default search action
Rainer Steinwandt
Person information
- affiliation: University of Alabama in Huntsville, USA
- affiliation (former): Florida Atlantic University, Boca Raton, FL, USA
- affiliation (former, PhD 2000): Karlsruhe Institute of Technology, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i50]Christopher Battarbee, Giacomo Borin, Ryann Cartor, Nadia Heninger, David Jao, Laura Maddison, Edoardo Persichetti, Angela Robinson, Daniel Smith-Tone, Rainer Steinwandt:
On the Semidirect Discrete Logarithm Problem in Finite Groups. IACR Cryptol. ePrint Arch. 2024: 905 (2024) - 2023
- [i49]Gorjan Alagic, María Naya-Plasencia, Rainer Steinwandt, Manasi Shingane:
Quantum Cryptanalysis (Dagstuhl Seminar 23421). Dagstuhl Reports 13(10): 65-75 (2023) - 2021
- [i48]Stacey Jeffery, Michele Mosca, María Naya-Plasencia, Rainer Steinwandt:
Quantum Cryptanalysis (Dagstuhl Seminar 21421). Dagstuhl Reports 11(9): 64-79 (2021) - 2020
- [j65]María Isabel González Vasco, Angel L. Pérez del Pozo, Rainer Steinwandt:
Group Key Establishment in a Quantum-Future Scenario. Informatica 31(4): 751-768 (2020) - [j64]Jens-Matthias Bohli, María Isabel González Vasco, Rainer Steinwandt:
Building Group Key Establishment on Group Theory: A Modular Approach. Symmetry 12(2): 197 (2020)
2010 – 2019
- 2019
- [j63]Jens-Matthias Bohli, María Isabel González Vasco, Rainer Steinwandt:
Password-Authenticated Group Key Establishment from Smooth Projective Hash Functions. Int. J. Appl. Math. Comput. Sci. 29(4): 797-815 (2019) - [j62]Hai Pham, Rainer Steinwandt, Adriana Suárez Corona:
Integrating Classical Preprocessing into an Optical Encryption Scheme. Entropy 21(9): 872 (2019) - [j61]Edoardo Persichetti, Rainer Steinwandt, Adriana Suárez Corona:
From Key Encapsulation to Authenticated Group Key Establishment - A Compiler for Post-Quantum Primitives †. Entropy 21(12): 1183 (2019) - [j60]Kenneth Matheis, Rainer Steinwandt, Adriana Suárez Corona:
Algebraic Properties of the Block Cipher DESL. Symmetry 11(11): 1411 (2019) - [e3]Jintai Ding, Rainer Steinwandt:
Post-Quantum Cryptography - 10th International Conference, PQCrypto 2019, Chongqing, China, May 8-10, 2019 Revised Selected Papers. Lecture Notes in Computer Science 11505, Springer 2019, ISBN 978-3-030-25509-1 [contents] - [i47]Michele Mosca, María Naya-Plasencia, Rainer Steinwandt:
Quantum Cryptanalysis (Dagstuhl Seminar 19421). Dagstuhl Reports 9(10): 47-60 (2019) - [i46]Brandon Langenberg, Hai Pham, Rainer Steinwandt:
Reducing the Cost of Implementing AES as a Quantum Circuit. IACR Cryptol. ePrint Arch. 2019: 854 (2019) - 2018
- [j59]María Isabel González Vasco, Angela Robinson, Rainer Steinwandt:
Cryptanalysis of a Proposal Based on the Discrete Logarithm Problem Inside Sn. Cryptogr. 2(3): 16 (2018) - [j58]Okan Seker, Abraham Fernandez-Rubio, Thomas Eisenbarth, Rainer Steinwandt:
Extending Glitch-Free Multiparty Protocols to Resist Fault Injection Attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(3): 394-430 (2018) - [e2]Tanja Lange, Rainer Steinwandt:
Post-Quantum Cryptography - 9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings. Lecture Notes in Computer Science 10786, Springer 2018, ISBN 978-3-319-79062-6 [contents] - 2017
- [j57]Paolo D'Arco, María Isabel González Vasco, Angel L. Pérez del Pozo, Claudio Soriente, Rainer Steinwandt:
Private set intersection: New generic constructions and feasibility results. Adv. Math. Commun. 11(3): 481-502 (2017) - [i45]Michele Mosca, Nicolas Sendrier, Rainer Steinwandt, Krysta M. Svore:
Quantum Cryptanalysis (Dagstuhl Seminar 17401). Dagstuhl Reports 7(10): 1-13 (2017) - [i44]Okan Seker, Thomas Eisenbarth, Rainer Steinwandt:
Extending Glitch-Free Multiparty Protocols to Resist Fault Injection Attacks. IACR Cryptol. ePrint Arch. 2017: 269 (2017) - 2016
- [j56]Shane Kepley, David Russo, Rainer Steinwandt:
Cryptanalysis of a modern rotor machine in a multicast setting. Cryptologia 40(6): 515-521 (2016) - [j55]María Isabel González Vasco, Florian Hess, Rainer Steinwandt:
Combined schemes for signature and encryption: The public-key and the identity-based setting. Inf. Comput. 247: 1-10 (2016) - [j54]Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt:
Horizontal and Vertical Side Channel Analysis of a McEliece Cryptosystem. IEEE Trans. Inf. Forensics Secur. 11(6): 1093-1105 (2016) - [c37]Markus Grassl, Brandon Langenberg, Martin Roetteler, Rainer Steinwandt:
Applying Grover's Algorithm to AES: Quantum Resource Estimates. PQCrypto 2016: 29-43 - 2015
- [b2]María Isabel González Vasco, Rainer Steinwandt:
Group Theoretic Cryptography. Chapman and Hall / CRC cryptography and network security series, CRC Press 2015, ISBN 978-1-584-88836-9, pp. I-XVII, 1-230 - [j53]Martin Rötteler, Rainer Steinwandt:
A note on quantum related-key attacks. Inf. Process. Lett. 115(1): 40-44 (2015) - [j52]Thomas Eisenbarth, Aaron Meyerowitz, Rainer Steinwandt:
On the security margin of MAC striping. Inf. Process. Lett. 115(11): 899-902 (2015) - [j51]Parshuram Budhathoki, Rainer Steinwandt:
Automatic synthesis of quantum circuits for point addition on ordinary binary elliptic curves. Quantum Inf. Process. 14(1): 201-216 (2015) - [j50]Shane Kepley, Rainer Steinwandt:
Quantum circuits for 𝔽2n-multiplication with subquadratic gate count. Quantum Inf. Process. 14(7): 2373-2386 (2015) - [c36]Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt:
Differential Power Analysis of a McEliece Cryptosystem. ACNS 2015: 538-556 - [c35]Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt:
Masking Large Keys in Hardware: A Masked Implementation of McEliece. SAC 2015: 293-309 - [i43]Markus Grassl, Brandon Langenberg, Martin Roetteler, Rainer Steinwandt:
Applying Grover's algorithm to AES: quantum resource estimates. CoRR abs/1512.04965 (2015) - [i42]Michele Mosca, Martin Roetteler, Nicolas Sendrier, Rainer Steinwandt:
Quantum Cryptanalysis (Dagstuhl Seminar 15371). Dagstuhl Reports 5(9): 1-17 (2015) - [i41]Thomas Eisenbarth, Aaron Meyerowitz, Rainer Steinwandt:
On the security margin of MAC striping. IACR Cryptol. ePrint Arch. 2015: 89 (2015) - [i40]Shane Kepley, David Russo, Rainer Steinwandt:
Cryptanalysis of a modern rotor machine in a multicast setting. IACR Cryptol. ePrint Arch. 2015: 661 (2015) - [i39]Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt:
Masking Large Keys in Hardware: A Masked Implementation of McEliece. IACR Cryptol. ePrint Arch. 2015: 924 (2015) - 2014
- [j49]Rainer Steinwandt, Adriana Suárez Corona:
Scalable attribute-based group key establishment: from passive to active and deniable. Appl. Algebra Eng. Commun. Comput. 25(1-2): 1-20 (2014) - [j48]Weizheng Gao, Kashi Neupane, Rainer Steinwandt:
Tuning a two-round group key agreement. Int. J. Inf. Sec. 13(5): 467-476 (2014) - [j47]Martin Rötteler, Rainer Steinwandt:
A quantum circuit to find discrete logarithms on ordinary binary elliptic curves in depth O(log^2n). Quantum Inf. Comput. 14(9-10): 888-900 (2014) - [c34]David Naccache, Rainer Steinwandt, Adriana Suárez Corona, Moti Yung:
Narrow Bandwidth Is Not Inherent in Reverse Public-Key Encryption. SCN 2014: 598-607 - [i38]Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt:
Differential Power Analysis of a McEliece Cryptosystem. IACR Cryptol. ePrint Arch. 2014: 534 (2014) - 2013
- [j46]Brittanney Amento, Martin Rötteler, Rainer Steinwandt:
Quantum binary field inversion: improved circuit depth via choice of basis representation. Quantum Inf. Comput. 13(1-2): 116-134 (2013) - [j45]Brittanney Amento, Martin Rötteler, Rainer Steinwandt:
Efficient quantum circuits for binary elliptic curve arithmetic: reducing T-gate complexity. Quantum Inf. Comput. 13(7-8): 631-644 (2013) - [j44]Lee Klingler, Rainer Steinwandt, Dominique Unruh:
On using probabilistic Turing machines to model participants in cryptographic protocols. Theor. Comput. Sci. 501: 49-51 (2013) - [i37]Martin Roetteler, Rainer Steinwandt:
A quantum circuit to find discrete logarithms on binary elliptic curves in depth O(log^2 n). CoRR abs/1306.1161 (2013) - [i36]Martin Roetteler, Rainer Steinwandt:
A note on quantum related-key attacks. CoRR abs/1306.2301 (2013) - [i35]Serge Fehr, Michele Mosca, Martin Rötteler, Rainer Steinwandt:
Quantum Cryptanalysis (Dagstuhl Seminar 13371). Dagstuhl Reports 3(9): 59-73 (2013) - [i34]Martin Roetteler, Rainer Steinwandt:
A note on quantum related-key attacks. IACR Cryptol. ePrint Arch. 2013: 378 (2013) - 2012
- [j43]Madeline González Muñiz, Rainer Steinwandt:
Security of message authentication codes in the presence of key-dependent messages. Des. Codes Cryptogr. 64(1-2): 161-169 (2012) - [j42]Rainer Steinwandt, Adriana Suárez Corona:
Identity-based non-interactive key distribution with forward security. Des. Codes Cryptogr. 64(1-2): 195-208 (2012) - [j41]Vladimir Bozovic, Daniel Socek, Rainer Steinwandt, Viktória I. Villányi:
Multi-authority attribute-based encryption with honest-but-curious central authority. Int. J. Comput. Math. 89(3): 268-283 (2012) - [c33]Kashi Neupane, Rainer Steinwandt, Adriana Suárez Corona:
Group Key Establishment: Adding Perfect Forward Secrecy at the Cost of One Round. CANS 2012: 158-168 - [c32]Kashi Neupane, Rainer Steinwandt, Adriana Suárez Corona:
Scalable Deniable Group Key Establishment. FPS 2012: 365-373 - [i33]Brittanney Amento, Martin Roetteler, Rainer Steinwandt:
Quantum binary field inversion: improved circuit depth via choice of basis representation. CoRR abs/1209.5491 (2012) - [i32]Brittanney Amento, Rainer Steinwandt, Martin Roetteler:
Efficient quantum circuits for binary elliptic curve arithmetic: reducing T-gate complexity. CoRR abs/1209.6348 (2012) - [i31]Kashi Neupane, Rainer Steinwandt, Adriana Suárez Corona:
Scalable Deniable Group Key Establishment. IACR Cryptol. ePrint Arch. 2012: 504 (2012) - 2011
- [j40]Rainer Steinwandt, Adriana Suárez Corona:
Cryptanalysis of a 2-party key establishment based on a semigroup action problem. Adv. Math. Commun. 5(1): 87-92 (2011) - [j39]Kris Gaj, Rainer Steinwandt:
Hardware architectures for algebra, cryptology, and number theory. Integr. 44(4): 257-258 (2011) - [j38]Markus Grassl, Ivana Ilic, Spyros S. Magliveras, Rainer Steinwandt:
Cryptanalysis of the Tillich-Zémor Hash Function. J. Cryptol. 24(1): 148-156 (2011) - [c31]Kashi Neupane, Rainer Steinwandt:
Communication-Efficient 2-Round Group Key Establishment from Pairings. CT-RSA 2011: 65-76 - [i30]Serge Fehr, Michele Mosca, Martin Rötteler, Rainer Steinwandt:
Quantum Cryptanalysis (Dagstuhl Seminar 11381). Dagstuhl Reports 1(9): 58-75 (2011) - 2010
- [j37]Rainer Steinwandt:
A ciphertext-only attack on Polly Two. Appl. Algebra Eng. Commun. Comput. 21(2): 85-92 (2010) - [j36]Rainer Steinwandt, Adriana Suárez Corona:
Attribute-based group key establishment. Adv. Math. Commun. 4(3): 381-398 (2010) - [j35]Ronald C. Mullin, Rainer Steinwandt:
Special issue dedicated to Spyros Magliveras on the occasion of his 70th birthday. Des. Codes Cryptogr. 55(2-3): 103-105 (2010) - [j34]Willi Geiselmann, Kenneth Matheis, Rainer Steinwandt:
PET SNAKE: A Special Purpose Architecture to Implement an Algebraic Attack in Hardware. Trans. Comput. Sci. 10: 298-328 (2010) - [c30]Kashi Neupane, Rainer Steinwandt:
Server-assisted Long-term Secure 3-party Key Establishment. SECRYPT 2010: 372-378 - [i29]Rainer Steinwandt, Adriana Suárez Corona:
Attribute-based group key establishment. IACR Cryptol. ePrint Arch. 2010: 235 (2010)
2000 – 2009
- 2009
- [j33]Markus Grassl, Rainer Steinwandt:
Cryptanalysis of an authentication scheme using truncated polynomials. Inf. Process. Lett. 109(15): 861-863 (2009) - [c29]David Naccache, Rainer Steinwandt, Moti Yung:
Reverse Public Key Encryption. BIOSIG 2009: 155-169 - [c28]Madeline González Muñiz, Rainer Steinwandt:
Cryptanalysis of a Message Recognition Protocol by Mashatan and Stinson. ICISC 2009: 362-373 - [i28]Vladimir Bozovic, Daniel Socek, Rainer Steinwandt, Viktória I. Villányi:
Multi-authority attribute based encryption with honest-but-curious central authority. IACR Cryptol. ePrint Arch. 2009: 83 (2009) - [i27]Willi Geiselmann, Kenneth Matheis, Rainer Steinwandt:
PET SNAKE: A Special Purpose Architecture to Implement an Algebraic Attack in Hardware. IACR Cryptol. ePrint Arch. 2009: 222 (2009) - [i26]Markus Grassl, Ivana Ilic, Spyros S. Magliveras, Rainer Steinwandt:
Cryptanalysis of the Tillich-Zémor hash function. IACR Cryptol. ePrint Arch. 2009: 376 (2009) - [i25]Madeline González Muñiz, Rainer Steinwandt:
Cryptanalysis of a Message Recognition Protocol by Mashatan and Stinson. IACR Cryptol. ePrint Arch. 2009: 472 (2009) - 2008
- [j32]María Isabel González Vasco, Rainer Steinwandt:
Applications of algebra to cryptography. Discret. Appl. Math. 156(16): 3071 (2008) - [j31]Rainer Steinwandt, Viktória I. Villányi:
A one-time signature using run-length encoding. Inf. Process. Lett. 108(4): 179-185 (2008) - [e1]Ran Canetti, Shafi Goldwasser, Günter Müller, Rainer Steinwandt:
Theoretical Foundations of Practical Information Security, 30.11. - 05.12.2008. Dagstuhl Seminar Proceedings 08491, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany 2008 [contents] - [i24]Ran Canetti, Shafi Goldwasser, Günter Müller, Rainer Steinwandt:
08491 Abstracts Collection - Theoretical Foundations of Practical Information Security. Theoretical Foundations of Practical Information Security 2008 - [i23]Ran Canetti, Shafi Goldwasser, Günter Müller, Rainer Steinwandt:
08491 Executive Summary - Theoretical Foundations of Practical Information Security. Theoretical Foundations of Practical Information Security 2008 - [i22]Markus Grassl, Rainer Steinwandt:
Cryptanalysis of an Authentication Scheme Using Truncated Polynomials. IACR Cryptol. ePrint Arch. 2008: 245 (2008) - [i21]María Isabel González Vasco, Florian Hess, Rainer Steinwandt:
Combined (identity-based) public key schemes. IACR Cryptol. ePrint Arch. 2008: 466 (2008) - 2007
- [j30]Willi Geiselmann, Rainer Steinwandt:
Special-Purpose Hardware in Cryptanalysis: The Case of 1, 024-Bit RSA. IEEE Secur. Priv. 5(1): 63-66 (2007) - [j29]Jens-Matthias Bohli, María Isabel González Vasco, Rainer Steinwandt:
Secure group key establishment revisited. Int. J. Inf. Sec. 6(4): 243-254 (2007) - [c27]Willi Geiselmann, Rainer Steinwandt:
Non-wafer-Scale Sieving Hardware for the NFS: Another Attempt to Cope with 1024-Bit. EUROCRYPT 2007: 466-481 - [c26]Willi Geiselmann, Rainer Steinwandt:
Cryptanalysis of a Hash Function Proposed at ICISC 2006. ICISC 2007: 1-10 - [c25]Michel Abdalla, Jens-Matthias Bohli, María Isabel González Vasco, Rainer Steinwandt:
(Password) Authenticated Key Establishment: From 2-Party to Group. TCC 2007: 499-514 - [i20]Willi Geiselmann, Rainer Steinwandt:
Cryptanalysis of a Hash Function Proposed at ICISC 2006. IACR Cryptol. ePrint Arch. 2007: 272 (2007) - 2006
- [j28]Thomas Beth, Willi Geiselmann, Rainer Steinwandt:
Mathematical Techniques in Cryptology-Editorial. Appl. Algebra Eng. Commun. Comput. 16(6): 377-378 (2006) - [j27]María Isabel González Vasco, Rainer Steinwandt:
Pitfalls in public key cryptosystems based on free partially commutative monoids and groups. Appl. Math. Lett. 19(10): 1037-1041 (2006) - [j26]Jens-Matthias Bohli, Stefan Röhrich, Rainer Steinwandt:
Key substitution attacks revisited: Taking into account malicious signers. Int. J. Inf. Sec. 5(1): 30-36 (2006) - [j25]Willi Geiselmann, María Isabel González Vasco, Rainer Steinwandt:
Entwurf asymmetrischer kryptographischer Verfahren unter Berücksichtigung von Quantenalgorithmen (Design of Asymmetric Cryptographic Schemes Taking Into Account Quantum Algorithms). it Inf. Technol. 48(6): 327- (2006) - [j24]Thomas Beth, Jörn Müller-Quade, Rainer Steinwandt:
Computing restrictions of ideals in finitely generated k-algebras by means of Buchberger's algorithm. J. Symb. Comput. 41(3-4): 372-380 (2006) - [c24]Dominik Raub, Rainer Steinwandt:
An Algebra for Enterprise Privacy Policies Closed Under Composition and Conjunction. ETRICS 2006: 130-144 - [c23]Willi Geiselmann, Fabian Januszewski, Hubert Köpfer, Jan Pelzl, Rainer Steinwandt:
A Simpler Sieving Device: Combining ECM and TWIRL. ICISC 2006: 118-135 - [c22]Jens-Matthias Bohli, María Isabel González Vasco, Rainer Steinwandt:
A Subliminal-Free Variant of ECDSA. Information Hiding 2006: 375-387 - [c21]Jens-Matthias Bohli, Rainer Steinwandt:
Deniable Group Key Agreement. VIETCRYPT 2006: 298-311 - [c20]Jens-Matthias Bohli, Benjamin Glas, Rainer Steinwandt:
Towards Provably Secure Group Key Agreement Building on Group Theory. VIETCRYPT 2006: 322-336 - [i19]Jens-Matthias Bohli, Benjamin Glas, Rainer Steinwandt:
Towards Provably Secure Group Key Agreement Building on Group Theory. IACR Cryptol. ePrint Arch. 2006: 79 (2006) - [i18]Willi Geiselmann, Fabian Januszewski, Hubert Köpfer, Jan Pelzl, Rainer Steinwandt:
A Simpler Sieving Device: Combining ECM and TWIRL. IACR Cryptol. ePrint Arch. 2006: 109 (2006) - [i17]Jens-Matthias Bohli, María Isabel González Vasco, Rainer Steinwandt:
Password-Authenticated Constant-Round Group Key Establishment with a Common Reference String. IACR Cryptol. ePrint Arch. 2006: 214 (2006) - [i16]Willi Geiselmann, Rainer Steinwandt:
Non-Wafer-Scale Sieving Hardware for the NFS: Another Attempt to Cope with 1024-bit. IACR Cryptol. ePrint Arch. 2006: 403 (2006) - 2005
- [j23]Jens-Matthias Bohli, Rainer Steinwandt, María Isabel González Vasco, Consuelo Martínez:
Weak Keys in MST1. Des. Codes Cryptogr. 37(3): 509-524 (2005) - [j22]Thomas Beth, Jörn Müller-Quade, Rainer Steinwandt:
Cryptanalysis of a practical quantum key distribution with polarization-entangled photons. Quantum Inf. Comput. 5(3): 181-186 (2005) - [c19]Willi Geiselmann, Adi Shamir, Rainer Steinwandt, Eran Tromer:
Scalable Hardware for Sparse Systems of Linear Equations, with Applications to Integer Factorization. CHES 2005: 131-146 - [c18]Willi Geiselmann, Hubert Köpfer, Rainer Steinwandt, Eran Tromer:
Improved Routing-Based Linear Algebra for the Number Field Sieve. ITCC (1) 2005: 636-641 - [c17]Dominik Raub, Rainer Steinwandt, Jörn Müller-Quade:
On the Security and Composability of the One Time Pad. SOFSEM 2005: 288-297 - [c16]María Isabel González Vasco, Consuelo Martínez, Rainer Steinwandt, Jorge Luis Villar:
A New Cramer-Shoup Like Methodology for Group Based Provably Secure Encryption Schemes. TCC 2005: 495-509 - [i15]Jens-Matthias Bohli, María Isabel González Vasco, Rainer Steinwandt:
Burmester-Desmedt Tree-Based Key Transport Revisited: Provable Security. IACR Cryptol. ePrint Arch. 2005: 360 (2005) - [i14]Jens-Matthias Bohli, María Isabel González Vasco, Rainer Steinwandt:
Secure Group Key Establishment Revisited. IACR Cryptol. ePrint Arch. 2005: 395 (2005) - [i13]Anja Groch, Dennis Hofheinz, Rainer Steinwandt:
A Practical Attack on the Root Problem in Braid Groups. IACR Cryptol. ePrint Arch. 2005: 459 (2005) - 2004
- [j21]María Isabel González Vasco, Rainer Steinwandt:
A Reaction Attack on a Public Key Cryptosystem Based on the Word Problem. Appl. Algebra Eng. Commun. Comput. 14(5): 335-340 (2004) - [j20]María Isabel González Vasco, Dennis Hofheinz, Consuelo Martínez, Rainer Steinwandt:
On the Security of Two Public Key Cryptosystems Using Non-Abelian Groups. Des. Codes Cryptogr. 32(1-3): 207-216 (2004) - [j19]María Isabel González Vasco, Consuelo Martínez, Rainer Steinwandt:
Towards a Uniform Description of Several Group Based Cryptographic Primitives. Des. Codes Cryptogr. 33(3): 215-226 (2004) - [j18]Willi Geiselmann, Rainer Steinwandt:
Power attacks on a side-channel resistant elliptic curve implementation. Inf. Process. Lett. 91(1): 29-32 (2004) - [c15]Willi Geiselmann, Rainer Steinwandt:
Yet Another Sieving Device. CT-RSA 2004: 278-291 - [c14]Michael Backes, Markus Dürmuth, Rainer Steinwandt:
An Algebra for Composing Enterprise Privacy Policies. ESORICS 2004: 33-52 - [c13]Jens-Matthias Bohli, Rainer Steinwandt:
On Subliminal Channels in Deterministic Signature Schemes. ICISC 2004: 182-194 - [c12]Willi Geiselmann, Rainer Steinwandt:
Attacks on a secure group communication scheme with hierarchical access control. ISIT 2004: 14 - [i12]María Isabel González Vasco, Rainer Steinwandt:
Pitfalls in public key cryptosystems based on free partially commutative monoids and groups. IACR Cryptol. ePrint Arch. 2004: 12 (2004) - [i11]Dominik Raub, Rainer Steinwandt, Jörn Müller-Quade:
On the Security and Composability of the One Time Pad. IACR Cryptol. ePrint Arch. 2004: 113 (2004) - 2003
- [j17]María Isabel González Vasco, Martin Rötteler, Rainer Steinwandt:
On Minimal Length Factorizations of Finite Groups. Exp. Math. 12(1): 1-12 (2003) - [j16]Willi Geiselmann, Willi Meier, Rainer Steinwandt:
An attack on the isomorphisms of polynomials problem with one secret. Int. J. Inf. Sec. 2(1): 59-64 (2003) - [j15]Jörn Müller-Quade, Rainer Steinwandt:
On the problem of authentication in a quantum protocol to detect traffic analysis. Quantum Inf. Comput. 3(1): 48-54 (2003) - [j14]Willi Geiselmann, Rainer Steinwandt:
A Redundant Representation of GF(q^n) for Designing Arithmetic Circuits. IEEE Trans. Computers 52(7): 848-853 (2003) - [c11]Willi Geiselmann, Rainer Steinwandt:
Hardware to Solve Sparse Systems of Linear Equations over GF(2). CHES 2003: 51-61 - [c10]Dennis Hofheinz, Jörn Müller-Quade, Rainer Steinwandt:
Initiator-Resilient Universally Composable Key Exchange. ESORICS 2003: 61-84 - [c9]Willi Geiselmann, Rainer Steinwandt:
On the security of cryptographic primitives regarding technological innovations. GI Jahrestagung (1) 2003: 99-102 - [c8]Dennis Hofheinz, Rainer Steinwandt:
A Practical Attack on Some Braid Group Based Cryptographic Primitives. Public Key Cryptography 2003: 187-198 - [c7]Willi Geiselmann, Rainer Steinwandt:
A Dedicated Sieving Hardware. Public Key Cryptography 2003: 254-266 - [i10]Dennis Hofheinz, Jörn Müller-Quade, Rainer Steinwandt:
On Modeling IND-CCA Security in Cryptographic Protocols. IACR Cryptol. ePrint Arch. 2003: 24 (2003) - [i9]Dennis Hofheinz, Jörn Müller-Quade, Rainer Steinwandt:
Initiator-Resilient Universally Composable Key Exchange. IACR Cryptol. ePrint Arch. 2003: 63 (2003) - [i8]Willi Geiselmann, Rainer Steinwandt:
Yet Another Sieving Device. IACR Cryptol. ePrint Arch. 2003: 202 (2003) - [i7]Willi Geiselmann, Rainer Steinwandt:
A short comment on the affine parts of SFLASHv3. IACR Cryptol. ePrint Arch. 2003: 220 (2003) - [i6]Willi Geiselmann, Rainer Steinwandt:
Attacks on a Secure Group Communication Scheme With Hierarchical Access Control. IACR Cryptol. ePrint Arch. 2003: 227 (2003) - [i5]Willi Geiselmann, Rainer Steinwandt:
A Key Substitution Attack on SFLASHv3. IACR Cryptol. ePrint Arch. 2003: 245 (2003) - 2002
- [j13]Willi Geiselmann, Jörn Müller-Quade, Rainer Steinwandt, Thomas Beth:
Über Quantencomputer und Quantenkryptographie. Datenschutz und Datensicherheit 26(8) (2002) - [j12]Rainer Steinwandt, Willi Geiselmann, Regine Endsuleit:
Attacking a polynomial-based cryptosystem: Polly Cracker. Int. J. Inf. Sec. 1(3): 143-148 (2002) - [j11]Marcus Hausdorf, Werner M. Seiler, Rainer Steinwandt:
Involutive Bases in the Weyl Algebra. J. Symb. Comput. 34(3): 181-198 (2002) - [j10]Willi Geiselmann, Rainer Steinwandt:
Cryptanalysis of a knapsack-like cryptosystem. Period. Math. Hung. 45(1-2): 35-41 (2002) - [j9]Willi Geiselmann, Jörn Müller-Quade, Rainer Steinwandt:
On "A New Representation of Elements of Finite Fields GF (2m) Yielding Small Complexity Arithmetic Circuits". IEEE Trans. Computers 51(12): 1460-1461 (2002) - [j8]Rainer Steinwandt, Willi Geiselmann:
Cryptanalysis of Polly Cracker. IEEE Trans. Inf. Theory 48(11): 2990-2991 (2002) - [i4]María Isabel González Vasco, Consuelo Martínez, Rainer Steinwandt:
Towards a Uniform Description of Several Group Based Cryptographic Primitives. IACR Cryptol. ePrint Arch. 2002: 48 (2002) - [i3]Jens-Matthias Bohli, María Isabel González Vasco, Consuelo Martínez, Rainer Steinwandt:
Weak Keys in MST1. IACR Cryptol. ePrint Arch. 2002: 70 (2002) - [i2]María Isabel González Vasco, Rainer Steinwandt:
Reaction Attacks on Public Key Cryptosystems Based on the Word Problem. IACR Cryptol. ePrint Arch. 2002: 139 (2002) - [i1]Willi Geiselmann, Willi Meier, Rainer Steinwandt:
An Attack on the Isomorphisms of Polynomials Problem with One Secret. IACR Cryptol. ePrint Arch. 2002: 143 (2002) - 2001
- [j7]Willi Geiselmann, Rainer Steinwandt:
Kryptoanalyse der Ruland/Schweitzer-Signatur von Bitströmen. Datenschutz und Datensicherheit 25(10) (2001) - [j6]María Isabel González Vasco, Rainer Steinwandt:
Clouds over a public key cryptosystem based on Lyndon words. Inf. Process. Lett. 80(5): 239-242 (2001) - [j5]Rainer Steinwandt, Dominik Janzing, Thomas Beth:
On using quantum protocols to detect traffic analysis. Quantum Inf. Comput. 1(3): 62-69 (2001) - [c6]Willi Geiselmann, Rainer Steinwandt, Thomas Beth:
Attacking the Affine Parts of SFLASH. IMACC 2001: 355-359 - [c5]Rainer Steinwandt, Willi Geiselmann, Thomas Beth:
A Theoretical DPA-Based Cryptanalysis of the NESSIE Candidates FLASH and SFLASH. ISC 2001: 280-293 - [c4]Feng Bao, Robert H. Deng, Willi Geiselmann, Claus-Peter Schnorr, Rainer Steinwandt, Hongjun Wu:
Cryptanalysis of Two Sparse Polynomial Based Public Key Cryptosystems. Public Key Cryptography 2001: 153-164 - [c3]Rainer Steinwandt:
Loopholes in Two Public Key Cryptosystems Using the Modular Group. Public Key Cryptography 2001: 180-189 - 2000
- [b1]Rainer Steinwandt:
Zur algorithmischen Zerlegung polynomialer Gleichungssysteme. Universität Karlsruhe, 2000, pp. I-IV, 1-169 - [j4]Jörn Müller-Quade, Rainer Steinwandt:
Recognizing Simple Subextensions of Purely Transcendental Field Extensions. Appl. Algebra Eng. Commun. Comput. 11(1): 35-41 (2000) - [j3]Rainer Steinwandt:
On computing a separating transcendence basis. SIGSAM Bull. 34(4): 3-6 (2000) - [j2]Jörn Müller-Quade, Rainer Steinwandt:
Gröbner Bases Applied to Finitely Generated Field Extensions. J. Symb. Comput. 30(4): 469-490 (2000) - [c2]Rainer Steinwandt, Markus Grassl, Willi Geiselmann, Thomas Beth:
Weaknesses in the SL2(IFs2) Hashing Scheme. CRYPTO 2000: 287-299
1990 – 1999
- 1999
- [j1]Jörn Müller-Quade, Rainer Steinwandt:
Basic Algorithms for Rational Function Fields. J. Symb. Comput. 27(2): 143-170 (1999) - [c1]Rainer Steinwandt:
Decomposing Systems of Polynomial Equations. CASC 1999: 387-407
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-11 17:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint