Görtz

Results: 55



#Item
11

Your Cloud in my Company: Modern Rights Management Services Revisited Martin Grothe, Paul Rösler, Johanna Jupke, Jan Kaiser, Christian Mainka and Jörg Schwenk Horst Görtz Institute for IT Security, Ruhr-University Boc

Add to Reading List

Source URL: www.nds.rub.de

- Date: 2016-08-02 09:02:23
    12

    Mitgliederliste Horst Görtz Institut für IT-Sicherheit Name Vorname Titel

    Add to Reading List

    Source URL: www.hgi.rub.de

    Language: German - Date: 2015-12-08 10:22:20
      13Cryptography / Integer factorization algorithms / Computational hardness assumptions / E-commerce / RSA / Quadratic sieve / Lattice / Integer factorization

      Implicit Factoring: On Polynomial Time Factoring Given Only an Implicit Hint ∗ Alexander May, Maike Ritzenhofen Horst Görtz Institute for IT-security Faculty of Mathematics Ruhr-University of Bochum, 44780 Bochum, Ger

      Add to Reading List

      Source URL: www.cits.rub.de

      Language: English - Date: 2015-08-28 10:30:32
      14Hacking / Web design / Digital typography / News aggregators / Social engineering / Cross-site scripting / Cross-site request forgery / NoScript / Content Security Policy / JavaScript / Clickjacking / Cascading Style Sheets

      Scriptless Attacks – Stealing the Pie Without Touching the Sill Mario Heiderich, Marcus Niemietz, Felix Schuster, Thorsten Holz, Jörg Schwenk Horst Görtz Institute for IT-Security Ruhr-University Bochum, Germany

      Add to Reading List

      Source URL: www.nds.rub.de

      Language: English - Date: 2012-08-16 02:39:46
      15

      UbiCrypt Summer Schoolcrypt@b-it Summer School on Cryptography July 28 - August 01, 2014 Horst Görtz Institute for IT-Security,

      Add to Reading List

      Source URL: www.ubicrypt.hgi.rub.de

      Language: English - Date: 2014-06-20 05:20:35
        16

        The Gap Between Promise and Reality: On the Insecurity of XOR Arbiter PUFs CHES, September 16th, 2015 Georg T. Becker Horst Görtz Institute for IT-Security, Ruhr University Bochum

        Add to Reading List

        Source URL: www.cryptoexperts.com

        Language: English - Date: 2015-11-13 04:48:41
          17

          Horst Görtz Institute for IT-Security Assessment of Hiding the Higher-Order --what are the achievements versus overheads?-Amir Moradi, Alexander Wild September 16, 2015

          Add to Reading List

          Source URL: www.cryptoexperts.com

          Language: English - Date: 2015-11-13 04:48:41
            18Reconfigurable computing / Electronic engineering / Fabless semiconductor companies / Electronics / Computing / Xilinx / Field-programmable gate array / Virtex / Application-specific integrated circuit / Logic block / SciEngines GmbH

            High Performance ECC over NIST Primes on Commercial FPGAs ECC 2008, Utrecht, September 22-24, 2008 Tim Güneysu Horst Görtz Institute for IT-Security Ruhr University of Bochum, Germany

            Add to Reading List

            Source URL: www.hyperelliptic.org

            Language: English - Date: 2008-10-27 20:01:32
            19

            Exact Cost Estimates for ECC Attacks with Special-Purpose Hardware Jan Pelzl Chair for Communication Security Horst Görtz Institute for IT-Security

            Add to Reading List

            Source URL: www.emsec.rub.de

            Language: English - Date: 2011-01-18 19:29:59
              20

              The Gap Between Promise and Reality: On the Insecurity of XOR Arbiter PUFs Georg T. Becker Horst Görtz Institute for IT-Security, Ruhr Universität Bochum, Germany Abstract. In this paper we demonstrate the first real-

              Add to Reading List

              Source URL: www.emsec.rub.de

              Language: English - Date: 2015-06-17 16:30:38
                UPDATE