-
Modeling mm-Wave Indoor Propagation for Interference Analysis
04.08.2016
-
Lattice-Based Signature Schemes and their Sensitivity to Fault Analysis
28.07.2016
-
Modeling security of long-term integrity solutions
14.07.2016
-
Securing critical infrastructures: A retrospective analysis
11.07.2016
-
Was steckt dahinter: Verschlüsselung und die Grenzen der Geheimhaltung
05.07.2016
-
From 5-pass MQ-based identification to MQ-based signatures
30.06.2016
-
Adaptive Social Secret Sharing
22.06.2016
-
What does it take to detect entanglement with the human eye?
16.06.2016
-
A QKD-based digital archiving solution providing everlasting confidentiality and integrity
16.06.2016
-
NTRU Prime
09.06.2016
-
An Analysis of OpenSSL’s Random Number Generator
25.05.2016
-
Social Cybersecurity – Understanding and Leveraging Social Influence To Improve End-User Security
24.05.2016
-
Stochasticity and response: from the quantum measurement theory to ionization in strong laser fields
09.05.2016
-
An Unconditionally Hiding Auditing Procedure for Multi-Party Computations
28.04.2016
-
A Hierarchy of Authentication and Authenticated Encryption Constructions with Application to TLS
21.04.2016