other persons with the same name:
2008 | ||
---|---|---|
11 | Ulrich Kühn, Andrei Pyshkin, Erik Tews, Ralf-Philipp Weinmann: Variants of Bleichenbacher's Low-Exponent Attack on PKCS#1 RSA Signatures. Sicherheit 2008: 97-109 | |
10 | EE | Ulrich Kühn: Breaking the Shin-Shin-Rhee remotely keyed encryption schemes. Inf. Process. Lett. 105(6): 236-240 (2008) |
2007 | ||
9 | EE | Ulrich Kühn, Marcel Selhorst, Christian Stüble: Realizing property-based attestation and sealing with commonly available hard- and software. STC 2007: 50-57 |
2006 | ||
8 | EE | Ulrich Kühn: Analysis of a Database and Index Encryption Scheme - Problems and Fixes. Secure Data Management 2006: 146-159 |
2005 | ||
7 | EE | Ulrich Kühn, Klaus Kursawe, Stefan Lucks, Ahmad-Reza Sadeghi, Christian Stüble: Secure Data Management in Trusted Computing. CHES 2005: 324-338 |
6 | EE | Zinaida Benenson, Ulrich Kühn, Stefan Lucks: Cryptographic Attack Metrics. Dependability Metrics 2005: 133-156 |
2003 | ||
5 | EE | Ulrich Kühn: Side-Channel Attacks on Textbook RSA and ElGamal Encryption. Public Key Cryptography 2003: 324-336 |
2002 | ||
4 | EE | Ulrich Kühn: Improved Cryptanalysis of MISTY1. FSE 2002: 61-75 |
2001 | ||
3 | EE | Ulrich Kühn: Cryptanalysis of Reduced-Round MISTY. EUROCRYPT 2001: 325-339 |
2 | Ulrich Kühn: A randomized parallel algorithm for Voronoi diagrams based on symmetric convex distance functions. Discrete Applied Mathematics 109(1-2): 177-196 (2001) | |
1998 | ||
1 | EE | Ulrich Kühn: Local Calculation of Voronoi Diagrams. Inf. Process. Lett. 68(6): 307-312 (1998) |
1 | Zinaida Benenson | [6] |
2 | Klaus Kursawe | [7] |
3 | Stefan Lucks | [6] [7] |
4 | Andrei Pyshkin | [11] |
5 | Ahmad-Reza Sadeghi | [7] |
6 | Marcel Selhorst | [9] |
7 | Christian Stüble | [7] [9] |
8 | Erik Tews | [11] |
9 | Ralf-Philipp Weinmann | [11] |