


default search action
60. Birthday: Johannes Buchmann 2013
- Marc Fischlin, Stefan Katzenbeisser:

Number Theory and Cryptography - Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday. Lecture Notes in Computer Science 8260, Springer 2013, ISBN 978-3-642-42000-9
Personal Tributes
- Hugh C. Williams:

Laudatio in Honour of Professor Dr. Johannes Buchmann on the Occasion of His 60th Birthday. 1-2 - Harald Baier:

Have a Break - Have a Security Centre: From DZI to CASED. 3-18
Computational Number Theory
- Jenny Yuan-Chun Yeh, Chen-Mou Cheng, Bo-Yin Yang:

Operating Degrees for XL vs. F4/F5 for Generic $\mathcal{M}Q$ with Number of Equations Linear in That of Variables. 19-33 - Jintai Ding

, Dieter Schmidt:
Solving Degree and Degree of Regularity for Polynomial Systems over a Finite Fields. 34-49 - Alan K. Silvester, Michael J. Jacobson Jr., Hugh C. Williams:

Shorter Compact Representations in Real Quadratic Fields. 50-72
Hardness of Cryptographic Assumptions
- Claus-Peter Schnorr:

Factoring Integers by CVP Algorithms. 73-93 - Michael Shantz, Edlyn Teske:

Solving the Elliptic Curve Discrete Logarithm Problem Using Semaev Polynomials, Weil Descent and Gröbner Basis Methods - An Experimental Study. 94-107 - Kenichiro Hayasaka, Kazumaro Aoki, Tetsutaro Kobayashi, Tsuyoshi Takagi:

An Experiment of Number Field Sieve for Discrete Logarithm Problem over GF(p 12). 108-120 - Arjen K. Lenstra, Thorsten Kleinjung, Emmanuel Thomé

:
Universal Security - From Bits and Mips to Pools, Lakes - and Beyond. 121-124
Hardware Security
- Dominik Merli, Georg Sigl, Claudia Eckert:

Identities for Embedded Systems Enabled by Physical Unclonable Functions. 125-138 - Werner Schindler

:
When Should an Implementation Attack Be Viewed as Successful? 139-150 - Sorin A. Huss, Marc Stöttinger

, Michael Zohner:
AMASIVE: An Adaptable and Modular Autonomous Side-Channel Vulnerability Evaluation Framework. 151-165 - Thomas Eisenbarth

, Ingo von Maurich, Christof Paar, Xin Ye:
A Performance Boost for Hash-Based Signatures. 166-182
Privacy and Security
- Ulrike Meyer, Susanne Wetzel:

Privacy-Preserving Reconciliation Protocols: From Theory to Practice. 183-210 - Matthias Huber, Jörn Müller-Quade, Tobias Nilges:

Defining Privacy Based on Distributions of Privacy Breaches. 211-225 - Sandro Coretti, Ueli Maurer, Björn Tackmann:

A Constructive Perspective on Key Encapsulation. 226-239
Application Security
- Günter Müller, Rafael Accorsi:

Why Are Business Processes Not Secure? 240-254 - Melanie Volkamer, Karen Renaud

:
Mental Models - General Introduction and Review of Their Application to Human-Centred Security. 255-280

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














