Bodo Möller
According to our database1,
Bodo Möller
authored at least 34 papers
between 2000 and 2016.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2016
2015
TLS Fallback Signaling Cipher Suite Value (SCSV) for Preventing Protocol Downgrade Attacks.
RFC, April, 2015
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
2007
Strong password-based authentication in TLS using the three-party group Diffie?Hellman protocol.
Int. J. Secur. Networks, 2007
Faster Multi-Exponentiation through Caching: Accelerating (EC)DSA Signature Verification.
IACR Cryptol. ePrint Arch., 2007
Proceedings of the 37. Jahrestagung der Gesellschaft für Informatik, 2007
Proceedings of the 2007 International Conference on Field-Programmable Technology, 2007
Proceedings of the IEEE Symposium on Field-Programmable Custom Computing Machines, 2007
Proceedings of the 2nd ECOWS07 Workshop on Emerging Web Services Technology, 2007
2006
RFC, May, 2006
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006
2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
2004
Fractional Windows Revisited: Improved Signed-Digit Representations for Efficient Exponentiation.
Proceedings of the Information Security and Cryptology, 2004
Proceedings of the Computer Security, 2004
2003
Proceedings of the Topics in Cryptology, 2003
2002
IACR Cryptol. ePrint Arch., 2002
Parallelizable Elliptic Curve Point Multiplication Method with Resistance against Side-Channel Attacks.
Proceedings of the Information Security, 5th International Conference, 2002
Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks.
Proceedings of the Progress in Cryptology, 2002
Proceedings of the Information Security and Cryptology, 2002
2001
Proceedings of the Selected Areas in Cryptography, 8th Annual International Workshop, 2001
Proceedings of the Information Security, 4th International Conference, 2001
2000
Proceedings of the Advances in Cryptology, 2000