Hamadneh, Tareq; Merker, Jochen; Schuldt, Gregor Discrete maximum principle and positivity certificates for the Bernstein dual Petrov-Galerkin method. (English) Zbl 07820187 Zeidan, Dia (ed.) et al., Mathematics and computation. IACMC 2022. Selected papers based on the presentations at the 7th international Arab conference on mathematics and computations, Zarqa, Jordan, May 11–13, 2022. Singapore: Springer. Springer Proc. Math. Stat. 418, 195-211 (2023). MSC: 00B25 PDFBibTeX XMLCite \textit{T. Hamadneh} et al., Springer Proc. Math. Stat. 418, 195--211 (2023; Zbl 07820187) Full Text: DOI
Attrapadung, Nuttapong; Hanaoka, Goichiro; Hiromasa, Ryo; Matsuda, Takahiro; Schuldt, Jacob C. N. Maliciously circuit-private multi-key FHE and MPC based on LWE. (English) Zbl 1512.94059 Des. Codes Cryptography 91, No. 5, 1645-1684 (2023). MSC: 94A60 PDFBibTeX XMLCite \textit{N. Attrapadung} et al., Des. Codes Cryptography 91, No. 5, 1645--1684 (2023; Zbl 1512.94059) Full Text: DOI
Lu, Yi; Hara, Keisuke; Ohara, Kazuma; Schuldt, Jacob; Tanaka, Keisuke Efficient two-party exponentiation from quotient transfer. (English) Zbl 1509.68081 Ateniese, Giuseppe (ed.) et al., Applied cryptography and network security. 20th international conference, ACNS 2022, Rome, Italy, June 20–23, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13269, 643-662 (2022). MSC: 68Q10 94A60 PDFBibTeX XMLCite \textit{Y. Lu} et al., Lect. Notes Comput. Sci. 13269, 643--662 (2022; Zbl 1509.68081) Full Text: DOI
Mögerle, Johannes; Schuldt, Robin; Reiff, Johannes; Main, Jörg; Hernandez, Rigoberto Transition state dynamics of a driven magnetic free layer. (English) Zbl 1487.78004 Commun. Nonlinear Sci. Numer. Simul. 105, Article ID 106054, 10 p. (2022). MSC: 78A25 82D40 57R50 PDFBibTeX XMLCite \textit{J. Mögerle} et al., Commun. Nonlinear Sci. Numer. Simul. 105, Article ID 106054, 10 p. (2022; Zbl 1487.78004) Full Text: DOI arXiv
Nuta, Seiya; Schuldt, Jacob C. N.; Nishide, Takashi Forward-secure public key encryption without key update from proof-of-stake blockchain. (English) Zbl 1514.94122 Adhikari, Avishek (ed.) et al., Progress in cryptology – INDOCRYPT 2021. 22nd International conference on cryptology in India, Jaipur, India, December 12–15, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13143, 436-461 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Nuta} et al., Lect. Notes Comput. Sci. 13143, 436--461 (2021; Zbl 1514.94122) Full Text: DOI
Hayata, Junichiro; Schuldt, Jacob C. N.; Hanaoka, Goichiro; Matsuura, Kanta On private information retrieval supporting range queries. (English) Zbl 1511.68044 Chen, Liqun (ed.) et al., Computer security – ESORICS 2020. 25th European symposium on research in computer security, ESORICS 2020, Guildford, UK, September 14–18, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12309, 674-694 (2020). MSC: 68M25 68P20 68P27 94A62 PDFBibTeX XMLCite \textit{J. Hayata} et al., Lect. Notes Comput. Sci. 12309, 674--694 (2020; Zbl 1511.68044) Full Text: DOI
Kikuchi, Ryo; Attrapadung, Nuttapong; Hamada, Koki; Ikarashi, Dai; Ishida, Ai; Matsuda, Takahiro; Sakai, Yusuke; Schuldt, Jacob C. N. Field extension in secret-shared form and its applications to efficient secure computation. (English) Zbl 1439.94037 Jang-Jaccard, Julian (ed.) et al., Information security and privacy. 24th Australasian conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11547, 343-361 (2019). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{R. Kikuchi} et al., Lect. Notes Comput. Sci. 11547, 343--361 (2019; Zbl 1439.94037) Full Text: DOI
Link, Roman M.; Schuldt, Bernhard; Choat, Brendan; Jansen, Steven; Cobb, Alexander R. Maximum-likelihood estimation of xylem vessel length distributions. (English) Zbl 1406.92381 J. Theor. Biol. 455, 329-341 (2018). MSC: 92C80 62P10 62E10 PDFBibTeX XMLCite \textit{R. M. Link} et al., J. Theor. Biol. 455, 329--341 (2018; Zbl 1406.92381) Full Text: DOI
Attrapadung, Nuttapong; Hanaoka, Goichiro; Hirano, Takato; Kawai, Yutaka; Koseki, Yoshihiro; Schuldt, Jacob C. N. Token-based multi-input functional encryption. (English) Zbl 1421.94036 Baek, Joonsang (ed.) et al., Provable security. 12th international conference, ProvSec 2018, Jeju, South Korea, October 25–28, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11192, 147-164 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{N. Attrapadung} et al., Lect. Notes Comput. Sci. 11192, 147--164 (2018; Zbl 1421.94036) Full Text: DOI
Paterson, Kenneth G.; Schuldt, Jacob C. N. Statistical attacks on cookie masking for RC4. (English) Zbl 1423.94097 Cryptogr. Commun. 10, No. 5, 777-801 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{K. G. Paterson} and \textit{J. C. N. Schuldt}, Cryptogr. Commun. 10, No. 5, 777--801 (2018; Zbl 1423.94097) Full Text: DOI
Matsuda, Takahiro; Schuldt, Jacob C. N. Related randomness security for public key encryption, revisited. (English) Zbl 1385.94060 Abdalla, Michel (ed.) et al., Public-key cryptography – PKC 2018. 21st IACR international conference on practice and theory of public-key cryptography, Rio de Janeiro, Brazil, March 25–29, 2018. Proceedings. Part I. Cham: Springer (ISBN 978-3-319-76577-8/pbk; 978-3-319-76578-5/ebook). Lecture Notes in Computer Science 10769, 280-311 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{T. Matsuda} and \textit{J. C. N. Schuldt}, Lect. Notes Comput. Sci. 10769, 280--311 (2018; Zbl 1385.94060) Full Text: DOI
Degabriele, Jean Paul; Paterson, Kenneth G.; Schuldt, Jacob C. N.; Woodage, Joanne Backdoors in pseudorandom number generators: possibility and impossibility results. (English) Zbl 1379.94036 Robshaw, Matthew (ed.) et al., Advances in cryptology – CRYPTO 2016. 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53017-7/pbk; 978-3-662-53018-4/ebook). Lecture Notes in Computer Science 9814, 403-432 (2016). MSC: 94A60 65C10 PDFBibTeX XMLCite \textit{J. P. Degabriele} et al., Lect. Notes Comput. Sci. 9814, 403--432 (2016; Zbl 1379.94036) Full Text: DOI
Morita, Hiraku; Schuldt, Jacob C. N.; Matsuda, Takahiro; Hanaoka, Goichiro; Iwata, Tetsu On the security of the Schnorr signature scheme and DSA against related-key attacks. (English) Zbl 1384.94089 Kwon, Soonhak (ed.) et al., Information security and cryptology – ICISC 2015. 18th international conference, Seoul, South Korea, November 25–27, 2015. Revised selected papers. Cham: Springer (ISBN 978-3-319-30839-5/pbk; 978-3-319-30840-1/ebook). Lecture Notes in Computer Science 9558, 20-35 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{H. Morita} et al., Lect. Notes Comput. Sci. 9558, 20--35 (2016; Zbl 1384.94089) Full Text: DOI
Sakai, Yusuke; Emura, Keita; Schuldt, Jacob C. N.; Hanaoka, Goichiro; Ohta, Kazuo Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency. (English) Zbl 1403.94077 Theor. Comput. Sci. 630, 95-116 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Sakai} et al., Theor. Comput. Sci. 630, 95--116 (2016; Zbl 1403.94077) Full Text: DOI
Shinagawa, Kazumasa; Mizuki, Takaaki; Schuldt, Jacob; Nuida, Koji; Kanayama, Naoki; Nishide, Takashi; Hanaoka, Goichiro; Okamoto, Eiji Secure multi-party computation using polarizing cards. (English) Zbl 1398.68145 Tanaka, Keisuke (ed.) et al., Advances in information and computer security. 10th international workshop on security, IWSEC 2015, Nara, Japan, August 26–28, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22424-4/pbk; 978-3-319-22425-1/ebook). Lecture Notes in Computer Science 9241, 281-297 (2015). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{K. Shinagawa} et al., Lect. Notes Comput. Sci. 9241, 281--297 (2015; Zbl 1398.68145) Full Text: DOI
Shinagawa, Kazumasa; Mizuki, Takaaki; Schuldt, Jacob C. N.; Nuida, Koji; Kanayama, Naoki; Nishide, Takashi; Hanaoka, Goichiro; Okamoto, Eiji Multi-party computation with small shuffle complexity using regular polygon cards. (English) Zbl 1388.94078 Au, Man-Ho (ed.) et al., Provable security. 9th international conference, ProvSec 2015, Kanazawa, Japan, November 24–26, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-26058-7/pbk; 978-3-319-26059-4/ebook). Lecture Notes in Computer Science 9451, 127-146 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Shinagawa} et al., Lect. Notes Comput. Sci. 9451, 127--146 (2015; Zbl 1388.94078) Full Text: DOI
Paterson, Kenneth G.; Schuldt, Jacob C. N.; Sibborn, Dale L.; Wee, Hoeteck Security against related randomness attacks via reconstructive extractors. (English) Zbl 1376.94042 Groth, Jens (ed.), Cryptography and coding. 15th IMA international conference, IMACC 2015, Oxford, UK, December 15–17, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-27238-2/pbk; 978-3-319-27239-9/ebook). Lecture Notes in Computer Science 9496, 23-40 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{K. G. Paterson} et al., Lect. Notes Comput. Sci. 9496, 23--40 (2015; Zbl 1376.94042) Full Text: DOI
Sakai, Yusuke; Emura, Keita; Schuldt, Jacob C. N.; Hanaoka, Goichiro; Ohta, Kazuo Dynamic threshold public-key encryption with decryption consistency from static assumptions. (English) Zbl 1358.94077 Foo, Ernest (ed.) et al., Information security and privacy. 20th Australasian conference, ACISP 2015, Brisbane, QLD, Australia, June 29 – July 1, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-19961-0/pbk; 978-3-319-19962-7/ebook). Lecture Notes in Computer Science 9144, 77-92 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Sakai} et al., Lect. Notes Comput. Sci. 9144, 77--92 (2015; Zbl 1358.94077) Full Text: DOI
Paterson, Kenneth; Poettering, Bertram; Schuldt, Jacob Plaintext recovery attacks against WPA/TKIP. (English) Zbl 1382.94152 Cid, Carlos (ed.) et al., Fast software encryption. 21st international workshop, FSE 2014, London, UK, March 3–5, 2014. Revised selected papers. Berlin: Springer (ISBN 978-3-662-46705-3/pbk; 978-3-662-46706-0/ebook). Lecture Notes in Computer Science 8540, 325-349 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Paterson} et al., Lect. Notes Comput. Sci. 8540, 325--349 (2015; Zbl 1382.94152) Full Text: DOI
Paterson, Kenneth G.; Poettering, Bertram; Schuldt, Jacob C. N. Big bias hunting in Amazonia: large-scale computation and exploitation of RC4 biases (invited paper). (English) Zbl 1306.94082 Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-45610-1/pbk). Lecture Notes in Computer Science 8873, 398-419 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{K. G. Paterson} et al., Lect. Notes Comput. Sci. 8873, 398--419 (2014; Zbl 1306.94082) Full Text: DOI
Aguilera, D.; Ahlers, H.; Battelier, B.; Bawamia, A.; Bertoldi, A.; Bondarescu, R.; Bongs, K.; Bouyer, P.; Braxmaier, C.; Cacciapuoti, L.; Chaloner, C.; Chwalla, M.; Ertmer, W.; Franz, M.; Gaaloul, N.; Gehler, M.; Gerardi, D.; Gesa, L.; Gürlebeck, N.; Hartwig, J.; Hauth, M.; Hellmig, O.; Herr, W.; Herrmann, S.; Heske, A.; Hinton, A.; Ireland, P.; Jetzer, P.; Johann, U.; Krutzik, M.; Kubelka, A.; Lämmerzahl, C.; Lragin, A.; Lloro, I.; Massonnet, D.; Mateos, I.; Milke, A.; Nofrarias, M.; Oswald, M.; Peters, A.; Posso-Trujillo, K.; Rasel, E.; Rocco, E.; Roura, A.; Rudolph, J.; Schleich, W.; Schubert, C.; Schuldt, T.; Seidel, S.; Sengstock, K.; Sopuerta, C. F.; Sorrentino, F.; Summers, D.; Tino, G. M.; Trenkel, C.; Uzunoglu, N.; von Klitzing, W.; Walser, R.; Wendrich, T.; Wenzlawski, A.; Weßels, P.; Wicht, A.; Wille, E.; Williams, M.; Windpassinger, P.; Zahzam, N. Corrigendum: “STE-QUEST – test of the universality of free fall using cold atom interferometry”. (English) Zbl 1298.83006 Classical Quantum Gravity 31, No. 15, Article ID 159502, 3 p. (2014). MSC: 83B05 83D05 83C10 85A05 81P15 83C35 83C45 PDFBibTeX XMLCite \textit{D. Aguilera} et al., Classical Quantum Gravity 31, No. 15, Article ID 159502, 3 p. (2014; Zbl 1298.83006) Full Text: DOI
Aguilera, D. N.; Ahlers, H.; Battelier, B.; Bawamia, A.; Bertoldi, A.; Bondarescu, R.; Bongs, K.; Bouyer, P.; Braxmaier, C.; Cacciapuoti, L.; Chaloner, C.; Chwalla, M.; Ertmer, W.; Franz, M.; Gaaloul, N.; Gehler, M.; Gerardi, D.; Gesa, L.; Gürlebeck, N.; Hartwig, J.; Hauth, M.; Hellmig, O.; Herr, W.; Herrmann, S.; Heske, A.; Hinton, A.; Ireland, P.; Jetzer, P.; Johann, U.; Krutzik, M.; Kubelka, A.; Lämmerzahl, C.; Landragin, A.; Lloro, I.; Massonnet, D.; Mateos, I.; Milke, A.; Nofrarias, M.; Oswald, M.; Peters, A.; Posso-Trujillo, K.; Rasel, E.; Rocco, E.; Roura, A.; Rudolph, J.; Schleich, W.; Schubert, C.; Schuldt, T.; Seidel, S.; Sengstock, K.; Sopuerta, C. F.; Sorrentino, F.; Summers, D.; Tino, G. M.; Trenkel, C.; Uzunoglu, N.; von Klitzing, W.; Walser, R.; Wendrich, T.; Wenzlawski, A.; Weßels, P.; Wicht, A.; Wille, E.; Williams, M.; Windpassinger, P.; Zahzam, N. STE-QUEST – test of the universality of free fall using cold atom interferometry. (English) Zbl 1294.83005 Classical Quantum Gravity 31, No. 11, Article ID 115010, 18 p. (2014); corrigendum ibid. 31, No. 15, Article ID 159502, 3 p. (2014). Reviewer: Hans-Jürgen Schmidt (Potsdam) MSC: 83B05 83D05 83C10 85A05 81P15 83C35 83C45 PDFBibTeX XMLCite \textit{D. N. Aguilera} et al., Classical Quantum Gravity 31, No. 11, Article ID 115010, 18 p. (2014; Zbl 1294.83005) Full Text: DOI arXiv
Paterson, Kenneth G.; Schuldt, Jacob C. N.; Sibborn, Dale L. Related randomness attacks for public key encryption. (English) Zbl 1335.94072 Krawczyk, Hugo (ed.), Public-key cryptography – PKC 2014. 17th international conference on practice and theory in public-key cryptography, Buenos Aires, Argentina, March 26–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54630-3/pbk). Lecture Notes in Computer Science 8383, 465-482 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{K. G. Paterson} et al., Lect. Notes Comput. Sci. 8383, 465--482 (2014; Zbl 1335.94072) Full Text: DOI
Hanaoka, Goichiro; Matsuda, Takahiro; Schuldt, Jacob C. N. On the impossibility of constructing efficient key encapsulation and programmable hash functions in prime order groups. (English) Zbl 1296.94120 Safavi-Naini, Reihaneh (ed.) et al., Advances in cryptology – CRYPTO 2012. 32nd annual cryptology conference, Santa Barbara, CA, USA, August 19–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32008-8/pbk). Lecture Notes in Computer Science 7417, 812-831 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{G. Hanaoka} et al., Lect. Notes Comput. Sci. 7417, 812--831 (2012; Zbl 1296.94120) Full Text: DOI
Sakai, Yusuke; Schuldt, Jacob C. N.; Emura, Keita; Hanaoka, Goichiro; Ohta, Kazuo On the security of dynamic group signatures: preventing signature hijacking. (English) Zbl 1291.94196 Fischlin, Marc (ed.) et al., Public key cryptography – PKC 2012. 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-30056-1/pbk). Lecture Notes in Computer Science 7293, 715-732 (2012). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{Y. Sakai} et al., Lect. Notes Comput. Sci. 7293, 715--732 (2012; Zbl 1291.94196) Full Text: DOI
Yamada, Shota; Attrapadung, Nuttapong; Santoso, Bagus; Schuldt, Jacob C. N.; Hanaoka, Goichiro; Kunihiro, Noboru Verifiable predicate encryption and applications to CCA security and anonymous predicate authentication. (English) Zbl 1290.94158 Fischlin, Marc (ed.) et al., Public key cryptography – PKC 2012. 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-30056-1/pbk). Lecture Notes in Computer Science 7293, 243-261 (2012). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{S. Yamada} et al., Lect. Notes Comput. Sci. 7293, 243--261 (2012; Zbl 1290.94158) Full Text: DOI
Paterson, Kenneth G.; Schuldt, Jacob C. N.; Stam, Martijn; Thomson, Susan On the joint security of encryption and signature, revisited. (English) Zbl 1227.94061 Lee, Dong Hoon (ed.) et al., Advances in cryptology – ASIACRYPT 2011. 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4–8, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25384-3/pbk). Lecture Notes in Computer Science 7073, 161-178 (2011). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{K. G. Paterson} et al., Lect. Notes Comput. Sci. 7073, 161--178 (2011; Zbl 1227.94061) Full Text: DOI
Schuldt, Jacob C. N.; Hanaoka, Goichiro Non-transferable user certification secure against authority information leaks and impersonation attacks. (English) Zbl 1428.94112 Lopez, Javier (ed.) et al., Applied cryptography and network security. 9th international conference, ACNS 2011, Nerja, Spain, June 7–10, 2011. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 6715, 413-430 (2011). MSC: 94A62 PDFBibTeX XMLCite \textit{J. C. N. Schuldt} and \textit{G. Hanaoka}, Lect. Notes Comput. Sci. 6715, 413--430 (2011; Zbl 1428.94112) Full Text: DOI
Abdalla, Michel; Birkett, James; Catalano, Dario; Dent, Alexander W.; Malone-Lee, John; Neven, Gregory; Schuldt, Jacob C. N.; Smart, Nigel P. Wildcarded identity-based encryption. (English) Zbl 1208.94037 J. Cryptology 24, No. 1, 42-82 (2011). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{M. Abdalla} et al., J. Cryptology 24, No. 1, 42--82 (2011; Zbl 1208.94037) Full Text: DOI
Schuldt, Jacob C. N.; Matsuura, Kanta On-line non-transferable signatures revisited. (English) Zbl 1291.94199 Catalano, Dario (ed.) et al., Public key cryptography – PKC 2011. 14th international conference on practice and theory in public key cryptography, Taormina, Italy, March 6–9, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19378-1/pbk). Lecture Notes in Computer Science 6571, 369-386 (2011). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{J. C. N. Schuldt} and \textit{K. Matsuura}, Lect. Notes Comput. Sci. 6571, 369--386 (2011; Zbl 1291.94199) Full Text: DOI
Matsuda, Takahiro; Matsuura, Kanta; Schuldt, Jacob C. N. Efficient constructions of signcryption schemes and signcryption composability. (English) Zbl 1252.94085 Roy, Bimal (ed.) et al., Progress in cryptology – INDOCRYPT 2009. 10th international conference on cryptology in India, New Delhi, India, December 13–16, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10627-9/pbk). Lecture Notes in Computer Science 5922, 321-342 (2009). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{T. Matsuda} et al., Lect. Notes Comput. Sci. 5922, 321--342 (2009; Zbl 1252.94085) Full Text: DOI
Chabris, Christopher F.; Laibson, David; Morris, Carrie L.; Schuldt, Jonathon P.; Taubinsky, Dmitry Individual laboratory-measured discount rates predict field behavior. (English) Zbl 1165.91455 J. Risk Uncertain. 37, No. 2-3, 237-269 (2008). MSC: 91D10 91A90 PDFBibTeX XMLCite \textit{C. F. Chabris} et al., J. Risk Uncertain. 37, No. 2--3, 237--269 (2008; Zbl 1165.91455) Full Text: DOI Link
Schuldt, Jacob C. N.; Matsuura, Kanta; Paterson, Kenneth G. Proxy signatures secure against proxy key exposure. (English) Zbl 1162.94400 Cramer, Ronald (ed.), Public key cryptography – PKC 2008. 11th international workshop on practice and theory in public-key cryptography, Barcelona, Spain, March 9–12, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78440-1/pbk). Lecture Notes in Computer Science 4939, 141-161 (2008). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{J. C. N. Schuldt} et al., Lect. Notes Comput. Sci. 4939, 141--161 (2008; Zbl 1162.94400) Full Text: DOI
Birkett, James; Dent, Alexander W.; Neven, Gregory; Schuldt, Jacob C. N. Efficient chosen-ciphertext secure identity-based encryption with wildcards. (English) Zbl 1213.94084 Pieprzyk, Josef (ed.) et al., Information security and privacy. 12th Australasian conference, ACISP 2007. Townsville, Australia, July 2–4, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-73457-4/pbk). Lecture Notes in Computer Science 4586, 274-292 (2007). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{J. Birkett} et al., Lect. Notes Comput. Sci. 4586, 274--292 (2007; Zbl 1213.94084) Full Text: DOI Link
Paterson, Kenneth G.; Schuldt, Jacob C. N. Efficient identity-based signatures secure in the standard model. (English) Zbl 1176.94056 Batten, Lynn Margaret (ed.) et al., Information security and privacy. 11th Australasian conference, ACISP 2006, Melbourne, Australia, July 3–5, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-35458-1/pbk). Lecture Notes in Computer Science 4058, 207-222 (2006). MSC: 94A60 94A62 68P25 PDFBibTeX XMLCite \textit{K. G. Paterson} and \textit{J. C. N. Schuldt}, Lect. Notes Comput. Sci. 4058, 207--222 (2006; Zbl 1176.94056) Full Text: DOI
Haller, Klaus; Schuldt, Heiko; Schek, Hans-Jörg Transactional peer-to-peer information processing: The AMOR approach. (English) Zbl 1022.68659 Chen, Ming-Syan (ed.) et al., Mobile data management. 4th international conference, MDM 2003, Melbourne, Australia, January 21-24, 2003. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2574, 356-362 (2003). MSC: 68U99 68P99 68U35 68M10 PDFBibTeX XMLCite \textit{K. Haller} et al., Lect. Notes Comput. Sci. 2574, 356--362 (2003; Zbl 1022.68659) Full Text: Link
Schuler, Christoph; Schuldt, Heiko; Schek, Hans-Jörg Supporting reliable transactional business processes by publish/subscribe techniques. (English) Zbl 1030.68842 Casati, Fabio (ed.) et al., Technologies for E-services. 2nd international workshop, TES 2001, Rome, Italy, September 14-15, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2193, 118-131 (2001). MSC: 68U99 68U35 68M10 PDFBibTeX XMLCite \textit{C. Schuler} et al., Lect. Notes Comput. Sci. 2193, 118--131 (2001; Zbl 1030.68842) Full Text: Link