Environmental impacts as buying criteria for third party logistical services C Wolf, S Seuring International Journal of Physical Distribution & Logistics Management, 2010 | 369 | 2010 |
Mobile security catching up? revealing the nuts and bolts of the security of mobile devices M Becher, FC Freiling, J Hoffmann, T Holz, S Uellenbeck, C Wolf 2011 IEEE Symposium on Security and Privacy, 96-111, 2011 | 317 | 2011 |
Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics): Preface M Abe, K Aoki, G Ateniese, R Avanzi, Z Beerliová, O Billet, A Biryukov, ... Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2006 | 291 | 2006 |
Quantifying the security of graphical passwords: The case of android unlock patterns S Uellenbeck, M Dürmuth, C Wolf, T Holz Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 266 | 2013 |
Taxonomy of public key schemes based on the problem of multivariate quadratic equations C Wolf, B Preneel Cryptology ePrint Archive, 2005 | 184 | 2005 |
Continuous authentication on mobile devices by analysis of typing motion behavior H Gascon, S Uellenbeck, C Wolf, K Rieck Sicherheit 2014–Sicherheit, Schutz und Zuverlässigkeit, 2014 | 150 | 2014 |
Time-Area Optimized Public-Key Engines: -Cryptosystems as Replacement for Elliptic Curves? A Bogdanov, T Eisenbarth, A Rupp, C Wolf Cryptographic Hardware and Embedded Systems–CHES 2008: 10th International …, 2008 | 112 | 2008 |
Solving underdetermined systems of multivariate quadratic equations revisited E Thomae, C Wolf Public Key Cryptography–PKC 2012: 15th International Conference on Practice …, 2012 | 105 | 2012 |
A study of the security of Unbalanced Oil and Vinegar signature schemes A Braeken, C Wolf, B Preneel Topics in Cryptology–CT-RSA 2005: The Cryptographers’ Track at the RSA …, 2005 | 97 | 2005 |
Multivariate quadratic polynomials in public key cryptography C Wolf Katholieke Universiteit Leuven, 2005 | 93 | 2005 |
Efficient cryptanalysis of rse (2) pkc and rsse (2) pkc C Wolf, A Braeken, B Preneel Security in Communication Networks: 4th International Conference, SCN 2004 …, 2005 | 84 | 2005 |
l-Invertible Cycles for Multivariate Quadratic J Ding, C Wolf, BY Yang Public Key Cryptography–PKC 2007, 266, 2007 | 76 | 2007 |
Large Superfluous Keys in ultivariate uadratic Asymmetric Systems C Wolf, B Preneel Public Key Cryptography-PKC 2005: 8th International Workshop on Theory and …, 2005 | 73 | 2005 |
Equivalent Keys in HFE, C*, and Variations. C Wolf, B Preneel Mycrypt 5, 33-49, 2005 | 51 | 2005 |
Equivalent keys in ℳultivariate uadratic public key systems C Wolf, B Preneel Journal of Mathematical Cryptology 4 (4), 375-415, 2011 | 38 | 2011 |
Small Public Keys and Fast Verification for ultivariate uadratic Public Key Systems A Petzoldt, E Thomae, S Bulygin, C Wolf Cryptographic Hardware and Embedded Systems–CHES 2011: 13th International …, 2011 | 38 | 2011 |
The Belgian Electronic Identity Card (Overview). D De Cock, C Wolf, B Preneel Sicherheit 77, 298-301, 2006 | 38 | 2006 |
Cryptanalysis of enhanced TTS, STS and all its variants, or: Why cross-terms are important E Thomae, C Wolf Progress in Cryptology-AFRICACRYPT 2012: 5th International Conference on …, 2012 | 30 | 2012 |
On the security of stepwise triangular systems C Wolf, A Braeken, B Preneel Designs, Codes and Cryptography 40 (3), 285-302, 2006 | 30 | 2006 |
Asymmetric cryptography: Hidden field equations C Wolf, B Preneel Cryptology ePrint Archive, 2004 | 30 | 2004 |