Christopher Wolf

According to our database1, Christopher Wolf authored at least 42 papers between 2003 and 2015.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Tactile One-Time Pad: Leakage-Resilient Authentication for Smartphones.
Proceedings of the Financial Cryptography and Data Security, 2015

2014
Advanced Algebraic Attack on Trivium.
IACR Cryptol. ePrint Arch., 2014

Continuous Authentication on Mobile Devices by Analysis of Typing Motion Behavior.
Proceedings of the Sicherheit 2014: Sicherheit, 2014

2013
Algebraic Properties of the Cube Attack.
IACR Cryptol. ePrint Arch., 2013

Welt-weites Wählen am Beispiel der IACR.
Proceedings of the 43. Jahrestagung der Gesellschaft für Informatik, 2013

Quantifying the security of graphical passwords: the case of android unlock patterns.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Solving Underdetermined Systems of Multivariate Quadratic Equations Revisited.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

PermissionWatcher: Creating User Awareness of Application Permissions in Mobile Systems.
Proceedings of the Ambient Intelligence - Third International Joint Conference, 2012

Cryptanalysis of Enhanced TTS, STS and All Its Variants, or: Why Cross-Terms Are Important.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012

2011
Equivalent keys in ℳultivariate uadratic public key systems.
J. Math. Cryptol., 2011

Small Linearization: Memory Friendly Solving of Non-Linear Equations over Finite Fields.
IACR Cryptol. ePrint Arch., 2011

Roots of Square: Cryptanalysis of Double-Layer Square and Square+.
IACR Cryptol. ePrint Arch., 2011

Small Public Keys and Fast Verification for Multivariate Quadratic Public Key Systems.
IACR Cryptol. ePrint Arch., 2011

Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

Small Public Keys and Fast Verification for $\mathcal{M}$ ultivariate $\mathcal{Q}$ uadratic Public Key Systems.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011

2010
MQ<sup>*</sup>-IP: An Identity-based Identification Scheme without Number-theoretic Assumptions.
IACR Cryptol. ePrint Arch., 2010

Unravel XL and its variants.
IACR Cryptol. ePrint Arch., 2010

2009
Sicherheitsanalyse von Kreditkarten am Beispiel von EMV.
Proceedings of the 39. Jahrestagung der Gesellschaft für Informatik, Im Focus das Leben, INFORMATIK 2009, Lübeck, Germany, September 28, 2009

2008
Time-Area Optimized Public-Key Engines: MQ-Cryptosystems as Replacement for Elliptic Curves?
IACR Cryptol. ePrint Arch., 2008

Time-Area Optimized Public-Key Engines: -Cryptosystems as Replacement for Elliptic Curves?.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008

2007
<i>l</i>-Invertible Cycles for <i>M</i>ultivariate <i>Q</i>uadratic (<i>MQ</i>) Public Key Cryptography.
Proceedings of the Public Key Cryptography, 2007

2006
On the security of stepwise triangular systems.
Des. Codes Cryptogr., 2006

The Belgian Electronic Identity Card (Overview).
Proceedings of the Sicherheit 2006: Sicherheit, 2006

2005
Equivalent Keys in Multivariate Quadratic Public Key Systems.
IACR Cryptol. ePrint Arch., 2005

Taxonomy of Public Key Schemes based on the problem of Multivariate Quadratic equations.
IACR Cryptol. ePrint Arch., 2005

Multivariate Quadratic Polynomials in Public Key Cryptography.
IACR Cryptol. ePrint Arch., 2005

Large Superfluous Keys in Multivariate Quadratic Asymmetric Systems.
Proceedings of the Public Key Cryptography, 2005

Complexity Estimates for the F<sub>4</sub> Attack on the Perturbed Matsumoto-Imai Cryptosystem.
Proceedings of the Cryptography and Coding, 2005

Normality of Vectorial Functions.
Proceedings of the Cryptography and Coding, 2005

Trusted Computing, or the Gatekeeper.
Proceedings of the Information Society: Emerging Landscapes, 2005

Multivariate quadratic polynomials in public key cryptography.
Univ. Leuven Heverlee, ISBN: 978-9-05-682649-9, 2005

2004
Superfluous Keys in Multivariate Quadratic Asymmetric Systems.
IACR Cryptol. ePrint Arch., 2004

Equivalent Keys in HFE, C<sup>*</sup>, and variations.
IACR Cryptol. ePrint Arch., 2004

Applications of Multivariate Quadratic Public Key Systems.
IACR Cryptol. ePrint Arch., 2004

Asymmetric Cryptography: Hidden Field Equations.
IACR Cryptol. ePrint Arch., 2004

Efficient Cryptanalysis of RSE(2)PKC and RSSE(2)PKC.
IACR Cryptol. ePrint Arch., 2004

Direct Division in Factor Rings.
IACR Cryptol. ePrint Arch., 2004

A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes.
IACR Cryptol. ePrint Arch., 2004

Classification of Highly Nonlinear Boolean Power Functions with a Randomised Algorithm for Checking Normality.
IACR Cryptol. ePrint Arch., 2004

A Randomised Algorithm for Checking the Normality of Cryptographic Boolean Functions.
Proceedings of the Exploring New Frontiers of Theoretical Informatics, 2004

Efficient Public Key Generation for HFE and Variations.
Proceedings of the Cryptographic Algorithms and their Uses, 2004

2003
Efficient Public Key Generation for Multivariate Cryptosystems.
IACR Cryptol. ePrint Arch., 2003


  Loading...