Publikationen
Publikationen
A User-Centric Digital Signature Scheme
Werlang, Felipe; Vigil, Martín; Custódio, Ricardo Felipe
EuroPKI 2013
[Conference Proceedings]
On the security, privacy and usability of online seals
Tschofenig, Hannes; Volkamer, Melanie; Jentzsch, Nicola; Fischer-Hübner, Simone; Schiffner, Stefan; Tirtea, Rodica
[Report]
Holistic and Law compatible IT Security Evaluation: Integration of Common Criteria, ISO 27001/IT-Grundschutz and KORA
Simić-Draws, Daniela; Neumann, Stephan; Kahlert, Anna; Richter, Philipp; Grimm, Rüdiger; Volkamer, Melanie; Roßnagel, Alexander
International Journal of Information Security and Privacy (IJISP), p.16-35
[Journal Article]
Towards Measuring Resilience in Anonymous Communication Networks
Shirazi, Fatemeh; Diaz, Claudia; Mullan, Ciaran; Wright, Joss; Buchmann, Johannes
HotPETs 2013
[Journal Article]
Sieving for Shortest Vectors in Ideal Lattices
Schneider, Michael
Africa Crypt 2013
[Conference Proceedings]
Developing and Testing a Visual Hash Scheme
Olembo, Maina; Stockhardt, Simon; Hülsing, Andreas; Volkamer, Melanie
European Information Security Multi-Conference (EISMC 2013), p.91-100
[Conference Proceedings]
Cryptanalysis of Hash-based Tamed Transformation and Minus Signature Scheme
Nie, Xuyun; Xu, Zhaohu; Buchmann, Johannes
Fifth International Conference on Post-Quantum Cryptography - PQCrypto 2013, p.155-164
[Conference Proceedings]
Cryptanalysis of 2-layer Nonlinear Piece In Hand Method
Nie, Xuyun; Petzoldt, Albrecht; Buchmann, Johannes
Second International Workshop on Modern Cryptography and Security Engineering - MoCrySen 2013, p.91-104
[Conference Proceedings]
Optimal Parameters for XMSS^MT
Hülsing, Andreas; Rausch, L.; Buchmann, Johannes
MoCrySEn 2013, p.194-208
WOTS+ - Shorter Signatures for Hash-Based Signature Schemes
Hülsing, Andreas
Africa Crypt 2013
[Conference Proceedings]
A Framework for Evaluating Trust of Service Providers in Cloud Marketplaces
Habib, Sheikh Mahbub; Varadharajan, Vijay; Mühlhäuser, Max
Proceedings of the 28th Annual ACM Symposium on Applied Computing (SAC'13)
[Conference Proceedings]
Integration von vorwärtssicheren Signaturverfahren in die CA Infrastruktur
Guo, Sheng
[Report]
Events Around Me - Ein datenschutzfreundlicher Veranstaltungskompass
Ghiglieri, Marco; Kalabis, Lukas; Kelm, David
13. Deutschen IT-Sicherheitskongress
[Conference Proceedings]
A Polynomial Time Version of LLL With Deep Insertions
Fontein, Felix; Schneider, Michael; Wagner, Urs
International Workshop on Coding and Cryptography - WCC 2013
[Conference Proceedings]
Prêt à Voter Providing Everlasting Privacy
Demirel, Denise; Henning, Maria; Graaf, Jeroen van de; Ryan, Peter Y. A.; Buchmann, Johannes
VoteID 2013: The 4th International Conference on e-Voting and Identity, 2013, p.156-175
[Conference Proceedings]
The Fiat-Shamir Transformation in the Quantum World
Dagdelen, Özgür; Fischlin, Marc; Gagliardoni, Tommaso
ASIACRYPT 2013
[Conference Proceedings]
k-anonymous reputation
Clauß, Sebastian; Schiffner, Stefan; Kerschbaum, Florian
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, p.359-368
[Conference Proceedings]
On the security of the Winternitz one-time signature scheme
Buchmann, Johannes; Dahmen, Erik; Ereth, Sarah; Hülsing, Andreas; Rückert, Markus
International Journal of Applied Cryptography, p.84-96
[Journal Article]
Discrete Ziggurat: A Time-Memory Trade-off for Sampling from a Gaussian Distribution over the Integers
Buchmann, Johannes; Cabarcas, Daniel; Göpfert, Florian; Hülsing, Andreas; Weiden, Patrick
Selected Areas in Cryptography 2013 (SAC'13), p.402-417
[Conference Proceedings]
The Potential of an Individualized Set of trusted CAs: Defending against CA Failures in the Web PKI
Braun, Johannes; Rynkowski, Gregor
Social Computing (SocialCom) - PASSAT2013, p.600-605
[Conference Proceedings]
Contextualized Web warnings, and how they cause distrust
Bartsch, Steffen; Volkamer, Melanie; Theuerling, Heike; Karayumak, Fatih
Trust and Trustworthy Computing (TRUST 2013), p.205-222
[Conference Proceedings]
Efficiently Outsourcing Multiparty Computation under Multiple Keys
Peter, Andreas; Tews, Erik; Katzenbeisser, Stefan
Cryptology ePrint Archive, p.1-24
[Journal Article]
Usable secure email communications: criteria and evaluation of existing approaches
Moecke, Cristian Thiago; Volkamer, Melanie
Information Management & Computer Security, p.41-52
[Journal Article]
On the Security of Encrypted Secret Sharing
Braun, Johannes; Wiesmaier, Alexander; Buchmann, Johannes
46th Hawaii International Conference on Systems Science (HICSS-46), p.4966-4976
[Conference Proceedings]
E-Voting System Usability: Lessons for Interface Design, User Studies, and Usability Criteria
Olembo, Maina; Volkamer, Melanie
Informatische Modellierung der Prinzipien des gesetzlichen Gestaltungsspielraums im Hinblick auf Wahlsysteme
Neumann, Stephan; Kahlert, Anna; Henning, Maria; Jonker, Hugo; Volkamer, Melanie
Abstraction and Application: Proceedings of the 16th International Legal Informatics Symposium (IRIS 2013), p.277-284
[Conference Proceedings]
Secure computations on non-integer values with applications to privacy-preserving sequence analysis
Franz, M.; Deiseroth, B.; Hamacher, Kay; Jha, Somesh; Katzenbeisser, S.; Schröder, H.
Information Security Technical Report, p.117-128
[Journal Article]
Smart Keys for Cyber-Cars: Secure Smartphone-based NFC-enabled Car Immobilizer
Busold, Christoph; Dmitrienko, Alexandra; Seudié, Hervé; Taha, Ahmed; Sobhani, Majid; Wachsmann, Christian; Sadeghi, Ahmad-Reza
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, p.233-242
[Conference Proceedings]
Integrating Wireless Sensor Nodes and Smartphones for Energy - Efficient Data Exchange in Smart Environments
Zöller, Sebastian; Reinhardt, Andreas; Wachtel, Markus; Steinmetz, Ralf
2013 IEEE International Conference on Pervasive Computing and Communications Workshops, p.652-657
[Conference Proceedings]
Smashing WEP in a Passive Attack
Sepehrdad, Pouyan; Susil, Petr; Vaudenay, Serge; Vuagnoux, Martin
20th International Workshop on Fast Software Encryption (FSE)
[Conference Proceedings]