Cryptographers' World
 

Bodo Möller


Author's Web Page Link

4 papers in database with 177 citations 

H-number: 4

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Bodo Möller,  Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes, pp. 244 - 262, CT-RSA 2003.

[Electronic Edition][Cited 31 times ]

2. Tetsuya Izu,  Bodo Möller,  Tsuyoshi Takagi,  Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks, pp. 296 - 313, INDOCRYPT 2002.

[Electronic Edition][Cited 38 times ]

3. Bodo Möller,  Algorithms for Multi-exponentiation, pp. 165 - 180, SAC 2001.

[Electronic Edition][Cited 86 times Red Star]

4. Safuat Hamdy,  Bodo Möller,  Security of Cryptosystems Based on Class Groups of Imaginary Quadratic Orders, pp. 234 - 247, ASIACRYPT 2000.

[Electronic Edition][Cited 22 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...