WorldCat Identities

Buchmann, Johannes

Overview
Works: 131 works in 417 publications in 4 languages and 7,582 library holdings
Genres: Conference papers and proceedings  Academic theses 
Roles: Author, Editor, dgs, Other, htt, Honoree, Correspondent, Creator
Classifications: QA268, 003.54
Publication Timeline
.
Most widely held works by Johannes Buchmann
Introduction to cryptography by J.A Buchmann( Book )

38 editions published between 2000 and 2013 in English and German and held by 1,005 WorldCat member libraries worldwide

"Cryptography is a key technology in electronic security systems. It is used to keep data secret, digitally sign documents, access control, and so forth. Users therefore should not only know how its techniques work but they must also be able to estimate their efficiency and security. Based on courses fought by the author, this book explains the basic methods of modern cryptography. It is written for readers with only basic mathematical knowledge who are interested in modern cryptographic algorithms and their mathematical foundation."--Jacket
Einführung in die Kryptographie by Buchmann( Book )

39 editions published between 1999 and 2016 in 3 languages and held by 801 WorldCat member libraries worldwide

Dieses Kryptographiebuch behandelt die grundlegenden Techniken der modernen Kryptographie. Es eignet sich hervorragend für Studierende der Mathematik und der Informatik ab dem dritten Semester. Das Buch setzt nur minimale Kenntnisse voraus und vermittelt auf elementare Weise die notwendigen mathematischen Kenntnisse, insbesondere die aus der Zahlentheorie. Instruktive Beispiele sowie zahlreiche Übungsaufgaben (zum Teil mit Lösungen) ermöglichen eine Vertiefung des Stoffes. Die Leser werden durch diese Einführung in die Lage versetzt, fortgeschrittene Literatur zur Kryptographie zu verstehen
Post-quantum cryptography by International Workshop on Post Quantum Cryptography( )

23 editions published between 2008 and 2010 in English and Undetermined and held by 624 WorldCat member libraries worldwide

Quantum computers may break popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature systems
Binary quadratic forms : an algorithmic approach by Johannes Buchmann( )

20 editions published between 2007 and 2010 in English and Undetermined and held by 593 WorldCat member libraries worldwide

"The book deals with algorithmic problems related to binary quadratic forms, such as finding the representations of an integer by a form with integer coefficients, finding the minimum of a form with real coefficients and deciding equivalence of two forms." "In order to solve those problems, the book introduces the reader to important areas of number theory such as diophantine equations, reduction theory of quadratic forms, geometry of numbers and algebraic number theory. The book explains applications to cryptography . It requires only basic mathematical knowledge."--Jacket
Internet privacy : eine multidisziplinäre Bestandsaufnahme by Johannes Buchmann( )

15 editions published between 2012 and 2014 in English and German and held by 578 WorldCat member libraries worldwide

A thorough multidisciplinary analysis of various perspectives on internet privacy was published as the first volume of a study, revealing the results of the achatech project "Internet Privacy - A Culture of Privacy and Trust on the Internet." The second publication from this project presents integrated, interdisciplinary options for improving privacy on the Internet utilising a normative, value-oriented approach. The ways in which privacy promotes and preconditions fundamental societal values and how privacy violations endanger the flourishing of said values are exemplified. The conditions which must be fulfilled in order to achieve a culture of privacy and trust on the internet are illuminated. This volume presents options for policy-makers, educators, businesses and technology experts how to facilitate solutions for more privacy on the Internet and identifies further research requirements in this area
Post-quantum cryptography : second international workshop, PQCrypto 2008 Cincinnati, OH, USA, October 17-19, 2008 proceedings by David Hutchison( )

19 editions published in 2008 in English and held by 512 WorldCat member libraries worldwide

This book constitutes the refereed proceedings of the Second International Workshop on Post-Quantum Cryptography, PQCrypto 2008, held in Cincinnati, OH, USA, in October 2008. The 15 revised full papers presented were carefully reviewed and selected from numerous submissions. Quantum computers are predicted to break existing public key cryptosystems within the next decade. Post-quantum cryptography is a new fast developing area, where public key schemes are studied that could resist these emerging attacks. The papers present four families of public key cryptosystems that have the potential to resist quantum computers: the code-based public key cryptosystems, the hash-based public key cryptosystems, the lattice-based public key cryptosystems and the multivariate public key cryptosystems
Public Key Cryptography - PKC 2012 : 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21-23, 2012 ; proceedings by Marc Fischlin( )

10 editions published in 2012 in English and held by 432 WorldCat member libraries worldwide

This book constitutes the refereed proceedings of the 15th International Conference on Practice and Theory in Public Key Cryptography, PKC 2012, held in Darmstadt, Germany, in May 2012. The 41 papers presented were carefully reviewed and selected from 188 submissions. The book also contains one invited talk. The papers are organized in the folllowing topical sections: homomorphic encryption and LWE, signature schemes, code-based and multivariate crypto, public key encryption: special properties, identity-based encryption, public-key encryption: constructions, secure two-party and multi-party computations, key exchange and secure sessions, public-key encryption: relationships, DL, DDH, and more number theory, and beyond ordinary signature schemes
Introduction to public key infrastructures by Johannes A Buchmann( )

15 editions published between 2013 and 2016 in English and Undetermined and held by 407 WorldCat member libraries worldwide

The introduction of public key cryptography (PKC) was a critical advance in IT security. In contrast to symmetric key cryptography, it enables confidential communication between entities in open networks, in particular the Internet, without prior contact. Beyond this PKC also enables protection techniques that have no analogue in traditional cryptography, most importantly digital signatures which for example support Internet security by authenticating software downloads and updates. Although PKC does not require the confidential exchange of secret keys, proper management of the private and public keys used in PKC is still of vital importance: the private keys must remain private, and the public keys must be verifiably authentic. So understanding so-called public key infrastructures (PKIs) that manage key pairs is at least as important as studying the ingenious mathematical ideas underlying PKC
Number Theory and Cryptography Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday by Marc Fischlin( )

4 editions published in 2013 in English and held by 353 WorldCat member libraries worldwide

This festschrift, published in honor of Johannes Buchmann on the occasion of his 60th birthday, contains contributions by some of his colleagues, former students, and friends. The papers give an overview of Johannes Buchmann's research interests, ranging from computational number theory and the hardness of cryptographic assumptions to more application-oriented topics such as privacy and hardware security. With this book we celebrate Johannes Buchmann's vision and achievements
Homomorphic signature schemes : a survey by Giulia Traverso( )

11 editions published in 2016 in English and held by 307 WorldCat member libraries worldwide

Homomorphic signature schemes are an important primitive for many applications and since their introduction numerous solutions have been presented. Thus, in this work we provide the first exhaustive, complete, and up-to-date survey about the state of the art of homomorphic signature schemes. First, the general framework where homomorphic signatures are defined is described and it is shown how the currently available types of homomorphic signatures can then be derived from such a framework. In addition, this work also presents a description of each of the schemes presented so far together with the properties it provides. Furthermore, three use cases, electronic voting, smart grids, and electronic health records, where homomorphic signature schemes can be employed are described. For each of these applications the requirements that a homomorphic signature scheme should fulfill are defined and the suitable schemes already available are listed. This also highlights the shortcomings of current solutions. Thus, this work concludes with several ideas for future research in the direction of homomorphic signature schemes
Transient convection over the Amazon/Bolivia region and the dynamics of droughts over northeast Brazil by Julio Buchmann( )

4 editions published in 1985 in English and held by 291 WorldCat member libraries worldwide

A two-layer, nonlinear, equatorial B-plane model, in p-coordinates is used to study the atmospheric response to a large scale prescribed heat source varying in time. The heat source is meant to represent a convective burst with total duration of approximately 48 hours over the Amazon/Bolivia region. The boundary conditions used are meridional velocity zero at 60oN and 60oS, w = 0 at the top and zero geometric velocity at the lower boundary. Sensitivity study was done which includes initial state at rest, compared with realistic initial flow. The scale of the heat source is 1500km in latitude and longitude and it is centered at 10oS. Special attention is paid to the distribution and intensity of the induced vertical motion. The model is integrated for two days and the preliminary results show agreement with the observed 200mb flow. Of interest is the establishment of a trough and descending motion to the northeast of the heat source. A conjecture is thus made that the Amazon heat source and its fluctuations bear some relationship with the drought problem over Northeast Brazil
Privately and publicly verifiable computing techniques : a survey by Denise Demirel( )

10 editions published in 2017 in English and German and held by 280 WorldCat member libraries worldwide

This book presents the first comprehensive overview of various verifiable computing techniques, which allow the computation of a function on outsourced data to be delegated to a server. It provides a brief description of all the approaches and highlights the properties each solution achieves. Further, it analyzes the level of security provided, how efficient the verification process is, who can act as a verifier and check the correctness of the result, which function class the verifiable computing scheme supports, and whether privacy with respect to t he input and/or output data is provided. On the basis of this analysis the authors then compare the different approaches and outline possible directions for future work. The book is of interest to anyone wanting to understand the state of the art of this research field
Coding theory, cryptography, and related areas : proceedings of an International Conference on Coding Theory, Cryptography, and Related Areas, held in Guanajuato, Mexico, in April 1998 by Johannes Buchmann( Book )

13 editions published between 1999 and 2000 in English and held by 245 WorldCat member libraries worldwide

This book contains 23 contributions presented at the "International Conference on Coding Theory, Cryptography and Related Areas (ICCC)", held in Guanajuato, Mexico, in April 1998. It comprises a series of research papers on various aspects of coding theory (geometric-algebraic, decoding, exponential sums, etc.) and cryptography (discrete logarithm problem, public key cryptosystems, primitives, etc.), as well as in other research areas, such as codes over finite rings and some aspects of function fields and algebraic geometry over finite fields. The book contains new results on the subject, never published in any other form. It will be useful to students, researchers, professionals, and tutors interested in this area of research
Progress in cryptology - AFRICACRYPT 2019 : 11th International Conference on Cryptology in Africa, Rabat, Morocco, July 9-11, 2019, proceedings by AFRICACRYPT( )

4 editions published in 2019 in English and held by 119 WorldCat member libraries worldwide

This book constitutes the refereed proceedings of the 11th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2019, held in Rabat, Morocco, in July 2019. The 22 papers presented in this book were carefully reviewed and selected from 53 submissions. The papers are organized in topical sections on protocols; post-quantum cryptography; zero-knowledge; lattice based cryptography; new schemes and analysis; block ciphers; side-channel attacks and countermeasures; signatures. AFRICACRYPT is a major scientific event that seeks to advance and promote the field of cryptology on the African continent. The conference has systematically drawn some excellent contributions to the field. The conference has always been organized in cooperation with the International Association for Cryptologic Research (IACR)
Einführung in die Kryptographie by Johannes Buchmann( )

2 editions published between 2008 and 2010 in German and held by 113 WorldCat member libraries worldwide

Introduction à la cryptographie : cours et exercices corrigés by Johannes Buchmann( Book )

2 editions published in 2006 in French and held by 103 WorldCat member libraries worldwide

Informatik : Festschrift zum 60. Geburtstag von Günter Hotz by Johannes Buchmann( Book )

4 editions published in 1992 in German and English and held by 60 WorldCat member libraries worldwide

Introduction to cryptography( Book )

4 editions published between 2001 and 2004 in English and held by 50 WorldCat member libraries worldwide

Zahlengeometrische Kettenbruchalgorithmen zur Einheitenberechnung by Johannes Buchmann( Book )

4 editions published in 1982 in German and held by 41 WorldCat member libraries worldwide

Binary quadratic forms : an algorithmic approach ; with 5 tables by Johannes Buchmann( Book )

4 editions published between 2007 and 2010 in English and held by 39 WorldCat member libraries worldwide

 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.60 (from 0.49 for Post-quant ... to 0.90 for Zahlengeom ...)

Post-quantum cryptography
Covers
Einführung in die KryptographiePost-quantum cryptographyBinary quadratic forms : an algorithmic approachPost-quantum cryptography : second international workshop, PQCrypto 2008 Cincinnati, OH, USA, October 17-19, 2008 proceedingsCoding theory, cryptography, and related areas : proceedings of an International Conference on Coding Theory, Cryptography, and Related Areas, held in Guanajuato, Mexico, in April 1998Einführung in die KryptographieIntroduction to cryptographyBinary quadratic forms : an algorithmic approach ; with 5 tables
Alternative Names
Buchmann, J

Buchmann, Johannes.

Buchmann Johannes 1953-....

Buchmann, Johannes, A

Buchmann, Johannes A. 1953-

Būfuman, J. A. 1953-

Būhuman, J. A. 1953-

Johannes Buchmann deutscher Informatiker und Mathematiker

Johannes Buchmann Duits wiskundige

Johannes Buchmann German mathematician

Johannes Buchmann matemàtic alemany

Johannes Buchmann matemático alemán

Johannes Buchmann matematikan gjerman

Johannes Buchmann mathématicien allemand

Johannes Buchmann professor académico alemão

Johannes Buchmann tysk matematikar

Johannes Buchmann tysk matematiker

ブーフマン, ヨハネス

約翰諾斯·布赫曼

Languages
English (190)

German (45)

Japanese (5)

French (2)