Notice: Unexpected clearActionName after getActionName already called in /var/www/html/w/includes/context/RequestContext.php on line 333
Johannes A. Buchmann - MaRDI portal

Johannes A. Buchmann

From MaRDI portal
(Redirected from Person:194715)
Person:1179459

Available identifiers

zbMath Open buchmann.johannes-aDBLPb/JohannesBuchmannFactGridQ887636WikidataQ1697321 ScholiaQ1697321MaRDI QIDQ1179459

List of research outcomes





PublicationDate of PublicationType
https://portal.mardi4nfdi.de/entity/Q61917892024-02-10Paper
Function-Dependent Commitments for Verifiable Multi-party Computation2023-06-30Paper
CHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear Case2023-06-30Paper
On lattice-based interactive protocols: an approach with less or no aborts2021-06-08Paper
Sustainable Cryptography2021-02-25Paper
\textsf{BLAZE}: practical lattice-based blind signatures for privacy-preserving applications2021-02-08Paper
Differential Power Analysis of XMSS and SPHINCS2020-07-20Paper
Function-dependent commitments from homomorphic authenticators2020-05-27Paper
Context hiding multi-key linearly homomorphic authenticators2020-01-28Paper
Efficient proactive secret sharing for large data via concise vector commitments2019-10-14Paper
Estimation of the hardness of the learning with errors problem with a restricted number of samples2019-05-21Paper
\(\mathsf{ELSA}\): efficient long-term secure storage of large datasets2019-03-29Paper
Long-term secure time-stamping using preimage-aware hash functions (short version)2018-11-07Paper
Revisiting TESLA in the quantum random oracle model2018-09-12Paper
Performing computations on hierarchically shared secrets2018-07-17Paper
Recovering short generators of principal fractional ideals in cyclotomic fields of conductor \(p^\alpha q^\beta\)2018-04-26Paper
A linearly homomorphic signature scheme from weaker assumptions2018-04-20Paper
Long-term secure commitments via extractable-binding commitments2017-08-25Paper
On lower bounds for information set decoding over \(\mathbb F_q\) and on the effect of partial knowledge2017-07-26Paper
Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability2017-06-01Paper
Dynamic and Verifiable Hierarchical Secret Sharing2017-01-06Paper
Password Requirements Markup Language2016-08-31Paper
Homomorphic Signature Schemes2016-08-04Paper
On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack2016-06-22Paper
An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation2016-06-22Paper
Introduction to cryptography2016-05-20Paper
Post-Quantum Cryptography: State of the Art2016-05-02Paper
Forward Secure Signatures on Smart Cards2015-12-04Paper
Improvement and Efficient Implementation of a Lattice-Based Signature Scheme2015-10-01Paper
Discrete Ziggurat: A Time-Memory Trade-Off for Sampling from a Gaussian Distribution over the Integers2015-10-01Paper
Augmented Learning with Errors: The Untapped Potential of the Error Term2015-09-29Paper
On the Security of Long-Lived Archiving Systems Based on the Evidence Record Syntax2015-09-21Paper
Nearest Planes in Practice2015-09-21Paper
Tuning GaussSieve for Speed2015-09-17Paper
Mutant Differential Fault Analysis of Trivium MDFA2015-09-11Paper
On the Efficiency of Provably Secure NTRU2015-01-14Paper
Full analysis of \textsc{PRINTcipher} with respect to invariant subspace attack: efficient key recovery and countermeasures2014-09-04Paper
Towards Lattice Based Aggregate Signatures2014-06-24Paper
Long term confidentiality: a survey2014-04-29Paper
Introduction to Public Key Infrastructures2013-12-06Paper
On the security of the Winternitz one-time signature scheme2013-11-15Paper
Minkowski, Hermite und das Internet2013-10-22Paper
A multivariate based threshold ring signature scheme2013-09-30Paper
Cryptanalysis of Hash-Based Tamed Transformation and Minus Signature Scheme2013-06-14Paper
Fast Verification for Improved Versions of the UOV and Rainbow Signature Schemes2013-06-14Paper
Optimizing Guessing Strategies for Algebraic Cryptanalysis with Applications to EPCBC2013-05-28Paper
Many Weak Keys for PRINTcipher: Fast Key Recovery and Countermeasures2013-03-18Paper
On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes2012-11-13Paper
Algebraic Cryptanalysis of the Round-Reduced and Side Channel Analysis of the Full PRINTCipher-482012-07-20Paper
Post-quantum cryptography: lattice identification schemes2012-07-12Paper
XMSS - A Practical Forward Secure Signature Scheme Based on Minimal Security Assumptions2011-11-25Paper
On the Security of the Winternitz One-Time Signature Scheme2011-06-29Paper
Computing a lattice basis from a system of generating vectors2011-04-16Paper
Linear Recurring Sequences for the UOV Key Generation2011-03-15Paper
Towards Provable Security of the Unbalanced Oil and Vinegar Signature Scheme under Direct Attacks2010-12-07Paper
CyclicRainbow – A Multivariate Signature Scheme with a Partially Cyclic Public Key2010-12-07Paper
Practical Algebraic Cryptanalysis for Dragon-Based Cryptosystems2010-12-07Paper
Introduction to cryptography2010-11-17Paper
MXL3: An Efficient Algorithm for Computing Gröbner Bases of Zero-Dimensional Ideals2010-07-16Paper
Selecting Parameters for the Rainbow Signature Scheme2010-06-17Paper
Parallel Shortest Lattice Vector Enumeration on Graphics Cards2010-05-04Paper
Flexible Partial Enlargement to Accelerate Gröbner Basis Computation over $\mathbb{F}_2$2010-05-04Paper
Secure Parameters for SWIFFT2009-12-17Paper
Algebraic Attack on the MQQ Public Key Cryptosystem2009-11-26Paper
Post-quantum cryptography: lattice signatures2009-08-10Paper
A Multipurpose Delegation Proxy for WWW Credentials2009-04-23Paper
A Zero-Dimensional Gröbner Basis for AES-1282009-04-02Paper
Hash-based Digital Signature Schemes2009-03-12Paper
Merkle Signatures with Virtually Unlimited Signature Capacity2009-03-10Paper
Public Key Authentication with Memory Tokens2009-02-24Paper
Merkle Tree Traversal Revisited2008-11-11Paper
Explicit Hard Instances of the Shortest Vector Problem2008-11-11Paper
MXL2: Solving Polynomial Equations over GF(2) Using an Improved Mutant Strategy2008-11-11Paper
Einführung in die Kryptographie2008-04-14Paper
CMSS – An Improved Merkle Signature Scheme2008-04-11Paper
A Terr algorithm for computations in the infrastructure of real-quadratic number fields2007-09-04Paper
Algorithmic Number Theory2007-05-02Paper
Binary quadratic forms. An algorithmic approach2007-03-22Paper
Topics in Cryptology – CT-RSA 20062007-02-12Paper
Computing the structure of a finite abelian group2005-09-08Paper
https://portal.mardi4nfdi.de/entity/Q46648372005-04-08Paper
https://portal.mardi4nfdi.de/entity/Q48213082004-10-12Paper
https://portal.mardi4nfdi.de/entity/Q48213092004-10-12Paper
https://portal.mardi4nfdi.de/entity/Q44250602003-09-09Paper
A signature scheme based on the intractability of computing roots2003-03-19Paper
https://portal.mardi4nfdi.de/entity/Q45366382002-11-24Paper
https://portal.mardi4nfdi.de/entity/Q27642292002-04-21Paper
https://portal.mardi4nfdi.de/entity/Q27076062001-12-16Paper
Cryptography based on number fields with large regulator2001-07-30Paper
https://portal.mardi4nfdi.de/entity/Q27101752001-04-19Paper
https://portal.mardi4nfdi.de/entity/Q45101612000-10-23Paper
https://portal.mardi4nfdi.de/entity/Q45091932000-10-11Paper
https://portal.mardi4nfdi.de/entity/Q44858582000-06-20Paper
https://portal.mardi4nfdi.de/entity/Q49406812000-03-01Paper
https://portal.mardi4nfdi.de/entity/Q47005571999-11-02Paper
https://portal.mardi4nfdi.de/entity/Q42665501999-10-03Paper
https://portal.mardi4nfdi.de/entity/Q42477801999-08-31Paper
https://portal.mardi4nfdi.de/entity/Q42373871999-07-20Paper
https://portal.mardi4nfdi.de/entity/Q42287371999-07-07Paper
On factor refinement in number fields1998-12-03Paper
https://portal.mardi4nfdi.de/entity/Q43645651998-06-07Paper
On some computational problems in finite abelian groups1997-12-16Paper
https://portal.mardi4nfdi.de/entity/Q43417431997-07-20Paper
Constructing nonresidues in finite fields and the extended Riemann hypothesis1996-12-03Paper
On smooth ideals in number fields1996-11-10Paper
https://portal.mardi4nfdi.de/entity/Q43259541996-06-25Paper
https://portal.mardi4nfdi.de/entity/Q48479261996-03-31Paper
https://portal.mardi4nfdi.de/entity/Q48436321996-03-17Paper
Approximating rings of integers in number fields1995-12-19Paper
https://portal.mardi4nfdi.de/entity/Q48495411995-10-04Paper
A Practical Version of the Generalized Lagrange Algorithm1995-06-20Paper
https://portal.mardi4nfdi.de/entity/Q42796891994-12-04Paper
A key-exchange protocol using real quadratic fields1994-09-26Paper
On Unit Groups and Class Groups of Quartic Fields of Signature (2, 1)1994-06-05Paper
https://portal.mardi4nfdi.de/entity/Q42795681994-03-07Paper
https://portal.mardi4nfdi.de/entity/Q40368621993-05-18Paper
Some remarks concerning the complexity of computing class groups of quadratic fields1992-06-26Paper
https://portal.mardi4nfdi.de/entity/Q39733971992-06-26Paper
https://portal.mardi4nfdi.de/entity/Q33563621991-01-01Paper
https://portal.mardi4nfdi.de/entity/Q57493611990-01-01Paper
https://portal.mardi4nfdi.de/entity/Q31979491990-01-01Paper
https://portal.mardi4nfdi.de/entity/Q32101641990-01-01Paper
https://portal.mardi4nfdi.de/entity/Q33489971990-01-01Paper
https://portal.mardi4nfdi.de/entity/Q33618861990-01-01Paper
p-Adic Computation of Real Quadratic Class Numbers1990-01-01Paper
https://portal.mardi4nfdi.de/entity/Q34954381990-01-01Paper
On the Computation of Unit Groups and Class Groups of Totally Real Quartic Fields1989-01-01Paper
https://portal.mardi4nfdi.de/entity/Q34705631989-01-01Paper
https://portal.mardi4nfdi.de/entity/Q34784811989-01-01Paper
Computation of Independent Units in Number Fields by Dirichlet's Method1989-01-01Paper
On the Computation of the Class Number of an Algebraic Number Field1989-01-01Paper
A key-exchange system based on imaginary quadratic fields1988-01-01Paper
On the Infrastructure of the Principal Ideal Class of an Algebraic Number Field of Unit Rank One1988-01-01Paper
Leopoldt's Conjecture in Parameterized Families1988-01-01Paper
An algorithm for testing Leopoldt's conjecture1987-01-01Paper
On principal ideal testing in algebraic number fields1987-01-01Paper
On the computation of units and class numbers by a generalization of Lagrange's algorithm1987-01-01Paper
On the period length of the generalized Lagrange algorithm1987-01-01Paper
On Principal Ideal Testing in Totally Complex Quartic Fields and the Determination of Certain Cyclotomic Constants1987-01-01Paper
The Computation of the Fundamental Unit of Totally Complex Quartic Orders1987-01-01Paper
https://portal.mardi4nfdi.de/entity/Q30290961986-01-01Paper
https://portal.mardi4nfdi.de/entity/Q37290151986-01-01Paper
Abschätzung der Periodenlänge einer verallgemeinerten Kettenbruchentwicklung.1985-01-01Paper
https://portal.mardi4nfdi.de/entity/Q36953521985-01-01Paper
The generalized Voronoi-algorithm in totally real algebraic number fields1985-01-01Paper
https://portal.mardi4nfdi.de/entity/Q33383511984-01-01Paper

Research outcomes over time

This page was built for person: Johannes A. Buchmann