List of research outcomes
This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!
| Publication | Date of Publication | Type |
|---|---|---|
| Password-authenticated group key establishment from smooth projective hash functions International Journal of Applied Mathematics and Computer Science | 2020-02-20 | Paper |
| Deniable group key agreement Progress in Cryptology - VIETCRYPT 2006 | 2014-08-21 | Paper |
| Towards provably secure group key agreement building on group theory Progress in Cryptology - VIETCRYPT 2006 | 2014-08-21 | Paper |
| Relations among privacy notions Financial Cryptography and Data Security | 2010-01-07 | Paper |
| A Framework for Robust Group Key Agreement Computational Science and Its Applications - ICCSA 2006 | 2009-02-10 | Paper |
| On Subliminal Channels in Deterministic Signature Schemes Lecture Notes in Computer Science | 2008-03-17 | Paper |
| Fairness and Correctness in Case of a Premature Abort Progress in Cryptology - INDOCRYPT 2005 | 2008-03-17 | Paper |
| (Password) Authenticated Key Establishment: From 2-Party to Group Theory of Cryptography | 2007-08-30 | Paper |
| Algebraic cryptosystems and side channel attacks: braid groups and DPA | 2007-04-02 | Paper |
| Weak keys in MST\(_{1}\) Designs, Codes and Cryptography | 2006-05-29 | Paper |
Research outcomes over time
This page was built for person: Jens-Matthias Bohli