| 2004 |
| 13 | EE | Ingrid Biehl,
Sachar Paulus,
Tsuyoshi Takagi:
Efficient Undeniable Signature Schemes Based on Ideal Arithmetic in Quadratic Orders.
Des. Codes Cryptography 31(2): 99-123 (2004) |
| 2002 |
| 12 | EE | Ingrid Biehl,
Tsuyoshi Takagi:
A New Distributed Primality Test for Shared RSA Keys Using Quadratic Fields.
ACISP 2002: 1-16 |
| 11 | | Ingrid Biehl,
Johannes Buchmann,
Safuat Hamdy,
Andreas Meyer:
A Signature Scheme Based on the Intractability of Computing Roots.
Des. Codes Cryptography 25(3): 223-236 (2002) |
| 2000 |
| 10 | EE | Ingrid Biehl,
Bernd Meyer,
Volker Müller:
Differential Fault Attacks on Elliptic Curve Cryptosystems.
CRYPTO 2000: 131-146 |
| 1999 |
| 9 | | Ingrid Biehl,
Jörg Keller:
Effizienzverbesserungen durch schlüssel-optimierte Ver- und Entschlüsselung in Workstations.
ARCS 1999: 279-283 |
| 1998 |
| 8 | | Ingrid Biehl,
Bernd Meyer,
Susanne Wetzel:
Visual Cryptography - How to Use Images to Share a Secret.
GI Jahrestagung 1998: 3-12 |
| 7 | EE | Ingrid Biehl,
Bernd Meyer,
Susanne Wetzel:
Ensuring the Integrity of Agent-Based Computations by Short Proofs.
Mobile Agents 1998: 183-194 |
| 1997 |
| 6 | | Ingrid Biehl,
Susanne Wetzel:
Traceable visual cryptography.
ICICS 1997: 61-71 |
| 5 | | Ingrid Biehl,
Bernd Meyer:
Protocols for Collusion-Secure Asymmetric Fingerprinting (Extended Abstract).
STACS 1997: 399-412 |
| 1996 |
| 4 | | Ingrid Biehl,
Bernd Meyer,
Christoph Thiel:
Cryptographic Protocols Based on Real-Quadratic A-fields.
ASIACRYPT 1996: 15-25 |
| 1994 |
| 3 | EE | Ingrid Biehl,
Johannes Buchmann,
Christoph Thiel:
Cryptographic Protocols Based on Discrete Logarithms in Real-quadratic Orders.
CRYPTO 1994: 56-60 |
| 2 | | Ingrid Biehl:
Definition and Existence of Super Complexity Cores.
ISAAC 1994: 600-606 |
| 1992 |
| 1 | EE | Ingrid Biehl,
Johannes Buchmann,
Bernd Meyer,
Christian Thiel,
Christoph Thiel:
Tools for Proving Zero Knowledge.
EUROCRYPT 1992: 356-365 |