Johannes Buchmann

From MaRDI portal
(Redirected from Person:1179459)


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
scientific article; zbMATH DE number 7802911 (Why is no real title available?)
 
2024-02-10Paper
Function-Dependent Commitments for Verifiable Multi-party Computation
Developments in Language Theory
2023-06-30Paper
CHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear Case
Information Security Practice and Experience
2023-06-30Paper
On lattice-based interactive protocols: an approach with less or no aborts
 
2021-06-08Paper
Sustainable cryptography
International Symposium on Mathematics, Quantum Theory, and Cryptography
2021-02-25Paper
\textsf{BLAZE}: practical lattice-based blind signatures for privacy-preserving applications
 
2021-02-08Paper
Differential power analysis of XMSS and SPHINCS
Constructive Side-Channel Analysis and Secure Design
2020-07-20Paper
Function-dependent commitments from homomorphic authenticators
 
2020-05-27Paper
Context hiding multi-key linearly homomorphic authenticators
 
2020-01-28Paper
Efficient proactive secret sharing for large data via concise vector commitments
 
2019-10-14Paper
Estimation of the hardness of the learning with errors problem with a restricted number of samples
Journal of Mathematical Cryptology
2019-05-21Paper
\(\mathsf{ELSA}\): efficient long-term secure storage of large datasets
 
2019-03-29Paper
Long-term secure time-stamping using preimage-aware hash functions (short version)
 
2018-11-07Paper
Revisiting TESLA in the quantum random oracle model
 
2018-09-12Paper
Performing computations on hierarchically shared secrets
 
2018-07-17Paper
Recovering short generators of principal fractional ideals in cyclotomic fields of conductor \(p^\alpha q^\beta\)
 
2018-04-26Paper
A linearly homomorphic signature scheme from weaker assumptions
 
2018-04-20Paper
Long-term secure commitments via extractable-binding commitments
 
2017-08-25Paper
On lower bounds for information set decoding over \(\mathbb F_q\) and on the effect of partial knowledge
International Journal of Information and Coding Theory
2017-07-26Paper
Linearly homomorphic authenticated encryption with provable correctness and public verifiability
Codes, Cryptology and Information Security
2017-06-01Paper
Dynamic and verifiable hierarchical secret sharing
Lecture Notes in Computer Science
2017-01-06Paper
Password requirements markup language
Information Security and Privacy
2016-08-31Paper
Homomorphic signature schemes. A survey
SpringerBriefs in Computer Science
2016-08-04Paper
An efficient lattice-based signature scheme with provably secure instantiation
Progress in Cryptology – AFRICACRYPT 2016
2016-06-22Paper
On the hardness of LWE with binary error: revisiting the hybrid lattice-reduction and meet-in-the-middle attack
Progress in Cryptology – AFRICACRYPT 2016
2016-06-22Paper
Introduction to cryptography
Springer-Lehrbuch
2016-05-20Paper
Post-quantum cryptography: state of the art
The New Codebreakers
2016-05-02Paper
Forward secure signatures on smart cards
Selected Areas in Cryptography
2015-12-04Paper
Discrete Ziggurat: a time-memory trade-off for sampling from a Gaussian distribution over the integers
Selected Areas in Cryptography -- SAC 2013
2015-10-01Paper
Improvement and efficient implementation of a lattice-based signature scheme
Selected Areas in Cryptography -- SAC 2013
2015-10-01Paper
Augmented Learning with Errors: The Untapped Potential of the Error Term
Financial Cryptography and Data Security
2015-09-29Paper
On the security of long-lived archiving systems based on the evidence record syntax
Lecture Notes in Computer Science
2015-09-21Paper
Nearest planes in practice
Cryptography and Information Security in the Balkans
2015-09-21Paper
Tuning GaussSieve for speed
Progress in Cryptology - LATINCRYPT 2014
2015-09-17Paper
Mutant differential fault analysis of Trivium MDFA
Information Security and Cryptology - ICISC 2014
2015-09-11Paper
On the efficiency of provably secure NTRU
Post-Quantum Cryptography
2015-01-14Paper
Full analysis of \textsc{PRINTcipher} with respect to invariant subspace attack: efficient key recovery and countermeasures
Designs, Codes and Cryptography
2014-09-04Paper
Towards lattice based aggregate signatures
Progress in Cryptology – AFRICACRYPT 2014
2014-06-24Paper
Long term confidentiality: a survey
Designs, Codes and Cryptography
2014-04-29Paper
Introduction to public key infrastructures
 
2013-12-06Paper
On the security of the Winternitz one-time signature scheme
International Journal of Applied Cryptography
2013-11-15Paper
Minkowski, Hermite, and the internet
Mitteilungen der Deutschen Mathematiker-Vereinigung (DMV)
2013-10-22Paper
A multivariate based threshold ring signature scheme
Applicable Algebra in Engineering, Communication and Computing
2013-09-30Paper
Fast verification for improved versions of the UOV and rainbow signature schemes
Post-Quantum Cryptography
2013-06-14Paper
Cryptanalysis of hash-based tamed transformation and minus signature scheme
Post-Quantum Cryptography
2013-06-14Paper
Optimizing Guessing Strategies for Algebraic Cryptanalysis with Applications to EPCBC
Information Security and Cryptology
2013-05-28Paper
Many weak keys for PRINTcipher: fast key recovery and countermeasures
Topics in Cryptology – CT-RSA 2013
2013-03-18Paper
On the design of hardware building blocks for modern lattice-based encryption schemes
Cryptographic Hardware and Embedded Systems – CHES 2012
2012-11-13Paper
Algebraic cryptanalysis of the round-reduced and side channel analysis of the full PRINTCipher-48
Cryptology and Network Security
2012-07-20Paper
Post-quantum cryptography: lattice identification schemes
Publicationes Mathematicae Debrecen
2012-07-12Paper
XMSS - A Practical Forward Secure Signature Scheme Based on Minimal Security Assumptions
Post-Quantum Cryptography
2011-11-25Paper
On the security of the Winternitz one-time signature scheme
Lecture Notes in Computer Science
2011-06-29Paper
Computing a lattice basis from a system of generating vectors
Lecture Notes in Computer Science
2011-04-16Paper
Linear recurring sequences for the UOV key generation
Public Key Cryptography – PKC 2011
2011-03-15Paper
Practical Algebraic Cryptanalysis for Dragon-Based Cryptosystems
Cryptology and Network Security
2010-12-07Paper
Towards provable security of the unbalanced oil and vinegar signature scheme under direct attacks
Progress in Cryptology - INDOCRYPT 2010
2010-12-07Paper
CyclicRainbow – A Multivariate Signature Scheme with a Partially Cyclic Public Key
Progress in Cryptology - INDOCRYPT 2010
2010-12-07Paper
Introduction to cryptography
Springer-Lehrbuch
2010-11-17Paper
MXL\(_3\): an efficient algorithm for computing Gröbner bases of zero-dimensional ideals
Information, Security and Cryptology – ICISC 2009
2010-07-16Paper
Selecting parameters for the Rainbow signature scheme
Post-Quantum Cryptography
2010-06-17Paper
Parallel shortest lattice vector enumeration on graphics cards
Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings
2010-05-04Paper
Flexible partial enlargement to accelerate Gröbner basis computation over \(\mathbb{F}_2\)
Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings
2010-05-04Paper
Secure parameters for SWIFFT
Progress in Cryptology - INDOCRYPT 2009
2009-12-17Paper
Algebraic Attack on the MQQ Public Key Cryptosystem
Cryptology and Network Security
2009-11-26Paper
Post-quantum cryptography: lattice signatures
Computing
2009-08-10Paper
A Multipurpose Delegation Proxy for WWW Credentials
Public Key Infrastructure
2009-04-23Paper
A Zero-Dimensional Gröbner Basis for AES-128
Fast Software Encryption
2009-04-02Paper
Hash-based Digital Signature Schemes
Post-Quantum Cryptography
2009-03-12Paper
Merkle Signatures with Virtually Unlimited Signature Capacity
Applied Cryptography and Network Security
2009-03-10Paper
Public Key Authentication with Memory Tokens
Information Security Applications
2009-02-24Paper
Explicit Hard Instances of the Shortest Vector Problem
Post-Quantum Cryptography
2008-11-11Paper
MXL2: Solving Polynomial Equations over GF(2) Using an Improved Mutant Strategy
Post-Quantum Cryptography
2008-11-11Paper
Merkle Tree Traversal Revisited
Post-Quantum Cryptography
2008-11-11Paper
Einführung in die Kryptographie
Springer-Lehrbuch
2008-04-14Paper
CMSS – An Improved Merkle Signature Scheme
Progress in Cryptology - INDOCRYPT 2006
2008-04-11Paper
A Terr algorithm for computations in the infrastructure of real-quadratic number fields
Journal de Théorie des Nombres de Bordeaux
2007-09-04Paper
Algorithmic Number Theory
Lecture Notes in Computer Science
2007-05-02Paper
Binary quadratic forms. An algorithmic approach
Algorithms and Computation in Mathematics
2007-03-22Paper
Topics in Cryptology – CT-RSA 2006
Lecture Notes in Computer Science
2007-02-12Paper
Computing the structure of a finite abelian group
Mathematics of Computation
2005-09-08Paper
scientific article; zbMATH DE number 2154276 (Why is no real title available?)
 
2005-04-08Paper
scientific article; zbMATH DE number 2107168 (Why is no real title available?)
 
2004-10-12Paper
scientific article; zbMATH DE number 2107169 (Why is no real title available?)
 
2004-10-12Paper
scientific article; zbMATH DE number 1978496 (Why is no real title available?)
 
2003-09-09Paper
A signature scheme based on the intractability of computing roots
Designs, Codes and Cryptography
2003-03-19Paper
scientific article; zbMATH DE number 1759644 (Why is no real title available?)
 
2002-11-24Paper
A survey on IQ cryptography
 
2002-04-21Paper
scientific article; zbMATH DE number 1583945 (Why is no real title available?)
 
2001-12-16Paper
Cryptography based on number fields with large regulator
Journal de Théorie des Nombres de Bordeaux
2001-07-30Paper
scientific article; zbMATH DE number 1589545 (Why is no real title available?)
 
2001-04-19Paper
scientific article; zbMATH DE number 1520570 (Why is no real title available?)
 
2000-10-23Paper
scientific article; zbMATH DE number 1516550 (Why is no real title available?)
 
2000-10-11Paper
scientific article; zbMATH DE number 1461529 (Why is no real title available?)
 
2000-06-20Paper
scientific article; zbMATH DE number 1406767 (Why is no real title available?)
 
2000-03-01Paper
scientific article; zbMATH DE number 1356718 (Why is no real title available?)
 
1999-11-02Paper
scientific article; zbMATH DE number 1346526 (Why is no real title available?)
 
1999-10-03Paper
scientific article; zbMATH DE number 1302464 (Why is no real title available?)
 
1999-08-31Paper
scientific article; zbMATH DE number 1273657 (Why is no real title available?)
 
1999-07-20Paper
scientific article; zbMATH DE number 1257081 (Why is no real title available?)
 
1999-07-07Paper
On factor refinement in number fields
Mathematics of Computation
1998-12-03Paper
scientific article; zbMATH DE number 1088248 (Why is no real title available?)
 
1998-06-07Paper
On some computational problems in finite abelian groups
Mathematics of Computation
1997-12-16Paper
scientific article; zbMATH DE number 1024053 (Why is no real title available?)
 
1997-07-20Paper
Constructing nonresidues in finite fields and the extended Riemann hypothesis
Mathematics of Computation
1996-12-03Paper
On smooth ideals in number fields
Journal of Number Theory
1996-11-10Paper
scientific article; zbMATH DE number 733559 (Why is no real title available?)
 
1996-06-25Paper
scientific article; zbMATH DE number 799775 (Why is no real title available?)
 
1996-03-31Paper
scientific article; zbMATH DE number 784878 (Why is no real title available?)
 
1996-03-17Paper
Approximating rings of integers in number fields
Journal de Théorie des Nombres de Bordeaux
1995-12-19Paper
scientific article; zbMATH DE number 802334 (Why is no real title available?)
 
1995-10-04Paper
A Practical Version of the Generalized Lagrange Algorithm
Experimental Mathematics
1995-06-20Paper
scientific article; zbMATH DE number 503350 (Why is no real title available?)
 
1994-12-04Paper
A key-exchange protocol using real quadratic fields
Journal of Cryptology
1994-09-26Paper
On Unit Groups and Class Groups of Quartic Fields of Signature (2, 1)
Mathematics of Computation
1994-06-05Paper
scientific article; zbMATH DE number 503246 (Why is no real title available?)
 
1994-03-07Paper
scientific article; zbMATH DE number 177026 (Why is no real title available?)
 
1993-05-18Paper
scientific article; zbMATH DE number 16712 (Why is no real title available?)
 
1992-06-26Paper
Some remarks concerning the complexity of computing class groups of quadratic fields
Journal of Complexity
1992-06-26Paper
scientific article; zbMATH DE number 4208157 (Why is no real title available?)
 
1991-01-01Paper
scientific article; zbMATH DE number 4200333 (Why is no real title available?)
 
1990-01-01Paper
scientific article; zbMATH DE number 4168790 (Why is no real title available?)
 
1990-01-01Paper
p-Adic Computation of Real Quadratic Class Numbers
Mathematics of Computation
1990-01-01Paper
scientific article; zbMATH DE number 4173143 (Why is no real title available?)
 
1990-01-01Paper
scientific article; zbMATH DE number 4191104 (Why is no real title available?)
 
1990-01-01Paper
scientific article; zbMATH DE number 4215364 (Why is no real title available?)
 
1990-01-01Paper
scientific article; zbMATH DE number 4183508 (Why is no real title available?)
 
1990-01-01Paper
On the Computation of Unit Groups and Class Groups of Totally Real Quartic Fields
 
1989-01-01Paper
Computation of Independent Units in Number Fields by Dirichlet's Method
Mathematics of Computation
1989-01-01Paper
scientific article; zbMATH DE number 4137898 (Why is no real title available?)
 
1989-01-01Paper
scientific article; zbMATH DE number 4148210 (Why is no real title available?)
 
1989-01-01Paper
On the Computation of the Class Number of an Algebraic Number Field
 
1989-01-01Paper
On the Infrastructure of the Principal Ideal Class of an Algebraic Number Field of Unit Rank One
 
1988-01-01Paper
A key-exchange system based on imaginary quadratic fields
Journal of Cryptology
1988-01-01Paper
Leopoldt's Conjecture in Parameterized Families
Proceedings of the American Mathematical Society
1988-01-01Paper
On the computation of units and class numbers by a generalization of Lagrange's algorithm
Journal of Number Theory
1987-01-01Paper
The Computation of the Fundamental Unit of Totally Complex Quartic Orders
 
1987-01-01Paper
On the period length of the generalized Lagrange algorithm
Journal of Number Theory
1987-01-01Paper
On Principal Ideal Testing in Totally Complex Quartic Fields and the Determination of Certain Cyclotomic Constants
 
1987-01-01Paper
An algorithm for testing Leopoldt's conjecture
Journal of Number Theory
1987-01-01Paper
On principal ideal testing in algebraic number fields
Journal of Symbolic Computation
1987-01-01Paper
scientific article; zbMATH DE number 3961764 (Why is no real title available?)
 
1986-01-01Paper
scientific article; zbMATH DE number 4017034 (Why is no real title available?)
 
1986-01-01Paper
scientific article; zbMATH DE number 3918492 (Why is no real title available?)
 
1985-01-01Paper
The generalized Voronoi-algorithm in totally real algebraic number fields
 
1985-01-01Paper
Abschätzung der Periodenlänge einer verallgemeinerten Kettenbruchentwicklung.
Journal für die reine und angewandte Mathematik (Crelles Journal)
1985-01-01Paper
scientific article; zbMATH DE number 3871498 (Why is no real title available?)
 
1984-01-01Paper


Research outcomes over time


This page was built for person: Johannes Buchmann