default search action
60. Birthday: Johannes Buchmann 2013
- Marc Fischlin, Stefan Katzenbeisser:
Number Theory and Cryptography - Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday. Lecture Notes in Computer Science 8260, Springer 2013, ISBN 978-3-642-42000-9
Personal Tributes
- Hugh C. Williams:
Laudatio in Honour of Professor Dr. Johannes Buchmann on the Occasion of His 60th Birthday. 1-2 - Harald Baier:
Have a Break - Have a Security Centre: From DZI to CASED. 3-18
Computational Number Theory
- Jenny Yuan-Chun Yeh, Chen-Mou Cheng, Bo-Yin Yang:
Operating Degrees for XL vs. F4/F5 for Generic $\mathcal{M}Q$ with Number of Equations Linear in That of Variables. 19-33 - Jintai Ding, Dieter Schmidt:
Solving Degree and Degree of Regularity for Polynomial Systems over a Finite Fields. 34-49 - Alan K. Silvester, Michael J. Jacobson Jr., Hugh C. Williams:
Shorter Compact Representations in Real Quadratic Fields. 50-72
Hardness of Cryptographic Assumptions
- Claus-Peter Schnorr:
Factoring Integers by CVP Algorithms. 73-93 - Michael Shantz, Edlyn Teske:
Solving the Elliptic Curve Discrete Logarithm Problem Using Semaev Polynomials, Weil Descent and Gröbner Basis Methods - An Experimental Study. 94-107 - Kenichiro Hayasaka, Kazumaro Aoki, Tetsutaro Kobayashi, Tsuyoshi Takagi:
An Experiment of Number Field Sieve for Discrete Logarithm Problem over GF(p 12). 108-120 - Arjen K. Lenstra, Thorsten Kleinjung, Emmanuel Thomé:
Universal Security - From Bits and Mips to Pools, Lakes - and Beyond. 121-124
Hardware Security
- Dominik Merli, Georg Sigl, Claudia Eckert:
Identities for Embedded Systems Enabled by Physical Unclonable Functions. 125-138 - Werner Schindler:
When Should an Implementation Attack Be Viewed as Successful? 139-150 - Sorin A. Huss, Marc Stöttinger, Michael Zohner:
AMASIVE: An Adaptable and Modular Autonomous Side-Channel Vulnerability Evaluation Framework. 151-165 - Thomas Eisenbarth, Ingo von Maurich, Christof Paar, Xin Ye:
A Performance Boost for Hash-Based Signatures. 166-182
Privacy and Security
- Ulrike Meyer, Susanne Wetzel:
Privacy-Preserving Reconciliation Protocols: From Theory to Practice. 183-210 - Matthias Huber, Jörn Müller-Quade, Tobias Nilges:
Defining Privacy Based on Distributions of Privacy Breaches. 211-225 - Sandro Coretti, Ueli Maurer, Björn Tackmann:
A Constructive Perspective on Key Encapsulation. 226-239
Application Security
- Günter Müller, Rafael Accorsi:
Why Are Business Processes Not Secure? 240-254 - Melanie Volkamer, Karen Renaud:
Mental Models - General Introduction and Review of Their Application to Human-Centred Security. 255-280
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.