Cryptographers' World
 

Bernd Meyer


Author's Web Page Link

4 papers in database with 119 citations 

H-number: 3

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Ingrid Biehl,  Bernd Meyer,  Volker Müller,  Differential Fault Attacks on Elliptic Curve Cryptosystems, pp. 131 - 146, CRYPTO 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 93 times Red Star]

2. Ingrid Biehl,  Bernd Meyer,  Christoph Thiel,  Cryptographic Protocols Based on Real-Quadratic A-fields, pp. 15 - 25, ASIACRYPT 1996.

[Electronic Edition][Cited 8 times ]

3. Bernd Meyer,  Volker Müller,  A Public Key Cryptosystem Based on Elliptic Curves over Z/nZ Equivalent to Factoring, pp. 49 - 59, EUROCRYPT 1996.

[Electronic Edition][Cited 15 times ]

4. Ingrid Biehl,  Johannes Buchmann,  Bernd Meyer,  Christian Thiel,  Christoph Thiel,  Tools for Proving Zero Knowledge, pp. 356 - 365, EUROCRYPT 1992.

[Electronic Edition][Cited 3 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...