Christopher Wolf
Christopher Wolf
Ruhr-University Bochum, Horst Görtz Institute for IT-Security
Verified email at
Cited by
Cited by
Environmental impacts as buying criteria for third party logistical services
C Wolf, S Seuring
International Journal of Physical Distribution & Logistics Management 40 (1 …, 2010
Mobile security catching up? revealing the nuts and bolts of the security of mobile devices
M Becher, FC Freiling, J Hoffmann, T Holz, S Uellenbeck, C Wolf
2011 IEEE Symposium on Security and Privacy, 96-111, 2011
Quantifying the security of graphical passwords: The case of android unlock patterns
S Uellenbeck, M Dürmuth, C Wolf, T Holz
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
Taxonomy of public key schemes based on the problem of multivariate quadratic equations
C Wolf, B Preneel
Cryptology ePrint Archive, 2005
Patients' preferences for subcutaneous trastuzumab versus conventional intravenous infusion for the adjuvant treatment of HER2-positive early breast cancer: final analysis of …
X Pivot, J Gligorov, V Müller, G Curigliano, A Knoop, S Verma, V Jenkins, ...
Annals of oncology 25 (10), 1979-1987, 2014
Continuous authentication on mobile devices by analysis of typing motion behavior
H Gascon, S Uellenbeck, C Wolf, K Rieck
Gesellschaft für Informatik eV, 2014
Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics): Preface
M Abe, K Aoki, G Ateniese, R Avanzi, Z Beerliová, O Billet, A Biryukov, ...
Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2006
Time-area optimized public-key engines:-cryptosystems as replacement for elliptic curves?
A Bogdanov, T Eisenbarth, A Rupp, C Wolf
International workshop on cryptographic hardware and embedded systems, 45-61, 2008
Solving underdetermined systems of multivariate quadratic equations revisited
E Thomae, C Wolf
International workshop on public key cryptography, 156-171, 2012
A study of the security of Unbalanced Oil and Vinegar signature schemes
A Braeken, C Wolf, B Preneel
Cryptographers’ Track at the RSA Conference, 29-43, 2005
Multivariate quadratic polynomials in public key cryptography
C Wolf
Katholieke Universiteit Leuven, 2005
Efficient cryptanalysis of rse (2) pkc and rsse (2) pkc
C Wolf, A Braeken, B Preneel
Security in Communication Networks: 4th International Conference, SCN 2004 …, 2005
ℓ-Invertible Cycles for ultivariate uadratic () public key cryptography
J Ding, C Wolf, BY Yang
International Workshop on Public Key Cryptography, 266-281, 2007
Large superfluous keys in ultivariate uadratic asymmetric systems
C Wolf, B Preneel
International Workshop on Public Key Cryptography, 275-287, 2005
Phase IB study of the EpCAM antibody adecatumumab combined with docetaxel in patients with EpCAM-positive relapsed or refractory advanced-stage breast cancer
M Schmidt, D Rüttinger, M Sebastian, CA Hanusch, N Marschner, ...
Annals of oncology 23 (9), 2306-2313, 2012
Equivalent Keys in HFE, C*, and Variations
C Wolf, B Preneel
International Conference on Cryptology in Malaysia, 33-49, 2005
Influence of side-effects on early therapy persistence with letrozole in post-menopausal patients with early breast cancer: Results of the prospective EvAluate-TM study
N Nabieva, T Fehm, L Haeberle, J de Waal, M Rezai, B Baier, G Baake, ...
European journal of cancer 96, 82-90, 2018
Equivalent keys in ℳultivariate uadratic public key systems
C Wolf, B Preneel
Journal of Mathematical Cryptology 4 (4), 375-415, 2011
Influence of patient and tumor characteristics on early therapy persistence with letrozole in postmenopausal women with early breast cancer: results of the prospective Evaluate …
N Nabieva, S Kellner, T Fehm, L Haeberle, J de Waal, M Rezai, B Baier, ...
Annals of Oncology 29 (1), 186-192, 2018
Small Public Keys and Fast Verification for ultivariate uadratic Public Key Systems
A Petzoldt, E Thomae, S Bulygin, C Wolf
International Workshop on Cryptographic Hardware and Embedded Systems, 475-490, 2011
The system can't perform the operation now. Try again later.
Articles 1–20