![]() | ![]() |
2005 | ||
---|---|---|
6 | Roger Fischlin: "Hey Joe, mach 'mal ITIL". DFN-Arbeitstagung über Kommunikationsnetze 2005: 221-234 | |
2002 | ||
5 | EE | Marc Fischlin, Roger Fischlin: The Representation Problem Based on Factoring. CT-RSA 2002: 96-113 |
2000 | ||
4 | EE | Marc Fischlin, Roger Fischlin: Efficient Non-malleable Commitment Schemes. CRYPTO 2000: 413-431 |
3 | EE | Roger Fischlin, Claus-Peter Schnorr: Stronger Security Proofs for RSA and Rabin Bits. J. Cryptology 13(2): 221-244 (2000) |
1999 | ||
2 | EE | Roger Fischlin, Jean-Pierre Seifert: Tensor-Based Trapdoors for CVP and Their Application to Public Key Cryptography. IMA Int. Conf. 1999: 244-257 |
1997 | ||
1 | EE | Roger Fischlin, Claus-Peter Schnorr: Stronger Security Proofs for RSA and Rabin Bits. EUROCRYPT 1997: 267-279 |
1 | Marc Fischlin | [4] [5] |
2 | Claus-Peter Schnorr | [1] [3] |
3 | Jean-Pierre Seifert | [2] |