Cryptographers' World
 

Rainer Steinwandt


Author's Web Page Link

15 papers in database with 214 citations 

H-number: 9

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Jens-Matthias Bohli,  Rainer Steinwandt,  Maria Isabel Gonzalez Vasco,  Consuelo Martínez,  Weak Keys in , Designs, Codes and Cryptography, Volume 37(3), pp. 509 - 524, Springer, 2005.

[Electronic Edition][Cited 32 times ]

2. Maria Isabel Gonzalez Vasco,  Dennis Hofheinz,  Consuelo Martínez,  Rainer Steinwandt,  On the Security of Two Public Key Cryptosystems Using Non-Abelian Groups, Designs, Codes and Cryptography, Volume 32(1), pp. 207 - 216, Springer, 2004.

[Electronic Edition][Cited 2 times ]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Michel Abdalla,  Jens-Matthias Bohli,  Maria Isabel Gonzalez Vasco,  Rainer Steinwandt,  (Password) Authenticated Key Establishment: From 2-Party to Group, pp. 499 - 514, TCC 2007.

[Electronic Edition][Cited 16 times ]

2. Willi Geiselmann,  Rainer Steinwandt,  Non-wafer-Scale Sieving Hardware for the NFS: Another Attempt to Cope with 1024-Bit, pp. 466 - 481, EUROCRYPT 2007.

[Electronic Edition][Cited 5 times ]

3. Jens-Matthias Bohli,  Rainer Steinwandt,  Deniable Group Key Agreement, pp. 298 - 311, VIETCRYPT 2006.

[Electronic Edition][Cited 6 times ]

4. Jens-Matthias Bohli,  Benjamin Glas,  Rainer Steinwandt,  Towards Provably Secure Group Key Agreement Building on Group Theory, pp. 322 - 336, VIETCRYPT 2006.

[Electronic Edition][Cited 6 times ]

5. Willi Geiselmann,  Adi Shamir,  Rainer Steinwandt,  Eran Tromer,  Scalable Hardware for Sparse Systems of Linear Equations, with Applications to Integer Factorization, pp. 131 - 146, CHES 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 15 times ]

6. Maria Isabel Gonzalez Vasco,  Consuelo Martínez,  Rainer Steinwandt,  Jorge Luis Villar,  A New Cramer-Shoup Like Methodology for Group Based Provably Secure Encryption Schemes, pp. 495 - 509, TCC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 1 times ]

7. Willi Geiselmann,  Rainer Steinwandt,  Yet Another Sieving Device, pp. 278 - 291, CT-RSA 2004.

[Electronic Edition][Cited 15 times ]

8. Willi Geiselmann,  Rainer Steinwandt,  Hardware to Solve Sparse Systems of Linear Equations over GF(2), pp. 51 - 61, CHES 2003.

[Electronic Edition][Cited 12 times ]

9. Dennis Hofheinz,  Rainer Steinwandt,  A Practical Attack on Some Braid Group Based Cryptographic Primitives, pp. 187 - 198, PKC 2003.

[Electronic Edition][Cited 53 times Red Star]

10. Willi Geiselmann,  Rainer Steinwandt,  A Dedicated Sieving Hardware, pp. 254 - 266, PKC 2003.

[Electronic Edition][Cited 20 times ]

11. Rainer Steinwandt,  Loopholes in Two Public Key Cryptosystems Using the Modular Group, pp. 180 - 189, PKC 2001.

[Electronic Edition][Cited 7 times ]

12. Feng Bao,  Robert H. Deng,  Willi Geiselmann,  Claus-Peter Schnorr,  Rainer Steinwandt,  Hongjun Wu,  Cryptanalysis of Two Sparse Polynomial Based Public Key Cryptosystems, pp. 153 - 164, PKC 2001.

[Electronic Edition][Cited 10 times ]

13. Rainer Steinwandt,  Markus Grassl,  Willi Geiselmann,  Thomas Beth,  Weaknesses in the SL2(F2n) Hashing Scheme , pp. 287 - 299, CRYPTO 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 14 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...