Johannes Buchmann
Affiliations:- TU Darmstadt, Department of Computer Science, Germany
According to our database1,
Johannes Buchmann
authored at least 210 papers
between 1984 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on id.loc.gov
-
on gi.de
-
on d-nb.info
-
on dl.acm.org
On csauthors.net:
Bibliography
2022
Proceedings of the Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman, 2022
2021
The Status of Quantum-Key-Distribution-Based Long-Term Secure Internet Communication.
IEEE Trans. Sustain. Comput., 2021
2020
IACR Cryptol. ePrint Arch., 2020
ELSA: efficient long-term secure storage of large datasets (full version) <sup>∗</sup>.
EURASIP J. Inf. Secur., 2020
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020
2019
Estimation of the hardness of the learning with errors problem with a restricted number of samples.
J. Math. Cryptol., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the Codes, Cryptology and Information Security, 2019
Proceedings of the 7th International Workshop on Security in Cloud Computing, 2019
2018
Comparing apples with apples: performance analysis of lattice-based authenticated key exchange protocols.
Int. J. Inf. Sec., 2018
PQChain: Strategic Design Decisions for Distributed Ledger Technologies against Future Threats.
IEEE Secur. Priv., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IEEE Access, 2018
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018
Proceedings of the Information Security and Cryptology - ICISC 2018, 2018
Proceedings of the 6th International Workshop on Security in Cloud Computing, 2018
2017
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-53798-6, 2017
Frontiers Inf. Technol. Electron. Eng., 2017
On lower bounds for information set decoding over <sub>q</sub> and on the effect of partial knowledge.
Int. J. Inf. Coding Theory, 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems.
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability.
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics.
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
CoRR, 2017
Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems (Short Paper).
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017
Long-Term Secure Time-Stamping Using Preimage-Aware Hash Functions - (Short Version).
Proceedings of the Provable Security, 2017
Proceedings of the Post-Quantum Cryptography - 8th International Workshop, 2017
Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor p^\alpha q^\beta p α q β.
Proceedings of the Progress in Cryptology - INDOCRYPT 2017, 2017
Proceedings of the Tenth International Conference on Mobile Computing and Ubiquitous Network, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
LINCOS: A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
2016
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-32115-8, 2016
IACR Cryptol. ePrint Arch., 2016
On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack.
IACR Cryptol. ePrint Arch., 2016
LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality (Full Paper).
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
Proceedings of the Open Identity Summit 2016, 13-14 October 2016, Rome, Italy, 2016
Proceedings of the Advances in Information and Computer Security, 2016
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security, 2016
Proceedings of the New Codebreakers, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: A survey.
Comput. Secur., 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the Cyber Security and Privacy, 2015
Proceedings of the Codes, Cryptology, and Information Security, 2015
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2014
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
IACR Cryptol. ePrint Arch., 2014
LCPR: High Performance Compression Algorithm for Lattice-Based Signatures and Schnorr-like Constructions.
IACR Cryptol. ePrint Arch., 2014
Datenschutz und Datensicherheit, 2014
Full analysis of PRINTcipher with respect to invariant subspace attack: efficient key recovery and countermeasures.
Des. Codes Cryptogr., 2014
Proceedings of the Post-Quantum Cryptography - 6th International Workshop, 2014
A privacy-enhancing protocol that provides in-network data aggregation and verifiable smart meter billing.
Proceedings of the IEEE Symposium on Computers and Communications, 2014
Proceedings of the IEEE 33rd International Performance Computing and Communications Conference, 2014
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014
Proceedings of the IEEE Conference on Communications and Network Security, 2014
Proceedings of the Cryptography and Information Security in the Balkans, 2014
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014
2013
Int. J. Appl. Cryptogr., 2013
Discrete Ziggurat: A Time-Memory Trade-off for Sampling from a Gaussian Distribution over the Integers.
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Appl. Algebra Eng. Commun. Comput., 2013
Proceedings of the E-Voting and Identify - 4th International Conference, 2013
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013
Proceedings of the Post-Quantum Cryptography - 5th International Workshop, 2013
Proceedings of the Post-Quantum Cryptography - 5th International Workshop, 2013
Proceedings of the 2013 IEEE Symposium on Computers and Communications, 2013
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013
Proceedings of the Financial Cryptography and Data Security, 2013
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013
Proceedings of the Security Engineering and Intelligence Informatics, 2013
2012
Prax. Inf.verarb. Kommun., 2012
Perfect Confidentiality Network: A Solution for Information Theoretically Secure Key Agreement.
Proceedings of the 5th International Conference on New Technologies, 2012
How to Avoid the Breakdown of Public Key Infrastructures - Forward Secure Signatures for Certificate Authorities.
Proceedings of the Public Key Infrastructures, Services and Applications, 2012
Optimizing Guessing Strategies for Algebraic Cryptanalysis with Applications to EPCBC.
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012
On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012
2011
XMSS - A Practical Forward Secure Signature Scheme based on Minimal Security Assumptions.
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Information Security and Assurance - International Conference, 2011
Proceedings of the Information Security and Assurance - International Conference, 2011
Proceedings of the Public Key Cryptography - PKC 2011, 2011
Extreme Enumeration on GPU and in Clouds - - How Many Dollars You Need to Break SVP Challenges -.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
Algebraic Cryptanalysis of the Round-Reduced and Side Channel Analysis of the Full PRINTCipher-48.
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011
2010
IACR Cryptol. ePrint Arch., 2010
CyclicRainbow - A multivariate Signature Scheme with a Partially Cyclic Public Key based on Rainbow.
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
Towards provable security of the Unbalanced Oil and Vinegar signature scheme under direct attacks.
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Sicherheit 2010: Sicherheit, 2010
Proceedings of the Post-Quantum Cryptography, Third International Workshop, 2010
Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010
Proceedings of the Electronic Voting 2010, 2010
Proceedings of the Cryptology and Network Security - 9th International Conference, 2010
Flexible Partial Enlargement to Accelerate Gröbner Basis Computation over <i>F</i><sub>2</sub>.
Proceedings of the Progress in Cryptology, 2010
A Taxonomy Refining the Security Requirements for Electronic Voting: Analyzing Helios as a Proof of Concept.
Proceedings of the ARES 2010, 2010
Einführung in die Kryptographie, 5. Auflage.
Springer-Lehrbuch, Springer, ISBN: 978-3-642-11185-3, 2010
2009
Int. J. Commun. Netw. Syst. Sci., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the E-Voting and Identity, Second International Conference, 2009
Proceedings of the First International Workshop on Requirements Engineering for e-Voting Systems, 2009
Proceedings of the First International Workshop on Requirements Engineering for e-Voting Systems, 2009
MXL<sub>3</sub>: An Efficient Algorithm for Computing Gröbner Bases of Zero-Dimensional Ideals.
Proceedings of the Information, Security and Cryptology, 2009
Towards long-term free and secret electronic elections providing voter-verifiability in the bulletin board model.
Proceedings of the ICEGOV 2009, 2009
Proceedings of the 39. Jahrestagung der Gesellschaft für Informatik, Im Focus das Leben, INFORMATIK 2009, Lübeck, Germany, September 28, 2009
Proceedings of the 39. Jahrestagung der Gesellschaft für Informatik, Im Focus das Leben, INFORMATIK 2009, Lübeck, Germany, September 28, 2009
Proceedings of the 39. Jahrestagung der Gesellschaft für Informatik, Im Focus das Leben, INFORMATIK 2009, Lübeck, Germany, September 28, 2009
Proceedings of the Algorithms and Number Theory, 24.05. - 29.05.2009, 2009
Proceedings of the Symmetric Cryptography, 11.01. - 16.01.2009, 2009
Proceedings of the Algorithms and Number Theory, 24.05. - 29.05.2009, 2009
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009
2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Information Security Applications, 9th International Workshop, 2008
Proceedings of the Sicherheit 2008: Sicherheit, 2008
Proceedings of the Post-Quantum Cryptography, Second International Workshop, 2008
Proceedings of the Post-Quantum Cryptography, Second International Workshop, 2008
Proceedings of the Post-Quantum Cryptography, Second International Workshop, 2008
Proceedings of the Smart Card Research and Advanced Applications, 2008
2007
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007
Proceedings of the The Second International Conference on Availability, 2007
Binary quadratic forms - an algorithmic approach.
Algorithms and computation in mathematics 20, Springer, ISBN: 978-3-540-46367-2, 2007
2006
J. Comput. Secur., 2006
Proceedings of the Sicherheit 2006: Sicherheit, 2006
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006
Proceedings of the Public Key Infrastructure, 2006
Proceedings of the Topics in Cryptology, 2006
2005
The Workshop - Implementing Well Structured Enterprise Applications.
Proceedings of the International Conference on Software Engineering Research and Practice, 2005
Proceedings of the Applied Public Key Infrastructure, 2005
Proceedings of the Public Key Infrastructure, 2005
Ouflanking and Securely Using the PIN/TAN-System.
Proceedings of The 2005 International Conference on Security and Management, 2005
An Evaluated Certification Services System for the German National Root CA - Legally binding and trustworthy Transactions in E-Business and E-Government.
Proceedings of The 2005 International Conference on E-Business, 2005
2004
2002
A Signature Scheme Based on the Intractability of Computing Roots.
Des. Codes Cryptogr., 2002
Introduction to Cryptography
Springer, ISBN: 0-387-95034-6, 2002
2001
Proceedings of the Information Security and Cryptology, 2001
Einführung in die Kryptographie, 2. Auflage.
Springer, ISBN: 978-3-540-41283-0, 2001
2000
Proceedings of the Progress in Cryptology, 2000
1999
1997
Proceedings of the Advances in Cryptology, 1997
Proceedings of the Algorithmic Algebra and Number Theory, 1997
1996
Math. Comput., 1996
1994
Proceedings of the Advances in Cryptology, 1994
Proceedings of the Algorithmic Number Theory, First International Symposium, 1994
1993
Proceedings of the Advances in Cryptology, 1993
1992
Proceedings of the Informatik, Festschrift zum 60. Geburtstag von Günter Hotz, 1992
1991
Some remarks concerning the complexity of computing class groups of quadratic fields.
J. Complex., 1991
Proceedings of the 1991 International Symposium on Symbolic and Algebraic Computation, 1991
Proceedings of the Fundamentals of Computation Theory, 8th International Symposium, 1991
1990
Proceedings of the Advances in Cryptology, 1990
Proceedings of the Advances in Cryptology, 1990
1989
Proceedings of the Advances in Cryptology, 1989
Proceedings of the Advances in Cryptology, 1989
1988
Proceedings of the Applied Algebra, 1988
1987
Proceedings of the EUROCAL '87, 1987
1985
Proceedings of the EUROCAL '85, 1985
Proceedings of the Algebraic Algorithms and Error-Correcting Codes, 1985
1984