Buchmann, Johannes
Overview
Works:  131 works in 417 publications in 4 languages and 7,582 library holdings 

Genres:  Conference papers and proceedings Academic theses 
Roles:  Author, Editor, dgs, Other, htt, Honoree, Correspondent, Creator 
Classifications:  QA268, 003.54 
Publication Timeline
.
Most widely held works by
Johannes Buchmann
Introduction to cryptography by
J.A Buchmann(
Book
)
38 editions published between 2000 and 2013 in English and German and held by 1,005 WorldCat member libraries worldwide
"Cryptography is a key technology in electronic security systems. It is used to keep data secret, digitally sign documents, access control, and so forth. Users therefore should not only know how its techniques work but they must also be able to estimate their efficiency and security. Based on courses fought by the author, this book explains the basic methods of modern cryptography. It is written for readers with only basic mathematical knowledge who are interested in modern cryptographic algorithms and their mathematical foundation."Jacket
38 editions published between 2000 and 2013 in English and German and held by 1,005 WorldCat member libraries worldwide
"Cryptography is a key technology in electronic security systems. It is used to keep data secret, digitally sign documents, access control, and so forth. Users therefore should not only know how its techniques work but they must also be able to estimate their efficiency and security. Based on courses fought by the author, this book explains the basic methods of modern cryptography. It is written for readers with only basic mathematical knowledge who are interested in modern cryptographic algorithms and their mathematical foundation."Jacket
Einführung in die Kryptographie by
Buchmann(
Book
)
39 editions published between 1999 and 2016 in 3 languages and held by 801 WorldCat member libraries worldwide
Dieses Kryptographiebuch behandelt die grundlegenden Techniken der modernen Kryptographie. Es eignet sich hervorragend für Studierende der Mathematik und der Informatik ab dem dritten Semester. Das Buch setzt nur minimale Kenntnisse voraus und vermittelt auf elementare Weise die notwendigen mathematischen Kenntnisse, insbesondere die aus der Zahlentheorie. Instruktive Beispiele sowie zahlreiche Übungsaufgaben (zum Teil mit Lösungen) ermöglichen eine Vertiefung des Stoffes. Die Leser werden durch diese Einführung in die Lage versetzt, fortgeschrittene Literatur zur Kryptographie zu verstehen
39 editions published between 1999 and 2016 in 3 languages and held by 801 WorldCat member libraries worldwide
Dieses Kryptographiebuch behandelt die grundlegenden Techniken der modernen Kryptographie. Es eignet sich hervorragend für Studierende der Mathematik und der Informatik ab dem dritten Semester. Das Buch setzt nur minimale Kenntnisse voraus und vermittelt auf elementare Weise die notwendigen mathematischen Kenntnisse, insbesondere die aus der Zahlentheorie. Instruktive Beispiele sowie zahlreiche Übungsaufgaben (zum Teil mit Lösungen) ermöglichen eine Vertiefung des Stoffes. Die Leser werden durch diese Einführung in die Lage versetzt, fortgeschrittene Literatur zur Kryptographie zu verstehen
Postquantum cryptography by
International Workshop on Post Quantum Cryptography(
)
23 editions published between 2008 and 2010 in English and Undetermined and held by 624 WorldCat member libraries worldwide
Quantum computers may break popular publickey cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantumcomputer attacks: in particular, postquantum publickey encryption systems and postquantum publickey signature systems
23 editions published between 2008 and 2010 in English and Undetermined and held by 624 WorldCat member libraries worldwide
Quantum computers may break popular publickey cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantumcomputer attacks: in particular, postquantum publickey encryption systems and postquantum publickey signature systems
Binary quadratic forms : an algorithmic approach by
Johannes Buchmann(
)
20 editions published between 2007 and 2010 in English and Undetermined and held by 593 WorldCat member libraries worldwide
"The book deals with algorithmic problems related to binary quadratic forms, such as finding the representations of an integer by a form with integer coefficients, finding the minimum of a form with real coefficients and deciding equivalence of two forms." "In order to solve those problems, the book introduces the reader to important areas of number theory such as diophantine equations, reduction theory of quadratic forms, geometry of numbers and algebraic number theory. The book explains applications to cryptography . It requires only basic mathematical knowledge."Jacket
20 editions published between 2007 and 2010 in English and Undetermined and held by 593 WorldCat member libraries worldwide
"The book deals with algorithmic problems related to binary quadratic forms, such as finding the representations of an integer by a form with integer coefficients, finding the minimum of a form with real coefficients and deciding equivalence of two forms." "In order to solve those problems, the book introduces the reader to important areas of number theory such as diophantine equations, reduction theory of quadratic forms, geometry of numbers and algebraic number theory. The book explains applications to cryptography . It requires only basic mathematical knowledge."Jacket
Internet privacy : eine multidisziplinäre Bestandsaufnahme by
Johannes Buchmann(
)
15 editions published between 2012 and 2014 in English and German and held by 578 WorldCat member libraries worldwide
A thorough multidisciplinary analysis of various perspectives on internet privacy was published as the first volume of a study, revealing the results of the achatech project "Internet Privacy  A Culture of Privacy and Trust on the Internet." The second publication from this project presents integrated, interdisciplinary options for improving privacy on the Internet utilising a normative, valueoriented approach. The ways in which privacy promotes and preconditions fundamental societal values and how privacy violations endanger the flourishing of said values are exemplified. The conditions which must be fulfilled in order to achieve a culture of privacy and trust on the internet are illuminated. This volume presents options for policymakers, educators, businesses and technology experts how to facilitate solutions for more privacy on the Internet and identifies further research requirements in this area
15 editions published between 2012 and 2014 in English and German and held by 578 WorldCat member libraries worldwide
A thorough multidisciplinary analysis of various perspectives on internet privacy was published as the first volume of a study, revealing the results of the achatech project "Internet Privacy  A Culture of Privacy and Trust on the Internet." The second publication from this project presents integrated, interdisciplinary options for improving privacy on the Internet utilising a normative, valueoriented approach. The ways in which privacy promotes and preconditions fundamental societal values and how privacy violations endanger the flourishing of said values are exemplified. The conditions which must be fulfilled in order to achieve a culture of privacy and trust on the internet are illuminated. This volume presents options for policymakers, educators, businesses and technology experts how to facilitate solutions for more privacy on the Internet and identifies further research requirements in this area
Postquantum cryptography : second international workshop, PQCrypto 2008 Cincinnati, OH, USA, October 1719, 2008 proceedings by
David Hutchison(
)
19 editions published in 2008 in English and held by 512 WorldCat member libraries worldwide
This book constitutes the refereed proceedings of the Second International Workshop on PostQuantum Cryptography, PQCrypto 2008, held in Cincinnati, OH, USA, in October 2008. The 15 revised full papers presented were carefully reviewed and selected from numerous submissions. Quantum computers are predicted to break existing public key cryptosystems within the next decade. Postquantum cryptography is a new fast developing area, where public key schemes are studied that could resist these emerging attacks. The papers present four families of public key cryptosystems that have the potential to resist quantum computers: the codebased public key cryptosystems, the hashbased public key cryptosystems, the latticebased public key cryptosystems and the multivariate public key cryptosystems
19 editions published in 2008 in English and held by 512 WorldCat member libraries worldwide
This book constitutes the refereed proceedings of the Second International Workshop on PostQuantum Cryptography, PQCrypto 2008, held in Cincinnati, OH, USA, in October 2008. The 15 revised full papers presented were carefully reviewed and selected from numerous submissions. Quantum computers are predicted to break existing public key cryptosystems within the next decade. Postquantum cryptography is a new fast developing area, where public key schemes are studied that could resist these emerging attacks. The papers present four families of public key cryptosystems that have the potential to resist quantum computers: the codebased public key cryptosystems, the hashbased public key cryptosystems, the latticebased public key cryptosystems and the multivariate public key cryptosystems
Public Key Cryptography  PKC 2012 : 15th international conference on practice and theory in public key cryptography, Darmstadt,
Germany, May 2123, 2012 ; proceedings by
Marc Fischlin(
)
10 editions published in 2012 in English and held by 432 WorldCat member libraries worldwide
This book constitutes the refereed proceedings of the 15th International Conference on Practice and Theory in Public Key Cryptography, PKC 2012, held in Darmstadt, Germany, in May 2012. The 41 papers presented were carefully reviewed and selected from 188 submissions. The book also contains one invited talk. The papers are organized in the folllowing topical sections: homomorphic encryption and LWE, signature schemes, codebased and multivariate crypto, public key encryption: special properties, identitybased encryption, publickey encryption: constructions, secure twoparty and multiparty computations, key exchange and secure sessions, publickey encryption: relationships, DL, DDH, and more number theory, and beyond ordinary signature schemes
10 editions published in 2012 in English and held by 432 WorldCat member libraries worldwide
This book constitutes the refereed proceedings of the 15th International Conference on Practice and Theory in Public Key Cryptography, PKC 2012, held in Darmstadt, Germany, in May 2012. The 41 papers presented were carefully reviewed and selected from 188 submissions. The book also contains one invited talk. The papers are organized in the folllowing topical sections: homomorphic encryption and LWE, signature schemes, codebased and multivariate crypto, public key encryption: special properties, identitybased encryption, publickey encryption: constructions, secure twoparty and multiparty computations, key exchange and secure sessions, publickey encryption: relationships, DL, DDH, and more number theory, and beyond ordinary signature schemes
Introduction to public key infrastructures by
Johannes A Buchmann(
)
15 editions published between 2013 and 2016 in English and Undetermined and held by 407 WorldCat member libraries worldwide
The introduction of public key cryptography (PKC) was a critical advance in IT security. In contrast to symmetric key cryptography, it enables confidential communication between entities in open networks, in particular the Internet, without prior contact. Beyond this PKC also enables protection techniques that have no analogue in traditional cryptography, most importantly digital signatures which for example support Internet security by authenticating software downloads and updates. Although PKC does not require the confidential exchange of secret keys, proper management of the private and public keys used in PKC is still of vital importance: the private keys must remain private, and the public keys must be verifiably authentic. So understanding socalled public key infrastructures (PKIs) that manage key pairs is at least as important as studying the ingenious mathematical ideas underlying PKC
15 editions published between 2013 and 2016 in English and Undetermined and held by 407 WorldCat member libraries worldwide
The introduction of public key cryptography (PKC) was a critical advance in IT security. In contrast to symmetric key cryptography, it enables confidential communication between entities in open networks, in particular the Internet, without prior contact. Beyond this PKC also enables protection techniques that have no analogue in traditional cryptography, most importantly digital signatures which for example support Internet security by authenticating software downloads and updates. Although PKC does not require the confidential exchange of secret keys, proper management of the private and public keys used in PKC is still of vital importance: the private keys must remain private, and the public keys must be verifiably authentic. So understanding socalled public key infrastructures (PKIs) that manage key pairs is at least as important as studying the ingenious mathematical ideas underlying PKC
Number Theory and Cryptography Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday by
Marc Fischlin(
)
4 editions published in 2013 in English and held by 353 WorldCat member libraries worldwide
This festschrift, published in honor of Johannes Buchmann on the occasion of his 60th birthday, contains contributions by some of his colleagues, former students, and friends. The papers give an overview of Johannes Buchmann's research interests, ranging from computational number theory and the hardness of cryptographic assumptions to more applicationoriented topics such as privacy and hardware security. With this book we celebrate Johannes Buchmann's vision and achievements
4 editions published in 2013 in English and held by 353 WorldCat member libraries worldwide
This festschrift, published in honor of Johannes Buchmann on the occasion of his 60th birthday, contains contributions by some of his colleagues, former students, and friends. The papers give an overview of Johannes Buchmann's research interests, ranging from computational number theory and the hardness of cryptographic assumptions to more applicationoriented topics such as privacy and hardware security. With this book we celebrate Johannes Buchmann's vision and achievements
Homomorphic signature schemes : a survey by
Giulia Traverso(
)
11 editions published in 2016 in English and held by 307 WorldCat member libraries worldwide
Homomorphic signature schemes are an important primitive for many applications and since their introduction numerous solutions have been presented. Thus, in this work we provide the first exhaustive, complete, and uptodate survey about the state of the art of homomorphic signature schemes. First, the general framework where homomorphic signatures are defined is described and it is shown how the currently available types of homomorphic signatures can then be derived from such a framework. In addition, this work also presents a description of each of the schemes presented so far together with the properties it provides. Furthermore, three use cases, electronic voting, smart grids, and electronic health records, where homomorphic signature schemes can be employed are described. For each of these applications the requirements that a homomorphic signature scheme should fulfill are defined and the suitable schemes already available are listed. This also highlights the shortcomings of current solutions. Thus, this work concludes with several ideas for future research in the direction of homomorphic signature schemes
11 editions published in 2016 in English and held by 307 WorldCat member libraries worldwide
Homomorphic signature schemes are an important primitive for many applications and since their introduction numerous solutions have been presented. Thus, in this work we provide the first exhaustive, complete, and uptodate survey about the state of the art of homomorphic signature schemes. First, the general framework where homomorphic signatures are defined is described and it is shown how the currently available types of homomorphic signatures can then be derived from such a framework. In addition, this work also presents a description of each of the schemes presented so far together with the properties it provides. Furthermore, three use cases, electronic voting, smart grids, and electronic health records, where homomorphic signature schemes can be employed are described. For each of these applications the requirements that a homomorphic signature scheme should fulfill are defined and the suitable schemes already available are listed. This also highlights the shortcomings of current solutions. Thus, this work concludes with several ideas for future research in the direction of homomorphic signature schemes
Transient convection over the Amazon/Bolivia region and the dynamics of droughts over northeast Brazil by
Julio Buchmann(
)
4 editions published in 1985 in English and held by 291 WorldCat member libraries worldwide
A twolayer, nonlinear, equatorial Bplane model, in pcoordinates is used to study the atmospheric response to a large scale prescribed heat source varying in time. The heat source is meant to represent a convective burst with total duration of approximately 48 hours over the Amazon/Bolivia region. The boundary conditions used are meridional velocity zero at 60oN and 60oS, w = 0 at the top and zero geometric velocity at the lower boundary. Sensitivity study was done which includes initial state at rest, compared with realistic initial flow. The scale of the heat source is 1500km in latitude and longitude and it is centered at 10oS. Special attention is paid to the distribution and intensity of the induced vertical motion. The model is integrated for two days and the preliminary results show agreement with the observed 200mb flow. Of interest is the establishment of a trough and descending motion to the northeast of the heat source. A conjecture is thus made that the Amazon heat source and its fluctuations bear some relationship with the drought problem over Northeast Brazil
4 editions published in 1985 in English and held by 291 WorldCat member libraries worldwide
A twolayer, nonlinear, equatorial Bplane model, in pcoordinates is used to study the atmospheric response to a large scale prescribed heat source varying in time. The heat source is meant to represent a convective burst with total duration of approximately 48 hours over the Amazon/Bolivia region. The boundary conditions used are meridional velocity zero at 60oN and 60oS, w = 0 at the top and zero geometric velocity at the lower boundary. Sensitivity study was done which includes initial state at rest, compared with realistic initial flow. The scale of the heat source is 1500km in latitude and longitude and it is centered at 10oS. Special attention is paid to the distribution and intensity of the induced vertical motion. The model is integrated for two days and the preliminary results show agreement with the observed 200mb flow. Of interest is the establishment of a trough and descending motion to the northeast of the heat source. A conjecture is thus made that the Amazon heat source and its fluctuations bear some relationship with the drought problem over Northeast Brazil
Privately and publicly verifiable computing techniques : a survey by
Denise Demirel(
)
10 editions published in 2017 in English and German and held by 280 WorldCat member libraries worldwide
This book presents the first comprehensive overview of various verifiable computing techniques, which allow the computation of a function on outsourced data to be delegated to a server. It provides a brief description of all the approaches and highlights the properties each solution achieves. Further, it analyzes the level of security provided, how efficient the verification process is, who can act as a verifier and check the correctness of the result, which function class the verifiable computing scheme supports, and whether privacy with respect to t he input and/or output data is provided. On the basis of this analysis the authors then compare the different approaches and outline possible directions for future work. The book is of interest to anyone wanting to understand the state of the art of this research field
10 editions published in 2017 in English and German and held by 280 WorldCat member libraries worldwide
This book presents the first comprehensive overview of various verifiable computing techniques, which allow the computation of a function on outsourced data to be delegated to a server. It provides a brief description of all the approaches and highlights the properties each solution achieves. Further, it analyzes the level of security provided, how efficient the verification process is, who can act as a verifier and check the correctness of the result, which function class the verifiable computing scheme supports, and whether privacy with respect to t he input and/or output data is provided. On the basis of this analysis the authors then compare the different approaches and outline possible directions for future work. The book is of interest to anyone wanting to understand the state of the art of this research field
Coding theory, cryptography, and related areas : proceedings of an International Conference on Coding Theory, Cryptography,
and Related Areas, held in Guanajuato, Mexico, in April 1998 by
Johannes Buchmann(
Book
)
13 editions published between 1999 and 2000 in English and held by 245 WorldCat member libraries worldwide
This book contains 23 contributions presented at the "International Conference on Coding Theory, Cryptography and Related Areas (ICCC)", held in Guanajuato, Mexico, in April 1998. It comprises a series of research papers on various aspects of coding theory (geometricalgebraic, decoding, exponential sums, etc.) and cryptography (discrete logarithm problem, public key cryptosystems, primitives, etc.), as well as in other research areas, such as codes over finite rings and some aspects of function fields and algebraic geometry over finite fields. The book contains new results on the subject, never published in any other form. It will be useful to students, researchers, professionals, and tutors interested in this area of research
13 editions published between 1999 and 2000 in English and held by 245 WorldCat member libraries worldwide
This book contains 23 contributions presented at the "International Conference on Coding Theory, Cryptography and Related Areas (ICCC)", held in Guanajuato, Mexico, in April 1998. It comprises a series of research papers on various aspects of coding theory (geometricalgebraic, decoding, exponential sums, etc.) and cryptography (discrete logarithm problem, public key cryptosystems, primitives, etc.), as well as in other research areas, such as codes over finite rings and some aspects of function fields and algebraic geometry over finite fields. The book contains new results on the subject, never published in any other form. It will be useful to students, researchers, professionals, and tutors interested in this area of research
Progress in cryptology  AFRICACRYPT 2019 : 11th International Conference on Cryptology in Africa, Rabat, Morocco, July 911,
2019, proceedings by AFRICACRYPT(
)
4 editions published in 2019 in English and held by 119 WorldCat member libraries worldwide
This book constitutes the refereed proceedings of the 11th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2019, held in Rabat, Morocco, in July 2019. The 22 papers presented in this book were carefully reviewed and selected from 53 submissions. The papers are organized in topical sections on protocols; postquantum cryptography; zeroknowledge; lattice based cryptography; new schemes and analysis; block ciphers; sidechannel attacks and countermeasures; signatures. AFRICACRYPT is a major scientific event that seeks to advance and promote the field of cryptology on the African continent. The conference has systematically drawn some excellent contributions to the field. The conference has always been organized in cooperation with the International Association for Cryptologic Research (IACR)
4 editions published in 2019 in English and held by 119 WorldCat member libraries worldwide
This book constitutes the refereed proceedings of the 11th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2019, held in Rabat, Morocco, in July 2019. The 22 papers presented in this book were carefully reviewed and selected from 53 submissions. The papers are organized in topical sections on protocols; postquantum cryptography; zeroknowledge; lattice based cryptography; new schemes and analysis; block ciphers; sidechannel attacks and countermeasures; signatures. AFRICACRYPT is a major scientific event that seeks to advance and promote the field of cryptology on the African continent. The conference has systematically drawn some excellent contributions to the field. The conference has always been organized in cooperation with the International Association for Cryptologic Research (IACR)
Einführung in die Kryptographie by
Johannes Buchmann(
)
2 editions published between 2008 and 2010 in German and held by 113 WorldCat member libraries worldwide
2 editions published between 2008 and 2010 in German and held by 113 WorldCat member libraries worldwide
Introduction à la cryptographie : cours et exercices corrigés by
Johannes Buchmann(
Book
)
2 editions published in 2006 in French and held by 103 WorldCat member libraries worldwide
2 editions published in 2006 in French and held by 103 WorldCat member libraries worldwide
Informatik : Festschrift zum 60. Geburtstag von Günter Hotz by
Johannes Buchmann(
Book
)
4 editions published in 1992 in German and English and held by 60 WorldCat member libraries worldwide
4 editions published in 1992 in German and English and held by 60 WorldCat member libraries worldwide
Introduction to cryptography(
Book
)
4 editions published between 2001 and 2004 in English and held by 50 WorldCat member libraries worldwide
4 editions published between 2001 and 2004 in English and held by 50 WorldCat member libraries worldwide
Zahlengeometrische Kettenbruchalgorithmen zur Einheitenberechnung by
Johannes Buchmann(
Book
)
4 editions published in 1982 in German and held by 41 WorldCat member libraries worldwide
4 editions published in 1982 in German and held by 41 WorldCat member libraries worldwide
Binary quadratic forms : an algorithmic approach ; with 5 tables by
Johannes Buchmann(
Book
)
4 editions published between 2007 and 2010 in English and held by 39 WorldCat member libraries worldwide
4 editions published between 2007 and 2010 in English and held by 39 WorldCat member libraries worldwide
more
fewer
Audience Level
0 

1  
Kids  General  Special 
Related Identities
 Fischlin, Marc Author Editor
 Bernstein, Daniel J. (Daniel Julius) 1971 Author Editor
 Vollmer, Ulrich 1965 Other
 Demirel, Denise Author
 Dahmén, Erik Dipl.Math Editor
 Ding, Jintai Editor
 Manulis, Mark Editor
 Wiesmaier, Alexander
 Karatsiolis, Evangelos
 Katzenbeisser, Stefan Editor
Useful Links
Associated Subjects
Algebra Atmospheric models Boundary layer (Meteorology) Coding theory Combinatorial analysis Computational complexity Computer networks Computer programsVerification Computer science Computer scienceMathematics Computer security Computer software Computer softwareReusability Computer systemsVerification Computer vision Cryptography Data encryption (Computer science) Data protection Data structures (Computer science) Data transmission systemsSecurity measures Droughts Electronic digital computers Engineering Engineering mathematics Forms, Binary Forms, Quadratic Homomorphisms (Mathematics) Humanities Information storage and retrieval systems Information theory Internet InternetLaw and legislation Logic design Management information systems Mass mediaLaw and legislation Mathematics Number theory Number theoryData processing Operating systems (Computers) Privacy, Right of Public key cryptography Public key infrastructure (Computer security) Social sciences Software engineering Telecommunication United States Writing
Covers
Alternative Names
Buchmann, J
Buchmann, Johannes.
Buchmann Johannes 1953....
Buchmann, Johannes, A
Buchmann, Johannes A. 1953
Būfuman, J. A. 1953
Būhuman, J. A. 1953
Johannes Buchmann deutscher Informatiker und Mathematiker
Johannes Buchmann Duits wiskundige
Johannes Buchmann German mathematician
Johannes Buchmann matemàtic alemany
Johannes Buchmann matemático alemán
Johannes Buchmann matematikan gjerman
Johannes Buchmann mathématicien allemand
Johannes Buchmann professor académico alemão
Johannes Buchmann tysk matematikar
Johannes Buchmann tysk matematiker
ブーフマン, ヨハネス
約翰諾斯·布赫曼
Languages