Bernd Meyer

Affiliations:
  • Siemens Corporate Technology, Munich, Germany
  • Saarland University, Saarbrücken, Germany


According to our database1, Bernd Meyer authored at least 13 papers between 1992 and 2008.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2008
SPICE Simulation of a "Provably Secure" True Random Number Generator.
IACR Cryptol. ePrint Arch., 2008

2007
Attacking Unlinkability: The Importance of Context.
Proceedings of the Privacy Enhancing Technologies, 7th International Symposium, 2007

2006
Linking Anonymous Transactions: The Consistent View Attack.
Proceedings of the Privacy Enhancing Technologies, 6th International Workshop, 2006

2002
Cryptographic methods for collusion-secure fingerprinting of digital data.
Comput. Electr. Eng., 2002

2000
Differential Fault Attacks on Elliptic Curve Cryptosystems.
Proceedings of the Advances in Cryptology, 2000

1998
Ensuring the Integrity of Agent-Based Computations by Short Proofs.
Proceedings of the Mobile Agents, Second International Workshop, 1998

Visual Cryptography - How to Use Images to Share a Secret.
Proceedings of the Informatik '98, 1998

1997
Protocols for Collusion-Secure Asymmetric Fingerprinting (Extended Abstract).
Proceedings of the STACS 97, 14th Annual Symposium on Theoretical Aspects of Computer Science, Lübeck, Germany, February 27, 1997

1996
A Public Key Cryptosystem Based on Elliptic Curves over Z/nZ Equivalent to Factoring.
Proceedings of the Advances in Cryptology, 1996

Cryptographic Protocols Based on Real-Quadratic A-fields.
Proceedings of the Advances in Cryptology, 1996

1995
Zur Trennung von Klassen ununterscheidbarer Ensembles.
PhD thesis, 1995

1994
Constructive Separation of Classes of Indistinguishable Ensembles.
Proceedings of the Ninth Annual Structure in Complexity Theory Conference, Amsterdam, The Netherlands, June 28, 1994

1992
Tools for Proving Zero Knowledge.
Proceedings of the Advances in Cryptology, 1992


  Loading...