2001 |
11 | | Hans-Joachim Knobloch:
Schwäche im OpenPGP-Standard - Attacke auf die geheimen Schlüssel von PGP-Benutzern.
Datenschutz und Datensicherheit 25(6): (2001) |
1994 |
10 | EE | Thomas Beth,
Hans-Joachim Knobloch,
Marcus Otten,
Gustavus J. Simmons,
Peer Wichmann:
Towards Acceptable Key Escrow Systems.
ACM Conference on Computer and Communications Security 1994: 51-58 |
9 | EE | Thomas Beth,
Fritz Bauspieß,
Hans-Joachim Knobloch,
Steffen Stempel:
TESS: A security system based on discrete exponentiation.
Computer Communications 17(7): 466-475 (1994) |
1993 |
8 | EE | Thomas Beth,
Hans-Joachim Knobloch,
Marcus Otten:
Verifiable Secret Sharing for Monotone Access Structures.
ACM Conference on Computer and Communications Security 1993: 189-194 |
1992 |
7 | | Patrick Horster,
Hans-Joachim Knobloch:
Cryptographic Protocols and Network Security.
SEC 1992: 249-263 |
1991 |
6 | EE | Patrick Horster,
Hans-Joachim Knobloch:
Discrete Logarithm Based Protocols.
EUROCRYPT 1991: 399-408 |
5 | | Patrick Horster,
Hans-Joachim Knobloch:
Sichere und authentische Kommunikation in Netzwerken.
GI Jahrestagung 1991: 156-165 |
4 | | Patrick Horster,
Hans-Joachim Knobloch:
Protokolle zum Austausch authenischer Schlüssel.
VIS 1991: 321-328 |
1990 |
3 | EE | Fritz Bauspieß,
Hans-Joachim Knobloch,
Peer Wichmann:
Inverting the Pseudo Exponentiation.
EUROCRYPT 1990: 344-351 |
1989 |
2 | EE | Fritz Bauspieß,
Hans-Joachim Knobloch:
How to Keep Authenticity Alive in a Computer Network.
EUROCRYPT 1989: 38-46 |
1988 |
1 | EE | Hans-Joachim Knobloch:
A Smart Card Implementation of the Fiat-Shamir Identification Scheme.
EUROCRYPT 1988: 87-95 |