Christopher Wolf
According to our database1,
Christopher Wolf
authored at least 42 papers
between 2003 and 2015.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2015
Proceedings of the Financial Cryptography and Data Security, 2015
2014
Proceedings of the Sicherheit 2014: Sicherheit, 2014
2013
Proceedings of the 43. Jahrestagung der Gesellschaft für Informatik, 2013
Quantifying the security of graphical passwords: the case of android unlock patterns.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
Proceedings of the Public Key Cryptography - PKC 2012, 2012
PermissionWatcher: Creating User Awareness of Application Permissions in Mobile Systems.
Proceedings of the Ambient Intelligence - Third International Joint Conference, 2012
Cryptanalysis of Enhanced TTS, STS and All Its Variants, or: Why Cross-Terms Are Important.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012
2011
Small Linearization: Memory Friendly Solving of Non-Linear Equations over Finite Fields.
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
Small Public Keys and Fast Verification for Multivariate Quadratic Public Key Systems.
IACR Cryptol. ePrint Arch., 2011
Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011
Small Public Keys and Fast Verification for $\mathcal{M}$ ultivariate $\mathcal{Q}$ uadratic Public Key Systems.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011
2010
MQ<sup>*</sup>-IP: An Identity-based Identification Scheme without Number-theoretic Assumptions.
IACR Cryptol. ePrint Arch., 2010
2009
Proceedings of the 39. Jahrestagung der Gesellschaft für Informatik, Im Focus das Leben, INFORMATIK 2009, Lübeck, Germany, September 28, 2009
2008
Time-Area Optimized Public-Key Engines: MQ-Cryptosystems as Replacement for Elliptic Curves?
IACR Cryptol. ePrint Arch., 2008
Time-Area Optimized Public-Key Engines: -Cryptosystems as Replacement for Elliptic Curves?.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008
2007
<i>l</i>-Invertible Cycles for <i>M</i>ultivariate <i>Q</i>uadratic (<i>MQ</i>) Public Key Cryptography.
Proceedings of the Public Key Cryptography, 2007
2006
Proceedings of the Sicherheit 2006: Sicherheit, 2006
2005
IACR Cryptol. ePrint Arch., 2005
Taxonomy of Public Key Schemes based on the problem of Multivariate Quadratic equations.
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the Public Key Cryptography, 2005
Complexity Estimates for the F<sub>4</sub> Attack on the Perturbed Matsumoto-Imai Cryptosystem.
Proceedings of the Cryptography and Coding, 2005
Proceedings of the Information Society: Emerging Landscapes, 2005
Multivariate quadratic polynomials in public key cryptography.
Univ. Leuven Heverlee, ISBN: 978-9-05-682649-9, 2005
2004
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
Classification of Highly Nonlinear Boolean Power Functions with a Randomised Algorithm for Checking Normality.
IACR Cryptol. ePrint Arch., 2004
A Randomised Algorithm for Checking the Normality of Cryptographic Boolean Functions.
Proceedings of the Exploring New Frontiers of Theoretical Informatics, 2004
Efficient Public Key Generation for HFE and Variations.
Proceedings of the Cryptographic Algorithms and their Uses, 2004
2003
IACR Cryptol. ePrint Arch., 2003