Gerhard Hoffmann

According to our database1, Gerhard Hoffmann authored at least 8 papers between 1989 and 2013.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
Code-Based Identification and Signature Schemes in Software.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

2012
An Improved Threshold Ring Signature Scheme Based on Error Correcting Codes.
Proceedings of the Arithmetic of Finite Fields - 4th International Workshop, 2012

Efficient Implementation of a CCA2-Secure Variant of McEliece Using Generalized Srivastava Codes.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

Improving the Performance of the SYND Stream Cipher.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012

2011
GPU Implementation of the Keccak Hash Function Family.
Proceedings of the Information Security and Assurance - International Conference, 2011

Recent Progress in Code-Based Cryptography.
Proceedings of the Information Security and Assurance - International Conference, 2011

1990
Authentication and Access Control in a Distributed System.
Proceedings of the ESORICS 90, 1990

1989
Computer-Würmer, eine Bedrohung für vernetzte Systeme-Ansätze zur Erkennung und Abwehr.
Proceedings of the GI, 1989


  Loading...