Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

53 Publications


2018 | Book Chapter | LibreCat-ID: 3536
FastLane Is Opaque – a Case Study in Mechanized Proofs of Opacity
G. Schellhorn, M. Wedel, O. Travkin, J. König, H. Wehrheim, in: Software Engineering and Formal Methods, Springer International Publishing, Cham, 2018, pp. 105–120.
LibreCat | DOI
 

2018 | Conference Paper | LibreCat-ID: 2862
Practical, Anonymous, and Publicly Linkable Universally-Composable Reputation Systems
J. Blömer, F. Eidens, J. Juhnke, in: Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers’ Track at the {RSA} Conference 2018, Proceedings, Springer International Publishing, Cham, 2018, pp. 470–490.
LibreCat | Files available | DOI | Download (ext.)
 

2018 | Conference Paper | LibreCat-ID: 3373
An FPGA/HMC-Based Accelerator for Resolution Proof Checking
T. Hansmeier, M. Platzner, D. Andrews, in: ARC 2018: Applied Reconfigurable Computing. Architectures, Tools, and Applications, Springer International Publishing, 2018, pp. 153–165.
LibreCat | Files available | DOI
 

2018 | Book Chapter | LibreCat-ID: 6423
Preference-Based Reinforcement Learning Using Dyad Ranking
D. Schäfer, E. Hüllermeier, in: Discovery Science, Springer International Publishing, Cham, 2018, pp. 161–175.
LibreCat | Files available | DOI
 

2018 | Conference Paper | LibreCat-ID: 3362
Ampehre: An Open Source Measurement Framework for Heterogeneous Compute Nodes
A. Lösch, A. Wiens, M. Platzner, in: Proceedings of the International Conference on Architecture of Computing Systems (ARCS), Springer International Publishing, Cham, 2018, pp. 73–84.
LibreCat | Files available | DOI
 

2018 | Conference Paper | LibreCat-ID: 5774
Information Flow Certificates
M. Töws, H. Wehrheim, in: Theoretical Aspects of Computing – ICTAC 2018, Springer International Publishing, Cham, 2018, pp. 435–454.
LibreCat | Files available | DOI
 

2018 | Book Chapter | LibreCat-ID: 6253
Assist Users to Straightaway Suggest and Describe Experienced Problems
B. Senft, H.G. Fischer, S. Oberthür, N. Patkar, in: Design, User Experience, and Usability: Theory and Practice, Springer International Publishing, Cham, 2018, pp. 758–770.
LibreCat | DOI
 

2018 | Book Chapter | LibreCat-ID: 6254
A Canvas Method to Foster Interdisciplinary Discussions on Digital Assistance Systems
H.G. Fischer, B. Senft, F. Rittmeier, S. Sauer, in: A. Marcus, W. Wang (Eds.), Design, User Experience, and Usability: Theory and Practice. Proceedings of the 20th International Conference on Human-Computer Interaktion (HCI International 2018), Springer International Publishing, Cham, 2018, pp. 711–724.
LibreCat | DOI
 

2017 | Conference Paper | LibreCat-ID: 2967
Subtleties in Security Definitions for Predicate Encryption with Public Index
J. Blömer, G. Liske, in: Proceedings of the International Conference of Mathematical Aspects of Computer and Information Sciences (MACIS), Springer International Publishing, Cham, 2017, pp. 438–453.
LibreCat | Files available | DOI | Download (ext.)
 

2017 | Conference Paper | LibreCat-ID: 5769
Policy Dependent and Independent Information Flow Analyses
M. Töws, H. Wehrheim, in: Formal Methods and Software Engineering - 19th International Conference  on Formal Engineering Methods (ICFEM 2017), Springer International Publishing, 2017, pp. 362–378.
LibreCat | Files available | DOI
 

2017 | Book Chapter | LibreCat-ID: 6255
A Human-Centered Perspective on Software Quality: Acceptance Criteria for Work 4.0
H.G. Fischer, M. Engler, S. Sauer, in: Design, User Experience, and Usability: Theory, Methodology, and Management, Springer International Publishing, Cham, 2017, pp. 570–583.
LibreCat | DOI
 

2017 | Book Chapter | LibreCat-ID: 2381
Complexity of Single-Swap Heuristics for Metric Facility Location and Related Problems
S. Brauer, in: D. Fotakis, A. Pagourtzis, V.T. Paschos (Eds.), Lecture Notes in Computer Science, Springer International Publishing, Cham, 2017, pp. 116–127.
LibreCat | DOI
 

2017 | Conference Paper | LibreCat-ID: 2344
Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations
J. Blömer, P. Günther, V. Krummel, N. Löken, in: Foundations and Practice of Security, Springer International Publishing, Cham, 2017, pp. 3–17.
LibreCat | Files available | DOI
 

2016 | Book Chapter | LibreCat-ID: 2948
Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures
P. Günther, V. Krummel, in: Mathematical Aspects of Computer and Information Sciences, Springer International Publishing, Cham, 2016, pp. 151–165.
LibreCat | DOI
 

2016 | Book Chapter | LibreCat-ID: 2968
Theoretical Analysis of the k-Means Algorithm – A Survey
J. Blömer, C. Lammersen, M. Schmidt, C. Sohler, in: Algorithm Engineering, Springer International Publishing, Cham, 2016, pp. 81–116.
LibreCat | DOI
 

2016 | Book Chapter | LibreCat-ID: 2970
Adaptive Seeding for Gaussian Mixture Models
J. Blömer, K. Bujna, in: Advances in Knowledge Discovery and Data Mining, Springer International Publishing, Cham, 2016, pp. 296–308.
LibreCat | DOI
 

2016 | Book Chapter | LibreCat-ID: 6257
Human-Centered Software Engineering as a Chance to Ensure Software Quality Within the Digitization of Human Workflows
H.G. Fischer, B. Senft, in: C. Bogdan (Ed.), Human-Centered and Error-Resilient Systems Development, Springer International Publishing, Cham, 2016, pp. 30–41.
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 5825
Cross-Device Integration of Android Apps
D. Wolters, J. Kirchhoff, C. Gerth, G. Engels, in: Q.Z. Sheng, E. Stroulia, S. Tata, S. Bhiri (Eds.), Service-Oriented Computing, Springer International Publishing, Cham, 2016, pp. 171–185.
LibreCat | DOI
 

2015 | Book Chapter | LibreCat-ID: 2921
Tightly-Secure Signatures from Chameleon Hash Functions
O. Blazy, S. Kakvi, E. Kiltz, J. Pan, in: Lecture Notes in Computer Science, Springer Berlin Heidelberg, Berlin, Heidelberg, 2015, pp. 256–279.
LibreCat | DOI | Download (ext.)
 

2014 | Conference Paper | LibreCat-ID: 6741
Use Your Best Device! Enabling Device Changes at Runtime
D. Bokermann, C. Gerth, G. Engels, in: 12th International Conference on Business Process Management (BPM 2014), Springer International Publishing, 2014, pp. 357–365.
LibreCat | DOI
 

2013 | Book Chapter | LibreCat-ID: 2979
Improved Side Channel Attacks on Pairing Based Cryptography
J. Blömer, P. Günther, G. Liske, in: Constructive Side-Channel Analysis and Secure Design, Springer Berlin Heidelberg, Berlin, Heidelberg, 2013, pp. 154–168.
LibreCat | DOI
 

2013 | Book Chapter | LibreCat-ID: 6279
Towards a Holistic Tool for the Selection and Validation of Usability Method Sets Supporting Human-Centered Design
H.G. Fischer, B. Strenge, K. Nebe, in: Design, User Experience, and Usability. Design Philosophy, Methods, and Tools, Springer Berlin Heidelberg, Berlin, Heidelberg, 2013, pp. 252–261.
LibreCat | DOI
 

2013 | Conference Paper | LibreCat-ID: 6732
Separating Regular Languages by Piecewise Testable and Unambiguous Languages
T. Place, L. van Rooijen, M. Zeitoun, in: Mathematical Foundations of Computer Science 2013 - 38th International Symposium, (MFCS) 2013, Klosterneuburg, Austria, August 26-30, 2013, Springer Berlin Heidelberg, Berlin, Heidelberg, 2013, pp. 729–740.
LibreCat | DOI
 

2013 | Book Chapter | LibreCat-ID: 6276
A Taxonomy-Based Approach towards NUI Interaction Design
F. Klompmaker, V. Paelke, H.G. Fischer, in: Distributed, Ambient, and Pervasive Interactions, Springer Berlin Heidelberg, Berlin, Heidelberg, 2013, pp. 32–41.
LibreCat | DOI
 

2012 | Book Chapter | LibreCat-ID: 2918
Certifying RSA
S. Kakvi, E. Kiltz, A. May, in: Advances in Cryptology – ASIACRYPT 2012, Springer Berlin Heidelberg, Berlin, Heidelberg, 2012, pp. 404–414.
LibreCat | DOI
 

2012 | Book Chapter | LibreCat-ID: 2919
Optimal Security Proofs for Full Domain Hash, Revisited
S. Kakvi, E. Kiltz, in: Advances in Cryptology – EUROCRYPT 2012, Springer Berlin Heidelberg, Berlin, Heidelberg, 2012, pp. 537–553.
LibreCat | DOI | Download (ext.)
 

2011 | Book Chapter | LibreCat-ID: 6293
Exploiting New Interaction Techniques for Disaster Control Management Using Multitouch-, Tangible- and Pen-Based-Interaction
K. Nebe, F. Klompmaker, H. Jung, H.G. Fischer, in: J.A. Jacko (Ed.), Human-Computer Interaction. Interaction Techniques and Environments., Springer Berlin Heidelberg, Berlin, Heidelberg, 2011, pp. 100–109.
LibreCat | DOI
 

2011 | Journal Article | LibreCat-ID: 3332
Modeling Agents and Agent Systems
T. Lettmann, M. Baumann, M. Eberling, T. Kemmerich, Transactions on Computational Collective Intelligence V (2011) 157–181.
LibreCat | DOI
 

2011 | Book Chapter | LibreCat-ID: 6300
A Holistic Model for Integrating Usability Engineering and Software Engineering Enriched with Marketing Activities
H.G. Fischer, K. Nebe, F. Klompmaker, in: M. Kurosu (Ed.), Human Centered Design, Springer Berlin Heidelberg, Berlin, Heidelberg, 2011, pp. 28–37.
LibreCat | DOI
 

2010 | Book Chapter | LibreCat-ID: 2988
Bregman Clustering for Separable Instances
M.R. Ackermann, J. Blömer, in: SWAT 2010, Springer Berlin Heidelberg, Berlin, Heidelberg, 2010, pp. 212–223.
LibreCat | DOI
 

2009 | Book Chapter | LibreCat-ID: 2920
Reinforcement Learning for Blackjack
S. Kakvi, in: Lecture Notes in Computer Science, Springer Berlin Heidelberg, Berlin, Heidelberg, 2009, pp. 300–301.
LibreCat | DOI
 

2009 | Book Chapter | LibreCat-ID: 3000
Three-Valued Spotlight Abstractions
J. Schrieb, H. Wehrheim, D. Wonisch, in: FM 2009: Formal Methods, Springer Berlin Heidelberg, Berlin, Heidelberg, 2009, pp. 106–122.
LibreCat | DOI
 

2009 | Book Chapter | LibreCat-ID: 1830
Creating Butterflies in the Core – A Network Coding Extension for MPLS/RSVP-TE
T. Biermann, A. Schwabe, H. Karl, in: NETWORKING 2009, Springer Berlin Heidelberg, Berlin, Heidelberg, 2009, pp. 883–894.
LibreCat | DOI
 

2007 | Book Chapter | LibreCat-ID: 3020
Low Secret Exponent RSA Revisited
J. Blömer, A. May, in: Lecture Notes in Computer Science, Springer Berlin Heidelberg, Berlin, Heidelberg, 2007, pp. 4–19.
LibreCat | DOI
 

2007 | Book Chapter | LibreCat-ID: 3019
Cryptanalysis of Unbalanced RSA with Small CRT-Exponent
A. May, in: Advances in Cryptology — CRYPTO 2002, Springer Berlin Heidelberg, Berlin, Heidelberg, 2007, pp. 242–256.
LibreCat | DOI
 

2007 | Book Chapter | LibreCat-ID: 3021
Key Revocation with Interval Cover Families
J. Blömer, A. May, in: Selected Areas in Cryptography, Springer Berlin Heidelberg, Berlin, Heidelberg, 2007, pp. 325–341.
LibreCat | DOI
 

2007 | Book Chapter | LibreCat-ID: 3026
A Probabilistic Zero-Test for Expressions Involving Roots of Rational Numbers
J. Blömer, in: Algorithms — ESA’ 98, Springer Berlin Heidelberg, Berlin, Heidelberg, 2007, pp. 151–162.
LibreCat | DOI
 

2007 | Book Chapter | LibreCat-ID: 3022
Dimension Reduction Methods for Convolution Modular Lattices
A. May, J.H. Silverman, in: Lecture Notes in Computer Science, Springer Berlin Heidelberg, Berlin, Heidelberg, 2007, pp. 110–125.
LibreCat | DOI
 

2006 | Book Chapter | LibreCat-ID: 3004
Fault Based Collision Attacks on AES
J. Blömer, V. Krummel, in: Lecture Notes in Computer Science, Springer Berlin Heidelberg, Berlin, Heidelberg, 2006, pp. 106–120.
LibreCat | DOI
 

2006 | Book Chapter | LibreCat-ID: 3005
Wagner’s Attack on a Secure CRT-RSA Algorithm Reconsidered
J. Blömer, M. Otto, in: Lecture Notes in Computer Science, Springer Berlin Heidelberg, Berlin, Heidelberg, 2006, pp. 13–23.
LibreCat | DOI
 

2006 | Book Chapter | LibreCat-ID: 3007
Sign Change Fault Attacks on Elliptic Curve Cryptosystems
J. Blömer, M. Otto, J.-P. Seifert, in: Lecture Notes in Computer Science, Springer Berlin Heidelberg, Berlin, Heidelberg, 2006, pp. 36–52.
LibreCat | Files available | DOI
 

2005 | Book Chapter | LibreCat-ID: 3006
A Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers
J. Blömer, A. May, in: EUROCRYPT 2005, Springer Berlin Heidelberg, Berlin, Heidelberg, 2005, pp. 251–267.
LibreCat | Files available | DOI
 

2005 | Book Chapter | LibreCat-ID: 3010
Partial Key Exposure Attacks on RSA up to Full Size Exponents
M. Ernst, E. Jochemsz, A. May, B. de Weger, in: EUROCRYPT 2005, Springer Berlin Heidelberg, Berlin, Heidelberg, 2005, pp. 371–386.
LibreCat | DOI
 

2004 | Book Chapter | LibreCat-ID: 3011
Provably Secure Masking of AES
J. Blömer, J. Guajardo, V. Krummel, in: Selected Areas in Cryptography, Springer Berlin Heidelberg, Berlin, Heidelberg, 2004, pp. 69–83.
LibreCat | DOI
 

2004 | Book Chapter | LibreCat-ID: 3012
A Generalized Wiener Attack on RSA
J. Blömer, A. May, in: Public Key Cryptography – PKC 2004, Springer Berlin Heidelberg, Berlin, Heidelberg, 2004, pp. 1–13.
LibreCat | Files available | DOI
 

2004 | Book Chapter | LibreCat-ID: 3014
Secret Exponent Attacks on RSA-type Schemes with Moduli N=p^{r}q
A. May, in: Public Key Cryptography – PKC 2004, Springer Berlin Heidelberg, Berlin, Heidelberg, 2004, pp. 218–230.
LibreCat | DOI
 

2004 | Book Chapter | LibreCat-ID: 3015
Computing the RSA Secret Key Is Deterministic Polynomial Time Equivalent to Factoring
A. May, in: Advances in Cryptology – CRYPTO 2004, Springer Berlin Heidelberg, Berlin, Heidelberg, 2004, pp. 213–219.
LibreCat | DOI
 

2003 | Book Chapter | LibreCat-ID: 3016
New Partial Key Exposure Attacks on RSA
J. Blömer, A. May, in: Advances in Cryptology - CRYPTO 2003, Springer Berlin Heidelberg, Berlin, Heidelberg, 2003, pp. 27–43.
LibreCat | DOI
 

2003 | Book Chapter | LibreCat-ID: 3018
Fault Based Cryptanalysis of the Advanced Encryption Standard (AES)
J. Blömer, J.-P. Seifert, in: Financial Cryptography, Springer Berlin Heidelberg, Berlin, Heidelberg, 2003, pp. 162–181.
LibreCat | DOI
 

2000 | Book Chapter | LibreCat-ID: 3023
Closest Vectors, Successive Minima, and Dual HKZ-Bases of Lattices
J. Blömer, in: Automata, Languages and Programming, Springer Berlin Heidelberg, Berlin, Heidelberg, 2000, pp. 248–259.
LibreCat | DOI
 

1999 | Book Chapter | LibreCat-ID: 2435
Large-Scale SCI Clusters in Practice: Architecture and Performance in SCI
J. Simon, A. Reinefeld, O. Heinz, in: H. Hellwagner, A. Reinefeld (Eds.), SCI: Scalable Coherent Interface. Architecture and Software for High-Performance Compute Clusters, Springer, Berlin / Heidelberg, 1999, pp. 367–381.
LibreCat | DOI
 

1997 | Book Chapter | LibreCat-ID: 3029
Denesting by bounded degree radicals
J. Blömer, in: Algorithms — ESA ’97, Springer Berlin Heidelberg, Berlin, Heidelberg, 1997, pp. 53–63.
LibreCat | Files available | DOI
 

1992 | Book Chapter | LibreCat-ID: 3046
Resemblance and symmetries of geometric patterns
H. Alt, J. Blömer, in: Data Structures and Efficient Algorithms, Springer Berlin Heidelberg, Berlin, Heidelberg, 1992, pp. 1–24.
LibreCat | DOI
 

Filters and Search Terms

issn=0302-9743

Search

Filter Publications

Display / Sort

Export / Embed