| 2008 |
15 | | Stefan Lucks,
Ahmad-Reza Sadeghi,
Christopher Wolf:
Research in Cryptology, Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers
Springer 2008 |
14 | | Andrey Bogdanov,
Thomas Eisenbarth,
Andy Rupp,
Christopher Wolf:
Time-Area Optimized Public-Key Engines: -Cryptosystems as Replacement for Elliptic Curves?.
CHES 2008: 45-61 |
| 2007 |
13 | | Jintai Ding,
Christopher Wolf,
Bo-Yin Yang:
l-Invertible Cycles for Multivariate Quadratic (MQ) Public Key Cryptography.
Public Key Cryptography 2007: 266-281 |
| 2006 |
12 | | Danny De Cock,
Christopher Wolf,
Bart Preneel:
The Belgian Electronic Identity Card (Overview).
Sicherheit 2006: 298-301 |
11 | | Christopher Wolf,
An Braeken,
Bart Preneel:
On the security of stepwise triangular systems.
Des. Codes Cryptography 40(3): 285-302 (2006) |
| 2005 |
10 | | Christopher Wolf,
Stefan Lucks,
Po-Wah Yau:
WEWoRC 2005 - Western European Workshop on Research in Cryptology, July 5-7, 2005, Leuven, Belgium
GI 2005 |
9 | | An Braeken,
Christopher Wolf,
Bart Preneel:
A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes.
CT-RSA 2005: 29-43 |
8 | | An Braeken,
Christopher Wolf,
Bart Preneel:
Normality of Vectorial Functions.
IMA Int. Conf. 2005: 186-200 |
7 | | Jintai Ding,
Jason E. Gower,
Dieter Schmidt,
Christopher Wolf,
Zhijun Yin:
Complexity Estimates for the F4 Attack on the Perturbed Matsumoto-Imai Cryptosystem.
IMA Int. Conf. 2005: 262-277 |
6 | | Christopher Wolf,
Bart Preneel:
Equivalent Keys in HFE, C*, and Variations.
Mycrypt 2005: 33-49 |
5 | | Christopher Wolf,
Bart Preneel:
Large Superfluous Keys in Multivariate Quadratic Asymmetric Systems.
Public Key Cryptography 2005: 275-287 |
4 | | Christopher Wolf,
Bart Preneel:
Applications of Multivariate Quadratic Public Key Systems.
Sicherheit 2005: 413-424 |
| 2004 |
3 | | Christopher Wolf:
Efficient Public Key Generation for HFE and Variations.
Cryptographic Algorithms and their Uses 2004: 78-93 |
2 | | An Braeken,
Christopher Wolf,
Bart Preneel:
A Randomised Algorithm for Checking the Normality of Cryptographic Boolean Functions.
IFIP TCS 2004: 51-66 |
1 | | Christopher Wolf,
An Braeken,
Bart Preneel:
Efficient Cryptanalysis of RSE(2)PKC and RSSE(2)PKC.
SCN 2004: 294-309 |