Cryptographers' World
 

Ingrid Biehl


Author's Web Page Link

6 papers in database with 143 citations 

H-number: 5

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Ingrid Biehl,  Sachar Paulus,  Tsuyoshi Takagi,  Efficient Undeniable Signature Schemes Based on Ideal Arithmetic in Quadratic Orders, Designs, Codes and Cryptography, Volume 31(2), pp. 99 - 123, Springer, 2004.

[Electronic Edition][Cited 16 times ]

2. Ingrid Biehl,  Johannes Buchmann,  Safuat Hamdy,  Andreas Meyer,  A Signature Scheme Based on the Intractability of Computing Roots, Designs, Codes and Cryptography, Volume 25(3), pp. 223 - 236, Springer, 2002.

[Electronic Edition][Cited 11 times ]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Ingrid Biehl,  Bernd Meyer,  Volker Müller,  Differential Fault Attacks on Elliptic Curve Cryptosystems, pp. 131 - 146, CRYPTO 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 93 times Red Star]

2. Ingrid Biehl,  Bernd Meyer,  Christoph Thiel,  Cryptographic Protocols Based on Real-Quadratic A-fields, pp. 15 - 25, ASIACRYPT 1996.

[Electronic Edition][Cited 8 times ]

3. Ingrid Biehl,  Johannes Buchmann,  Christoph Thiel,  Cryptographic Protocols Based on Discrete Logarithms in Real-quadratic Orders, pp. 56 - 60, CRYPTO 1994.

[Electronic Edition][Cited 12 times ]

4. Ingrid Biehl,  Johannes Buchmann,  Bernd Meyer,  Christian Thiel,  Christoph Thiel,  Tools for Proving Zero Knowledge, pp. 356 - 365, EUROCRYPT 1992.

[Electronic Edition][Cited 3 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...