default search action
Christopher Wolf
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2015
- [c25]Sebastian Uellenbeck, Thomas Hupperich, Christopher Wolf, Thorsten Holz:
Tactile One-Time Pad: Leakage-Resilient Authentication for Smartphones. Financial Cryptography 2015: 237-253 - [c24]Frank-M. Quedenfeld, Christopher Wolf:
Advanced Algebraic Attack on Trivium. MACIS 2015: 268-282 - 2014
- [c23]Hugo Gascon, Sebastian Uellenbeck, Christopher Wolf, Konrad Rieck:
Continuous Authentication on Mobile Devices by Analysis of Typing Motion Behavior. Sicherheit 2014: 1-12 - [i20]Frank-M. Quedenfeld, Christopher Wolf:
Advanced Algebraic Attack on Trivium. IACR Cryptol. ePrint Arch. 2014: 893 (2014) - 2013
- [c22]Sebastian Uellenbeck, Markus Dürmuth, Christopher Wolf, Thorsten Holz:
Quantifying the security of graphical passwords: the case of android unlock patterns. CCS 2013: 161-172 - [c21]Christopher Wolf:
Welt-weites Wählen am Beispiel der IACR. GI-Jahrestagung 2013: 819-833 - [i19]Frank-M. Quedenfeld, Christopher Wolf:
Algebraic Properties of the Cube Attack. IACR Cryptol. ePrint Arch. 2013: 800 (2013) - 2012
- [c20]Enrico Thomae, Christopher Wolf:
Cryptanalysis of Enhanced TTS, STS and All Its Variants, or: Why Cross-Terms Are Important. AFRICACRYPT 2012: 188-202 - [c19]Eric Struse, Julian Seifert, Sebastian Üllenbeck, Enrico Rukzio, Christopher Wolf:
PermissionWatcher: Creating User Awareness of Application Permissions in Mobile Systems. AmI 2012: 65-80 - [c18]Enrico Thomae, Christopher Wolf:
Solving Underdetermined Systems of Multivariate Quadratic Equations Revisited. Public Key Cryptography 2012: 156-171 - 2011
- [j2]Christopher Wolf, Bart Preneel:
Equivalent keys in ℳultivariate uadratic public key systems. J. Math. Cryptol. 4(4): 375-415 (2011) - [c17]Albrecht Petzoldt, Enrico Thomae, Stanislav Bulygin, Christopher Wolf:
Small Public Keys and Fast Verification for $\mathcal{M}$ ultivariate $\mathcal{Q}$ uadratic Public Key Systems. CHES 2011: 475-490 - [c16]Enrico Thomae, Christopher Wolf:
Roots of Square: Cryptanalysis of Double-Layer Square and Square+. PQCrypto 2011: 83-97 - [c15]Michael Becher, Felix C. Freiling, Johannes Hoffmann, Thorsten Holz, Sebastian Uellenbeck, Christopher Wolf:
Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices. IEEE Symposium on Security and Privacy 2011: 96-111 - [i18]Albrecht Petzoldt, Enrico Thomae, Stanislav Bulygin, Christopher Wolf:
Small Public Keys and Fast Verification for Multivariate Quadratic Public Key Systems. IACR Cryptol. ePrint Arch. 2011: 294 (2011) - [i17]Enrico Thomae, Christopher Wolf:
Roots of Square: Cryptanalysis of Double-Layer Square and Square+. IACR Cryptol. ePrint Arch. 2011: 431 (2011) - [i16]Christopher Wolf, Enrico Thomae:
Small Linearization: Memory Friendly Solving of Non-Linear Equations over Finite Fields. IACR Cryptol. ePrint Arch. 2011: 669 (2011) - 2010
- [i15]Christopher Wolf, Bart Preneel:
MQ*-IP: An Identity-based Identification Scheme without Number-theoretic Assumptions. IACR Cryptol. ePrint Arch. 2010: 87 (2010) - [i14]Enrico Thomae, Christopher Wolf:
Unravel XL and its variants. IACR Cryptol. ePrint Arch. 2010: 596 (2010)
2000 – 2009
- 2009
- [c14]Christopher Wolf, Jörg Schwenk, Zidu Wang:
Sicherheitsanalyse von Kreditkarten am Beispiel von EMV. GI Jahrestagung 2009: 1732-1743 - 2008
- [c13]Andrey Bogdanov, Thomas Eisenbarth, Andy Rupp, Christopher Wolf:
Time-Area Optimized Public-Key Engines: -Cryptosystems as Replacement for Elliptic Curves?. CHES 2008: 45-61 - [e2]Stefan Lucks, Ahmad-Reza Sadeghi, Christopher Wolf:
Research in Cryptology, Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers. Lecture Notes in Computer Science 4945, Springer 2008, ISBN 978-3-540-88352-4 [contents] - [i13]Andrey Bogdanov, Thomas Eisenbarth, Andy Rupp, Christopher Wolf:
Time-Area Optimized Public-Key Engines: MQ-Cryptosystems as Replacement for Elliptic Curves? IACR Cryptol. ePrint Arch. 2008: 349 (2008) - 2007
- [c12]Jintai Ding, Christopher Wolf, Bo-Yin Yang:
l-Invertible Cycles for Multivariate Quadratic (MQ) Public Key Cryptography. Public Key Cryptography 2007: 266-281 - 2006
- [j1]Christopher Wolf, An Braeken, Bart Preneel:
On the security of stepwise triangular systems. Des. Codes Cryptogr. 40(3): 285-302 (2006) - [c11]Danny De Cock, Christopher Wolf, Bart Preneel:
The Belgian Electronic Identity Card (Overview). Sicherheit 2006: 298-301 - 2005
- [b1]Christopher Wolf:
Multivariate quadratic polynomials in public key cryptography. Univ. Leuven Heverlee 2005, ISBN 978-9-05-682649-9, pp. I-XXIV, 1-155 - [c10]An Braeken, Christopher Wolf, Bart Preneel:
A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes. CT-RSA 2005: 29-43 - [c9]Klaus Kursawe, Christopher Wolf:
Trusted Computing, or the Gatekeeper. The Information Society 2005: 339-354 - [c8]An Braeken, Christopher Wolf, Bart Preneel:
Normality of Vectorial Functions. IMACC 2005: 186-200 - [c7]Jintai Ding, Jason E. Gower, Dieter Schmidt, Christopher Wolf, Zhijun Yin:
Complexity Estimates for the F4 Attack on the Perturbed Matsumoto-Imai Cryptosystem. IMACC 2005: 262-277 - [c6]Christopher Wolf, Bart Preneel:
Equivalent Keys in HFE, C*, and Variations. Mycrypt 2005: 33-49 - [c5]Christopher Wolf, Bart Preneel:
Large Superfluous Keys in Multivariate Quadratic Asymmetric Systems. Public Key Cryptography 2005: 275-287 - [c4]Christopher Wolf, Bart Preneel:
Applications of Multivariate Quadratic Public Key Systems. Sicherheit 2005: 413-424 - [e1]Christopher Wolf, Stefan Lucks, Po-Wah Yau:
WEWoRC 2005 - Western European Workshop on Research in Cryptology, July 5-7, 2005, Leuven, Belgium. LNI P-74, GI 2005, ISBN 3-88579-403-9 [contents] - [i12]Christopher Wolf, Bart Preneel:
Taxonomy of Public Key Schemes based on the problem of Multivariate Quadratic equations. IACR Cryptol. ePrint Arch. 2005: 77 (2005) - [i11]Christopher Wolf:
Multivariate Quadratic Polynomials in Public Key Cryptography. IACR Cryptol. ePrint Arch. 2005: 393 (2005) - [i10]Christopher Wolf, Bart Preneel:
Equivalent Keys in Multivariate Quadratic Public Key Systems. IACR Cryptol. ePrint Arch. 2005: 464 (2005) - 2004
- [c3]Christopher Wolf:
Efficient Public Key Generation for HFE and Variations. Cryptographic Algorithms and their Uses 2004: 78-93 - [c2]An Braeken, Christopher Wolf, Bart Preneel:
A Randomised Algorithm for Checking the Normality of Cryptographic Boolean Functions. IFIP TCS 2004: 51-66 - [c1]Christopher Wolf, An Braeken, Bart Preneel:
Efficient Cryptanalysis of RSE(2)PKC and RSSE(2)PKC. SCN 2004: 294-309 - [i9]Christopher Wolf, Bart Preneel:
Asymmetric Cryptography: Hidden Field Equations. IACR Cryptol. ePrint Arch. 2004: 72 (2004) - [i8]An Braeken, Christopher Wolf, Bart Preneel:
Classification of Highly Nonlinear Boolean Power Functions with a Randomised Algorithm for Checking Normality. IACR Cryptol. ePrint Arch. 2004: 214 (2004) - [i7]An Braeken, Christopher Wolf, Bart Preneel:
A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes. IACR Cryptol. ePrint Arch. 2004: 222 (2004) - [i6]Christopher Wolf, An Braeken, Bart Preneel:
Efficient Cryptanalysis of RSE(2)PKC and RSSE(2)PKC. IACR Cryptol. ePrint Arch. 2004: 237 (2004) - [i5]Christopher Wolf, Bart Preneel:
Applications of Multivariate Quadratic Public Key Systems. IACR Cryptol. ePrint Arch. 2004: 263 (2004) - [i4]Patrick Fitzpatrick, Christopher Wolf:
Direct Division in Factor Rings. IACR Cryptol. ePrint Arch. 2004: 353 (2004) - [i3]Christopher Wolf, Bart Preneel:
Equivalent Keys in HFE, C*, and variations. IACR Cryptol. ePrint Arch. 2004: 360 (2004) - [i2]Christopher Wolf, Bart Preneel:
Superfluous Keys in Multivariate Quadratic Asymmetric Systems. IACR Cryptol. ePrint Arch. 2004: 361 (2004) - 2003
- [i1]Christopher Wolf:
Efficient Public Key Generation for Multivariate Cryptosystems. IACR Cryptol. ePrint Arch. 2003: 89 (2003)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:07 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint