2008 |
22 | EE | Bodo Möller,
Andy Rupp:
Faster Multi-exponentiation through Caching: Accelerating (EC)DSA Signature Verification.
SCN 2008: 39-56 |
2007 |
21 | EE | Tim Güneysu,
Bodo Möller,
Christof Paar:
New Protection Mechanisms for Intellectual Property in Reconfigurable Logic.
FCCM 2007: 287-288 |
20 | | Bodo Möller:
Anmerkungen zur Gültigkeit von Zertifikaten.
GI Jahrestagung (2) 2007: 179-183 |
19 | EE | Sebastian Gajek,
Lijun Liao,
Bodo Möller,
Jörg Schwenk:
SSL-over-SOAP: Towards a Token-based Key Establishment Framework for Web Services.
WEWST 2007 |
18 | EE | Michel Abdalla,
Emmanuel Bresson,
Olivier Chevassut,
Bodo Möller,
David Pointcheval:
Strong password-based authentication in TLS using the three-party group Diffie?Hellman protocol.
IJSN 2(3/4): 284-296 (2007) |
2006 |
17 | EE | Michel Abdalla,
Emmanuel Bresson,
Olivier Chevassut,
Bodo Möller,
David Pointcheval:
Provably secure password-based authentication in TLS.
ASIACCS 2006: 35-45 |
2005 |
16 | EE | Bodo Möller:
2k-Ary Exponentiation.
Encyclopedia of Cryptography and Security 2005 |
15 | EE | Bodo Möller:
Binary exponentiation.
Encyclopedia of Cryptography and Security 2005 |
14 | EE | Bodo Möller:
Right-to-Left Exponentiation.
Encyclopedia of Cryptography and Security 2005 |
13 | EE | Bodo Möller:
Signed Digit Exponentiation.
Encyclopedia of Cryptography and Security 2005 |
12 | EE | Bodo Möller:
Simultaneous Exponentiation.
Encyclopedia of Cryptography and Security 2005 |
11 | EE | Bodo Möller:
Sliding Window Exponentiation.
Encyclopedia of Cryptography and Security 2005 |
2004 |
10 | EE | Bodo Möller:
A Public-Key Encryption Scheme with Pseudo-random Ciphertexts.
ESORICS 2004: 335-351 |
9 | EE | Bodo Möller:
Fractional Windows Revisited: Improved Signed-Digit Representations for Efficient Exponentiation.
ICISC 2004: 137-153 |
2003 |
8 | EE | Bodo Möller:
Provably Secure Public-Key Encryptionfor Length-Preserving Chaumian Mixes.
CT-RSA 2003: 244-262 |
2002 |
7 | EE | Bodo Möller:
Improved Techniques for Fast Exponentiation.
ICISC 2002: 298-312 |
6 | EE | Tetsuya Izu,
Bodo Möller,
Tsuyoshi Takagi:
Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks.
INDOCRYPT 2002: 296-313 |
5 | EE | Bodo Möller:
Parallelizable Elliptic Curve Point Multiplication Method with Resistance against Side-Channel Attacks.
ISC 2002: 402-413 |
2001 |
4 | EE | Bodo Möller:
Securing Elliptic Curve Point Multiplication against Side-Channel Attacks.
ISC 2001: 324-334 |
3 | EE | Bodo Möller:
Algorithms for Multi-exponentiation.
Selected Areas in Cryptography 2001: 165-180 |
2000 |
2 | EE | Safuat Hamdy,
Bodo Möller:
Security of Cryptosystems Based on Class Groups of Imaginary Quadratic Orders.
ASIACRYPT 2000: 234-247 |
1 | EE | Birgit Henhapl,
Bodo Möller:
Public-Key-Infrastrukturen.
HMD - Praxis Wirtschaftsinform. 216: 58-66 (2000) |