Rainer Steinwandt

From MaRDI portal
Person:189267

Available identifiers

zbMath Open steinwandt.rainerMaRDI QIDQ189267

List of research outcomes





PublicationDate of PublicationType
An Algebra for Composing Enterprise Privacy Policies2022-03-07Paper
Initiator-Resilient Universally Composable Key Exchange2022-02-16Paper
Group Key Establishment in a Quantum-Future Scenario2021-10-06Paper
Password-authenticated group key establishment from smooth projective hash functions2020-02-20Paper
On "A new representation of elements of finite fields GF(2/sup m/) yielding small complexity arithmetic circuits"2018-07-09Paper
On the security of the Courtois-Finiasz-Sendrier signature2018-06-19Paper
Private set intersection: new generic constructions and feasibility results2017-10-12Paper
Masking Large Keys in Hardware: A Masked Implementation of McEliece2016-05-19Paper
Applying Grover’s Algorithm to AES: Quantum Resource Estimates2016-04-26Paper
Combined schemes for signature and encryption: the public-key and the identity-based setting2016-03-10Paper
Differential Power Analysis of a McEliece Cryptosystem2016-03-10Paper
Quantum circuits for \(\mathbb F_{2^n}\)-multiplication with subquadratic gate count2015-08-11Paper
On the security margin of MAC striping2015-07-15Paper
Automatic synthesis of quantum circuits for point addition on ordinary binary elliptic curves2015-04-13Paper
Narrow Bandwidth Is Not Inherent in Reverse Public-Key Encryption2014-10-14Paper
A note on quantum related-key attacks2014-10-07Paper
Scalable attribute-based group key establishment: from~passive to active and deniable2014-10-02Paper
Deniable Group Key Agreement2014-08-21Paper
Towards Provably Secure Group Key Agreement Building on Group Theory2014-08-21Paper
On using probabilistic Turing machines to model participants in cryptographic protocols2014-01-10Paper
Scalable Deniable Group Key Establishment2013-08-07Paper
Security of message authentication codes in the presence of key-dependent messages2012-05-22Paper
Identity-based non-interactive key distribution with forward security2012-05-22Paper
Multi-authority attribute-based encryption with honest-but-curious central authority2012-05-15Paper
https://portal.mardi4nfdi.de/entity/Q31016662011-11-30Paper
Attribute-based group key establishment2011-06-03Paper
Cryptanalysis of a 2-party key establishment based on a semigroup action problem2011-05-17Paper
Cryptanalysis of the Tillich-Zémor hash function2011-04-01Paper
Security of signature schemes in the presence of key-dependent messages2011-02-17Paper
Communication-Efficient 2-Round Group Key Establishment from Pairings2011-02-11Paper
PET SNAKE: A Special Purpose Architecture to Implement an Algebraic Attack in Hardware2011-01-10Paper
Cryptanalysis of an authentication scheme using truncated polynomials2010-08-20Paper
A one-time signature using run-length encoding2010-06-09Paper
Special issue dedicated to Spyros Magliveras on the occasion of his 70th birthday2010-05-19Paper
A ciphertext-only attack on Polly Two2010-04-20Paper
Hardware to Solve Sparse Systems of Linear Equations over GF(2)2010-03-09Paper
Power attacks on a side-channel resistant elliptic curve implementation2009-07-21Paper
Topics in Cryptology – CT-RSA 20042009-05-07Paper
https://portal.mardi4nfdi.de/entity/Q35453212008-12-10Paper
https://portal.mardi4nfdi.de/entity/Q35453242008-12-10Paper
https://portal.mardi4nfdi.de/entity/Q35225212008-09-03Paper
https://portal.mardi4nfdi.de/entity/Q35236212008-09-03Paper
https://portal.mardi4nfdi.de/entity/Q35224162008-09-03Paper
Cryptanalysis of a Hash Function Proposed at ICISC 20062008-05-06Paper
A Simpler Sieving Device: Combining ECM and TWIRL2008-05-06Paper
On Subliminal Channels in Deterministic Signature Schemes2008-03-17Paper
Non-wafer-Scale Sieving Hardware for the NFS: Another Attempt to Cope with 1024-Bit2007-11-29Paper
Computing restrictions of ideals in finitely generated \(k\)-algebras by means of Buchberger's algorithm2007-10-23Paper
(Password) Authenticated Key Establishment: From 2-Party to Group2007-08-30Paper
On ideal and subalgebra coefficients in a class k -algebras2007-08-07Paper
Pitfalls in public key cryptosystems based on free partially commutative monoids and groups2007-06-29Paper
https://portal.mardi4nfdi.de/entity/Q34295042007-04-02Paper
https://portal.mardi4nfdi.de/entity/Q34214662007-02-13Paper
https://portal.mardi4nfdi.de/entity/Q34214722007-02-13Paper
A redundant representation of GF(q<sup>n</sup>) for designing arithmetic circuits2007-01-09Paper
https://portal.mardi4nfdi.de/entity/Q34102092006-11-23Paper
Weak keys in MST\(_{1}\)2006-05-29Paper
A key substitution attack on SFLASHv32006-01-13Paper
SOFSEM 2005: Theory and Practice of Computer Science2005-12-07Paper
Theory of Cryptography2005-12-07Paper
Cryptanalysis of Polly Cracker2005-05-11Paper
Towards a uniform description of several group based cryptographic primitives2005-01-17Paper
https://portal.mardi4nfdi.de/entity/Q31564282005-01-07Paper
https://portal.mardi4nfdi.de/entity/Q48174392004-09-23Paper
A reaction attack on a public key cryptosystem based on the word problem2004-09-22Paper
On Minimal Length Factorizations of Finite Groups2004-09-06Paper
On computing a separating transcendence basis2004-09-01Paper
On the security of two public key cryptosystems using non-abelian groups2004-08-16Paper
https://portal.mardi4nfdi.de/entity/Q44484072004-02-18Paper
Cryptanalysis of a knapsack-like cryptosystem2003-10-14Paper
A Practical Attack on Some Braid Group Based Cryptographic Primitives2003-07-27Paper
A Dedicated Sieving Hardware2003-07-27Paper
Involutive bases in the Weyl algebra.2003-03-23Paper
Attacking the Affine Parts of SFLASH2002-12-02Paper
Gröbner bases applied to finitely generated field extensions2002-11-11Paper
https://portal.mardi4nfdi.de/entity/Q45368082002-07-28Paper
Clouds over a public key cryptosystem based on Lyndon words2002-07-25Paper
https://portal.mardi4nfdi.de/entity/Q27245912002-07-16Paper
Recognizing simple subextensions of purely transcendental field extensions2002-06-18Paper
On ideal and subalgebra coefficients in semigroup algebras2002-02-19Paper
https://portal.mardi4nfdi.de/entity/Q47072312002-01-01Paper
https://portal.mardi4nfdi.de/entity/Q27245942001-07-12Paper
Basic algorithms for rational function fields2000-05-07Paper
Freeness, linear disjointness, and implicitization -- a classical approach.2000-05-02Paper
Decomposing a matrix into circulant and diagonal factors2000-03-22Paper
https://portal.mardi4nfdi.de/entity/Q43949741999-05-31Paper

Research outcomes over time

This page was built for person: Rainer Steinwandt