2004 |
13 | EE | Ingrid Biehl,
Sachar Paulus,
Tsuyoshi Takagi:
Efficient Undeniable Signature Schemes Based on Ideal Arithmetic in Quadratic Orders.
Des. Codes Cryptography 31(2): 99-123 (2004) |
2002 |
12 | EE | Ingrid Biehl,
Tsuyoshi Takagi:
A New Distributed Primality Test for Shared RSA Keys Using Quadratic Fields.
ACISP 2002: 1-16 |
11 | | Ingrid Biehl,
Johannes Buchmann,
Safuat Hamdy,
Andreas Meyer:
A Signature Scheme Based on the Intractability of Computing Roots.
Des. Codes Cryptography 25(3): 223-236 (2002) |
2000 |
10 | EE | Ingrid Biehl,
Bernd Meyer,
Volker Müller:
Differential Fault Attacks on Elliptic Curve Cryptosystems.
CRYPTO 2000: 131-146 |
1999 |
9 | | Ingrid Biehl,
Jörg Keller:
Effizienzverbesserungen durch schlüssel-optimierte Ver- und Entschlüsselung in Workstations.
ARCS 1999: 279-283 |
1998 |
8 | | Ingrid Biehl,
Bernd Meyer,
Susanne Wetzel:
Visual Cryptography - How to Use Images to Share a Secret.
GI Jahrestagung 1998: 3-12 |
7 | EE | Ingrid Biehl,
Bernd Meyer,
Susanne Wetzel:
Ensuring the Integrity of Agent-Based Computations by Short Proofs.
Mobile Agents 1998: 183-194 |
1997 |
6 | | Ingrid Biehl,
Susanne Wetzel:
Traceable visual cryptography.
ICICS 1997: 61-71 |
5 | | Ingrid Biehl,
Bernd Meyer:
Protocols for Collusion-Secure Asymmetric Fingerprinting (Extended Abstract).
STACS 1997: 399-412 |
1996 |
4 | | Ingrid Biehl,
Bernd Meyer,
Christoph Thiel:
Cryptographic Protocols Based on Real-Quadratic A-fields.
ASIACRYPT 1996: 15-25 |
1994 |
3 | EE | Ingrid Biehl,
Johannes Buchmann,
Christoph Thiel:
Cryptographic Protocols Based on Discrete Logarithms in Real-quadratic Orders.
CRYPTO 1994: 56-60 |
2 | | Ingrid Biehl:
Definition and Existence of Super Complexity Cores.
ISAAC 1994: 600-606 |
1992 |
1 | EE | Ingrid Biehl,
Johannes Buchmann,
Bernd Meyer,
Christian Thiel,
Christoph Thiel:
Tools for Proving Zero Knowledge.
EUROCRYPT 1992: 356-365 |