Dis­ser­ta­ti­o­nen

Privacy-Preserving Cryptography: Attribute-Based Signatures and Updatable Credentials

F. Eidens, Privacy-Preserving Cryptography: Attribute-Based Signatures and Updatable Credentials, 2022.


Cryptography for the Crowd — A Study of Cryptographic Schemes with Applications to Crowd Work

N. Löken, Cryptography for the Crowd — A Study of Cryptographic Schemes with Applications to Crowd Work, 2020.


Classification and Approximation of Geometric Location Problems

S. Brauer, Classification and Approximation of Geometric Location Problems, Paderborn, 2019.


Models and Constructions for Secure Reputation Systems

J. Juhnke, Models and Constructions for Secure Reputation Systems, Universität Paderborn, 2018.


Soft Clustering Algorithms - Theoretical and Practical Improvements

K. Bujna, Soft Clustering Algorithms - Theoretical and Practical Improvements, Universität Paderborn, 2017.


CCA-Security for Predicate Encryption Schemes

G. Liske, CCA-Security for Predicate Encryption Schemes, Universität Paderborn, 2017.


Physical attacks on pairing-based cryptography

P. Günther, Physical Attacks on Pairing-Based Cryptography, Universität Paderborn, 2016.


Practical algorithms for clustering and modeling large data sets - Analysis and improvements

D. Kuntze, Practical Algorithms for Clustering and Modeling Large Data Sets - Analysis and Improvements, Universität Paderborn, 2013.


Algorithms for lattice problems with respect to general norms

S. Naewe, Algorithms for Lattice Problems with Respect to General Norms, Universität Paderborn, 2011.


Algorithms for the Bregman k-Median Problem

M.R. Ackermann, Algorithms for the Bregman K-Median Problem, Universität Paderborn, 2009.


Tamper Resistance of AES -- Models, Attacks and Countermeasures

V. Krummel, Tamper Resistance of AES -- Models, Attacks and Countermeasures, Universität Paderborn, 2007.


Fault Attacks and Countermeasures

M. Otto, Fault Attacks and Countermeasures, Universität Paderborn, 2005.


New RSA Vulnerabilities Using Lattice Reduction Methods

A. May, New RSA Vulnerabilities Using Lattice Reduction Methods, Universität Paderborn, 2003.


Simplifying Expressions Involving Radicals

J. Blömer, Simplifying Expressions Involving Radicals, PhD thesis, Freie Universität Berlin, Fachbereich Mathematik und Informatik, 1992.


Alle Publikationen anzeigen