What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Johannes Buchmann
Google Scholar
54
publications in security and cryptology related venues
Year
Venue
Title
2020
conf/acisp
On Lattice-Based Interactive Protocols: An Approach with Less or No Aborts.
Nabil Alkeilani Alkadri
Rachid El Bansarkhani
Johannes Buchmann
2020
conf/fc
BLAZE: Practical Lattice-Based Blind Signatures for Privacy-Preserving Applications.
Nabil Alkeilani Alkadri
Rachid El Bansarkhani
Johannes Buchmann
2019
conf/acisp
Function-Dependent Commitments from Homomorphic Authenticators.
Lucas Schabhüser
Denis Butin
Johannes Buchmann
2019
conf/ctrsa
Context Hiding Multi-key Linearly Homomorphic Authenticators.
Lucas Schabhüser
Denis Butin
Johannes Buchmann
2018
conf/ccs
PROPYLA: Privacy Preserving Long-Term Secure Storage.
Matthias Geihs
Nikolaos P. Karvelas
Stefan Katzenbeisser
Johannes Buchmann
2018
conf/icisc
\mathsf ELSA : Efficient Long-Term Secure Storage of Large Datasets.
Matthias Geihs
Johannes Buchmann
2018
conf/africacrypt
Performing Computations on Hierarchically Shared Secrets.
Giulia Traverso
Denise Demirel
Johannes Buchmann
2017
conf/ccs
LINCOS: A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality.
Johannes Braun
Johannes Buchmann
Denise Demirel
Matthias Geihs
Mikio Fujiwara
Shiho Moriai
Masahide Sasaki
Atsushi Waseda
2017
conf/ccs
MoPS: A Modular Protection Scheme for Long-Term Storage.
Christian Weinert
Denise Demirel
Martín A. Gagliotti Vigil
Matthias Geihs
Johannes Buchmann
2017
conf/acisp
Update-Tolerant and Revocable Password Backup.
Moritz Horsch
Johannes Braun
Dominique Metz
Johannes Buchmann
2017
conf/acisp
Long-Term Secure Commitments via Extractable-Binding Commitments.
Ahto Buldas
Matthias Geihs
Johannes Buchmann
2017
conf/provsec
Long-Term Secure Time-Stamping Using Preimage-Aware Hash Functions - (Short Version).
Ahto Buldas
Matthias Geihs
Johannes Buchmann
2016
conf/ccs
High-Performance and Lightweight Lattice-Based Public-Key Encryption.
Johannes Buchmann
Florian Göpfert
Tim Güneysu
Tobias Oder
Thomas Pöppelmann
2016
conf/ccs
Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge.
Johannes Buchmann
Niklas Büscher
Florian Göpfert
Stefan Katzenbeisser
Juliane Krämer
Daniele Micciancio
Sander Siim
Christine van Vredendaal
Michael Walter
2016
conf/acisp
Password Requirements Markup Language.
Moritz Horsch
Mario Schlipf
Johannes Braun
Johannes Buchmann
2016
conf/cns
An unconditionally hiding auditing procedure for computations over distributed data.
Lucas Schabhüser
Denise Demirel
Johannes Buchmann
2016
conf/fdtc
Lattice-Based Signature Schemes and Their Sensitivity to Fault Attacks.
Nina Bindel
Johannes Buchmann
Juliane Krämer
2016
conf/iwsec
Formal Policy-Based Provenance Audit.
Denis Butin
Denise Demirel
Johannes Buchmann
2016
conf/africacrypt
An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation.
Sedat Akleylek
Nina Bindel
Johannes Buchmann
Juliane Krämer
Giorgia Azzurra Marson
2016
conf/africacrypt
On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack.
Johannes Buchmann
Florian Göpfert
Rachel Player
Thomas Wunderer
2015
journals/compsec
Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: A survey.
Martín A. Gagliotti Vigil
Johannes Buchmann
Daniel Cabarcas
Christian Weinert
Alexander Wiesmaier
2015
conf/fc
Augmented Learning with Errors: The Untapped Potential of the Error Term.
Rachid El Bansarkhani
Özgür Dagdelen
Johannes Buchmann
2014
conf/latincrypt
Tuning GaussSieve for Speed.
Robert Fitzpatrick
Christian H. Bischof
Johannes Buchmann
Özgür Dagdelen
Florian Göpfert
Artur Mariano
Bo-Yin Yang
2014
conf/icisc
Mutant Differential Fault Analysis of Trivium MDFA.
Mohamed Saied Emam Mohamed
Johannes Buchmann
2014
conf/cns
Introducing asymmetric DC-Nets.
Fábio Borges
Johannes Buchmann
Max Mühlhäuser
2014
conf/africacrypt
Towards Lattice Based Aggregate Signatures.
Rachid El Bansarkhani
Johannes Buchmann
2013
conf/fc
Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy.
Johannes Buchmann
Denise Demirel
Jeroen van de Graaf
2013
conf/ctrsa
Many Weak Keys for PRINTcipher: Fast Key Recovery and Countermeasures.
Stanislav Bulygin
Michael Walter
Johannes Buchmann
2013
conf/sacrypt
Discrete Ziggurat: A Time-Memory Trade-Off for Sampling from a Gaussian Distribution over the Integers.
Johannes Buchmann
Daniel Cabarcas
Florian Göpfert
Andreas Hülsing
Patrick Weiden
2013
conf/sacrypt
Improvement and Efficient Implementation of a Lattice-Based Signature Scheme.
Rachid El Bansarkhani
Johannes Buchmann
2012
conf/ches
On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes.
Norman Göttert
Thomas Feller
Michael Schneider
Johannes Buchmann
Sorin A. Huss
2012
conf/host
Improved algebraic side-channel attack on AES.
Mohamed Saied Emam Mohamed
Stanislav Bulygin
Michael Zohner
Annelie Heuser
Michael Walter
Johannes Buchmann
2012
conf/sacrypt
Forward Secure Signatures on Smart Cards.
Andreas Hülsing
Christoph Busold
Johannes Buchmann
2011
conf/ccs
An efficient mobile PACE implementation.
Alexander Wiesmaier
Moritz Horsch
Johannes Braun
Franziskus Kiefer
Detlef Hühnlein
Falko Strenzke
Johannes Buchmann
2011
conf/ches
Extreme Enumeration on GPU and in Clouds - - How Many Dollars You Need to Break SVP Challenges -.
Po-Chun Kuo
Michael Schneider
Özgür Dagdelen
Jan Reichelt
Johannes Buchmann
Chen-Mou Cheng
Bo-Yin Yang
2011
conf/pkc
Linear Recurring Sequences for the UOV Key Generation.
Albrecht Petzoldt
Stanislav Bulygin
Johannes Buchmann
2011
conf/africacrypt
On the Security of the Winternitz One-Time Signature Scheme.
Johannes Buchmann
Erik Dahmen
Sarah Ereth
Andreas Hülsing
Markus Rückert
2011
conf/cans
Algebraic Cryptanalysis of the Round-Reduced and Side Channel Analysis of the Full PRINTCipher-48.
Stanislav Bulygin
Johannes Buchmann
2010
conf/africacrypt
<sub>2</sub>.
Johannes Buchmann
Daniel Cabarcas
Jintai Ding
Mohamed Saied Emam Mohamed
2010
conf/africacrypt
Parallel Shortest Lattice Vector Enumeration on Graphics Cards.
Jens Hermans
Michael Schneider
Johannes Buchmann
Frederik Vercauteren
Bart Preneel
2010
conf/cans
Practical Algebraic Cryptanalysis for Dragon-Based Cryptosystems.
Johannes Buchmann
Stanislav Bulygin
Jintai Ding
Wael Said Abd Elmageed Mohamed
Fabian Werner
2009
conf/icisc
MXL<sub>3</sub>: An Efficient Algorithm for Computing Gröbner Bases of Zero-Dimensional Ideals.
Mohamed Saied Emam Mohamed
Daniel Cabarcas
Jintai Ding
Johannes Buchmann
Stanislav Bulygin
2009
conf/cans
Algebraic Attack on the MQQ Public Key Cryptosystem.
Mohamed Saied Emam Mohamed
Jintai Ding
Johannes Buchmann
Fabian Werner
2008
conf/wisa
Public Key Authentication with Memory Tokens.
Camille Vuillaume
Katsuyuki Okeya
Erik Dahmen
Johannes Buchmann
2007
conf/acns
Merkle Signatures with Virtually Unlimited Signature Capacity.
Johannes Buchmann
Erik Dahmen
Elena Klintsevich
Katsuyuki Okeya
Camille Vuillaume
2006
conf/fse
A Zero-Dimensional Gröbner Basis for AES-128.
Johannes Buchmann
Andrei Pyshkin
Ralf-Philipp Weinmann
2006
conf/ctrsa
Block Ciphers Sensitive to Gröbner Basis Attacks.
Johannes Buchmann
Andrei Pyshkin
Ralf-Philipp Weinmann
2001
conf/icisc
An IND-CCA2 Public-Key Cryptosystem with Fast Decryption.
Johannes Buchmann
Kouichi Sakurai
Tsuyoshi Takagi
1997
conf/crypto
A One Way Function Based on Ideal Arithmetic in Number Fields.
Johannes Buchmann
Sachar Paulus
1994
journals/joc
A Key-Exchange Protocol Using Real Quadratic Fields.
Renate Scheidler
Johannes Buchmann
Hugh C. Williams
1990
conf/eurocrypt
Implementation of a Key Exchange Protocol Using Some Real Quadratic Fields.
Renate Scheidler
Johannes Buchmann
Hugh C. Williams
1989
conf/crypto
A Key Exchange System Based on Real Quadratic Fields.
Johannes Buchmann
Hugh C. Williams
1989
conf/eurocrypt
On the Complexity and Efficiency of a New Key Exchange System.
Johannes Buchmann
Stephan Düllmann
Hugh C. Williams
1988
journals/joc
A Key-Exchange System Based on Imaginary Quadratic Fields.
Johannes Buchmann
Hugh C. Williams
Coauthors
Ahto Buldas
(2)
Albrecht Petzoldt
(1)
Alexander Wiesmaier
(2)
Andreas Hülsing
(3)
Andrei Pyshkin
(2)
Annelie Heuser
(1)
Artur Mariano
(1)
Atsushi Waseda
(1)
Bart Preneel
(1)
Bo-Yin Yang
(2)
Camille Vuillaume
(2)
Chen-Mou Cheng
(1)
Christian H. Bischof
(1)
Christian Weinert
(2)
Christine van Vredendaal
(1)
Christoph Busold
(1)
Daniel Cabarcas
(4)
Daniele Micciancio
(1)
Denis Butin
(3)
Denise Demirel
(6)
Detlef Hühnlein
(1)
Dominique Metz
(1)
Elena Klintsevich
(1)
Erik Dahmen
(3)
Fabian Werner
(2)
Fábio Borges
(1)
Falko Strenzke
(1)
Florian Göpfert
(5)
Franziskus Kiefer
(1)
Frederik Vercauteren
(1)
Giorgia Azzurra Marson
(1)
Giulia Traverso
(1)
Hugh C. Williams
(5)
Jan Reichelt
(1)
Jens Hermans
(1)
Jeroen van de Graaf
(1)
Jintai Ding
(4)
Johannes Braun
(4)
Johannes Buchmann
(54)
Juliane Krämer
(3)
Katsuyuki Okeya
(2)
Kouichi Sakurai
(1)
Lucas Schabhüser
(3)
Mario Schlipf
(1)
Markus Rückert
(1)
Martín A. Gagliotti Vigil
(2)
Masahide Sasaki
(1)
Matthias Geihs
(6)
Max Mühlhäuser
(1)
Michael Schneider
(3)
Michael Walter
(3)
Michael Zohner
(1)
Mikio Fujiwara
(1)
Mohamed Saied Emam Mohamed
(5)
Moritz Horsch
(3)
Nabil Alkeilani Alkadri
(2)
Niklas Büscher
(1)
Nikolaos P. Karvelas
(1)
Nina Bindel
(2)
Norman Göttert
(1)
Özgür Dagdelen
(3)
Patrick Weiden
(1)
Po-Chun Kuo
(1)
Rachel Player
(1)
Rachid El Bansarkhani
(5)
Ralf-Philipp Weinmann
(2)
Renate Scheidler
(2)
Robert Fitzpatrick
(1)
Sachar Paulus
(1)
Sander Siim
(1)
Sarah Ereth
(1)
Sedat Akleylek
(1)
Shiho Moriai
(1)
Sorin A. Huss
(1)
Stanislav Bulygin
(6)
Stefan Katzenbeisser
(2)
Stephan Düllmann
(1)
Thomas Feller
(1)
Thomas Pöppelmann
(1)
Thomas Wunderer
(1)
Tim Güneysu
(1)
Tobias Oder
(1)
Tsuyoshi Takagi
(1)
Wael Said Abd Elmageed Mohamed
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to