The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications of "Bodo Möller" ( http://dblp.L3S.de/Authors/Bodo_Möller )

  Author page on DBLP  Author page in RDF  Community of Bodo Möller in ASPL-2

Publication years (Num. hits)
2000-2005 (18) 2006-2011 (15) 2015-2016 (2)
Publication types (Num. hits)
article(7) incollection(12) inproceedings(15) phdthesis(1)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 14 occurrences of 12 keywords

Results
Found 36 publication records. Showing 35 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Adam Langley, Nagendra Modadugu, Bodo Möller Transport Layer Security (TLS) False Start. Search on Bibsonomy RFC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Bodo Möller, Adam Langley TLS Fallback Signaling Cipher Suite Value (SCSV) for Preventing Protocol Downgrade Attacks. Search on Bibsonomy RFC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Bodo Möller Right-to-Left Exponentiation. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Bodo Möller Simultaneous Exponentiation. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Bodo Möller Sliding Window Exponentiation. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Bodo Möller Signed Digit Exponentiation. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Bodo Möller 2k-AryExponentiation. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Bodo Möller Binary Exponentiation. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Bodo Möller, Andy Rupp Faster Multi-exponentiation through Caching: Accelerating (EC)DSA Signature Verification. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF embedded cryptography, elliptic curve cryptography, exponentiation, Efficient implementation, DSA, ECDSA
1Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, Bodo Möller, David Pointcheval Strong password-based authentication in TLS using the three-party group Diffie?Hellman protocol. Search on Bibsonomy IJSN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Bodo Möller, Andy Rupp Faster Multi-Exponentiation through Caching: Accelerating (EC)DSA Signature Verification. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2007 DBLP  BibTeX  RDF
1Tim Güneysu, Bodo Möller, Christof Paar New Protection Mechanisms for Intellectual Property in Reconfigurable Logic. Search on Bibsonomy FCCM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Bodo Möller Anmerkungen zur Gültigkeit von Zertifikaten. Search on Bibsonomy GI Jahrestagung (2) The full citation details ... 2007 DBLP  BibTeX  RDF
1Tim Güneysu, Bodo Möller, Christof Paar Dynamic Intellectual Property Protection for Reconfigurable Devices. Search on Bibsonomy FPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Sebastian Gajek, Lijun Liao, Bodo Möller, Jörg Schwenk SSL-over-SOAP: Towards a Token-based Key Establishment Framework for Web Services. Search on Bibsonomy WEWST The full citation details ... 2007 DBLP  BibTeX  RDF
1Simon Blake-Wilson, Nelson Bolyard, Vipul Gupta, Chris Hawk, Bodo Möller Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS). Search on Bibsonomy RFC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, Bodo Möller, David Pointcheval Provably secure password-based authentication in TLS. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF encrypted key exchange, password authentication, TLS
1Bodo Möller Sliding Window Exponentiation. Search on Bibsonomy Encyclopedia of Cryptography and Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Bodo Möller Simultaneous Exponentiation. Search on Bibsonomy Encyclopedia of Cryptography and Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Bodo Möller Signed Digit Exponentiation. Search on Bibsonomy Encyclopedia of Cryptography and Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Bodo Möller Right-to-Left Exponentiation. Search on Bibsonomy Encyclopedia of Cryptography and Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Bodo Möller 2k-Ary Exponentiation. Search on Bibsonomy Encyclopedia of Cryptography and Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Bodo Möller Binary exponentiation. Search on Bibsonomy Encyclopedia of Cryptography and Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Bodo Möller A Public-Key Encryption Scheme with Pseudo-random Ciphertexts. Search on Bibsonomy ESORICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Bodo Möller Fractional Windows Revisited: Improved Signed-Digit Representations for Efficient Exponentiation. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF elliptic curve cryptography, Efficient implementations
1Bodo Möller Provably Secure Public-Key Encryptionfor Length-Preserving Chaumian Mixes. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Bodo Möller Public key cryptography: theory and practice. Search on Bibsonomy 2003   RDF
1Bodo Möller Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2002 DBLP  BibTeX  RDF
1Bodo Möller Parallelizable Elliptic Curve Point Multiplication Method with Resistance against Side-Channel Attacks. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Tetsuya Izu, Bodo Möller, Tsuyoshi Takagi Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF side channel attacks, elliptic curve cryptosystems, scalar multiplication, window method, memory constraints
1Bodo Möller Improved Techniques for Fast Exponentiation. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Bodo Möller Algorithms for Multi-exponentiation. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Bodo Möller Securing Elliptic Curve Point Multiplication against Side-Channel Attacks. Search on Bibsonomy ISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Birgit Henhapl, Bodo Möller Public-Key-Infrastrukturen. Search on Bibsonomy HMD - Praxis Wirtschaftsinform. The full citation details ... 2000 DBLP  BibTeX  RDF
1Safuat Hamdy, Bodo Möller Security of Cryptosystems Based on Class Groups of Imaginary Quadratic Orders. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #35 of 35 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license