Steffen Reith

According to our database1, Steffen Reith authored at least 27 papers between 1998 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Evaluating an Open-Source Hardware Approach from HDL to GDS for a Security Chip Design - a Review of the Final Stage of Project HEP.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2024

2023
Verified Value Chains, Innovation and Competition.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

2020
LMS vs XMSS: Comparison of Stateful Hash-Based Signature Schemes on ARM Cortex-M4.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2020, 2020

2019
On Lions and Elligators: An Efficient Constant-Time Implementation of CSIDH.
Proceedings of the Post-Quantum Cryptography - 10th International Conference, 2019

2018
Souveränität und die IT-Wertschöpfungskette.
Datenschutz und Datensicherheit, 2018

Open Source Value Chains for Addressing Security Issues Efficiently.
Proceedings of the 2018 IEEE International Conference on Software Quality, 2018

A Faster Way to the CSIDH.
Proceedings of the Progress in Cryptology - INDOCRYPT 2018, 2018

2017
On hybrid SIDH schemes using Edwards and Montgomery curve arithmetic.
IACR Cryptol. ePrint Arch., 2017

2013
On a FPGA-based method for authentication using Edwards curves.
Proceedings of the 2013 8th International Workshop on Reconfigurable and Communication-Centric Systems-on-Chip (ReCoSoC), 2013

2012
Side-channel resistant AES architecture utilizing randomized composite field representations.
Proceedings of the 2012 International Conference on Field-Programmable Technology, 2012

2010
The Complexity of Problems for Quantified Constraints.
Theory Comput. Syst., 2010

On FPGA-based implementations of Gröstl.
IACR Cryptol. ePrint Arch., 2010

Boolean Circuits as a Data Structure for Boolean Functions: Efficient Algorithms and Hard Problems
Log. Methods Comput. Sci., 2010

On FPGA-Based Implementations of the SHA-3 Candidate Grøstl.
Proceedings of the ReConFig'10: 2010 International Conference on Reconfigurable Computing and FPGAs, 2010

2009
On Optimized FPGA Implementations of the SHA-3 Candidate Groestl.
IACR Cryptol. ePrint Arch., 2009

2005
Bases for Boolean co-clones.
Inf. Process. Lett., 2005

Quantified Constraints: The Complexity of Decision and Counting for Bounded Alternation
Electron. Colloquium Comput. Complex., 2005

2004
The Complexity of Boolean Constraint Isomorphism.
Proceedings of the STACS 2004, 2004

2003
On the Complexity of Some Equivalence Problems for Propositional Calculi.
Proceedings of the Mathematical Foundations of Computer Science 2003, 2003

2002
Equivalence and Isomorphism for Boolean Constraint Satisfaction.
Proceedings of the Computer Science Logic, 16th International Workshop, 2002

2001
Generalized satisfiability problems.
PhD thesis, 2001

A polynomial-time approximation scheme for base station positioning in UMTS networks.
Proceedings of the 5th International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications (DIAL-M 2001), 2001

2000
A note on closure properties of logspace MOD classes.
Inf. Process. Lett., 2000

Optimal Satisfiability for Propositional Calculi and Constraint Satisfaction Problems.
Proceedings of the Mathematical Foundations of Computer Science 2000, 2000

The Complexity of Base Station Positioning in Cellular Networks.
Proceedings of the ICALP Workshops 2000, 2000

1998
The Complexity of Computing Optimal Assignments of Generalized Propositional Formulae
Electron. Colloquium Comput. Complex., 1998

On Boolean Lowness and Boolean Highness.
Proceedings of the Computing and Combinatorics, 4th Annual International Conference, 1998


  Loading...