Search the dblp DataBase
Rainer Steinwandt :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Willi Geiselmann , Rainer Steinwandt Hardware to Solve Sparse Systems of Linear Equations over GF(2). [Citation Graph (0, 0)][DBLP ] CHES, 2003, pp:51-61 [Conf ] Willi Geiselmann , Adi Shamir , Rainer Steinwandt , Eran Tromer Scalable Hardware for Sparse Systems of Linear Equations, with Applications to Integer Factorization. [Citation Graph (0, 0)][DBLP ] CHES, 2005, pp:131-146 [Conf ] Rainer Steinwandt , Markus Grassl , Willi Geiselmann , Thomas Beth Weaknesses in the SL2 (IFs2 ) Hashing Scheme. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2000, pp:287-299 [Conf ] Willi Geiselmann , Rainer Steinwandt Yet Another Sieving Device. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2004, pp:278-291 [Conf ] Michael Backes , Markus Dürmuth , Rainer Steinwandt An Algebra for Composing Enterprise Privacy Policies. [Citation Graph (0, 0)][DBLP ] ESORICS, 2004, pp:33-52 [Conf ] Dennis Hofheinz , Jörn Müller-Quade , Rainer Steinwandt Initiator-Resilient Universally Composable Key Exchange. [Citation Graph (0, 0)][DBLP ] ESORICS, 2003, pp:61-84 [Conf ] Dominik Raub , Rainer Steinwandt An Algebra for Enterprise Privacy Policies Closed Under Composition and Conjunction. [Citation Graph (0, 0)][DBLP ] ETRICS, 2006, pp:130-144 [Conf ] Willi Geiselmann , Rainer Steinwandt On the security of cryptographic primitives regarding technological innovations. [Citation Graph (0, 0)][DBLP ] GI Jahrestagung (1), 2003, pp:99-102 [Conf ] Jens-Matthias Bohli , Rainer Steinwandt On Subliminal Channels in Deterministic Signature Schemes. [Citation Graph (0, 0)][DBLP ] ICISC, 2004, pp:182-194 [Conf ] Willi Geiselmann , Fabian Januszewski , Hubert Köpfer , Jan Pelzl , Rainer Steinwandt A Simpler Sieving Device: Combining ECM and TWIRL. [Citation Graph (0, 0)][DBLP ] ICISC, 2006, pp:118-135 [Conf ] Willi Geiselmann , Rainer Steinwandt , Thomas Beth Attacking the Affine Parts of SFLASH. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2001, pp:355-359 [Conf ] Rainer Steinwandt , Willi Geiselmann , Thomas Beth A Theoretical DPA-Based Cryptanalysis of the NESSIE Candidates FLASH and SFLASH. [Citation Graph (0, 0)][DBLP ] ISC, 2001, pp:280-293 [Conf ] Willi Geiselmann , Hubert Köpfer , Rainer Steinwandt , Eran Tromer Improved Routing-Based Linear Algebra for the Number Field Sieve. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:636-641 [Conf ] Feng Bao , Robert H. Deng , Willi Geiselmann , Claus-Peter Schnorr , Rainer Steinwandt , Hongjun Wu Cryptoanalysis of Two Sparse Polynomial Based Public Key Cryptosystems. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2001, pp:153-164 [Conf ] Willi Geiselmann , Rainer Steinwandt A Dedicated Sieving Hardware. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2003, pp:254-266 [Conf ] Dennis Hofheinz , Rainer Steinwandt A Practical Attack on Some Braid Group Based Cryptographic Primitives. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2003, pp:187-198 [Conf ] Rainer Steinwandt Loopholes in Two Public Key Cryptosystems Using the Modular Group. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2001, pp:180-189 [Conf ] Dominik Raub , Rainer Steinwandt , Jörn Müller-Quade On the Security and Composability of the One Time Pad. [Citation Graph (0, 0)][DBLP ] SOFSEM, 2005, pp:288-297 [Conf ] Maria Isabel Gonzalez Vasco , Consuelo Martínez , Rainer Steinwandt , Jorge Luis Villar A New Cramer-Shoup Like Methodology for Group Based Provably Secure Encryption Schemes. [Citation Graph (0, 0)][DBLP ] TCC, 2005, pp:495-509 [Conf ] Michel Abdalla , Jens-Matthias Bohli , Maria Isabel Gonzalez Vasco , Rainer Steinwandt (Password) Authenticated Key Establishment: From 2-Party to Group. [Citation Graph (0, 0)][DBLP ] TCC, 2007, pp:499-514 [Conf ] Jens-Matthias Bohli , Benjamin Glas , Rainer Steinwandt Towards Provably Secure Group Key Agreement Building on Group Theory. [Citation Graph (0, 0)][DBLP ] VIETCRYPT, 2006, pp:322-336 [Conf ] Jens-Matthias Bohli , Rainer Steinwandt Deniable Group Key Agreement. [Citation Graph (0, 0)][DBLP ] VIETCRYPT, 2006, pp:298-311 [Conf ] Thomas Beth , Willi Geiselmann , Rainer Steinwandt Mathematical Techniques in Cryptology-Editorial. [Citation Graph (0, 0)][DBLP ] Appl. Algebra Eng. Commun. Comput., 2006, v:16, n:6, pp:377-378 [Journal ] Jörn Müller-Quade , Rainer Steinwandt Recognizing Simple Subextensions of Purely Transcendental Field Extensions. [Citation Graph (0, 0)][DBLP ] Appl. Algebra Eng. Commun. Comput., 2000, v:11, n:1, pp:35-41 [Journal ] Maria Isabel Gonzalez Vasco , Rainer Steinwandt A Reaction Attack on a Public Key Cryptosystem Based on the Word Problem. [Citation Graph (0, 0)][DBLP ] Appl. Algebra Eng. Commun. Comput., 2004, v:14, n:5, pp:335-340 [Journal ] Maria Isabel Gonzalez Vasco , Rainer Steinwandt Pitfalls in public key cryptosystems based on free partially commutative monoids and groups. [Citation Graph (0, 0)][DBLP ] Appl. Math. Lett., 2006, v:19, n:10, pp:1037-1041 [Journal ] Jens-Matthias Bohli , Rainer Steinwandt , Maria Isabel Gonzalez Vasco , Consuelo Martínez Weak Keys in MST 1 . [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 2005, v:37, n:3, pp:509-524 [Journal ] Maria Isabel Gonzalez Vasco , Dennis Hofheinz , Consuelo Martínez , Rainer Steinwandt On the Security of Two Public Key Cryptosystems Using Non-Abelian Groups. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 2004, v:32, n:1-3, pp:207-216 [Journal ] Maria Isabel Gonzalez Vasco , Consuelo Martínez , Rainer Steinwandt Towards a Uniform Description of Several Group Based Cryptographic Primitives. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 2004, v:33, n:3, pp:215-226 [Journal ] Willi Geiselmann , Rainer Steinwandt Kryptoanalyse der Ruland/Schweitzer-Signatur von Bitströmen. [Citation Graph (0, 0)][DBLP ] Datenschutz und Datensicherheit, 2001, v:25, n:10, pp:- [Journal ] Willi Geiselmann , Jörn Müller-Quade , Rainer Steinwandt , Thomas Beth Über Quantencomputer und Quantenkryptographie. [Citation Graph (0, 0)][DBLP ] Datenschutz und Datensicherheit, 2002, v:26, n:8, pp:- [Journal ] Jens-Matthias Bohli , Stefan Röhrich , Rainer Steinwandt Key substitution attacks revisited: Taking into account malicious signers. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2006, v:5, n:1, pp:30-36 [Journal ] Willi Geiselmann , Willi Meier , Rainer Steinwandt An attack on the isomorphisms of polynomials problem with one secret. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2003, v:2, n:1, pp:59-64 [Journal ] Rainer Steinwandt , Willi Geiselmann , Regine Endsuleit Attacking a polynomial-based cryptosystem: Polly Cracker. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2002, v:1, n:3, pp:143-148 [Journal ] Willi Geiselmann , Rainer Steinwandt Power attacks on a side-channel resistant elliptic curve implementation. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 2004, v:91, n:1, pp:29-32 [Journal ] Maria Isabel Gonzalez Vasco , Rainer Steinwandt Clouds over a public key cryptosystem based on Lyndon words. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 2001, v:80, n:5, pp:239-242 [Journal ] Thomas Beth , Jörn Müller-Quade , Rainer Steinwandt Computing restrictions of ideals in finitely generated k -algebras by means of Buchberger's algorithm. [Citation Graph (0, 0)][DBLP ] J. Symb. Comput., 2006, v:41, n:3-4, pp:372-380 [Journal ] Marcus Hausdorf , Werner M. Seiler , Rainer Steinwandt Involutive Bases in the Weyl Algebra. [Citation Graph (0, 0)][DBLP ] J. Symb. Comput., 2002, v:34, n:3, pp:181-198 [Journal ] Jörn Müller-Quade , Rainer Steinwandt Gröbner Bases Applied to Finitely Generated Field Extensions. [Citation Graph (0, 0)][DBLP ] J. Symb. Comput., 2000, v:30, n:4, pp:469-490 [Journal ] Jörn Müller-Quade , Rainer Steinwandt Basic Algorithms for Rational Function Fields. [Citation Graph (0, 0)][DBLP ] J. Symb. Comput., 1999, v:27, n:2, pp:143-170 [Journal ] Willi Geiselmann , Jörn Müller-Quade , Rainer Steinwandt On "A New Representation of Elements of Finite Fields GF (2m ) Yielding Small Complexity Arithmetic Circuits". [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2002, v:51, n:12, pp:1460-1461 [Journal ] Willi Geiselmann , Rainer Steinwandt A Redundant Representation of GF(q^n) for Designing Arithmetic Circuits. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2003, v:52, n:7, pp:848-853 [Journal ] Rainer Steinwandt , Willi Geiselmann Cryptanalysis of Polly Cracker. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2002, v:48, n:11, pp:2990-2991 [Journal ] Willi Geiselmann , Rainer Steinwandt Non-wafer-Scale Sieving Hardware for the NFS: Another Attempt to Cope with 1024-Bit. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2007, pp:466-481 [Conf ] Willi Geiselmann , Rainer Steinwandt Cryptanalysis of a Hash Function Proposed at ICISC 2006. [Citation Graph (0, 0)][DBLP ] ICISC, 2007, pp:1-10 [Conf ] Jens-Matthias Bohli , Maria Isabel Gonzalez Vasco , Rainer Steinwandt A Subliminal-Free Variant of ECDSA. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2006, pp:375-387 [Conf ] Jens-Matthias Bohli , Maria Isabel Gonzalez Vasco , Rainer Steinwandt Secure group key establishment revisited. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2007, v:6, n:4, pp:243-254 [Journal ] Willi Geiselmann , Maria Isabel Gonzalez Vasco , Rainer Steinwandt Entwurf asymmetrischer kryptographischer Verfahren unter Berücksichtigung von Quantenalgorithmen (Design of Asymmetric Cryptographic Schemes Taking Into Account Quantum Algorithms). [Citation Graph (0, 0)][DBLP ] it - Information Technology, 2006, v:48, n:6, pp:327-0 [Journal ] Reverse Public Key Encryption. [Citation Graph (, )][DBLP ] Cryptanalysis of a Message Recognition Protocol by Mashatan and Stinson. [Citation Graph (, )][DBLP ] Applications of algebra to cryptography. [Citation Graph (, )][DBLP ] Search in 0.015secs, Finished in 0.471secs