Rainer Steinwandt
Affiliations:- University of Alabama in Huntsville, USA
- Florida Atlantic University, Boca Raton, FL, USA (former)
- Karlsruhe Institute of Technology, Germany (former, PhD 2000)
According to our database1,
Rainer Steinwandt
authored at least 126 papers
between 1999 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on uah.edu
-
on math.fau.edu
On csauthors.net:
Bibliography
2024
IACR Cryptol. ePrint Arch., 2024
2023
2021
2020
2019
IACR Cryptol. ePrint Arch., 2019
From Key Encapsulation to Authenticated Group Key Establishment - A Compiler for Post-Quantum Primitives †.
Entropy, 2019
Password-Authenticated Group Key Establishment from Smooth Projective Hash Functions.
Int. J. Appl. Math. Comput. Sci., 2019
2018
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018
Cryptanalysis of a Proposal Based on the Discrete Logarithm Problem Inside <i>S<sub>n</sub></i>.
Cryptogr., 2018
2017
IACR Cryptol. ePrint Arch., 2017
Adv. Math. Commun., 2017
2016
IEEE Trans. Inf. Forensics Secur., 2016
Combined schemes for signature and encryption: The public-key and the identity-based setting.
Inf. Comput., 2016
Proceedings of the Post-Quantum Cryptography - 7th International Workshop, 2016
2015
Quantum circuits for 𝔽<sub>2<sup>n</sup></sub>-multiplication with subquadratic gate count.
Quantum Inf. Process., 2015
Automatic synthesis of quantum circuits for point addition on ordinary binary elliptic curves.
Quantum Inf. Process., 2015
IACR Cryptol. ePrint Arch., 2015
Chapman and Hall / CRC cryptography and network security series, CRC Press, ISBN: 978-1-584-88836-9, 2015
2014
A quantum circuit to find discrete logarithms on ordinary binary elliptic curves in depth O(log^2n).
Quantum Inf. Comput., 2014
IACR Cryptol. ePrint Arch., 2014
Scalable attribute-based group key establishment: from passive to active and deniable.
Appl. Algebra Eng. Commun. Comput., 2014
Proceedings of the Security and Cryptography for Networks - 9th International Conference, 2014
2013
On using probabilistic Turing machines to model participants in cryptographic protocols.
Theor. Comput. Sci., 2013
Efficient quantum circuits for binary elliptic curve arithmetic: reducing T-gate complexity.
Quantum Inf. Comput., 2013
Quantum binary field inversion: improved circuit depth via choice of basis representation.
Quantum Inf. Comput., 2013
A quantum circuit to find discrete logarithms on binary elliptic curves in depth O(log^2 n).
CoRR, 2013
2012
Multi-authority attribute-based encryption with honest-but-curious central authority.
Int. J. Comput. Math., 2012
Des. Codes Cryptogr., 2012
Des. Codes Cryptogr., 2012
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012
2011
Adv. Math. Commun., 2011
Proceedings of the Topics in Cryptology - CT-RSA 2011, 2011
2010
PET SNAKE: A Special Purpose Architecture to Implement an Algebraic Attack in Hardware.
Trans. Comput. Sci., 2010
Des. Codes Cryptogr., 2010
Server-assisted Long-term Secure 3-party Key Establishment.
Proceedings of the SECRYPT 2010, 2010
2009
Inf. Process. Lett., 2009
IACR Cryptol. ePrint Arch., 2009
2008
Proceedings of the Theoretical Foundations of Practical Information Security, 30.11., 2008
08491 Abstracts Collection - Theoretical Foundations of Practical Information Security.
Proceedings of the Theoretical Foundations of Practical Information Security, 30.11., 2008
2007
IEEE Secur. Priv., 2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the Theory of Cryptography, 4th Theory of Cryptography Conference, 2007
2006
Computing restrictions of ideals in finitely generated <i>k</i>-algebras by means of Buchberger's algorithm.
J. Symb. Comput., 2006
Entwurf asymmetrischer kryptographischer Verfahren unter Berücksichtigung von Quantenalgorithmen (Design of Asymmetric Cryptographic Schemes Taking Into Account Quantum Algorithms).
it Inf. Technol., 2006
Int. J. Inf. Sec., 2006
IACR Cryptol. ePrint Arch., 2006
Password-Authenticated Constant-Round Group Key Establishment with a Common Reference String.
IACR Cryptol. ePrint Arch., 2006
IACR Cryptol. ePrint Arch., 2006
Pitfalls in public key cryptosystems based on free partially commutative monoids and groups.
Appl. Math. Lett., 2006
Appl. Algebra Eng. Commun. Comput., 2006
Proceedings of the Information Hiding, 8th International Workshop, 2006
Proceedings of the Emerging Trends in Information and Communication Security, 2006
2005
Cryptanalysis of a practical quantum key distribution with polarization-entangled photons.
Quantum Inf. Comput., 2005
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
A New Cramer-Shoup Like Methodology for Group Based Provably Secure Encryption Schemes.
Proceedings of the Theory of Cryptography, Second Theory of Cryptography Conference, 2005
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005
Scalable Hardware for Sparse Systems of Linear Equations, with Applications to Integer Factorization.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29, 2005
2004
Inf. Process. Lett., 2004
IACR Cryptol. ePrint Arch., 2004
Des. Codes Cryptogr., 2004
Des. Codes Cryptogr., 2004
Appl. Algebra Eng. Commun. Comput., 2004
Proceedings of the Information Security and Cryptology, 2004
Proceedings of the Computer Security, 2004
2003
IEEE Trans. Computers, 2003
Quantum Inf. Comput., 2003
IACR Cryptol. ePrint Arch., 2003
IACR Cryptol. ePrint Arch., 2003
IACR Cryptol. ePrint Arch., 2003
IACR Cryptol. ePrint Arch., 2003
Proceedings of the Public Key Cryptography, 2003
Proceedings of the 33. Jahrestagung der Gesellschaft für Informatik, Innovative Informatikanwendungen, INFORMATIK 2003, Frankfurt am Main, Germany, September 29, 2003
Proceedings of the Cryptographic Hardware and Embedded Systems, 2003
2002
On "A New Representation of Elements of Finite Fields GF (2<sup>m</sup>) Yielding Small Complexity Arithmetic Circuits".
IEEE Trans. Computers, 2002
IACR Cryptol. ePrint Arch., 2002
IACR Cryptol. ePrint Arch., 2002
Über Quantencomputer und Quantenkryptographie.
Datenschutz und Datensicherheit, 2002
2001
Inf. Process. Lett., 2001
Kryptoanalyse der Ruland/Schweitzer-Signatur von Bitströmen.
Datenschutz und Datensicherheit, 2001
Proceedings of the Public Key Cryptography, 2001
Proceedings of the Public Key Cryptography, 2001
Proceedings of the Information Security, 4th International Conference, 2001
Proceedings of the Cryptography and Coding, 2001
2000
Appl. Algebra Eng. Commun. Comput., 2000
Proceedings of the Advances in Cryptology, 2000
Zur algorithmischen Zerlegung polynomialer Gleichungssysteme.
PhD thesis, 2000
1999
Proceedings of the Second Workshop on Computer Algebra in Scientific Computing, 1999