Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
2046 Publications
2016 | Journal Article | LibreCat-ID: 3886
The role of electromagnetic interactions in second harmonic generation from plasmonic metamaterials
J. Alberti, H. Linnenbank, S. Linden, Y. Grynko, J. Förstner, Applied Physics B 122 (2016) 45–50.
LibreCat
| Files available
| DOI
J. Alberti, H. Linnenbank, S. Linden, Y. Grynko, J. Förstner, Applied Physics B 122 (2016) 45–50.
2016 | Mastersthesis | LibreCat-ID: 2898
Searchable Encryption
E. Weis, Searchable Encryption, 2016.
LibreCat
E. Weis, Searchable Encryption, 2016.
2016 | Book Chapter | LibreCat-ID: 28995
Vertiefende Analysen zu ICILS 2013 – Befunde und mögliche Entwicklungsperspektiven
B. Eickelmann, J. Gerick, K. Drossel, W. Bos, in: B. Eickelmann, J. Gerick, K. Drossel, W. Bos (Eds.), ICILS 2013 - Vertiefende Analysen zu computer- und informationsbezogenen Kompetenzen von Jugendlichen, Waxmann, Münster, 2016.
LibreCat
B. Eickelmann, J. Gerick, K. Drossel, W. Bos, in: B. Eickelmann, J. Gerick, K. Drossel, W. Bos (Eds.), ICILS 2013 - Vertiefende Analysen zu computer- und informationsbezogenen Kompetenzen von Jugendlichen, Waxmann, Münster, 2016.
2016 | Conference Paper | LibreCat-ID: 2947
Singular Curve Point Decompression Attack
J. Blömer, P. Günther, in: 2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), IEEE, 2016.
LibreCat
| DOI
J. Blömer, P. Günther, in: 2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), IEEE, 2016.
2016 | Book Chapter | LibreCat-ID: 2948
Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures
P. Günther, V. Krummel, in: Mathematical Aspects of Computer and Information Sciences, Springer International Publishing, Cham, 2016, pp. 151–165.
LibreCat
| DOI
P. Günther, V. Krummel, in: Mathematical Aspects of Computer and Information Sciences, Springer International Publishing, Cham, 2016, pp. 151–165.
2016 | Book Chapter | LibreCat-ID: 2968
Theoretical Analysis of the k-Means Algorithm – A Survey
J. Blömer, C. Lammersen, M. Schmidt, C. Sohler, in: Algorithm Engineering, Springer International Publishing, Cham, 2016, pp. 81–116.
LibreCat
| DOI
J. Blömer, C. Lammersen, M. Schmidt, C. Sohler, in: Algorithm Engineering, Springer International Publishing, Cham, 2016, pp. 81–116.
2016 | Preprint | LibreCat-ID: 2969 |
Hard-Clustering with Gaussian Mixture Models
J. Blömer, S. Brauer, K. Bujna, (2016).
LibreCat
| Download (ext.)
J. Blömer, S. Brauer, K. Bujna, (2016).
2016 | Book Chapter | LibreCat-ID: 2970
Adaptive Seeding for Gaussian Mixture Models
J. Blömer, K. Bujna, in: Advances in Knowledge Discovery and Data Mining, Springer International Publishing, Cham, 2016, pp. 296–308.
LibreCat
| DOI
J. Blömer, K. Bujna, in: Advances in Knowledge Discovery and Data Mining, Springer International Publishing, Cham, 2016, pp. 296–308.
2016 | Report | LibreCat-ID: 2971
Effizienz und Sicherheit paarungsbasierter Kryptographie
J. Blömer, P. Günther, Effizienz Und Sicherheit Paarungsbasierter Kryptographie, Tagungsband des 26. Fraunhofer SIT Smartcard-Workshops, 2016.
LibreCat
J. Blömer, P. Günther, Effizienz Und Sicherheit Paarungsbasierter Kryptographie, Tagungsband des 26. Fraunhofer SIT Smartcard-Workshops, 2016.
2016 | Journal Article | LibreCat-ID: 3106
On Non-Cooperative Foundation and Implementation of the Nash Solution in Subgame Perfect Equilibrium via Rubinstein's Game
P. Duman, W. Trockel, Journal of Mechanism and Institution Design 1 (2016) 83–106.
LibreCat
| Files available
| DOI
P. Duman, W. Trockel, Journal of Mechanism and Institution Design 1 (2016) 83–106.
2016 | Journal Article | LibreCat-ID: 3112
Tightly secure signatures and public-key encryption
D. Hofheinz, T. Jager, Des. Codes Cryptography (2016) 29--61.
LibreCat
| DOI
D. Hofheinz, T. Jager, Des. Codes Cryptography (2016) 29--61.
2016 | Journal Article | LibreCat-ID: 3113
Selective opening security of practical public-key encryption schemes
F. Heuer, T. Jager, S. Schäge, E. Kiltz, IET Information Security (2016) 304--318.
LibreCat
| DOI
F. Heuer, T. Jager, S. Schäge, E. Kiltz, IET Information Security (2016) 304--318.
2016 | Journal Article | LibreCat-ID: 3114
Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way
T. Jager, A. Rupp, PoPETs (2016) 62--82.
LibreCat
T. Jager, A. Rupp, PoPETs (2016) 62--82.
2016 | Conference Paper | LibreCat-ID: 3115
How to Generate and Use Universal Samplers
D. Hofheinz, T. Jager, D. Khurana, A. Sahai, B. Waters, M. Zhandry, in: Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II, 2016, pp. 715--744.
LibreCat
| DOI
D. Hofheinz, T. Jager, D. Khurana, A. Sahai, B. Waters, M. Zhandry, in: Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II, 2016, pp. 715--744.
2016 | Conference Paper | LibreCat-ID: 3116
Breaking PPTP VPNs via RADIUS Encryption
M. Horst, M. Grothe, T. Jager, J. Schwenk, in: Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, 2016, pp. 159--175.
LibreCat
| DOI
M. Horst, M. Grothe, T. Jager, J. Schwenk, in: Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, 2016, pp. 159--175.
2016 | Conference Paper | LibreCat-ID: 3117
On the Impossibility of Tight Cryptographic Reductions
C. Bader, T. Jager, Y. Li, S. Schäge, in: Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II, 2016, pp. 273--304.
LibreCat
| DOI
C. Bader, T. Jager, Y. Li, S. Schäge, in: Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II, 2016, pp. 273--304.
2016 | Conference Paper | LibreCat-ID: 3118
Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts
D. Hofheinz, T. Jager, A. Rupp, in: Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part II, 2016, pp. 146--168.
LibreCat
| DOI
D. Hofheinz, T. Jager, A. Rupp, in: Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part II, 2016, pp. 146--168.
2016 | Conference Paper | LibreCat-ID: 3119
Verifiable Random Functions from Standard Assumptions
D. Hofheinz, T. Jager, in: Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I, 2016, pp. 336--362.
LibreCat
| DOI
D. Hofheinz, T. Jager, in: Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I, 2016, pp. 336--362.
2016 | Conference Paper | LibreCat-ID: 3157
Verification of AUTOSAR Software Architectures with Timed Automata
S. Beringer, H. Wehrheim, in: M. H. ter Beek, S. Gnesi, A. Knapp (Eds.), Critical Systems: Formal Methods and Automated Verification - Joint 21st International Workshop on Formal Methods for Industrial Critical Systems and 16th International Workshop on Automated Verification of Critical Systems, FMICS-AVoCS 2016, Pisa, Italy, September 26-28, 2016, Proceedings, 2016, pp. 189--204.
LibreCat
| Files available
| DOI
S. Beringer, H. Wehrheim, in: M. H. ter Beek, S. Gnesi, A. Knapp (Eds.), Critical Systems: Formal Methods and Automated Verification - Joint 21st International Workshop on Formal Methods for Industrial Critical Systems and 16th International Workshop on Automated Verification of Critical Systems, FMICS-AVoCS 2016, Pisa, Italy, September 26-28, 2016, Proceedings, 2016, pp. 189--204.
2016 | Conference Paper | LibreCat-ID: 3158
Verification of Concurrent Programs on Weak Memory Models
O. Travkin, H. Wehrheim, in: A. Sampaio, F. Wang (Eds.), Theoretical Aspects of Computing - {ICTAC} 2016 - 13th International Colloquium, Taipei, Taiwan, ROC, October 24-31, 2016, Proceedings, 2016, pp. 3--24.
LibreCat
| DOI
O. Travkin, H. Wehrheim, in: A. Sampaio, F. Wang (Eds.), Theoretical Aspects of Computing - {ICTAC} 2016 - 13th International Colloquium, Taipei, Taiwan, ROC, October 24-31, 2016, Proceedings, 2016, pp. 3--24.