Number theory and cryptography. Papers in honor of Johannes Buchmann on the occasion of his 60th birthday. (English) Zbl 1275.94006

Lecture Notes in Computer Science 8260. Berlin: Springer (ISBN 978-3-642-42000-9/pbk). xii, 281 p. (2013).

Show indexed articles as search result.

The articles of this volume will be reviewed individually.
Indexed articles:
Williams, Hugh C., Laudatio in honour of Professor Dr. Johannes Buchmann on the occasion of his 60th birthday, 1-2 [Zbl 1277.01027]
Baier, Harald, Have a break – have a security centre: from DZI to CASED, 3-18 [Zbl 1291.01057]
Yeh, Jenny Yuan-Chun; Cheng, Chen-Mou; Yang, Bo-Yin, Operating degrees for XL vs. \(F_{4}/F_{5}\) for generic \(\mathcal{M}Q\) with number of equations linear in that of variables, 19-33 [Zbl 1290.94140]
Ding, Jintai; Schmidt, Dieter, Solving degree and degree of regularity for polynomial systems over a finite field, 34-49 [Zbl 1291.94074]
Silvester, Alan K.; Jacobson, Michael J. jun.; Williams, Hugh C., Shorter compact representations in real quadratic fields, 50-72 [Zbl 1320.11098]
Schnorr, Claus Peter, Factoring integers by CVP algorithms, 73-93 [Zbl 1320.11124]
Shantz, Michael; Teske, Edlyn, Solving the elliptic curve discrete logarithm problem using Semaev polynomials, Weil descent and Gröbner basis methods – an experimental study, 94-107 [Zbl 1320.11125]
Hayasaka, Kenichiro; Aoki, Kazumaro; Kobayashi, Tetsutaro; Takagi, Tsuyoshi, An experiment of number field sieve for discrete logarithm problem over \(\mathrm{GF}(p^{12})\), 108-120 [Zbl 1320.94067]
Lenstra, Arjen K.; Kleinjung, Thorsten; Thomé, Emmanuel, Universal security. From bits and mips to pools, lakes – and beyond, 121-124 [Zbl 1320.94072]
Merli, Dominik; Sigl, Georg; Eckert, Claudia, Identities for embedded systems enabled by physical unclonable functions, 125-138 [Zbl 1320.94074]
Schindler, Werner, When should an implementation attack be viewed as successful?, 139-150 [Zbl 1320.94081]
Huss, Sorin A.; Stöttinger, Marc; Zohner, Michael, AMASIVE: an adaptable and modular autonomous side-channel vulnerability evaluation framework, 151-165 [Zbl 1320.94069]
Eisenbarth, Thomas; von Maurich, Ingo; Paar, Christof; Ye, Xin, A performance boost for hash-based signatures, 166-182 [Zbl 1320.94087]
Meyer, Ulrike; Wetzel, Susanne, Privacy-preserving reconciliation protocols: from theory to practice, 183-210 [Zbl 1320.94076]
Huber, Matthias; Müller-Quade, Jörn; Nilges, Tobias, Defining privacy based on distributions of privacy breaches, 211-225 [Zbl 1320.94068]
Coretti, Sandro; Maurer, Ueli; Tackmann, Björn, A constructive perspective on key encapsulation, 226-239 [Zbl 1320.94062]
Müller, Günter; Accorsi, Rafael, Why are business processes not secure?, 240-254 [Zbl 1320.94077]
Volkamer, Melanie; Renaud, Karen, Mental models – general introduction and review of their application to human-centred security, 255-280 [Zbl 1320.94084]


94-06 Proceedings, conferences, collections, etc. pertaining to information and communication theory
11-06 Proceedings, conferences, collections, etc. pertaining to number theory
11Yxx Computational number theory
94A60 Cryptography
94A62 Authentication, digital signatures and secret sharing
00B25 Proceedings of conferences of miscellaneous specific interest

Biographic References:

Buchmann, Johannes
Full Text: DOI