Login / Signup
Number Theory and Cryptography
Publications
2013
Matthias Huber
,
Jörn Müller-Quade
,
Tobias Nilges
Defining Privacy Based on Distributions of Privacy Breaches.
Number Theory and Cryptography
(2013)
Werner Schindler
When Should an Implementation Attack Be Viewed as Successful?
Number Theory and Cryptography
(2013)
Sorin A. Huss
,
Marc Stöttinger
,
Michael Zohner
AMASIVE: An Adaptable and Modular Autonomous Side-Channel Vulnerability Evaluation Framework.
Number Theory and Cryptography
(2013)
Hugh C. Williams
Laudatio in Honour of Professor Dr. Johannes Buchmann on the Occasion of His 60th Birthday.
Number Theory and Cryptography
(2013)
Thomas Eisenbarth
,
Ingo von Maurich
,
Christof Paar
,
Xin Ye
A Performance Boost for Hash-Based Signatures.
Number Theory and Cryptography
(2013)
Günter Müller
,
Rafael Accorsi
Why Are Business Processes Not Secure?
Number Theory and Cryptography
(2013)
Alan K. Silvester
,
Michael J. Jacobson Jr.
,
Hugh C. Williams
Shorter Compact Representations in Real Quadratic Fields.
Number Theory and Cryptography
(2013)
Claus-Peter Schnorr
Factoring Integers by CVP Algorithms.
Number Theory and Cryptography
(2013)
Harald Baier
Have a Break - Have a Security Centre: From DZI to CASED.
Number Theory and Cryptography
(2013)
Arjen K. Lenstra
,
Thorsten Kleinjung
,
Emmanuel Thomé
Universal Security - From Bits and Mips to Pools, Lakes - and Beyond.
Number Theory and Cryptography
(2013)
Jenny Yuan-Chun Yeh
,
Chen-Mou Cheng
,
Bo-Yin Yang
Operating Degrees for XL vs. F4/F5 for Generic $\mathcal{M}Q$ with Number of Equations Linear in That of Variables.
Number Theory and Cryptography
(2013)
Michael Shantz
,
Edlyn Teske
Solving the Elliptic Curve Discrete Logarithm Problem Using Semaev Polynomials, Weil Descent and Gröbner Basis Methods - An Experimental Study.
Number Theory and Cryptography
(2013)
Kenichiro Hayasaka
,
Kazumaro Aoki
,
Tetsutaro Kobayashi
,
Tsuyoshi Takagi
An Experiment of Number Field Sieve for Discrete Logarithm Problem over GF(p 12).
Number Theory and Cryptography
(2013)
Sandro Coretti
,
Ueli Maurer
,
Björn Tackmann
A Constructive Perspective on Key Encapsulation.
Number Theory and Cryptography
(2013)
Dominik Merli
,
Georg Sigl
,
Claudia Eckert
Identities for Embedded Systems Enabled by Physical Unclonable Functions.
Number Theory and Cryptography
(2013)
Jintai Ding
,
Dieter Schmidt
Solving Degree and Degree of Regularity for Polynomial Systems over a Finite Fields.
Number Theory and Cryptography
(2013)
Ulrike Meyer
,
Susanne Wetzel
Privacy-Preserving Reconciliation Protocols: From Theory to Practice.
Number Theory and Cryptography
(2013)
Melanie Volkamer
,
Karen Renaud
Mental Models - General Introduction and Review of Their Application to Human-Centred Security.
Number Theory and Cryptography
(2013)
volume 8260, 2013
Number Theory and Cryptography - Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday
Number Theory and Cryptography
8260 (2013)