dblp.uni-trier.dewww.uni-trier.de

Rainer Steinwandt Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo
Home Page

*2009
52EEMarkus Grassl, Rainer Steinwandt: Cryptanalysis of an authentication scheme using truncated polynomials. Inf. Process. Lett. 109(15): 861-863 (2009)
2008
51EEMaria Isabel Gonzalez Vasco, Rainer Steinwandt: Applications of algebra to cryptography. Discrete Applied Mathematics 156(16): 3071 (2008)
50EERainer Steinwandt, Viktória I. Villányi: A one-time signature using run-length encoding. Inf. Process. Lett. 108(4): 179-185 (2008)
2007
49EEWilli Geiselmann, Rainer Steinwandt: Non-wafer-Scale Sieving Hardware for the NFS: Another Attempt to Cope with 1024-Bit. EUROCRYPT 2007: 466-481
48EEWilli Geiselmann, Rainer Steinwandt: Cryptanalysis of a Hash Function Proposed at ICISC 2006. ICISC 2007: 1-10
47EEMichel Abdalla, Jens-Matthias Bohli, Maria Isabel Gonzalez Vasco, Rainer Steinwandt: (Password) Authenticated Key Establishment: From 2-Party to Group. TCC 2007: 499-514
46EEWilli Geiselmann, Rainer Steinwandt: Special-Purpose Hardware in Cryptanalysis: The Case of 1, 024-Bit RSA. IEEE Security & Privacy 5(1): 63-66 (2007)
45EEJens-Matthias Bohli, Maria Isabel Gonzalez Vasco, Rainer Steinwandt: Secure group key establishment revisited. Int. J. Inf. Sec. 6(4): 243-254 (2007)
2006
44EEDominik Raub, Rainer Steinwandt: An Algebra for Enterprise Privacy Policies Closed Under Composition and Conjunction. ETRICS 2006: 130-144
43EEWilli Geiselmann, Fabian Januszewski, Hubert Köpfer, Jan Pelzl, Rainer Steinwandt: A Simpler Sieving Device: Combining ECM and TWIRL. ICISC 2006: 118-135
42EEJens-Matthias Bohli, Maria Isabel Gonzalez Vasco, Rainer Steinwandt: A Subliminal-Free Variant of ECDSA. Information Hiding 2006: 375-387
41EEJens-Matthias Bohli, Rainer Steinwandt: Deniable Group Key Agreement. VIETCRYPT 2006: 298-311
40EEJens-Matthias Bohli, Benjamin Glas, Rainer Steinwandt: Towards Provably Secure Group Key Agreement Building on Group Theory. VIETCRYPT 2006: 322-336
39EEThomas Beth, Willi Geiselmann, Rainer Steinwandt: Mathematical Techniques in Cryptology-Editorial. Appl. Algebra Eng. Commun. Comput. 16(6): 377-378 (2006)
38EEMaria Isabel Gonzalez Vasco, Rainer Steinwandt: Pitfalls in public key cryptosystems based on free partially commutative monoids and groups. Appl. Math. Lett. 19(10): 1037-1041 (2006)
37EEJens-Matthias Bohli, Stefan Röhrich, Rainer Steinwandt: Key substitution attacks revisited: Taking into account malicious signers. Int. J. Inf. Sec. 5(1): 30-36 (2006)
36EEThomas Beth, Jörn Müller-Quade, Rainer Steinwandt: Computing restrictions of ideals in finitely generated k-algebras by means of Buchberger's algorithm. J. Symb. Comput. 41(3-4): 372-380 (2006)
35EEWilli Geiselmann, Maria Isabel Gonzalez Vasco, Rainer Steinwandt: Entwurf asymmetrischer kryptographischer Verfahren unter Berücksichtigung von Quantenalgorithmen (Design of Asymmetric Cryptographic Schemes Taking Into Account Quantum Algorithms). it - Information Technology 48(6): 327- (2006)
2005
34EEWilli Geiselmann, Adi Shamir, Rainer Steinwandt, Eran Tromer: Scalable Hardware for Sparse Systems of Linear Equations, with Applications to Integer Factorization. CHES 2005: 131-146
33EEWilli Geiselmann, Hubert Köpfer, Rainer Steinwandt, Eran Tromer: Improved Routing-Based Linear Algebra for the Number Field Sieve. ITCC (1) 2005: 636-641
32EEDominik Raub, Rainer Steinwandt, Jörn Müller-Quade: On the Security and Composability of the One Time Pad. SOFSEM 2005: 288-297
31EEMaria Isabel Gonzalez Vasco, Consuelo Martínez, Rainer Steinwandt, Jorge Luis Villar: A New Cramer-Shoup Like Methodology for Group Based Provably Secure Encryption Schemes. TCC 2005: 495-509
30EEJens-Matthias Bohli, Rainer Steinwandt, Maria Isabel Gonzalez Vasco, Consuelo Martínez: Weak Keys in MST1. Des. Codes Cryptography 37(3): 509-524 (2005)
2004
29EEWilli Geiselmann, Rainer Steinwandt: Yet Another Sieving Device. CT-RSA 2004: 278-291
28EEMichael Backes, Markus Dürmuth, Rainer Steinwandt: An Algebra for Composing Enterprise Privacy Policies. ESORICS 2004: 33-52
27EEJens-Matthias Bohli, Rainer Steinwandt: On Subliminal Channels in Deterministic Signature Schemes. ICISC 2004: 182-194
26EEMaria Isabel Gonzalez Vasco, Rainer Steinwandt: A Reaction Attack on a Public Key Cryptosystem Based on the Word Problem. Appl. Algebra Eng. Commun. Comput. 14(5): 335-340 (2004)
25EEMaria Isabel Gonzalez Vasco, Dennis Hofheinz, Consuelo Martínez, Rainer Steinwandt: On the Security of Two Public Key Cryptosystems Using Non-Abelian Groups. Des. Codes Cryptography 32(1-3): 207-216 (2004)
24EEMaria Isabel Gonzalez Vasco, Consuelo Martínez, Rainer Steinwandt: Towards a Uniform Description of Several Group Based Cryptographic Primitives. Des. Codes Cryptography 33(3): 215-226 (2004)
23EEWilli Geiselmann, Rainer Steinwandt: Power attacks on a side-channel resistant elliptic curve implementation. Inf. Process. Lett. 91(1): 29-32 (2004)
2003
22EEWilli Geiselmann, Rainer Steinwandt: Hardware to Solve Sparse Systems of Linear Equations over GF(2). CHES 2003: 51-61
21EEDennis Hofheinz, Jörn Müller-Quade, Rainer Steinwandt: Initiator-Resilient Universally Composable Key Exchange. ESORICS 2003: 61-84
20 Willi Geiselmann, Rainer Steinwandt: On the security of cryptographic primitives regarding technological innovations. GI Jahrestagung (1) 2003: 99-102
19EEDennis Hofheinz, Rainer Steinwandt: A Practical Attack on Some Braid Group Based Cryptographic Primitives. Public Key Cryptography 2003: 187-198
18EEWilli Geiselmann, Rainer Steinwandt: A Dedicated Sieving Hardware. Public Key Cryptography 2003: 254-266
17EEWilli Geiselmann, Rainer Steinwandt: A Redundant Representation of GF(q^n) for Designing Arithmetic Circuits. IEEE Trans. Computers 52(7): 848-853 (2003)
16EEWilli Geiselmann, Willi Meier, Rainer Steinwandt: An attack on the isomorphisms of polynomials problem with one secret. Int. J. Inf. Sec. 2(1): 59-64 (2003)
2002
15 Willi Geiselmann, Jörn Müller-Quade, Rainer Steinwandt, Thomas Beth: Über Quantencomputer und Quantenkryptographie. Datenschutz und Datensicherheit 26(8): (2002)
14EEWilli Geiselmann, Jörn Müller-Quade, Rainer Steinwandt: On "A New Representation of Elements of Finite Fields GF (2m) Yielding Small Complexity Arithmetic Circuits". IEEE Trans. Computers 51(12): 1460-1461 (2002)
13 Rainer Steinwandt, Willi Geiselmann: Cryptanalysis of Polly Cracker. IEEE Transactions on Information Theory 48(11): 2990-2991 (2002)
12EERainer Steinwandt, Willi Geiselmann, Regine Endsuleit: Attacking a polynomial-based cryptosystem: Polly Cracker. Int. J. Inf. Sec. 1(3): 143-148 (2002)
11EEMarcus Hausdorf, Werner M. Seiler, Rainer Steinwandt: Involutive Bases in the Weyl Algebra. J. Symb. Comput. 34(3): 181-198 (2002)
2001
10EEWilli Geiselmann, Rainer Steinwandt, Thomas Beth: Attacking the Affine Parts of SFLASH. IMA Int. Conf. 2001: 355-359
9EERainer Steinwandt, Willi Geiselmann, Thomas Beth: A Theoretical DPA-Based Cryptanalysis of the NESSIE Candidates FLASH and SFLASH. ISC 2001: 280-293
8EEFeng Bao, Robert H. Deng, Willi Geiselmann, Claus-Peter Schnorr, Rainer Steinwandt, Hongjun Wu: Cryptoanalysis of Two Sparse Polynomial Based Public Key Cryptosystems. Public Key Cryptography 2001: 153-164
7EERainer Steinwandt: Loopholes in Two Public Key Cryptosystems Using the Modular Group. Public Key Cryptography 2001: 180-189
6 Willi Geiselmann, Rainer Steinwandt: Kryptoanalyse der Ruland/Schweitzer-Signatur von Bitströmen. Datenschutz und Datensicherheit 25(10): (2001)
5EEMaria Isabel Gonzalez Vasco, Rainer Steinwandt: Clouds over a public key cryptosystem based on Lyndon words. Inf. Process. Lett. 80(5): 239-242 (2001)
2000
4EERainer Steinwandt, Markus Grassl, Willi Geiselmann, Thomas Beth: Weaknesses in the SL2(IFs2) Hashing Scheme. CRYPTO 2000: 287-299
3EEJörn Müller-Quade, Rainer Steinwandt: Recognizing Simple Subextensions of Purely Transcendental Field Extensions. Appl. Algebra Eng. Commun. Comput. 11(1): 35-41 (2000)
2 Jörn Müller-Quade, Rainer Steinwandt: Gröbner Bases Applied to Finitely Generated Field Extensions. J. Symb. Comput. 30(4): 469-490 (2000)
1999
1 Jörn Müller-Quade, Rainer Steinwandt: Basic Algorithms for Rational Function Fields. J. Symb. Comput. 27(2): 143-170 (1999)

Coauthor Index

1Michel Abdalla [47]
2Michael Backes [28]
3Feng Bao [8]
4Thomas Beth [4] [9] [10] [15] [36] [39]
5Jens-Matthias Bohli [27] [30] [37] [40] [41] [42] [45] [47]
6Robert H. Deng (Robert Huijie Deng) [8]
7Markus Dürmuth [28]
8Regine Endsuleit [12]
9Willi Geiselmann [4] [6] [8] [9] [10] [12] [13] [14] [15] [16] [17] [18] [20] [22] [23] [29] [33] [34] [35] [39] [43] [46] [48] [49]
10Benjamin Glas [40]
11Markus Grassl [4] [52]
12Marcus Hausdorf [11]
13Dennis Hofheinz [19] [21] [25]
14Fabian Januszewski [43]
15Hubert Köpfer [33] [43]
16Consuelo Martínez [24] [25] [30] [31]
17Willi Meier [16]
18Jörn Müller-Quade [1] [2] [3] [14] [15] [21] [32] [36]
19Jan Pelzl [43]
20Dominik Raub [32] [44]
21Stefan Röhrich [37]
22Claus-Peter Schnorr [8]
23Werner M. Seiler [11]
24Adi Shamir [34]
25Eran Tromer [33] [34]
26Maria Isabel Gonzalez Vasco [5] [24] [25] [26] [30] [31] [35] [38] [42] [45] [47] [51]
27Viktória I. Villányi [50]
28Jorge Luis Villar [31]
29Hongjun Wu [8]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)