Publications

CDC Publikationen

Exportieren als [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Date | Creator(s) | Item type
Jump to: 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 | 1993 | 1992 | 1991 | 1990 | 1989 | 1988
Es werden nur Einträge angezeigt, bei denen keine untergeordnete Organisationseinheit ausgewählt wurde. Anzahl: 1222.

2021

Cremers, Cas ; Düzlü, Samed ; Fiedler, Rune ; Fischlin, Marc ; Janson, Christian (2021):
BUFFing signature schemes beyond unforgeability and the case of post-quantum signature.
42nd IEEE Symposium on Security and Privacy, virtual Conference, 23.-27.05.2021, [Conference item]

Gagliardoni, Tommaso ; Krämer, Juliane ; Struck, Patrick (2021):
Quantum Indistinguishability for Public Key Encryption.
In: Lecture Notes in Computer Science, In: Post-Quantum Cryptography : 12th International Workshop, PQCrypto 2021 Proceedings,
k. A., Springer, PQCrypto 2021 The Twelfth International Conference on Post-Quantum Cryptography, virtual Conference, July 20-22, 2021, ISBN 978-3-030-81292-8,
[Conference item]

2020

Büscher, Niklas ; Demmler, Daniel ; Karvelas, Nikolaos ; Katzenbeisser, Stefan ; Krämer, Juliane ; Rathee, Deevashwer ; Schneider, Thomas ; Struck, Patrick (2020):
Secure Two-Party Computation in a Quantum world.
18th International Conference on Applied Cryptography and Network Security (ACNS'20), virtual Conference, 19.-22.10.2020, [Conference item]

Krämer, Juliane ; Struck, Patrick (2020):
Encryption Schemes using Random Oracles: from Classical to Post-Quantum Security.
11th International Conference on Post-Quantum Cryptography (PQCrypto 2020), virtual Conference, 21.-23.09.2020, [Conference item]

Krämer, Juliane ; Struck, Patrick (2020):
Leakage-Resilient Authenticated Encryption from Leakage-Resilient Pseudorandom Functions.
11th International Workshop on Constructive Side-Channel Analysis and Secure Design(COSADE 2020), Lugano, Switzerland, 05.-07.10.2020, [Conference item]

Alkim, Erdem ; Barreto, Paulo S. L. M. ; Bindel, Nina ; Krämer, Juliane ; Longa, Patrick ; Ricardini, Jefferson E. (2020):
The Lattice-Based Digital Signature Scheme qTESLA.
18th International Conference on Applied Cryptography and Network Security (ACNS 2020), virtual Conference, 19-22.10.2020, [Conference item]

Alkeilani Alkadri, Nabil ; Bansarkhani, Rachid El ; Buchmann, Johannes (2020):
BLAZE: Practical Lattice-Based Blind Signatures for Privacy-Preserving Applications.
S. 484-502, Springer, 24th International Conference on Financial Cryptography and Data Security (FC'20), Kota Kinabalu, Malaysia, 10.-14.02., ISBN 978-3-030-51279-8,
[Conference item]

Alkeilani Alkadri, Nabil ; Bansarkhani, Rachid El ; Buchmann, Johannes (2020):
On Lattice-Based Interactive Protocols: An Approach with Less or No Aborts.
S. 41-61, Springer, The 25th Australasian Conference on Information Security and Privacy (ACISP'20), Perth, Australia, 30.11.-02.12., ISBN 978-3-030-55303-6,
[Conference item]

Alkeilani Alkadri, Nabil ; Das, Poulami ; Erwig, Andreas ; Faust, Sebastian ; Krämer, Juliane ; Riahi, Siavash ; Struck, Patrick (2020):
Deterministic Wallets in a Quantum World.
ACM, The 27th ACM Conference on Computer and Communications Security (CCS 2020), virtual Conference, 09.-13.11., [Conference item]

Bauspieß, Pia ; Kolberg, Jascha ; Demmler, Daniel ; Krämer, Juliane ; Busch, Christoph (2020):
Post-Quantum Secure Two-Party Computation for Iris Biometric Template Protection.
IEEE, 12th IEEE International Workshop on Information Forensics and Security (WIFS 2020), virtual Conference, 06.-11.12., [Conference item]

Krämer, Juliane ; Struck, Patrick (2020):
Security of Public Key Encryption against Resetting Attacks.
21st International Conference on Cryptology in India (Indocrypt 2020), virtual Conference, 13.-16.12., [Conference item]

Roth, Johannes ; Karatsiolis, Vangelis ; Krämer, Juliane (2020):
Classic McEliece Implementation with Low Memory Footprint.
19th Smart Card Research and Advanced Application Conference (CARDIS 2020), virtual Conference, 18.-19.11., [Conference item]

2019

Krämer, Juliane ; Marzougui, Soundes (2019):
Post-Quantum Cryptography in Embedded Systems.
In: ARES '19: Proceedings of the 14th International Conference on Availability, Reliability and Security,
ACM, 14th International Conference on Availability, Reliability and Security, Canterbury, United Kingdom, 26.-29.08.2019, ISBN 978-1-4503-7164-3,
DOI: 10.1145/3339252.3341475,
[Conference item]

Degabriele, Jean Paul ; Janson, Christian ; Struck, Patrick (2019):
Sponges Resist Leakage: The Case of Authenticated Encryption.
ASIACRYPT 2019 - 25th Annual International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, 08.-12.12., [Conference item]

Buchmann, Johannes ; Geihs, Matthias ; Hamacher, Kay ; Katzenbeisser, Stefan ; Stammler, Sebastian (2019):
Long-term integrity protection of genomic data.
In: EURASIP Journal on Information Security, S. 16. SpringerOpen, DOI: 10.1186/s13635-019-0099-x,
[Article]

Krämer, Juliane (2019):
Post-Quantum Cryptography and its Application to the IoT.
In: Informatik Spektrum, 42 (5), S. 343-344. Springer Heidelberg, ISSN 0170-6012,
DOI: 10.1007/s00287-019-01200-2,
[Article]

Bindel, Nina ; Braun, Johannes ; Gladiator, Luca ; Stöckert, Tobias ; Wirth, Johannes (2019):
X.509-Compliant Hybrid Certificates for the Post-Quantum Transition.
In: Journal of Open Source Software, 4 (40), The Open Journal, ISSN 2475-9066,
DOI: 10.21105/joss.01606,
[Article]

Graf, Holger ; Schwarz, Reinhard ; Becker, Tilman ; Mück, Jürgen
Goldstein, Denise ; Schneider, Tidarat ; Braun, Johannes (Hrsg.) (2019):
SCIKE Innovationsbericht - Innovation durch Internationalisierung.
TU Darmstadt, [Report]

Schneider, Tidarat ; Kerber, Jens ; Goldstein, Denise ; Takeva, Savina ; Stemmler, Elisabeth
Braun, Johannes ; Schneider, Tidarat ; Goldstein, Denise (Hrsg.) (2019):
Software-Cluster international - Innovation durch Internationalisierung: Ein Leitfaden.
TU Darmstadt, [Report]

Burger, Michael ; Bischof, Christian ; Krämer, Juliane
Khalid, Zine-Dine (Hrsg.) (2019):
A new Parallelization for p3Enum and Parallelized Generation of Optimized Pruning Functions.
S. 931-940, HPCS 2019- International Conference on High Performance Computing & Simulation, Dublin, Irland, 15.-19.07., [Conference item]

Traverso, Giulia (2019):
Long-Term Confidential Secret Sharing-Based Distributed Storage Systems.
Darmstadt, Technische Universität, FG Informatik,
[PhD thesis]

Burger, Michael ; Bischof, Christian ; Krämer, Juliane (2019):
p3Enum: A new Parameterizable and Shared-Memory Parallelized Shortest Vector Problem Solver.
In: 19th INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE, S. 535-542,
Springer, Faro, Portugal, 12.-14.06.2019, DOI: 10.1007/978-3-030-22750-0_48,
[Conference item]

Schwind, Julian (2019):
Sicherheits- und Datenschutzkonzept für die zentrale Verteilung von PPDs.
Darmstadt, TU Darmstadt, Fachbereich Informatik, [Bachelor thesis]

Bindel, Nina ; Brendel, Jacqueline ; Fischlin, Marc ; Goncalves, Brian ; Stebila, Douglas (2019):
Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange.
Chongqing, China, PQCrypto 2019, May 8-10, 2019, [Conference item]

Geihs, Matthias ; Nikiforov, Oleg ; Demirel, Denise ; Sauer, Alexander ; Butin, Denis ; Günther, Felix ; Alber, Gernot ; Walther, Thomas ; Buchmann, Johannes (2019):
The Status of Quantum-Based Long-Term Secure Communication over the Internet.
In: IEEE Transactions on Sustainable Computing, IEEE, ISSN 2377-3782,
DOI: htps://doi.org/10.1109/TSUSC.2019.2913948,
[Article]

Ranly, Paul Moritz (2019):
On the feasibility of hierarchical secret sharing-based distributed storage systems.
Darmstadt, TU Darmstadt, [Bachelor thesis]

Krämer, Juliane ; Loiero, Mirjam (2019):
Fault Attacks on UOV and Rainbow.
10th International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2019), Darmstadt, Germany, 03.-05.04., [Conference item]

Schabhüser, Lucas ; Butin, Denis ; Buchmann, Johannes (2019):
Context Hiding Multi-Key Linearly Homomorphic Authenticators.
In: Topics in Cryptology - CT-RSA 2019 - The Cryptographers' Track at the RSA Conference 2019, S. 493-513,
Springer, San Francisco, CA, USA, March 4–8, 2019, [Conference item]

Bansarkhani, Rachid El (2019):
LARA - A Design Concept for Lattice-based Encryption.
S. 377-395, FC 2019: 23rd International Conference on Financial Cryptography and Data Security, Frigate Bay, St. Kitts and Nevis, February 18.-22., 2019, ISBN 978-3-030-32100-0,
DOI: 10.1007/978-3-030-32101-7_23,
[Conference item]

Geihs, Matthias ; Schabhüser, Lucas ; Buchmann, Johannes (2019):
Efficient Proactive Secret Sharing for Large Data via Concise Vector Commitments.
In: LNCS, Springer, International Conference on Codes, Cryptology, and Information Security (C2SI) 2019, Rabat, Morocco, April 22 - 24, 2019, [Conference item]

Schabhüser, Lucas (2019):
Information-Theoretic Privacy in Verifiable Outsourced Computation.
Darmstadt, Technische Universität,
[PhD thesis]

Schabhüser, Lucas ; Butin, Denis ; Buchmann, Johannes (2019):
Function-Dependent Commitments from Homomorphic Authenticators.
Springer, 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, 3-5 July 2019, [Conference item]

Zibuschka, Jan ; Horsch, Moritz ; Kubach, Michael
Roßnagel, Heiko ; Wagner, Sven ; Hühnlein, Detlef (Hrsg.) (2019):
The ENTOURAGE Privacy and Security Reference Architecture for Internet of Things Ecosystems.
In: Open Identity Summit 2019, S. 119-130,
Bonn, Gesellschaft für Informatik, Garmisch-Partenkirchen, 28.-29.03.2019, ISSN 1617-5468, ISBN 978-3-88579-687-9,
[Conference item]

2018

Geihs, Matthias ; Buchmann, Johannes (2018):
ELSA: Efficient Long-Term Secure Storage of Large Datasets.
In: Information Security and Cryptology- ICISC 2018, S. 269-286,
Springer Nature, 21st Annual International Conference on Information Security and Cryptology, Seoul, Korean, 28.-30.11.2018, ISBN 978-3-030-12145-7,
DOI: 10.1007/978-3-030-12146-4_17,
[Conference item]

Burger, Michael ; Bischof, Christian ; Calotoiu, Alexandru ; Wunderer, Thomas ; Wolf, Felix (2018):
Exploring the Performance Envelope of the LLL Algorithm.
In: CSE-2018,
IEEE Computer Society, CSE 2018 – 21st IEEE International Conference on Computational Science and Engineering, Faculty of Automatic Control and Computers, University Politehnica of Bucharest, Romania, 29.-31.10.2018, [Conference item]

Guski, Florian (2018):
Simulation of the Quantum Hybrid Attack in Q#.
TU Darmstadt, [Bachelor thesis]

Wunderer, Thomas (2018):
A Detailed Analysis of the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack.
In: Journal of Mathematical Cryptology (JMC), De Gruyter, [Article]

Wunderer, Thomas ; Burger, Michael ; Nguyen, Giang Nam (2018):
Parallelizing the Hybrid Lattice Reduction and Meet-in-the-Middle Attack.
In: CSE-2018,
IEEE Computer Society, CSE 2018 – 21st IEEE International Conference on Computational Science and Engineering, Faculty of Automatic Control and Computers, University Politehnica of Bucharest, Romania, 29.-31.10.2018, [Conference item]

Bansarkhani, Rachid El (2018):
LARA - A Design Concept for Lattice-based Encryption.
In: ePrint Archive, (Report 2017/049), [Report]

Kalsen, Ali (2018):
On the impact of quantum algorithms on lattice enumeration.
TU Darmstadt, [Master thesis]

Schabhüser, Lucas ; Butin, Denis ; Buchmann, Johannes (2018):
CHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear Case.
In: Springer LNCS, In: Information Security Practice and Experience - ISPEC 2018,
Information Security Practice and Experience - 14th International Conference, ISPEC 2018, Tokyo, Japan, [Conference item]

Albrecht, Martin R. ; Curtis, Benjamin R. ; Deo, Amit ; Davidson, Alex ; Player, Rachel ; Postlethwaite, Eamonn W. ; Virdia, Fernando ; Wunderer, Thomas (2018):
Estimate all the {LWE, NTRU} schemes!
In: LNCS, In: SCN 2018,
11th Conference on Security and Cryptography for Networks, Amalfi, Italy, [Conference item]

Alexopoulos, Nikolaos ; Habib, Sheikh Mahbub ; Mühlhäuser, Max (2018):
Towards Secure Distributed Trust Management on a Global Scale.
S. 49-54, ACM, IoT S&P’18: ACM SIGCOMM 2018 Workshop on IoT Security and Privacy, Budapest, Hungary, 20.-25.08, ISBN 978-1-4503-5905-4,
DOI: 10.1145/3229565.3229569,
[Conference item]

Bindel, Nina ; Buchmann, Johannes ; Göpfert, Florian ; Schmidt, Markus (2018):
Estimation of the Hardness of the Learning with Errors Problem with a Restricted Number of Samples.
In: Journal of Mathematical Cryptology, de Gruyter, [Article]

Geihs, Matthias ; Karvelas, Nikolaos ; Katzenbeisser, Stefan ; Buchmann, Johannes (2018):
PROPYLA: Privacy Preserving Long-Term Secure Storage.
In: ACM, In: SCC Workshop @ AsiaCCS 2018,
Songdo, Incheon, Korea, The Sixth International Workshop on Security in Cloud Computing (SCC), [Conference item]

Kannwischer, Matthias ; Genêt, Aymeric ; Butin, Denis ; Krämer, Juliane ; Buchmann, Johannes (2018):
Differential Power Analysis of XMSS and SPHINCS.
In: LNCS, 10815, S. 168-188, Springer, 9th International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2018), Singapore, 23.-24.04., ISBN 978-3-319-89640-3,
DOI: 10.1007/978-3-319-89641-0_10,
[Conference item]

Schabhüser, Lucas ; Butin, Denis ; Demirel, Denise ; Buchmann, Johannes (2018):
Function-Dependent Commitments for Verifiable Multi-Party Computation.
In: LNCS, In: Information Security - 21st International Conference, ISC 2018,
Guildford, UK, [Conference item]

Wunderer, Thomas ; Wang, Yuntao (2018):
Revisiting the Sparsification Technique in Kannan’s Embedding Attack on LWE.
In: Springer LNCS, In: ISPEC 2018,
Tokyo, Japan, 14th International Conference on Information Security Practice and Experience (ISPEC 2018), [Conference item]

Demmler, Daniel ; Rindal, Peter ; Rosulek, Mike ; Trieu, Ni (2018):
PIR-PSI: Scaling Private Contact Discovery.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), S. 159-178. De Gruyter Open, DOI: 10.1515/popets-2018-0037,
[Article]

Liu, Mo-meng ; Krämer, Juliane ; Hu, Yu-pu ; Buchmann, Johannes (2018):
Quantum security analysis of a lattice-based oblivious transfer protocol.
In: LNCS, In: Frontiers of Information Technology & Electronic Engineering, 18 (9), S. 1348-1369. Springer, ISSN 2095-9184 (Print) 2095-9230 (Online),
[Article]

Deligeorgopoulos, Efstathios (2018):
Evaluation of Proactive Secret Sharing for Long-Term Secure Storage.
TU Darmstadt, [Master thesis]

Loiero, Mirjam (2018):
Fault Attacks on Multivariate Signature Schemes.
Darmstadt, Technische Universität, [Master thesis]

Bindel, Nina (2018):
On the Security of Lattice-Based Signature Schemes in a Post-Quantum World.
Darmstadt, Technische Universität,
[PhD thesis]

Geihs, Matthias (2018):
Long-Term Protection of Integrity and Confidentiality – Security Foundations and System Constructions.
Darmstadt, Technische Universität,
[PhD thesis]

Horsch, Moritz (2018):
Generating and Managing Secure Passwords for Online Accounts.
Darmstadt, Technische Universität,
[PhD thesis]

Traverso, Giulia ; Butin, Denis ; Buchmann, Johannes ; Palesandro, Alex (2018):
Coalition-Resistant Peer Rating for Long-Term Confidentiality.
In: PST 2018 - 16th Annual Conference on Privacy, Security and Trust,
IEEE Computer Society, PST 2018 - 16th Annual Conference on Privacy, Security and Trust, Belfast, Northern Ireland, United Kingdom, August 28-30, 2018, [Conference item]

Wunderer, Thomas (2018):
On the Security of Lattice-Based Cryptography Against Lattice Reduction and Hybrid Attacks.
Darmstadt, Technische Universität,
[PhD thesis]

2017

Albrecht, Martin ; Göpfert, Florian ; Vidria, Fernando ; Wunderer, Thomas (2017):
Revisiting the Expected Cost of Solving uSVP and Applications to LWE.
In: ASIACRYPT 2017 - Advances in Cryptology,
Springer, [Conference item]

Buchmann, Johannes ; Holzer, Patrick ; Wunderer, Thomas (2017):
Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor p^α q^β.
In: INDOCRYPT 2017 - 18th International Conference on Cryptology in India,
Springer, [Conference item]

Schabhüser, Lucas ; Buchmann, Johannes ; Struck, Patrick (2017):
A Linearly Homomorphic Signature Scheme From Weaker Assumptions.
S. 261-279, Springer, 16th IMA International Conference on Cryptography and Coding (IMACC 2017), Oxford, UK, 12.-14. Dec., 2017, ISBN 978-3-319-71045-7,
DOI: 10.1007/978-3-319-71045-7,
[Conference item]

Krüger, Stefan ; Nadi, Sarah ; Reif, Michael ; Ali, Karim ; Mezini, Mira ; Bodden, Eric ; Göpfert, Florian ; Günther, Felix ; Weinert, Christian ; Demmler, Daniel ; Kamath, Ram (2017):
CogniCrypt: Supporting Developers in using Cryptography.
In: Automated Software Engineering (ASE'17),
Piscataway, NJ, USA, ACM, Piscataway, NJ, USA, DOI: 10.1109/ASE.2017.8115707,
[Conference item]

Butin, Denis ; Wälde, Julian ; Buchmann, Johannes (2017):
Post-Quantum Authentication in OpenSSL with Hash-Based Signatures.
ICMU - The Tenth International Conference on Mobile Computing and Ubiquitous Networking, Toyama International Conference Center, Toyama, Japan, October 3-5, 2017, [Conference item]

Bindel, Nina ; Krämer, Juliane ; Schreiber, Johannes (2017):
Hampering fault attacks against lattice-based signature schemes - countermeasures and their efficiency.
In: CODES/ISSS ’17 Companion,
Springer, [Conference item]

Buldas, Ahto ; Geihs, Matthias ; Buchmann, Johannes (2017):
Long-Term Secure Time-Stamping using Preimage-Aware Hash Functions.
In: ProvSec 2017 - The 11th International Conference on Provable Security,
Springer, [Conference item]

Horsch, Moritz ; Braun, Johannes ; Buchmann, Johannes (2017):
Password Assistance.
In: Open Identity Summit 2017,
Karlstad, Sweden, [Conference item]

Schreiber, Johannes (2017):
Countermeasures Against First Order Fault Attacks Using the Example of ring-TESLA.
Darmstadt, Technische Universität, [Bachelor thesis]

Kannwischer, Matthias (2017):
Physical Attack Vulnerability of Hash-Based Signature Schemes.
Darmstadt, Technische Universität, [Master thesis]

Bernhard, David ; Kulyk, Oksana ; Volkamer, Melanie (2017):
Security Proofs for Participation Privacy, Receipt-Freeness, Ballot Privacy for the Helios Voting Scheme.
In: 12th International Conference on Availability, Reliability and Security - ARES 2017, S. 1-10,
ACM, DOI: 10.1145/3098954.3098990,
[Conference item]

Buchmann, Johannes ; Lauter, Kristin ; Mosca, Michele (2017):
Postquantum Cryptography - State of the Art.
In: IEEE Security & Privacy, 15, S. 12-13. [Article]

Butin, Denis (2017):
Hash-Based Signatures: State of Play.
In: IEEE Security & Privacy, 15 (4), S. 37-43. DOI: 10.1109/MSP.2017.3151334,
[Article]

Mulholland, John ; Mosca, Michele ; Braun, Johannes (2017):
The Day the Cryptography Dies.
In: IEEE Security & Privacy, 15 (4), S. 14-21. DOI: 10.1109/MSP.2017.3151325,
[Article]

Traverso, Giulia ; Garcia Cordero, Carlos ; Nojoumian, Mehrdad ; Azarderakhsh, Reza ; Demirel, Denise ; Habib, Sheikh Mahbub ; Buchmann, Johannes (2017):
Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems.
15th Annual Conference on Privacy, Security and Trust (PST), Calgary, Canada, 28.-30.8. 2017, DOI: 10.1109/pst.2017.00040,
[Conference item]

Bugge, Sebastian (2017):
Solving Learning With Errors Instances Using Quantum Reductions.
Darmstadt, Technische Universität, [Master thesis]

Buldas, Ahto ; Geihs, Matthias ; Buchmann, Johannes (2017):
Long-Term Secure Commitments via Extractable-Binding Commitments.
In: LNCS, In: ACISP 2017 - 22nd Australasian Conference on Information Security and Privacy,
Springer, Auckland, New Zealand, [Conference item]

Horsch, Moritz ; Braun, Johannes ; Metz, Dominique ; Buchmann, Johannes (2017):
Update-tolerant and Revocable Password Backup.
In: ACISP 2017 - 22nd Australasian Conference on Information Security and Privacy,
Auckland, New Zealand, [Conference item]

Alkeilani Alkadri, Nabil ; Buchmann, Johannes ; Bansarkhani, Rachid El ; Krämer, Juliane (2017):
A Framework to Select Parameters for Lattice-Based Cryptography.
In: Cryptology ePrint Archive, 2017 (615), S. 1-37. International Association for Cryptologic Research (IACR), [Article]

Alkim, Erdem ; Bindel, Nina ; Buchmann, Johannes ; Dagdelen, Özgür ; Eaton, Edward ; Gutoski, Gus ; Krämer, Juliane ; Pawlega, Filip (2017):
Revisiting TESLA in the quantum random oracle model.
In: PQCrypto 2017 - Eighth International Conference on Post-Quantum Cryptography,
Springer, Utrecht, the Netherlands, [Conference item]

Bindel, Nina ; Herath, Udyani ; McKague, Matthew ; Stebila, Douglas (2017):
Transitioning to a Quantum-Resistant Public Key Infrastructure.
In: PQCrypto 2017 - Eighth International Conference on Post-Quantum Cryptography,
Springer, Utrecht, the Netherlands, [Conference item]

Göpfert, Florian ; Vredendaal, Christine van ; Wunderer, Thomas (2017):
A Hybrid Lattice Basis Reduction and Quantum Search Attack on LWE.
In: PQCrypto 2017 - Eighth International Conference on Post-Quantum Cryptography,
[Conference item]

Biemann, Chris ; Bontcheva, Kalina ; Eckart de Castilho, Richard ; Gurevych, Iryna ; Yimam, Seid Muhie
Ide, Nancy ; Pustejovsky, James (Hrsg.) (2017):
Collaborative Web-based Tools for Multi-layer Text Annotation.
In: Text, Speech, and Technology book series, In: The Handbook of Linguistic Annotation, S. 229-256, Springer Netherlands, ISBN 978-94-024-0879-9,
DOI: 10.1007/978-94-024-0881-2,
[Book section]

Bindel, Nina (2017):
Ein deutsches digitales Signaturverfahren auf dem Weg zum internationalen kryptographischen Standard.
In: Digitale Gesellschaft zwischen Risikobereitschaft und Sicherheitsbedürfnis- Tagungsband zum 15. Deutschen IT-Sicherheitskongress,
SecuMedia Verlag, [Conference item]

Buchmann, Johannes ; Braun, Johannes ; Demirel, Denise ; Geihs, Matthias (2017):
Quantum Cryptography: a view from classical cryptography.
In: Quantum Science and Technology, 2 (2), DOI: 10.1088/2058-9565/aa69cd,
[Article]

Braun, Johannes ; Buchmann, Johannes ; Demirel, Denise ; Fujiwara, Mikio ; Geihs, Matthias ; Moriai, Shiho ; Sasaki, Masahide ; Waseda, Atsushi (2017):
SHORT PAPER: LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality.
In: ASIA CCS '17: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, S. 461-468,
New York, ACM, ASIA CCS '17, Abu Dhabi, UAE, April 2-6, 2017, ISBN 978-1-4503-4944-4,
DOI: 10.1145/3052973.3053043,
[Conference item]

Buchmann, Johannes ; Demirel, Denise ; Schabhüser, Lucas ; Struck, Patrick (2017):
Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability.
In: LNCS, In: C2SI 2017 - Codes, Cryptology and Information Security - Second International Conference in honor of Professor Claude Carlet, S. 142-160,
Springer, Rabat, Morocco, ISBN 978-3-319-55589-8,
[Conference item]

Holzer, Patrick (2017):
Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor p^α q^β.
TU Darmstadt, [Master thesis]

Petzoldt, Albrecht ; Szepieniec, Alan ; Mohamed, Mohamed Saied Emam (2017):
A Practical Multivariate Blind Signature Scheme.
In: Financial Cryptography and Data Security 2017,
Malta, [Conference item]

Weinert, Christian ; Demirel, Denise ; Vigil, Martín ; Geihs, Matthias ; Buchmann, Johannes (2017):
MoPS: A Modular Protection Scheme for Long-Term Storage.
In: 12. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'17), S. 436-448,
ACM, ISBN 978-1-4503-4944-4,
DOI: 10.1145/3052973.3053025,
[Conference item]

Schmidt, Markus (2017):
Estimation of the Hardness of the Learning with Errors Problem with a Given Number of Samples.
Darmstadt, Technische Universität, [Master thesis]

Dietsch, Sascha Thorsten (2017):
Integration des gitterbasierten LARA-Verschlüsselungsverfahrens in JCA.
Darmstadt, Technische Universität, [Bachelor thesis]

2016

Wunderer, Thomas (2016):
Revisiting the Hybrid Attack: Improved Analysis and Refined Security Estimates.
In: Cryptology ePrint Archive, 2016 (733), S. 1-35. International Association for Cryptologic Research (IACR), [Article]

Brendel, J. ; Demirel, D. (2016):
Efficient proactive secret sharing.
S. 543-550, 2016 14th Annual Conference on Privacy, Security and Trust (PST), DOI: 10.1109/PST.2016.7907013,
[Conference item]

Brendel, Jacqueline ; Demirel, Denise (2016):
Efficient Proactive Secret Sharing.
In: 2016 Privacy, Security and Trust Conference,
IEEE, Auckland, New Zealand, [Conference item]

Geihs, Matthias ; Demirel, Denise ; Buchmann, Johannes (2016):
A security analysis of techniques for long-term integrity protection.
In: 2016 Privacy, Security and Trust Conference,
Auckland, New Zealand, [Conference item]

Traverso, Giulia ; Demirel, Denise ; Habib, Sheikh Mahbub ; Buchmann, Johannes (2016):
AS³: Adaptive Social Secret Sharing for Distributed Storage Systems.
In: 2016 Privacy, Security and Trust Conference,
IEEE, Auckland, New Zealand, [Conference item]

Bansarkhani, Rachid El ; Sturm, Jan (2016):
An Efficient Lattice-based Multisignature Scheme with Applications to Bitcoins.
In: 15th International Conference on Cryptology and Network Security - CANS 2016,
Milan, Italy, [Conference item]

Lato, Ellen (2016):
Fault Attacks on Lattice-Based Encryption Schemes.
Darmstadt, Technische Universität, [Master thesis]

Fojtik, Roman (2016):
Salt Synchronization Service.
Darmstadt, Technische Universität, [Bachelor thesis]

Horsch, Moritz ; Schlipf, Mario ; Haas, Stefan ; Braun, Johannes ; Buchmann, Johannes (2016):
Password Policy Markup Language.
In: LNI, 264, In: Open Identity Summit,
[Conference item]

Schabhüser, Lucas ; Demirel, Denise ; Buchmann, Johannes (2016):
An Unconditionally Hiding Auditing Procedure for Computations over Distributed Data.
In: The 2nd IEEE Workshop on Security and Privacy in the Cloud (SPC 2016),
Philadelphia, PA USA, [Conference item]

Appel, Michael ; Bossert, Andreas ; Cooper, Steven ; Kußmaul, Tobias ; Löffler, Johannes ; Pauer, Christof ; Wiesmaier, Alexander (2016):
Block ciphers for the IoT – SIMON, SPECK, KATAN, LED, TEA, PRESENT, and SEA compared.
[Report]

Appel, Michael ; Pauer, Christof ; Wiesmaier, Alexander (2016):
Security aspects and comparison of block ciphers LED and TEA.
[Report]

Bossert, Andreas ; Cooper, Steven ; Wiesmaier, Alexander (2016):
A comparison of block ciphers SIMON, SPECK, and KATAN.
[Report]

Butin, Denis ; Demirel, Denise ; Buchmann, Johannes (2016):
Formal Policy-based Provenance Audit.
In: The 11th International Workshop on Security - IWSEC 2016,
sola city Conference Center, Akihabara-Ochanomizu District, Tokyo, Japan, [Conference item]

Demirel, Denise ; Krenn, Stephan ; Loruenser, Thomas ; Traverso, Giulia (2016):
Efficient Third Party Auditing for a Distributed Storage System.
In: International Conference on Availability, Reliability and Security - ARES 2016,
IEEE, Salzburg, Austria, [Conference item]

Diedrich, Lennart ; Jattke, Patrick ; Murati, Lulzim ; Senker, Matthias ; Wiesmaier, Alexander (2016):
Comparison of Lightweight Stream Ciphers: MICKEY 2.0, WG-8, Grain and Trivium.
[Report]

Jattke, Patrick ; Senker, Matthias ; Wiesmaier, Alexander (2016):
Comparison of two Lightweight Stream Ciphers: MICKEY 2.0 & WG-8.
[Report]

Kulyk, Oksana ; Marky, Karola ; Neumann, Stephan ; Volkamer, Melanie (2016):
Introducing Proxy Voting to Helios.
In: 11th International Conference on Availability, Reliability and Security - ARES 2016, S. 98 - 106,
IEEE, Salzburg, DOI: 10.1109/ARES.2016.38,
[Conference item]

Lieb, Patrick ; Schmidt, Markus ; Wiesmaier, Alexander (2016):
ECDSA and QUARTZ in Comparison with RSA.
[Report]

Mohamed, Mohamed Saied Emam ; Bansarkhani, Rachid El ; Petzoldt, Albrecht (2016):
MQSAS - A Multivariate Sequential Aggregate Signature Scheme.
In: ISC 2016 - The 19th Information Security Conference, S. 426-440,
Springer LNCS, Honolulu, Hi, USA, [Conference item]

Roepke, Rene ; Thraem, Timo ; Wagener, Johannes ; Wiesmaier, Alexander (2016):
A Survey on Protocols securing the Internet of Things: DTLS, IPSec and IEEE 802.11i.
[Report]

Volkamer, Melanie ; Renaud, Karen ; Gerber, Paul (2016):
Spot the phish by checking the pruned URL.
In: Information and Computer Security, 24 (4), S. 372-385. DOI: 10.1108/ICS-07-2015-0032,
[Article]

Bansarkhani, Rachid El ; El Kaafarani, Ali (2016):
Post-Quantum Attribute-Based Signatures from Lattice Assumptions.
In: Cryptology ePrint Archive, 2016 (823), S. 1-28. International Association for Cryptologic Research (IACR), [Article]

Bindel, Nina ; Buchmann, Johannes ; Krämer, Juliane (2016):
Lattice-Based Signature Schemes and their Sensitivity to Fault Attacks.
In: FDTC 2016 - Fault Diagnosis and Tolerance in Cryptography,
IEEE Conference Publication, Santa Barbara, CA, USA, [Conference item]

Braun, Johannes ; Buchmann, Johannes ; Demirel, Denise ; Fujiwara, Mikio ; Geihs, Matthias ; Moriai, Shiho ; Sasaki, Masahide ; Waseda, Atsushi (2016):
LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality (Full Paper).
In: ASIA CCS '17: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, S. 1-13,
New York, ACM, ASIA CCS '17, Abu Dhabi, UEA, April 2-6, 2017, ISBN 978-1-4503-4944-4,
[Conference item]

Klir, Thomas (2016):
Design and Implementation of an Archiving System Providing Long-Term Integrity and Long-Term Confidentiality.
Darmstadt, Technische Universität, [Bachelor thesis]

McGrew, David ; Kampanakis, Panos ; Fluhrer, Scott ; Gazdag, Stefan-Lukas ; Butin, Denis ; Buchmann, Johannes (2016):
State Management for Hash-Based Signatures.
In: 3rd International Conference on Research in Security Standardisation (SSR 2016),
Springer LNCS, Gaithersburg, USA, [Conference item]

Traverso, Giulia ; Demirel, Denise ; Buchmann, Johannes (2016):
Dynamic and Verifiable Hierarchical Secret Sharing.
In: 9th International Conference on Information Theoretic Security - ICITS 2016,
Springer, Tacoma, Washington, USA, [Conference item]

Weinert, Christian (2016):
Building a Modular Long-Term Archiving System.
Darmstadt, Technische Universität, [Bachelor thesis]

Gerber, Nina ; McDermott, Ronja ; Volkamer, Melanie ; Vogt, Joachim (2016):
Understanding information security compliance - Why goal setting and rewards might be a bad idea.
10., In: International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), S. 145-155,
University of Plymouth, Frankfurt, Germany, [Conference item]

Horsch, Moritz ; Schlipf, Mario ; Braun, Johannes ; Buchmann, Johannes (2016):
Password Requirements Markup Language.
In: ACISP 2016 - 21st Australasian Conference on Information Security and Privacy,
Melbourne, Australia, [Conference item]

Kunz, Alexandra ; Volkamer, Melanie ; Stockhardt, Simon ; Palberg, Sven ; Lottermann, Tessa ; Piegert, Eric (2016):
NoPhish: Evaluation of a web application that teaches people being aware of phishing attacks.
In: Jahrestagung der Gesellschaft für Informatik, S. 509--518,
Lecture Notes in Informatics (LNI), Bonn, Germany, [Conference item]

Dix, Isabella (2016):
Implementation of a Reputation System for CA Trust Management.
Darmstadt, Technische Universität, [Bachelor thesis]

Kulyk, Oksana ; Neumann, Stephan ; Marky, Karola ; Budurushi, Jurlind ; Volkamer, Melanie (2016):
Coercion-resistant Proxy Voting.
In: 31st International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2016, S. 3-16,
Springer, Ghent, Belgium, [Conference item]

Neumann, Stephan ; Volkamer, Melanie ; Budurushi, Jurlind ; Prandini, Marco (2016):
SecIVo: a quantitative security evaluation framework for internet voting schemes.
In: >Annals of Telecommunications, S. 1-16. DOI: 10.1007/s12243-016-0520-0,
[Article]

Roth, Johannes (2016):
Analyse von TLS Bibliotheken basierend auf Fuzz Testing.
Darmstadt, Technische Universität, [Bachelor thesis]

Schabhüser, Lucas ; Demirel, Denise ; Buchmann, Johannes (2016):
An Unconditionally Hiding Auditing Procedure for Multi-Party Computations.
In: IACR - Cryptology ePrint Archive, [Article]

Stockhardt, Simon ; Reinheimer, Benjamin ; Volkamer, Melanie ; Mayer, Peter ; Kunz, Alexandra ; Rack, Philipp ; Lehmann, Daniel (2016):
Teaching Phishing-Security: Which Way is Best?
In: 31st International Conference on ICT Systems Security and Privacy Protection (IFIP SEC), S. 135-149,
Springer, Ghent, Belgium, [Conference item]

Traverso, Giulia ; Demirel, Denise ; Buchmann, Johannes (2016):
Homomorphic Signature Schemes - A survey.
In: SpringerBriefs in Computer Science, Springer, ISBN Softcover 978-3-319-32114-1 - ebook 978-3-319-32115-8,
DOI: 10.1007/978-3-319-32115-8,
[Book]

Volkamer, Melanie ; Renaud, Karen ; Reinheimer, Benjamin (2016):
TORPEDO: TOoltip-poweRed Phishing Email DetectiOn.
In: 31st International Conference on ICT Systems Security and Privacy Protection (IFIP SEC), S. 161-175,
Springer, Ghent, Belgium, [Conference item]

Bernhard, David ; Kulyk, Oksana ; Volkamer, Melanie (2016):
Security Proofs for Participation Privacy and Stronger Verifiability for Helios.
Darmstadt, CRISP, DOI: 10.5445/IR/1000081968,
[Report]

Buchmann, Johannes ; Büscher, Niklas ; Katzenbeisser, Stefan ; Krämer, Juliane ; Micciancio, Daniele ; Siim, Sander ; Vredendaal, Christine van ; Walter, Michael ; Göpfert, Florian (2016):
Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge.
In: ASIAPKC 16 - 3rd ACM International Workshop on ASIA Public-Key Cryptography,
ACM, Xi'an, China, [Conference item]

Buchmann, Johannes ; Göpfert, Florian ; Güneysu, Tim ; Oder, Tobias ; Pöppelmann, Thomas (2016):
High-Performance and Lightweight Lattice-Based Public-Key Encryption.
In: IoTPTS '16 - 2nd ACM International Workshop on IoT Privacy, Trust, and Security,
ACM, Xi'an, China, [Conference item]

Budurushi, Jurlind ; Hilt, Annika ; Volkamer, Melanie (2016):
"E-Mail made in Germany" Untersuchung der Sicherheitsbeurteilung von E-Mail-Nutzern.
In: Datenschutz und Datensicherheit - DuD, 40 (5), S. 300-304. Springer Fachmedien Wiesbaden, DOI: 10.1007/s11623-016-0600-3,
[Article]

Schochlow, Verena ; Neumann, Stephan ; Braun, Kristoffer ; Volkamer, Melanie (2016):
Bewertung der GMX/Mailvelope-Ende-zu-Ende-Verschlüsselung.
5/2016, In: Datenschutz und Datensicherheit, S. 295-299,
DOI: 10.1007/s11623-016-0599-5,
[Conference item]

Akleylek, Sedat ; Bindel, Nina ; Buchmann, Johannes ; Krämer, Juliane ; Marson, Giorgia Azzurra (2016):
An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation.
In: International Conference on Cryptology AFRICACRYPT 2016, S. 10,
Springer, Fes, Morocco, [Conference item]

Buchmann, Johannes ; Demirel, Denise ; Schabhüser, Lucas (2016):
Privately and Publicly Verifiable Computing Techniques.
In: SpringerBriefs in Computer Science, Cham, Springer International Publishing - Springer, ISBN 978-3-319-53797-9,
[Book]

Buchmann, Johannes ; Göpfert, Florian ; Player, Rachel ; Wunderer, Thomas (2016):
On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack.
In: International Conference on Cryptology AFRICACRYPT 2016,
Springer, Fes, Morocco, [Conference item]

Budurushi, Jurlind ; Reanaud, Karen ; Volkamer, Melanie ; Woide, Marcel (2016):
An Investigation into the Usability of Electronic Voting Systems for Complex Elections.
In: Journal of Annals of Telecommunications: The role of telecommunications in electronic voting, 71 (7), S. 309–322. Springer Paris, DOI: 10.1007/s12243-016-0510-2,
[Article]

Marky, Karola ; Gutmann, Andreas ; Rack, Philipp ; Volkamer, Melanie (2016):
Privacy Friendly Apps-Making Developers Aware of Privacy Violations.
1575, In: 1st International Workshop on Innovations in Mobile Privacy and Security, S. 46-48,
CEUR Workshop Proceedings, [Conference item]

Mayer, Christoph (2016):
Implementing a Toolkit for Ring-LWE Cryptography.
TU Darmstadt, [Master thesis]

Rauzy, Pablo ; Kiss, Ágnes ; Krämer, Juliane ; Seifert, Jean-Pierre (2016):
Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT.
In: Constructive Side-Channel Analysis and Secure Design - 7. International Workshop (COSADE'16), S. 111-129,
Springer, DOI: 10.1007/978-3-319-43283-0_7,
[Conference item]

Erbenich, Vanessa (2016):
On the Efficiency of Lattice-Based Encryption.
Darmstadt, Technische Universität, [Bachelor thesis]

Kulyk, Oksana ; Gerber, Paul ; Reinheimer, Benjamin ; Renaud, Karen ; Volkamer, Melanie (2016):
Encouraging Privacy-Aware Smartphone App Installation: What Would the Technically-Adept Do.
In: NDSS Workshop on Usable Security (USEC),
Internet Society., San Diego, California, ISBN 1891562428,
[Conference item]

Kulyk, Oksana ; Volkamer, Melanie (2016):
Efficiency Comparison of Various Approaches in E-Voting Protocols.
In: Financial Cryptography and Data Security. FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Revised Selected Papers, S. 209-233,
Springer, Barbados, [Conference item]

Rieß, Susanne (2016):
An Analysis of Lattice-Based Key Exchange Protocols.
TU Darmstadt, [Master thesis]

Akleylek, Sedat ; Dagdelen, Özgür ; Tok, Zaliha Yüce (2016):
On the Efficiency of Polynomial Multiplication for Lattice-Based Cryptography on GPUs Using CUDA.
In: LNCS, 9540, In: Cryptography and Information Security in the Balkans, S. 155-168,
Springer, Koper, Slovenia, [Conference item]

Appel, Michael ; Pauer, Christof ; Wiesmaier, Alexander (2016):
Sicherheitsaspekte und Vergleich der Blockchifren LED und TEA.
[Report]

Brendel, Jacqueline (2016):
Efficient Proactive Secret Sharing.
Darmstadt, Technische Universität, [Master thesis]

Fleisch, Gilbert (2016):
Towards policy checks on passwords via fully homomorphic encryption.
Darmstadt, Technische Universität, [Master thesis]

Göpfert, Florian (2016):
Securely Instantiating Cryptographic Schemes Based on the Learning with Errors Assumption.
Darmstadt, Technische Universität,
[PhD thesis]

Vigil, Martín ; Demirel, Denise ; Habib, Sheikh Mahbub ; Hauke, Sascha ; Buchmann, Johannes ; Mühlhäuser, Max (2016):
LoT: a Reputation-based Trust System for Long-term Archiving.
In: SECURWARE 2016, S. 262-270,
Thinkmind Digital Library, Nice, France, ISBN 978-1-61208-493-0,
[Conference item]

2015

Schlipf, Mario (2015):
Password Policy Crawler.
Darmstadt, Technische Universität, [Master thesis]

Wolf, Peter ; Barrat, Jordi ; Bolo, Eden ; Bravo, Alejandro ; Krimmer, Robert ; Neumann, Stephan ; Parreño, Al ; Schürmann, Carsten ; Volkamer, Melanie (2015):
Certification of ICTs in Elections.
Stockholm, International Institute for Democracy and Electoral Assistance, ISBN 978-91-7671-028-9,
[Book]

Coudert, Fanny ; Butin, Denis ; Métayer, Daniel Le (2015):
Body-worn Cameras for Police Accountability: Opportunities and Risks.
In: Computer Law & Security Review (CLSR), 31 (6), S. 749-762. [Article]

Dagdelen, Özgür ; Gajek, Sebastian ; Göpfert, Florian (2015):
Learning With Errors in the Exponent.
In: LNCS, In: 18th International Conference on information Security and Cryptology (ICISC) 2015,
Springer, Seoul, Korea, [Conference item]

Krämer, Juliane ; Kiss, Ágnes ; Stüber, Anke (2015):
On the Optimality of Differential Fault Analyses on CLEFIA.
In: 6. International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS'15), S. 181-196,
Springer, DOI: 10.1007/978-3-319-32859-1_15,
[Conference item]

Petzoldt, Albrecht ; Cheng, Ming-Shing ; Yang, Bo-Yin ; Chengdong, Tao ; Ding, Jintai (2015):
Design Principles for HFEv- based Signature Schemes.
In: LNCS, In: ASIACRYPT 2015 - Part I - 21st International Conference on the Theory and Application of Cryptology and Information Security, S. 1-24,
Springer, Auckland, New Zealand, [Conference item]

Neumann, Stephan ; Volkamer, Melanie ; Strube, Moritz ; Jung, Wolfgang ; Brelle, Achim (2015):
Cast-as-intended-Verifizierbarkeit für das Polyas-Internetwahlsystem.
In: Datenschutz und Datensicherheit, 2015 (11), S. 747-752. DOI: 10.1007/s11623-015-0512-7,
[Article]

Ta, Vinh-Thong ; Butin, Denis ; Métayer, Daniel Le (2015):
Formal Accountability for Biometric Surveillance: A Case Study.
In: LNCS, In: Annual Privacy Forum (APF2015),
Springer, Luxembourg, [Conference item]

Zhang, Qi (2015):
Mutant Algebraic Side-Channel Attack.
Darmstadt, Technische Universität, [Master thesis]

Kulyk, Oksana ; Teague, Vanessa ; Volkamer, Melanie
Haenni, Rolf ; Koenig, Reto ; Wikström, Douglas (Hrsg.) (2015):
Extending Helios Towards Private Eligibility Verifiability.
In: E-Voting and Identity: 5th International Conference - VoteID 2015, S. 57-73,
Springer, Bern, Switzerland, [Conference item]

Radeck-Arneth, Stephan ; Milde, Benjamin ; Lange, Arvid ; Gouvea, Evandro ; Radomski, Stefan ; Biemann, Chris ; Mühlhäuser, Max
Král, Pavel ; Matoušek, Václav (Hrsg.) (2015):
Open-Source German Distant Speech Recognition: Corpus and Acoustic Model.
In: Text, Speech and Dialogue. Proceedings of the 18th International Conference TSD2015, Plzen, Czech Republic, S. 480-488,
Springer International Publishing, DOI: 10.1007/978-3-319-24033-6,
[Conference item]

Tao, Chengdong ; Xiang, Hong ; Petzoldt, Albrecht ; Ding, Jintai (2015):
Simple Matrix - A Multivariate Public Key Cryptosystem (MPKC) for Encryption.
In: Finite Fields and Their Applications, (35), S. 352-368. [Article]

Volkamer, Melanie ; Renaud, Karen ; Kulyk, Oksana ; Emeröz, Sinem
Foresti, Sara (Hrsg.) (2015):
A Socio-Technical Investigation into Smartphone Security.
In: Security and Trust Management: 11th International Workshop - STM 2015, S. 265-273,
Springer, [Conference item]

Horsch, Moritz ; Hülsing, Andreas ; Buchmann, Johannes (2015):
PALPAS - PAsswordLess PAssword Synchronization.
In: International Conference on Availability, Reliability and Security (ARES),
Université Paul Sabatier, Toulouse, France, [Conference item]

Kulyk, Oksana ; Neumann, Stephan ; Budurushi, Jurlind ; Volkamer, Melanie ; Haenni, Rolf ; Koenig, Reto ; Bergen, Philemon von (2015):
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.
In: 10th International Conference on Availability, Reliability and Security - ARES 2015, S. 224-229,
IEEE, Toulouse, France, DOI: 10.1109/ARES.2015.75,
[Conference item]

Volkamer, Melanie ; Renaud, Karen ; Braun, Kristoffer ; Canova, Gamze ; Reinheimer, Benjamin
Conti, Mauro ; Schunter, Matthias ; Askoxylakis, Ioannis (Hrsg.) (2015):
Design and Field Evaluation of PassSec: Raising and Sustaining Web Surfer Risk Awareness.
In: Trust and Trustworthy Computing, In: International Conference on Trust and Trustworthy Computing (TRUST), S. 104-121,
Springer, Heraklion, Crete, Greece, ISBN 978-3-319-22845-7,
DOI: 10.1007/978-3-319-22846-4_7,
[Conference item]

Volkamer, Melanie ; Renaud, Karen ; Kulyk, Oksana ; Emeröz, Sinem (2015):
An Investigation into the "Other" Barriers to Adoption of Smartphone Security Precautions (Poor Usability being a Given).
[Report]

Alkim, Erdem ; Bindel, Nina ; Buchmann, Johannes ; Dagdelen, Özgür ; Schwabe, Peter (2015):
TESLA: Tightly-Secure Efficient Signatures from Standard Lattices.
In: Cryptology ePrints Archive, 2015 (755), S. 1-24. International Association for Cryptologic Research (IACR), [Article]

Gagliotti Vigil, Martín Augusto (2015):
Trustworthy and Efficient Protection Schemes for Digital Archiving.
Darmstadt, TU Darmstadt,
[PhD thesis]

Diedrich, Lennart ; Murati, Lulzim ; Wiesmaier, Alexander (2015):
Stream ciphers in the IoT: Grain and Trivium.
[Report]

Kußmaul, Tobias ; Löffler, Johannes ; Wiesmaier, Alexander (2015):
Block ciphers PRESENT and SEA in comparison.
[Report]

Letzkus, Fabian (2015):
NotaryCache: Preventing man-in-the-middle attacks through ubiquitous multi-path probing.
Darmstadt, Technische Universität, [Master thesis]

Loruenser, Thomas ; Rodriguez, Charles Bastos ; Demirel, Denise ; Fischer-Hübner, Simone ; Gross, Thomas R. ; Langer, Thomas ; des Noes, Mathieu ; Poehls, Henrich ; Rozenberg, Boris ; Slamanig, Daniel (2015):
Towards a New Paradigm for Privacy and Security in Cloud Services.
In: CoRR abs/1506.05980 (2015), [Article]

Meuser, Tobias ; Schmidt, Larissa ; Wiesmaier, Alexander (2015):
Comparing Lightweight Hash Functions – PHOTON & Quark.
[Report]

Kulyk, Oksana ; Neumann, Stephan ; Budurushi, Jurlind ; Volkamer, Melanie ; Haenni, Rolf ; Koenig, Reto ; Bergen, Philemon von (2015):
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.
In: Cryptology ePrint Archive, 2015 (558), S. 1-19. International Association for Cryptologic Research (IACR), [Article]

Bansarkhani, Rachid El (2015):
On the Design and Improvement of Lattice-based Cryptosystems.
Darmstadt, Technische Universität,
[PhD thesis]

Cabarcas, Daniel ; Demirel, Denise ; Göpfert, Florian ; Lancrenon, Jean ; Wunderer, Thomas (2015):
An Unconditionally Hiding and Long-Term Binding Post-Quantum Commitment Scheme.
[Report]

Demirel, Denise ; Lancrenon, Jean (2015):
How to Securely Prolong the Computational Bindingness of Pedersen Commitments.
[Report]

Gutmann, Andreas ; Renaud, Karen ; Volkamer, Melanie (2015):
Nudging Bank Account Holders Towards More Secure PIN Management.
4, In: Journal of Internet Technology and Secured Transaction (JITST), S. 380 - 386,
Infonomics Society, DOI: 10.20533/jitst.2046.3723.2015.0049,
[Conference item]

Struck, Patrick (2015):
On the difference between hardness and security: a comparison of lattice-based signature schemes.
TU Darmstadt, [Master thesis]

Alkeilani Alkadri, Nabil (2015):
Post-Quantum Commitment Schemes.
Darmstadt, Technische Universität, [Master thesis]

Arabadzhieva, Vladislava (2015):
Privacy Taxonomy for Verifiable Poll-site Voting Schemes.
Darmstadt, Technische Universität, [Bachelor thesis]

Braun, Kristoffer ; Rack, Philipp (2015):
Shoulder-surfing resistente Authentisierung an mobilen Endgeräten.
Darmstadt, Technische Universität, [Bachelor thesis]

Canova, Gamze ; Volkamer, Melanie ; Bergmann, Clemens ; Borza, Roland ; Reinheimer, Benjamin ; Stockhardt, Simon ; Tenberg, Ralf (2015):
Learn To Spot Phishing URLs with the Android NoPhish App.
In: IFIP Advances in Information and Communication Technology, In: Information Security Education Across the Curriculum - 9th (IFIP), S. 87-100,
Springer, Hamburg, Germany, DOI: 10.1007/978-3-319-18500-2_8,
[Conference item]

Shirazi, Fatemeh ; Goehring, Matthias ; Diaz, Claudia (2015):
Tor Experimentation Tools.
In: International Workshop on Privacy Engineering – IWPE'15, co-located with 36th IEEE symposium on Security and Privacy,
IEEE, FAIRMONT, SAN JOSE, CA, [Conference item]

Vigil, Martín ; Buchmann, Johannes ; Cabarcas, Daniel ; Weinert, Christian ; Wiesmaier, Alexander (2015):
Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: a survey.
In: Computers & Security, 50, S. 16-32. [Article]

Dogan, Ferit (2015):
Design and Implementation of Plug-ins for JCrypTool.
Darmstadt, Technische Universität, [Diplom- oder Magisterarbeit]

Canova, Gamze ; Volkamer, Melanie ; Bergmann, Clemens ; Reinheimer, Benjamin (2015):
NoPhish App Evaluation: Lab and Retention Study.
In: NDSS Workshop on Usable Security 2015,
Internet Society, San Diego, [Conference item]

Bansarkhani, Rachid El ; Buchmann, Johannes (2015):
High Performance Lattice-based CCA-secure Encryption.
In: Cryptology ePrint Archive, S. 20. [Article]

Bansarkhani, Rachid El ; Dagdelen, Özgür ; Buchmann, Johannes (2015):
Augmented Learning with Errors: The Untapped Potential of the Error Term.
In: Financial Cryptography and Data Security - 19th International Conference, FC 2015, Puerto Rico, January 26 - 30, 2015, S. 20,
Springer, Isla Verde, Puerto Rico, [Conference item]

Braun, Johannes (2015):
Maintaining Security and Trust in Large Scale Public Key Infrastructures.
TU Darmstadt,
[PhD thesis]

Butin, Denis ; Gazdag, Stefan-Lukas ; Buchmann, Johannes (2015):
Real-World Post-Quantum Digital Signatures.
In: Cybersecurity & Privacy Innovation Forum (CSP Forum 2015),
Springer CCIS, Brussels, Belgium, [Conference item]

Butin, Denis ; Métayer, Daniel Le (2015):
A Guide to End-to-End Privacy Accountability.
In: 1st International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity (TELERISE 2015),
IEEE, Florence, Italy, [Conference item]

Classen, Jiska ; Braun, Johannes ; Volk, Florian ; Hollick, Matthias ; Buchmann, Johannes ; Mühlhäuser, Max (2015):
A Distributed Reputation System for Certification Authority Trust Management.
In: 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE UbiSafe Symposium),
Helsinki, Finland, [Conference item]

Ganji, Fatemeh ; Krämer, Juliane ; Seifert, Jean-Pierre ; Tajik, Shahin (2015):
Lattice Basis Reduction Attack against Physically Unclonable Functions.
In: 22nd ACM Conference on Computer and Communications Security (CCS 2015),
Denver, Colorado, US, [Conference item]

Geihs, Matthias ; Demirel, Denise ; Buchmann, Johannes (2015):
On the Security of Long-lived Archiving Systems based on the Evidence Record Syntax.
In: Codes, Cryptology and Information Security,
Springer, Mohammed V University, Rabat, Morocco, [Conference item]

Renaud, Karen ; Volkamer, Melanie (2015):
Exploring Mental Models Underlying PIN Management Strategies.
In: World Congress on Internet Security (WorldCIS 2015), S. 18-23,
IEEE, [Conference item]

Schreiner, Steffen (2015):
A Security Architecture for e-Science Grid Computing.
TU Darmstadt,
[PhD thesis]

Zhang, Jiang ; Zhang, Zhenfeng ; Ding, Jintai ; Snook, Michael ; Dagdelen, Özgür (2015):
Authenticated Key Exchange from Ideal Lattices.
In: EUROCRYPT 2015,
Sofia, Bulgaria, [Conference item]

2014

Braun, Johannes ; Volk, Florian ; Classen, Jiska ; Buchmann, Johannes ; Mühlhäuser, Max (2014):
CA Trust Management for the Web PKI.
In: Journal of Computer Security, 22 (6), S. 913-959. IOS Press, ISSN 0926-227X,
DOI: 10.3233/JCS-140509,
[Article]

Charfi, Ahmed (2014):
SAT-solving in Algebraic cryptanalysis.
Darmstadt, Technische Universität, [Bachelor thesis]

Faraon, Montathar ; Stenberg, Georg J. H. ; Budurushi, Jurlind ; Kaipainen, Mauri
Parycek, Peter ; Sachs, Michael ; Skoric, Marko (Hrsg.) (2014):
Positive but skeptical - A study of attitudes towards Internet voting in Sweden.
In: CeDEM Asia 2014: Proceedings of the International Conference for E-Democracy and Open Government, S. 191-205,
Münster: Edition Donau-Universität Krems, Hong Kong, ISBN 978-3-902505-71-2,
[Conference item]

Mayer, Peter ; Volkamer, Melanie ; Kauer, Michaela
Prakash, Atul ; Shyamasundar, Rudrapatna (Hrsg.) (2014):
Authentication Schemes - Comparison and Effective Password Spaces.
In: Lecture notes in computer science, 8880, In: Information Systems Security : International Conference on Information Systems Security (ICISS), S. 204-225,
Berlin, Cham, Springer International Publishing, International Conference on Information Systems Security (ICISS), Hyderabad, India, 16-20.12.2014, ISBN 978-3-319-13840-4,
DOI: 10.1007/978-3-319-13841-1_12,
[Conference item]

Vigil, Martín ; Weinert, Christian ; Demirel, Denise ; Buchmann, Johannes (2014):
An efficient time-stamping solution for long-term digital archiving.
In: IEEE 33rd International Performance Computing and Communications Conference (IPCCC), S. 1-8,
Austin, TX, USA, DOI: 10.1109/PCCC.2014.7017099,
[Conference item]

Canova, Gamze ; Volkamer, Melanie ; Weiler, Simon (2014):
Poster: Password Entering and Transmission Security.
In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, S. 1418-1420,
New York, ACM, ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, Arizona, November 3-7, 2014, ISBN 9781450334297,
DOI: 10.1145/2660267.2662387,
[Conference item]

Horsch, Moritz ; Tuengerthal, Max ; Wich, Tobias (2014):
SAML Privacy-Enhancing Profile.
In: LNI, P-237, In: Open Identity Summit 2014, S. 11-22,
GI, Stuttgart, Germany, [Conference item]

Shirazi, Fatemeh ; Volkamer, Melanie (2014):
What Deters Jane from Preventing Identification and Tracking on the Web?
In: 13th ACM Workshop on Privacy in the Electronic Society (WPES 2014), S. 107-116,
ACM, Scottsdale, Arizona, USA, ISBN 978-1-4503-3148-7,
DOI: 10.1145/2665943.2665963,
[Conference item]

Vieten, Jannik (2014):
Evaluierung des U-LP Verschlüsselungsverfahrens in der Praxis.
TU Darmstadt, [Master thesis]

Braun, Johannes (2014):
Ubiquitous support of multi path probing: Preventing man in the middle attacks on Internet communication.
In: IEEE Conference on Communications and Network Security (IEEE CNS 2014 Poster Session),
San Francisco, USA, [Conference item]

Buchmann, Johannes ; Bischof, Christian ; Dagdelen, Özgür ; Fitzpatrick, Robert ; Göpfert, Florian ; Mariano, Artur (2014):
Nearest Planes in Practice.
In: International Conference on Cryptography and Information security -BalkanCryptSec 2014,
Istanbul, Turkey, [Conference item]

Budurushi, Jurlind ; Renaud, Karen ; Volkamer, Melanie ; Woide, Marcel
Krimmer, Robert ; Volkamer, Melanie (Hrsg.) (2014):
Implementation and Evaluation of the EasyVote Tallying Component and Ballot.
In: 6th International Conference on Electronic Voting (EVOTE), S. 1 - 8,
IEEE, Lochau, ISBN 978-3-200-03697-0,
DOI: 10.1109/EVOTE.2014.7001140,
[Conference item]

Dagdelen, Özgür ; Venturi, Daniele (2014):
A Multi-Party Protocol for Privacy-Preserving Cooperative Linear System of Equations.
In: LNCS, In: BalkancryptSec 2014 - International Conference on Cryptography and Information security, S. 161-172,
Springer, Istanbul, Turkey, ISBN 978-3-319-21356-9,
DOI: 10.1007/978-3-319-21356-9_11,
[Conference item]

Ding, Jintai ; Petzoldt, Albrecht ; Wang, Lih-Chung (2014):
The Cubic Simple Matrix Encryption Scheme.
In: LNCS, In: PQCrypto 2014, S. 76-87,
Springer, Waterloo, Canada, [Conference item]

Kulyk, Oksana ; Feier, Christian ; Köster, Thorben (2014):
Electronic Voting with Fully Distributed Trust and Maximized Flexibility Regarding Ballot Design.
In: 6th International Conference on Electronic Voting - EVOTE 2014, S. 1-10,
IEEE, Lochau, ISBN 978-3-200-03697-0,
DOI: 10.1109/EVOTE.2014.7001142,
[Conference item]

Neumann, Stephan ; Feier, Christian ; Sahin, Perihan ; Fach, Sebastian (2014):
Pretty Understandable Democracy 2.0.
In: 6th International Conference on Electronic Voting (EVOTE), S. 69 - 72,
TUT Press, Lochau, [Conference item]

Schlipf, Mario (2014):
Passwort-Richtlinien.
Darmstadt, Technische Universität, [Bachelor thesis]

Bartsch, Steffen ; Boos, Carina ; Canova, Gamze ; Dyck, Dominic ; Henhapl, Birgit ; Schultheis, Michael ; Volkamer, Melanie
Plödereder, Erhard ; Grunske, Lars ; Schneider, Eric ; Ull, Dominik (Hrsg.) (2014):
Interdisziplinäres Bewertungskonzept für Risiken auf Webseiten.
In: Workshop RiskKom der GI-FGn SECMGT & ECOM auf der Informatik 2014, S. 2069-2078,
Gesellschaft für Informatik, Bonn, [Conference item]

Buchmann, Johannes ; Bansarkhani, Rachid El ; Hauke, Sascha
Brunetti, Gino ; Feld, Thomas ; Heuser, Lutz ; Schnittner, Joachim ; Webel, Christian (Hrsg.) (2014):
Towards Security Solutions for Emergent Business Software.
In: Future Business Software Conference 2012, S. 67-80,
Springer, St. Leon-Rot, Germany, [Conference item]

Budurushi, Jurlind ; Neumann, Stephan ; Shala, Genc ; Volkamer, Melanie
Plödereder, Erhard ; Grunske, Lars ; Schneider, Eric ; Ull, Dominik (Hrsg.) (2014):
Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trail.
In: Lecture Notes in Informatics (LNI), 232, In: INF14 - Workshop: Elektronische Wahlen: Unterstützung der Wahlprozesse mittels Technik, S. 1415-1426,
Köllen Druck+Verlag GmbH, Bonn, Stuttgart, ISBN 978-3-88579-626-8,
[Conference item]

Canova, Gamze ; Volkamer, Melanie ; Bergmann, Clemens ; Borza, Roland
Mauw, Sjouke ; Jensen, Christian Damsgaard (Hrsg.) (2014):
NoPhish: An Anti-Phishing Education App.
In: Lecture Notes in Computer Science, 8743, In: 10th International Workshop on Security and Trust Management in conjunction with ESORICS 2014, S. 188-192,
Springer International Publishing, Wroclaw, Poland, [Conference item]

Conrad, Bernd ; Shirazi, Fatemeh (2014):
Analyzing the Effectiveness of DoS Attacks on Tor.
In: 7th International Conference on Security of Information and Networks (SIN 2014),
Glasgow, UK, [Conference item]

Dagdelen, Özgür ; Bansarkhani, Rachid El ; Göpfert, Florian ; Güneysu, Tim ; Oder, Tobias ; Pöppelmann, Thomas ; Sanchez, Ana Helena ; Schwabe, Peter (2014):
High-speed signatures from standard lattices.
In: Latincrypt 2014,
Florianópolis, Brazil, [Conference item]

Geihs, Matthias ; Cabarcas, Daniel
Aranha, Diego F. ; Menezes, Alfred (Hrsg.) (2014):
Efficient Integer Encoding for Homomorphic Encryption via Ring Isomorphisms.
In: LNCS, In: 3rd International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2014, S. 48-63,
Springer, Florianópolis, Brazil, ISBN 978-3-319-16295-9,
[Conference item]

Neumann, Stephan ; Kulyk, Oksana ; Volkamer, Melanie (2014):
A Usable Android Application Implementing Distributed Cryptography For Election Authorities.
In: 9th International Workshop on Frontiers in Availability, Reliability and Security - FARES 2014, S. 198-207,
IEEE, Fribourg, Switzerland, [Conference item]

Neumann, Stephan ; Olembo, Maina ; Renaud, Karen ; Volkamer, Melanie
Kö, Andrea ; Francesconi, Enrico (Hrsg.) (2014):
Helios Verification: To Alleviate, or to Nominate: Is That The Question, Or Shall We Have Both?
In: Lecture Notes in Computer Science, 8650, In: 3rd International Conference on Electronic Government and the Information Systems Perspective, S. 246-260,
Springer, München, ISBN 978-3-319-10177-4,
[Conference item]

Radeck-Arneth, Stephan ; Biemann, Chris ; Schnelle-Walka, Dirk (2014):
Towards Ambient Search.
In: Proceedings of the LWA 2014 Workshops: KDML, IR, FGWM, Aachen, Germany, 8-10 September 2014, S. 257-259,
Springer, [Conference item]

Riecker, Michael ; Yuan, Dingwen ; Bansarkhani, Rachid El ; Hollick, Matthias (2014):
Patrolling wireless sensor networks: Randomized intrusion detection.
In: 10th ACM Symposium on QoS and Security for Wireless and Mobile Networks, Q2SWinet ’14, S. 61-69,
Montreal, QC, Canada, [Conference item]

Wiesmaier, Alexander ; Braun, Johannes ; Horsch, Moritz (2014):
Method and system for secure access of a first computer to a second computer.
EP 2639997,
[Norm, Patent, Standard]

Conrad, Bernd ; Shirazi, Fatemeh (2014):
A Survey on Tor and I2P.
In: Ninth International Conference on Internet Monitoring and Protection (ICIMP2014),
Paris, France, [Conference item]

Braun, Johannes ; Buchmann, Johannes ; Mullan, Ciaran ; Wiesmaier, Alexander (2014):
Long Term Confidentiality: a Survey.
In: Designs, Codes and Cryptography, 71 (3), S. 459-478. DOI: 10.1007/s10623-012-9747-6,
[Article]

Budurushi, Jurlind ; Stockhardt, Simon ; Woide, Marcel ; Volkamer, Melanie
Tryfonas, Theo ; Askoxylakis, Ioannis (Hrsg.) (2014):
Paper Audit Trails and Voters' Privacy Concerns.
In: LNCS, 8533, In: Human Aspects of Information Security, Privacy and Trust, S. 400-409,
Springer International Publishing Switzerland, Heraklion, Greece, [Conference item]

Meziani, Mohammed (2014):
Designing and Improving Code-based Cryptosystems.
Germany, TU Darmstadt,
[PhD thesis]

Bartsch, Steffen ; Volkamer, Melanie (2014):
Expert Knowledge for Contextualized Warnings.
[Report]

Budurushi, Jurlind ; Volkamer, Melanie
Parycek, Peter ; Edelmann, Noella (Hrsg.) (2014):
Feasibility Analysis of Various Electronic Voting Systems for Complex Elections.
In: International Conference for E-Democracy and Open Government 2014, S. 141-152,
Edition Donau-Universität Krems, Danube University Krems, ISBN 978-3-902505-35-4,
[Conference item]

Cholakov, Kostadin ; Biemann, Chris ; Eckle-Kohler, Judith ; Gurevych, Iryna
Calzolari, Nicoletta ; Choukri, Khalid ; Declerck, Thierry ; Loftsson, Hrafn ; Maegaard, Bente ; Mariani, Joseph ; Moreno, Asuncion ; Odijk, Jan ; Piperidis, Stelios (Hrsg.) (2014):
Lexical Substitution Dataset for German.
In: Proceedings of the 9th International Conference on Language Resources and Evaluation (LREC 2014), S. 1406-1411,
European Language Resources Association (ELRA), [Conference item]

Budurushi, Jurlind ; Jöris, Roman ; Volkamer, Melanie (2014):
Implementing and evaluating a software-independent voting system for polling station elections.
In: Journal of Information Security and Applications, 19 (2), S. 1-10. DOI: 10.1016/j.jisa.2014.03.001,
[Article]

Classen, Jiska (2014):
Reputation Systems for Trust Management in the Web PKI.
Darmstadt, Technische Universität, [Master thesis]

Conrad, Bernd (2014):
Analyzing the Effectiveness of DoS Attacks on Tor.
TU Darmstadt, [Master thesis]

Franke, Daniel (2014):
Risk Simulations for the Web PKI.
Darmstadt, Technische Universität, [Bachelor thesis]

Bergmann, Clemens ; Canova, Gamze (2014):
Design, Implementation and Evaluation of an Anti-Phishing Education App.
Darmstadt, Germany, TU Darmstadt, [Master thesis]

Bartsch, Steffen ; Boos, Carina ; Dyck, Dominic ; Schwarz, Christopher ; Theuerling, Heike ; Henhapl, Birgit ; Volkamer, Melanie (2014):
Unterstützung für ein risikobewusstes Verhalten im Internet.
In: Vielfalt der Informatik, S. 168-171,
Bremen, [Conference item]

Boos, Carina ; Bartsch, Steffen ; Volkamer, Melanie (2014):
Rechtliche und technische Nutzerunterstützung bei der Button-Lösung.
In: Computer und Recht, (2), S. 119-127. DOI: 10.9785/ovs-cr-2014-119,
[Article]

Budurushi, Jurlind ; Woide, Marcel ; Volkamer, Melanie (2014):
Introducing Precautionary Behavior by Temporal Diversion of Voter Attention from Casting to Verifying their Vote.
In: Workshop on Usable Security (USEC),
Internet Society, San Diego, ISBN 1-891562-37-1,
DOI: 10.14722/usec.2014.23037,
[Conference item]

Inel, Miray (2014):
Entwurf und Implementierung von Plug-ins für JCrypTool.
Darmstadt, Technische Universität, [Bachelor thesis]

Olembo, Maina ; Renaud, Karen ; Bartsch, Steffen ; Volkamer, Melanie (2014):
Voter, What Message Will Motivate You to Verify Your Vote?
In: Workshop on Usable Security (USEC),
Internet Society, San Diego, ISBN 1-891562-37-1,
DOI: 10.14722/usec.2014.23038,
[Conference item]

Henning, Maria ; Budurushi, Jurlind ; Volkamer, Melanie (2014):
Öffentlichkeitsgrundsatz und Stimmzettelbelege.
[Report]

Bansarkhani, Rachid El ; Buchmann, Johannes (2014):
LCPR: High Performance Compression Algorithm for Lattice-Based Signatures and Schnorr-like Constructions.
In: IACR Cryptology ePrint Archive 2014: 334,
[Conference item]

Bansarkhani, Rachid El ; Buchmann, Johannes
Pointcheval, David ; Vergnaud, Damien (Hrsg.) (2014):
Towards Lattice Based Sequential Aggregate Signatures.
In: LNCS, In: Progress in Cryptology - AFRICACRYPT 2014 - 7th International Conference on Cryptology in Africa, S. 336-355,
Springer, Marrakesh, Morocco, ISBN 978-3-319-06733-9,
[Conference item]

Buchmann, Johannes ; Neumann, Stephan (2014):
Tauglichkeit von Common Criteria-Schutzprofilen für Internetwahlen in Deutschland.
In: Datenschutz und Datensicherheit - DuD, 38 (2), S. 98-102. Springer Gabler Verlag, [Article]

Dagdelen, Özgür ; Fischlin, Marc (2014):
Intercepting Tokens in Cryptographic Protocols: The Empire Strikes Back in the Clone Wars.
In: ISIT 2014 - IEEE International Symposium on Information Theory,
Honolulu HI USA, [Conference item]

Dagdelen, Özgür ; Venturi, Daniele (2014):
A Second Look at Fischlin’s Transformation.
In: Africacrypt 2014,
Marrakech, Morocco, [Conference item]

Demirel, Denise (2014):
Universally Verifiable Poll-Site Voting Schemes Providing Everlasting Privacy.
TU Darmstadt,
[PhD thesis]

Henning, Maria ; Budurushi, Jurlind ; Volkamer, Melanie (2014):
Elektronsiche Wahlen durch Stimmzettelbelege? Untersuchung möglicher Umsetzungen des Öffentlichkeitsgrundsatzes bei elektronischen Wahlen.
In: MultiMedia und Recht (MMR), S. 154-158. [Article]

Horsch, Moritz ; Derler, David ; Rath, Christof ; Haase, Hans-Martin ; Wich, Tobias (2014):
Open Source für europäische Signaturen.
In: >Datenschutz und Datensicherheit, 38 (4), S. 237-241. DOI: 10.1007/s11623-014-0098-5,
[Article]

Mohamed, Mohamed Saied Emam ; Buchmann, Johannes (2014):
Mutant Differential Fault Analysis of Trivium MDFA.
In: the 17th Annual International Conference on Information Security and Cryptology, ICISC2014, Springer,
[Conference item]

Neumann, Stephan ; Budurushi, Jurlind ; Volkamer, Melanie
Zissis, Dimitrios ; Lekkas, Dimitrios (Hrsg.) (2014):
Analysis of Security and Cryptographic Approaches to Provide Secret and Verifiable Electronic Voting.
In: Design, Development, and Use of Secure Electronic Voting Systems, S. 27-61, IGI Global, [Book section]

Riecker, Michael ; Biedermann, Sebastian ; Bansarkhani, Rachid El ; Hollick, Matthias (2014):
Lightweight Energy Consumption Based Intrusion Detection System for Wireless Sensor Networks.
In: International Journal of Information Security, 14 (2), S. 155-167. Springer, ISSN 1615-5270,
[Article]

Vigil, Martín ; Weinert, Christian ; Braden, Kjell ; Demirel, Denise ; Buchmann, Johannes (2014):
A performance analysis of long-term archiving techniques.
In: IEEE - High Performace Computing and Communications (HPCC 2014), S. 878-889,
Paris, France, [Conference item]

2013

Buchmann, Johannes ; Karatsiolis, Evangelos ; Wiesmaier, Alexander (2013):
Introduction to Public Key Infrastructures.
Springer-Verlag Berlin Heidelberg, ISBN 978-3-642-40656-0,
[Book]

Klos, Christian (2013):
Design and deployment of a public key infrastructure.
TU Darmstadt, [Master thesis]

Albrecht, Martin ; Fitzpatrick, Robert ; Göpfert, Florian (2013):
On the Efficacy of Solving LWE by Reduction to Unique-SVP.
In: ICISC 2013,
Seoul, Korea, [Conference item]

Hühnlein, Detlef ; Schwenk, Jörg ; Wich, Tobias ; Mladenov, Vladislav ; Feldmann, Florian ; Schmölz, Johannes ; Brügger, Bud ; Horsch, Moritz (2013):
Options for integrating eID and SAML.
In: DIM'13 - Proceedings of the 2013 ACM Workshop on Digital Identity Management, S. 85-96,
ACM, Berlin, Germany, ISBN 978-1-4503-2493-9,
DOI: 10.1145/2517881.2517892,
[Conference item]

Volkamer, Melanie ; Renaud, Karen
Fischlin, Marc ; Katzenbeisser, Stefan (Hrsg.) (2013):
Mental Models – General Introduction and Review of Their Application to Human-Centred Security.
In: Lecture Notes in Computer Science, 8260, In: Number Theory and Cryptography, S. 255-280, Springer Berlin Heidelberg, ISBN 978-3-642-42000-9,
DOI: 10.1007/978-3-642-42001-6_18,
[Book section]

Gutmann, Andreas ; Matsuura, Kanta (2013):
The use of linguistics in cryptography and its application to improve the HB protocol.
In: Computer Security Symposium 2013, S. 518-525,
Tokyo, Jōhō Shori Gakkai, Computer Security Symposium 2013, Kagawa, Japan, 21-23 October, 2013, [Conference item]

Weinert, Christian (2013):
Content Integrity System and Notarisation for Long-Term Protection of Data Objects.
TU Darmstadt, [Bachelor thesis]

Braun, Johannes ; Kiefer, Franziskus ; Hülsing, Andreas
Katsikas, Sokratis ; Agudo, Isaac (Hrsg.) (2013):
Revocation & Non-Repudiation: When the first destroys the latter.
In: LNCS, In: Public Key Infrastructures, Services and Applications - EuroPKI 2013, S. 31-46,
Springer Berlin Heidelberg, RHUL, Egham, UK, ISBN 978-3-642-53996-1,
DOI: 10.1007/978-3-642-53997-8_3,
[Conference item]

Braun, Johannes ; Volk, Florian ; Buchmann, Johannes ; Mühlhäuser, Max
Katsikas, Sokatis ; Agudo, Isaac (Hrsg.) (2013):
Trust Views for the Web PKI.
In: LNCS, 8341, In: Public Key Infrastructures, Services and Applications, S. 134-151,
Springer Nature, 10th European Workshopon Public Key Infrastructures, Services and Applications (EuroPKI 2013), Egham, United Kingdom, 12.-13.09.2013, ISBN 978-3-642-53996-1,
[Conference item]

Buchmann, Johannes ; Nebel, Maxi ; Roßnagel, Alexander ; Shirazi, Fatemeh ; Simo, Hervais ; Waidner, Michael
Hildebrandt, Mireille (Hrsg.) (2013):
Personal Information Dashboard: Putting the Individual Back in Control.
In: Digital Enlightenment Yearbook 2013, S. 139-164, Amsterdam, Iso Press, ISBN 978-1-61499-294-3 (print) ; 978-1-61499-295-0 (online),
DOI: 10.3233/978-1-61499-295-0-139,
[Book section]

Neumann, Stephan ; Kahlert, Anna ; Henning, Maria ; Richter, Philipp ; Jonker, Hugo ; Volkamer, Melanie
Wimmer, Maria ; Tambouris, Efthimios ; Macintosh, Ann (Hrsg.) (2013):
Modeling the German Legal Latitude Principles.
In: Lecture Notes in Computer Science, 8075, In: 5th International Conference on eParticipation (ePart 2013), S. 49-56,
Springer, Koblenz, Germany, [Conference item]

Wich, Tobias ; Horsch, Moritz ; Petrautzki, Dirk ; Schmölz, Johannes ; Wieland, Thomas ; Potzernheim, Simon (2013):
An extensible platform for eID, signatures and more.
In: LNI, P-223, In: Open Identity Summit 2013, S. 55-68,
GI, Kloster Banz, Germany, [Conference item]

Yousfi Alaoui, Sidi Mohamed el ; Bansarkhani, Rachid El ; Cayrel, Pierre-Louis ; Hoffmann, Gerhard (2013):
Code based Identification and Signature Schemes in Software.
In: Second International Workshop on Modern Cryptography and Security Engineering - MoCrySen 2013,
University of Regensburg, Regensburg, Germany, [Conference item]

Strenzke, Falko (2013):
Efficiency and Implementation Security of Code-based Cryptosystems.
Darmstadt, TU Darmstadt,
[PhD thesis]

Hülsing, Andreas (2013):
Practical Forward Secure Signatures using Minimal Security Assumptions.
Darmstadt, TU Darmstadt,
[PhD thesis]

Bansarkhani, Rachid El ; Buchmann, Johannes
Lange, Tanja ; Lauter, Kristin ; Lisonek, Petr (Hrsg.) (2013):
Improvement and Efficient Implementation of a Lattice-based Signature Scheme.
In: LNCS, In: Selected Areas in Cryptography 2013 (SAC'13), S. 48-67,
Simon Fraser University, Burnaby, British Columbia, Canada, [Conference item]

Bouyukliev, Iliya ; Bulygin, Stanislav ; Martínez-Moro, Edgar
Bouyukliev, Iliya ; Bulygin, Stanislav ; Martínez-Moro, Edgar (Hrsg.) (2013):
Foreword: computer algebra in coding theory and cryptography.
24, In: Applicable Algebra in Engineering, Communication and Computing, S. 157 - 158, Springer, DOI: 10.1007/s00200-013-0199-7,
[Book section]

Braden, Kjell (2013):
XML Advanced Electronic Signatures and XML Evidence Record Syntax for Long-Term Protection of Data objects.
Darmstadt, Technische Universität, [Bachelor thesis]

Gleser, Michael (2013):
Policy-basierter Vergleich von Zertifizierungspraktiken innerhalb der Web-PKI.
Darmstadt, Technische Universität, [Bachelor thesis]

Petzoldt, Albrecht ; Bulygin, Stanislav ; Buchmann, Johannes (2013):
A multivariate based threshold ring signature scheme.
In: Applicable Algebra in Engineering, Communication and Computing, 24 (3 - 4), S. 255 - 275. DOI: 10.1007/s00200-013-0190-3,
[Article]

Rynkowski, Gregor (2013):
Individuell angepasstes Vertrauen in die Web-PKI: Eine Analyse des Einsparungspotentials an vertrauenswürdigen CAs.
Darmstadt, Technische Universität, [Bachelor thesis]

Bartsch, Steffen ; Berger, Bernhard ; Bunke, Michaela ; Sohr, Karsten
Pernul, Günther ; Sandhu, Ravi (Hrsg.) (2013):
The Transitivity-of-Trust Problem in Android Application Interaction.
In: 8th International Conference on Availability, Reliability and Security (ARES 2013), S. 291 - 296,
IEEE, University of Surrey, Guildford, UK, [Conference item]

Bernhard, David ; Neumann, Stephan ; Volkamer, Melanie
Schneider, Steve ; Heather, James ; Teague, Vanessa (Hrsg.) (2013):
Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs.
In: Lecture Notes in Computer Science, 7985, In: 4th International Conference on e-Voting and Identity (VoteID13), S. 176 - 192,
Springer, University of Surrey, Guildford, UK, [Conference item]

Budurushi, Jurlind ; Henning, Maria ; Volkamer, Melanie
Schneider, Steve ; Heather, James ; Teague, Vanessa (Hrsg.) (2013):
Vote Casting in Any Preferred Constituency: A New Voting Channel.
In: Lecture Notes in Computer Science, 7985, In: 4th International Conference on e-Voting and Identity (VoteID13), S. 61-75,
Springer, University of Surrey, Guildford, UK, [Conference item]

Budurushi, Jurlind ; Neumann, Stephan ; Olembo, Maina ; Volkamer, Melanie
Pernul, Günther ; Sandhu, Ravi (Hrsg.) (2013):
Pretty Understandable Democracy - A Secure and Understandable Internet Voting Scheme.
In: 8th International Conference on Availability, Reliability and Security (AReS 2013), S. 198-207,
IEEE, University of Regensburg, Germany, [Conference item]

Hamann, Tobias (2013):
The BKZ Simulation Algorithm.
Tu Darmstadt, [Master thesis]

Neumann, Stephan ; Kulyk, Oksana ; Murati, Lulzim ; Volkamer, Melanie (2013):
Towards a Practical Mobile Application for Election Authorities (Demo).
In: 4th International Conference on e-Voting and Identity (VoteID13),
[Conference item]

Olembo, Maina ; Bartsch, Steffen ; Volkamer, Melanie
Schneider, Steve ; Heather, James ; Teague, Vanessa (Hrsg.) (2013):
Mental Models of Verifiability in Voting.
In: Lecture Notes in Computer Science, 7985, In: 4th International Conference on e-Voting and Identity (VoteID13), S. 142 - 155,
Springer, University of Surrey, Guildford, UK, [Conference item]

Petzoldt, Albrecht (2013):
Selecting and Reducing Key Sizes for Multivariate Cryptography.
Darmstadt, Germany, tuprints, TU Darmstadt,
[PhD thesis]

Vigil, Martín ; Cabarcas, Daniel ; Huang, Jingwei ; Buchmann, Johannes (2013):
Assessing Trust in the Long-Term Protection of Documents.
In: 18th IEEE Symposium on Computers and Communications (IEEE ISCC 2013), S. 185-191,
Split, Croatia, [Conference item]

Yousfi Alaoui, Sidi Mohamed el (2013):
Code-based Identification and Signature Schemes.
Darmstadt, TU Darmstadt,
[PhD thesis]

Buchmann, Johannes (Hrsg.) (2013):
Internet Privacy: Options for adequate realization.
Berlin, Heidelberg, Springer Vieweg, ISBN 978-3-642-37912-3,
[Book]

Bartsch, Steffen ; Volkamer, Melanie ; Theuerling, Heike ; Karayumak, Fatih
Huth, Michael (Hrsg.) (2013):
Contextualized Web warnings, and how they cause distrust.
In: Trust and Trustworthy Computing (TRUST 2013), S. 205-222,
Springer, TRUST 2013, London, UK, 17. - 19. Juni 2013, [Conference item]

Geihs, Matthias (2013):
Evaluation of homomorphic encryption for machine learning.
Darmstadt, Technische Universität, [Bachelor thesis]

Petzoldt, Albrecht ; Bulygin, Stanislav ; Buchmann, Johannes
Gaborit, Philippe (Hrsg.) (2013):
Fast Verification for Improved Versions of the UOV and Rainbow Signature Schemes.
In: LNCS, In: Fifth International Conference on Post-Quantum Cryptography - PQCrypto 2013, S. 188-202,
Springer, Limoges, France, ISBN 978-3-642-38615-2,
[Conference item]

Strenzke, Falko (2013):
Timing Attacks against the Syndrome Inversion in Code-Based Cryptosystems.
In: LNCS, In: Fifth International Conference on Post-Quantum Cryptography - PQCrypto 2013, S. 217-230,
Springer, Limoges, France, [Conference item]

Volkamer, Melanie ; Stockhardt, Simon ; Bartsch, Steffen ; Kauer, Michaela (2013):
Adopting the CMU/APWG Anti-Phishing Landing Page idea for Germany.
In: 3rd Workshop on Socio-Technical Aspects in Security and Trust (STAST), 2013, S. 46-52,
IEEE Digital Library, New Orleans, LA, USA, DOI: 10.1109/STAST.2013.12,
[Conference item]

Baumöller, Claas ; Schaaf, Joachim ; Horsch, Moritz ; Wiesmaier, Alexander ; Braun, Johannes (2013):
Identification element-based authentication and identification with decentralised service use.
EP 2600270,
[Norm, Patent, Standard]

Braun, Johannes ; Horsch, Moritz ; Hülsing, Andreas (2013):
Effiziente Umsetzung des Kettenmodells unter Verwendung vorwärtssicherer Signaturverfahren.
In: Informationssicherheit stärken - Vertrauen in die Zukunft schaffen. Tagungsband zum 13. Deutschen IT-Sicherheitskongress, S. 347-359,
SecuMedia Verlag, Bonn, ISBN 978-3-922746-95-9,
[Conference item]

Buchmann, Johannes ; Demirel, Denise ; Graaf, Jeroen van de
Sadeghi, Ahmad-Reza (Hrsg.) (2013):
Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy.
In: LNCS, In: Financial Cryptography and Data Security: 17th International Conference, 2013, S. 197-204,
Springer, ISBN 978-3-642-39883-4,
[Conference item]

Horsch, Moritz ; Hühnlein, Detlef ; Breitenstrom, Christian ; Wieland, Thomas ; Wiesmaier, Alexander ; Biallowons, Benedikt ; Petrautzki, Dirk ; Potzernheim, Simon ; Schmölz, Johannes ; Wesner, Alexander ; Wich, Tobias (2013):
Die Open eCard App für mehr Transparenz, Vertrauen und Benutzerfreundlichkeit beim elektronischen Identitätsnachweis.
In: Informationssicherheit stärken - Vertrauen in die Zukunft schaffen. Tagungsband zum 13. Deutschen IT-Sicherheitskongress, S. 391-403,
SecuMedia Verlag, ISBN 978-3-922746-95-9,
[Conference item]

Hülsing, Andreas ; Braun, Johannes (2013):
Langzeitsichere Signaturen durch den Einsatz hashbasierter Signaturverfahren.
In: Informationssicherheit stärken - Vertrauen in die Zukunft schaffen. Tagungsband zum 13. Deutschen IT-Sicherheitskongress, S. 565-576,
SecuMedia Verlag, Bonn, ISBN 978-3-922746-95-9,
[Conference item]

Volkamer, Melanie ; Bartsch, Steffen ; Kauer, Michaela
University, Plymouth (Hrsg.) (2013):
Contextualized Security Interventions in Password Transmission Scenarios.
In: European Information Security Multi-Conference (EISMC 2013), S. 12-22,
Lisbon, Spain, [Conference item]

Cabarcas, Daniel ; Göpfert, Florian ; Weiden, Patrick (2013):
Provably Secure LWE-Encryption with Uniform Secret.
In: Cryptology ePrint Archive, 2013 (164), S. 1-20. International Association for Cryptologic Research (IACR), [Article]

Schnelle-Walka, Dirk ; Radomski, Stefan ; Radeck-Arneth, Stephan (2013):
Probabilistic Dialog Management.
In: Proceedings of VikingPLoP 2013 Conference, S. 114-125,
[Conference item]

Weiden, Patrick ; Hülsing, Andreas ; Cabarcas, Daniel ; Buchmann, Johannes (2013):
Instantiating Treeless Signature Schemes.
In: Cryptology ePrint Archive, 2013 (65), S. 1-18. International Association for Cryptologic Research (IACR), [Article]

Bulygin, Stanislav ; Walter, Michael ; Buchmann, Johannes
Dawson, E. (Hrsg.) (2013):
Many weak keys for PRINTcipher: fast key recovery and countermeasures.
In: Lecture Notes in Computer Science, 7779, In: RSA Conference Cryptographer's Track (CT-RSA 2013), S. 189–206,
Springer, [Conference item]

Neumann, Stephan ; Kahlert, Anna ; Henning, Maria ; Jonker, Hugo ; Volkamer, Melanie (2013):
Informatische Modellierung der Prinzipien des gesetzlichen Gestaltungsspielraums im Hinblick auf Wahlsysteme.
In: Abstraction and Application: Proceedings of the 16th International Legal Informatics Symposium (IRIS 2013), S. 277-284,
Salzburg, Austria, [Conference item]

Olembo, Maina ; Volkamer, Melanie
Saeed, Saqib ; Reddick, Christopher (Hrsg.) (2013):
E-Voting System Usability: Lessons for Interface Design, User Studies, and Usability Criteria.
S. 172 - 201, IGI Global, ISBN 978-1-4666-3640-8,
DOI: 10.4018/978-1-4666-3640-8.ch011,
[Book section]

Braun, Johannes ; Wiesmaier, Alexander ; Buchmann, Johannes
Sprague, Ralph H. (Hrsg.) (2013):
On the Security of Encrypted Secret Sharing.
In: 46th Hawaii International Conference on Systems Science (HICSS-46), S. 4966-4976,
IEEE Computer Society, Grand Wailea, Maui, Hawaii, ISBN 978-0-7695-4892-0,
DOI: 10.1109/HICSS.2013.426,
[Conference item]

Wälde, Julian (2013):
Algebraic Cryptanalysis of Round Reduced Versions of CSA and the LED Family of Block Ciphers.
Darmstadt, Technische Universität, [Bachelor thesis]

Gurevych, Iryna ; Biemann, Chris ; Zesch, Torsten (Hrsg.) (2013):
Language Processing and Knowledge in the Web: Proceedings of the 25th International Conference of the German Society for Computational Linguistics (GSCL 2013).
Springer, Darmstadt, Germany, ISBN 978-3-642-40721-5,
DOI: 10.1007/978-3-642-40722-2,
[Conference item]

Braun, Johannes ; Rynkowski, Gregor (2013):
The Potential of an Individualized Set of trusted CAs: Defending against CA Failures in the Web PKI.
In: Social Computing (SocialCom) - PASSAT2013, S. 600-605,
Washington D.C., USA, DOI: 10.1109/SocialCom.2013.90,
[Conference item]

Buchmann, Johannes ; Cabarcas, Daniel ; Göpfert, Florian ; Hülsing, Andreas ; Weiden, Patrick
Lange, Tanja ; Lauter, Kristin ; Lisonek, Petr (Hrsg.) (2013):
Discrete Ziggurat: A Time-Memory Trade-off for Sampling from a Gaussian Distribution over the Integers.
In: LNCS, In: Selected Areas in Cryptography 2013 (SAC'13), S. 402-417,
Springer, Simon Fraser University, Burnaby, British Columbia, Canada, [Conference item]

Buchmann, Johannes ; Dahmen, Erik ; Ereth, Sarah ; Hülsing, Andreas ; Rückert, Markus (2013):
On the security of the Winternitz one-time signature scheme.
In: International Journal of Applied Cryptography, 3 (1), S. 84-96. [Article]

Bulygin, Stanislav ; Walter, Michael ; Buchmann, Johannes (2013):
Full analysis of PRINTcipher with respect to invariant subspace attack: efficient key recovery and countermeasures.
In: Designs, Codes, and Cryptography 73(3), S. 997-1022 (2014). DOI: 10.1007/s10623-013-9840-5,
[Article]

Dagdelen, Özgür ; Fischlin, Marc ; Gagliardoni, Tommaso (2013):
The Fiat-Shamir Transformation in the Quantum World.
In: ASIACRYPT 2013,
Bangalore, India, [Conference item]

Demirel, Denise ; Henning, Maria ; Graaf, Jeroen van de ; Ryan, Peter Y. A. ; Buchmann, Johannes
Heather, James ; Schneider, Steve ; Teague, Vanessa (Hrsg.) (2013):
Prêt à Voter Providing Everlasting Privacy.
In: LNCS, In: VoteID 2013: The 4th International Conference on e-Voting and Identity, 2013, S. 156-175,
Springer, University of Surrey, Guildford, UK, [Conference item]

Egert, Rolf (2013):
Lattice-based Signatures.
TU Darmstadt, [Master thesis]

Fontein, Felix ; Schneider, Michael ; Wagner, Urs (2013):
A Polynomial Time Version of LLL With Deep Insertions.
In: International Workshop on Coding and Cryptography - WCC 2013,
Bergen (Norway), [Conference item]

Guo, Sheng (2013):
Integration von vorwärtssicheren Signaturverfahren in die CA Infrastruktur.
[Report]

Horsch, Moritz ; Hühnlein, Detlef ; Lehmann, Anja ; Schmölz, Johannes ; Wich, Tobias (2013):
Authentisierung mit der Open eCard App.
In: >Datenschutz und Datensicherheit, 37 (8), S. 507-511. DOI: 10.1007/s11623-013-0208-9,
[Article]

Hülsing, Andreas (2013):
WOTS+ - Shorter Signatures for Hash-Based Signature Schemes.
In: Africa Crypt 2013,
Cairo, Egypt, [Conference item]

Hülsing, Andreas ; Rausch, L. ; Buchmann, Johannes (2013):
Optimal Parameters for XMSS^MT.
In: LNCS, In: MoCrySEn 2013, S. 194-208, Springer, [Book section]

Hülsing, Andreas ; Rausch, L. ; Buchmann, Johannes (2013):
Optimal parameters for XMSS-MT.
In: Security Engineering and Intelligence Informatics : CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013, Proceedings, S. 194-208,
[Conference item]

Mohamed, Mohamed Saied Emam ; Bulygin, Stanislav ; Zohner, Michael ; Heuser, Annelie ; Walter, Michael ; Buchmann, Johannes (2013):
Improved Algebraic Side-Channel Attack on AES.
In: Journal of Cryptographic Engineering, S. 139-156. [Article]

Nie, Xuyun ; Petzoldt, Albrecht ; Buchmann, Johannes (2013):
Cryptanalysis of 2-layer Nonlinear Piece In Hand Method.
In: LNCS, In: Second International Workshop on Modern Cryptography and Security Engineering - MoCrySen 2013, S. 91-104,
Regensburg, Germany, [Conference item]

Nie, Xuyun ; Xu, Zhaohu ; Buchmann, Johannes
Gaborit, Philippe (Hrsg.) (2013):
Cryptanalysis of Hash-based Tamed Transformation and Minus Signature Scheme.
In: LNCS, In: Fifth International Conference on Post-Quantum Cryptography - PQCrypto 2013, S. 155-164,
Springer, Limoges, France, [Conference item]

Olembo, Maina ; Stockhardt, Simon ; Hülsing, Andreas ; Volkamer, Melanie
University, Plymouth (Hrsg.) (2013):
Developing and Testing a Visual Hash Scheme.
In: European Information Security Multi-Conference (EISMC 2013), S. 91-100,
[Conference item]

Schneider, Michael (2013):
Sieving for Shortest Vectors in Ideal Lattices.
In: Africa Crypt 2013,
Cairo, Egypt, [Conference item]

Shirazi, Fatemeh ; Diaz, Claudia ; Mullan, Ciaran ; Wright, Joss ; Buchmann, Johannes (2013):
Towards Measuring Resilience in Anonymous Communication Networks.
In: HotPETs 2013, [Article]

Werlang, Felipe ; Vigil, Martín ; Custódio, Ricardo Felipe (2013):
A User-Centric Digital Signature Scheme.
In: EuroPKI 2013,
[Conference item]

2012

Bansarkhani, Rachid El ; Cabarcas, Daniel ; Kuo, Po-Chun ; Schmidt, Patrick ; Schneider, Michael (2012):
A Selection of Recent lattice-Based Signature and Encryption Schemes.
In: Tatra Mountains Mathematical Publications, 53, S. 81-102. [Article]

Braun, Johannes ; Hülsing, Andreas ; Wiesmaier, Alexander (2012):
Schlanke Infrastrukturen für den digitalen Rechtsverkehr - Vorwärtssichere Verfahren für qualifizierte elektronische Signaturen.
[Report]

Kreutzer, Michael ; Waidner, Michael ; Buchmann, Johannes (2012):
IT-Sicherheitsforschung in Darmstadt - von den Grundlagen bis zur Anwendung.
In: Praxis der Informationsverarbeitung und Kommunikation, 35 (4), S. 305-308. [Article]

Petzoldt, Albrecht ; Bulygin, Stanislav (2012):
Linear Recurring Sequences for the UOV Key Generation Revisited.
In: Lecture Notes in Computer Science, In: The 15th Annual International Conference on Information Security and Cryptology (ICISC 2012), S. 441-455,
Springer 2013, Seoul, Korea, ISBN 978-3-642-37681-8,
[Conference item]

Vigil, Martín ; Custódio, Ricardo Felipe (2012):
Cleaning up the PKI for Long-term Signatures.
In: 12th SBSeg 2012, Brazilian Symposium on Information and Computer System Security, S. 140-153,
Brazilian Computer Society, Curitiba PR, Brazil, [Conference item]

Walter, Michael ; Bulygin, Stanislav ; Buchmann, Johannes
Kutylowski, Miroslaw ; Yung, Moti (Hrsg.) (2012):
Optimizing Guessing Strategies for Algebraic Cryptanalysis with Applications to EPCBC.
In: Lecture Notes in Computer Science, 7763, In: The 8th China International Conference on Information Security and Cryptology (Inscrypt 2012), S. 175-197,
Springer, Beijing, China, ISBN 978-3-642-38518-6,
[Conference item]

Braun, Johannes ; Horsch, Moritz ; Wiesmaier, Alexander
Ryan, Mark ; Smyth, Ben ; Wang, Guilin (Hrsg.) (2012):
iPIN and mTAN for secure eID applications.
In: LNCS, In: 8th International Conference on Information Security Practice and Experience (ISPEC 2012), S. 259-276,
Springer, Hangzhou, China, ISBN 978-3-642-29100-5,
DOI: 10.1007/978-3-642-29101-2_18,
[Conference item]

Hornschuch, Marian (2012):
Multivariate-based identification and signature schemes with additional properties.
Darmstadt, Technische Universität, [Bachelor thesis]

Horsch, Moritz ; Braun, Johannes ; Wiesmaier, Alexander (2012):
Decoupling Authentication from the Usage of Services.
[Report]

Olembo, Maina ; Volkamer, Melanie (2012):
Recommendations For E-Voting System Usability: Lessons From Literature For Interface Design, User Studies, and Usability Criteria.
[Report]

Schläpfer, Michael ; Volkamer, Melanie (2012):
The Secure Platform Problem - Taxonomy and Analysis of Existing Proposals to Address this Problem.
In: ACM, In: Proceedings of the 6th International Conference on Theory and Practice of Electronic Governance, S. 410-418,
Albany, NY, USA, ISBN 978-1-4503-1200-4,
DOI: 10.1145/2463728.2463807,
[Conference item]

Braun, Johannes ; Hülsing, Andreas ; Wiesmaier, Alexander ; Vigil, Martín ; Buchmann, Johannes
De Capitani di Vimercati, Sabrina ; Mitchell, Chris (Hrsg.) (2012):
How to avoid the Breakdown of Public Key Infrastructures - Forward Secure Signatures for Certificate Authorities.
In: LNCS, In: Public Key Infrastructures, Services and Applications - EuroPKI 2012, S. 53-68,
Springer, Pisa, Italy, ISBN 978-3-642-40011-7,
[Conference item]

Demirel, Denise ; Henning, Maria (2012):
Legal Analysis of Privacy Weaknesses in Poll-Site eVoting Systems.
In: Jusletter IT - Die Zeitschrift für IT und Recht, Editions Weblaw, [Article]

Göttert, Norman ; Feller, Thomas ; Schneider, Michael ; Huss, Sorin ; Buchmann, Johannes
Prouff, Emmanuel ; Schaumont, Patrick (Hrsg.) (2012):
On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes.
In: LNCS, In: Workshop on Cryptographic Hardware and Embedded Systems (CHES 2012), S. 512-529,
Springer, Leuven, Belgium, ISBN 978-3-642-33026-1,
[Conference item]

Kelbert, Florian ; Shirazi, Fatemeh ; Simo, Hervais ; Wüchner, Tobias ; Buchmann, Johannes ; Pretschner, Alexander ; Waidner, Michael
Buchmann, Johannes (Hrsg.) (2012):
State of Online Privacy: A Technical Perspective.
In: Internet Privacy. Eine multidisziplinäre Bestandsaufnahme/ A multidisciplinary analysis (acatech STUDIE), S. 189-279, Springer Verlag Heidelberg, ISBN 978-3-642-31942-6,
[Book section]

Vigil, Martín ; Moecke, Cristian Thiago ; Custódio, Ricardo Felipe ; Volkamer, Melanie
De Capitani di Vimercati, Sabrina ; Mitchell, Chris (Hrsg.) (2012):
The Notary Based PKI -- A Lightweight PKI for Long-term Signatures on Documents.
In: LNCS, In: EuroPKI 2012, September 13-14, S. 85-97,
Springer, Pisa, Italy, ISBN 978-3-642-40011-7,
[Conference item]

Cayrel, Pierre-Louis ; Yousfi Alaoui, Sidi Mohamed el ; Véron, Pascal ; Hoffmann, Gerhard (2012):
An improved threshold ring signature scheme based on error correcting codes.
In: Arithmetic of Finite Fields : 4th International Workshop, WAIFI 2012, Bochum, Germany, July 16-19, 2012, Proceedings, S. 45 - 63,
[Conference item]

Demirel, Denise ; Graaf, Jeroen van de ; Araújo, Roberto (2012):
Improving Helios with Everlasting Privacy Towards the Public.
In: Electronic Voting Technology Workshop / Workshop on Trustworthy Elections - EVT/WOTE 2012,
Bellevue, WA, [Conference item]

Hülsing, Andreas ; Busold, Christoph ; Buchmann, Johannes
Knudsen, Lars ; Wu, Huapeng (Hrsg.) (2012):
Forward Secure Signatures on Smart Cards.
In: LNCS, In: SAC2012 - Conference on Selected Areas in Cryptography, S. 66-80,
Springer Berlin Heidelberg, Windsor, Canada, ISBN 978-3-642-35998-9,
DOI: 10.1007/978-3-642-35999-6_5,
[Conference item]

Neumann, Stephan ; Volkamer, Melanie (2012):
Civitas and the Real World: Problems and Solutions from a Practical Point of View.
In: 7th International Conference on Availability, Reliability and Security (ARES), S. 180-185,
IEEE, Prague, Czech Republic, ISBN 978-1-4673-2244-7,
DOI: 10.1109/ARES.2012.75,
[Conference item]

Schreiner, Steffen ; Grigoras, Costin ; Grigoras, Alina ; Betev, Latchezar ; Buchmann, Johannes (2012):
A Grid security architecture for AliEn.
In: Proceedings of Science (PoS), ISGC2012:027, International Symposium on Grids & Clouds (ISGC) 2012,
Taipei, Taiwan, [Conference item]

Niebuhr, Robert (2012):
Attacking and Defending Code-based Cryptosystems.
TU Darmstadt,
[PhD thesis]

Kiefer, Franziskus ; Wiesmaier, Alexander ; Fritz, Christian (2012):
Practical Security in E-Mail Applications.
In: The 2012 International Conference on Security and Management (SAM’12),
Las Vegas, USA, [Conference item]

Olembo, Maina ; Kahlert, Anna ; Neumann, Stephan ; Volkamer, Melanie
Kripp, Melanie J ; Volkamer, Melanie ; Grimm, Rüdiger (Hrsg.) (2012):
Partial Verifiability in POLYAS for the GI Elections.
In: LNI - Lecture Notes in Informatics, 205, In: 5th International Conference on Electronic Voting 2012 (EVOTE2012), S. 95-109,
Gesellschaft für Informatik, Castle Hofen, Bregenz, Austria, ISBN 978-3-88579-299-4,
[Conference item]

Nickel, Claudia (2012):
Accelerometer-based Biometric Gait Recognition for Authentication on Smartphones.
TU Darmstadt,
[PhD thesis]

Bär, Daniel ; Biemann, Chris ; Gurevych, Iryna ; Zesch, Torsten (2012):
UKP: Computing Semantic Textual Similarity by Combining Multiple Content Similarity Measures.
In: Proceedings of the 6th International Workshop on Semantic Evaluation, held in conjunction with the 1st Joint Conference on Lexical and Computational Semantics, S. 435-440,
[Conference item]

Moecke, Cristian Thiago ; Volkamer, Melanie (2012):
Usable Secure Email Communications - Criteria and evaluation of existing approaches.
In: Information and Computer Security, S. 75-85. DOI: 10.1108/09685221311314419,
[Article]

Mohamed, Mohamed Saied Emam ; Bulygin, Stanislav ; Zohner, Michael ; Heuser, Annelie ; Walter, Michael ; Buchmann, Johannes (2012):
Improved Algebraic Side-Channel Attack on AES.
In: 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, S. 146 - 151,
IEEE, ISBN 978-1-4673-2341-3,
DOI: 10.1109/HST.2012.6224335,
[Conference item]

Niebuhr, Robert ; Meziani, Mohammed ; Bulygin, Stanislav ; Buchmann, Johannes (2012):
Selecting Parameters for Secure McEliece-based Cryptosystems.
In: International Journal of Information Security, 11 (3), S. 137-147. [Article]

Tews, Erik (2012):
DECT Security Analysis.
Darmstadt, TU Darmstadt,
[PhD thesis]

Fischlin, Marc ; Buchmann, Johannes ; Manulis, Mark (Hrsg.) (2012):
Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography.
Springer, ISBN 978-3-642-30056-1,
DOI: 10.1007/978-3-642-30057-8,
[Conference item]

Bartsch, Steffen (2012):
Policy Override in Practice: Model, Evaluation, and Decision Support.
In: Security and Communication Networks, DOI: 10.1002/sec.547,
[Article]

Bartsch, Steffen ; Sasse, Angela (2012):
How Users Bypass Access Control and Why: The Impact of Authorization Problems on Individuals and the Organization.
(RN/12/06), [Report]

Braun, Johannes ; Buchmann, Johannes
Levi, Albert ; Badra, Mohamad ; Cesana, Matteo ; Ghassemian, Mona ; Jabeur, Nafaa ; Klonowski, Marek ; Mana, Antonio ; Sargento, Susana ; Zeadally, Sherali (Hrsg.) (2012):
Perfect Confidentiality Network - A solution for information theoretically secure key agreement.
In: 5th IFIP International Conference on New Technologies, Mobility & Security (NTMS) 2012, S. 1-5,
IEEE, Istanbul, Turkey, ISBN 978-1-4673-0229-6,
DOI: 10.1109/NTMS.2012.6208676,
[Conference item]

Neumann, Stephan ; Volkamer, Melanie (2012):
Formal Treatment of Distributed Trust in Electronic Voting.
ICIMP 2012, The Seventh I, In: The Seventh International Conference on Internet Monitoring and Protection (ICIMP 2012), S. 30-39,
ThinkMind Digital Library, Stuttgart. Germany, ISBN 978-1-61208-201-1,
[Conference item]

Busold, Christoph (2012):
Hash-based Signatures on Smart Cards.
TU Darmstadt, [Master thesis]

Walter, Michael (2012):
Algebraic methods in analyzing lightweight cryptographic symmetric primitives.
TU Darmstadt, [Master thesis]

Kauer, Michaela ; Pfeiffer, Thomas ; Volkamer, Melanie ; Theuerling, Heike ; Bruder, Ralph
Suri, Neeraj ; Waidner, Michael (Hrsg.) (2012):
It is not about the design – it is about the content! Making warnings more efficient by communicating risks appropriately.
In: LNI, 195, In: Sicherheit, S. 187-198,
GI, Darmstadt, Germany, ISBN 978-3-88579-289-5,
[Conference item]

Bulygin, Stanislav ; Walter, Michael (2012):
Study of the invariant coset attack on PRINTcipher: more weak keys with practical key recovery.
(2012/085), [Report]

Hülsing, Andreas ; Petzoldt, Albrecht ; Schneider, Michael ; Yousfi Alaoui, Sidi Mohamed el
Waldmann, Ulrich (Hrsg.) (2012):
Post-Quantum Signaturverfahren Heute.
In: 22. SIT-Smartcard Workshop 2012,
Fraunhofer Verlag Stuttgart, ISBN 978-3-8396-0347-5,
[Conference item]

Buchmann, Johannes (Hrsg.) (2012):
Internet Privacy - Eine multidisziplinäre Bestandsaufnahme - A multidisciplinary analysis.
Berlin, Springer Verlag, ISBN 978-3-642-31942-6,
[Book]

Bansarkhani, Rachid El ; Meziani, Mohammed (2012):
An Efficient Lattice-based Secret Sharing Construction.
In: LNCS, In: WISTP - Workshop in Information Security Theory and Practice 2012,
Springer, London, UK, [Conference item]

Bartsch, Steffen ; Sasse, Angela (2012):
How Users Bypass Access Control – and Why: The Impact of Authorization Problems on Individuals and the Organization.
In: Proceedings of the 21st European Conference on Information Systems (ECIS 2013),
London, UK, [Conference item]

Bartsch, Steffen ; Sasse, Angela
Ossowski, Sascha ; Lecca, Paola (Hrsg.) (2012):
Guiding Decisions on Authorization Policies: A Participatory Approach to Decision Support.
In: SAC '12, In: Proceedings of the 27th Annual ACM Symposium on Applied Computing, S. 1502-1507,
ACM, Trento, Italy, ISBN 978-1-4503-0857-1,
DOI: 10.1145/2245276.2232015,
[Conference item]

Bartsch, Steffen ; Sohr, Karsten ; Bunke, Michaela ; Hofrichter, Oliver ; Berger, Bernhard (2012):
The Transitivity of Trust Problem in the Interaction of Android Applications.
(64-2012), ISBN 978-0-7695-5008-4,
DOI: 10.1109/ARES.2013.39,
[Report]

Fehr, Victoria (2012):
Sophisticated Public-Key Encryption.
Darmstadt, Technische Universität, [Bachelor thesis]

Göttert, Norman (2012):
Hardware and Software Implementation of an LWE-Based Encryption Scheme.
Darmstadt, Technische Universität, [Bachelor thesis]

Henning, Maria ; Demirel, Denise ; Volkamer, Melanie (2012):
Öffentlichkeit vs. Verifizierbarkeit – Inwieweit erfüllt mathematische Verifizierbarkeit den Grundsatz der Öffentlichkeit der Wahl.
In: Proceedings of the 15th International Legal Informatics Symposium (IRIS 2012), S. 213-220,
Salzburg, Austria, [Conference item]

Horsch, Moritz ; Braun, Johannes ; Wiesmaier, Alexander ; Schaaf, Joachim ; Baumöller, Claas (2012):
Verteilte Dienstnutzung mit dem neuen Personalausweis.
In: D-A-CH Security 2012, 25. - 26. September,
[Conference item]

Hühnlein, Detlef ; Petrautzki, Dirk ; Schmölz, Johannes ; Wich, Tobias ; Horsch, Moritz ; Wieland, Thomas ; Eichholz, Jan ; Wiesmaier, Alexander ; Braun, Johannes ; Feldmann, Florian ; Potzernheim, Simon ; Schwenk, Jörg ; Kahlo, Christian ; Kühne, Andreas ; Veit, Heiko (2012):
On the design and implementation of the Open eCard App.
In: GI SICHERHEIT 2012 Sicherheit - Schutz und Zuverlässigkeit,
Darmstadt, [Conference item]

Kauer, Michaela ; Kiesel, Florian ; Ueberschaer, Felix ; Volkamer, Melanie ; Bruder, Ralph
Jähnke, Jochen ; Mühlen, Nicolas von zur ; Rechert, Klaus ; Suchodoletz, Dirk von (Hrsg.) Max-Planck Institut für ausländisches und internationales Strafrecht (Urheber) (2012):
The Influence of trustworthiness of website layout on security perception of websites.
18, In: Current Issues in IT Security 2012 Schriftenreihe des Max-Planck-Instituts für ausländisches und internationales Strafrecht. Reihe I: Interdisziplinäre Forschungen aus Strafrecht und Kriminologie, S. 215-220, Berlin, Duncker & Humblot, ISBN 978-3-428-13887-6,
[Book section]

Meziani, Mohammed (2012):
SBS: A Fast and Secure Syndrome Based Stream Cipher.
[Other]

Meziani, Mohammed ; Bansarkhani, Rachid El (2012):
An Efficient and Secure Coding-based Authenticated Encryption.
In: LNCS, In: 7th DPM International Workshop on Data Privacy Management (DPM 2012),
Springer, Pisa, Italy, [Conference item]

Meziani, Mohammed ; Hoffmann, Gerhard ; Cayrel, Pierre-Louis (2012):
Improving the Performance of the SYND Stream Cipher.
In: LNCS, In: AfricaCrypt 2012,
Springer, Al Akhawayn University, Ifran, Morocco, [Conference item]

Schmidt, Axel (2012):
Enabling Secure Online Elections with the Voting Service Provider.
TU Darmstadt,
[PhD thesis]

Schreiner, Steffen ; Grigoras, Costin ; Litmaath, Maarten ; Betev, Latchezar ; Buchmann, Johannes (2012):
Certified Grid Job Submission in the ALICE Grid Services.
In: Open Access Journal of Physics: Conference Series (JPCS), International Conference on Computing in High Energy and Nuclear Physics (CHEP) 2012, [Article]

Vigil, Martín Gagliotti ; Cabarcas, Daniel ; Wiesmaier, Alexander ; Buchmann, Johannes (2012):
Authenticity, Integrity and Proof-of-Existence for Long-Term Archiving: a Survey.
In: IACR Cryptology ePrint Archive, [Article]

Volkamer, Melanie ; Karayumak, Fatih ; Kauer, Michaela ; Halim, Dhanish ; Bruder, Ralph (2012):
Security versus Trust Indicators in 2011 in Germany.
I, In: Current Issues in IT Security 2012, S. 79-96,
Duncker & Humblot, Freiburg, ISBN 978-3-86113-115-1,
[Conference item]

2011

Schneider, Michael (2011):
Computing Shortest Lattice Vectors on Special Hardware.
TU Darmstadt,
[PhD thesis]

Bulygin, Stanislav ; Buchmann, Johannes
Lin, Dongdai ; Tsudik, Gene ; Wang, Xiaoyun (Hrsg.) (2011):
Algebraic cryptanalysis of the round-reduced and side channel analysis of the full PRINTCipher-48.
In: Lecture Notes in Computer Science, 7092, In: Proceedings of The 10th International Conference on Cryptography and Network Security (CANS 2011), S. 54-75,
Springer, Sanya, China, ISBN 978-3-642-25512-0,
[Conference item]

Schreiner, Steffen ; Bagnasco, Stefano ; Banerjee, Subho Sankar ; Betev, Latchezar ; Carminati, Federico ; Datskova, Olga Vladimirovna ; Furano, Fabrizio ; Grigoras, Alina ; Grigoras, Costin ; Lorenzo, Patricia Mendez ; Peters, Andreas Joachim ; Saiz, Pablo ; Zhu, Jianlin (2011):
Securing the AliEn File Catalogue - Enforcing authorization with accountable file operations.
In: Journal of Physics: Conference Series (JPCS), 331:062044, International Conference on Computing in High Energy and Nuclear Physics (CHEP) 2010, [Article]

Warta, Simon (2011):
Deriving Signature Schemes from Public-Key Cryptosystems.
Darmstadt, Technische Universität, [Bachelor thesis]

Buchmann, Johannes ; Dahmen, Erik ; Hülsing, Andreas
Yang, Bo-Yin (Hrsg.) (2011):
XMSS - A Practical Forward Secure Signature Scheme based on Minimal Security Assumptions.
In: Lecture Notes in Computer Science - LNCS, In: Post-Quantum Cryptography - Proceedings of PQCrypto 2011, S. 117-129,
Springer Berlin / Heidelberg, ISBN 978-3-642-25404-8,
DOI: 10.1007/978-3-642-25405-5_8,
[Conference item]

Bartsch, Steffen (2011):
Exploring Twisted Paths: Analyzing Authorization Processes in Organizations.
In: NSS '11: Proceedings of the 5th International Conference on Network and System Security,
IEEE Computer Society, Milan, Italy, DOI: 10.1109/ICNSS.2011.6060003,
[Conference item]

Braun, Johannes ; Horsch, Moritz ; Wiesmaier, Alexander ; Hühnlein, Detlef
Schartner, Peter ; Taeger, Jürgen (Hrsg.) (2011):
Mobile Authentisierung und Signatur.
In: D-A-CH Security 2011: Bestandsaufnahme, Konzepte, Anwendungen, Perspektiven, S. 32-43,
syssec Verlag, Oldenburg, ISBN 978-3-00-034960-7,
[Conference item]

Braun, Johannes ; Wiesmaier, Alexander ; Klieme, Eric ; Strick, Linda ; Wunderlich, Wolfgang (2011):
Der elektronische Safe als vertrauenswürdiger Cloud Service.
[Report]

Demirel, Denise ; Henning, Maria ; Ryan, Peter Y. A. ; Schneider, Steve ; Volkamer, Melanie (2011):
Feasibility Analysis of Pret a Voter for German Federal Elections.
7187 2012, In: 3rd international conference on e-voting and identity (VoteID 2011), S. 158-173,
Springer, Tallinn, Estonia, ISBN 978-3-642-32746-9,
DOI: 10.1007/978-3-642-32747-6_10,
[Conference item]

Kuo, Po-Chun ; Schneider, Michael ; Dagdelen, Özgür ; Reichelt, Jan ; Buchmann, Johannes ; Cheng, Chen-Mou ; Yang, Bo-Yin
Preneel, Bart ; Takagi, Tsuyoshi (Hrsg.) (2011):
Extreme Enumeration on GPU and in Clouds - How Many Dollars You Need to Break SVP Challenges -.
In: LNCS, In: Workshop on Cryptographic Hardware and Embedded Systems - CHES 2011, S. 176-191,
Springer, [Conference item]

Petzoldt, Albrecht ; Thomae, Enrico ; Bulygin, Stanislav ; Wolf, Christopher
Preneel, Bart ; Takagi, Tsuyoshi (Hrsg.) (2011):
Small Public Keys and Fast Verification for Multivariate Quadratic Public Key Systems.
In: Lecture Notes in Computer Science, 6917, In: Proceedings of "Workshop on Cryptographic Hardware and Embedded Systems 2011 (CHES 2011)", S. 475-490,
Springer, [Conference item]

Schneider, Michael ; Göttert, Norman
Preneel, Bart ; Takagi, Tsuyoshi (Hrsg.) (2011):
Random Sampling for Short Lattice Vectors on Graphics Cards.
In: LNCS, In: Workshop on Cryptographic Hardware and Embedded Systems 2011 (CHES 2011), S. 160-175,
Springer, Nara, Japan, DOI: 10.1007/978-3-642-23951-9_11,
[Conference item]

Bartsch, Steffen (2011):
Practitioners Perspectives on Security in Agile Development.
In: FARES: 6th International Workshop on Frontiers in Availability, Reliability and Security, S. 479 - 484,
IEEE Computer Society, Vienna, Austria, DOI: 10.1109/ARES.2011.82,
[Conference item]

Cayrel, Pierre-Louis ; Yousfi Alaoui, Sidi Mohamed el ; Hoffmann, Gerhard ; Meziani, Mohammed ; Niebuhr, Robert
Kim, Tai-Hoon ; Adeli, Hojjat ; Robles, Rosslin John ; Balitanas, Maricel (Hrsg.) (2011):
Recent Progress in Code-Based Cryptography.
In: LNCS, In: The 5th International Conference on Information Security and Assurance - ISA-2011, S. 21-32,
Springer, Brno University, Czech Republic, [Conference item]

Frankland, Richard ; Demirel, Denise ; Budurushi, Jurlind ; Volkamer, Melanie (2011):
Side-channels and eVoting machine security: Identifying vulnerabilities and defining requirements.
In: International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE'11), S. 37-46,
IEEE, Trento, Italy, ISBN 978-1-4577-0951-7,
DOI: 10.1109/REVOTE.2011.6045914,
[Conference item]

Horsch, Moritz ; Braun, Johannes ; Wiesmaier, Alexander (2011):
Mobile eID application for the German identity card.
[Report]

Mohamed, Mohamed Saied Emam ; Bulygin, Stanislav ; Buchmann, Johannes
Kim, Tai-Hoon ; Adeli, Hojjat ; Robles, Rosslin John ; Balitanas, Maricel (Hrsg.) (2011):
Using SAT Solving to Improve Differential Fault Analysis of Trivium.
In: Communications in Computer and Information Science, 200, In: Proceedings of "The 5th International Conference on Information Security and Assurance" ISA 2011, S. 62-71,
Springer, Brno, Czech Republic, DOI: 10.1007/978-3-642-23141-4_7,
[Conference item]

Mohamed, Mohamed Saied Emam ; Ding, Jintai ; Buchmann, Johannes
Kim, Tai-Hoon ; Adeli, Hojjat ; Robles, Rosslin John ; Balitanas, Maricel (Hrsg.) (2011):
Towards Algebraic Cryptanalysis of HFE Challenge 2.
In: Communications in Computer and Information Science, In: Proceedings of "The 5th International Conference on Information Security and Assurance" ISA 2011, S. 123-131,
Springer, Brno University, Czech Republic, ISBN 978-3-642-23140-7,
DOI: 10.1007/978-3-642-23141-4_12,
[Conference item]

Shirazi, Fatemeh ; Neumann, Stephan ; Ciolacu, Ines ; Volkamer, Melanie (2011):
Robust Electronic Voting: Introducing robustness in Civitas.
In: International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE), 2011, S. 47 -55,
Trento, Italy, DOI: 10.1109/REVOTE.2011.6045915,
[Conference item]

Volkamer, Melanie ; Budurushi, Jurlind ; Demirel, Denise (2011):
Vote casting device with VV-SV-PAT for elections with complicated ballot papers.
In: International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE'11), S. 1-8,
IEEE, Trento, Italy, ISBN 978-1-4577-0951-7,
DOI: 10.1109/REVOTE.2011.6045910,
[Conference item]

Buchmann, Johannes ; Dahmen, Erik ; Ereth, Sarah ; Hülsing, Andreas ; Rückert, Markus
Nitaj, Abderrahmane ; Pointcheval, David (Hrsg.) (2011):
On the security of the Winternitz one-time signature scheme.
In: Lecture Notes in Computer Science (LNCS), In: Progress in Cryptology - AFRICACRYPT 2011, S. 363-378,
Springer Berlin / Heidelberg, Dakar, Senegal, ISBN 978-3-642-21968-9,
DOI: 10.1007/978-3-642-21969-6_23,
[Conference item]

Niebuhr, Robert ; Cayrel, Pierre-Louis (2011):
Broadcast Attacks against Code-Based Schemes.
In: LNCS, In: 4th Western European Workshop on Research in Cryptology, WEWoRC 2011, S. 1-17,
Springer, Weimar, Germany, ISBN 978-3-642-34158-8,
[Conference item]

Schmidt, Patrick (2011):
Fully Homomorphic Encryption: Overview and Cryptanalysis.
Darmstadt, Technische Universität, [Bachelor thesis]

Mohamed, Mohamed Saied Emam (2011):
Improved Strategies for Solving Multivariate Polynomial Equation Systems over Finite Fields.
Darmstadt, TU Darmstadt, Informatik,
[PhD thesis]

Abdelmageed Mohamed, Wael Said (2011):
Improvements for the XL Algorithm with Applications to Algebraic Cryptanalysis.
Darmstadt, Germany, TU Darmstadt,
[PhD thesis]

Cayrel, Pierre-Louis ; Yousfi Alaoui, Sidi Mohamed el ; Günther, Felix ; Hoffmann, Gerhard ; Rothe, Holger (2011):
Efficient implementation of code-based identification/signature schemes.
In: WEWoRC 2011, [Article]

McHardy, Patrick ; Schuler, Andreas ; Tews, Erik (2011):
Interactive decryption of DECT phone calls.
In: Fourth ACM Conference on Wireless Network Security (WiSec '11),
Hamburg, [Conference item]

Meziani, M. ; Yousfi Alaoui, Sidi Mohamed el ; Cayrel, Pierre-Louis (2011):
Hash Functions Based on Coding Theory.
In: 2nd Workshop on Codes, Cryptography and Communication Systems (WCCCS 2011), S. 32-37,
[Conference item]

Demirel, Denise ; Frankland, Richard ; Popovic, Darko ; Volkamer, Melanie
Parycek, Peter ; Kripp, Melanie J ; Noella, Edelmann (Hrsg.) (2011):
Voting software to support election preparation, counting, and tallying.
In: CeDEM11 Proceedings of the International Conference for E-Democracy and Open Government, S. 287-300,
Edition Donau-Universität Krems, [Conference item]

Fischer-Hübner, Simone ; Grimm, Rüdiger ; Lo Iacono, Luigi ; Möller, Sebastian ; Müller, Günter ; Volkamer, Melanie (2011):
Gebrauchstaugliche Informationssicherheit.
In: Die Zeitschrift für Informationssicherheit - Usable Security and Privacy, S. 14. [Article]

Hoffmann, Gerhard (2011):
Implementation of McEliece using quasi-dyadic Goppa codes.
TU Darmstadt, [Master thesis]

Mönkehues, Stephan (2011):
SWIFFT-Modifikationen, Korrektur von Operm5.
Darmstadt, Technische Universität, [Bachelor thesis]

Rothenberg, Christian Esteve ; Macapuna, Carlos A. B. ; Magalhães, Maurício F. ; Verdi, Fábio ; Wiesmaier, Alexander (2011):
In-packet Bloom Filters: Design and Networking Applications.
In: Computer Networks - The International Journal of Computer and Telecommunications Networking, 55 (6), S. 1364-1378. [Article]

Petzoldt, Albrecht ; Bulygin, Stanislav ; Buchmann, Johannes
Catalano, Dario ; Fazio, Nelly ; Gennaro, Rosario ; Nicolosi, Antonio (Hrsg.) (2011):
Linear Recurring Sequences for the UOV Key Generation.
In: LNCS, In: Proceedings of PKC 2011, S. 335-350,
Springer, [Conference item]

Schryen, Guido ; Volkamer, Melanie ; Habib, Sheikh Mahbub ; Ries, Sebastian (2011):
A Formal Approach Towards Measuring Trust in Distributed Systems.
In: Proceedings of the 2011 ACM Symposium on Applied Computing, S. 1739-1745,
ACM, Taichung, Taiwan, ISBN 978-1-4503-0113-8,
DOI: 10.1145/1982185.1982548,
[Conference item]

Wiesmaier, Alexander ; Horsch, Moritz ; Braun, Johannes ; Kiefer, Franziskus ; Hühnlein, Detlef ; Strenzke, Falko ; Buchmann, Johannes
Cheung, Bruce ; Hui, Lucas Chi Kwong ; Sandhu, Ravi ; Wong, Duncan (Hrsg.) (2011):
An efficient mobile PACE implementation.
In: ACM Symposium on Information, Computer and Communications Security, In: ASIA CCS '11: 6th ACM Symposium on Information, Computer and Communications Security, S. 176-185,
ACM, Hong Kong, DOI: 10.1145/1966913.1966936,
[Conference item]

Bartsch, Steffen (2011):
An Authorization Enforcement Usability Case Study.
In: ESSoS 2011,
Springer, Madrid, Spain, DOI: 10.1007/978-3-642-19125-1_16,
[Conference item]

Likavec, Lena (2011):
Application of Lattice Basis Reduction.
Darmstadt, Technische Universität, [Bachelor thesis]

Mohamed, Mohamed Saied Emam ; Bulygin, Stanislav ; Buchmann, Johannes (2011):
Improved Differential Fault Analysis of Trivium.
In: Proceedings of COSADE 2011, S. 147-158,
Darmstadt, [Conference item]

Popovic, Darko (2011):
Kosten-Nutzen-Analyse von elektronischen Wahlen an der TU Darmstadt.
Darmstadt, Technische Universität, [Bachelor thesis]

Rückert, Markus (2011):
Lattice-based Signature Schemes with Additional Features.
TU Darmstadt,
[PhD thesis]

Lindner, Richard (2011):
Towards Efficient Lattice-Based Cryptography.
TU Darmstadt,
[PhD thesis]

Langer, Lucie ; Wiesmaier, Alexander ; Buchmann, Johannes (2011):
Secure Long-term Record Keeping in the Public Sector.
In: EGovernement Review, (7), S. 14-15. [Article]

Olembo, Maina ; Volkamer, Melanie (2011):
Authentication Techniques, Client-Side Voting Software, and Secure Platform Mechanisms.
[Report]

Cayrel, Pierre-Louis ; Hoffmann, Gerhard ; Schneider, Michael (2011):
GPU Implementation of the Keccak Hash Function Family.
In: ISA 2011 - The 5th International Conference on Information Security and Assurance,
Brno University, Czech Republic, [Conference item]

Cayrel, Pierre-Louis ; Hoffmann, Gerhard ; Schneider, Michael (2011):
GPU Implementation of the Keccak Hash Function Family.
In: The 5th International Conference on Information Security and Assurance - ISA 2011,
Brno University, Czech Republic, [Conference item]

Horsch, Moritz (2011):
Mobile Authentisierung mit dem neuen Personalausweis (MONA).
Darmstadt, Technische Universität, [Bachelor thesis]

Horsch, Moritz ; Stopczynski, Martin (2011):
The German eCard-Strategy.
[Report]

Lindner, Richard ; Peikert, Chris (2011):
Better Key Sizes (and Attacks) for LWE-Based Encryption.
In: CT-RSA 2011,
[Conference item]

Meziani, Mohammed ; Cayrel, Pierre-Louis ; Yousfi Alaoui, Sidi Mohamed el
Kim, Tai-Hoon ; Adeli, Hojjat ; Robles, Rosslin John ; Balitanas, Maricel (Hrsg.) (2011):
2SC: An Efficient Code-Based Stream Cipher.
200, In: ISA, S. 111-122,
Springer, [Conference item]

Milde, Benjamin ; Schneider, Michael (2011):
A Parallel Implementation of GaussSieve for the Shortest Vector Problem in Lattices.
In: PaCT 2011,
[Conference item]

Mohamed, Mohamed Saied Emam ; Ding, Jintai ; Buchmann, Johannes (2011):
The Complexity Analysis of the MutantXL Family.
In: IACR Cryptology ePrint Archive, S. 36. [Article]

Niebuhr, Robert ; Cayrel, Pierre-Louis ; Buchmann, Johannes (2011):
Improving the effciency of Generalized Birthday Attacks against certain structured cryptosystems.
In: The Seventh International Workshop on Coding and Cryptography 2011 (WCC 2011),
[Conference item]

Olembo, Maina ; Schmidt, Patrick ; Volkamer, Melanie (2011):
Introducing Verifiability in the POLYAS Remote Electronic Voting System.
In: Proceedings of the Sixth International Conference on Availability, Reliability and Security (ARES 2011), S. 127 - 134,
IEEE Computer Society, Vienna, Austria, [Conference item]

Schneider, Michael (2011):
Analysis of Gauss-Sieve for Solving the Shortest Vector Problem in Lattices.
In: LNCS, 6552, In: WALCOM 2011, S. 89-97,
Springer, [Conference item]

Spycher, Oliver ; Volkamer, Melanie ; Koenig, Reto
Lipmaa, Helger ; Kiayias, Aggelos (Hrsg.) (2011):
Transparency and Technical Measures to Establish Trust in Norwegian Internet Voting.
In: Springer LNCS, In: 3rd international conference on e-voting and identity (VoteID 2011), S. 19-35,
Springer, ISBN 978-3-642-32746-9,
DOI: 10.1007/978-3-642-32747-6_2,
[Conference item]

Tews, Erik ; Wälde, Julian ; Weiner, Michael (2011):
Breaking DVB-CSA.
In: Western European Workshop on Research in Cryptology - WEWoRC 2011,
Weimar, [Conference item]

Volkamer, Melanie ; Spycher, Oliver ; Dubuis, Eric (2011):
Measures to Establish Trust in Internet Voting.
In: ICEGOV '11, In: ICEGOV 2011, Proceedings of the 5th International Conference on Theory and Practice of Electronic Governance, S. 1-10,
ACM, Tallinn, Estonia, DOI: http://doi.acm.org/10.1145/2072069.2072071,
[Conference item]

Yousfi Alaoui, Sidi Mohamed el ; Cayrel, Pierre-Louis ; Meziani, Mohammed
Kim, Tai-Hoon ; Adeli, Hojjat ; Robles, Rosslin John ; Balitanas, Maricel (Hrsg.) (2011):
Improved Identity-Based Identification and Signature Schemes Using Quasi-Dyadic Goppa Codes.
In: Communications in Computer and Information Science, 200, In: ISA, S. 146-155,
Springer, [Conference item]

2010

Bansarkhani, Rachid El (2010):
Solving Lattice Problems with Voronoi Cells.
TU Darmstadt, [Master thesis]

Bulygin, Stanislav ; Petzoldt, Albrecht ; Buchmann, Johannes
Gong, G. ; Gupta, K. C. (Hrsg.) (2010):
Towards provable security of the Unbalanced Oil and Vinegar signature scheme under direct attacks.
In: Lecture Notes in Computer Science, 6498, In: Proceedings of IndoCrypt 2010, S. 17–-32,
Springer, [Conference item]

Mohamed, Mohamed Saied Emam ; Cabarcas, Daniel ; Ding, Jintai ; Buchmann, Johannes ; Bulygin, Stanislav
Lee, Donghoon ; Hong, Seokhie (Hrsg.) (2010):
MXL3: An efficient algorithm for computing Gröbner bases of zero-dimensional ideals.
Lecture Notes in Computer, In: Proceedings of the 12th International Conference on Information Security and Cryptography - ICISC 2009, S. 87-100,
Springer, Seoul, Korea, ISBN 978-3-642-14422-6,
DOI: 10.1007/978-3-642-14423-3_7,
[Conference item]

Mohamed, Wael Said Abd Elmageed ; Bulygin, Stanislav ; Ding, Jintai ; Buchmann, Johannes ; Werner, Fabian
Heng, S.-H. ; Wright, R. N. ; Goi, B.-M. (Hrsg.) (2010):
Practical Algebraic Cryptanalysis for Dragon-based Cryptosystems.
In: Lecture Notes in Computer Science, In: Proceedings of The Ninth International Conference on Cryptology And Network Security (CANS 2010), S. 140–-155,
Springer, Kuala Lumpur, Malaysia, ISBN 978-3-642-17618-0,
DOI: 10.1007/978-3-642-17619-7_11,
[Conference item]

Petzoldt, Albrecht ; Bulygin, Stanislav ; Buchmann, Johannes
Gong, G. ; Gupta, K. C. (Hrsg.) (2010):
CyclicRainbow - A multivariate Signature Scheme with a Partially Cyclic Public Key.
In: Lecture Notes in Computer Science, 6498, In: Proceedings of IndoCrypt 2010, S. 33–-48,
Springer, [Conference item]

Rückert, Markus
Abe, Masayuki (Hrsg.) (2010):
Lattice-based Blind Signatures.
In: LNCS, In: ASIACRYPT 2010, S. 413-430,
Springer, Singapore, ISBN 978-3-642-17372-1,
[Conference item]

Cayrel, Pierre-Louis ; Lindner, Richard ; Rückert, Markus ; Silva, Rosemberg (2010):
Improved Zero-knowledge Identification with Lattices.
In: LNCS, In: The Fourth International Conference on Provable Security (ProvSec 2010), S. 1-17,
Springer, [Conference item]

Nohl, Karsten ; Tews, Erik (2010):
Kann man mit DECT noch vertraulich telefonieren?
In: >Datenschutz und Datensicherheit (DuD), 34 (11), S. 758-760. [Article]

Weiner, Michael ; Tews, Erik ; Heinz, Benedikt ; Heyszl, Johann (2010):
FPGA Implementation of an Improved Attack Against the DECT Standard Cipher.
In: LNCS, In: ICISC 2010 - 13th Annual International Conference on Information Security and Cryptology,
Springer, Seoul, Korea, [Conference item]

Langer, Lucie (2010):
Privacy and Verifiability in Electronic Voting.
TU Darmstadt,
[PhD thesis]

Bartsch, Steffen (2010):
A calculus for the qualitative risk assessment of policy override authorization.
In: SIN: Proceedings of the 3rd international conference on Security of information and networks, S. 62--70,
ACM, Taganrog, Rostov-on-Don, Russian Federation, ISBN 978-1-4503-0234-0,
DOI: 10.1145/1854099.1854115,
[Conference item]

Demirel, Denise (2010):
Effizientes Lösen linearer Gleichungssysteme über GF(2) mit GPUs.
Darmstadt, Technische Universität, [Bachelor thesis]

Cayrel, Pierre-Louis ; Lindner, Richard ; Rückert, Markus ; Silva, Rosemberg (2010):
A Lattice-Based Threshold Ring Signature Scheme.
In: LNCS, In: The first international conference on cryptology and Information security, LatinCrypt 2010, S. 255-272,
Springer, [Conference item]

Cayrel, Pierre-Louis ; Véron, Pascal ; Yousfi Alaoui, Sidi Mohamed el (2010):
A zero-knowledge identification scheme based on the q-ary Syndrome Decoding problem.
In: Proceedings of the Seventeenth Workshop on Selected Areas in Cryptography(SAC2010),
SAC2010, [Conference item]

Kiefer, Franziskus (2010):
Effiziente Implementierung des PACE - und EAC-Protokolls für mobile Geräte.
Darmstadt, Technische Universität, [Bachelor thesis]

Aguilar Melchor, C. ; Cayrel, Pierre-Louis ; Gaborit, Philippe ; Laguillaumie, F. (2010):
A New Efficient Threshold Ring Signature Scheme based on Coding Theory.
In: IEEE IT, [Article]

Langer, Lucie ; Schmidt, Axel ; Wiesmaier, Alexander (2010):
INNOVATIVE PERSONALAUSWEIS‐ANWENDUNGEN Mehrwert des elektronischen Personalausweises jenseits von Portal‐ und Formularanwendungen: Technische Machbarkeit und langfristige Sicherheit.
[Report]

Mohamed, Wael Said Abd Elmageed ; Ding, Jintai ; Kleinjung, Thorsten ; Bulygin, Stanislav ; Buchmann, Johannes
Cid, Carlos ; Faugere, Jean-Charles (Hrsg.) (2010):
PWXL: A Parallel Wiedemann-XL Algorithm for Solving Polynomial Equations over GF(2).
In: Proceedings of the 2nd International Conference on Symbolic Computation and Cryptography (SCC 2010), S. 89-100,
[Conference item]

Niebuhr, Robert ; Cayrel, Pierre-Louis ; Bulygin, Stanislav ; Buchmann, Johannes (2010):
On lower bounds for Information Set Decoding over F_q.
In: Proceedings of the 2nd International Conference on Symbolic Computation and Cryptography (SCC 2010), S. 143-157,
[Conference item]

Petzoldt, Albrecht ; Bulygin, Stanislav ; Buchmann, Johannes
Cid, Carlos ; Faugere, Jean-Charles (Hrsg.) (2010):
A Multivariate Signature Scheme with a Partially Cyclic Public Key.
In: Proceedings of the 2nd International Conference on Symbolic Computation and Cryptography (SCC 2010), S. 229-235,
[Conference item]

Popall, Enrico (2010):
Wirtschaftlicher Nutzen des neuen Personalausweises.
Darmstadt, Technische Universität, [Bachelor thesis]

Rückert, Markus
Garay, Markus A. ; Prisco, Roberto De (Hrsg.) (2010):
Adaptively Secure Identity-based Identification from Lattices without Random Oracles.
In: LNCS, In: SCN 2010, S. 345-362,
Springer, Amalfi, Italy, ISBN 978-3-642-15316-7,
[Conference item]

Buchmann, Johannes ; Cabarcas, Daniel ; Ding, Jintai ; Mohamed, Mohamed Saied Emam
Bernstein, Daniel ; Lange, Tanja (Hrsg.) (2010):
Flexible Partial Enlargement to Accelerate Gröbner Basis Computation over F_2.
In: LNCS, In: AFRICACRYPT, S. 69-81,
Springer, Stellenbosch, South Africa, ISBN 978-3-642-12677-2,
[Conference item]

Buchmann, Johannes ; Wiesmaier, Alexander (2010):
Eine kurze Geschichte der Schlüssel.
In: 360° -- Fachmagazin für das Management im öffentlichen Sektor, (17), S. 21-23. [Article]

Dagdelen, Özgür ; Schneider, Michael (2010):
Parallel Enumeration of Shortest Lattice Vectors.
In: LNCS, 6272, In: Euro-Par 2010, S. 211-222,
Springer, [Conference item]

Hermans, Jens ; Schneider, Michael ; Buchmann, Johannes ; Vercauteren, Frederik ; Preneel, Bart
Bernstein, Daniel ; Lange, Tanja (Hrsg.) (2010):
Parallel Shortest Lattice Vector Enumeration on Graphics Cards.
In: LNCS, 6055, In: Africacrypt 2010, S. 52-68,
Springer, Stellenbpsch, South Africa, [Conference item]

Ivanova, Vanya (2010):
Lattice Basis Reduction in Infinity Norm.
TU Darmstadt, [Master thesis]

Petzoldt, Albrecht ; Bulygin, Stanislav ; Buchmann, Johannes
Sendrier, Nicolas (Hrsg.) (2010):
Selecting Parameters for the Rainbow Signature Scheme.
In: Lecture Notes in Computer Science, In: Proceedings of PQCrypto 2010, S. 218-240,
Springer, [Conference item]

Rückert, Markus (2010):
Strongly Unforgeable Signatures and Hierarchical Identity-based Signatures from Lattices Without Random Oracles.
In: LNCS, LNCS, In: PQCrypto 2010, S. 182-200,
Springer, Darmstadt, ISBN 978-3-642-12928-5,
[Conference item]

Rückert, Markus ; Schneider, Michael ; Schröder, Dominique
Zhou, Jianying ; Yung, Moti (Hrsg.) (2010):
Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs.
In: 6123 of LNCS, In: ACNS 2010, S. 69-86,
Springer, Beijing, China, ISBN 978-3-642-13707-5,
[Conference item]

Rückert, Markus ; Schröder, Dominique
Bernstein, Daniel ; Lange, Tanja (Hrsg.) (2010):
Fair Partially Blind Signatures.
In: LNCS, LNCS, In: Africacrypt 2010, S. 34-51,
Springer, ISBN 978-3-642-12677-2,
[Conference item]

Sami, Arif ; Karabulut, Murat (2010):
Analyse von homomorpher Verschlüsselung und MIX Netzen für elektronische Wahlsysteme.
TU Darmstadt, [Master thesis]

Gharadaghy, Rojan (2010):
Funktion und Realisierung der Telematikinfrastruktur für die elektronische Gesundheitskarte unter besonderer Betrachtung der Public-Key-Infrastruktur.
Darmstadt, Technische Universität, [Bachelor thesis]

Cayrel, Pierre-Louis ; Yousfi Alaoui, Sidi Mohamed el (2010):
Dual Construction of Stern-based Signature Schemes.
63 March 2010, In: International Conference on Computer, Electrical, and Systems Sciences, and Engineering"ICCESSE 2010", S. 369-374,
[Conference item]

Jiang, Biqiang (2010):
Design and Implementation of Plug-ins for JCrypTool - Visualization of the Cryptographic SPA and DPA Attacks.
Darmstadt, Technische Universität, [Bachelor thesis]

Marinov, Veselin (2010):
ECDSA Plug-in for the E-learning Platform JCrypTool.
Darmstadt, Technische Universität, [Bachelor thesis]

Röhrig, Rouven (2010):
Entwurf und Implementierung eines Plug-ins für JCrypTool - S/MIME-Visualisierung.
Darmstadt, Technische Universität, [Bachelor thesis]

Tzvetkov, Vesselin Dimitrov (2010):
Virtual Private Networks for mobile environments. Development of protocol for mobile security and algorithms for location update.
Darmstadt, Technische Universität, TU Darmstadt,
[PhD thesis]

Bartsch, Steffen (2010):
Supporting Authorization Policy Modification in Agile Development of {Web} Applications.
In: SecSE: Fourth International Workshop on Secure Software Engineering,
IEEE Computer Society, Krakow, Poland, DOI: 10.1109/ARES.2010.19,
[Conference item]

Belhilali, Mohamed (2010):
Entwurf und Implementierung von SCVP in Java - Simple Certificate Validation Protocol.
Darmstadt, Technische Universität, [Bachelor thesis]

Langer, Lucie ; Volkamer, Melanie ; Schmidt, Axel ; Buchmann, Johannes (2010):
A Taxonomy Refining the Security Requirements for Electronic Voting: Analyzing Helios as a Proof of Concept.
In: Fifth International Conference on Availability, Reliability and Security (ARES 2010), S. 475-480,
IEEE Computer Society, Krakow, Poland, ISBN 978-0-7695-3965-2,
[Conference item]

Richter, Philipp ; Langer, Lucie ; Hupf, Katharina ; Volkamer, Melanie ; Buchmann, Johannes
Schweighöfer, Erich ; Geist, Anton ; Staufer, Ines (Hrsg.) (2010):
Verifizierbarkeit und Öffentlichkeitsgrundsatz bei elektronischen Wahlen.
In: Globale Sicherheit und proaktiver Staat - Die Rolle der Rechtsinformatik, Tagungsband des 13. Internationalen Rechtsinformatik Symposium IRIS 2010, S. 61-72,
Salzburg, [Conference item]

Backs, Christian (2010):
Anbindung eines externen Authentifizierungsdienstes an ein Online-Wahlsystem.
Darmstadt, Technische Universität, [Bachelor thesis]

Karatsiolis, Vangelis ; Langer, Lucie ; Schmidt, Axel ; Tews, Erik ; Wiesmaier, Alexander (2010):
Cryptographic Application Scenarios.
(TI-01/10), [Report]

Barreto, Paulo ; Cayrel, Pierre-Louis ; Misoczki, Rafael ; Niebuhr, Robert (2010):
Quasi-dyadic CFS signatures.
In: LNCS, In: Inscrypt 2010,
Springer, [Conference item]

Buchmann, Johannes (2010):
Einführung in die Kryptographie / Introduction to Cryptography.
Springer Berlin/Heidelberg, ISBN 9783642111853,
[Book]

Buchmann, Johannes ; Braun, Johannes ; Horsch, Moritz ; Hühnlein, Detlef ; Kiefer, Franziskus ; Strenzke, Falko ; Wiesmaier, Alexander (2010):
Towards a mobile eCard Client.
In: 13. Kryptotag, S. 4,
Darmstadt, [Conference item]

Gharadaghy, Rojan ; Volkamer, Melanie (2010):
Verifiability in Electronic Voting - Explanations for Non Security Experts.
In: LNI, In: Electronic Voting 2010, EVOTE 2010, 4th International Conference, Co-organized by Council of Europe, Gesellschaft für Informatik and E-Voting.CC, July 21st - 24th, 2010, in Castle Hofen, Bregenz, Austria, S. 151-162,
ISBN 978-3-88579-261-1,
[Conference item]

Grimm, Rüdiger ; Hupf, Katharina ; Volkamer, Melanie
Krimmer, Robert ; Grimm, Rüdiger (Hrsg.) (2010):
A Formal IT-Security Model for the Correction and Abort Requirement of Electronic Voting.
In: LNI, 167, In: Electronic Voting 2010, EVOTE 2010, 4th International Conference, Co-organized by Council of Europe, Gesellschaft für Informatik and E-Voting.CC, July 21st - 24th, 2010, in Castle Hofen, Bregenz, Austria, S. 89-107,
ISBN 978-3-88579-261-1,
[Conference item]

Hartmann, Frank (2010):
Probability Distribution of Gram-Schmidt Coefficients after LLL-Reduction.
Darmstadt, Technische Universität, [Bachelor thesis]

Heuser, Annelie (2010):
Chess reduction - Using Artificial Intelligence for Lattice Reduction.
Darmstadt, Technische Universität, [Bachelor thesis]

Kaiser, Markus (2010):
Computer verification of algorithms using a formal proof system.
In: Dissertation.de, 1583, Berlin, dissertation.de, TU Darmstadt, ISBN 978-3-86624-483-2,
[PhD thesis]

Langer, Lucie ; Jonker, Hugo ; Pieters, Wolter (2010):
Anonymity and Verifiability in Voting: Understanding (Un)Linkability.
In: ICICS,
Barcelona, Spain, [Conference item]

Niebuhr, Robert ; Cayrel, Pierre-Louis ; Bulygin, Stanislav ; Buchmann, Johannes (2010):
Attacking code/lattice-based cryptosystems using Partial Knowledge.
In: Proceedings of Inscrypt 2010,
China Press, [Conference item]

Nohl, Karsten ; Tews, Erik ; Weinmann, Ralf-Philipp (2010):
Cryptanalysis of the DECT Standard Cipher.
In: Fast Software Encryption 2010,
Seoul, [Conference item]

Schmidt, Axel ; Volkamer, Melanie ; Buchmann, Johannes
Krimmer, Robert ; Grimm, Rüdiger (Hrsg.) (2010):
An Evaluation and Certification Approach to Enable Voting Service Providers.
In: LNI, 167, In: Electronic Voting 2010, EVOTE 2010, 4th International Conference, Co-organized by Council of Europe, Gesellschaft für Informatik and E-Voting.CC, July 21st - 24th, 2010, in Castle Hofen, Bregenz, Austria, S. 135-148,
GI, ISBN 978-3-88579-261-1,
[Conference item]

Schneider, Michael ; Buchmann, Johannes (2010):
Extended Lattice Reduction Experiments using the BKZ Algorithm.
In: LNI, In: Sicherheit, S. 241-252,
GI, Berlin, [Conference item]

Strenzke, Falko (2010):
Manger's Attack revisited.
In: Twelfth International Conference on Information and Communications Security,
Springer, [Conference item]

Volkamer, Melanie (2010):
Evaluierungsverfahren für Internetwahlsysteme.
In: IT-Information Technology, 52 (3), S. 169-172. ISSN 2196-7032,
DOI: 10.1524/itit.2010.0587,
[Article]

Volkamer, Melanie
Gutwirth, Serge ; Poullet, Yves ; Hert, Paul De (Hrsg.) (2010):
Data Protection in a Profiled World.
S. 177-190, Springer, [Book section]

Volkamer, Melanie ; Schryen, Guido (2010):
Measuring eTrust in distributed systems - General Concept and Application to Internet Voting.
In: 23rd Bled eConference, Bled, Slovenia, June 20-23,
[Conference item]

2009

Braun, Johannes (2009):
Nutzung des elektronischen Personalausweises im eCommerce.
Darmstadt, Technische Universität, [Diplom- oder Magisterarbeit]

Dahmen, Erik ; Krauß, Christoph
Garay, Christoph A. ; Miyaji, Atsuko ; Otsuka, Akira (Hrsg.) (2009):
Short Hash-Based Signatures for Wireless Sensor Networks.
In: LNCS, In: CANS 2009, S. 463-476,
Springer, Kanazawa, Japan, ISBN 978-3-540-89640-1,
[Conference item]

Hühnlein, Detlef ; Korte, Ulrike ; Langer, Lucie ; Wiesmaier, Alexander (2009):
A Comprehensive Reference Architecture for Trustworthy Long-Term Archiving of Sensitive Data.
In: 3rd International Conference on New Technologies, Mobility and Security (NTMS), S. 1-5,
IEEE Press, DOI: 10.1109/NTMS.2009.5384830,
[Conference item]

Inel, Oryal (2009):
Entwurf und Implementierung von Plug-ins für JCrypTool-Visualisierung von kryptographischen Grundlagen.
Darmstadt, Technische Universität, [Bachelor thesis]

Rückert, Markus
Roy, Bimal ; Sendrier, Nicolas (Hrsg.) (2009):
Verifiably Encrypted Signatures from RSA without NIZKs.
In: LNCS, In: Indocrypt 2009, S. 363-377,
Springer, New Delhi, India, ISBN 978-3-642-10627-9,
[Conference item]

Rückert, Markus ; Schröder, Dominique
Shacham, Hovav ; Waters, Brent (Hrsg.) (2009):
Security of Verifiably Encrypted Signatures and a Construction Without Random Oracles.
LNCS, In: Pairing 2009, S. 17-34,
Springer, Palo Alto, USA, ISBN 978-3-642-03297-4,
[Conference item]

Deußer, Clemens ; Reubold, Jan (2009):
Design und Implementierung kryptographischer Funktionen und Protokolle des elektronischen Personalausweises.
TU Darmstadt, [Master thesis]

Langer, Lucie ; Volkamer, Melanie ; Weber, Stefan ; Schmidt, Axel ; Buchmann, Johannes
Davies, Jim ; Janowski, Tomasz (Hrsg.) (2009):
Towards Long-Term Free and Secret Electronic Elections Providing Voter-Verifiability in the Bulletin Board Model.
322, In: ICEGOV 2009, Proceedings of the 3rd International Conference on Theory and Practice of Electronic Governance, S. 203-210,
Bogota, [Conference item]

Langer, Lucie ; Weber, Stefan ; Schmidt, Axel ; Buchmann, Johannes ; Volkamer, Melanie (2009):
Towards Long-Term Free and Secret Electronic Elections Providing Voter-Verifiability in the Bulletin Board Model.
In: Proceedings of 3rd International Conference on Theory and Practice of Electronic Governance (ICEGOV2009), S. 203-210,
ACM Press, Bogota, Colombia, ISBN 978-1-60558-663-2,
[Conference item]

Buchmann, Johannes ; Lindner, Richard (2009):
Secure Parameters for SWIFFT.
In: LNCS, In: Indocrypt 2009, S. 1-17,
Springer, [Conference item]

Mohamed, Mohamed Saied Emam ; Ding, Jintai ; Buchmann, Johannes ; Werner, Fabian (2009):
Algebraic Attack on the MQQ Public Key Cryptosystem.
In: LNCS, In: Cryptology and Network Security, 8th International Conference, CANS 2009, S. 392-401,
Springer, Kanazawa, Japan, ISBN 978-3-642-10432-9,
DOI: 10.1007/978-3-642-10433-6_26,
[Conference item]

Buchmann, Johannes ; Roßnagel, Alexander (2009):
Das Bundesverfassungsgericht und Telemedienwahlen.
In: K&R, 9, S. 543-548. [Article]

Gaber, Michael (2009):
Entwurf und Implementierung eines Plug-Ins für JCrypTool - RSA, DSA und ElGamal Visualisierungen.
Darmstadt, Technische Universität, [Bachelor thesis]

Horsch, Moritz (2009):
MobilePACE - Password Authenticated Connection Establishment implementation on mobile devices.
Darmstadt, Technische Universität, [Bachelor thesis]

Langer, Lucie ; Wiesmaier, Alexander (2009):
Der Lifetime eSafe -- ein sicheres elektronisches Schließfach.
In: 8th European Conference on Digital Archiving (ECA2010),
Geneva, Switzerland, [Conference item]

Schmidt, Axel ; Heinson, Dennis ; Langer, Lucie ; Opitz-Talidou, Zoi ; Richter, Philipp ; Volkamer, Melanie ; Buchmann, Johannes
Ryan, Johannes Y. A. ; Schoenmakers, Berry (Hrsg.) (2009):
Developing a Legal Framework for Remote Electronic Voting.
In: LNCS, 5767, In: E-Voting and Identity, Second International Conference, VOTE-ID 2009, S. 92-105,
Springer, Luxembourg, ISBN 978-3-642-04134-1,
DOI: 10.1007/978-3-642-04135-8_6,
[Conference item]

Buchmann, Johannes ; Karatsiolis, Vangelis (2009):
Notification Services for the Server-Based Certificate Validation Protocol.
In: Int'l J. of Communications, Network and System Sciences, 2 (5), S. 378-384. DOI: 10.4236/ijcns.2009.25042,
[Article]

Langer, Lucie ; Schmidt, Axel ; Buchmann, Johannes ; Volkamer, Melanie ; Stolfik, Alexander (2009):
Towards a Framework on the Security Requirements for Electronic Voting Protocols.
In: IEEE CS Digital Library, doi: 10.1109/RE-VOTE.2009.9, In: First International Workshop on Requirements Engineering for E-Voting Systems, S. 61-68,
Atlanta, GA, USA, ISBN 978-0-7695-4100-6,
DOI: http://doi.ieeecomputersociety.org/10.1109/RE-VOTE.2009.8,
[Conference item]

Langer, Lucie ; Schmidt, Axel ; Volkamer, Melanie (2009):
Verifizierbarkeit elektronischer Wahlen.
In: eGovernement Review, 4, [Article]

Langer, Lucie ; Schmidt, Axel ; Volkamer, Melanie ; Buchmann, Johannes
Fischer, Stefan ; Maehle, Erik ; Reischuk, Rüdiger (Hrsg.) (2009):
Classifying Privacy and Verifiability Requirements for Electronic Voting.
LNI, In: Informatik 2009: Im Focus das Leben, Beiträge der 39. Jahrestagung der Gesellschaft für Informatik e.V. (GI), S. 1837-1846,
[Conference item]

Langer, Lucie ; Schmidt, Axel ; Wiesmaier, Alexander (2009):
Projekt Campuspilot -- Akzeptanzbericht.
(TI-2/09), [Report]

Molter, Gregor ; Ogata, Kei ; Tews, Erik ; Weinmann, Ralf-Philipp (2009):
An Efficient FPGA Implementation for an DECT Brute-Force Attacking Scenario.
In: 5th IEEE International Conference on Wireless and Mobile Communications (ICWMC 2009), S. 82-86,
IEEE Computer Society, ISBN 978-0-76-953750-4,
DOI: 10.1109/ICWMC.2009.20,
[Conference item]

Schmidt, Axel ; Langer, Lucie ; Buchmann, Johannes ; Volkamer, Melanie (2009):
Specification of a Voting Service Provider.
In: IEEE CS Digital Library, doi: 10.1109/RE-VOTE.2009.8, In: First International Workshop on Requirements Engineering for E-Voting Systems, S. 9-18,
ISBN 978-0-7695-4100-6,
DOI: http://doi.ieeecomputersociety.org/10.1109/RE-VOTE.2009.8,
[Conference item]

Volkamer, Melanie ; Schryen, Guido ; Langer, Lucie ; Schmidt, Axel ; Buchmann, Johannes
Fischer, Stefan ; Maehle, Erik ; Reischuk, Rüdiger (Hrsg.) (2009):
Elektronische Wahlen: Verifizierung vs. Zertifizierung.
LNI, In: Informatik 2009: Im Focus das Leben, Beiträge der 39. Jahrestagung der Gesellschaft für Informatik e.V., S. 1827-1836,
[Conference item]

Chehimi, Nemr (2009):
Gitterbasisreduktion in Java.
Technische Universität Darmstadt, [Master thesis]

Schneider, Michael ; Buchmann, Johannes ; Lindner, Richard (2009):
Probabilistic Analysis of LLL Reduced Bases.
In: LNCS, In: Western European Workshop on Research in Cryptology - WEWoRC 2009,
Springer, Graz University of Technology, Austria, [Conference item]

Langer, Lucie ; Wiesmaier, Alexander (2009):
Langfristige Sicherheit am Beispiel eines virtuellen Tresors.
[Report]

Stopczynski, Martin (2009):
Erweiterte Benutzerführung für den Umgang mit sicheren Verbindungen in Browsern.
Darmstadt, Technische Universität, [Bachelor thesis]

Weinmann, Ralf-Philipp (2009):
Algebraic Methods in Block Cipher Cryptanalysis.
Darmstadt, Technische Universität, TU Darmstadt,
[PhD thesis]

Lucks, Stefan ; Schuler, Andreas ; Tews, Erik ; Weinmann, Ralf-Philipp ; Wenzel, Matthias
Fischlin, Marc (Hrsg.) (2009):
Attacks on the DECT authentication mechanisms.
In: LNCS, In: CT-RSA 2009,
Springer, San Francisco, CA, USA, ISBN 978-3-642-00861-0,
[Conference item]

Schreiner, Steffen (2009):
The Impact of Linux Superuser Privileges on System and Data Security within a Cloud Computing Storage Architecture.
Darmstadt, Technische Universität, [Bachelor thesis]

Beck, Martin ; Tews, Erik (2009):
Practical attacks against WEP and WPA.
In: Second ACM Conference on Wireless Network Security - WISEC 2009,
[Conference item]

Roch, Steffen (2009):
Konzeption und Integration eines sicheren drahtlosen Netzwerks im Unternehmensumfeld (am Beispiel des Heraeus Konzerns).
Darmstadt, Technische Universität, [Bachelor thesis]

Wiesmaier, Alexander (2009):
Secure private key management in adaptable public key infrastructures.
Berlin, Mensch-und-Buch-Verl., ISBN 978-3-86664-646-9,
[Book]

Dahmen, Erik (2009):
Post-quantum signatures for today.
Darmstadt, Technische Universität, TU Darmstadt,
[PhD thesis]

Adolph, Daniel (2009):
Fractional Recoding for the Shamir Method.
Technische Universität Darmstadt, [Master thesis]

Arzt, Steven (2009):
Design and Implementation of a Cryptographic Plugin for E-mail Clients.
[Other]

Bartsch, Steffen ; Sohr, Karsten ; Bormann, Carsten (2009):
Supporting Agile Development of Authorization Rules for SME Applications.
In: TrustCol: 3rd International Workshop on Trusted Collaboration, S. 461-471,
Springer, Orlando, FL, USA, DOI: 10.1007/978-3-642-03354-4_35,
[Conference item]

Buchmann, Johannes ; Lindner, Richard ; Rückert, Markus ; Schneider, Michael (2009):
Post-quantum cryptography: lattice signatures.
In: Special Issue of Computing (CECC 2008), [Article]

Langer, Lucie (2009):
Long-term verifiability of remote electronic elections.
In: Practical studies in e-Governement, Practical studies in e-Governement, [Book section]

Langer, Lucie ; Opitz-Talidou, Zoi (2009):
Elektronische Aufbewahrung von Wahldokumenten bei Onlinewahlen: Beweggründe, rechtliche Anforderungen und technische Umsetzung.
In: DuD, 9, [Article]

Langer, Lucie ; Opitz-Talidou, Zoi (2009):
Elektronische Aufbewahrung von Wahldokumenten bei Onlinewahlverfahren.
In: IRIS 2009,
[Conference item]

Langer, Lucie ; Schmidt, Axel ; Volkamer, Melanie (2009):
Verifizierbarkeit elektronischer Wahlen.
In: eGovernment Review, 4, [Article]

Langer, Lucie ; Schmidt, Axel ; Volkamer, Melanie ; Buchmann, Johannes
Prosser, Alexander ; Parycek, Peter (Hrsg.) (2009):
Ein PKI-basiertes Protokoll für sichere und praktikable Onlinewahlen.
In: Proceedings of EDEM 2009 ; Tagungsband Elektronische Demokratie in Österreich, S. 243-253,
OCG Verlag, [Conference item]

Langer, Lucie ; Schmidt, Axel ; Wiesmaier, Alexander (2009):
From Student Smartcard Applications to the German Electronic Identity Card.
In: ECEG09, S. 430-435,
ACI, ISBN 978-1-906638-34-4,
[Conference item]

Mengele, Alexandra (2009):
Digital Enhanced Cordless Telecommunication (DECT) devices for residential use.
Technische Universität Darmstadt, [Master thesis]

Rückert, Markus ; Schröder, Dominique (2009):
Aggregate and Verifiably Encrypted Signatures from Multilinear Maps Without Random Oracles.
In: LNCS, In: ISA 2009, S. 750-759,
Springer, Seoul, ISBN 978-3-642-02616-4,
[Conference item]

Schmidt, Axel ; Volkamer, Melanie ; Langer, Lucie ; Buchmann, Johannes
Fischer, Stefan ; Maehle, Erik ; Reischuk, Rüdiger (Hrsg.) (2009):
Towards the impact of the operational environment on the security of e-voting.
In: LNI, 154, In: Informatik 2009: Im Focus das Leben, Beiträge der 39. Jahrestagung der Gesellschaft für Informatik e.V. (GI), S. 1814-1826,
Gesellschaft für Informatik, [Conference item]

Volkamer, Melanie (2009):
Evaluation of Electronic Voting : Requirements and Evaluation Procedures to Support Responsible Election Authorities.
Berlin, Heidelberg, New York, Springer, ISBN 978-3-642-01661-5,
[Book]

Volkamer, Melanie
Wagner, Dorothea ; Bernstein, Abraham (Hrsg.) (2009):
Evaluation von Internetwahlsystemen.
In: LNI, D-9, In: Ausgezeichnete Informatikdissertationen 2008,, S. 301-310,
Gesellschaft für Informatik, [Conference item]

Volkamer, Melanie ; Grimm, Rüdiger (2009):
Determine the Resilience of Evaluated Internet Voting Systems.
In: IEEE CS Digital Library, doi: 10.1109/RE-VOTE.2009.2, In: First International Workshop on Requirements Engineering for E-Voting Systems, S. 47-54,
[Conference item]

2008

Araújo, Roberto dos Santos (2008):
On Remote and Voter-Verifiable Voting.
Darmstadt, Technische Universität, TU Darmstadt,
[PhD thesis]

Rupp, Andy ; Leander, Gregor ; Bangerter, Endre ; Dent, Alexander ; Sadeghi, Ahmad-Reza (2008):
Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems.
In: Advances in Cryptology - ASIACRYPT 2008,
[Conference item]

Richter, Peter (2008):
Optimierung des Merkle-Signaturverfahrens auf System z.
TU Darmstadt, [Master thesis]

Bernstein, Daniel ; Buchmann, Johannes ; Dahmen, Erik (Hrsg.) (2008):
Post-Quantum Cryptography.
Berlin, Heidelberg, Springer, ISBN 978-3-540-88701-0,
[Book]

Buchmann, Johannes ; Ding, Jintai (Hrsg.) (2008):
Post-Quantum Cryptography.
LNCS, Springer, Cincinnati, [Conference item]

Dahmen, Erik ; Okeya, Katsuyuki ; Takagi, Tsuyoshi ; Vuillaume, Camille
Buchmann, Johannes ; Ding, Jintai (Hrsg.) (2008):
Digital Signatures out of Second-Preimage Resistant Hash Functions.
In: LNCS, In: PQCrypto 2008, S. 109-123,
Springer, Cincinnati, USA, ISBN 978-3-540-88402-6,
[Conference item]

Mohamed, Mohamed Saied Emam ; Mohamed, Wael Said Abd Elmageed ; Ding, Jintai ; Buchmann, Johannes (2008):
MXL2: Solving Polynomial Equations over GF(2) Using an Improved Mutant Strategy.
In: Post-Quantum Cryptography, Second International Workshop, PQCrypto 2008, S. 203-215,
DOI: 10.1007/978-3-540-88403-3_14,
[Conference item]

Langer, Lucie ; Schmidt, Axel (2008):
Onlinewahlen mit Wahldiensteanbieter - das Verbundprojekt voteremote.
In: EDem08,
[Conference item]

Rohde, Sebastian ; Eisenbarth, Thomas ; Dahmen, Erik ; Buchmann, Johannes ; Paar, Christof
Grimaud, Gilles ; Standaert, François-Xavier (Hrsg.) (2008):
Fast Hash-Based Signatures on Constrained Devices.
In: LNCS, In: CARDIS 2008, S. 104-117,
Springer, London, GB, ISBN 978-3-540-85892-8,
[Conference item]

Vuillaume, Camille ; Okeya, Katsuyuki ; Dahmen, Erik ; Buchmann, Johannes
Chung, Kyo-Il ; Sohn, Kiwook ; Yung, Moti (Hrsg.) (2008):
Public Key Authentication with Memory Tokens.
In: LNCS, In: Workshop on Information Security Applications - WISA 2008, S. 84-98,
Springer, Jeju Island, Korea, ISBN 978-3-642-00305-9,
[Conference item]

Weber, Pia (2008):
Einsatzgebiete Digitaler Signaturen.
Darmstadt, Technische Universität, [Bachelor thesis]

Döring, Martin (2008):
On the Theory and Practice of Quantum-Immune Cryptography.
Darmstadt, Technische Universität, TU Darmstadt,
[PhD thesis]

Grimm, Rüdiger ; Volkamer, Melanie (2008):
Development of a Formal IT-Security Model for Remote Electronic Voting Systems.
In: LNI, 131, In: Electronic Voting - 3rd International Conference, S. 185-196,
Gesellschaft für Informatik, [Conference item]

Siebenhaar, Melanie ; Lehrig, Tim ; Braun, Johannes ; Görge, Thomas (2008):
Entwicklung einer SOA-basierten Webanwendung zur Buchung und Verwaltung von Segeltouren: Proprietäre Software vs. Open Source.
4, In: Wirtschaftsinformatik, 2008 (50), S. 325-329. DOI: 10.1365/s11576-008-0069-2,
[Article]

Roth, Adrian (2008):
Implementierung von Applikationen für den FINREAD Kartenleser.
Technische Universität Darmstadt, [Master thesis]

Bergner, Martin (2008):
Minimale Voraussetzungen für blinde Signaturen.
Technische Universität Darmstadt, [Master thesis]

Kühn, Ulrich ; Pyshkin, Andrei ; Tews, Erik ; Weinmann, Ralf-Philipp (2008):
Variants of Bleichenbacher's Low-Exponent Attack on PKCS#1 RSA Signatures.
In: Sicherheit 2008: Sicherheit, Schutz und Zuverlässigkeit, S. 97-109,
Saarbrücken, Germany, [Conference item]

Weber, Stefan (2008):
Coercion-Resistant Cryptographic Voting: Implementing Free and Secret Electronic Elections.
VDM Verlag Dr. Müller, [Book]

Araújo, Roberto ; Ryan, Peter Y. A. (2008):
Improving Farnel, Threeballot and Randell-Ryan Voting Schemes.
In: Cryptology ePrint Archive, 2008 (82), S. 1-21. International Association for Cryptologic Research (IACR), [Article]

Velyanova, Veneta (2008):
An Analysis of the Neff's Voter Verifiable Election Scheme.
Technische Universität Darmstat, [Master thesis]

Alkassar, Ammar ; Siekmann, Jörg (Hrsg.) (2008):
Sicherheit 2008: Sicherheit - Schutz und Zuverlässigkeit, Beiträge der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.v. (GI), 2.-4. April 2008 in Saarbrücken.
In: LNI, 128, In: Sicherheit 2008,
GI, ISBN 978-3-88579-222-2,
[Conference item]

Buchmann, Johannes ; Ding, Jintai (Hrsg.) (2008):
Post-Quantum Cryptography, Second International Workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17-19, 2008, Proceedings.
In: Lecture Notes in Computer Science, 5299, In: PQCrypto,
Springer, ISBN 978-3-540-88402-6,
[Conference item]

Buchmann, Johannes ; Ding, Jíntai (Hrsg.) (2008):
Post-Quantum Cryptography (PQCrypto 2008).
In: Lecture notes in computer science, 5299, Berlin, Heidelberg, New York, Springer, ISBN 978-3-540-88402-6,
[Book]

Grimaud, Gilles ; Standaert, François-Xavier (Hrsg.) (2008):
Smart Card Research and Advanced Applications, 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008. Proceedings.
In: Lecture Notes in Computer Science, 5189, In: CARDIS,
Springer, ISBN 978-3-540-85892-8,
[Conference item]

Grimaud, Gilles ; Standaert, François-Xavier (Hrsg.) (2008):
Smart Card Research and Advanced Applications, 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008. Proceedings.
LNCS 5189, Springer, London, UK, ISBN 978-3-540-85892-8,
[Conference item]

Hegering, Heinz-Gerd ; Lehmann, Axel ; Ohlbach, Hans Jürgen ; Scheideler, Christian (Hrsg.) (2008):
INFORMATIK 2008, Beherrschbare Systeme - dank Informatik, Band 1, Beiträge der 38. Jahrestagung der Gesellschaft für Informatik e.V. (GI), 8. - 13. September, in München.
In: LNI, 133, In: GI Jahrestagung (1),
GI, ISBN 978-3-88579-227-7,
[Conference item]

Kim, Sehun ; Yung, Moti ; Lee, Hyung-Woo (Hrsg.) (2008):
Information Security Applications, 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers.
In: Lecture Notes in Computer Science, 4867, In: WISA,
Springer, ISBN 978-3-540-77534-8,
[Conference item]

Krimmer, Robert ; Grimm, Rüdiger (Hrsg.) (2008):
3rd International Conference, Co-organized by Council of Europe, Gesellschaft für Informatik and E-Voting.CC, August 6th-9th, 2008 in Castle Hofen, Bregenz, Austria.
In: LNI, 131, In: Electronic Voting 2008,
GI, ISBN 978-3-88579-225-3,
[Conference item]

Bartsch, Steffen ; Bormann, Carsten
Horster, Patrick (Hrsg.) (2008):
Berechtigungsmodellierung im Geschäftsprozessmanagement von KMU.
In: D.A.CH. Security 2008,
syssec Verlag, [Conference item]

Biadatz, Adalbert (2008):
Server gesteuerte Chipkarten Aktualisierung.
Technische Universität Darmstadt, [Master thesis]

Brandl, Andreas (2008):
Implementierung eines Responders für CMP over HTTP zur Erstellung von CV- und X.509 Zertifikaten im Umfeld der elektronischen Gesundheitskarte.
Technische Universität Darmstadt, [Master thesis]

Buchmann, Johannes ; Dahmen, Erik ; Schneider, Michael
Buchmann, Johannes ; Ding, Jintai (Hrsg.) (2008):
Merkle Tree Traversal Revisited.
In: LNCS, In: PQCrypto 2008, S. 63-78,
Springer, [Conference item]

Buchmann, Johannes ; Döring, Martin ; Lindner, Richard (2008):
Efficiency Improvement for {NTRU}.
In: Lecture Notes in Informatics, In: Sicherheit 2008, S. 163-178,
Saarbrücken, [Conference item]

Buchmann, Johannes ; Lindner, Richard ; Rückert, Markus
Buchmann, Johannes ; Ding, Jintai (Hrsg.) (2008):
Explicit Hard Instances of the Shortest Vector Problem.
In: LNCS, In: PQCrypto 2008, S. 79-94,
ISBN 978-3-540-88402-6,
[Conference item]

Cakir-Tas, Sueheyla (2008):
Symmetrische Blockchiffren.
Technische Universität Darmstadt, [Master thesis]

Clos, Johannes (2008):
Secure Client Platforms for Remote Internet Voting.
Technische Universität Darmstadt, [Master thesis]

Detken, Kai-Oliver ; Gitz, Stephan ; Bartsch, Steffen ; Sethmann, Richard
Horster, Patrick (Hrsg.) (2008):
Trusted Network Connect -- {Sicherer Zugang ins Unternehmensnetz}.
In: D.A.CH. Security 2008,
syssec Verlag, [Conference item]

Dietrich, Christoph (2008):
Maximale Sicherheit im Identitymanagement bei optimaler Benutzbarkeit des Systems.
Technische Universität Darmstadt, [Master thesis]

Ding, Jintai ; Buchmann, Johannes ; Mohamed, Mohamed Saied Emam ; Mohamed, Wael Said Abd Elmageed ; Weinmann, Ralf-Philipp (2008):
MutantXL.
In: SCC 2008,
[Conference item]

Errabih, Abdelhafid (2008):
Entwurf und Implementierung eines Clients zur Funktionalitäts{ü}berpr{ü}fung von Chipkarten - am Beispiel des Heilberufsausweises.
Darmstadt, Technische Universität, [Bachelor thesis]

Gitter, Rotraud ; Langer, Lucie ; Okunick, Susanne ; Opitz-Talidou, Zoi (2008):
Long-term retention in e-voting -- Legal requirements and technical implementation.
131, In: Electronic Voting 2008, S. 109-126,
GI, ISBN 978-3-88579-225-3,
[Conference item]

Kern, Tobias (2008):
Next Generation Usability of Cryptography - Combining FlexiProvider and JCrypToo.
Technische Universität Darmstadt, [Master thesis]

Krimmer, Robert ; Volkamer, Melanie (2008):
Challenges Posted by Distance Voting in General: Postal Voting, and in Particular eVoting.
[Report]

Krimmer, Robert ; Volkamer, Melanie
Krishna, Jaya ; Agarwal, Naveen Kumar (Hrsg.) (2008):
Observing Threats to Voters Anonymity: Election Observation of Electronic Voting.
In: The Icfai University Press, In: E-Voting - Perspectives and Experiences,
[Conference item]

Langer, Lucie
Remenyi, Dan (Hrsg.) (2008):
Towards Legally Binding Online Elections in Germany.
In: Proceedings of the 4th International Conference on e-Government -- ICEG, Melbourne, Australia, S. 247-254,
ACI, ISBN 978-1-9066938-21-4,
[Conference item]

Langer, Lucie ; Schmidt, Axel ; Araújo, Roberto (2008):
A pervasively verifiable online voting scheme.
133, In: Informatik 2008, S. 457-462,
ISBN 978-3-88579-227-7,
[Conference item]

Langer, Lucie ; Schmidt, Axel ; Buchmann, Johannes (2008):
Secure Online Elections in Practice.
[Other]

Langer, Lucie ; Schmidt, Axel ; Buchmann, Johannes
Remenyi, Dan (Hrsg.) (2008):
Secure and Practical Online Elections via Voting Service Provider.
In: Proceedings of the 4th International Conference on e-Government -- ICEG, Melbourne, Australia, S. 255-262,
ACI, ISBN 978-1-9066938-21-4,
[Conference item]

Lehmann, Julian (2008):
Fast Elliptic Curve Operation Costs and Comparison of Sole Inversion Precomputation Schemes.
Technische Universität Darmstadt, [Master thesis]

Lei, Qin (2008):
Design and Implementation of Secure Email for BlackBerry Devices - Solutions in the enterprise contex.
Technische Universität Darmstadt, [Master thesis]

Längsfeld, Carsten (2008):
Entwurf und Implementierung eines OpenPGP Clients.
Technische Universität Darmstadt, [Master thesis]

Möller, Marco (2008):
Information Theoretical Models for Hierarchical Structured Agents and their Computation</a> - Informationtheoretische Modelle für hierarchisch strukturierte Agenten und ihre Berechnung (deutsche Zusammenfassung).
Technische Universit&auml;t Darmstadt, [Master thesis]

Nussbaumer, Mihaela (2008):
Elektronische (Langzeit-)Archivierung mit Hilfe digitaler Signaturen.
Technische Universität Darmstadt, [Master thesis]

Pyshkin, Andrey (2008):
Algebraic Cryptanalysis in Block Ciphers Using Gröbner Bases.
Technische Universit&auml;t Darmstadt,
[PhD thesis]

Rohde, Sebastian ; Eisenbarth, Thomas ; Dahmen, Erik ; Buchmann, Johannes ; Paar, Christof (2008):
Efficient Hash-Based Signatures on Embedded Devices.
In: SECSI - Secure Component and System Identification 2008,
[Conference item]

Ruseva, Desislava (2008):
Security Analysis of Quaternion Signatures.
Technische Universit&auml;t Darmstadt, [Master thesis]

Schelten, Kevin (2008):
On a Special Class of Lattices, Computational Problems, and Hash Functions.
Technische Universit&auml;t Darmstadt, [Master thesis]

Schneider, Michael (2008):
Improved Authentication Path Computation for Merkle Trees.
Technische Universit&auml;t Darmstadt, [Master thesis]

Tserovski, Lyudmil (2008):
Practical Security of Micciancios's Hash Function.
Technische Universit&auml;t Darmstadt, [Master thesis]

Velikov, Aleksandar (2008):
Provable Security of Merkle-Micciancio-Lyubashevsky's Signature.
Technische Universit&auml;t Darmstadt, [Master thesis]

Volkamer, Melanie ; Vogt, Roland (2008):
Basissatz von Sicherheitsanforderungen an Online-Wahlprodukte.
(BSI-PP-0037-2008), [Article]

2007

Karatsiolis, Evangelos (2007):
Flexible Certificate Management in Public Key Infrastructures.
Darmstadt, Technische Universität, TU Darmstadt,
[PhD thesis]

Yoseph, Berhane (2007):
Gegenmaßnahmen zu Seitenkanalangriffen.
Darmstadt, Technische Universität, [Bachelor thesis]

Ding, Jintai ; Lindner, Richard (2007):
Identifying Ideal Lattices.
In: Cryptology ePrint Archive, 2007 (322), S. 1-12. International Association for Cryptologic Research (IACR), [Article]

Dahmen, Erik ; Okeya, Katsuyuki ; Schepers, Daniel (2007):
Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography.
In: LNCS, 4586, In: ACISP 2007 - Australasian Conference on Information Security and Privacy, S. 245-258,
Springer, ISBN 978-3-540-73457-4,
DOI: 10.1007/978-3-540-73458-1_19,
[Conference item]

Overbeck, Raphael (2007):
Public Key Cryptography based on Coding Theory.
Darmstadt, Technische Universität, TU Darmstadt,
[PhD thesis]

Buchmann, Johannes ; Dahmen, Erik ; Klintsevich, Elena ; Okeya, Katsuyuki ; Vuillaume, Camille (2007):
Merkle Signatures with Virtually Unlimited Signature Capacity.
In: LNCS, 4521, In: ACNS 2007 - Applied Cryptography and Network Security, 5th International Conference, S. 31-45,
Springer, DOI: 10.1007/978-3-540-72738-5_3,
[Conference item]

Weber, Stefan Georg ; Araujo, Roberto ; Buchmann, Johannes (2007):
On coercion-resistant electronic elections with linear work.
In: The Second International Conference on Availability, Reliability and Security, 2007 : ARES 2007 ; 2nd International Workshop Dependability and Security in e-Government (DeSeGov 2007)...ISBN 0-7695-2775-2, 978-0-7695-2775-8 [Online-Ressource], S. 908-916, [Book section]

Katz, Jonathan ; Yung, Moti (Hrsg.) (2007):
Applied Cryptography and Network Security, 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings.
In: Lecture Notes in Computer Science, 4521, In: ACNS 2007,
Springer, ISBN 978-3-540-72737-8,
[Conference item]

Pieprzyk, Josef ; Ghodosi, Hossein ; Dawson, Ed (Hrsg.) (2007):
Information Security and Privacy, 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings.
In: Lecture Notes in Computer Science, 4586, In: ACISP 2007,
Springer, ISBN 978-3-540-73457-4,
[Conference item]

Abbé, Thomas (2007):
Implementierung eines qualifiziert signierenden Timestamping-Servers.
Darmstadt, Technische Universität, [Bachelor thesis]

Alkassar, Ammar ; Volkamer, Melanie (2007):
E-Voting and Identity -- First International Conference, VOTE-ID 2007.
[Article]

Araújo, Roberto ; Foulle, Sébastian ; Traoré, Jacques (2007):
A practical and secure coercion-resistant scheme for remote elections.
[Other]

Becker, Jochen (2007):
Kommunikation in einem Trustcenter Intra Trustcenter Protocol Version 1.2 Entwurf und Design.
Technische Universit&auml;t Darmstadt, [Master thesis]

Bennani, Younes (2007):
Optimierung de Flexsecures Online Certificate Status Protocol.
Technische Universit&auml;t Darmstadt, [Master thesis]

Blume, Sebastian (2007):
Efficient Java Implementation of GMSS.
Technische Universit&auml;t Darmstadt, [Master thesis]

Borisova, Zornitsa (2007):
Rankin Lattice Reduction for Programmers.
Technische Universit&auml;t Darmstadt, [Master thesis]

Buchmann, Johannes ; Vollmer, Ulrich (2007):
Binary Quadratic Forms. An Algorithmic Approach.
In: Algorithms and Computation in Mathematics, Springer Berlin/Heidelberg, ISBN 978-3-540-46367-2,
[Book]

Chen, Jun (2007):
Verifiable Mixnets Techniques and Prototype Implementation.
Technische Universit&auml;t Darmstadt, [Master thesis]

Dahmen, Erik ; Okeya, Katsuyuki ; Takagi, Tsuyoshi (2007):
A New Upper Bound for the Minimal Density of Joint Representations in Elliptic Curve Cryptosystems.
In: >IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, Special Section on Discrete Mathematics and Its Applications, E90-A (5), S. 952-959. [Article]

Ederov, Boris (2007):
Merkle Tree Traversal Techniques.
Technische Universit&auml;t Darmstadt, [Master thesis]

Engelbert, Daniela ; Overbeck, Raphael ; Schmidt, Arthur (2007):
A Summary of McEliece-Type SCryptosystems and their Security.
In: >Journal of Mathematical Cryptology, 1 (2), S. 151-199. [Article]

Ghiglieri, Marco (2007):
Flexible - Eine erweiterbare {GUI} für den FlexiProvider (Frontend).
Technische Universit&auml;t Darmstadt, [Master thesis]

Grimm, Rüdiger ; Volkamer, Melanie (2007):
Robustere Anforderungen für Online-Wahlen aufbauend auf dem Schutzprofil 'Zentrale Auforderungen für Online-Wahlen'.
[Report]

Helbach, Jörg ; Krimmer, Robert ; Meletiadou, Anastasia ; Meissner, Nils ; Volkamer, Melanie (2007):
Zukunft von Online-Wahlen - Aktuelle rechtliche, politische, soziale und technisch-organisatorische Fragen.
In: Datenschutz und Datensicherheit, 31 (6), S. 434-440. [Article]

Huthmann, Jan (2007):
Datengesteuerte Initialisierung komplexer Softwaresysteme als Voraussetzung zentralisierter Konfiguration.
Technische Universit&auml;t Darmstadt, [Master thesis]

Jonker, Hugo ; Volkamer, Melanie
Alkassar, Ammar ; Volkamer, Melanie (Hrsg.) (2007):
Compliance of RIES to the proposed e-voting protection profile.
In: VOTE-ID&#039;07, 4896, In: Proceedings of the 1st international conference on E-voting and identity, S. 50--61,
Springer-Verlag, Bochum, Germany, ISBN 3-540-77492-0, 978-3-540-77492-1,
[Conference item]

Krimmer, Robert ; Triessnig, Stefan ; Volkamer, Melanie
Alkassar, Ammar ; Volkamer, Melanie (Hrsg.) (2007):
The Development of Remote E-Voting Around the World: A Review of Roads and Directions.
In: VOTE-ID&#039;07, 4896, In: E-Voting and Identity, First International Conference, VOTE-ID 2007, S. 1-15,
Springer-Verlag, Bochum, Germany, ISBN 3-540-77492-0, 978-3-540-77492-1,
[Conference item]

Kutscher, Dirk ; Ott, Jörg ; Bartsch, Steffen (2007):
Supporting network access and service location in dynamic environments.
In: Campus-Wide Information Systems, 24 (4), S. 225. DOI: 10.1108/10650740710834626,
[Article]

Liu, Fen ; Ji, Wen ; Hu, Lei ; Ding, Jintai ; Lv, Shuwang ; Pyshkin, Andrei ; Weinmann, Ralf-Philipp (2007):
Analysis of the SMS4 Block Cipher.
In: ACISP, S. 158-170,
[Conference item]

Lulev, Hristo (2007):
Overview of Bit Commitment Schemes.
Technische Universit&auml;t Darmstadt, [Master thesis]

Matzies, Alexander (2007):
Implementierung flexibler Skalarmultiplikation auf Elliptischen Kurven.
Technische Universit&auml;t Darmstadt, [Master thesis]

Meziani, Mohammed (2007):
Konstruktion von Hashfunktionen.
Technische Universit&auml;t Darmstadt, [Master thesis]

Nauheimer, Frank (2007):
Development of a lattice based blind signature scheme.
Technische Universit&auml;t Darmstadt, [Master thesis]

Nguentcheu, Paul Cesar (2007):
Analyse, Design und Implementierung von Krypto-Verfahren zur sicheren Netzwerkkommunikation.
Technische Universit&auml;t Darmstadt, [Master thesis]

Oberender, Jens ; Volkamer, Melanie ; Meer, Hermann de (2007):
Denial-of-Service Flooding Detection in Anonymity Networks.
S. 1-6, [Conference item]

Pancheva, Krasimira (2007):
On Lattices, Codes and Regev{'}s Cryptosystem.
Technische Universit&auml;t Darmstadt, [Master thesis]

Rexroth, Peer ; Wiesmaier, Alexander (2007):
MAVA - Modular Security for Distributed Applications.
(TI-1/07), [Report]

Roth, Andreas (2007):
Flexible - Eine erweiterbare {GUI} f{\"u}r den FlexiProvider (Backend).
Technische Universit&auml;t Darmstadt, [Master thesis]

Rückert, Markus (2007):
Implementierung und Analyse von gitterbasierten Angriffen auf {NTRU}.
Technische Universität Darmstadt, [Master thesis]

Schmidt, Arthur (2007):
Zur Lösung von zahlentheoretischen Problemen mit klassischen und Quantencomputern.
Technische Universit&auml;t Darmstadt,
[PhD thesis]

Schuster, Dieter (2007):
Multivariate Interpolationsangriffe auf symmetrische Chiffren.
Technische Universit&auml;t Darmstadt, [Master thesis]

Schweickert, Ralf (2007):
Längerfristiger Zugriff auf verschlüsselte Daten bei Smartcard-basierten {PKI}-Lösungen.
Technische Universit&auml;t Darmstadt, [Master thesis]

Stifi, Musab Haj (2007):
{GMSS} Signatur Generation für {RFID} Tags.
Technische Universit&auml;t Darmstadt, [Master thesis]

Sögüt, Gökhan (2007):
Kombinierte Schwachstellenanalyse für schnelle Exponentiationen.
Technische Universit&auml;t Darmstadt, [Master thesis]

Tews, Erik (2007):
Attacks on the WEP protocol.
Technische Universit&auml;t Darmstadt, [Master thesis]

Tews, Erik ; Weinmann, Ralf-Philipp ; Pyshkin, Andrei (2007):
Breaking 104 Bit WEP in Less Than 60 Seconds.
In: WISA, S. 188-202,
[Conference item]

Tischhauser, Elmar (2007):
T-Funktionsbasierte Blockchiffren.
Technische Universit&auml;t Darmstadt, [Master thesis]

Tomova, Iskra (2007):
Implementierung eines Selbstbedienungsclients f{ü}r eine dezentral administrierbare Trustcenter-Lösung.
Technische Universit&auml;t Darmstadt, [Master thesis]

Vizev, Nikolay Vasilev (2007):
Side Channel Attacks on NTRUEncrypt.
Technische Universit&auml;t Darmstadt, [Master thesis]

Volkamer, Melanie ; Hauff, Harald (2007):
Zum Nutzen hoher Zertifizierungsstufen nach den Common Criteria (I).
In: Datenschutz und Datensicherheit, 9, S. 692-695. [Article]

Volkamer, Melanie ; Hauff, Harald (2007):
Zum Nutzen hoher Zertifizierungsstufen nach den Common Criteria (II).
In: Datenschutz und Datensicherheit, 10, S. 766-768. [Article]

Volkamer, Melanie ; Krimmer, Robert
Grönlund, Ake ; Scholl, Jochen ; Wimmer, Maria (Hrsg.) (2007):
Requirements and Evaluation Techniques for Online-Voting.
In: Schriftreihe Informatik, 24, In: Electronic Government 6th International EGOV Conference, S. 37-46,
Universitätsverlag Rudolf Trauner, [Conference item]

Volkamer, Melanie ; Krimmer, Robert ; Grimm, Rüdiger
Prosser, Alexander ; Parycek, Peter (Hrsg.) (2007):
Independent Audits of Remote Electronic Voting -- Developing a Common Criteria Protection Profile.
In: OCG Verlag, In: Proceedings of EDEM 2007; Tagungsband Elektronische Demokratie in "Osterreich, S. 115-126,
[Conference item]

Volkamer, Melanie ; McGaley, Margaret (2007):
Requirements and Evaluation Procedures for eVoting.
In: Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, S. 895-902,
IEEE Computer Society, [Conference item]

Weber, Stefan ; Araújo, Roberto ; Buchmann, Johannes (2007):
On Coercion-Resistant Electronic Elections with Linear Work.
In: >ares, 1, S. 908-916. IEEE Computer Society, DOI: http://doi.ieeecomputersociety.org/10.1109/ARES.2007.108,
[Article]

Yousfi Alaoui, Sidi Mohamed el (2007):
Konstruktion von Hashfunktionen.
Technische Universit&auml;t Darmstadt, [Master thesis]

2006

Buchmann, Johannes ; Garcia, Luis Carlos Coronado ; Dahmen, Erik ; Döring, Martin ; Klintsevich, Elena (2006):
{CMSS} - An Improved Merkle Signature Scheme.
In: LNCS, 4329, In: INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India, S. 349-363,
Springer, DOI: 10.1007/11941378_25,
[Conference item]

Lippert, Marcus ; Karatsiolis, Evangelos ; Wiesmaier, Alexander ; Buchmann, Johannes (2006):
Life-Cycle Management of X.509 Certifcates Based on LDAP Directories.
In: >Journal of Computer Security, 14 (5), S. 419-439. [Article]

Araújo, Roberto ; Wiesmaier, Alexander ; Buchmann, Johannes (2006):
The T-Vote Protocol.
(TI-3/06), [Report]

Buchmann, Johannes ; Ludwig, Christoph (2006):
Practical Lattice Basis Sampling Reduction.
In: LNCS, 4076, In: ANTS 2006: Algorithmic Number Theory, S. 222-237,
Springer, Berlin, ISBN 978-3-540-36075-9,
DOI: 10.1007/11792086_17,
[Conference item]

Overbeck, Raphael (2006):
Statistical Decoding Revisited.
In: LNCS, 4058, In: ACISP'06 - Proceedings of the 11th Australasian conference on Information Security and Privacy, S. 283-294,
Springer, ISBN 978-3-540-35458-1,
DOI: 10.1007/11780656_24,
[Conference item]

Schmidt, Arthur (2006):
Quantum Algorithm for Solving the Discrete Logarithm Problem in the Class Group of an Imaginary Quadratic Field and Security Comparison of Current Cryptosystems at the Beginning of Quantum Computer.
In: LNCS, 3595, In: Emerging Trends in Information and Communication Security, International Conference, ETRICS 2006, S. 481-493,
ISBN 3-540-34640-6,
DOI: 10.1007/11766155_34,
[Conference item]

Schmidt-Samoa, Katja (2006):
Contributions to Provable Security and Efficient Cryptography.
Darmstadt, Technische Universität, TU Darmstadt,
[PhD thesis]

Straub, Tobias (2006):
Usability Challenges of PKI.
Darmstadt, Technische Universität, TU Darmstadt,
[PhD thesis]

Kurosawa, Kaoru ; Schmidt-Samoa, Katja (2006):
New Online/Offline Signature Schemes Without Random Oracles.
In: LNCS, 3958, In: PKC 2006 - Public Key Cryptography, S. 330-346,
Springer, New York, NY, USA, ISBN 978-3-540-33851-2,
DOI: 10.1007/11745853_22,
[Conference item]

Lindner, Richard (2006):
Current Attacks on NTRU.
Technische Universit&auml;t Darmstadt, [Master thesis]

Meyer, Ulrike ; Wetzel, Susanne (2006):
Introducing History Enriched Security Context Transfer to Enhance the Security of Susequent Handover.
In: Workshop on Pervasive Computing and Communication Security,
IEEE, Pisa, Italy, DOI: 10.1109/PERCOMW.2006.70,
[Conference item]

Wiesmaier, Alexander ; Ludwig, Christoph ; Rauchschwalbe, Ulrich ; Henhapl, Birgit ; Ruppert, Markus ; Buchmann, Johannes (2006):
Intrinsically Legal-For-Trade Objects by Digital Signatures.
In: Sicherheit 2006: Sicherheit - Schutz und Zuverlässigkeit, Beiträge der 3. Jahrestagungdes Fachbereichs der Gesellschaft für Informatik e.V., S. 218--221,
Darmstadt, ISBN 3-88579-171-4,
[Conference item]

Wiesmaier, Alexander ; Rauchschwalbe, Ulrich ; Ludwig, Christoph ; Henhapl, Birgit ; Ruppert, Markus ; Buchmann, Johannes (2006):
Intrinsically Legal-For-Trade Objects by Digital Signatures.
In: LNI, P-77, In: SICHERHEIT 2006, Sicherheit - Schutz und Zuverlässigkeit, 3. Jahrestagung, S. 218-221,
Magdeburg, [Conference item]

Coronado García, Luis Carlos (2006):
Provably Secure and Practical Signature Schemes.
Darmstadt, Technische Universität, TU Darmstadt,
[PhD thesis]

Buchmann, Johannes ; Pyshkin, Andrei ; Weinmann, Ralf-Philipp (2006):
Block Ciphers Sensitive to Gröbner Basis Attacks.
In: Topics in Cryptology - CT-RSA 2006 <San Jose, CA, USA,2006> ; (Lecture Notes in Computer Science ; 3860) ; 313-331 ; ISBN: 3-540-31033-9, S. 313-331, [Conference item]

Buchmann, Johannes ; Pyshkin, Andrei ; Weinmann, Ralf-Philipp (2006):
A Zero-Dimensional Gröbner Basis for AES-128.
In: Fast software encryption : 13th International Workshop, FSE 2006; Graz, Austria, March 15 - 17, 2006; revised selected papers / Matthew Robshaw (Ed.). - Berlin ; Heidelberg [u.a.] : Springer, 2006, S. 78-88 (Lecture notes in computer science ; 4047) ISBN:, Berlin ; Heidelberg [u.a.], Springer, [Conference item]

Atzeni, Andrea ; Lioy, Antonio (Hrsg.) (2006):
Public Key Infrastructure, Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings.
In: Lecture Notes in Computer Science, 4043, In: EuroPKI 2006,
Springer, ISBN 3-540-35151-5,
[Conference item]

Barua, Rana ; Lange, Tanja (Hrsg.) (2006):
Progress in Cryptology - INDOCRYPT 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings.
In: Lecture Notes in Computer Science, 4329, In: INDOCRYPT 2006,
Springer, ISBN 3-540-49767-6,
[Conference item]

Batten, Lynn Margaret ; Safavi-Naini, Reihaneh (Hrsg.) (2006):
Information Security and Privacy, 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings.
In: Lecture Notes in Computer Science, 4058, In: ACISP 2006,
Springer, ISBN 3-540-35458-1,
[Conference item]

Dittmann, Jana (Hrsg.) (2006):
Sicherheit 2006: Sicherheit - Schutz und Zuverlässigkeit, Beiträge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg.
In: LNI, 77, In: Sicherheit 2006,
GI, ISBN 3-88579-171-4,
[Conference item]

Hess, Florian ; Pauli, Sebastian ; Pohst, Michael (Hrsg.) (2006):
Algorithmic Number Theory, 7th International Symposium, ANTS-VII, Berlin, Germany, July 23-28, 2006, Proceedings.
In: Lecture Notes in Computer Science, 4076, In: ANTS 2006,
Springer, ISBN 3-540-36075-1,
[Conference item]

Müller, Günter (Hrsg.) (2006):
Emerging Trends in Information and Communication Security, International Conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006, Proceedings.
In: Lecture Notes in Computer Science, 3995, In: ETRICS 2006,
Springer, ISBN 3-540-34640-6,
[Conference item]

Yung, Moti ; Dodis, Yevgeniy ; Kiayias, Aggelos ; Malkin, Tal (Hrsg.) (2006):
Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings.
In: Lecture Notes in Computer Science, 3958, In: PKC 2006,
Springer, ISBN 3-540-33851-9,
[Conference item]

Araújo, Roberto ; Custódio, Ricardo Felipe ; Wiesmaier, Alexander ; Takagi, Tsuyoshi (2006):
An Electronic Scheme for the Farnel Paper-Based Voting Protocol.
In: Industrial Track Proceedings of the 4th International Conference on Applied Cryptography and Network Security (ACNS 06), S. 78-91,
Springer, [Conference item]

Becker, Anja (2006):
Methods of Fault Analysis Attacks on Elliptic Curve Cryptosystems.
Technische Universit&auml;t Darmstadt, [Master thesis]

Buchmann, Johannes (2006):
Passwörter oder Smartcards zur Absicherung von Portalen?
(TI-2/06), [Report]

Buchmann, Johannes ; Dahmen, Erik ; May, Alexander ; Vollmer, Ulrich (2006):
Krypto 2020.
In: >The Information Security Journal -(KES), 5, S. 74-83. [Article]

Buchmann, Johannes ; May, Alexander ; Vollmer, Ulrich (2006):
Perspectives for cryptographic long-term security.
In: >Commun. ACM, 49 (9), S. 50-55. [Article]

Buchmann, Johannes ; May, Alexander ; Vollmer, Ulrich (2006):
Perspectives for cryptographic long-term security.
In: >Commun. ACM, 49 (9), DOI: 10.1145/1151055,
[Article]

Buchmann, Johannes ; Vollmer, Ulrich (2006):
CLC2006 - Workshop on Codes and Lattices in Cryptography.
[Other]

Buchmann, Johannes ; Vollmer, Ulrich (2006):
A Terr algorithm for computations in the infrastructure of real-quadratic number fields.
In: >Journal de Théorie des Nombres de Bordeaux, 18 (3), S. 559--572. [Article]

Drahavets, Maryia (2006):
Flexible Anbindung von Smartcards an eine Sicherheitsinfrastruktur.
Technische Universit&auml;t Darmstadt, [Master thesis]

Eckart, Marc (2006):
Verwaltung von Identitäten von {PKI} -Teilnehmern in der Registration Authority.
Technische Universit&auml;t Darmstadt, [Master thesis]

Fleck, Matthias (2006):
Zur Benutzbarkeit von {PKI}-Anwendungen im praktischen Einsatz.
Technische Universit&auml;t Darmstadt, [Master thesis]

Fritsch, Sebastian (2006):
Towards Secure Electronic Workflows Examples of Applied {PKI}.
Technische Universit&auml;t Darmstadt, [Master thesis]

Frommer, J. ; Wiesmaier, Alexander ; Araújo, Roberto ; Lippert, Marcus
Zhou, Jianying ; Yung, Moti ; Bao, Feng (Hrsg.) (2006):
On Firewalls and Tunneling.
In: Industrial Proceedings of the 4th International Conference on Applied Cryptography and Network Security (ACNS&#039;06), S. 190-205,
Singapore, [Conference item]

Grimm, Rüdiger ; Krimmer, Robert ; Meißner, Nils ; Reinhard, Kai ; Volkamer, Melanie ; Weinand, Marcel
Krimmer, Robert (Hrsg.) LNI, GI (Urheber) (2006):
Security Requirements for Non-political Internet Voting.
86, In: Electronic Voting (EVOTE) 2006, S. 203-212, Bonn, Gesellschaft für Informatik, ISBN 978-3-88579-180-5,
[Book section]

Grimm, Rüdiger ; Volkamer, Melanie
Krimmer, Robert (Hrsg.) (2006):
Multiple Cast in Online Voting - Analyzing Chances.
In: Springer LNI, 86, In: Electronic Voting 2006 - $2^{nd}$ International Conference, S. 97-106,
[Conference item]

Guaadaoui, Abdellah (2006):
Sicherheitsdefinitionen für Challenge-Response-Identifikationsverfahren.
Technische Universit&auml;t Darmstadt, [Master thesis]

Kaiser, Markus ; Buchmann, Johannes (2006):
Computer Verification in Cryptography.
12, In: International Conference on Computer Science-(ICCS&#039;06),
ISBN 975-00803-1-9,
[Conference item]

Kaiser, Markus ; Buchmann, Johannes (2006):
A Formal Approach for Proof Constructions in Cryptography.
In: >International Journal of Computer Science, 1, S. 195--203. [Article]

Klink, Alexander (2006):
Cryptographic Voting Protocols - A Prototype Design and Implementation for University Elections at {TU} Darmstadt.
Technische Universit&auml;t Darmstadt, [Master thesis]

Kotchourova, Inna (2006):
An Approach for Formal and Computer Verification in Cryptography.
Technische Universit&auml;t Darmstadt, [Master thesis]

Kusch, Sebastian (2006):
Formalizing the {DSA} Signature Scheme in Isabelle/{HOL}.
Technische Universit&auml;t Darmstadt, [Master thesis]

Köhler, Sabine (2006):
Sicherheitsparameter für das Okamoto-Tanaka-Uchiyama Quanten-Public-Key-Kryptosystem.
Technische Universit&auml;t Darmstadt, [Master thesis]

Langer, Lucie (2006):
Stromchiffren - Entwurf, Einsatz und Schwächen.
Technische Universit&auml;t Darmstadt, [Master thesis]

Meyer, Andreas (2006):
{"U}ber die Sicherheit und Effizienz kryptographischer Verfahren in algebraischen Zahlkörpern.
Technische Universit&auml;t Darmstadt,
[PhD thesis]

Niebuhr, Robert (2006):
Application of Algebraic-Geometric Codes in Cryptography.
Technische Universit&auml;t Darmstadt, [Master thesis]

Overbeck, Raphael (2006):
Extending Gibson's attacks on the {GPT} Cryptosystem.
In: Lecture Notes in Computer Science, 3969/2006, In: Coding and Cryptography, S. 178-188,
Springer Berlin/Heidelberg, ISBN 978-3-540-35481-9,
DOI: 10.1007/11779360_15,
[Conference item]

Peter, Markus (2006):
Angriffe auf das {McEliece} Kryptosystem.
Technische Universit&auml;t Darmstadt, [Master thesis]

Rauchschwalbe, Ulrich ; Wiesmaier, Alexander ; Ludwig, Christoph ; Buchmann, Johannes (2006):
Digital Signierte Wägeresultate - Neue Wege in der Sicherung eichfähiger Messwerte.
In: Wägen, Dosieren, Mischen - (WDM), (3), S. 23-27. [Article]

Schmidt, Axel (2006):
Analyse von auf {C*} basierenden Public Key Chiffren.
Technische Universit&auml;t Darmstadt, [Master thesis]

Schmidt-Samoa, Katja (2006):
A New Rabin-type Trapdoor Permutation Equivalent to Factoring.
In: >Electronic Notes in Theoretical Computer Science, 157 (3), S. 79-94. [Article]

Schmidt-Samoa, Katja ; Semay, Olivier ; Takagi, Tsuyoshi (2006):
Analysis of Fractional Window Recoding Methods and Their Application to Elliptic Curve Cryptosystems.
In: >IEEE Transactions on Computers, 55 (1), S. 48-57. [Article]

Seipp, Michele-Yvonne (2006):
Formalisation of Proofs in Cryptography.
Technische Universit&auml;t Darmstadt, [Master thesis]

Straub, Tobias ; Hartl, Manuel ; Ruppert, Markus (2006):
Digitale Reisepässe in Deutschland . Prozesse und Sicherheits-Infrastruktur.
In: Sicherheit 2006 - "Sicherheit Schutz und Sicherheit", S. 233-243,
[Conference item]

Velikova, Zaharina (2006):
A Lattice Attack on the McEliece Public Key Cryptosystem.
Technische Universit&auml;t Darmstadt, [Master thesis]

Volkamer, Melanie ; Alkassar, Ammar ; Sadeghi, Ahmad-Reza ; Schulz, Stefan (2006):
Enabling the Application of Open Systems like PCs for Online Voting.
In: Frontiers in Electronic Elections -- FEE &#039;06, url{http://fee.iavoss.org/2006/papers/fee-2006-iavoss-Enabling_the_applicat ion_of_open_systems_like-PCs_for_Online_Voting.pdf},
[Conference item]

Volkamer, Melanie ; Krimmer, Robert (2006):
Die Online-Wahl auf dem Weg zum Durchbruch.
In: Informatik Spektrum, 29 (2), S. 98-113. [Article]

Volkamer, Melanie ; Krimmer, Robert (2006):
Observing Voter's Anonymity: Guide on how to Observe Electronic Voting.
[Report]

Volkamer, Melanie ; Krimmer, Robert (2006):
Secrecy forever? Analysis of Anonymity in Internet-based Voting Protocols.
In: {IEEE Computer Society} % todo eigenlich publisher, In: Proceedings of the The First International Conference on Availability, Reliability and Security, ARES 2006, The International Dependability Conference - Bridging Theory and Practice, S. 340-347,
[Conference item]

Volkamer, Melanie ; Reinhard, Walter ; Vogt, Roland
Dittmann, Jana (Hrsg.) (2006):
FUSE - ein Internetwahlsystem für zeitlich unbegrenzt geheime Betriebswahlen.
In: Springer LNI, 77, In: Sicherheit 2006: Sicherheit - Schutz und Zuverlässigkeit, Beiträge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), S. 159-170,
[Conference item]

Volkamer, Melanie ; Vogt, Roland (2006):
New Generation of Voting Machines in Germany The Hamburg Way to Verify Correctness.
In: In Frontiers in Electronic Elections - FEE &#039;06, url{http://fee.iavoss.org/2006/papers/fee-2006-iavoss-New-Generation-of-Vot ing-Machines-in-Germany.pdf},
[Conference item]

Weber, Stefan (2006):
A Coercion-Resistant Cryptographic Voting Protocol - Evaluation and Prototype Implementation.
Technische Universit&auml;t Darmstadt, [Master thesis]

Weber, Stefan (2006):
A Coercion-Resistant Cryptographic Voting Protocol - Evaluation and Prototype Implementation.
Technische Universität Darmstadt, [Master thesis]

Wiesmaier, Alexander (2006):
The State of the Art in Algorithmic Encryption.
(TI-1/06), [Report]

2005

Dahmen, Erik (2005):
Efficient Algorithms for Multi-Scalar Multiplications.
Technische Universit&auml;t Darmstadt, [Master thesis]

Lippert, Marcus ; Karatsiolis, Evangelos ; Wiesmaier, Alexander ; Buchmann, Johannes (2005):
Directory Based Registration in Public Key Infrastructures.
In: The 4th International Workshop for Applied PKI (IWAP’05), S. 17-32,
IOS Press, [Conference item]

Overbeck, Raphael (2005):
A New Structural Attack for GPT and Variants.
In: LNCS, In: Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, S. 50-63,
Springer, Kuala Lumpur, Malaysia, ISBN 3-540-28938-0,
DOI: 10.1007/11554868_5,
[Conference item]

Schmidt-Samoa, Katja ; Takagi, Tsuyoshi (2005):
Paillier's Cryptosystem Modulo p2q and Its Applications to Trapdoor Commitment Schemes.
In: LNCS, 3715, In: Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, S. 296-313,
Springer, Kuala Lumpur, Malaysia, ISBN 3-540-28938-0,
DOI: 10.1007/11554868_21,
[Conference item]

Straub, Tobias ; Ginkel, Thilo-Alexander ; Buchmann, Johannes (2005):
A Multipurpose Delegation Proxy for WWW/ Credentials.
In: LNCS, 3545, In: EuroPKI 2005 - Public Key Infrastructure, Second European PKI Workshop: Research and Applications, S. 1-21,
Springer, ISBN 3-540-28062-6,
[Conference item]

Wiesmaier, Alexander ; Karatsiolis, Vangelis ; Lippert, Marcus ; Buchmann, Johannes (2005):
The Workshop - Implementing Well Structured Enterprise Applications.
In: SERP 2005 - International Conference on Software Engineering Research and Practice, S. 947-,
CSREA Press, Las Vegas, Nevada, USA, ISBN 1-932415-50-5,
[Conference item]

Wiesmaier, Alexander ; Lippert, Marcus ; Karatsiolis, Vangelis ; Raptis, Georgios ; Buchmann, Johannes (2005):
An Evaluated Certification Services System for the German National Root CA - Legally binding and trustworthy Transactions in E-Business and E-Government.
In: EEE 2005 - International Conference on E-Business, Enterprise Information Systems, E-Government, and Outsourcing, S. 103-110,
CSREA Press, Las Vegas, Nevada, USA, ISBN 1-932415-76-9,
[Conference item]

Schmidt, Arthur ; Vollmer, Ulrich (2005):
Polynomial time quantum algorithm for the computation of the unit group of a number field.
In: STOC 2005 - Proceedings of the 37th Annual ACM Symposium on Theory of Computing, S. 475-480,
ACM, Baltimore, MD, USA, ISBN 1-58113-960-8,
DOI: 10.1145/1060590.1060661,
[Conference item]

Wiesmaier, Alexander ; Fischer, Mike ; Lippert, Marcus ; Buchmann, Johannes (2005):
Outflanking and Securely Using the PIN/TAN-System.
In: SAM 2005 - International Conference on Security and Management, S. 313-319,
CSREA Press, Las Vegas, Nevada, USA, ISBN 1-932415-82-3,
[Conference item]

Wirt, Kai (2005):
Fault Attack on the {DVB} Common Scrambling Algorithm.
In: LNCS, 3481, In: ICCSA 2005 - Computational Science and Its Applications, S. 577-584,
Springer, Singapore, ISBN 3-540-25861-2,
DOI: 10.1007/11424826_61,
[Conference item]

Karatsiolis, Evangelos ; Lippert, Marcus ; Wiesmaier, Alexander (2005):
Planning for Directory Services in Public Key Infrastructures.
In: LNI, 62, In: Sicherheit 2005: Sicherheit - Schutz und Zuverlässigkeit, Beiträge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.v. (GI), S. 349-360,
GI, Regensburg, ISBN 3-88579-391-1,
[Conference item]

Hühnlein, Detlef (2005):
Kryptosysteme auf Basis imaginärquadratischer Nichtmaximalordnungen.
Darmstadt, Technische Universität, TU Darmstadt,
[PhD thesis]

Arabnia, Hamid (Hrsg.) (2005):
Proceedings of The 2005 International Conference on E-Business, Enterprise Information Systems, E-Government, and Outsourcing, EEE 2005, Las Vegas, Nevada, USA, June 20-23, 2005.
In: CSREA EEE 2005,
CSREA Press, ISBN 1-932415-76-9,
[Conference item]

Arabnia, Hamid (Hrsg.) (2005):
Proceedings of The 2005 International Conference on Security and Management, SAM 2005, Las Vegas, Nevada, USA, June 20-23, 2005.
In: Security and Management (SAM) 2005,
CSREA Press, ISBN 1-932415-82-3,
[Conference item]

Arabnia, Hamid ; Reza, Hassan (Hrsg.) (2005):
Proceedings of the International Conference on Software Engineering Research and Practice, SERP 2005, Las Vegas, Nevada, USA, June 27-29, 2005, Volume 2.
In: SERP 2005 (volume 2),
CSREA Press, ISBN 1-932415-50-5,
[Conference item]

Chadwick, David ; Zhao, Gansen (Hrsg.) (2005):
Public Key Infrastructure, Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005, Revised Selected Papers.
In: Lecture Notes in Computer Science, 3545, In: EuroPKI 2005,
Springer, ISBN 3-540-28062-6,
[Conference item]

Dawson, Ed ; Vaudenay, Serge (Hrsg.) (2005):
Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings.
In: Lecture Notes in Computer Science, 3715, In: Mycrypt 2005,
Springer, ISBN 3-540-28938-0,
[Conference item]

Federrath, Hannes (Hrsg.) (2005):
Sicherheit 2005: Sicherheit - Schutz und Zuverlässigkeit, Beiträge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.v. (GI), 5.-8. April 2005 in Regensburg.
In: LNI, 62, In: Sicherheit 2005,
GI, ISBN 3-88579-391-1,
[Conference item]

Gabow, Harold ; Fagin, Ronald (Hrsg.) (2005):
Proceedings of the 37th Annual ACM Symposium on Theory of Computing, Baltimore, MD, USA, May 22-24, 2005.
In: STOC 2005,
ACM, ISBN 1-58113-960-8,
[Conference item]

Gervasi, Osvaldo ; Gavrilova, Marina ; Kumar, Vipin ; LaganÃ, Antonio ; Lee, Heow Pueh ; Mun, Youngsong ; Taniar, David ; Tan, Chih Jeng Kenneth (Hrsg.) (2005):
Computational Science and Its Applications - ICCSA 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part II.
In: Lecture Notes in Computer Science, 3481, In: ICCSA 2005,
Springer, ISBN 3-540-25861-2,
[Conference item]

Alkassar, Ammar ; Krimmer, Robert ; Volkamer, Melanie (2005):
Online-Wahlen für Gremien -- Wahlen in Gremien als Einsatzgebiet für Wahlen ohne vertrauenswürdige Instanz.
In: Datenschutz und Datensicherheit, 8, S. 480-482. [Article]

Baier, Harald ; Straub, Tobias (2005):
Awareness by Doing. Ein neues Konzept zur Sensibilisierung von {IT}-Anwendern.
[Other]

Bakuri, Harini (2005):
Security Analysis and Implementation of Password-based Cryptosystem.
Technische Universit&auml;t Darmstadt, [Master thesis]

Coronado, Carlos (2005):
Can Schönhage multiplication speed up the RSA decryption or encryption?
In: Conference on Cryptology - MoraviaCrypt '05,
[Conference item]

Coronado, Carlos (2005):
Improvements to the Merkle signature scheme.
In: Conference on Cryptology - MoraviaCrypt &#039;05,
[Conference item]

Dahmen, Erik ; Okeya, Katsuyuki ; Takagi, Tsuyoshi (2005):
Efficient Left-to-Right Multi-Exponentiations.
(TI-2/05), [Report]

Fan, Rong (2005):
On the Efficiency Analysis of {wNAF} and {wMOF}.
Technische Universit&auml;t Darmstadt, [Master thesis]

Kraatz, Sarah (2005):
Generische Konstruktion von Fail-Stop Signatur Schemata.
Technische Universit&auml;t Darmstadt, [Master thesis]

Kramer, Kai (2005):
Trustcentermigration - Umstellung von {LiDIA-CA} auf evaluierte Prozesse.
Technische Universit&auml;t Darmstadt, [Master thesis]

Krimmer, Robert ; Volkamer, Melanie
Schweighöfer, Erich ; Liebwald, Doris ; Augeneder, Silvia ; Menzel, Thomas (Hrsg.) (2005):
Wählen auf Distanz: Ein Vergleich zwischen elektronischen und nicht elektronischen Verfahren.
In: Boorberg Verlag, In: Effizienz von e-Lösungen in Staat und Gesellschaft, Aktuelle Fragen zur Rechtsinformatik IRIS 2005, S. 256-262,
[Conference item]

Laabs, M. ; Merz, M. ; Wunderlich, J. ; Straub, T. (2005):
Benutzbarkeitsevaluation von Trustcenter-Software am Beispiel der Windows 2003 Server {CA}.
In: D-A-CH Security,
[Conference item]

Ludwig, Christoph (2005):
Practical Lattice Basis Sampling Reduction.
Technische Universit&auml;t Darmstadt,
[PhD thesis]

Meyer, Ulrike (2005):
Secure Roaming and Handover Procedures in Wireless Access Networks.
Technische Universit&auml;t Darmstadt,
[PhD thesis]

Meyer, Ulrike ; Cordasco, Jared ; Wetzel, Susanne
Choi, Sunghyun ; Buddhikot, Milind ; Cigno, Renato Lo (Hrsg.) (2005):
An approach to enhance inter-provider roaming through secret sharing and its application to {WLAN}s.
In: WMASH, S. 1-13,
ACM, ISBN 1-59593-143-0,
[Conference item]

Penev, Tsvetan (2005):
Identity Based Public Key Infrastructures.
Technische Universit&auml;t Darmstadt, [Master thesis]

Peter, Markus (2005):
Effizienz- und Sicherheitsanalyse von Micropayment Systemen.
[Other]

Poeplau, Lea (2005):
Counting Points on Elliptic Curves.
Technische Universit&auml;t Darmstadt, [Master thesis]

Roth, Volker ; Straub, Tobias ; Richter, Kai (2005):
Security and usability engineering with particular attention to electronic mail.
In: >International Journal of Man-Machine Studies, 63 (1-2), S. 51-73. [Article]

Satanovski, Vladislav (2005):
Zentralisierte Konfigurationsverwaltung komplexer IT-Systeme.
Technische Universit&auml;t Darmstadt, [Master thesis]

Seudié, Hervé (2005):
Anwendungen von Digitalen Identitäten an einer Hochschule.
Technische Universit&auml;t Darmstadt, [Master thesis]

Stegers, Till (2005):
Analysis of Faug&eacute;re&rsquo;s F5 Algorithm.
Technische Universit&auml;t Darmstadt, [Master thesis]

Tomova, Iskra (2005):
Card Manager: Entwurf und Implementierung.
[Other]

Weinmann, Ralf-Philipp (2005):
3. Krypto-Tag - Workshop über Kryptographie.
(TI-1/05), [Report]

Weinmann, Ralf-Philipp ; Wirt, Kai (2005):
Analysis of the {DVB} Common Scrambling Algorithm.
In: Communications and Multimedia Security, S. 195-207,
Springer Boston, ISBN 0-387-24485-9,
DOI: 10.1007/b105674,
[Conference item]

2004

Sato, Hisayoshi ; Schepers, Daniel ; Takagi, Tsuyoshi (2004):
Exact Analysis of Montgomery Multiplication.
In: LNCS, 3348, In: INDOCRYPT 2004 - 5th International Conference on Cryptology in India, S. 290-304,
Springer, Chennai, India, ISBN 3-540-24130-2,
[Conference item]

Buchmann, Johannes ; Coronado, Carlos ; Döring, Martin ; Engelbert, Daniela ; Ludwig, Christoph ; Overbeck, Raphael ; Schmidt, Arthur ; Vollmer, Ulrich ; Weinmann, Ralf-Philipp (2004):
Post-Quantum Signatures.
In: Cryptology ePrint Archive, 2004 (297), S. 1-30. International Association for Cryptologic Research (IACR), [Article]

Meyer, Ulrike ; Wetzel, Susanne (2004):
A man-in-the-middle attack on {UMTS}.
In: Workshop on Wireless Security 2004, S. 90-97,
ACM, Philadelphia, PA, USA, ISBN 1-58113-925-X,
DOI: 10.1145/1023646.1023662,
[Conference item]

Vogt, Holger (2004):
Fairer Austausch.
Darmstadt, Technische Universität, TU Darmstadt,
[PhD thesis]

Wiesmaier, Alexander ; Lippert, Marcus ; Karatsiolis, Vangelis (2004):
The Key Authority - Secure Key Management in Hierarchical Public Key Infrastructures.
In: Security and Management 2004, S. 89-93,
Las Vegas, Nevada, USA, ISBN 1-932415-37-8,
[Conference item]

Srimani, Pradip (Hrsg.) (2004):
International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 2, April 5-7, 2004, Las Vegas, Nevada, USA.
In: ITCC 2004),
IEEE Computer Society, [Conference item]

Okeya, Katsuyuki ; Takagi, Tsuyoshi ; Vuillaume, Camille (2004):
On the Importance of Protecting {$Delta$} in {SFLASH} against Side Channel Attacks.
In: Itcc 2004: International Conference on Information Technology: Coding and Computing, S. 560-568,
Las Vegas, Nevada, USA, [Conference item]

Straub, Tobias ; Heinemann, Andreas (2004):
An anonymous bonus point system for mobile commerce based on word-of-mouth recommendation.
In: ACM SAC 2004 - Proceedings of the 2004 ACM Symposium on Applied Computing, S. 766-773,
Nicosia, Cyprus, ISBN 1-58113-812-1,
DOI: 10.1145/967900.968059,
[Conference item]

Arabnia, Hamid ; Aissi, Selim ; Mun, Youngsong (Hrsg.) (2004):
Proceedings of the International Conference on Security and Management, SAM '04, June 21-24, 2004, Las Vegas, Nevada, USA.
In: Security and Management (SAM) 2004,
CSREA Press, ISBN 1-932415-37-8,
[Conference item]

Canteaut, Anne ; Viswanathan, Kapalee (Hrsg.) (2004):
Progress in Cryptology - INDOCRYPT 2004, 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings.
In: Lecture Notes in Computer Science, 3348, In: INDOCRYPT 2004,
Springer, ISBN 3-540-24130-2,
[Conference item]

Franklin, Matthew (Hrsg.) (2004):
Advances in Cryptology - CRYPTO 2004, 24th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 2004, Proceedings.
In: Lecture Notes in Computer Science, 3152, In: CRYPTO 2004,
Springer, ISBN 3-540-22668-0,
[Conference item]

Haddad, Hisham ; Omicini, Andrea ; Wainwright, Roger ; Liebrock, Lorie (Hrsg.) (2004):
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), Nicosia, Cyprus, March 14-17, 2004.
In: ACM SAC 2004,
ACM, ISBN 1-58113-812-1,
[Conference item]

Jakobsson, Markus ; Perrig, Adrian (Hrsg.) (2004):
Proceedings of the 2004 ACM Workshop on Wireless Security, Philadelphia, PA, USA, October 1, 2004.
In: Workshop on Wireless Security 2004,
ACM, ISBN 1-58113-925-X,
[Conference item]

Katsikas, Sokratis ; Gritzalis, Stefanos ; Lopez, Javier (Hrsg.) (2004):
Public Key Infrastructure, First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings.
In: Lecture Notes in Computer Science, 3093, In: EuroPKI 2004,
Springer, ISBN 3-540-22216-2,
[Conference item]

Lopez, Javier ; Qing, Sihan ; Okamoto, Eiji (Hrsg.) (2004):
Information and Communications Security, 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004, Proceedings.
In: Lecture Notes in Computer Science, 3269, In: ICICS 2004,
Springer, ISBN 3-540-23563-9,
[Conference item]

Baier, Harald ; Ruppert, Markus (2004):
Interoperable and Flexible Digital Signatures for {E-Government} and {E-Commerce}.
(TI-6/04), [Report]

Biehl, Ingrid ; Paulus, Sachar ; Takagi, Tsuyoshi (2004):
Efficient Undeniable Signature Schemes Based on Ideal Arithmetic in Quadratic Orders.
In: >IJDCC: Designs, Codes and Cryptography, 31 (2), S. 99-123. [Article]

Buchmann, Johannes ; Takagi, Tsuyoshi ; Vollmer, Ulrich (2004):
Number field cryptography.
41, In: High Primes and Misdemeanours: Lectures in Honour of the 60th Birthday of Hugh Cowie Williams, S. 111-125,
ISBN 200-8218-3353-7,
[Conference item]

Ginkel, Thilo-Alexander (2004):
Entwurf und Implementierung eines Authentifikations-Proxys für das World Wide Web.
Technische Universit&auml;t Darmstadt, [Master thesis]

Grahl, Alexander ; Kiss, Tekla (2004):
Entwurf und Implementierung einer {Web-Test} Anwendung und Integrierung in die Eclipse {IDE}.
Technische Universit&auml;t Darmstadt, [Master thesis]

Homann, Frank (2004):
Flexibles Datenbankmodell für {TrustCenter}.
Technische Universit&auml;t Darmstadt, [Master thesis]

Karatsiolis, Vangelis ; Lippert, Marcus ; Wiesmaier, Alexander (2004):
Using {LDAP} Directories for Management of {PKI} Processes.
3093, In: Public Key Infrastructure, S. 126-134,
Springer Berlin/Heidelberg, ISBN 978-3-540-22216-3,
[Conference item]

Karatsiolis, Vangelis ; Lippert, Marcus ; Wiesmaier, Alexander ; Pitaev, Anna ; Ruppert, Markus ; Buchmann, Johannes (2004):
Towards a Flexible {Intra-Trustcenter} Management Protocol.
In: >CoRR, cs.CR/0411067, [Article]

Lue, Feng (2004):
Security Analysis of {RSA} Cryptosystem Against Side Channel Attacks.
Technische Universit&auml;t Darmstadt, [Master thesis]

Meyer, Ulrike ; Kastell, Kira ; Fernandez-Pello, Adrian ; Perez, Diego ; Jakoby, Rolf (2004):
Advantage and Use of a Location Based Handover Algorithm.
In: IEEE conference VTC2004-Fall,
[Conference item]

Meyer, Ulrike ; Wetzel, Susanne (2004):
On the Impact of GSMs Encryption and Man-in-the-middle Attacks on the Security of Interoperating GSM/UMTS Networks.
The 15th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications - PIMRC 2004, Barcelona, Spain, 5-8 September 2004, DOI: 10.1109/PIMRC.2004.1368846,
[Conference item]

Müller, Tobias (2004):
Sicherheitsparameter für Regevs Kryptosystem.
Technische Universit&auml;t Darmstadt, [Master thesis]

Okeya, Katsuyuki ; Schmidt-Samoa, Katja ; Spahn, Christian ; Takagi, Tsuyoshi (2004):
Signed Binary Representations Revisited.
In: LNCS, 3152, In: CRYPTO 2004, S. 123-139,
Springer, Advances in cryptology : proceedings / CRYPTO 2004, 24th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15 - 19, 2004, [Conference item]

Okeya, Katsuyuki ; Takagi, Tsuyoshi ; Vuillaume, Camille (2004):
On the Importance of Protecting {$Delta$} in {SFLASH} against Side Channel Attack.
(TI-8/04), [Report]

Overbeck, Raphael (2004):
Potential und Grenzen der Anwendung von Gitterreduktionsalgorithmen in der Kryptographie.
Technische Universit&auml;t Darmstadt, [Master thesis]

Pape, Sebastian (2004):
Sicherheitsmodelle für das Ajtai-Dwork-Kryptosystem.
Technische Universit&auml;t Darmstadt, [Master thesis]

Pitaev, Anna (2004):
Entwurf und Implementierung einer Revokationskomponente für ein {Java}-basiertes Trustcenter.
Technische Universit&auml;t Darmstadt, [Master thesis]

Sato, Hisayoshi ; Schepers, Daniel ; Takagi, Tsuyoshi (2004):
Exact Analysis of Montgomery Multiplication.
(TI-2/04), [Report]

Schmidt, Arthur ; Vollmer, Ulrich (2004):
Polynomial Time Quantum Algorithm for the Computation of the Unit Group of a Number Field.
(TI-1/04), [Report]

Schmidt-Samoa, Katja (2004):
Factorization-based Fail-Stop Signatures Revisited.
(TI-7/04), [Report]

Schmidt-Samoa, Katja ; Semay, Olivier ; Takagi, Tsuyoshi (2004):
Analysis of Some Efficient Window Methods and their Application to Elliptic Curve Cryptosystems.
(TI-3/04), [Report]

Schwierz, Sebastian (2004):
Sicherheitsanalyse für Langzeitsicherheit von Public-Key Verfahren.
Technische Universit&auml;t Darmstadt, [Master thesis]

Seiffert, Björn (2004):
Erweiterung der {Flexi-PKI} um einen {UMP}-Update-Service.
Technische Universit&auml;t Darmstadt, [Master thesis]

Semay, Olivier (2004):
Efficiency analysis of window methods using {Markov} chains.
Technische Universit&auml;t Darmstadt, [Master thesis]

Straub, Tobias (2004):
A Method for Strengthening Certificate Enrollment.
In: WartaCrypt 2004,
Bedlewo, Poland, [Conference item]

Straub, Tobias ; Baier, Harald (2004):
A Framework for Evaluating the Usability and the Utility of PKI-enabled Applications.
(TI-5/04), [Report]

Straub, Tobias ; Baier, Harald (2004):
A Framework for Evaluating the Usability and the Utility of {PKI}-enabled Applications.
3093, In: EUROPKI 2004, S. 112-125,
Springer, [Conference item]

Stögbauer, Marcus (2004):
Efficient Algorithms for Pairing-Based Cryptosystems.
Technische Universit&auml;t Darmstadt, [Master thesis]

Volkamer, Melanie ; Hutter, Dieter
Prosser, Alexander ; Krimmer, Robert (Hrsg.) (2004):
From Legal Principles to an Internet Voting System.
In: Springer LNI, 47, In: Electronic Voting in Europe - Technology, Law, Politics and Society, S. 111-120,
[Conference item]

Vuillaume, Camille (2004):
Side Channel Attacks on Elliptic Curve Cryptosystems.
Technische Universit&auml;t Darmstadt, [Master thesis]

Weimer, Daniel (2004):
An Adaption of the {NICE} Crytosystem to Real Quadratic Orders.
Technische Universit&auml;t Darmstadt, [Master thesis]

2003

Kurosawa, Kaoru ; Schmidt-Samoa, Katja ; Takagi, Tsuyoshi (2003):
A Complete and Explicit Security Reduction Algorithm for RSA-Based Cryptosystems.
In: LNCS, 2894, In: ASIACRYPT 2003 - 9th International Conference on the Theory and Application of Cryptology and Information Security, S. 474-491,
Springer, Taipei, Taiwan, ISBN 3-540-20592-6,
DOI: 10.1007/b94617,
[Conference item]

Ludwig, Christoph (2003):
A Faster Lattice Reduction Method Using Quantum Search.
In: LNCS, 2906, In: ISAAC 2003 - Algorithms and Computation, 14th International Symposium, S. 199-208,
Springer, Kyoto, Japan, ISBN 3-540-20695-7,
[Conference item]

Möller, Bodo (2003):
Improved Techniques for Fast Exponentiation.
In: LNCS, 2587, In: ICISC 2002 - Information Security and Cryptology - 5th International Conference, S. 298-312,
Springer, ISBN 3-540-00716-4,
[Conference item]

Akishita, Toru ; Takagi, Tsuyoshi (2003):
Zero-Value Point Attacks on Elliptic Curve Cryptosystem.
In: LNCS, 2851, In: ISC 2003 - Information Security, 6th International Conference, S. 218-233,
Springer, Bristol, UK, ISBN 3-540-20176-9,
[Conference item]

Möller, Bodo (2003):
Provably Secure Public-Key Encryptionfor Length-Preserving Chaumian Mixes.
In: LNCS, 2612, In: CT-RSA 2003 - Topics in Cryptology, The Cryptographers' Track at the RSA Conference 2003, S. 244-262,
Springer, San Francisco, CA, USA, ISBN 3-540-00847-0,
[Conference item]

Möller, Bodo (2003):
Improved Techniques for Fast Exponentiation.
In: LNCS, 2587, In: ICISC 2002 - Information Security and Cryptology, S. 298-312,
Springer, Seoul, Korea, ISBN 978-3-540-00716-6,
[Conference item]

Baier, Harald ; Buchmann, Johannes ; Busch, Christoph (2003):
Aus- und Weiterbildung in IT-Sicherheit.
In: IT-Sicherheit im verteilten Chaos : Tagungsband 8. Deutscher IT-Sicherheitskongress des BSI 2003 / Bundesamt für Sicherheit in der Informationstechnik.- Ingelheim : SecuMedia Verl., 2003.- 531 S.- ISBN 3-922746-49-7.- S. 179-190, Ingelheim, SecuMedia Verl., [Conference item]

Boyd, Colin ; Mao, Wenbo (Hrsg.) (2003):
Information Security, 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings.
In: Lecture Notes in Computer Science, 2851, In: ISC 2003,
Springer, ISBN 3-540-20176-9,
[Conference item]

Dittrich, Klaus ; König, Wolfgang ; Oberweis, Andreas ; Rannenberg, Kai ; Wahlster, Wolfgang (Hrsg.) (2003):
INFORMATIK 2003 - Innovative Informatikanwendungen, Band 2, Beiträge der 33. Jahrestagung der Gesellschaft für Informatik e.V. (GI), 29. September - 2. Oktober 2003 in Frankfurt am Main.
In: LNI, 35, In: INFORMATIK 2003,
GI, ISBN 3-88579-364-4,
[Conference item]

Ibaraki, Toshihide ; Katoh, Naoki ; Ono, Hirotaka (Hrsg.) (2003):
Algorithms and Computation, 14th International Symposium, ISAAC 2003, Kyoto, Japan, December 15-17, 2003, Proceedings.
In: Lecture Notes in Computer Science, 2906, In: ISAAC 2003,
Springer, ISBN 3-540-20695-7,
[Conference item]

Joye, Marc (Hrsg.) (2003):
Topics in Cryptology - CT-RSA 2003, The Cryptographers' Track at the RSA Conference 2003, San Francisco, CA, USA, April 13-17, 2003, Proceedings.
In: Lecture Notes in Computer Science, 2612, In: CT-RSA 2003,
Springer, ISBN 3-540-00847-0,
[Conference item]

Laih, Chi-Sung (Hrsg.) (2003):
Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003, Proceedings.
In: Lecture Notes in Computer Science, 2894, In: ASIACRYPT 2003,
Springer, ISBN 3-540-20592-6,
[Conference item]

Lee, Pil Joong ; Lim, Chae Hoon (Hrsg.) (2003):
Information Security and Cryptology - ICISC 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers.
In: Lecture Notes in Computer Science, 2587, In: ICISC 2002,
Springer, ISBN 3-540-00716-4,
[Conference item]

Akishita, Toru ; Takagi, Tsuyoshi (2003):
Zero-Value Point Attacks on Elliptic Curve Cryptosystem.
(TI-1/03), [Report]

Baier, Harald (2003):
A Fast {Java} Implementation of a Provably Secure Pseudo Random Bit Generator Based on the Elliptic Curve Discrete Logarithm Problem.
(TI-7/03), [Report]

Baier, Harald ; Buchmann, Johannes ; Busch, Christoph (2003):
{Aus-} und Weiterbildung in {IT}-Sicherheit.
(TI-2/03), [Report]

Baier, Harald ; Köhler, Günter (2003):
How to Compute the Coefficients of the Elliptic Modular Function {j(z)}.
(TI-4/03), [Report]

Barraci, Nima ; Becker, Sven (2003):
Generische Integration von Kryptoprozessoren in den {Java}-basierten {FlexiProvider}.
[Other]

Buchmann, Johannes ; Schmidt, Arthur (2003):
Computing the structure of a finite abelian group.
(TI-5/03), [Report]

Buchmann, Johannes ; Takagi, Tsuyoshi (2003):
Kryptographie - Chancen und Risiken.
(TI-6/03), [Report]

Buchmann, Johannes ; Takagi, Tsuyoshi ; Vollmer, Ulrich (2003):
Number field cryptography.
(TI-11/03), [Report]

Dobre, Dan ; Mühleisen, Matthias (2003):
Using the Shared {VM} Jini Utility.
[Other]

Hagedorn, Axel (2003):
{IEEE 802.11i} Sicherheit in drahtlosen lokalen Netzen.
Technische Universit&auml;t Darmstadt, [Diplom- oder Magisterarbeit]

Hechler, Jochen (2003):
Primzahlnachweis mit Hilfe elliptischer Kurven.
Technische Universit&auml;t Darmstadt, [Diplom- oder Magisterarbeit]

Heinemann, Andreas ; Straub, Tobias (2003):
Mund-zu-Mund-Propaganda mit Bonussystem in mobilen Ad-Hoc-Netzen.
In: LNI, 35, In: INFORMATIK 2003 - Innovative Informatikanwendungen, S. 366-371,
ISBN 3-88579-364-4,
[Conference item]

Henhapl, Birgit (2003):
Zur Effizienz von elliptische Kurven Kryptographie.
Technische Universit&auml;t Darmstadt,
[PhD thesis]

Hähnle, Jochen (2003):
Design und Entwicklung eines Testframeworks für {JLiPSD}.
Technische Universit&auml;t Darmstadt, [Diplom- oder Magisterarbeit]

Hölzer, Christina (2003):
Quantenalgorithmus für das Hauptidealproblem.
Technische Universit&auml;t Darmstadt, [Diplom- oder Magisterarbeit]

Kastell, Kira ; Meyer, Ulrike ; Jakoby, Rolf (2003):
Secure Handover Procedures.
(TI-8/03), [Report]

Kastell, Kira ; Meyer, Ulrike ; Jakoby, Rolf (2003):
Secure Handover Procedures.
In: The 2003 International Conference on Communications in Computing- (CIC 2003),
[Conference item]

Kreuder, Alexander (2003):
Ein neuer Reduktionsbeweis für das {RSA}-Paillier Kryptosystem.
Technische Universit&auml;t Darmstadt, [Diplom- oder Magisterarbeit]

Kurosawa, Kaoru ; Schmidt-Samoa, Katja ; Takagi, Tsuyoshi (2003):
A Complete and Explicit Security Reduction Algorithm for RSA-Based Cryptosystems.
(TI-9/03), [Report]

Liese, Thorsten (2003):
Eine Software zur automatisierten Erstellung von {IEEE829}-Testdokumentationen.
Technische Universit&auml;t Darmstadt, [Diplom- oder Magisterarbeit]

Ludwig, Christoph (2003):
A Faster Lattice Reduction Method Using Quantum Search.
(TI-3/03), [Report]

Möller, Bodo (2003):
Public-Key Cryptography - Theory and Practice.
Technische Universit&auml;t Darmstadt,
[PhD thesis]

Straub, Tobias (2003):
Efficient Two Party Multi-Prime {RSA} Key Generation.
In: Communication, Network, and Information Security -(CNIS 2003),
IASTED International Conference on Communication, [Conference item]

Vollmer, Ulrich (2003):
Rigorously Analyzed Algorithms for the Discrete Logarithm Problem in Quadratic Number Fields.
Technische Universit&auml;t Darmstadt,
[PhD thesis]

Vollmer, Ulrich (2003):
A note on the hermite basis computation of large integer matrices.
In: ISSAC &#039;03: Proceedings of the 2003 international symposium on Symbolic and algebraic computation, S. 255-257,
ACM Press, Philadelphia, PA, USA, ISBN 1-58113-641-2,
[Conference item]

Vollmer, Ulrich (2003):
A note on the hermite basis computation of large integer matrices.
(TI-10/03), [Report]

Vuillaume, Camille (2003):
Efficiency Comparison of Several {RSA} Variants.
[Other]

Wolthusen, Stephen (2003):
A Model-Independent Security Architecture for Distributed Heterogeneous Systems.
Technische Universit&auml;t Darmstadt,
[PhD thesis]

Zörkler, Jens (2003):
Einführung einer Public-Key-Infrastruktur in einer Universität.
Technische Universit&auml;t Darmstadt, [Diplom- oder Magisterarbeit]

2002

Neis, Stefan (2002):
Zur Berechnung von Klassengruppen.
Darmstadt, Technische Universität, TU Darmstadt,
[PhD thesis]

Izu, Tetsuya ; Möller, Bodo ; Takagi, Tsuyoshi (2002):
Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks.
In: LNCS, In: Progress in Cryptology - INDOCRYPT 2002, Third International Conference on Cryptology, S. 296-313,
Springer, Hyderabad, India, ISBN 3-540-00263-4,
[Conference item]

Buchmann, Johannes ; Sakurai, Kouichi ; Takagi, Tsuyoshi (2002):
An IND-CCA2 Public-Key Cryptosystem with Fast Decryption.
In: LNCS, In: ICISC 2002 - Information Security and Cryptology, 5th International Conference, S. 51-71,
Springer, Seoul, Korea, ISBN {3-540-00716-4,
[Conference item]

Möller, Bodo (2002):
Parallelizable Elliptic Curve Point Multiplication Method with Resistance against Side-Channel Attacks.
In: LNCS, In: ISC 2002 - Information Security, 5th International Conference, S. 402-413,
Springer, Sao Paulo, Brazil, ISBN 3-540-44270-7,
[Conference item]

Maseberg, Jan Sönke (2002):
Fail-Safe-Konzept für Public-Key-Infrastrukturen.
Darmstadt, Technische Universität, TU Darmstadt,
[PhD thesis]

Sakurai, Kouichi ; Takagi, Tsuyoshi (2002):
On the Security of a Modified Paillier Public-Key Primitive.
In: LNCS, 2384, In: ACISP 2002 - Information Security and Privacy, 7th Australian Conference, S. 49-115,
Springer, Melbourne, Australia, ISBN 3-540-43861-0,
[Conference item]

Buchmann, Johannes ; Ernst, Markus ; Henhapl, Birgit ; Huss, Sorin (2002):
Elliptische Kurven Kryptographie - hocheffizient und portabel.
In: >thema FORSCHUNG, Eingebette Systeme: Entwurf und Anwendung versteckter Computer, (1/2002), S. 102-109. [Article]

Sakurai, Kouichi ; Takagi, Tsuyoshi (2002):
New Semantically Secure Public-Key Cryptosystems from the {RSA}-Primitive.
In: LNCS, In: PKC 2002 - Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, S. 387-390,
Springer, Paris, France, ISBN 3-540-43168-3,
[Conference item]

Buchmann, Johannes (2002):
Theoretische Informatik.
In: 30 Jahre Informatik an deutschen Hochschulen. - Darmstadt : Techn. Univ., Fachbereich Informatik, 2002. - S. 114-115, Darmstadt, Techn. Univ., [Book section]

Batten, Lynn Margaret ; Seberry, Jennifer (Hrsg.) (2002):
Information Security and Privacy, 7th Australian Conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002, Proceedings.
In: Lecture Notes in Computer Science, 2384, In: ACISP 2002,
Springer, ISBN 3-540-43861-0,
[Conference item]

Chan, Agnes Hui ; Gligor, Virgil (Hrsg.) (2002):
Information Security, 5th International Conference, ISC 2002 Sao Paulo, Brazil, September 30 - October 2, 2002, Proceedings.
In: Lecture Notes in Computer Science, 2433, In: ISC 2002,
Springer, ISBN 3-540-44270-7,
[Conference item]

Kim, Kwangjo (Hrsg.) (2002):
Information Security and Cryptology - ICISC 2001, 4th International Conference Seoul, Korea, December 6-7, 2001, Proceedings.
In: Lecture Notes in Computer Science, 2288, In: ICISC 2001,
Springer, ISBN 3-540-43319-8,
[Conference item]

Menezes, Alfred ; Sarkar, Palash (Hrsg.) (2002):
Progress in Cryptology - INDOCRYPT 2002, Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002.
In: Lecture Notes in Computer Science, 2551, In: INDOCRYPT 2002,
Springer, ISBN 3-540-00263-4,
[Conference item]

Naccache, David ; Paillier, Pascal (Hrsg.) (2002):
Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Paris, France, February 12-14, 2002, Proceedings.
In: Lecture Notes in Computer Science, 2274, In: PKC 2002,
Springer, ISBN 3-540-43168-3,
[Conference item]

Syverson, Paul (Hrsg.) (2002):
Financial Cryptography, 5th International Conference, FC 2001, Grand Cayman, British West Indies, February 19-22, 2002, Proceedings.
In: Lecture Notes in Computer Science, 2339, In: Financial Cryptography 2001,
Springer, ISBN 3-540-44079-8,
[Conference item]

Baier, Harald (2002):
Efficient Algorithms for Generating Elliptic Curves over Finite Fields Suitable for Use in Cryptography.
Technische Universit&auml;t Darmstadt,
[PhD thesis]

Biehl, Ingrid ; Buchmann, Johannes ; Hamdy, Safuat ; Meyer, Andreas (2002):
A Signature Scheme Based on the Intractability of Computing Roots.
In: >Des. Codes Cryptography, 25 (3), S. 223-236. [Article]

Buchmann, Johannes (2002):
Cryptographic Protocols.
[Other]

Ehli, Oliver (2002):
{ElGamal-Signaturen} mit elliptischen Kurven.
Darmstadt, Technische Universität, [Bachelor thesis]

Ender, Christoph (2002):
Verwaltung eines verteilten Systems mit {Java} und Servlets.
Technische Universit&auml;t Darmstadt, [Diplom- oder Magisterarbeit]

Ernst, Markus ; Henhapl, Birgit ; Huss, Sorin ; Klupsch, Steffen (2002):
{FPGA} based Hardware Acceleration for Elliptic Curve Public Key Cryptosystems.
[Other]

Feldgen, Lutz (2002):
Analyse von Enterprise Application Servern und Datenbank Management Systemen für {FlexiTRUST}.
[Other]

Feldgen, Lutz ; Winkler, Markus (2002):
Design und Implementierung der {FlexiTRUST-CA} als {Java} Enterprise Application.
Technische Universit&auml;t Darmstadt, [Diplom- oder Magisterarbeit]

Fischer, Mike (2002):
Angriff auf ein {PIN/TAN}-gestütztes Online-Banking-Verfahren.
Technische Universit&auml;t Darmstadt, [Diplom- oder Magisterarbeit]

Franke, Sylvain (2002):
Deanymisierbare elektronische Zahlungsmittel - ein Verleich zweier Implementationen.
Technische Universit&auml;t Darmstadt, [Diplom- oder Magisterarbeit]

Hamdy, Safuat (2002):
Über die Sicherheit und Effizienz kryptographischer Verfahren mit Klassengruppen imaginär-quadratischer Zahlkörper.
Technische Universit&auml;t Darmstadt,
[PhD thesis]

Hammen, Ralf (2002):
Integrationskonzept für Trustcenter-Software.
Technische Universit&auml;t Darmstadt, [Diplom- oder Magisterarbeit]

Henge-Ernst, Jürgen ; Linke, Sebastian (2002):
Anbindung einer Personalisierungssstrasse an das {FlexiTRUST}-System.
[Other]

Henhapl, Birgit (2002):
Platform Independant Elliptic Curve Cryptography over Fp.
(TI-6/02), [Report]

Hornung, Heiko (2002):
Ein Framework zur Automatisierung von Tests formularbasierter Web-Anwendungen.
Technische Universit&auml;t Darmstadt, [Diplom- oder Magisterarbeit]

Izu, Tetsuya ; Takagi, Tsuyoshi (2002):
On the Security of Brier-Joye{'}s Addition Formula for Weierstrass-form Elliptic Curves.
(TI-3/02), [Report]

Kwiotek, Daniel (2002):
Entwicklung einer sicheren Web-Schnittstelle für eine bestehende Enterprise-Anwendung basierend auf {PKI}-Technologien am Beispiel der {ERP}-Software {ProAd}.
Technische Universit&auml;t Darmstadt, [Diplom- oder Magisterarbeit]

Kügler, Dennis (2002):
Ein mißbrauchfreies anonymes elektonisches Zahlungssystem.
Technische Universit&auml;t Darmstadt,
[PhD thesis]

Kügler, Dennis ; Vogt, Holger (2002):
Fair Tracing without Trustees.
In: LNCS, In: Financial Cryptography 2001, S. 136-149,
Springer, Grand Cayman, British West Indies, ISBN 3-540-44079-8,
[Conference item]

Kügler, Dennis ; Vogt, Holger (2002):
Off-line Payments with Auditable Tracing.
(TI-8/02), [Report]

Ludwig, Christoph (2002):
The Security and Efficiency of Micciancio{'}s Cryptosystem.
(TI-7/02), [Report]

Möller, Bodo (2002):
Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes.
(TI-5/02), [Report]

Müller, Andreas Rudolf (2002):
JLiPSD} - eine Portierung des lipsd nach {Java.
Technische Universit&auml;t Darmstadt, [Diplom- oder Magisterarbeit]

Planz, Thilo (2002):
Entwurf und Implementierung einer Infrastruktur für ein {Java}-basiertes Trustcenter.
Technische Universit&auml;t Darmstadt, [Diplom- oder Magisterarbeit]

Planz, Thilo (2002):
Konzepte für eine sichere Schlüsselverwaltung.
Technische Universit&auml;t Darmstadt, [Diplom- oder Magisterarbeit]

Sakurai, Kouichi ; Takagi, Tsuyoshi (2002):
On the Security of a Modified Paillier Public-Key Primitive.
(TI-4/02), [Report]

Sandner, Tobias (2002):
Signaturverfahren mittels hyperelliptischen Kurven und deren effiziente Implementierung.
Technische Universit&auml;t Darmstadt, [Diplom- oder Magisterarbeit]

Schmidt, Arthur (2002):
Zur Berechnung der Struktur endlicher abelscher Gruppen.
Technische Universit&auml;t Darmstadt, [Diplom- oder Magisterarbeit]

Tak, Markus (2002):
Ein {S/MIME}-Plugin für Outlook zur Verwendung alternativer kryptographischer Algorithmen.
(TI-9/02), [Report]

Vollmer, Ulrich (2002):
An accelerated Buchmann algorithm for regulator computation in real quadratic fields.
(TI-2/02), [Report]

Vollmer, Ulrich (2002):
An accelerated Buchmann algorithm for regulator computation in real quadratic fields.
2369/2002, In: Proceedings of Algorithmic Number Theory (ANTS-V), S. 148-162,
[Conference item]

Winkler, Markus (2002):
Analyse der {Enterprise-Java-Beans} Spezifikation Version 2.0 als Basis für {FlexiTRUST}.
[Other]

2001

Baier, Harald (2001):
Elliptic Curves of Prime Order over Optimal Extension Fields for Use in Cryptography.
In: LNCS, In: INDOCRYPT 2001 - Second International Conference on Cryptology in India, S. 99-107,
Springer, Chennai, India, ISBN 3-540-43010-5,
[Conference item]

Möller, Bodo (2001):
Securing Elliptic Curve Point Multiplication against Side-Channel Attacks.
In: LNCS, In: ISC 2001 - Information Security, 4th International Conference, S. 324-334,
Springer, Malaga, Spain, ISBN 3-540-42662-0,
[Conference item]

Hühnlein, Detlef (2001):
Faster Generation of NICE-Schnorr-Type Signatures.
In: LNCS, In: CT-RSA 2001 - The Cryptographer's Track at RSA Conference 2001, S. 1-12,
Springer, San Francisco, CA, USA, ISBN 3-540-41898-9,
[Conference item]

Kügler, Dennis ; Vogt, Holger (2001):
Marking: A Privacy Protecting Approach Against Blackmailing.
In: LNCS, In: PKC 2001 - Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, S. 137-152,
Springer, Cheju Island, Korea, ISBN 3-540-41658-7,
[Conference item]

Buchmann, Johannes ; Hamdy, S. (2001):
A survey on IQ cryptography.
In: Public-key cryptography and computational number theory. Hrsg.: K. Alster, J. Urbanowicz, H.C. Wiliams. - Berlin, New York: de Gruyter, 2001. S. 1-15, Berlin, New York, de Gruyter, [Book section]

Davida, George ; Frankel, Yair (Hrsg.) (2001):
Information Security, 4th International Conference, ISC 2001, Malaga, Spain, October 1-3, 2001, Proceedings.
In: Lecture Notes in Computer Science, 2200, In: ISC 2001,
Springer, ISBN 3-540-42662-0,
[Conference item]

Kim, Kwangjo (Hrsg.) (2001):
Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings.
In: Lecture Notes in Computer Science, 1992, In: PKC 2001,
Springer, ISBN 3-540-41658-7,
[Conference item]

Naccache, David (Hrsg.) (2001):
Topics in Cryptology - CT-RSA 2001, The Cryptographer's Track at RSA Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings.
In: Lecture Notes in Computer Science, 2020, In: CT-RSA 2001,
Springer, ISBN 3-540-41898-9,
[Conference item]

Rangan, Pandu ; Ding, Cunsheng (Hrsg.) (2001):
Progress in Cryptology - INDOCRYPT 2001, Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001, Proceedings.
In: Lecture Notes in Computer Science, 2247, In: INDOCRYPT 2001,
Springer, ISBN 3-540-43010-5,
[Conference item]

Varadharajan, Vijay ; Mu, Yi (Hrsg.) (2001):
Information Security and Privacy, 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001, Proceedings.
In: Lecture Notes in Computer Science, 2119, In: ACISP 2001,
Springer, ISBN 3-540-42300-1,
[Conference item]

Vaudenay, Serge ; Youssef, Amr (Hrsg.) (2001):
Selected Areas in Cryptography, 8th Annual International Workshop, SAC 2001 Toronto, Ontario, Canada, August 16-17, 2001, Revised Papers.
In: Lecture Notes in Computer Science, 2259, In: Selected Areas in Cryptography 2001,
Springer, ISBN 3-540-43066-0,
[Conference item]

Albert, Michael (2001):
Konzeption und Implementierung eines Remote Access {VPNs} für Außendienstarbeiter unter Einsatz einer Public-Key-Infrastruktur.
Technische Universit&auml;t Darmstadt, [Diplom- oder Magisterarbeit]

Baier, Harald (2001):
Efficient Computation of Fourier Series and Singular Moduli with Application in Cryptography.
(TI-7/01), [Report]

Baier, Harald (2001):
Elliptic Curves of Prime Order over Optimal Extension Fields for Use in Cryptography.
(TI-11/01), [Report]

Baier, Harald ; Buchmann, Johannes (2001):
Efficient Construction of Cryptographically Strong Elliptic Curves.
(TI-2/01), [Report]

Buchmann, Johannes (2001):
Wie sicher kann Sicherheit sein?
(TI-5/01), [Report]

Buchmann, Johannes ; Hamdy, Safuat (2001):
A Survey on {IQ} Cryptography.
(TI-4/01), [Report]

Buchmann, Johannes ; Sakurai, Kouichi ; Takagi, Tsuyoshi (2001):
An {IND-CCA2} Public-Key Cryptosystem with Fast Decryption.
(TI-10/01), [Report]

Caspary, Jan ; Weber, Martin (2001):
Hardwarebeschleunigung der Punktmultiplikation über GF(2<sup>n</sup>) mit dem Elliptic Curve KryptoProzessor {(ECP)} am Beispiel des {ECDSA}-Signaturverfahrens.
[Other]

Coroama, Vlad ; Ruppert, Markus ; Seipel, Michael ; Tak, Markus (2001):
{Java}-basierte Kryptographie wird interoperabel.
(TI-1/01), [Report]

Dambruch, Jens (2001):
Framework zur flexiblen Formularverarbeitung im Rahmen von {FlexiTRUST} Formulare, Verarbeitungslogik und Ergebnisse.
Technische Universit&auml;t Darmstadt, [Diplom- oder Magisterarbeit]

Ernst, Markus ; Henhapl, Birgit (2001):
High Performance {ECDSA} over F(2<sup>n</sup>) based on {Java} with Hardware Acceleration.
(TI-6/01), [Report]

Hartmann, Michael ; Maseberg, Sönke (2001):
Smart Cards for the {FlexiPKI} Environment.
(TI-9/01), [Report]

Joye, Marc ; Quisquater, Jean-Jacques ; Takagi, Tsuyoshi (2001):
How to Choose Secret Parameters for {RSA}-Type Cryptosystems over Elliptic Curves.
In: >Designs, Codes and Cryptography, 23 (3), S. 297-316. [Article]

Kalenderian, Igor (2001):
Implementierung des Austausches kryptographischer Komponenten in {FlexiPKI} mittels Update Management Protocol.
Darmstadt, Technische Universität, [Bachelor thesis]

Kügler, Dennis ; Vogt, Holger (2001):
Auditable Tracing with Unconditional Anonymity.
(TI-16/01), [Report]

Kügler, Dennis ; Vogt, Holger (2001):
Fair Tracing without Trustees.
(TI-14/01), [Report]

Kügler, Dennis ; Vogt, Holger (2001):
Unsichtbare Markierungen in elektronischem Geld.
(TI-15/01), [Report]

Meyer, Andreas ; Neis, Stefan ; Pfahler, Thomas (2001):
First Implementation of Cryptographic Protocols Based on Algebraic Number Fields.
In: LNCS, 2119, In: ACISP 2001 - Australasian Conference on Information Security and Privacy, S. 84-103,
Springer, DOI: 10.1007/3-540-47719-5_9,
[Conference item]

Petter, Andreas (2001):
Kryptographie mit algebraischen Zahlkörpern: Relevante Schlüssellängen.
Technische Universit&auml;t Darmstadt, [Diplom- oder Magisterarbeit]

Ruppert, Markus ; Tak, Markus (2001):
Sicherheitsmanagement durch generische, objektorientierte Modellierung einer TrustCenter Software.
(TI-3/01), [Report]

Sakurai, Kouichi ; Takagi, Tsuyoshi (2001):
New Semantically Secure Public-Key Cryptosystems from the {RSA}-Primitive.
(TI-12/01), [Report]

Schramm, Dirk (2001):
Entwicklung einer flexiblen {Java}-basierten {S/MIME}-Erweiterung für Microsoft Outlook.
Technische Universit&auml;t Darmstadt, [Diplom- oder Magisterarbeit]

Schuster, Markus (2001):
{OpenRA} - Framework zur flexiblen Formularverarbeitung Darstellung, Transport und Produktion.
Technische Universit&auml;t Darmstadt, [Diplom- oder Magisterarbeit]

Seiler, Oliver (2001):
Signaturverfahren mit Elliptischen Kurven über Körpern der Charakteristik 2 und deren Arithmetik.
Technische Universit&auml;t Darmstadt, [Diplom- oder Magisterarbeit]

Seiler, Patrick (2001):
Konzept und Aufbau einer prototypischen Public Key Infrastruktur auf Basis von FlexiTrust.
Technische Universit&auml;t Darmstadt, [Diplom- oder Magisterarbeit]

Takagi, Tsuyoshi (2001):
New public-key cryptosystems with fast decryption.
Technische Universit&auml;t Darmstadt,
[PhD thesis]

Valentin, Christian (2001):
Ein verteilter Zeitstempeldienst basierend auf {RSA} in {Java}.
Technische Universit&auml;t Darmstadt, [Diplom- oder Magisterarbeit]

Vest, Torsten (2001):
Design und Implementierung eines {CSP} zur Anbindung der {JCA} an die Microsoft {CryptoAPI}.
Technische Universit&auml;t Darmstadt, [Diplom- oder Magisterarbeit]

Wahrenbruch, Thomas (2001):
Elliptische Kurven Kryptographie auf {Java} Cards.
Darmstadt, Technische Universität, [Bachelor thesis]

Wiesmaier, Alexander (2001):
{FlexiTRUST CA} Ein flexibles, skalierbares und dynamisch erweiterbares Trustcenter.
Technische Universit&auml;t Darmstadt, [Diplom- oder Magisterarbeit]

2000

Maurer, Markus (2000):
Regulator approximation and fundamental unit computation for real-quadratic orders.
Darmstadt, Technische Universität, TU Darmstadt,
[PhD thesis]

Baier, Harald ; Buchmann, Johannes (2000):
Efficient Construction of Cryptographically Strong Elliptic Curves.
In: LNCS, In: INDOCRYPT 2000 - First International Conference in Cryptology in India, S. 113-114,
Springer, Calcutta, India, ISBN 3-540-41452-5,
[Conference item]

Hamdy, Safuat ; Möller, Bodo (2000):
Security of Cryptosystems Based on Class Groups of Imaginary Quadratic Orders.
In: LNCS, In: ASIACRYPT 2000 - 6th International Conference on the Theory and Application of Cryptology and Information Security, S. 234-248,
Springer, Kyoto, Japan, ISBN 3-540-41404-5,
[Conference item]

Hühnlein, Detlef (2000):
Efficient Implementation of Cryptosystems Based on Non-maximal Imaginary Quadratic Orders.
In: LNCS, In: SAC '99 - Selected Areas in Cryptography, 6th Annual International Workshop, S. 147-162,
Springer, Kingston, Ontario, Canada, ISBN 3-540-67185-4,
[Conference item]

Vollmer, Ulrich (2000):
Asymptotically Fast Discrete Logarithms in Quadratic Number Fields.
In: LNCS, In: ANTS-IV - Algorithmic Number Theory, 4th International Symposium, S. 581-594,
Springer, Leiden, The Netherlands, ISBN 3-540-67695-3,
[Conference item]

Baier, Harald ; Buchmann, Johannes (2000):
Efficient construction of cryptographically strong elliptic curves.
In: Progress in cryptology: INDOCRYPT 2000. Hrsg.: B. Roy, E. Okamoto. - Berlin, Heidelberg (u.a.): Springer, 2000 = Lecture notes in computer science; 1977. S. 191-202, Berlin, Heidelberg (u.a.), Springer, [Book section]

Buchmann, Johannes ; Maurer, M. ; Möller, B. (2000):
Cryptography based on number fields with large regulator.
12, In: Journal de théorie des nombres de Bordeaux, S. 293-307. [Article]

Hühnlein, Detlef ; Merkle, Johannes (2000):
An Efficient NICE-Schnorr-Type Signature Scheme.
In: LNCS, In: PKC 2000 - Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, S. 14-27,
Springer, Melbourne, Victoria, Australia, ISBN 3-540-66967-1,
[Conference item]

Bosma, Wieb (Hrsg.) (2000):
Algorithmic Number Theory, 4th International Symposium, ANTS-IV, Leiden, The Netherlands, July 2-7, 2000, Proceedings.
In: Lecture Notes in Computer Science, 1838, In: ANTS 2000,
Springer, ISBN 3-540-67695-3,
[Conference item]

Buchmann, Johannes ; Hoeholdt, Tom ; Stichtenoth, Hennning ; Tapia-Recillas, Horacio (Hrsg.) (2000):
Coding Theory cryptography and related areas.
S. 260, Springer, Guanajuato, Mexico, in April 1998, ISBN 978-3-540-66248-8,
[Conference item]

Heys, Howard ; Adams, Carlisle (Hrsg.) (2000):
Selected Areas in Cryptography, 6th Annual International Workshop, SAC'99, Kingston, Ontario, Canada, August 9-10, 1999, Proceedings.
In: Lecture Notes in Computer Science, 1758, In: Selected Areas in Cryptography 1999,
Springer, ISBN 3-540-67185-4,
[Conference item]

Imai, Hideki ; Zheng, Yuliang (Hrsg.) (2000):
Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings.
In: Lecture Notes in Computer Science, 1751, In: PKC 2000,
Springer, ISBN 3-540-66967-1,
[Conference item]

Okamoto, Tatsuaki (Hrsg.) (2000):
Advances in Cryptology - ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings.
In: Lecture Notes in Computer Science, 1976, In: ASIACRYPT 2000,
Springer, ISBN 3-540-41404-5,
[Conference item]

Roy, Bimal ; Okamoto, Eiji (Hrsg.) (2000):
Progress in Cryptology - INDOCRYPT 2000, First International Conference in Cryptology in India, Calcutta, India, December 10-13, 2000, Proceedings.
In: Lecture Notes in Computer Science, 1977, In: INDOCRYPT 2000,
Springer, ISBN 3-540-41452-5,
[Conference item]

Biehl, Ingrid ; Buchmann, Johannes ; Hamdy, Safuat ; Meyer, Andreas (2000):
A Signature Scheme Based on the Intractability of Computing Roots.
(TI-1/00), [Report]

Buchmann, Johannes ; Maurer, Markus ; Möller, Bodo (2000):
Cryptography Based on Number Fields with Large Regulator.
(TI-5/00), [Report]

Coroama, Vlad (2000):
Flexible Anbindung von SmartCards an eine {Java}-Sicherheitsinfrastruktur.
Technische Universit&auml;t Darmstadt, [Diplom- oder Magisterarbeit]

Fertig, Thomas (2000):
Digitale Signaturen mit elliptischen Kurven über GF(2<sup>n</sup>).
Technische Universit&auml;t Darmstadt, [Diplom- oder Magisterarbeit]

Fuhrmann, Arnulf (2000):
Verteilte effiziente RSA-Schlüsselerzeugung in JAVA.
[Other]

Groß, Clemens (2000):
Ein Verschlüsselungsprotokoll auf Basis von reellquadratischen Zahlkörpern.
Technische Universit&auml;t Darmstadt, [Diplom- oder Magisterarbeit]

Hamdy, Safuat ; Möller, Bodo (2000):
Security of Crytosystems Based on Class Groups of Imaginary Quadratic Orders.
(TI-4/00), [Report]

Hartmann, Michael ; Maseberg, Sönke (2000):
Fail-Safe-Konzept für {FlexiPKI}.
(TI-11/00), [Report]

Hühnlein, Detlef (2000):
Faster Generation of {NICE}-{Schnorr}-type Signatures.
(TI-8/00), [Report]

Hühnlein, Detlef (2000):
Quadratic orders for {NESSIE} - Overview and parameter sizes of three public key families.
(TI-3/00), [Report]

Kügler, Dennis ; Vogt, Holger (2000):
Marking: A Privacy Protecting Approach against Blackmailing.
(TI-9/00), [Report]

Lippert, Marcus (2000):
Ein beweisbar sicherer Pseudoufallsbit-Generator auf der Basis des {DL}-Problems in elliptischen Kurven.
Technische Universit&auml;t Darmstadt, [Diplom- oder Magisterarbeit]

Paulus, Sachar ; Takagi, Tsuyoshi (2000):
A New Public-Key Cryptosystem over a Quadratic Order with Quadratic Decryption Time.
In: >Journal of Cryptology, 13, [Article]

Rauch, Katja (2000):
Implementierung von symmetrischen Verschlüsselungsverfahren.
Technische Universit&auml;t Darmstadt, [Diplom- oder Magisterarbeit]

Seipel, Michael (2000):
Die Java Cryptographic Architecture {(JCA)} als Implementierung der Generic Security Service {(GSS-API)} am Beispiel von {SAP R/3} Konzept und Prototyp.
Technische Universit&auml;t Darmstadt, [Diplom- oder Magisterarbeit]

Sesterhenn, Christoph (2000):
Design und Implementierung eines Kryptographie-Plugin für Email-Clients basierend auf {S/MIME} und {JAVA}.
Technische Universit&auml;t Darmstadt, [Diplom- oder Magisterarbeit]

Theobald, Patrick (2000):
Ein Framework zur Berechnung der Hermite-Normalform von großen, dünnbesetzten, ganzzahligen Matrizen.
Technische Universit&auml;t Darmstadt,
[PhD thesis]

Vollmer, Ulrich (2000):
Asymptotically Fast Discrete Logarithms in Quadratic Number Fields.
(TI-6/00), [Report]

1999

Hühnlein, Detlef ; Merkle, Johannes (1999):
Secure and Cost Efficient Electronic Stamps.
In: LNCS, In: Secure Networking - CQRE (Secure) '99 - International Exhibition and Congress, S. 779-785,
Springer, Düsseldorf, Germany, ISBN 3-540-66800-4,
[Conference item]

Hühnlein, Detlef ; Takagi, Tsuyoshi (1999):
Reducing Logarithms in Totally Non-maximal Imaginary Quadratic Orders to Logarithms in Finite Fields.
In: LNCS, In: ASIACRYPT '99, International Conference on the Theory and Applications of Cryptology and Information Security, S. 219-231,
Springer, Singapore, ISBN 3-540-66666-4,
[Conference item]

Hartmann, Michael ; Paulus, Sachar ; Takagi, Tsuyoshi (1999):
NICE - New Ideal Coset Encryption.
In: LNCS, In: CHES '99 - Cryptographic Hardware and Embedded Systems, First International Workshop, S. 726-737,
Springer, Worcester, MA, USA, ISBN 3-540-66646-X,
[Conference item]

Buchmann, Johannes ; Ruppert, M. ; Tak, M. (1999):
FlexiPKI - Realisierung einer flexiblen Public-Key-Infrastruktur.
Darmstadt, Techn. Univ., FB 20, Inst. für Theoretische Informatik, [Book]

Buchmann, Johannes ; Squirrel, D. (1999):
Kernels of integer matrices via modular arithmetic.
Darmstadt, Techn. Univ., FB 20, Inst. für Theoretische Informatik, [Book]

Jacobson, Michael J. (1999):
Subexponential class group computation in quadratic orders.
Aachen: Shaker, 1999. XVIII, 179 S, Aachen, Shaker, TU Darmstadt,
[PhD thesis]

Baumgart, Rainer (Hrsg.) (1999):
Secure Networking - CQRE (Secure) '99, International Exhibition and Congress Düsseldorf, Germany, November 30 - December 2, 1999, Proceedings.
In: Lecture Notes in Computer Science, 1740, In: CQRE 1999,
Springer, ISBN 3-540-66800-4,
[Conference item]

Buchmann, Johannes ; Hoeholdt, Tom ; Stichtenoth, Hennning ; Tapia-Recillas, Horacio (Hrsg.) (1999):
Coding Theory, Cryptography and Related Areas.
Springer, ISBN 978-3-540-66248-8,
[Book]

Koc, Kaya ; Paar, Christof (Hrsg.) (1999):
Cryptographic Hardware and Embedded Systems, First International Workshop, CHES'99, Worcester, MA, USA, August 12-13, 1999, Proceedings.
In: Lecture Notes in Computer Science, 1717, In: CHES 1999,
Springer, ISBN 3-540-66646-X,
[Conference item]

Lam, Kwok-Yan ; Okamoto, Eiji ; Xing, Chaoping (Hrsg.) (1999):
Advances in Cryptology - ASIACRYPT '99, International Conference on the Theory and Applications of Cryptology and Information Security, Singapore, November 14-18, 1999, Proceedings.
In: Lecture Notes in Computer Science, 1716, In: ASIACRYPT 1999,
Springer, ISBN 3-540-66666-4,
[Conference item]

Appel, Helo ; Biehl, Ingrid ; Fuhrmann, Arnulf ; Ruppert, Markus ; Takagi, Tsuyoshi ; Takura, Akira ; Valentin, Christian (1999):
Ein sicherer, robuster Zeitstempeldienst auf der Basis verteilter {RSA}-Signaturen.
(TI-21/99), [Report]

Biehl, Ingrid ; Buchmann, Johannes ; Hamdy, Safuat ; Meyer, Andreas (1999):
Cryptographic Protocols Based on Intractability of Extracting Roots and Computing Discrete Logarithms.
(TI-16/99), [Report]

Biehl, Ingrid ; Paulus, Sachar ; Takagi, Tsuyoshi (1999):
Efficient Undeniable Signature Schemes based on Ideal Arithmetic in Quadratic Orders.
(TI-10/99), [Report]

Binisik, Emre (1999):
Sieben in Zahlkörpern und Funktionenkörpern.
Technische Universit&auml;t Darmstadt, [Diplom- oder Magisterarbeit]

Boivin, Michele (1999):
Anwendung hyperelliptischer Kurven in der Kryptographie.
Technische Universit&auml;t Darmstadt, [Diplom- oder Magisterarbeit]

Breuning, Manuel (1999):
Eine topologische Struktur für die Idealgruppe.
Technische Universit&auml;t Darmstadt, [Diplom- oder Magisterarbeit]

Buchmann, Johannes ; Eisenbrand, Friedrich (1999):
On factor refinement in number fields.
In: >Mathematics of Computation, 68 (225), S. 345-350. [Article]

Buchmann, Johannes ; Maurer, Markus (1999):
Wie sicher ist die Public-Key-Kryptographie.
(TI-2/99), [Report]

Buchmann, Johannes ; Ruppert, Markus ; Tak, Markus (1999):
{FlexiPKI} - Realisierung einer flexiblen Public-Key-Infrastruktur.
(TI-22/99), [Report]

Buchmann, Johannes ; Squirrel, Douglas (1999):
Kernels of Integer Matrices via Modular Arithmetic.
(TI-4/99), [Report]

Budnick, Michael (1999):
Zur Reduktion des {DL}-Problems für elliptische Kurven auf das {DL}-Problem in endlichen Körpern.
Technische Universit&auml;t Darmstadt, [Diplom- oder Magisterarbeit]

Carls, Robert (1999):
Punktezählalgorithmen für ordinäre elliptische Kurven über endlichen Körpern der Charakteristik 2.
Technische Universit&auml;t Darmstadt, [Diplom- oder Magisterarbeit]

Crnjak, Markus (1999):
{ElG}amal-Verschlüsselung mit elliptischen Kurven über Körpern der Charakteristik größer 3.
Darmstadt, Technische Universität, [Bachelor thesis]

Hahn, Tobias ; Meyer, Andreas ; Neis, Stefan ; Pfahler, Thomas (1999):
Implementing Cryptographic Protocols Based on Algebraic Number Fields.
(TI-24/99), [Report]

Hamdy, Safuat (1999):
Elliptische Kurven - Neue Wege in der Public-Key-Kryptographie.
(TI-5/99), [Report]

Hamdy, Safuat ; Maurer, Markus (1999):
Feige-Fiat-Shamir Identification Based on Real Quadratic Fields.
(TI-23/99), [Report]

Hartmann, Michael (1999):
Implementierung der Entschlüsselung des {NICE}-Kryptosystems auf einer Smartcard.
Technische Universit&auml;t Darmstadt, [Diplom- oder Magisterarbeit]

Hartmann, Michael ; Paulus, Sachar ; Takagi, Tsuyoshi (1999):
{NICE} - New Ideal Coset Encryption.
(TI-11/99), [Report]

Henhapl, Birgit (1999):
Digitales Signieren mit Elliptischen Kurven über Primkörpern großer Charakteristik.
Technische Universit&auml;t Darmstadt, [Diplom- oder Magisterarbeit]

Hühnlein, Detlef (1999):
Efficient implementation of cryptosystems based on non-maximal imaginary quadratic orders.
(TI-6/99), [Report]

Hühnlein, Detlef (1999):
Elliptische Kurven in {HBCI} - ein Backup zu {RSA}.
(TI-20/99), [Report]

Hühnlein, Detlef (1999):
A survey of crytosystems based on imaginary quadratic orders.
(TI-19/99), [Report]

Hühnlein, Detlef ; Merkle, Johannes (1999):
Secure and cost efficient electronic stamps.
(TI-17/99), [Report]

Hühnlein, Detlef ; Merkle, Johannes (1999):
An efficient {NICE}-{Schnorr}-type signature.
(TI-18/99), [Report]

Hühnlein, Detlef ; Meyer, Andreas ; Takagi, Tsuyoshi (1999):
Rabin and {RSA} analogues based on non-maximal imaginary quadratic orders.
(TI-7/99), [Report]

Hühnlein, Detlef ; Takagi, Tsuyoshi (1999):
Reducing logarithms in totally non-maximal imaginary quadratic orders to logarithms in finite fields.
(TI-8/99), [Report]

Jacobson, Michael J. (1999):
Applying sieving to the computation of quadratic class groups.
In: >Mathematics of Computation, 68 (226), S. 859-867. [Article]

Knabe, Thorsten (1999):
LiPS} basiertes Job Queueing System für {LiDIA.
(TI-1/99), [Report]

Kügler, Dennis ; Maurer, Markus (1999):
A Note on the Weakness of the Maurer-Yacobi Squaring Method.
(TI-15/99), [Report]

Kügler, Dennis ; Maurer, Markus ; Paulus, Sachar (1999):
Identitätsbasierte Kryptosysteme als Alternative zu Public Key Infrastrukturen.
(TI-3/99), [Report]

Liefke, Thomas ; Rodeh, Ohad ; Setz, Thomas (1999):
First Steps in the Implementation of a Fault-Tolerant Tuple - Space Machine for Volatile Data.
(TI-13/99), [Report]

Liefke, Thomas ; Setz, Thomas (1999):
Extension of the {TRIPS} Prototype.
(TI-12/99), [Report]

Müller, Volker ; Stein, Andreas ; Thiel, Christoph (1999):
Computing discrete logarithms in real quadratic congruence function fields of large genus.
In: >Mathematics of Computation, 68 (226), S. 807-822. [Article]

Paulus, Sachar ; Rück, Hans-Georg (1999):
Real and imaginary quadratic representations of hyperelliptic function fields.
In: >Mathematics in Computation, 68 (227), S. 1233-1241. [Article]

Paulus, Sachar ; Takagi, Tsuyoshi (1999):
A new public-key cryptosystem over quadratic orders with quadratic decryption time.
(TI-9/99), [Report]

Rau, Andrea (1999):
Bestimmung der Anzahl rationaler Punkte elliptischer Kurven über endlichen Körpern der Charakteristik 2.
Technische Universit&auml;t Darmstadt, [Diplom- oder Magisterarbeit]

Schaub, Joachim (1999):
Implementierung von Public-Key-Kryptosystemen über imaginär-quadratische Ordnungen.
Technische Universit&auml;t Darmstadt, [Diplom- oder Magisterarbeit]

Tak, Markus (1999):
Public Key Infrastrukturen - ein {Java}-basiertes Trustcenter.
Technische Universit&auml;t Darmstadt, [Diplom- oder Magisterarbeit]

Teske, Edlyn (1999):
The Pohlig-Hellman Method Generalized for Group Structure Computation.
In: >Journal of Symbolic Computation, 27 (6), S. 521-534. [Article]

1998

Hühnlein, Detlef ; Meyer, Andreas ; Takagi, Tsuyoshi (1998):
Rabin and {RSA} analogues based on non-maximal imaginary quadratic orders.
In: ICSCI '98 - 1st International Conference on Information Security and Cryptology, S. 221-240,
Korea Institute of Information Security and Cryptology (KIISC), Seoul, Korea, [Conference item]

Paulus, Sachar ; Takagi, Tsuyoshi (1998):
A generalization of the Diffie-Hellman problem and related cryptosystems allowing fast decryption.
In: ICSCI '98 - 1st International Conference on Information Security and Cryptology, S. 211-220,
Korea Institute of Information Security and Cryptology (KIISC), Seoul, Korea, [Conference item]

Haible, Bruno ; Papanikolaou, Thomas (1998):
Fast Multiprecision Evaluation of Series of Rational Numbers.
In: LNCS, In: ANTS-III - Algorithmic Number Theory, Third International Symposium, S. 338-350,
Springer, Portland, Oregon, USA, ISBN 3-540-64657-4,
[Conference item]

Hühnlein, Detlef ; Jacobson, Michael J. ; Paulus, Sachar ; Takagi, Tsuyoshi (1998):
A Cryptosystem Based on Non-maximal Imaginary Quadratic Orders with Fast Decryption.
In: LNCS, In: EUROCRYPT '98 - International Conference on the Theory and Application of Cryptographic Techniques, S. 294-307,
Springer, Espoo, Finland, ISBN 3-540-64518-7,
[Conference item]

Paulus, Sachar (1998):
Lattice Basis Reduction in Function Fields.
In: LNCS, In: ANTS-III - Algorithmic Number Theory, Third International Symposium, S. 567-575,
Springer, Portland, Oregon, USA, ISBN 3-540-64657-4,
[Conference item]

Teske, Edlyn (1998):
Speeding Up Pollard's Rho Method for Computing Discrete Logarithms.
In: LNCS, In: ANTS-III - Algorithmic Number Theory, Third International Symposium, S. 541-554,
Springer, Portland, Oregon, USA, ISBN 3-540-64657-4,
[Conference item]

Buhler, Joe (Hrsg.) (1998):
Algorithmic Number Theory, Third International Symposium, ANTS-III, Portland, Oregon, USA, June 21-25, 1998, Proceedings.
In: Lecture Notes in Computer Science, 1423, In: ANTS 1998,
Springer, ISBN 3-540-64657-4,
[Conference item]

Nyberg, Kaisa (Hrsg.) (1998):
Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceeding.
In: Lecture Notes in Computer Science, 1403, In: EUROCRYPT 1998,
Springer, ISBN 3-540-64518-7,
[Conference item]

Backes, Werner (1998):
Berechnung kürzester Gittervektoren.
Technische Universit&auml;t Darmstadt, [Diplom- oder Magisterarbeit]

Buchmann, Johannes ; Jacobson, Michael J. ; Neis, Stefan ; Theobald, Patrick ; Weber, Damian (1998):
Sieving Methods for Class Group Computation.
(TI-8/98), [Report]

Buchmann, Johannes ; Maurer, Markus (1998):
Approximate Evaluation of {L(1,chi-delta)}.
(TI-6/98), [Report]

Buchmann, Johannes ; Weber, Damian (1998):
Discrete Logarithms: Recent Progress.
(TI-12/98), [Report]

Galbraith, Steven ; Paulus, Sachar ; Smart, Nigel (1998):
Arithmetic on Superelliptic Curves.
(TI-11/98), [Report]

Kügler, Dennis (1998):
Eine Aufwandsanalyse für identitätsbasierte Kryptosysteme.
Technische Universit&auml;t Darmstadt, [Diplom- oder Magisterarbeit]

Müller, Volker (1998):
Fast Multiplication on Elliptic Curves over Small Fields of Characteristic Two.
In: >Journal of Cryptology, 11 (4), S. 219-234. [Article]

Müller, Volker ; Paulus, Sachar (1998):
Elliptische Kurven und Public Key Kryptographie.
[Other]

Müller, Volker ; Vanstone, Scott ; Zuccherato, Robert (1998):
Discrete Logarithm Based Cryptosystems in Quadratic Function Fields of Characteristic 2.
In: >Designs, Codes and Cryptography, 14 (2), S. 159-178. [Article]

Neis, Stefan (1998):
Reducing Ideal Arithmetic to Linear Albebra Problems.
(TI-9/98), [Report]

Nüsseler, Markus (1998):
Sicherer Zugangsschutz mit Hilfe eines Einmalpaßwortgenerators auf einer Chipkarte.
Technische Universit&auml;t Darmstadt, [Diplom- oder Magisterarbeit]

Paulus, Sachar (1998):
Lattice Basis Reduction in Function Fields.
(TI-2/98), [Report]

Paulus, Sachar ; Takagi, Tsuyoshi (1998):
A generalization of the Diffie-Hellman problem and related cryptosystems allowing fast decryption.
(TI-5/98), [Report]

Pfahler, Thomas (1998):
Polynomfaktorisierung über endlichen Körpern.
Technische Universit&auml;t Darmstadt, [Diplom- oder Magisterarbeit]

Setz, Thomas (1998):
Dynamic-Load-Adaption in {LiPS}.
(TI-10/98), [Report]

Süssmann, Boris (1998):
Entwicklung eines sicheren Telearbeitsplatzes.
Technische Universit&auml;t Darmstadt, [Diplom- oder Magisterarbeit]

Teske, Edlyn (1998):
Algorithms for Finite Abelian Groups.
Shaker, Technische Universität Darmstadt, ISBN 978-3826540455,
[PhD thesis]

Teske, Edlyn (1998):
The Pohlig-Hellman Method Generalized for Group Structure Computation.
(TI-7/98), [Report]

Teske, Edlyn (1998):
Speeding up Pollard's Rho Method for Computing Discrete Logarithms.
(TI-1/98), [Report]

Teske, Edlyn (1998):
A space efficient algorithm for group structure computation.
In: >Mathematics of Computation, 67 (224), S. 1637-1663. [Article]

Wetzel, Susanne (1998):
Lattice Basis Reduction Algorithms and their Applications.
Universit&auml;t des Saarlandes,
[PhD thesis]

1997

Maurer, Markus (1997):
The logarithm function in LiDIA's bigfloat class.
TI-33/97, Darmstadt, TU Darmstadt, FB20, Institut für Theoretische Informatik, [Report]

Buchmann, Johannes ; Paulus, Sachar (1997):
A One Way Function Based on Ideal Arithmetic in Number Fields.
In: LNCS, In: CRYPTO '97 - 17th Annual International Cryptology Conference, S. 385-394,
Springer, Santa Barbara, California, USA, ISBN 3-540-63384-7,
[Conference item]

Zieschang, Thilo (1997):
Combinatorial Properties of Basic Encryption Operations.
In: LNCS, In: EUROCRYPT '97 - International Conference on the Theory and Application of Cryptographic Techniques, S. 14-26,
Springer, Konstanz, Germany, ISBN 3-540-62975-0,
[Conference item]

Buchmann, Johannes ; Paulus, S. (1997):
A one way function based on ideal arithmetic in number fields.
Darmstadt: Techn. Hochschule, FB 20, Inst. für Theoretische Informatik, 1997. 9 S, Darmstadt, Techn. Hochschule, FB 20, FG Theoretische Informatik, [Book]

Fumy, Walter (Hrsg.) (1997):
Advances in Cryptology - EUROCRYPT '97, International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997, Proceeding.
In: Lecture Notes in Computer Science, 1233, In: EUROCRYPT 1997,
Springer, ISBN 3-540-62975-0,
[Conference item]

Han, Yongfei ; Okamoto, Tatsuaki ; Qing, Sihan (Hrsg.) (1997):
Information and Communication Security, First International Conference, ICICS'97, Beijing, China, November 11-14, 1997, Proceedings.
In: Lecture Notes in Computer Science, 1334, In: ICICS 1997,
Springer, ISBN 3-540-63696-X,
[Conference item]

Kaliski Jr, Burton (Hrsg.) (1997):
Advances in Cryptology - CRYPTO '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings.
In: Lecture Notes in Computer Science, 1294, In: CRYPTO 1997,
Springer, ISBN 3-540-63384-7,
[Conference item]

Biehl, Ingrid ; Buchmann, Johannes (1997):
An analysis of the reduction algorithms for binary quadratic forms.
(TI-26/97), [Report]

Buchmann, Johannes ; Jacobson, Michael J. ; Teske, Edlyn (1997):
On some computational problems in finite abelian groups.
In: >Mathematics in Computation, 66 (220), S. 1663-1687. [Article]

Buchmann, Johannes ; Paulus, Sachar (1997):
A one way function based on ideal arithmetic in number fields.
(TI-5/97), [Report]

Denny, Thomas (1997):
Lösen dünn besetzter Gleichungssysteme über endlichen Körpern.
Universit&auml;t des Saarlandes,
[PhD thesis]

Haible, Bruno ; Papanikolaou, Thomas (1997):
Fast multiprecision evaluation of series of rational numbers.
(TI-7/97), [Report]

Hühnlein, Detlef (1997):
Credential Management and Secure Single Login for {SPKM}.
(TI-28/97), [Report]

Hühnlein, Detlef ; Jacobson, Michael J. ; Paulus, Sachar (1997):
A cryptosystem based on non-maximal imaginary quadratic orders with fast decryption.
(TI-24/97), [Report]

Jacobson, Michael J. (1997):
Applying Sieving to the Computation of Quadratic Class Groups.
(TI-19/97), [Report]

Joye, Marc ; Quisquater, Jean-Jacques ; Takagi, Tsuyoshi (1997):
How to Choose Secret Parameters for {RSA}-Type Cryptosystems over Elliptic Curves.
(TI-35/97), [Report]

Liefke, Thomas (1997):
Tupleview: towards a Monitoring, Debugging and Profiling Tool for {LiPS}.
Universit&auml;t des Saarlandes, [Diplom- oder Magisterarbeit]

Liefke, Thomas ; Setz, Thomas (1997):
Tupleview - ein Monitoring-, Debugging- und Profiling-Tool für {LiPS}.
(TI-37/97), [Report]

Lippmann, Jens (1997):
Integration einer Testumgebung in {LiPS}.
Universit&auml;t des Saarlandes, [Diplom- oder Magisterarbeit]

Meyer, Andreas (1997):
Ein neues Identifikations- und Signaturverfahren über imaginär-quadratischen Klassengruppen.
Universit&auml;t des Saarlandes, [Diplom- oder Magisterarbeit]

Müller, Volker (1997):
Efficient Algorithms for Multiplication on Elliptic Curves.
(TI-9/97), [Report]

Müller, Volker (1997):
Efficient Algorithms for Multiplication on Elliptic Curves.
[Other]

Müller, Volker (1997):
Fast Multiplication on Elliptic Curves over Small Fields of Characteristic Two.
(TI-4/97), [Report]

Müller, Volker ; Paulus, Sachar (1997):
On the Generation of Cryptographically Strong Elliptic Curves.
(TI-25/97), [Report]

Papanikolaou, Thomas (1997):
Entwurf und Entwicklung einer objektorientierten Bibliothek für algorithmische Zahlentheorie.
Universit&auml;t des Saarlandes,
[PhD thesis]

Papanikolaou, Thomas (1997):
Technical documentation using a {C++} to {LaTeX} formatting program.
(TI-17/97), [Report]

Papanikolaou, Thomas ; Zayer, Jörg (1997):
{ALGO.STY} - a {LaTeX} style for algorithm editing.
(TI-18/97), [Report]

Paulus, Sachar (1997):
{MAJA} - Das Konzept eines Multi Application {JavaCard} Environment.
(TI-34/97), [Report]

Paulus, Sachar ; Rück, Hans-Georg (1997):
Real and imaginary quadratic representations of hyperelliptic function fields.
(TI-14/97), [Report]

Paulus, Sachar ; Setz, Thomas (1997):
Developing and Testing a Smart Card Application.
(TI-27/97), [Report]

Sauer, Michael (1997):
Eine Block-Lanczos Implementierung für {LiDIA}.
Technische Universit&auml;t Darmstadt, [Diplom- oder Magisterarbeit]

Schank, Eric (1997):
Probabilistische Beweisverifikation.
Technische Universit&auml;t Darmstadt,
[PhD thesis]

Schwarz, Jochen (1997):
Entwurf und Implementierung einer objektorientierten Softwarebibliothek kryptographischer Algorithmen.
Technische Universit&auml;t Darmstadt, [Diplom- oder Magisterarbeit]

Setz, Thomas (1997):
Design, Implementation and Performance of a Mutex-Token based Fault- Tolerant Tuple Space Machine.
(TI-39/97), [Report]

Setz, Thomas (1997):
Experience with Literate Programming or Towards Qualified Programming.
(TI-15/97), [Report]

Setz, Thomas ; Fischer, Johannes ; Liefke, Thomas (1997):
libtracer: Eine komfortable Bibliothek zum Generieren levelbasierter Tracing-Ausgaben.
(TI-16/97), [Report]

Setz, Thomas ; Liefke, Thomas (1997):
The {LiPS} Runtime Systems.
(TI-6/97), [Report]

Setz, Thomas ; Lippmann, Jens (1997):
Softwaretesten in {LiPS}.
(TI-36/97), [Report]

Teske, Edlyn (1997):
A Space Efficient Algorithm for Group Structure Computation.
(TI-3/97), [Report]

Theobald, Patrick ; Wetzel, Susanne ; Backes, Werner (1997):
Design concepts for matrices and lattices in LiDIA.
In: Symposium on Applied Computing-(SAC), S. 532-536,
DOI: http://doi.acm.org/10.1145/331697.332344,
[Conference item]

Theobald, Patrick ; Wetzel, Susanne ; Setz, Thomas (1997):
LiDIA, LiPS - Erste gemeinsame Schritte.
(TI-38/97), [Report]

Weber, Damian (1997):
Diskrete Logarithmen in {GF(p)} mit dem Number Field Sieve.
Universit&auml;t des Saarlandes,
[PhD thesis]

Zieschang, Thilo (1997):
Finite groups and graphs in cryptanalysis.
Technische Universit&auml;t Darmstadt,
[PhD thesis]

Zieschang, Thilo (1997):
On the Number of Cycles in Permutations.
(TI-2/97), [Report]

Zieschang, Thilo (1997):
Security Properties of Public Key Certification Networks.
(TI-1/97), [Report]

1996

Meyer, Bernd ; Müller, Volker (1996):
A Public Key Cryptosystem Based on Elliptic Curves over {Z/nZ} Equivalent to Factoring.
In: LNCS, In: EUROCRYPT '96 - International Conference on the Theory and Application of Cryptographic Techniques,
Springer, Saragossa, Spain, ISBN 3-540-61186-X,
[Conference item]

Weber, Damian (1996):
Computing Discrete Logarithms with the General Number Field Sieve.
In: LNCS, In: ANTS-II - Algorithmic Number Theory, Second International Symposium, S. 391-403,
Springer, Talence, France, [Conference item]

Buchmann, Johannes ; Eisenbrand, F. (1996):
On factor refinement in number fields.
Darmstadt: Techn. Hochschule, FB 20, FG Theoretische Informatik, 1996, Darmstadt, Techn. Hochschule, FB 20, FG Theoretische Informatik, [Book]

Buchmann, Johannes ; Jacobson, M. J. ; Teske, E. (1996):
On some computational problems in finite abelian groups.
Darmstadt: Techn. Hochschule, FB 20, FG Theoretische Informatik, 1996, Darmstadt, Techn. Hochschule, FB 20, FG Theoretische Informatik, [Book]

Buchmann, Johannes ; Neis, S. (1996):
Algorithms for linear algebra problems over principal ideal rings.
Darmstadt: Techn. Hochschule, FB 20, FG Theoretische Informatik, 1996, Darmstadt, Techn. Hochschule, FB 20, FG Theoretische Informatik, [Book]

Cohen, Henri (Hrsg.) (1996):
Algorithmic Number Theory, Second International Symposium, ANTS-II, Talence, France, May 18-23, 1996, Proceedings.
In: Lecture Notes in Computer Science, 1122, In: ANTS 1996,
Springer, ISBN 3-540-61581-4,
[Conference item]

Maurer, Ueli (Hrsg.) (1996):
Advances in Cryptology - EUROCRYPT '96, International Conference on the Theory and Application of Cryptographic Techniques, Saragossa, Spain, May 12-16, 1996, Proceeding.
In: Lecture Notes in Computer Science, 1070, In: EUROCRYPT 1996,
Springer, ISBN 3-540-61186-X,
[Conference item]

Biehl, Ingrid ; Meyer, Bernd (1996):
Protocols for Collusion-Secure Asymmetric Fingerprintig.
(TI-1/96), [Report]

Buchmann, Johannes ; Eisenbrand, Friedrich (1996):
On Factor Refinement in Number Fields.
(TI-5/96), [Report]

Buchmann, Johannes ; Jacobson, Michael J. ; Teske, Edlyn (1996):
On some computational problems in finite abelian groups.
(TI-2/96), [Report]

Buchmann, Johannes ; Neis, Stefan (1996):
Algorithms for Linear Algebra Problems over Principal Ideal Rings.
(TI-7/96), [Report]

Denny, Thomas ; Müller, Volker (1996):
On the reduction of composed relations from the number field sieve.
In: International Algorithmic Number Theory Symposium-(ANTS),
[Conference item]

Fischer, Johannes (1996):
Integration von {Ebene-1-Softwarefehlertoleranz} in {LiPS}.
Universit&auml;t des Saarlandes, [Diplom- oder Magisterarbeit]

Kenn, Holger (1996):
Entwurf eines einfachen Client-Server-Systems zur Verteilung von Schlüsseldaten asymmetrischer Kryptosysteme.
Universit&auml;t des Saarlandes, [Diplom- oder Magisterarbeit]

Keuschen, Patrick (1996):
Entwurf und Implementierung von ojekt-orientierten Bibliotheksroutinen zur Realisierung von Secret Sharing Schemata.
Technische Hochschule Darmstadt, [Diplom- oder Magisterarbeit]

Mignotte, Maurice ; Pethö, Attila ; Roth, Ralf (1996):
Complete solutions of a family of quartic Thue and index form equations.
In: >Mathematics of Computation, 65 (213), S. 341-354. [Article]

Monstadt, Andreas (1996):
Eine Entwicklungsumgebung für die objektorientierte Bibliothek {LiDIA}.
Universit&auml;t des Saarlandes, [Diplom- oder Magisterarbeit]

Paulus, Sachar (1996):
Ein Algorithmus zur Berechnung der Klassengruppe quadratischer Ordnungen über Hauptidealringen.
[Report]

Roth, Bärbel (1996):
Pseudozufallszahlengeneratoren in {LiSA}.
Universit&auml;t des Saarlandes, [Diplom- oder Magisterarbeit]

Schirokauer, Oliver ; Weber, Damian ; Denny, Thomas (1996):
Discrete Logarithms: The Effectiveness of the Index Calculus Method.
In: >Algorithmic Number Theory-(ANTS), 1122, S. 337--362. [Article]

Setz, Thomas (1996):
Integration von Mechanismen zur Unterstützung der Fehlertoleranz in {LiPS}.
Universit&auml;t des Saarlandes,
[PhD thesis]

Setz, Thomas ; Fischer, Johannes (1996):
Fault-tolerant Distributed Applications in {LiPS}.
(TI-3/96), [Report]

Setz, Thomas ; Levy, Zohar (1996):
Requirements for {TRIPS}.
(TI-6/96), [Report]

Theobald, Patrick ; Wetzel, Susanne ; Backes, Werner (1996):
Design Concepts for Matrices and Lattices in {LiDIA}.
(TI-4/96), [Report]

Zieschang, Thilo (1996):
Breaking an Oblivious Transfer with Low Exponents.
(TI-10/96), [Report]

Zieschang, Thilo (1996):
Combinatorial Properties of Basic Encryption Operations.
(TI-11/96), [Report]

1995

Weber, Damian (1995):
An Implementation of the General Number Field Sieve to Compute Discrete Logarithms mod p.
In: LNCS, In: EUROCRYPT '95 - International Conference on the Theory and Application of Cryptographic Techniques, S. 95-105,
Springer, Saint-Malo, France, ISBN 3-540-59409-4,
[Conference item]

Guillou, Louis ; Quisquater, Jean-Jacques (Hrsg.) (1995):
Advances in Cryptology - EUROCRYPT '95, International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May 21-25, 1995, Proceeding.
In: Lecture Notes in Computer Science, 921, In: EUROCRYPT 1995,
Springer, ISBN 3-540-59409-4,
[Conference item]

Amendola, Sandro (1995):
Effiziente Algorithmen für Probleme in Gittern über {$mathbbR^d$}.
Universit&auml;t des Saarlandes, [Diplom- oder Magisterarbeit]

Bentz, Patrik (1995):
Eine effiziente Implementierung der verbesserten Buchberger Algorithmen und eine Datenstruktur für Polynome in mehreren Veründerlichen.
Universit&auml;t des Saarlandes, [Diplom- oder Magisterarbeit]

Hiber, Carmen (1995):
Eine Untersuchung der verbesserten Buchberger Algorithmen zur Gröbnerbasen-Konstruktion.
Universit&auml;t des Saarlandes, [Diplom- oder Magisterarbeit]

Meyer, Bernd (1995):
Zur Trennung von Klassen ununterscheidbarer Ensembles.
Universit&auml;t des Saarlandes,
[PhD thesis]

Müller, Andreas (1995):
Eine {FFT}-Continuation für die elliptische Kurvenmethode.
Universit&auml;t des Saarlandes, [Diplom- oder Magisterarbeit]

Müller, Volker (1995):
Ein Algorithmus zur Bestimmung der Punktanzahl elliptischer Kurven über Körpern der Charakteristik größer drei.
Universit&auml;t des Saarlandes,
[PhD thesis]

Theobald, Patrick (1995):
Eine Implementierung von Algorithmen der linearen Algebra über {$mathbbZ$}.
Universit&auml;t des Saarlandes, [Diplom- oder Magisterarbeit]

Thiel, Christoph (1995):
On the complexity of some problems in algorithmic algebraic number theory.
Universit&auml;t des Saarlandes,
[PhD thesis]

Zayer, Jörg (1995):
Faktorisieren mit dem Number Field Sieve.
Universit&auml;t des Saarlandes,
[PhD thesis]

1994

Biehl, Ingrid (1994):
Definition and Existence of Super Complexity Cores.
In: LNCS, In: ISAAC '94 - Algorithms and Computation, 5th International Symposium, S. 600-606,
Springer, Beijing, P. R. China, ISBN 3-540-58325-4,
[Conference item]

Biehl, Ingrid ; Buchmann, Johannes ; Thiel, Christoph (1994):
Cryptographic Protocols Based on Discrete Logarithms in Real-quadratic Orders.
In: LNCS, In: CRYPTO '94 - 14th Annual International Cryptology Conference, S. 56-60,
Springer, Santa Barbara, California, USA, ISBN 3-540-58333-5,
[Conference item]

Buchmann, Johannes ; Loho, Jürgen ; Zayer, Jörg (1994):
An Implementation of the General Number Field Sieve.
In: LNCS, In: CRYPTO '93 - 13th Annual International Cryptology Conference, S. 159-165,
Springer, Santa Barbara, California, USA, ISBN 3-540-57766-1,
[Conference item]

Denny, Thomas ; Dodson, Bruce ; Lenstra, Arjen ; Manasse, Mark (1994):
On the Factorization of {RSA}-120.
In: LNCS, 773, In: CRYPTO’ 93 - Advances in Cryptology, S. 166-174,
Springer, DOI: 10.1007/3-540-48329-2_15,
[Conference item]

Buchmann, Johannes (1994):
Reducing lattice bases by means of approximations.
In: LNCS, In: ANTS-II - Algorithmic Number Theory, Second International Symposium, S. 160-168,
Springer, Talence, France, ISBN 3-540-61581-4,
[Conference item]

Adleman, Leonard ; Huang, Ming-Deh (Hrsg.) (1994):
Algorithmic Number Theory, First International Symposium, ANTS-I, Ithaca, NY, USA, May 6-9, 1994, Proceedings.
In: Lecture Notes in Computer Science, 877, In: ANTS 1994,
Springer, ISBN 3-540-58691-1,
[Conference item]

Desmedt, Yvo (Hrsg.) (1994):
Advances in Cryptology - CRYPTO '94, 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings.
In: Lecture Notes in Computer Science, 839, In: CRYPTO 1994,
Springer, ISBN 3-540-58333-5,
[Conference item]

Du, Ding-Zhu ; Zhang, Xiang-Sun (Hrsg.) (1994):
Algorithms and Computation, 5th International Symposium, ISAAC '94, Beijing, P. R. China, August 25-27, 1994, Proceedings.
In: Lecture Notes in Computer Science, 834, In: ISAAC 1994,
Springer, ISBN 3-540-58325-4,
[Conference item]

Stinson, Douglas (Hrsg.) (1994):
Advances in Cryptology - CRYPTO '93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings.
In: Lecture Notes in Computer Science, 773, In: CRYPTO 1993,
Springer, ISBN 3-540-57766-1,
[Conference item]

Abel, Christine (1994):
Ein Algorithmus zur Berechnung der Klassenzahl und des Regulators reellquadratischer Ordnungen.
Universit&auml;t des Saarlandes,
[PhD thesis]

Biehl, Ingrid ; Buchmann, Johannes (1994):
Algorithms for quadratic orders.
In: >Mathematics of Computation, [Article]

Buchmann, Johannes ; Lenstra, Hendrik W. (1994):
Approximating rings of integers in number fields.
In: >Journal de Théorie des Nombres de Bordeaux, 6 (2), [Article]

Gross, Olaf (1994):
Der Block Lanczos Algorithmus über {$GF(2)$}.
Universit&auml;t des Saarlandes, [Diplom- oder Magisterarbeit]

Handl, Ralf (1994):
Sicherheit kryptographischer Protokolle.
Universit&auml;t des Saarlandes,
[PhD thesis]

Hürter, Michael (1994):
Modifikationen zum Number Field Sieve.
Universit&auml;t des Saarlandes, [Diplom- oder Magisterarbeit]

Lehmann, Frank (1994):
Implementierung von Algorithmen zur Berechnung modularer Polynome und deren Anwendung im Algorithmus von Atkin.
Universit&auml;t des Saarlandes, [Diplom- oder Magisterarbeit]

Maurer, Markus (1994):
Eine Implementierung des Algorithmus von Atkin zur Berechnung der Punktanzahl elliptischer Kurven über endlichen Primkörpern der Charakteristik größer drei.
Universit&auml;t des Saarlandes, [Diplom- oder Magisterarbeit]

Müller, Achim (1994):
Effiziente Algorithmen für Probleme der linearen Algebra über {$mathbbZ$}.
Universit&auml;t des Saarlandes, [Diplom- oder Magisterarbeit]

Neis, Stefan (1994):
Kurze Darstellungen von Ordnungen.
Universit&auml;t des Saarlandes, [Diplom- oder Magisterarbeit]

Sosnowski, Thomas (1994):
Faktorisieren mit dem Quadratischen Sieb auf dem Hypercube.
Universit&auml;t des Saarlandes, [Diplom- oder Magisterarbeit]

Sprang, Oliver van (1994):
Basisreduktionsalgorithmen für Gitter kleiner Dimension.
Trier, Universität des Saarlandes,
[PhD thesis]

Sprang, Oliver van (1994):
Lower Bounds for the {LLL} Lattice Reduction Algorithm.
In: STACS,
[Conference item]

Thiel, Christoph (1994):
Under the Assumption of the Generalized {Riemann} Hypothesis Verifying the Class Number Belongs To {NP} $cap$ co-{NP}.
In: Lecture Notes in Computer Science, 877, In: Algorithmic Number Theory-(ANTS),
[Conference item]

Wiese, Kay (1994):
Parallelisierung von {LLL}-Algorithmen zur Gitterbasisreduktion.
Universit&auml;t des Saarlandes, [Diplom- oder Magisterarbeit]

1993

Rueppel, Rainer (Hrsg.) (1993):
Advances in Cryptology - EUROCRYPT '92, Workshop on the Theory and Application of of Cryptographic Techniques, Balatonfüred, Hungary, May 24-28, 1992, Proceedings.
In: Lecture Notes in Computer Science, 658, In: EUROCRYPT 1992,
Springer, ISBN 3-540-56413-6,
[Conference item]

Bartholomes, Jutta (1993):
Gitterbasisreduktion im Reellen.
Universit&auml;t des Saarlandes, [Diplom- oder Magisterarbeit]

Berger, Franz-Dieter (1993):
ECM - Faktorisieren mit elliptischen Kurven.
Universit&auml;t des Saarlandes, [Diplom- oder Magisterarbeit]

Biehl, Ingrid (1993):
Eine Grundlegung der Average-Case Komplexitätstheorie.
Universit&auml;t des Saarlandes,
[PhD thesis]

Buchmann, Johannes ; Hollinger, Christine (1993):
On smooth ideals in number fields.
In: >Journal of Number Theory, [Article]

Buchmann, Johannes ; Paulus, Sachar (1993):
Algorithms for finite abelian groups.
[Other]

Denny, Thomas (1993):
Faktorisieren mit dem Quadratischen Sieb.
Universit&auml;t des Saarlandes, [Diplom- oder Magisterarbeit]

Papanikolaou, Thomas (1993):
libF - Eine lange Gleitpunktarithmetik.
Universit&auml;t des Saarlandes, [Diplom- oder Magisterarbeit]

Roth, Ralf ; Setz, Thomas (1993):
Distributed Processing with {LiPS}.
[Other]

Roth, Ralf ; Setz, Thomas (1993):
{LiPS}: a system for distibuted processing on workstations.
[Book]

Scheid, Erik (1993):
Ein neuer Algorithmus zur Berechnung der Klassenzahl algebraischer Zahlkörper.
Universit&auml;t des Saarlandes, [Diplom- oder Magisterarbeit]

Weber, Damian (1993):
Ein Algorithmus zur Zerlegung von Primzahlen in Primideale.
Universit&auml;t des Saarlandes, [Diplom- oder Magisterarbeit]

1992

Biehl, Ingrid ; Buchmann, Johannes ; Meyer, Bernd ; Thiel, Christian ; Thiel, Christoph (1992):
Tools for Proving Zero Knowledge.
In: LNCS, In: EUROCRYPT '92 - Workshop on the Theory and Application of of Cryptographic Techniques, S. 356-365,
Springer, Balatonfüred, Hungary, ISBN 3-540-56413-6,
[Conference item]

Ganzinger, Harald ; Paul, Wolfgang ; Buchmann, Johannes
Ganzinger, Harald ; Paul, Wolfgang ; Buchmann, Johannes (Hrsg.) (1992):
Informatik - Festschrift zum 60. Geburtstag von Günter Hotz.
In: Teubner Texte, Vieweg + Teubner, ISBN 978-3815420331,
[Book]

Buchmann, Johannes ; Kessler, Volker (1992):
Computing a reduced lattice basis from a generating system.
[Other]

Buchmann, Johannes ; Sprang, Oliver van (1992):
On short representations of orders and number fields.
[Other]

Buchmann, Johannes ; Thiel, Christoph ; Williams, Hugh (1992):
Short representations of quadratic integers.
[Other]

Merscher, Patrick (1992):
Standards fuer objektorientiertes Programmieren in der Computeralgebra.
Universit&auml;t des Saarlandes, [Diplom- oder Magisterarbeit]

Meyer, Bernd (1992):
Bit-Commitment-Schemes und Zero-Knowledge.
Universit&auml;t des Saarlandes, [Diplom- oder Magisterarbeit]

Naumann-Kipper, Petra (1992):
Interaktive Beweissysteme und {Arthur-Merlin- Beweissysteme}.
Universit&auml;t des Saarlandes, [Diplom- oder Magisterarbeit]

Paulus, Sachar (1992):
Algorithmen fuer endliche abelsche Gruppen.
Universit&auml;t des Saarlandes, [Diplom- oder Magisterarbeit]

Roth, Ralf (1992):
{LiPS} Ein System für verteilte Anwendungen.
Universit&auml;t des Saarlandes, [Diplom- oder Magisterarbeit]

Thiel, Christian (1992):
Zur Identität von {IP} und {ZK}.
Universit&auml;t des Saarlandes, [Diplom- oder Magisterarbeit]

Thiel, Christoph (1992):
Zur Theorie interaktiver Beweissysteme mit mehreren Provern.
Universit&auml;t des Saarlandes, [Diplom- oder Magisterarbeit]

1991

Buchmann, Johannes (1991):
Number Theoretic Algorithms and Cryptology.
In: LNCS, In: FCT '91 - Fundamentals of Computation Theory, 8th International Symposium, S. 16-21,
Springer, Gosen, Germany, ISBN 3-540-54458-5,
[Conference item]

Buchmann, Johannes ; Düllmann, Stephan (1991):
On the Computation of Discrete Logarithms in Class Groups.
In: LNCS, In: CRYPTO '90 - 10th Annual International Cryptology Conference, S. 134-139,
Springer, Santa Barbara, California, USA, ISBN 3-540-54508-5,
[Conference item]

Budach, Lothar (Hrsg.) (1991):
Fundamentals of Computation Theory, 8th International Symposium, FCT '91, Gosen, Germany, September 9-13, 1991, Proceedings.
In: Lecture Notes in Computer Science, 529, In: FCT 1991,
Springer, ISBN 3-540-54458-5,
[Conference item]

Menezes, Alfred ; Vanstone, Scott (Hrsg.) (1991):
Advances in Cryptology - CRYPTO '90, 10th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings.
In: Lecture Notes in Computer Science, 537, In: CRYPTO 1990,
Springer, ISBN 3-540-54508-5,
[Conference item]

Buchmann, Johannes ; Düllmann, Stephan (1991):
Distributed class group computation.
[Other]

Buchmann, Johannes ; Müller, Volker (1991):
Computing the number of points on elliptic curves over finite prime fields.
In: International Symposium on Symbolic and Algebraic Computation-(ISSAC 1991), S. 179--182,
[Conference item]

Buchmann, Johannes ; Roth, Ralf ; Diehl, Matthias (1991):
{LiPS}: A System for distributed applications.
[Other]

Buchmann, Johannes ; Williams, Hugh (1991):
Some remarks concerning the complexity of computing class groups of quadratic fields.
In: >Journal of Complexity, 7 (3), S. 311-315. DOI: 10.1016/0885-064X(91)90039-Z,
[Article]

Düllmann, Stephan (1991):
Ein Algorithmus zur Bestimmumg positiv definiter binaerer quadratischer Formen.
Universität des Saarlandes,
[PhD thesis]

Loho, Jürgen (1991):
Die Implementierung des Number Field Sieve.
Universit&auml;t des Saarlandes, [Diplom- oder Magisterarbeit]

Müller, Volker (1991):
Berechnung der Punktanzahl Elliptischer Kurven über endlichen Primkörpern.
Universit&auml;t des Saarlandes, [Diplom- oder Magisterarbeit]

Schank, Eric (1991):
Zur probabilistischen Berechenbarkeitstheorie.
Universit&auml;t des Saarlandes, [Diplom- oder Magisterarbeit]

Zayer, Jörg (1991):
Die Theorie des Number Field Sieve.
Universit&auml;t des Saarlandes, [Diplom- oder Magisterarbeit]

1990

Quisquater, Jean-Jacques ; Vandewalle, Joos (Hrsg.) (1990):
Advances in Cryptology - EUROCRYPT '89, Workshop on the Theory and Application of of Cryptographic Techniques, Houthalen, Belgium, April 10-13, 1989, Proceedings.
In: Lecture Notes in Computer Science, 434, In: EUROCRYPT 1989,
Springer, ISBN 3-540-53433-4,
[Conference item]

Buchmann, Johannes (1990):
A subexponential algorithm for the determination of class groups and regulators of algebraic number fields.
In: Progr. Math., 91, In: Séminaire de Théorie des Nombres, Paris 1988--1989, S. 27--41,
Birkhäuser Boston, [Conference item]

Buchmann, Johannes ; Shoup, Victor (1990):
Constructing Nonresidues in Finite Fields and the Extended Riemann Hypothesis.
[Other]

Wellner, Ingrid (1990):
Zur Theorie der Zero Knowledge Proofs.
Universit&auml;t des Saarlandes, [Diplom- oder Magisterarbeit]

1989

Buchmann, Johannes ; Düllmann, Stephan ; Williams, Hugh (1989):
On the Complexity and Efficiency of a New Key Exchange System.
In: LNCS, In: EUROCRYPT '89 - Workshop on the Theory and Application of of Cryptographic Techniques, S. 597-616,
Springer, Houthalen, Belgium, ISBN 3-540-53433-4,
[Conference item]

1988

Düllmann, Stephan (1988):
Ein neues Verfahren zum öffentlichen Schlüsselaustausch.
[Other]

This list was generated on Mon Oct 18 01:44:56 2021 CEST.