Rainer Steinwandt
Rainer Steinwandt
Verified email at
Cited by
Cited by
Applying Grover’s algorithm to AES: quantum resource estimates
M Grassl, B Langenberg, M Roetteler, R Steinwandt
International Workshop on Post-Quantum Cryptography, 29-43, 2016
Multi-authority attribute-based encryption with honest-but-curious central authority
V Božović, D Socek, R Steinwandt, VI Villányi
International Journal of Computer Mathematics 89 (3), 268-283, 2012
Reducing the cost of implementing the advanced encryption standard as a quantum circuit
B Langenberg, H Pham, R Steinwandt
IEEE Transactions on Quantum Engineering 1, 1-12, 2020
A practical attack on some braid group based cryptographic primitives
D Hofheinz, R Steinwandt
Public Key Cryptography—PKC 2003: 6th International Workshop on Practice …, 2002
Secure group key establishment revisited
JM Bohli, MI González Vasco, R Steinwandt
International Journal of Information Security 6, 243-254, 2007
An algebra for composing enterprise privacy policies
M Backes, M Dürmuth, R Steinwandt
Computer Security–ESORICS 2004: 9th European Symposium on Research in …, 2004
A note on quantum related-key attacks
M Roetteler, R Steinwandt
Information Processing Letters 115 (1), 40-44, 2015
Differential power analysis of a McEliece cryptosystem
C Chen, T Eisenbarth, I Von Maurich, R Steinwandt
Applied Cryptography and Network Security: 13th International Conference …, 2015
Cryptanalysis of the Tillich–Zémor hash function
M Grassl, I Ilić, S Magliveras, R Steinwandt
Journal of cryptology 24 (1), 148-156, 2011
(Password) authenticated key establishment: From 2-party to group
M Abdalla, JM Bohli, MIG Vasco, R Steinwandt
Theory of Cryptography: 4th Theory of Cryptography Conference, TCC 2007 …, 2007
An attack on the isomorphisms of polynomials problem with one secret
W Geiselmann, W Meier, R Steinwandt
International Journal of Information Security 2, 59-64, 2003
Quantum circuits for -multiplication with subquadratic gate count
S Kepley, R Steinwandt
Quantum Information Processing 14, 2373-2386, 2015
Obstacles in two public key cryptosystems based on group factorizations
MIG Vasco, R Steinwandt
Tatra Mt. Math. Publ 25 (23), 23-37, 2002
Attacking the affine parts of SFlash
W Geiselmann, R Steinwandt, T Beth
Cryptography and Coding: 8th IMA International Conference Cirencester, UK …, 2001
Scalable hardware for sparse systems of linear equations, with applications to integer factorization
W Geiselmann, A Shamir, R Steinwandt, E Tromer
Cryptographic Hardware and Embedded Systems–CHES 2005: 7th International …, 2005
Initiator-resilient universally composable key exchange
D Hofheinz, J Müller-Quade, R Steinwandt
European Symposium on Research in Computer Security, 61-84, 2003
On minimal length factorizations of finite groups
MIG Vasco, M Rötteler, R Steinwandt
Experimental Mathematics 12 (1), 1-12, 2003
Group theoretic cryptography
MIG Vasco, R Steinwandt
CRC Press, 2015
Weak Keys in MST1
JM Bohli, R Steinwandt, MIG Vasco, C Martínez
Designs, Codes and Cryptography 37, 509-524, 2005
A dedicated sieving hardware
W Geiselmann, R Steinwandt
Public Key Cryptography—PKC 2003: 6th International Workshop on Practice …, 2002
The system can't perform the operation now. Try again later.
Articles 1–20