Johannes Buchmann


Ontology type: schema:Person     


Person Info

NAME

Johannes

SURNAME

Buchmann

Publications in SciGraph latest 50 shown

  • 2019 $$\mathsf {ELSA}$$: Efficient Long-Term Secure Storage of Large Datasets in INFORMATION SECURITY AND CRYPTOLOGY – ICISC 2018
  • 2018-11 Comparing apples with apples: performance analysis of lattice-based authenticated key exchange protocols in INTERNATIONAL JOURNAL OF INFORMATION SECURITY
  • 2018-09-06 CHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear Case in INFORMATION SECURITY PRACTICE AND EXPERIENCE
  • 2018-08-15 Function-Dependent Commitments for Verifiable Multi-party Computation in DEVELOPMENTS IN LANGUAGE THEORY
  • 2018-04-11 Differential Power Analysis of XMSS and SPHINCS in CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN
  • 2018-04-06 Performing Computations on Hierarchically Shared Secrets in PROGRESS IN CRYPTOLOGY – AFRICACRYPT 2018
  • 2018 Bounding the Cache-Side-Channel Leakage of Lattice-Based Signature Schemes Using Program Semantics in FOUNDATIONS AND PRACTICE OF SECURITY
  • 2017-11-30 Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor pαqβ in CSR UND SOCIAL ENTERPRISE
  • 2017-11-25 A Linearly Homomorphic Signature Scheme from Weaker Assumptions in CRYPTOGRAPHY AND CODING
  • 2017-09 Quantum security analysis of a lattice-based oblivious transfer protocol in FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING
  • 2017 Update-Tolerant and Revocable Password Backup in INFORMATION SECURITY AND PRIVACY
  • 2017 Long-Term Secure Commitments via Extractable-Binding Commitments in INFORMATION SECURITY AND PRIVACY
  • 2017 Revisiting TESLA in the Quantum Random Oracle Model in POST-QUANTUM CRYPTOGRAPHY
  • 2017 Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability in CODES, CRYPTOLOGY AND INFORMATION SECURITY
  • 2017 Long-Term Secure Time-Stamping Using Preimage-Aware Hash Functions in PROVABLE SECURITY
  • 2017 Privately and Publicly Verifiable Computing Techniques in NONE
  • 2016 Formal Policy-Based Provenance Audit in ADVANCES IN INFORMATION AND COMPUTER SECURITY
  • 2016 Password Requirements Markup Language in INFORMATION SECURITY AND PRIVACY
  • 2016 On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack in PROGRESS IN CRYPTOLOGY – AFRICACRYPT 2016
  • 2016 An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation in PROGRESS IN CRYPTOLOGY – AFRICACRYPT 2016
  • 2016 State Management for Hash-Based Signatures in SECURITY STANDARDISATION RESEARCH
  • 2016 Post-Quantum Cryptography: State of the Art in THE NEW CODEBREAKERS
  • 2016 Dynamic and Verifiable Hierarchical Secret Sharing in INFORMATION THEORETIC SECURITY
  • 2016 Homomorphic Signature Schemes, A Survey in NONE
  • 2015 Nearest Planes in Practice in CRYPTOGRAPHY AND INFORMATION SECURITY IN THE BALKANS
  • 2015 Mutant Differential Fault Analysis of Trivium MDFA in INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2014
  • 2015 On the Security of Long-Lived Archiving Systems Based on the Evidence Record Syntax in CODES, CRYPTOLOGY, AND INFORMATION SECURITY
  • 2015 Real-World Post-Quantum Digital Signatures in CYBER SECURITY AND PRIVACY
  • 2015 Augmented Learning with Errors: The Untapped Potential of the Error Term in FINANCIAL CRYPTOGRAPHY AND DATA SECURITY
  • 2015 Tuning GaussSieve for Speed in PROGRESS IN CRYPTOLOGY - LATINCRYPT 2014
  • 2014-12 Full analysis of PRINTcipher with respect to invariant subspace attack: efficient key recovery and countermeasures in DESIGNS, CODES AND CRYPTOGRAPHY
  • 2014-06 Long term confidentiality: a survey in DESIGNS, CODES AND CRYPTOGRAPHY
  • 2014-02 Tauglichkeit von Common Criteria-Schutzprofilen für Internetwahlen in Deutschland in DATENSCHUTZ UND DATENSICHERHEIT - DUD
  • 2014 Towards Lattice Based Aggregate Signatures in PROGRESS IN CRYPTOLOGY – AFRICACRYPT 2014
  • 2014 On the Efficiency of Provably Secure NTRU in POST-QUANTUM CRYPTOGRAPHY
  • 2014 Towards Security Solutions for Emergent Business Software in FUTURE BUSINESS SOFTWARE
  • 2014 Improvement and Efficient Implementation of a Lattice-Based Signature Scheme in SELECTED AREAS IN CRYPTOGRAPHY -- SAC 2013
  • 2014 Trust Views for the Web PKI in PUBLIC KEY INFRASTRUCTURES, SERVICES AND APPLICATIONS
  • 2014 Discrete Ziggurat: A Time-Memory Trade-Off for Sampling from a Gaussian Distribution over the Integers in SELECTED AREAS IN CRYPTOGRAPHY -- SAC 2013
  • 2013-09 Improved algebraic side-channel attack on AES in JOURNAL OF CRYPTOGRAPHIC ENGINEERING
  • 2013-08 A multivariate based threshold ring signature scheme in APPLICABLE ALGEBRA IN ENGINEERING, COMMUNICATION AND COMPUTING
  • 2013 How to Avoid the Breakdown of Public Key Infrastructures in PUBLIC KEY INFRASTRUCTURES, SERVICES AND APPLICATIONS
  • 2013 Privacy Threats and Their Impact on the Core Values in INTERNET PRIVACY
  • 2013 Prêt à Voter Providing Everlasting Privacy in E-VOTING AND IDENTIFY
  • 2013 Options for Achieving Privacy in Online Social Networks and E-Commerce in INTERNET PRIVACY
  • 2013 Forward Secure Signatures on Smart Cards in SELECTED AREAS IN CRYPTOGRAPHY
  • 2013 Optimizing Guessing Strategies for Algebraic Cryptanalysis with Applications to EPCBC in INFORMATION SECURITY AND CRYPTOLOGY
  • 2013 Characterization of E-Commerce in INTERNET PRIVACY
  • 2013 Core Values and Their Relation to Privacy in INTERNET PRIVACY
  • 2013 Optimal Parameters for XMSS MT in SECURITY ENGINEERING AND INTELLIGENCE INFORMATICS
  • Affiliations

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "affiliation": [
          {
            "affiliation": {
              "id": "https://www.grid.ac/institutes/grid.6546.1", 
              "type": "Organization"
            }, 
            "isCurrent": true, 
            "type": "OrganizationRole"
          }
        ], 
        "familyName": "Buchmann", 
        "givenName": "Johannes", 
        "id": "sg:person.016400723075.52", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016400723075.52"
        ], 
        "sdDataset": "persons", 
        "sdDatePublished": "2019-03-07T13:37", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-researchers-20181010/20181011/dim_researchers/base/researchers_1407.json", 
        "type": "Person"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/person.016400723075.52'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/person.016400723075.52'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/person.016400723075.52'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/person.016400723075.52'


     




    Preview window. Press ESC to close (or click here)


    ...