Rainer Steinwandt

From MaRDI portal
Person:189267

Available identifiers

zbMath Open steinwandt.rainerMaRDI QIDQ189267

List of research outcomes

PublicationDate of PublicationType
An Algebra for Composing Enterprise Privacy Policies2022-03-07Paper
Initiator-Resilient Universally Composable Key Exchange2022-02-16Paper
Group Key Establishment in a Quantum-Future Scenario2021-10-06Paper
Password-authenticated group key establishment from smooth projective hash functions2020-02-20Paper
On "A new representation of elements of finite fields GF(2/sup m/) yielding small complexity arithmetic circuits"2018-07-09Paper
On the security of the Courtois-Finiasz-Sendrier signature2018-06-19Paper
Private set intersection: new generic constructions and feasibility results2017-10-12Paper
Masking Large Keys in Hardware: A Masked Implementation of McEliece2016-05-19Paper
Applying Grover’s Algorithm to AES: Quantum Resource Estimates2016-04-26Paper
Combined schemes for signature and encryption: the public-key and the identity-based setting2016-03-10Paper
Differential Power Analysis of a McEliece Cryptosystem2016-03-10Paper
Quantum circuits for \(\mathbb F_{2^n}\)-multiplication with subquadratic gate count2015-08-11Paper
On the security margin of MAC striping2015-07-15Paper
Automatic synthesis of quantum circuits for point addition on ordinary binary elliptic curves2015-04-13Paper
Narrow Bandwidth Is Not Inherent in Reverse Public-Key Encryption2014-10-14Paper
A note on quantum related-key attacks2014-10-07Paper
Scalable attribute-based group key establishment: from~passive to active and deniable2014-10-02Paper
Deniable Group Key Agreement2014-08-21Paper
Towards Provably Secure Group Key Agreement Building on Group Theory2014-08-21Paper
On using probabilistic Turing machines to model participants in cryptographic protocols2014-01-10Paper
Scalable Deniable Group Key Establishment2013-08-07Paper
Security of message authentication codes in the presence of key-dependent messages2012-05-22Paper
Identity-based non-interactive key distribution with forward security2012-05-22Paper
Multi-authority attribute-based encryption with honest-but-curious central authority2012-05-15Paper
https://portal.mardi4nfdi.de/entity/Q31016662011-11-30Paper
Attribute-based group key establishment2011-06-03Paper
Cryptanalysis of a 2-party key establishment based on a semigroup action problem2011-05-17Paper
Cryptanalysis of the Tillich-Zémor hash function2011-04-01Paper
Security of signature schemes in the presence of key-dependent messages2011-02-17Paper
Communication-Efficient 2-Round Group Key Establishment from Pairings2011-02-11Paper
PET SNAKE: A Special Purpose Architecture to Implement an Algebraic Attack in Hardware2011-01-10Paper
Cryptanalysis of an authentication scheme using truncated polynomials2010-08-20Paper
A one-time signature using run-length encoding2010-06-09Paper
Special issue dedicated to Spyros Magliveras on the occasion of his 70th birthday2010-05-19Paper
A ciphertext-only attack on Polly Two2010-04-20Paper
Hardware to Solve Sparse Systems of Linear Equations over GF(2)2010-03-09Paper
Power attacks on a side-channel resistant elliptic curve implementation2009-07-21Paper
Topics in Cryptology – CT-RSA 20042009-05-07Paper
https://portal.mardi4nfdi.de/entity/Q35453212008-12-10Paper
https://portal.mardi4nfdi.de/entity/Q35453242008-12-10Paper
https://portal.mardi4nfdi.de/entity/Q35224162008-09-03Paper
https://portal.mardi4nfdi.de/entity/Q35225212008-09-03Paper
https://portal.mardi4nfdi.de/entity/Q35236212008-09-03Paper
Cryptanalysis of a Hash Function Proposed at ICISC 20062008-05-06Paper
A Simpler Sieving Device: Combining ECM and TWIRL2008-05-06Paper
On Subliminal Channels in Deterministic Signature Schemes2008-03-17Paper
Non-wafer-Scale Sieving Hardware for the NFS: Another Attempt to Cope with 1024-Bit2007-11-29Paper
Computing restrictions of ideals in finitely generated \(k\)-algebras by means of Buchberger's algorithm2007-10-23Paper
(Password) Authenticated Key Establishment: From 2-Party to Group2007-08-30Paper
On ideal and subalgebra coefficients in a class k -algebras2007-08-07Paper
Pitfalls in public key cryptosystems based on free partially commutative monoids and groups2007-06-29Paper
https://portal.mardi4nfdi.de/entity/Q34295042007-04-02Paper
https://portal.mardi4nfdi.de/entity/Q34214662007-02-13Paper
https://portal.mardi4nfdi.de/entity/Q34214722007-02-13Paper
A redundant representation of GF(q<sup>n</sup>) for designing arithmetic circuits2007-01-09Paper
https://portal.mardi4nfdi.de/entity/Q34102092006-11-23Paper
Weak keys in MST\(_{1}\)2006-05-29Paper
A key substitution attack on SFLASHv32006-01-13Paper
SOFSEM 2005: Theory and Practice of Computer Science2005-12-07Paper
Theory of Cryptography2005-12-07Paper
Cryptanalysis of Polly Cracker2005-05-11Paper
Towards a uniform description of several group based cryptographic primitives2005-01-17Paper
https://portal.mardi4nfdi.de/entity/Q31564282005-01-07Paper
https://portal.mardi4nfdi.de/entity/Q48174392004-09-23Paper
A reaction attack on a public key cryptosystem based on the word problem2004-09-22Paper
On Minimal Length Factorizations of Finite Groups2004-09-06Paper
On computing a separating transcendence basis2004-09-01Paper
On the security of two public key cryptosystems using non-abelian groups2004-08-16Paper
https://portal.mardi4nfdi.de/entity/Q44484072004-02-18Paper
Cryptanalysis of a knapsack-like cryptosystem2003-10-14Paper
A Practical Attack on Some Braid Group Based Cryptographic Primitives2003-07-27Paper
A Dedicated Sieving Hardware2003-07-27Paper
Involutive bases in the Weyl algebra.2003-03-23Paper
Attacking the Affine Parts of SFLASH2002-12-02Paper
Gröbner bases applied to finitely generated field extensions2002-11-11Paper
https://portal.mardi4nfdi.de/entity/Q45368082002-07-28Paper
Clouds over a public key cryptosystem based on Lyndon words2002-07-25Paper
https://portal.mardi4nfdi.de/entity/Q27245912002-07-16Paper
Recognizing simple subextensions of purely transcendental field extensions2002-06-18Paper
On ideal and subalgebra coefficients in semigroup algebras2002-02-19Paper
https://portal.mardi4nfdi.de/entity/Q47072312002-01-01Paper
https://portal.mardi4nfdi.de/entity/Q27245942001-07-12Paper
Basic algorithms for rational function fields2000-05-07Paper
Freeness, linear disjointness, and implicitization -- a classical approach.2000-05-02Paper
Decomposing a matrix into circulant and diagonal factors2000-03-22Paper
https://portal.mardi4nfdi.de/entity/Q43949741999-05-31Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Rainer Steinwandt