | Journal Article | LibreCat-ID: 3120
Böhl, F., Hofheinz, D., Jager, T., Koch, J., & Striecks, C. (2015). Confined Guessing: New Signatures From Standard Assumptions. J. Cryptology, (1), 176--208. https://doi.org/10.1007/s00145-014-9183-z
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3121
Jager, T., Schwenk, J., & Somorovsky, J. (2015). On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015 (pp. 1185--1196). https://doi.org/10.1145/2810103.2813657
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3122
Jager, T., Schwenk, J., & Somorovsky, J. (2015). Practical Invalid Curve Attacks on TLS-ECDH. In Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I (pp. 407--425). https://doi.org/10.1007/978-3-319-24174-6_21
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3123
Heuer, F., Jager, T., Kiltz, E., & Schäge, S. (2015). On the Selective Opening Security of Practical Public-Key Encryption Schemes. In Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings (pp. 27--51). https://doi.org/10.1007/978-3-662-46447-2_2
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3124
Bergsma, F., Jager, T., & Schwenk, J. (2015). One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model. In Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings (pp. 477--494). https://doi.org/10.1007/978-3-662-46447-2_21
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3125
Jager, T. (2015). Verifiable Random Functions from Weaker Assumptions. In Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II} (pp. 121--143). https://doi.org/10.1007/978-3-662-46497-7_5
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3126
Bader, C., Hofheinz, D., Jager, T., Kiltz, E., & Li, Y. (2015). Tightly-Secure Authenticated Key Exchange. In Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I (pp. 629--658). https://doi.org/10.1007/978-3-662-46494-6_26
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 313
Börding, P., Bruns, M., & Platenius, M. C. (2015). Comprehensive Service Matching with MatchBox. In 10th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE’15) (pp. 974--977). https://doi.org/10.1145/2786805.2803181
LibreCat | Files available | DOI
 

2015 | Bachelorsthesis | LibreCat-ID: 316
Pautz, J. (2015). Budget Games with priced strategies. Universität Paderborn.
LibreCat
 

2015 | Journal Article | LibreCat-ID: 3162
Ziegert, S., & Wehrheim, H. (2015). Temporal plans for software architecture reconfiguration. Computer Science - R & D, (3–4), 303--320. https://doi.org/10.1007/s00450-014-0259-7
LibreCat | Files available | DOI
 

2015 | Conference Paper | LibreCat-ID: 3163
Meyer, R., & Wehrheim, H. (2015). From Program Verification to Time and Space: The Scientific Life of Ernst-R{\"{u}}diger Olderog. In R. Meyer, A. Platzer, & H. Wehrheim (Eds.), Correct System Design - Symposium in Honor of Ernst-R{\"{u}}diger Olderog on the Occasion of His 60th Birthday, Oldenburg, Germany, September 8-9, 2015. Proceedings (pp. 3--4). https://doi.org/10.1007/978-3-319-23506-6_1
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3164
Derrick, J., Dongol, B., Schellhorn, G., Travkin, O., & Wehrheim, H. (2015). Verifying Opacity of a Transactional Mutex Lock. In N. Bj{\o}rner & F. S. de Boer (Eds.), {FM} 2015: Formal Methods - 20th International Symposium, Oslo, Norway, June 24-26, 2015, Proceedings (pp. 161--177). https://doi.org/10.1007/978-3-319-19249-9_11
LibreCat | DOI
 

Filters and Search Terms

department=7

Search

Filter Publications

Display / Sort

Citation Style: APA

Export / Embed