Zurück zur Übersicht
Exportieren als [feed] RSS 1.0 [feed] RSS 2.0
Gruppieren nach: Erscheinungsjahr | Autoren | Dokumenttyp | Keine Sortierung
Springe zu: 2018 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997

2018

Hamann, Matthias (2018) Lightweight Cryptography on Ultra-Constrained RFID Devices. Open Access Mannheim [Dissertation]
[img]
Vorschau

2014

Armknecht, Frederik ; Hamann, Matthias ; Mikhalev, Vasily (2014) Lightweight Authentication Protocols on Ultra-Constrained RFIDs - Myths and Facts. In: Radio Frequency Identification: Security and Privacy Issues : 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014, Revised Selected Papers 2014 Cham [Konferenzveröffentlichung]

Armknecht, Frederik ; Hamann, Matthias ; Krause, Matthias (2014) Hardware Efficient Authentication based on Random Selection. In: Sicherheit 2014 - Sicherheit, Schutz und Zuverlässigkeit : [Beiträge der 7. Jahrestagung des Fachbereichs Sicherheit in der Gesellschaft für Informatik e. V. (GI);] 19. - 21. März 2014 in Wien 2014 Bonn [Konferenzveröffentlichung]

2013

Armknecht, Frederik ; Seifert, Jean-Pierre (2013) Third International Workshop on Trustworthy Embedded Devices (TrustED 2013). Open Access In: Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security : CCS'13 ; November 4-8, 2013, Berlin, Germany 2013 New York, NY [Konferenzveröffentlichung]
[img]
Vorschau

Armknecht, Frederik ; Hauptmann, Manuel ; Roos, Stefanie ; Strufe, Thorsten (2013) Protecting Public OSN Posts from Unintended Access. Open Access Mannheim [u.a.] [Arbeitspapier]
[img]
Vorschau

Kasten, Andreas ; Scherp, Ansgar ; Armknecht, Frederik ; Krause, Matthias (2013) Towards Search on Encrypted Graph Data. In: PrivOn 2013 : Proceedings of the Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn2013) co-located with the 12th International Semantic Web Conference (ISWC 2013) Sydney, Australia, October 22, 2013 2013 Aachen [Konferenzveröffentlichung]

2012

Tatli, Emin Islam (2012) Google Reveals Cryptographic Secrets. In: Book of Abstracts Krypto-Tage 2004 - 2012 2012 Darmstadt [Konferenzveröffentlichung]

Krause, Matthias ; Hamann, Matthias (2012) The Cryptographic Power of Random Selection. In: Selected Areas in Cryptography 2012 Berlin [u.a.] [Konferenzveröffentlichung]

Armknecht, Frederik und Lucks, Stefan und Preneel, Bart und Rogaway, Philip (2012) Symmetric Cryptography : Report from Dagstuhl Seminar 12031. Open Access In: Symmetric Cryptography 2012 Wadern [Konferenzveröffentlichung]
[img]
Vorschau

2011

Armknecht, Frederik ; Maes, Roel ; Sadeghi, Ahmad-Reza ; Standaert, Francois-Xavier ; Wachsmann, Christian (2011) A Formalization of the Security Features of Physical Functions. In: Proceedings of the 2011 IEEE Symposium on Security and Privacy 2011 Washington, DC [Konferenzveröffentlichung]

Stegemann, Dirk (2011) Selected Cryptographic Methods for Securing Low-End Devices. Open Access Mannheim [Dissertation]
[img]
Vorschau

Armknecht, Frederik ; Fleischmann, Ewan ; Krause, Matthias ; Lee, Jooyoung ; Stam, Martijn ; Steinberger, John (2011) The Preimage Security of Double-Block-Length Compression Functions. In: Advances in cryptology : proceedings / ASIACRYPT 2011, 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4 - 8, 2011 2011 Berlin [u.a.] [Konferenzveröffentlichung]

Armknecht, Frederik ; Augot, Daniel ; Perret, Ludovic ; Sadeghi, Ahmad-Reza (2011) On Constructing Homomorphic Encryption Schemes from Coding Theory. In: Cryptography and coding : 13th IMA International Conference, IMACC 2011, Oxford, UK, December 2011; proceedings 2011 Berlin [u.a.] [Konferenzveröffentlichung]

Armknecht, Frederik ; Strufe, Thorsten (2011) An Efficient Distributed Privacy-Preserving Recommendation System. In: 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net) 2011 Washington, DC [u.a.] [Konferenzveröffentlichung]

Armknecht, Frederik ; Elsner, Carsten ; Schmidt, Martin Ulrich (2011) Using the Inhomogeneous Simultaneous Approximation Problem for Cryptographic Design. In: Progress in cryptology -- AFRICACRYPT 2011 : 4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5 - 7, 2011; proceedings 2011 Berlin [u.a.] [Konferenzveröffentlichung]

Armknecht, Frederik ; Furukawa, Jun (2011) On the minimum communication effort for secure group key exchange. In: Selected areas in cryptography : 17th International Workshop, SAC 2010, Waterloo, Ontario, Canada, August 12 - 13, 2010; revised selected papers 2011 Berlin [u.a.] [Konferenzveröffentlichung]

2010

Armknecht, Frederik ; Chen, Liqun ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2010) Anonymous Authentication for RFID Systems. In: Radio frequency identification: security and privacy issues : 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8 - 9, 2010; revised selected papers 2010 Berlin [u.a.] [Konferenzveröffentlichung]

Liu, Yali ; Ghosal, Dipak ; Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Katzenbeisser, Stefan (2010) Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic. In: Information hiding : 12th International Conference, IH 2010, Calgary, AB, Canada, June 28 - 30, 2010; revised selected papers 2010 Berlin [u.a.] [Konferenzveröffentlichung]

Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian (2010) On RFID Privacy with Mutual Authentication and Tag Corruption. In: Applied cryptography and network security : 8th International Conference, ACNS 2010, Beijing, China, June 22 - 25, 2010; proceedings 2010 Berlin [u.a.] [Konferenzveröffentlichung]

Krause, Matthias ; Armknecht, Frederik ; Fleischmann, Ewan (2010) Preimage Resistance Beyond the Birthday Bound: Double-Length Hashing Revisited. Open Access Cryptology ePrint archive 2010 Report 519 [Zeitschriftenartikel]
[img]
Vorschau

2009

Krause, Matthias ; Stegemann, Dirk (2009) More on the Security of Linear RFID Authentication Protocols. In: Selected areas in cryptography : 16th International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13 - 14, 2009; revised selected paper 2009 Berlin [u.a.] [Konferenzveröffentlichung]

Krause, Matthias ; Stegemann, Dirk (2009) Algebraic Attacks against Linear RFID Authentication Protocols. 2009 Wadern [Konferenzveröffentlichung]

Polzin, Tobias ; Vahdati Daneshmand, Siavash (2009) Approaches to the Steiner Problem in Networks. Berlin [u.a.] 81-103 [Buchkapitel]

2008

Tatli, Emin Islam (2008) Security in Context-aware Mobile Business Applications. Open Access [Dissertation]
[img]
Vorschau

Guetat, Amel (2008) Real Time Rendering of Deformable and Semi-Transparent Objects by Volume Rendering. Open Access Mannheim [Dissertation]
[img]
Vorschau

Becherer, Nico (2008) Simulation von Herzkatheterinterventionen bei Kleinkindern. Open Access Mannheim [Dissertation]
[img]
Vorschau

2007

Stegemann, Dirk (2007) Extended BDD-based Cryptanalysis of Keystream Generators. In: Selected areas in cryptography : 14th International Workshop, SAC 2007, Ottawa, Canada, August 16 - 17, 2007; revised selected papers 2007 Berlin [u.a.] [Konferenzveröffentlichung]

2006

Armknecht, Frederik (2006) Algebraic attacks on certain stream ciphers. Open Access Mannheim [Dissertation]
[img]
Vorschau

Polzin, Tobias ; Vahdati Daneshmand, Siavash (2006) Practical partitioning-based methods for the Steiner problem. In: Experimental algorithms : 5th International Workshop, WEA 2006, Cala Galdana, Menorca, Spain, May 24 - 27, 2006; proceedings 2006 Berlin [u.a.] [Konferenzveröffentlichung]

Krause, Matthias ; Stegemann, Dirk (2006) Reducing the Space Complexity of BDD-based Attacks on Keystream Generators. In: Fast software encryption : 13th International Workshop, FSE 2006; Graz, Austria, March 15 - 17, 2006; revised selected papers 2006 Berlin [u.a.] [Konferenzveröffentlichung]

Tatli, Emin Islam (2006) Privacy in Context-aware Mobile Business Applications. Mannheim [Arbeitspapier]

Tatli, Emin Islam (2006) Context Data Model for Privacy. Mannheim [Arbeitspapier]

Armknecht, Frederik ; Carlet, Claude ; Gaborit, Philippe ; Künzli, Simon ; Meier, Willi ; Ruatta, Olivier (2006) Efficient computation of algebraic immunity for algebraic and fast algebraic attacks. In: Advances in cryptology - EUROCRYPT 2006 : 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006; proceedings 2006 Berlin [u.a.] [Konferenzveröffentlichung]

Armknecht, Frederik ; Brandeis, Jörg ; Ilinykh, Egor (2006) Experimental Results on Algebraic Attacks on Stream Ciphers. In: Sicherheit 2006 : Haupttagung "Sicherheit - Schutz und Zuverlässigkeit"; Workshop "Qualifizierte elektronische Signaturen in Theorie und Praxis" (QSIG 2006); Otto-von-Guericke-Universität Magdeburg, 20. - 22. Februar 2006 2006 Bonn [Konferenzveröffentlichung]

Armknecht, Frederik ; Krause, Matthias (2006) Constructing Single- and Multi-output Boolean Functions with Maximal Algebraic Immunity. In: Automata, languages and programming : 33rd International Colloquium, ICALP 2006, Venice, Italy, July 10 - 14, 2006; proceedings 2006 Berlin [u.a.] [Konferenzveröffentlichung]

Kelsey, John ; Lucks, Stefan (2006) Collisions and Near-Collisions for Reduced-Round TIGER. In: Fast software encryption : 13th International Workshop, FSE 2006; Graz, Austria, March 15 - 17, 2006; revised selected papers 2006 Berlin [u.a.] [Konferenzveröffentlichung]

Weis, Rüdiger ; Lucks, Stefan (2006) Cryptographic Hash Functions : Recent Results on Cryptanalysis and their Implications on Systems Security. In: Proceedings SANE 2006 : May 15-19, 2006, Delft, The Netherlands 2006 [Delft] [Konferenzveröffentlichung]

2005

Lucks, Stefan (2005) A Failure-Friendly Design Principle for Hash Functions. In: Advances in cryptology - ASIACRYPT 2005 : 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India; proceedings 2005 Berlin [u.a.] [Konferenzveröffentlichung]

Armknecht, Frederik (2005) Algebraic Attacks and Annihilators. In: WEWoRC 2005 : Western European Workshop on Research in Cryptology; in Leuven, Belgium 2005 Bonn [Konferenzveröffentlichung]

Armknecht, Frederik ; Krause, Matthias ; Stegemann, Dirk (2005) Design Principles for Combiners with Memory. In: Progress in cryptology - INDOCRYPT 2005 : 6th International Conference on Cryptology in India, Bangalore, India; proceedings 2005 Berlin [u.a.] [Konferenzveröffentlichung]

Lucks, Stefan ; Zenner, Erik ; Weimerskirch, Andre (2005) Entity Recognition for Sensor Network Motes. In: Informatik 2005 : 35th Annual Conference of the Gesellschaft für Informatik e.V., Bonn, 19.-22.9. 2005 2005 Bonn [Konferenzveröffentlichung]

Armknecht, Frederik ; Meier, Willi (2005) Fault Attacks on Combiners with Memory. In: Selected Areas in Cryptography : 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11 - 12, 2005 ; revised selected papers 2005 Berlin [u.a.] [Konferenzveröffentlichung]

Weis, Rüdiger ; Lucks, Stefan (2005) Hashfunktionen gebrochen. Datenschutz und Datensicherheit : DuD 29 4 1-4 [Zeitschriftenartikel]

Armknecht, Frederik ; Ars, Gwénolé (2005) Introducing a New Variant of Fast Algebraic Attacks and Minimizing Their Successive Data Complexity. In: Progress in Cryptology - MYCRYPT 2005 : First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28 - 30, 2005; proceedings 2005 Berlin [u.a.] [Konferenzveröffentlichung]

Lucks, Stefan ; Schmoigl, Nico ; Tatli, Emin Islam (2005) Issues on Designing a Cryptographic Compiler. In: WEWoRC 2005 : Western European Workshop on Research in Cryptology; July 5 - 7, 2005, in Leuven, Belgium 2005 Bonn [Konferenzveröffentlichung]

Kühn, Ulrich ; Kursawe, Klaus ; Lucks, Stefan ; Saghedi, Ahmed-Reza ; Stüble, Christian (2005) Secure Data Management in Trusted Computing. In: Cryptographic Hardware and Embedded Systems - CHES 2005 : 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005; proceedings 2005 Berlin [u.a.] [Konferenzveröffentlichung]

Tatli, Emin Islam ; Stegemann, Dirk ; Lucks, Stefan (2005) Security Challenges of Location-Aware Mobile Business. In: Proceedings / 2nd IEEE International Workshop on Mobile Commerce and Services (WMCS '05), July 19, 2005, Munich, Germany 2005 Los Alamitos, Calif. [Konferenzveröffentlichung]

Lucks, Stefan (2005) Two-Pass Authenticated Encryption Faster Than Generic Composition. In: Fast Software Encryption : 12th International Workshop, FSE 2005, Paris, France, February 21 - 23, 2005; revised selected papers 2005 Berlin [u.a.] [Konferenzveröffentlichung]

Wolf, Christopher und Lucks, Stefan und Yau, Po-Wah (2005) WEWoRC 2005 : Western European Workshop on Research in Cryptology; July 5 - 7, 2005, in Leuven, Belgium. Bonn [Buch]

Armknecht, Frederik ; Lucks, Stefan (2005) Linearity of the AES Key Schedule. In: Advanced encryption standard - AES : 4th International Conference, AES 2004, Bonn, Germany, May 10 - 12, 2004; revised selected and invited papers 2005 Berlin [u.a.] [Konferenzveröffentlichung]

Beller, Michael (2005) Ein intuitives Verfahren zur adaptiven merkmalsgestützten Segmentierung. Open Access Mannheim [Dissertation]
[img]
Vorschau

2004

Vahdati Daneshmand, Siavash (2004) Algorithmic Approaches to the Steiner Problem in Networks. Open Access [Dissertation]
[img]
Vorschau

Zenner, Erik (2004) On Cryptographic Properties of LFSR-based Pseudorandom Generators. Open Access [Dissertation]
[img]
Vorschau

Armknecht, Frederik (2004) Algebraic Attacks on Stream Ciphers. In: Proceedings / ECCOMAS 2004, 4th European Congress on Computational Methods in Applied Sciences and Engineering : Jyväskylä, Finland, 24 - 28 July 2004 2004 Jyväskylä [Konferenzveröffentlichung]

Lucks, Stefan (2004) Ciphers Secure against Related Key Attacks. In: Fast Software Encryption : 11th International Workshop, FSE 2004, Delhi, India, February 5 - 7, 2004; revised papers 2004 Berlin [u.a.] [Konferenzveröffentlichung]

Armknecht, Frederik ; Lano, Joseph ; Preneel, Bart (2004) Extending the Resynchronization Attack. In: Selected Areas in Cryptography : 10th Annual International Workshop, SAC 2003, Ottawa, Canada, August 14-15, 2003; revised papers 2004 Berlin [u.a.] [Konferenzveröffentlichung]

Armknecht, Frederik (2004) Improving Fast Algebraic Attacks. In: Fast Software Encryption : 11th International Workshop, FSE 2004, Delhi, India, February 5 - 7, 2004; revised papers 2004 Berlin [u.a.] [Konferenzveröffentlichung]

2003

Armknecht, Frederik ; Krause, Matthias (2003) Algebraic attacks on combiners with memory. In: Advances in cryptology - CRYPTO 2003 : 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17 - 21, 2003; proceedings 2003 Berlin [u.a.] [Konferenzveröffentlichung]

Lucks, Stefan ; Zenner, Erik (2003) Kryptographie - Eine Geheimwissenschaft wird öffentlich. Forum : Forschung Uni Mannheim 14-17 [Zeitschriftenartikel]

Ferguson, Niels ; Whiting, Doug ; Schneier, Bruce ; Kelsey, John ; Lucks, Stefan ; Kohno, Tadayoshi (2003) Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive. In: Fast software encryption : 10th International Workshop, FSE 2003, Lund, Sweden, February 24 - 26, 2003; revised papers 2003 Berlin [u.a.] [Konferenzveröffentlichung]

Lucks, Stefan ; Weis, Rüdiger (2003) How to turn a PIN into an Iron Beam: A patent-free and practical protocol for secure communication using a weak common secret. In: Security and Privacy in the Age of Uncertainty : IFIP TC11 18th International Conference on Information Security (SEC2003), May 26-28, 2003, Athens, Greece 2003 Boston, Mass. [u.a.] [Konferenzveröffentlichung]

Daneshmand, Siavash Vahdati ; Althaus, Ernst ; Polzin, Tobias (2003) Improving Linear Programming Approaches for the Steiner Tree Problem. In: Experimental and efficient algorithms : second international workshop ; proceedings / WEA 2003, Ascona, Switzerland, May 26 - 28, 2003 2003 Berlin [u.a.] [Konferenzveröffentlichung]

Daneshmand, Siavash Vahdati ; Polzin, Tobias (2003) On Steiner Trees and Minimum Spanning Trees in Hypergraphs. Operations Research Letters 31 1 12-20 [Zeitschriftenartikel]

Lucks, Stefan ; Bogk, Andreas ; Weis, Rüdiger (2003) Sicherheit von 1024bit RSA Schlüsseln gefährdet. Datenschutz und Datensicherheit : DuD 27 6 360 [Zeitschriftenartikel]

2002

Armknecht, Frederik (2002) A Linearization Attack on the Bluetooth Key Stream Generator. Mannheim [Arbeitspapier]

Lucks, Stefan (2002) A Variant of the Cramer-Shoup Cryptosystem for Groups of Unknown Order. In: Advances in cryptology - ASIACRYPT 2002 : 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1 - 5, 2002; proceedings 2002 Berlin [u.a.] [Konferenzveröffentlichung]

Weis, Rüdiger ; Lucks, Stefan (2002) "All your key bit are belong to us" the true story of black box cryptography. In: 3rd International SANE Conference May 27 - 31, 2002 MECC, Maastricht, The Netherlands 2002 Amerongen [Konferenzveröffentlichung]

Krause, Matthias (2002) BDD-based Cryptanalysis of Keystream Generators. In: Advances in cryptology - EUROCRYPT 2002 : International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002; proceedings 2002 Berlin [u.a.] [Konferenzveröffentlichung]

Polzin, Tobias ; Vahdati Daneshmand, Siavash (2002) Extending Reduction Techniques for the Steiner Tree Problem. In: Algorithms - ESA 2002 : 10th Annual European Symposium, Rome, Italy, September 17-21, 2002; proceedings 2002 Berlin [u.a.] [Konferenzveröffentlichung]

Lucks, Stefan ; Weis, Rüdiger (2002) Neue Ergebnisse zur Sicherheit des Verschlüsselungsstandards AES. Datenschutz und Datensicherheit : DuD 26 12 748-751 [Zeitschriftenartikel]

Krause, Matthias (2002) On the Computational Power of Boolean Decision Lists. In: STACS 2002 : 19th Annual Symposium on Theoretical Aspects of Computer Science, Antibes- Juan les Pins, France, March 14 - 16, 2002; proceedings 2002 Berlin [Konferenzveröffentlichung]

Zenner, Erik (2002) On the Efficiency of the Clock Control Guessing Attack. In: Information security and cryptology - ICISC 2002 : 5th International Conference, Seoul, Korea, November 28 - 29, 2002; revised papers 2002 Berlin [u.a.] [Konferenzveröffentlichung]

Janzing, Dominik ; Armknecht, Frederik ; Zeier, Robe ; Beth, Thomas (2002) Quantum control without access to the controlling interaction. Physical Review / A 65 2 022104, 1-8 [Zeitschriftenartikel]

2001

Crowley, Paul ; Lucks, Stefan (2001) Bias in the Leviathan Stream cipher. In: Fast software encryption : 8th International Workshop, FSE 2001, Yokohama, Japan, April 2 - 4, 2001; revised papers 2001 Berlin [u.a.] [Konferenzveröffentlichung]

Ferguson, Niels ; Kelsey, John ; Lucks, Stefan ; Schneier, Bruce ; Stay, Mike ; Wagner, David ; Whiting, Doug (2001) Improved Cryptanalysis of Rijndael. In: Fast software encryption : 7th International Workshop, FSE 2000, New York, NY, USA, April 10 -12, 2000; proceedings 2001 Berlin [u.a.] [Konferenzveröffentlichung]

Zenner, Erik ; Krause, Matthias ; Lucks, Stefan (2001) Improved Cryptanalysis of the Self-Shrinking Generator. In: Information security and privacy : 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11 - 13, 2001; proceedings 2001 Berlin [u.a.] [Konferenzveröffentlichung]

Krause, Matthias ; Lucks, Stefan (2001) On the Minimal Hardware Complexity of Pseudorandom Function Generators. In: Proceedings STACS 2001 : 18th Annual Symposium on Theoretical Aspects of Computer Science, Dresden, Germany, February 15 - 17, 2001 2001 Berlin [u.a.] [Konferenzveröffentlichung]

Lucks, Stefan (2001) The Saturation Attack - a Bait for Twofish. In: Fast software encryption : 8th International Workshop, FSE 2001, Yokohama, Japan, April 2 - 4, 2001; revised papers 2001 Berlin [u.a.] [Konferenzveröffentlichung]

2000

Polzin, Tobias ; Vahdati Daneshmand, Siavash (2000) A Comparison of Steiner Tree Relaxations. Discrete Applied Mathematics : DAM 11 241-261 [Zeitschriftenartikel]

Lucks, Stefan (2000) Attacking Seven Rounds of Rijndael under 192-bit and 256-bit Keys. In: The Third Advanced Encryption Standard Candidate Conference : AES 3; April 13-14 2000, New York, NY 2000 Gaithersburg, Md. [Konferenzveröffentlichung]

Lucks, Stefan ; Weis, Rüdiger (2000) How to make DES-based smartcards fit for the 21-st century. In: Smart card research and advanced applications : IFIP TC8/WG8.8 Fourth Working Conference on Smart Card Research and Advanced Applications, September 20-22, 2000, Bristol, United Kingdom 2000 Boston, Mass. [u.a.] [Konferenzveröffentlichung]

Bakker, Bastiaan ; Weis, Rüdiger ; Lucks, Stefan (2000) How to Ring a Swan: Adding Tamper Resistant Authentication to Linux IPSec. In: Proceedings / SANE 2000 : May 22 - 25, 2000, Maastricht, The Netherlands / [2nd International System Administration and Networking Conference] 2000 Amsterdam [Konferenzveröffentlichung]

Polzin, Tobias ; Vahdati Daneshmand, Siavash (2000) Improved Algorithms for the Steiner Problem in Networks. Discrete Applied Mathematics 11 263-300 [Zeitschriftenartikel]

Krause, Matthias ; Simon, Hans Ulrich (2000) Determining the Optimal Contrast for Secret Sharing Schemes in Visual Cryptography. In: LATIN 2000: Theoretical informatics : 4th Latin American Symposium, Punta del Este, Uruguay, April 10 - 14, 2000; proceedings 2000 Berlin [u.a.] [Konferenzveröffentlichung]

Weis, Rüdiger ; Effelsberg, Wolfgang ; Lucks, Stefan (2000) Remotely Keyed Encryption with Java Cards : A Secure and Efficient Method to Encrypt Multimedia Streams. In: Proceedings : [latest advances in the fast changing world of multimedia] ; 30 July - 2 August 2000, New York, NY USA 2000 Piscataway, NJ [Konferenzveröffentlichung]

Weis, Rüdiger ; Lucks, Stefan (2000) The Performance of Modern Block Ciphers in JAVA. In: Smart card research and applications : Third International Conference, CARDIS '98, Louvain-la-Neuve, Belgium, September 14 - 16, 1998; proceedings 2000 Berlin [u.a.] [Konferenzveröffentlichung]

Lucks, Stefan (2000) The Sum of PRPs is a Secure PRF. In: Advances in cryptology : proceedings / EUROCRYPT 2000, International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14 - 18, 2000 2000 Berlin [u.a.] [Konferenzveröffentlichung]

1999

Lucks, Stefan (1999) Accelerated Remotely Key Encryption. In: Fast Software Encyption : 6th International Workshop, FSE '99, Rome, Italy, March 24 - 26, 1999; proceedings 1999 Berlin [u.a.] [Konferenzveröffentlichung]

Weis, Rüdiger ; Lucks, Stefan (1999) Advanced Encryption Standard : Verschlüsselungsstandard für das einundzwanzigste Jahrhundert. Datenschutz und Datensicherheit : DuD 23 10 [Zeitschriftenartikel]

Krause, Matthias ; Savicky, Petr ; Wegener, Ingo (1999) Approximations by OBDDs and the variable ordering problem. In: Automata, languages and programming : 26th International Colloquium, ICALP '99, Prague, Czech Republik, July 11 - 15, 1999; proceedings 1999 Berlin [u.a.] [Konferenzveröffentlichung]

Weis, Rüdiger ; Lucks, Stefan (1999) Fast Multimedia Encryption in JAVA : Using Unbalanced Luby/Rackoff Ciphers. In: Multimedia applications, services and techniques - ECMAST '99 : 4th European conference, Madrid, Spain, May 26 - 28, 1999; proceedings 1999 Berlin [u.a.] [Konferenzveröffentlichung]

Lucks, Stefan (1999) On the Security of the 128-Bit Block Cipher DEAL. In: Fast software encryption : 6th International Workshop, FSE '99, Rome, Italy, March 24 - 26, 1999; proceedings 1999 Berlin [u.a.] [Konferenzveröffentlichung]

Lucks, Stefan ; Weis, Rüdiger (1999) Remotely Keyed Encryption Using Non-Encrypting Smart Cards. In: Proceedings of the USENIX Workshop on Smartcard Technology (Smartcard '99) : May 10-11,1999, Chicago, Illinois, USA 1999 Berkeley, Calif. [Konferenzveröffentlichung]

Weis, Rüdiger ; Lucks, Stefan (1999) Sichere, standardisierte, symmetrische Verschlüsselung auf Basis von DES und AES. Praxis der Informationsverarbeitung und Kommunikation : PIK 22 4 226-232 [Zeitschriftenartikel]

1998

Lucks, Stefan (1998) Attacking Triple Encryption. In: Fast software encryption : 5th international workshop, FSE'98, Paris, France, March 23 - 25, 1998; proceedings 1998 Berlin [u.a.] [Konferenzveröffentlichung]

Krause, Matthias ; Pudlak, Pavel (1998) Computing Boolean functions by polynomials and threshold circuits. Computational Complexity 7 4 346-370 [Zeitschriftenartikel]

Weis, Rüdiger ; Lucks, Stefan (1998) KEA. Datenschutz und Datensicherheit : DuD 22 10 [Zeitschriftenartikel]

Weis, Rüdiger ; Lucks, Stefan (1998) Sicherheitsprobleme bei Authentifizierung und Verschlüsselung in GSM-Netzen. Datenschutz und Datensicherheit : DuD 22 9 504-508 [Zeitschriftenartikel]

1997

Krause, Matthias ; Simon, Hans Ulrich ; Hofmeister, Thomas (1997) Contrast-optimal k out of n secret sharing schemes in visual cryptography. In: Computing and combinatorics : third Annual International Conference COCOON '97, Shanghai, China, August 20-22, 1997; proceedings 1997 Berlin [u.a.] [Konferenzveröffentlichung]

Krause, Matthias ; Pudlak, Pavel (1997) On the computational power of depth 2 circuits with threshold and modulo gates. Theoretical Computer Science 174 1/2 137-156 [Zeitschriftenartikel]

Diese Liste wurde am Tue Jul 17 21:27:14 2018 CEST automatisch erstellt.