Publication | Date of Publication | Type |
---|
https://portal.mardi4nfdi.de/entity/Q6191789 | 2024-02-10 | Paper |
Function-Dependent Commitments for Verifiable Multi-party Computation | 2023-06-30 | Paper |
CHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear Case | 2023-06-30 | Paper |
On lattice-based interactive protocols: an approach with less or no aborts | 2021-06-08 | Paper |
Sustainable Cryptography | 2021-02-25 | Paper |
\textsf{BLAZE}: practical lattice-based blind signatures for privacy-preserving applications | 2021-02-08 | Paper |
Differential Power Analysis of XMSS and SPHINCS | 2020-07-20 | Paper |
Function-dependent commitments from homomorphic authenticators | 2020-05-27 | Paper |
Context hiding multi-key linearly homomorphic authenticators | 2020-01-28 | Paper |
Efficient proactive secret sharing for large data via concise vector commitments | 2019-10-14 | Paper |
Estimation of the hardness of the learning with errors problem with a restricted number of samples | 2019-05-21 | Paper |
\(\mathsf{ELSA}\): efficient long-term secure storage of large datasets | 2019-03-29 | Paper |
Long-term secure time-stamping using preimage-aware hash functions (short version) | 2018-11-07 | Paper |
Revisiting TESLA in the quantum random oracle model | 2018-09-12 | Paper |
Performing computations on hierarchically shared secrets | 2018-07-17 | Paper |
Recovering short generators of principal fractional ideals in cyclotomic fields of conductor \(p^\alpha q^\beta\) | 2018-04-26 | Paper |
A linearly homomorphic signature scheme from weaker assumptions | 2018-04-20 | Paper |
Long-term secure commitments via extractable-binding commitments | 2017-08-25 | Paper |
On lower bounds for information set decoding over \(\mathbb F_q\) and on the effect of partial knowledge | 2017-07-26 | Paper |
Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability | 2017-06-01 | Paper |
Dynamic and Verifiable Hierarchical Secret Sharing | 2017-01-06 | Paper |
Password Requirements Markup Language | 2016-08-31 | Paper |
Homomorphic Signature Schemes | 2016-08-04 | Paper |
On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack | 2016-06-22 | Paper |
An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation | 2016-06-22 | Paper |
Introduction to cryptography | 2016-05-20 | Paper |
Post-Quantum Cryptography: State of the Art | 2016-05-02 | Paper |
Forward Secure Signatures on Smart Cards | 2015-12-04 | Paper |
Improvement and Efficient Implementation of a Lattice-Based Signature Scheme | 2015-10-01 | Paper |
Discrete Ziggurat: A Time-Memory Trade-Off for Sampling from a Gaussian Distribution over the Integers | 2015-10-01 | Paper |
Augmented Learning with Errors: The Untapped Potential of the Error Term | 2015-09-29 | Paper |
On the Security of Long-Lived Archiving Systems Based on the Evidence Record Syntax | 2015-09-21 | Paper |
Nearest Planes in Practice | 2015-09-21 | Paper |
Tuning GaussSieve for Speed | 2015-09-17 | Paper |
Mutant Differential Fault Analysis of Trivium MDFA | 2015-09-11 | Paper |
On the Efficiency of Provably Secure NTRU | 2015-01-14 | Paper |
Full analysis of \textsc{PRINTcipher} with respect to invariant subspace attack: efficient key recovery and countermeasures | 2014-09-04 | Paper |
Towards Lattice Based Aggregate Signatures | 2014-06-24 | Paper |
Long term confidentiality: a survey | 2014-04-29 | Paper |
Introduction to Public Key Infrastructures | 2013-12-06 | Paper |
On the security of the Winternitz one-time signature scheme | 2013-11-15 | Paper |
Minkowski, Hermite und das Internet | 2013-10-22 | Paper |
A multivariate based threshold ring signature scheme | 2013-09-30 | Paper |
Cryptanalysis of Hash-Based Tamed Transformation and Minus Signature Scheme | 2013-06-14 | Paper |
Fast Verification for Improved Versions of the UOV and Rainbow Signature Schemes | 2013-06-14 | Paper |
Optimizing Guessing Strategies for Algebraic Cryptanalysis with Applications to EPCBC | 2013-05-28 | Paper |
Many Weak Keys for PRINTcipher: Fast Key Recovery and Countermeasures | 2013-03-18 | Paper |
On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes | 2012-11-13 | Paper |
Algebraic Cryptanalysis of the Round-Reduced and Side Channel Analysis of the Full PRINTCipher-48 | 2012-07-20 | Paper |
Post-quantum cryptography: lattice identification schemes | 2012-07-12 | Paper |
XMSS - A Practical Forward Secure Signature Scheme Based on Minimal Security Assumptions | 2011-11-25 | Paper |
On the Security of the Winternitz One-Time Signature Scheme | 2011-06-29 | Paper |
Computing a lattice basis from a system of generating vectors | 2011-04-16 | Paper |
Linear Recurring Sequences for the UOV Key Generation | 2011-03-15 | Paper |
Towards Provable Security of the Unbalanced Oil and Vinegar Signature Scheme under Direct Attacks | 2010-12-07 | Paper |
CyclicRainbow – A Multivariate Signature Scheme with a Partially Cyclic Public Key | 2010-12-07 | Paper |
Practical Algebraic Cryptanalysis for Dragon-Based Cryptosystems | 2010-12-07 | Paper |
Introduction to cryptography | 2010-11-17 | Paper |
MXL3: An Efficient Algorithm for Computing Gröbner Bases of Zero-Dimensional Ideals | 2010-07-16 | Paper |
Selecting Parameters for the Rainbow Signature Scheme | 2010-06-17 | Paper |
Parallel Shortest Lattice Vector Enumeration on Graphics Cards | 2010-05-04 | Paper |
Flexible Partial Enlargement to Accelerate Gröbner Basis Computation over $\mathbb{F}_2$ | 2010-05-04 | Paper |
Secure Parameters for SWIFFT | 2009-12-17 | Paper |
Algebraic Attack on the MQQ Public Key Cryptosystem | 2009-11-26 | Paper |
Post-quantum cryptography: lattice signatures | 2009-08-10 | Paper |
A Multipurpose Delegation Proxy for WWW Credentials | 2009-04-23 | Paper |
A Zero-Dimensional Gröbner Basis for AES-128 | 2009-04-02 | Paper |
Hash-based Digital Signature Schemes | 2009-03-12 | Paper |
Merkle Signatures with Virtually Unlimited Signature Capacity | 2009-03-10 | Paper |
Public Key Authentication with Memory Tokens | 2009-02-24 | Paper |
Merkle Tree Traversal Revisited | 2008-11-11 | Paper |
Explicit Hard Instances of the Shortest Vector Problem | 2008-11-11 | Paper |
MXL2: Solving Polynomial Equations over GF(2) Using an Improved Mutant Strategy | 2008-11-11 | Paper |
Einführung in die Kryptographie | 2008-04-14 | Paper |
CMSS – An Improved Merkle Signature Scheme | 2008-04-11 | Paper |
A Terr algorithm for computations in the infrastructure of real-quadratic number fields | 2007-09-04 | Paper |
Algorithmic Number Theory | 2007-05-02 | Paper |
Binary quadratic forms. An algorithmic approach | 2007-03-22 | Paper |
Topics in Cryptology – CT-RSA 2006 | 2007-02-12 | Paper |
Computing the structure of a finite abelian group | 2005-09-08 | Paper |
https://portal.mardi4nfdi.de/entity/Q4664837 | 2005-04-08 | Paper |
https://portal.mardi4nfdi.de/entity/Q4821308 | 2004-10-12 | Paper |
https://portal.mardi4nfdi.de/entity/Q4821309 | 2004-10-12 | Paper |
https://portal.mardi4nfdi.de/entity/Q4425060 | 2003-09-09 | Paper |
A signature scheme based on the intractability of computing roots | 2003-03-19 | Paper |
https://portal.mardi4nfdi.de/entity/Q4536638 | 2002-11-24 | Paper |
https://portal.mardi4nfdi.de/entity/Q2764229 | 2002-04-21 | Paper |
https://portal.mardi4nfdi.de/entity/Q2707606 | 2001-12-16 | Paper |
Cryptography based on number fields with large regulator | 2001-07-30 | Paper |
https://portal.mardi4nfdi.de/entity/Q2710175 | 2001-04-19 | Paper |
https://portal.mardi4nfdi.de/entity/Q4510161 | 2000-10-23 | Paper |
https://portal.mardi4nfdi.de/entity/Q4509193 | 2000-10-11 | Paper |
https://portal.mardi4nfdi.de/entity/Q4485858 | 2000-06-20 | Paper |
https://portal.mardi4nfdi.de/entity/Q4940681 | 2000-03-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4700557 | 1999-11-02 | Paper |
https://portal.mardi4nfdi.de/entity/Q4266550 | 1999-10-03 | Paper |
https://portal.mardi4nfdi.de/entity/Q4247780 | 1999-08-31 | Paper |
https://portal.mardi4nfdi.de/entity/Q4237387 | 1999-07-20 | Paper |
https://portal.mardi4nfdi.de/entity/Q4228737 | 1999-07-07 | Paper |
On factor refinement in number fields | 1998-12-03 | Paper |
https://portal.mardi4nfdi.de/entity/Q4364565 | 1998-06-07 | Paper |
On some computational problems in finite abelian groups | 1997-12-16 | Paper |
https://portal.mardi4nfdi.de/entity/Q4341743 | 1997-07-20 | Paper |
Constructing nonresidues in finite fields and the extended Riemann hypothesis | 1996-12-03 | Paper |
On smooth ideals in number fields | 1996-11-10 | Paper |
https://portal.mardi4nfdi.de/entity/Q4325954 | 1996-06-25 | Paper |
https://portal.mardi4nfdi.de/entity/Q4847926 | 1996-03-31 | Paper |
https://portal.mardi4nfdi.de/entity/Q4843632 | 1996-03-17 | Paper |
Approximating rings of integers in number fields | 1995-12-19 | Paper |
https://portal.mardi4nfdi.de/entity/Q4849541 | 1995-10-04 | Paper |
A Practical Version of the Generalized Lagrange Algorithm | 1995-06-20 | Paper |
https://portal.mardi4nfdi.de/entity/Q4279689 | 1994-12-04 | Paper |
A key-exchange protocol using real quadratic fields | 1994-09-26 | Paper |
On Unit Groups and Class Groups of Quartic Fields of Signature (2, 1) | 1994-06-05 | Paper |
https://portal.mardi4nfdi.de/entity/Q4279568 | 1994-03-07 | Paper |
https://portal.mardi4nfdi.de/entity/Q4036862 | 1993-05-18 | Paper |
Some remarks concerning the complexity of computing class groups of quadratic fields | 1992-06-26 | Paper |
https://portal.mardi4nfdi.de/entity/Q3973397 | 1992-06-26 | Paper |
https://portal.mardi4nfdi.de/entity/Q3356362 | 1991-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q5749361 | 1990-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3197949 | 1990-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3210164 | 1990-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3348997 | 1990-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3361886 | 1990-01-01 | Paper |
p-Adic Computation of Real Quadratic Class Numbers | 1990-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3495438 | 1990-01-01 | Paper |
On the Computation of Unit Groups and Class Groups of Totally Real Quartic Fields | 1989-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3470563 | 1989-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3478481 | 1989-01-01 | Paper |
Computation of Independent Units in Number Fields by Dirichlet's Method | 1989-01-01 | Paper |
On the Computation of the Class Number of an Algebraic Number Field | 1989-01-01 | Paper |
A key-exchange system based on imaginary quadratic fields | 1988-01-01 | Paper |
On the Infrastructure of the Principal Ideal Class of an Algebraic Number Field of Unit Rank One | 1988-01-01 | Paper |
Leopoldt's Conjecture in Parameterized Families | 1988-01-01 | Paper |
An algorithm for testing Leopoldt's conjecture | 1987-01-01 | Paper |
On principal ideal testing in algebraic number fields | 1987-01-01 | Paper |
On the computation of units and class numbers by a generalization of Lagrange's algorithm | 1987-01-01 | Paper |
On the period length of the generalized Lagrange algorithm | 1987-01-01 | Paper |
On Principal Ideal Testing in Totally Complex Quartic Fields and the Determination of Certain Cyclotomic Constants | 1987-01-01 | Paper |
The Computation of the Fundamental Unit of Totally Complex Quartic Orders | 1987-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3029096 | 1986-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3729015 | 1986-01-01 | Paper |
Abschätzung der Periodenlänge einer verallgemeinerten Kettenbruchentwicklung. | 1985-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3695352 | 1985-01-01 | Paper |
The generalized Voronoi-algorithm in totally real algebraic number fields | 1985-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3338351 | 1984-01-01 | Paper |