dblp.uni-trier.dewww.uni-trier.de

Bodo Möller

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
22EEBodo Möller, Andy Rupp: Faster Multi-exponentiation through Caching: Accelerating (EC)DSA Signature Verification. SCN 2008: 39-56
2007
21EETim Güneysu, Bodo Möller, Christof Paar: New Protection Mechanisms for Intellectual Property in Reconfigurable Logic. FCCM 2007: 287-288
20 Bodo Möller: Anmerkungen zur Gültigkeit von Zertifikaten. GI Jahrestagung (2) 2007: 179-183
19EESebastian Gajek, Lijun Liao, Bodo Möller, Jörg Schwenk: SSL-over-SOAP: Towards a Token-based Key Establishment Framework for Web Services. WEWST 2007
18EEMichel Abdalla, Emmanuel Bresson, Olivier Chevassut, Bodo Möller, David Pointcheval: Strong password-based authentication in TLS using the three-party group Diffie?Hellman protocol. IJSN 2(3/4): 284-296 (2007)
2006
17EEMichel Abdalla, Emmanuel Bresson, Olivier Chevassut, Bodo Möller, David Pointcheval: Provably secure password-based authentication in TLS. ASIACCS 2006: 35-45
2005
16EEBodo Möller: 2k-Ary Exponentiation. Encyclopedia of Cryptography and Security 2005
15EEBodo Möller: Binary exponentiation. Encyclopedia of Cryptography and Security 2005
14EEBodo Möller: Right-to-Left Exponentiation. Encyclopedia of Cryptography and Security 2005
13EEBodo Möller: Signed Digit Exponentiation. Encyclopedia of Cryptography and Security 2005
12EEBodo Möller: Simultaneous Exponentiation. Encyclopedia of Cryptography and Security 2005
11EEBodo Möller: Sliding Window Exponentiation. Encyclopedia of Cryptography and Security 2005
2004
10EEBodo Möller: A Public-Key Encryption Scheme with Pseudo-random Ciphertexts. ESORICS 2004: 335-351
9EEBodo Möller: Fractional Windows Revisited: Improved Signed-Digit Representations for Efficient Exponentiation. ICISC 2004: 137-153
2003
8EEBodo Möller: Provably Secure Public-Key Encryptionfor Length-Preserving Chaumian Mixes. CT-RSA 2003: 244-262
2002
7EEBodo Möller: Improved Techniques for Fast Exponentiation. ICISC 2002: 298-312
6EETetsuya Izu, Bodo Möller, Tsuyoshi Takagi: Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks. INDOCRYPT 2002: 296-313
5EEBodo Möller: Parallelizable Elliptic Curve Point Multiplication Method with Resistance against Side-Channel Attacks. ISC 2002: 402-413
2001
4EEBodo Möller: Securing Elliptic Curve Point Multiplication against Side-Channel Attacks. ISC 2001: 324-334
3EEBodo Möller: Algorithms for Multi-exponentiation. Selected Areas in Cryptography 2001: 165-180
2000
2EESafuat Hamdy, Bodo Möller: Security of Cryptosystems Based on Class Groups of Imaginary Quadratic Orders. ASIACRYPT 2000: 234-247
1EEBirgit Henhapl, Bodo Möller: Public-Key-Infrastrukturen. HMD - Praxis Wirtschaftsinform. 216: 58-66 (2000)

Coauthor Index

1Michel Abdalla [17] [18]
2Emmanuel Bresson [17] [18]
3Olivier Chevassut [17] [18]
4Sebastian Gajek [19]
5Tim Güneysu [21]
6Safuat Hamdy [2]
7Birgit Henhapl [1]
8Tetsuya Izu [6]
9Lijun Liao [19]
10Christof Paar [21]
11David Pointcheval [17] [18]
12Andy Rupp [22]
13Jörg Schwenk [19]
14Tsuyoshi Takagi [6]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)