BibTeX records: Andy Rupp

download as .bib file

@article{DBLP:journals/popets/JolfaeiRSE24,
  author       = {Amirhossein Adavoudi Jolfaei and
                  Andy Rupp and
                  Stefan Schiffner and
                  Thomas Engel},
  title        = {Why Privacy-Preserving Protocols Are Sometimes Not Enough: {A} Case
                  Study of the Brisbane Toll Collection Infrastructure},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2024},
  number       = {1},
  pages        = {232--257},
  year         = {2024},
  url          = {https://doi.org/10.56553/popets-2024-0014},
  doi          = {10.56553/POPETS-2024-0014},
  timestamp    = {Wed, 29 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/popets/JolfaeiRSE24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KloossRSSW24,
  author       = {Michael Kloo{\ss} and
                  Andy Rupp and
                  Daniel Schadt and
                  Thorsten Strufe and
                  Christiane Weis},
  title        = {{EROR:} Efficient Repliable Onion Routing with Strong Provable Privacy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {20},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/020},
  timestamp    = {Tue, 16 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/KloossRSSW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/JolfaeiBRSE23,
  author       = {Amirhossein Adavoudi Jolfaei and
                  Abdelwahab Boualouache and
                  Andy Rupp and
                  Stefan Schiffner and
                  Thomas Engel},
  title        = {A Survey on Privacy-Preserving Electronic Toll Collection Schemes
                  for Intelligent Transportation Systems},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {24},
  number       = {9},
  pages        = {8945--8962},
  year         = {2023},
  url          = {https://doi.org/10.1109/TITS.2023.3266828},
  doi          = {10.1109/TITS.2023.3266828},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tits/JolfaeiBRSE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/FetzerKMRR23,
  author       = {Valerie Fetzer and
                  Michael Kloo{\ss} and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Markus Raiber and
                  Andy Rupp},
  editor       = {Jian Guo and
                  Ron Steinfeld},
  title        = {Universally Composable Auditable Surveillance},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Guangzhou, China, December 4-8, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14439},
  pages        = {453--487},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8724-5\_14},
  doi          = {10.1007/978-981-99-8724-5\_14},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/FetzerKMRR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FetzerKMRR23,
  author       = {Valerie Fetzer and
                  Michael Kloo{\ss} and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Markus Raiber and
                  Andy Rupp},
  title        = {Universally Composable Auditable Surveillance},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1343},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1343},
  timestamp    = {Sat, 07 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FetzerKMRR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/FetzerKMRRS22,
  author       = {Valerie Fetzer and
                  Marcel Keller and
                  Sven Maier and
                  Markus Raiber and
                  Andy Rupp and
                  Rebecca Schwerdt},
  title        = {{PUBA:} Privacy-Preserving User-Data Bookkeeping and Analytics},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2022},
  number       = {2},
  pages        = {447--516},
  year         = {2022},
  url          = {https://doi.org/10.2478/popets-2022-0054},
  doi          = {10.2478/POPETS-2022-0054},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/FetzerKMRRS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DuanJLMR22,
  author       = {Li Duan and
                  Yufan Jiang and
                  Yong Li and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Andy Rupp},
  title        = {Security Against Honorific Adversaries: Efficient {MPC} with Server-aided
                  Public Verifiability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {606},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/606},
  timestamp    = {Mon, 20 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DuanJLMR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KuhnHRS21,
  author       = {Christiane Kuhn and
                  Dennis Hofheinz and
                  Andy Rupp and
                  Thorsten Strufe},
  editor       = {Mehdi Tibouchi and
                  Huaxiong Wang},
  title        = {Onion Routing with Replies},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 6-10, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13091},
  pages        = {573--604},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92075-3\_20},
  doi          = {10.1007/978-3-030-92075-3\_20},
  timestamp    = {Fri, 03 Dec 2021 17:36:49 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/KuhnHRS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KuhnHRS21,
  author       = {Christiane Kuhn and
                  Dennis Hofheinz and
                  Andy Rupp and
                  Thorsten Strufe},
  title        = {Onion Routing with Replies},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1178},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1178},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KuhnHRS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FetzerKMRRS21,
  author       = {Valerie Fetzer and
                  Marcel Keller and
                  Sven Maier and
                  Markus Raiber and
                  Andy Rupp and
                  Rebecca Schwerdt},
  title        = {{PUBA:} Privacy-Preserving User-Data Bookkeeping and Analytics},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1683},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1683},
  timestamp    = {Thu, 13 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FetzerKMRRS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/0001KRR20,
  author       = {Max Hoffmann and
                  Michael Kloo{\ss} and
                  Markus Raiber and
                  Andy Rupp},
  title        = {Black-Box Wallets: Fast Anonymous Two-Way Payments for Constrained
                  Devices},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2020},
  number       = {1},
  pages        = {165--194},
  year         = {2020},
  url          = {https://doi.org/10.2478/popets-2020-0010},
  doi          = {10.2478/POPETS-2020-0010},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/popets/0001KRR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/Fetzer00RS20,
  author       = {Valerie Fetzer and
                  Max Hoffmann and
                  Matthias Nagel and
                  Andy Rupp and
                  Rebecca Schwerdt},
  title        = {{P4TC} - Provably-Secure yet Practical Privacy-Preserving Toll Collection},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2020},
  number       = {3},
  pages        = {62--152},
  year         = {2020},
  url          = {https://doi.org/10.2478/popets-2020-0046},
  doi          = {10.2478/POPETS-2020-0046},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/Fetzer00RS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eninf/SchwerdtNFGR19,
  author       = {Rebecca Schwerdt and
                  Matthias Nagel and
                  Valerie Fetzer and
                  Tobias Gr{\"{a}}f and
                  Andy Rupp},
  title        = {{P6V2G:} a privacy-preserving {V2G} scheme for two-way payments and
                  reputation},
  journal      = {Energy Inform.},
  volume       = {2},
  number       = {{S1}},
  year         = {2019},
  url          = {https://doi.org/10.1186/s42162-019-0075-1},
  doi          = {10.1186/S42162-019-0075-1},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eninf/SchwerdtNFGR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/0001KR19,
  author       = {Max Hoffmann and
                  Michael Kloo{\ss} and
                  Andy Rupp},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {Efficient Zero-Knowledge Arguments in the Discrete Log Setting, Revisited},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {2093--2110},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3354251},
  doi          = {10.1145/3319535.3354251},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/0001KR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KloossLR19,
  author       = {Michael Kloo{\ss} and
                  Anja Lehmann and
                  Andy Rupp},
  editor       = {Yuval Ishai and
                  Vincent Rijmen},
  title        = {{(R)CCA} Secure Updatable Encryption with Integrity Protection},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11476},
  pages        = {68--99},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17653-2\_3},
  doi          = {10.1007/978-3-030-17653-2\_3},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KloossLR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KloossLR19,
  author       = {Michael Kloo{\ss} and
                  Anja Lehmann and
                  Andy Rupp},
  title        = {{(R)CCA} Secure Updatable Encryption with Integrity Protection},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {222},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/222},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KloossLR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SchwerdtNFGR19,
  author       = {Rebecca Schwerdt and
                  Matthias Nagel and
                  Valerie Fetzer and
                  Tobias Gr{\"{a}}f and
                  Andy Rupp},
  title        = {{P6V2G:} {A} Privacy-Preserving {V2G} Scheme for Two-Way Payments
                  and Reputation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {786},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/786},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SchwerdtNFGR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HoffmannKR19,
  author       = {Max Hoffmann and
                  Michael Kloo{\ss} and
                  Andy Rupp},
  title        = {Efficient zero-knowledge arguments in the discrete log setting, revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {944},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/944},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HoffmannKR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HoffmannKRR19,
  author       = {Max Hoffmann and
                  Michael Kloo{\ss} and
                  Markus Raiber and
                  Andy Rupp},
  title        = {Black-Box Wallets: Fast Anonymous Two-Way Payments for Constrained
                  Devices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1199},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1199},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HoffmannKRR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BroadnaxFMR18,
  author       = {Brandon Broadnax and
                  Valerie Fetzer and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Andy Rupp},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {Non-malleability vs. CCA-Security: The Case of Commitments},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10770},
  pages        = {312--337},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76581-5\_11},
  doi          = {10.1007/978-3-319-76581-5\_11},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BroadnaxFMR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HoffmannFNRS18,
  author       = {Max Hoffmann and
                  Valerie Fetzer and
                  Matthias Nagel and
                  Andy Rupp and
                  Rebecca Schwerdt},
  title        = {{P4TC} - Provably-Secure yet Practical Privacy-Preserving Toll Collection},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1106},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1106},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HoffmannFNRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HeroldHKRR17,
  author       = {Gottfried Herold and
                  Max Hoffmann and
                  Michael Kloo{\ss} and
                  Carla R{\`{a}}fols and
                  Andy Rupp},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {New Techniques for Structural Batch Verification in Bilinear Groups
                  with Applications to Groth-Sahai Proofs},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {1547--1564},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3134068},
  doi          = {10.1145/3133956.3134068},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HeroldHKRR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HartungH0R17,
  author       = {Gunnar Hartung and
                  Max Hoffmann and
                  Matthias Nagel and
                  Andy Rupp},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {{BBA+:} Improving the Security and Applicability of Privacy-Preserving
                  Point Collection},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {1925--1942},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3134071},
  doi          = {10.1145/3133956.3134071},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/HartungH0R17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Herold0KRR17,
  author       = {Gottfried Herold and
                  Max Hoffmann and
                  Michael Kloo{\ss} and
                  Carla R{\`{a}}fols and
                  Andy Rupp},
  title        = {New Techniques for Structural Batch Verification in Bilinear Groups
                  with Applications to Groth-Sahai Proofs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {802},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/802},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Herold0KRR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BroadnaxFMR17,
  author       = {Brandon Broadnax and
                  Valerie Fetzer and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Andy Rupp},
  title        = {Non-Malleability vs. CCA-Security: The Case of Commitments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1069},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1069},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BroadnaxFMR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/JagerR16,
  author       = {Tibor Jager and
                  Andy Rupp},
  title        = {Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving
                  Way},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2016},
  number       = {3},
  pages        = {62--82},
  year         = {2016},
  url          = {https://doi.org/10.1515/popets-2016-0016},
  doi          = {10.1515/POPETS-2016-0016},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/JagerR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HartungKKKR16,
  author       = {Gunnar Hartung and
                  Bj{\"{o}}rn Kaidel and
                  Alexander Koch and
                  Jessica Koch and
                  Andy Rupp},
  editor       = {Chen{-}Mou Cheng and
                  Kai{-}Min Chung and
                  Giuseppe Persiano and
                  Bo{-}Yin Yang},
  title        = {Fault-Tolerant Aggregate Signatures},
  booktitle    = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
                  March 6-9, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9614},
  pages        = {331--356},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49384-7\_13},
  doi          = {10.1007/978-3-662-49384-7\_13},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HartungKKKR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/HofheinzJR16,
  author       = {Dennis Hofheinz and
                  Tibor Jager and
                  Andy Rupp},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {Public-Key Encryption with Simulation-Based Selective-Opening Security
                  and Compact Ciphertexts},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9986},
  pages        = {146--168},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53644-5\_6},
  doi          = {10.1007/978-3-662-53644-5\_6},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/HofheinzJR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/HesseHR16,
  author       = {Julia Hesse and
                  Dennis Hofheinz and
                  Andy Rupp},
  editor       = {Eyal Kushilevitz and
                  Tal Malkin},
  title        = {Reconfigurable Cryptography: {A} Flexible Approach to Long-Term Security},
  booktitle    = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A,
                  Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9562},
  pages        = {416--445},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49096-9\_18},
  doi          = {10.1007/978-3-662-49096-9\_18},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/HesseHR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HartungKKKR16,
  author       = {Gunnar Hartung and
                  Bj{\"{o}}rn Kaidel and
                  Alexander Koch and
                  Jessica Koch and
                  Andy Rupp},
  title        = {Fault-Tolerant Aggregate Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {52},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/052},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HartungKKKR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HofheinzJR16,
  author       = {Dennis Hofheinz and
                  Tibor Jager and
                  Andy Rupp},
  title        = {Public-Key Encryption with Simulation-Based Selective-Opening Security
                  and Compact Ciphertexts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {180},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/180},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HofheinzJR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/RuppBHP15,
  author       = {Andy Rupp and
                  Foteini Baldimtsi and
                  Gesine Hinterw{\"{a}}lder and
                  Christof Paar},
  title        = {Cryptographic Theory Meets Practice: Efficient and Privacy-Preserving
                  Payments for Public Transport},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {17},
  number       = {3},
  pages        = {10:1--10:31},
  year         = {2015},
  url          = {https://doi.org/10.1145/2699904},
  doi          = {10.1145/2699904},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/RuppBHP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HesseHR15,
  author       = {Julia Hesse and
                  Dennis Hofheinz and
                  Andy Rupp},
  title        = {Reconfigurable Cryptography: {A} flexible approach to long-term security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1047},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1047},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HesseHR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HeroldHHRR14,
  author       = {Gottfried Herold and
                  Julia Hesse and
                  Dennis Hofheinz and
                  Carla R{\`{a}}fols and
                  Andy Rupp},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Polynomial Spaces: {A} New Framework for Composite-to-Prime-Order
                  Transformations},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8616},
  pages        = {261--279},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44371-2\_15},
  doi          = {10.1007/978-3-662-44371-2\_15},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HeroldHHRR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/HofheinzR14,
  author       = {Dennis Hofheinz and
                  Andy Rupp},
  editor       = {Yehuda Lindell},
  title        = {Standard versus Selective Opening Security: Separation and Equivalence
                  Results},
  booktitle    = {Theory of Cryptography - 11th Theory of Cryptography Conference, {TCC}
                  2014, San Diego, CA, USA, February 24-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8349},
  pages        = {591--615},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54242-8\_25},
  doi          = {10.1007/978-3-642-54242-8\_25},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/HofheinzR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HeroldHHRR14,
  author       = {Gottfried Herold and
                  Julia Hesse and
                  Dennis Hofheinz and
                  Carla R{\`{a}}fols and
                  Andy Rupp},
  title        = {Polynomial Spaces: {A} New Framework for Composite-to-Prime-Order
                  Transformations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {445},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/445},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HeroldHHRR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/RuppHBP13,
  author       = {Andy Rupp and
                  Gesine Hinterw{\"{a}}lder and
                  Foteini Baldimtsi and
                  Christof Paar},
  editor       = {Ahmad{-}Reza Sadeghi},
  title        = {{P4R:} Privacy-Preserving Pre-Payments with Refunds for Transportation
                  Systems},
  booktitle    = {Financial Cryptography and Data Security - 17th International Conference,
                  {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7859},
  pages        = {205--212},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39884-1\_17},
  doi          = {10.1007/978-3-642-39884-1\_17},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/RuppHBP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/KellerMR12,
  author       = {Marcel Keller and
                  Gert L{\ae}ss{\o}e Mikkelsen and
                  Andy Rupp},
  editor       = {Adam D. Smith},
  title        = {Efficient Threshold Zero-Knowledge with Applications to User-Centric
                  Protocols},
  booktitle    = {Information Theoretic Security - 6th International Conference, {ICITS}
                  2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7412},
  pages        = {147--166},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32284-6\_9},
  doi          = {10.1007/978-3-642-32284-6\_9},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/KellerMR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KellerMR12,
  author       = {Marcel Keller and
                  Gert L{\ae}ss{\o}e Mikkelsen and
                  Andy Rupp},
  title        = {Efficient Threshold Zero-Knowledge with Applications to User-Centric
                  Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {306},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/306},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KellerMR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/integration/RuppEBG11,
  author       = {Andy Rupp and
                  Thomas Eisenbarth and
                  Andrey Bogdanov and
                  Oliver Grieb},
  title        = {Hardware {SLE} solvers: Efficient building blocks for cryptographic
                  and cryptanalyticapplications},
  journal      = {Integr.},
  volume       = {44},
  number       = {4},
  pages        = {290--304},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.vlsi.2010.09.001},
  doi          = {10.1016/J.VLSI.2010.09.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/integration/RuppEBG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/JagerR10,
  author       = {Tibor Jager and
                  Andy Rupp},
  editor       = {Masayuki Abe},
  title        = {The Semi-Generic Group Model and Applications to Pairing-Based Cryptography},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2010 - 16th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 5-9, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6477},
  pages        = {539--556},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17373-8\_31},
  doi          = {10.1007/978-3-642-17373-8\_31},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/JagerR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/de/Rupp2009,
  author       = {Andy Rupp},
  title        = {Computational aspects of cryptography and cryptanalysis},
  school       = {Ruhr University Bochum},
  year         = {2009},
  url          = {https://d-nb.info/996840451},
  isbn         = {978-3-89966-337-2},
  timestamp    = {Sat, 17 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/de/Rupp2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/GuneysuKNPR08,
  author       = {Tim G{\"{u}}neysu and
                  Timo Kasper and
                  Martin Novotn{\'{y}} and
                  Christof Paar and
                  Andy Rupp},
  title        = {Cryptanalysis with {COPACOBANA}},
  journal      = {{IEEE} Trans. Computers},
  volume       = {57},
  number       = {11},
  pages        = {1498--1513},
  year         = {2008},
  url          = {https://doi.org/10.1109/TC.2008.80},
  doi          = {10.1109/TC.2008.80},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/GuneysuKNPR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asap/BalasubramanianCBRD08,
  author       = {Sundar Balasubramanian and
                  Harold W. Carter and
                  Andrey Bogdanov and
                  Andy Rupp and
                  Jintai Ding},
  title        = {Fast multivariate signature generation in hardware: The case of rainbow},
  booktitle    = {19th {IEEE} International Conference on Application-Specific Systems,
                  Architectures and Processors, {ASAP} 2008, July 2-4, 2008, Leuven,
                  Belgium},
  pages        = {25--30},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ASAP.2008.4580149},
  doi          = {10.1109/ASAP.2008.4580149},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asap/BalasubramanianCBRD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/RuppLBDS08,
  author       = {Andy Rupp and
                  Gregor Leander and
                  Endre Bangerter and
                  Alexander W. Dent and
                  Ahmad{-}Reza Sadeghi},
  editor       = {Josef Pieprzyk},
  title        = {Sufficient Conditions for Intractability over Black-Box Groups: Generic
                  Lower Bounds for Generalized {DL} and {DH} Problems},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2008, 14th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Melbourne, Australia, December 7-11, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5350},
  pages        = {489--505},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89255-7\_30},
  doi          = {10.1007/978-3-540-89255-7\_30},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/RuppLBDS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BogdanovERW08,
  author       = {Andrey Bogdanov and
                  Thomas Eisenbarth and
                  Andy Rupp and
                  Christopher Wolf},
  editor       = {Elisabeth Oswald and
                  Pankaj Rohatgi},
  title        = {Time-Area Optimized Public-Key Engines: -Cryptosystems as Replacement
                  for Elliptic Curves?},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International
                  Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5154},
  pages        = {45--61},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85053-3\_4},
  doi          = {10.1007/978-3-540-85053-3\_4},
  timestamp    = {Thu, 14 Oct 2021 10:28:51 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BogdanovERW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GendrullisNR08,
  author       = {Timo Gendrullis and
                  Martin Novotn{\'{y}} and
                  Andy Rupp},
  editor       = {Elisabeth Oswald and
                  Pankaj Rohatgi},
  title        = {A Real-World Attack Breaking {A5/1} within Hours},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International
                  Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5154},
  pages        = {266--282},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85053-3\_17},
  doi          = {10.1007/978-3-540-85053-3\_17},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GendrullisNR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fccm/BalasubramanianBRDC08,
  author       = {Sundar Balasubramanian and
                  Andrey Bogdanov and
                  Andy Rupp and
                  Jintai Ding and
                  Harold W. Carter},
  editor       = {Kenneth L. Pocek and
                  Duncan A. Buell},
  title        = {Fast Multivariate Signature Generation in Hardware: The Case of Rainbow},
  booktitle    = {16th {IEEE} International Symposium on Field-Programmable Custom Computing
                  Machines, {FCCM} 2008, 14-15 April 2008, Stanford, Palo Alto, California,
                  {USA}},
  pages        = {281--282},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/FCCM.2008.52},
  doi          = {10.1109/FCCM.2008.52},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fccm/BalasubramanianBRDC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/AltmannJR08,
  author       = {Kristina Altmann and
                  Tibor Jager and
                  Andy Rupp},
  editor       = {Luca Aceto and
                  Ivan Damg{\aa}rd and
                  Leslie Ann Goldberg and
                  Magn{\'{u}}s M. Halld{\'{o}}rsson and
                  Anna Ing{\'{o}}lfsd{\'{o}}ttir and
                  Igor Walukiewicz},
  title        = {On Black-Box Ring Extraction and Integer Factorization},
  booktitle    = {Automata, Languages and Programming, 35th International Colloquium,
                  {ICALP} 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part
                  {II} - Track {B:} Logic, Semantics, and Theory of Programming {\&}
                  Track {C:} Security and Cryptography Foundations},
  series       = {Lecture Notes in Computer Science},
  volume       = {5126},
  pages        = {437--448},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70583-3\_36},
  doi          = {10.1007/978-3-540-70583-3\_36},
  timestamp    = {Fri, 27 Mar 2020 09:02:59 +0100},
  biburl       = {https://dblp.org/rec/conf/icalp/AltmannJR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/MollerR08,
  author       = {Bodo M{\"{o}}ller and
                  Andy Rupp},
  editor       = {Rafail Ostrovsky and
                  Roberto De Prisco and
                  Ivan Visconti},
  title        = {Faster Multi-exponentiation through Caching: Accelerating {(EC)DSA}
                  Signature Verification},
  booktitle    = {Security and Cryptography for Networks, 6th International Conference,
                  {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5229},
  pages        = {39--56},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85855-3\_4},
  doi          = {10.1007/978-3-540-85855-3\_4},
  timestamp    = {Tue, 25 Feb 2020 11:33:46 +0100},
  biburl       = {https://dblp.org/rec/conf/scn/MollerR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GendrullisNR08,
  author       = {Timo Gendrullis and
                  Martin Novotn{\'{y}} and
                  Andy Rupp},
  title        = {A Real-World Attack Breaking {A5/1} within Hours},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {147},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/147},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GendrullisNR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AltmannJR08,
  author       = {Kristina Altmann and
                  Tibor Jager and
                  Andy Rupp},
  title        = {On Black-Box Ring Extraction and Integer Factorization},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {156},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/156},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AltmannJR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BogdanovERW08,
  author       = {Andrey Bogdanov and
                  Thomas Eisenbarth and
                  Andy Rupp and
                  Christopher Wolf},
  title        = {Time-Area Optimized Public-Key Engines: MQ-Cryptosystems as Replacement
                  for Elliptic Curves?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {349},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/349},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BogdanovERW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BogdanovER07,
  author       = {Andrey Bogdanov and
                  Thomas Eisenbarth and
                  Andy Rupp},
  editor       = {Pascal Paillier and
                  Ingrid Verbauwhede},
  title        = {A Hardware-Assisted Realtime Attack on {A5/2} Without Precomputations},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International
                  Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4727},
  pages        = {394--412},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74735-2\_27},
  doi          = {10.1007/978-3-540-74735-2\_27},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BogdanovER07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gi/GuneysuRS07,
  author       = {Tim G{\"{u}}neysu and
                  Andy Rupp and
                  Stefan Spitz},
  editor       = {Rainer Koschke and
                  Otthein Herzog and
                  Karl{-}Heinz R{\"{o}}diger and
                  Marc Ronthaler},
  title        = {Cryptanalytic Time-Memory Tradeoffs on {COPACOBANA}},
  booktitle    = {37. Jahrestagung der Gesellschaft f{\"{u}}r Informatik, Informatik
                  trifft Logistik, {INFORMATIK} 2007, Bremen, Germany, September 24-27,
                  2007, Band 2},
  series       = {{LNI}},
  volume       = {{P-110}},
  pages        = {205--209},
  publisher    = {{GI}},
  year         = {2007},
  url          = {https://dl.gi.de/handle/20.500.12116/22481},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gi/GuneysuRS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RuppLBSD07,
  author       = {Andy Rupp and
                  Gregor Leander and
                  Endre Bangerter and
                  Ahmad{-}Reza Sadeghi and
                  Alexander W. Dent},
  title        = {Sufficient Conditions for Intractability over Black-Box Groups: Generic
                  Lower Bounds for Generalized {DL} and {DH} Problems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {360},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/360},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RuppLBSD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MollerR07,
  author       = {Bodo M{\"{o}}ller and
                  Andy Rupp},
  title        = {Faster Multi-Exponentiation through Caching: Accelerating {(EC)DSA}
                  Signature Verification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {470},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/470},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MollerR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/LeanderR06,
  author       = {Gregor Leander and
                  Andy Rupp},
  editor       = {Xuejia Lai and
                  Kefei Chen},
  title        = {On the Equivalence of {RSA} and Factoring Regarding Generic Ring Algorithms},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2006, 12th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Shanghai, China, December 3-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4284},
  pages        = {241--251},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935230\_16},
  doi          = {10.1007/11935230\_16},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/LeanderR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fccm/BogdanovM06,
  author       = {Andrey Bogdanov and
                  M. C. Mertens and
                  Christof Paar and
                  Jan Pelzl and
                  Andy Rupp},
  title        = {A Parallel Hardware Architecture for fast Gaussian Elimination over
                  {GF(2)}},
  booktitle    = {14th {IEEE} Symposium on Field-Programmable Custom Computing Machines
                  {(FCCM} 2006), 24-26 April 2006, Napa, CA, USA, Proceedings},
  pages        = {237--248},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/FCCM.2006.12},
  doi          = {10.1109/FCCM.2006.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fccm/BogdanovM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/RuppDFS04,
  author       = {Andy Rupp and
                  Holger Dreger and
                  Anja Feldmann and
                  Robin Sommer},
  editor       = {Alfio Lombardo and
                  James F. Kurose},
  title        = {Packet trace manipulation rramework for test labs},
  booktitle    = {Proceedings of the 4th {ACM} {SIGCOMM} Internet Measurement Conference,
                  {IMC} 2004, Taormina, Sicily, Italy, October 25-27, 2004},
  pages        = {251--256},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1028788.1028821},
  doi          = {10.1145/1028788.1028821},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/imc/RuppDFS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics