| 2001 |
| 11 | | Hans-Joachim Knobloch:
Schwäche im OpenPGP-Standard - Attacke auf die geheimen Schlüssel von PGP-Benutzern.
Datenschutz und Datensicherheit 25(6): (2001) |
| 1994 |
| 10 | EE | Thomas Beth,
Hans-Joachim Knobloch,
Marcus Otten,
Gustavus J. Simmons,
Peer Wichmann:
Towards Acceptable Key Escrow Systems.
ACM Conference on Computer and Communications Security 1994: 51-58 |
| 9 | EE | Thomas Beth,
Fritz Bauspieß,
Hans-Joachim Knobloch,
Steffen Stempel:
TESS: A security system based on discrete exponentiation.
Computer Communications 17(7): 466-475 (1994) |
| 1993 |
| 8 | EE | Thomas Beth,
Hans-Joachim Knobloch,
Marcus Otten:
Verifiable Secret Sharing for Monotone Access Structures.
ACM Conference on Computer and Communications Security 1993: 189-194 |
| 1992 |
| 7 | | Patrick Horster,
Hans-Joachim Knobloch:
Cryptographic Protocols and Network Security.
SEC 1992: 249-263 |
| 1991 |
| 6 | EE | Patrick Horster,
Hans-Joachim Knobloch:
Discrete Logarithm Based Protocols.
EUROCRYPT 1991: 399-408 |
| 5 | | Patrick Horster,
Hans-Joachim Knobloch:
Sichere und authentische Kommunikation in Netzwerken.
GI Jahrestagung 1991: 156-165 |
| 4 | | Patrick Horster,
Hans-Joachim Knobloch:
Protokolle zum Austausch authenischer Schlüssel.
VIS 1991: 321-328 |
| 1990 |
| 3 | EE | Fritz Bauspieß,
Hans-Joachim Knobloch,
Peer Wichmann:
Inverting the Pseudo Exponentiation.
EUROCRYPT 1990: 344-351 |
| 1989 |
| 2 | EE | Fritz Bauspieß,
Hans-Joachim Knobloch:
How to Keep Authenticity Alive in a Computer Network.
EUROCRYPT 1989: 38-46 |
| 1988 |
| 1 | EE | Hans-Joachim Knobloch:
A Smart Card Implementation of the Fiat-Shamir Identification Scheme.
EUROCRYPT 1988: 87-95 |