Rainer Steinwandt
Rainer Steinwandt
Professor of Mathematics, Florida Atlantic University
Verified email at fau.edu - Homepage
Title
Cited by
Cited by
Year
A practical attack on some braid group based cryptographic primitives
D Hofheinz, R Steinwandt
International Workshop on Public Key Cryptography, 187-198, 2003
1042003
Multi-authority attribute-based encryption with honest-but-curious central authority
V Božović, D Socek, R Steinwandt, VI Villányi
International Journal of Computer Mathematics 89 (3), 268-283, 2012
1022012
Secure group key establishment revisited
JM Bohli, MIG Vasco, R Steinwandt
International Journal of Information Security 6 (4), 243-254, 2007
912007
Applying Grover’s algorithm to AES: quantum resource estimates
M Grassl, B Langenberg, M Roetteler, R Steinwandt
Post-Quantum Cryptography, 29-43, 2016
752016
An algebra for composing enterprise privacy policies
M Backes, M Dürmuth, R Steinwandt
European Symposium on Research in Computer Security, 33-52, 2004
732004
(Password) authenticated key establishment: from 2-party to group
M Abdalla, JM Bohli, MIG Vasco, R Steinwandt
Theory of Cryptography Conference, 499-514, 2007
442007
Cryptanalysis of the Tillich–Zúmor Hash Function
M Grassl, I Ilić, S Magliveras, R Steinwandt
Journal of cryptology 24 (1), 148-156, 2011
402011
An attack on the isomorphisms of polynomials problem with one secret
W Geiselmann, W Meier, R Steinwandt
International Journal of Information Security 2 (1), 59-64, 2003
402003
Initiator-resilient universally composable key exchange
D Hofheinz, J Müller-Quade, R Steinwandt
European Symposium on Research in Computer Security, 61-84, 2003
362003
Attacking the affine parts of SFlash
W Geiselmann, R Steinwandt, T Beth
IMA International Conference on Cryptography and Coding, 355-359, 2001
362001
Obstacles in two public key cryptosystems based on group factorizations
MIG Vasco, R Steinwandt
Tatra Mt. Math. Publ 25 (23), 23-37, 2002
352002
Scalable hardware for sparse systems of linear equations, with applications to integer factorization
W Geiselmann, A Shamir, R Steinwandt, E Tromer
International Workshop on Cryptographic Hardware and Embedded Systems, 131-146, 2005
322005
A dedicated sieving hardware
W Geiselmann, R Steinwandt
International Workshop on Public Key Cryptography, 254-266, 2003
302003
On minimal length factorizations of finite groups
MIG Vasco, M Rötteler, R Steinwandt
Experimental Mathematics 12 (1), 1-12, 2003
302003
Differential power analysis of a McEliece cryptosystem
C Chen, T Eisenbarth, I Von Maurich, R Steinwandt
International Conference on Applied Cryptography and Network Security, 538-556, 2015
282015
A note on quantum related-key attacks
M Roetteler, R Steinwandt
Information Processing Letters 115 (1), 40-44, 2015
282015
Weaknesses in the SL2() Hashing Scheme
R Steinwandt, M Grassl, W Geiselmann, T Beth
Annual International Cryptology Conference, 287-299, 2000
272000
Deniable group key agreement
JM Bohli, R Steinwandt
International Conference on Cryptology in Vietnam, 298-311, 2006
262006
Password-Authenticated Constant-Round Group Key Establishment with a Common Reference String.
JM Bohli, MIG Vasco, R Steinwandt
IACR Cryptology ePrint Archive 2006, 214, 2006
252006
Attacking a polynomial-based cryptosystem: Polly Cracker
R Steinwandt, W Geiselmann, R Endsuleit
International Journal of Information Security 1 (3), 143-148, 2002
252002
The system can't perform the operation now. Try again later.
Articles 1–20