The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Rainer Steinwandt: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Willi Geiselmann, Rainer Steinwandt
    Hardware to Solve Sparse Systems of Linear Equations over GF(2). [Citation Graph (0, 0)][DBLP]
    CHES, 2003, pp:51-61 [Conf]
  2. Willi Geiselmann, Adi Shamir, Rainer Steinwandt, Eran Tromer
    Scalable Hardware for Sparse Systems of Linear Equations, with Applications to Integer Factorization. [Citation Graph (0, 0)][DBLP]
    CHES, 2005, pp:131-146 [Conf]
  3. Rainer Steinwandt, Markus Grassl, Willi Geiselmann, Thomas Beth
    Weaknesses in the SL2(IFs2) Hashing Scheme. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2000, pp:287-299 [Conf]
  4. Willi Geiselmann, Rainer Steinwandt
    Yet Another Sieving Device. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2004, pp:278-291 [Conf]
  5. Michael Backes, Markus Dürmuth, Rainer Steinwandt
    An Algebra for Composing Enterprise Privacy Policies. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2004, pp:33-52 [Conf]
  6. Dennis Hofheinz, Jörn Müller-Quade, Rainer Steinwandt
    Initiator-Resilient Universally Composable Key Exchange. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2003, pp:61-84 [Conf]
  7. Dominik Raub, Rainer Steinwandt
    An Algebra for Enterprise Privacy Policies Closed Under Composition and Conjunction. [Citation Graph (0, 0)][DBLP]
    ETRICS, 2006, pp:130-144 [Conf]
  8. Willi Geiselmann, Rainer Steinwandt
    On the security of cryptographic primitives regarding technological innovations. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung (1), 2003, pp:99-102 [Conf]
  9. Jens-Matthias Bohli, Rainer Steinwandt
    On Subliminal Channels in Deterministic Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:182-194 [Conf]
  10. Willi Geiselmann, Fabian Januszewski, Hubert Köpfer, Jan Pelzl, Rainer Steinwandt
    A Simpler Sieving Device: Combining ECM and TWIRL. [Citation Graph (0, 0)][DBLP]
    ICISC, 2006, pp:118-135 [Conf]
  11. Willi Geiselmann, Rainer Steinwandt, Thomas Beth
    Attacking the Affine Parts of SFLASH. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2001, pp:355-359 [Conf]
  12. Rainer Steinwandt, Willi Geiselmann, Thomas Beth
    A Theoretical DPA-Based Cryptanalysis of the NESSIE Candidates FLASH and SFLASH. [Citation Graph (0, 0)][DBLP]
    ISC, 2001, pp:280-293 [Conf]
  13. Willi Geiselmann, Hubert Köpfer, Rainer Steinwandt, Eran Tromer
    Improved Routing-Based Linear Algebra for the Number Field Sieve. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:636-641 [Conf]
  14. Feng Bao, Robert H. Deng, Willi Geiselmann, Claus-Peter Schnorr, Rainer Steinwandt, Hongjun Wu
    Cryptoanalysis of Two Sparse Polynomial Based Public Key Cryptosystems. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:153-164 [Conf]
  15. Willi Geiselmann, Rainer Steinwandt
    A Dedicated Sieving Hardware. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2003, pp:254-266 [Conf]
  16. Dennis Hofheinz, Rainer Steinwandt
    A Practical Attack on Some Braid Group Based Cryptographic Primitives. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2003, pp:187-198 [Conf]
  17. Rainer Steinwandt
    Loopholes in Two Public Key Cryptosystems Using the Modular Group. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:180-189 [Conf]
  18. Dominik Raub, Rainer Steinwandt, Jörn Müller-Quade
    On the Security and Composability of the One Time Pad. [Citation Graph (0, 0)][DBLP]
    SOFSEM, 2005, pp:288-297 [Conf]
  19. Maria Isabel Gonzalez Vasco, Consuelo Martínez, Rainer Steinwandt, Jorge Luis Villar
    A New Cramer-Shoup Like Methodology for Group Based Provably Secure Encryption Schemes. [Citation Graph (0, 0)][DBLP]
    TCC, 2005, pp:495-509 [Conf]
  20. Michel Abdalla, Jens-Matthias Bohli, Maria Isabel Gonzalez Vasco, Rainer Steinwandt
    (Password) Authenticated Key Establishment: From 2-Party to Group. [Citation Graph (0, 0)][DBLP]
    TCC, 2007, pp:499-514 [Conf]
  21. Jens-Matthias Bohli, Benjamin Glas, Rainer Steinwandt
    Towards Provably Secure Group Key Agreement Building on Group Theory. [Citation Graph (0, 0)][DBLP]
    VIETCRYPT, 2006, pp:322-336 [Conf]
  22. Jens-Matthias Bohli, Rainer Steinwandt
    Deniable Group Key Agreement. [Citation Graph (0, 0)][DBLP]
    VIETCRYPT, 2006, pp:298-311 [Conf]
  23. Thomas Beth, Willi Geiselmann, Rainer Steinwandt
    Mathematical Techniques in Cryptology-Editorial. [Citation Graph (0, 0)][DBLP]
    Appl. Algebra Eng. Commun. Comput., 2006, v:16, n:6, pp:377-378 [Journal]
  24. Jörn Müller-Quade, Rainer Steinwandt
    Recognizing Simple Subextensions of Purely Transcendental Field Extensions. [Citation Graph (0, 0)][DBLP]
    Appl. Algebra Eng. Commun. Comput., 2000, v:11, n:1, pp:35-41 [Journal]
  25. Maria Isabel Gonzalez Vasco, Rainer Steinwandt
    A Reaction Attack on a Public Key Cryptosystem Based on the Word Problem. [Citation Graph (0, 0)][DBLP]
    Appl. Algebra Eng. Commun. Comput., 2004, v:14, n:5, pp:335-340 [Journal]
  26. Maria Isabel Gonzalez Vasco, Rainer Steinwandt
    Pitfalls in public key cryptosystems based on free partially commutative monoids and groups. [Citation Graph (0, 0)][DBLP]
    Appl. Math. Lett., 2006, v:19, n:10, pp:1037-1041 [Journal]
  27. Jens-Matthias Bohli, Rainer Steinwandt, Maria Isabel Gonzalez Vasco, Consuelo Martínez
    Weak Keys in MST1. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:37, n:3, pp:509-524 [Journal]
  28. Maria Isabel Gonzalez Vasco, Dennis Hofheinz, Consuelo Martínez, Rainer Steinwandt
    On the Security of Two Public Key Cryptosystems Using Non-Abelian Groups. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2004, v:32, n:1-3, pp:207-216 [Journal]
  29. Maria Isabel Gonzalez Vasco, Consuelo Martínez, Rainer Steinwandt
    Towards a Uniform Description of Several Group Based Cryptographic Primitives. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2004, v:33, n:3, pp:215-226 [Journal]
  30. Willi Geiselmann, Rainer Steinwandt
    Kryptoanalyse der Ruland/Schweitzer-Signatur von Bitströmen. [Citation Graph (0, 0)][DBLP]
    Datenschutz und Datensicherheit, 2001, v:25, n:10, pp:- [Journal]
  31. Willi Geiselmann, Jörn Müller-Quade, Rainer Steinwandt, Thomas Beth
    Über Quantencomputer und Quantenkryptographie. [Citation Graph (0, 0)][DBLP]
    Datenschutz und Datensicherheit, 2002, v:26, n:8, pp:- [Journal]
  32. Jens-Matthias Bohli, Stefan Röhrich, Rainer Steinwandt
    Key substitution attacks revisited: Taking into account malicious signers. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2006, v:5, n:1, pp:30-36 [Journal]
  33. Willi Geiselmann, Willi Meier, Rainer Steinwandt
    An attack on the isomorphisms of polynomials problem with one secret. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2003, v:2, n:1, pp:59-64 [Journal]
  34. Rainer Steinwandt, Willi Geiselmann, Regine Endsuleit
    Attacking a polynomial-based cryptosystem: Polly Cracker. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2002, v:1, n:3, pp:143-148 [Journal]
  35. Willi Geiselmann, Rainer Steinwandt
    Power attacks on a side-channel resistant elliptic curve implementation. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2004, v:91, n:1, pp:29-32 [Journal]
  36. Maria Isabel Gonzalez Vasco, Rainer Steinwandt
    Clouds over a public key cryptosystem based on Lyndon words. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2001, v:80, n:5, pp:239-242 [Journal]
  37. Thomas Beth, Jörn Müller-Quade, Rainer Steinwandt
    Computing restrictions of ideals in finitely generated k-algebras by means of Buchberger's algorithm. [Citation Graph (0, 0)][DBLP]
    J. Symb. Comput., 2006, v:41, n:3-4, pp:372-380 [Journal]
  38. Marcus Hausdorf, Werner M. Seiler, Rainer Steinwandt
    Involutive Bases in the Weyl Algebra. [Citation Graph (0, 0)][DBLP]
    J. Symb. Comput., 2002, v:34, n:3, pp:181-198 [Journal]
  39. Jörn Müller-Quade, Rainer Steinwandt
    Gröbner Bases Applied to Finitely Generated Field Extensions. [Citation Graph (0, 0)][DBLP]
    J. Symb. Comput., 2000, v:30, n:4, pp:469-490 [Journal]
  40. Jörn Müller-Quade, Rainer Steinwandt
    Basic Algorithms for Rational Function Fields. [Citation Graph (0, 0)][DBLP]
    J. Symb. Comput., 1999, v:27, n:2, pp:143-170 [Journal]
  41. Willi Geiselmann, Jörn Müller-Quade, Rainer Steinwandt
    On "A New Representation of Elements of Finite Fields GF (2m) Yielding Small Complexity Arithmetic Circuits". [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2002, v:51, n:12, pp:1460-1461 [Journal]
  42. Willi Geiselmann, Rainer Steinwandt
    A Redundant Representation of GF(q^n) for Designing Arithmetic Circuits. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2003, v:52, n:7, pp:848-853 [Journal]
  43. Rainer Steinwandt, Willi Geiselmann
    Cryptanalysis of Polly Cracker. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2002, v:48, n:11, pp:2990-2991 [Journal]
  44. Willi Geiselmann, Rainer Steinwandt
    Non-wafer-Scale Sieving Hardware for the NFS: Another Attempt to Cope with 1024-Bit. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2007, pp:466-481 [Conf]
  45. Willi Geiselmann, Rainer Steinwandt
    Cryptanalysis of a Hash Function Proposed at ICISC 2006. [Citation Graph (0, 0)][DBLP]
    ICISC, 2007, pp:1-10 [Conf]
  46. Jens-Matthias Bohli, Maria Isabel Gonzalez Vasco, Rainer Steinwandt
    A Subliminal-Free Variant of ECDSA. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2006, pp:375-387 [Conf]
  47. Jens-Matthias Bohli, Maria Isabel Gonzalez Vasco, Rainer Steinwandt
    Secure group key establishment revisited. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2007, v:6, n:4, pp:243-254 [Journal]
  48. Willi Geiselmann, Maria Isabel Gonzalez Vasco, Rainer Steinwandt
    Entwurf asymmetrischer kryptographischer Verfahren unter Berücksichtigung von Quantenalgorithmen (Design of Asymmetric Cryptographic Schemes Taking Into Account Quantum Algorithms). [Citation Graph (0, 0)][DBLP]
    it - Information Technology, 2006, v:48, n:6, pp:327-0 [Journal]

  49. Reverse Public Key Encryption. [Citation Graph (, )][DBLP]


  50. Cryptanalysis of a Message Recognition Protocol by Mashatan and Stinson. [Citation Graph (, )][DBLP]


  51. Applications of algebra to cryptography. [Citation Graph (, )][DBLP]


Search in 0.015secs, Finished in 0.471secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002