dblp.uni-trier.dewww.uni-trier.de

Christopher Wolf

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
15 Stefan Lucks, Ahmad-Reza Sadeghi, Christopher Wolf: Research in Cryptology, Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers Springer 2008
14EEAndrey Bogdanov, Thomas Eisenbarth, Andy Rupp, Christopher Wolf: Time-Area Optimized Public-Key Engines: -Cryptosystems as Replacement for Elliptic Curves?. CHES 2008: 45-61
2007
13EEJintai Ding, Christopher Wolf, Bo-Yin Yang: l-Invertible Cycles for Multivariate Quadratic (MQ) Public Key Cryptography. Public Key Cryptography 2007: 266-281
2006
12 Danny De Cock, Christopher Wolf, Bart Preneel: The Belgian Electronic Identity Card (Overview). Sicherheit 2006: 298-301
11EEChristopher Wolf, An Braeken, Bart Preneel: On the security of stepwise triangular systems. Des. Codes Cryptography 40(3): 285-302 (2006)
2005
10 Christopher Wolf, Stefan Lucks, Po-Wah Yau: WEWoRC 2005 - Western European Workshop on Research in Cryptology, July 5-7, 2005, Leuven, Belgium GI 2005
9EEAn Braeken, Christopher Wolf, Bart Preneel: A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes. CT-RSA 2005: 29-43
8EEAn Braeken, Christopher Wolf, Bart Preneel: Normality of Vectorial Functions. IMA Int. Conf. 2005: 186-200
7EEJintai Ding, Jason E. Gower, Dieter Schmidt, Christopher Wolf, Zhijun Yin: Complexity Estimates for the F4 Attack on the Perturbed Matsumoto-Imai Cryptosystem. IMA Int. Conf. 2005: 262-277
6EEChristopher Wolf, Bart Preneel: Equivalent Keys in HFE, C*, and Variations. Mycrypt 2005: 33-49
5EEChristopher Wolf, Bart Preneel: Large Superfluous Keys in Multivariate Quadratic Asymmetric Systems. Public Key Cryptography 2005: 275-287
4 Christopher Wolf, Bart Preneel: Applications of Multivariate Quadratic Public Key Systems. Sicherheit 2005: 413-424
2004
3 Christopher Wolf: Efficient Public Key Generation for HFE and Variations. Cryptographic Algorithms and their Uses 2004: 78-93
2 An Braeken, Christopher Wolf, Bart Preneel: A Randomised Algorithm for Checking the Normality of Cryptographic Boolean Functions. IFIP TCS 2004: 51-66
1EEChristopher Wolf, An Braeken, Bart Preneel: Efficient Cryptanalysis of RSE(2)PKC and RSSE(2)PKC. SCN 2004: 294-309

Coauthor Index

1Andrey Bogdanov [14]
2An Braeken [1] [2] [8] [9] [11]
3Danny De Cock [12]
4Jintai Ding [7] [13]
5Thomas Eisenbarth [14]
6Jason E. Gower [7]
7Stefan Lucks [10] [15]
8Bart Preneel [1] [2] [4] [5] [6] [8] [9] [11] [12]
9Andy Rupp [14]
10Ahmad-Reza Sadeghi [15]
11Dieter Schmidt [7]
12Bo-Yin Yang [13]
13Po-Wah Yau [10]
14Zhijun Yin [7]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)