The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Bodo Möller: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Safuat Hamdy, Bodo Möller
    Security of Cryptosystems Based on Class Groups of Imaginary Quadratic Orders. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:234-247 [Conf]
  2. Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, Bodo Möller, David Pointcheval
    Provably secure password-based authentication in TLS. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:35-45 [Conf]
  3. Bodo Möller
    Provably Secure Public-Key Encryptionfor Length-Preserving Chaumian Mixes. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2003, pp:244-262 [Conf]
  4. Bodo Möller
    A Public-Key Encryption Scheme with Pseudo-random Ciphertexts. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2004, pp:335-351 [Conf]
  5. Bodo Möller
    Improved Techniques for Fast Exponentiation. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:298-312 [Conf]
  6. Bodo Möller
    Fractional Windows Revisited: Improved Signed-Digit Representations for Efficient Exponentiation. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:137-153 [Conf]
  7. Tetsuya Izu, Bodo Möller, Tsuyoshi Takagi
    Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2002, pp:296-313 [Conf]
  8. Bodo Möller
    Securing Elliptic Curve Point Multiplication against Side-Channel Attacks. [Citation Graph (0, 0)][DBLP]
    ISC, 2001, pp:324-334 [Conf]
  9. Bodo Möller
    Parallelizable Elliptic Curve Point Multiplication Method with Resistance against Side-Channel Attacks. [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:402-413 [Conf]
  10. Bodo Möller
    Algorithms for Multi-exponentiation. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2001, pp:165-180 [Conf]
  11. Birgit Henhapl, Bodo Möller
    Public-Key-Infrastrukturen. [Citation Graph (0, 0)][DBLP]
    HMD - Praxis Wirtschaftsinform., 2000, v:216, n:, pp:58-66 [Journal]

  12. SSL-over-SOAP: Towards a Token-based Key Establishment Framework for Web Services. [Citation Graph (, )][DBLP]


  13. New Protection Mechanisms for Intellectual Property in Reconfigurable Logic. [Citation Graph (, )][DBLP]


  14. Anmerkungen zur Gültigkeit von Zertifikaten. [Citation Graph (, )][DBLP]


  15. Faster Multi-exponentiation through Caching: Accelerating (EC)DSA Signature Verification. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002