Christopher Wolf
Christopher Wolf
Ruhr-University Bochum, Horst Görtz Institute for IT-Security
Verified email at christopher-wolf.de
TitleCited byYear
Mobile security catching up? revealing the nuts and bolts of the security of mobile devices
M Becher, FC Freiling, J Hoffmann, T Holz, S Uellenbeck, C Wolf
2011 IEEE Symposium on Security and Privacy, 96-111, 2011
2622011
Environmental impacts as buying criteria for third party logistical services
Á Halldórsson, G Kovács, C Wolf, S Seuring
International Journal of Physical Distribution & Logistics Management, 2010
2492010
Quantifying the security of graphical passwords: the case of android unlock patterns
S Uellenbeck, M Dürmuth, C Wolf, T Holz
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1882013
Taxonomy of Public Key Schemes based on the problem of Multivariate Quadratic equations.
C Wolf, B Preneel
IACR Cryptology ePrint Archive 2005, 77, 2005
1652005
Continuous authentication on mobile devices by analysis of typing motion behavior
H Gascon, S Uellenbeck, C Wolf, K Rieck
Sicherheit 2014–Sicherheit, Schutz und Zuverlässigkeit, 2014
942014
Multivariate quadratic polynomials in public key cryptography
C Wolf
Katholieke Universiteit Leuven, 2005
852005
Time-Area Optimized Public-Key Engines: -Cryptosystems as Replacement for Elliptic Curves?
A Bogdanov, T Eisenbarth, A Rupp, C Wolf
International Workshop on Cryptographic Hardware and Embedded Systems, 45-61, 2008
802008
A study of the security of Unbalanced Oil and Vinegar signature schemes
A Braeken, C Wolf, B Preneel
Cryptographers’ Track at the RSA Conference, 29-43, 2005
802005
Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics): Preface
D Ünay, Z Çataltepe, S Aksoy
Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2010
792010
Efficient cryptanalysis of rse (2) pkc and rsse (2) pkc
C Wolf, A Braeken, B Preneel
International Conference on Security in Communication Networks, 294-309, 2004
692004
ℓ-Invertible Cycles for ultivariate uadratic () Public Key Cryptography
J Ding, C Wolf, BY Yang
International Workshop on Public Key Cryptography, 266-281, 2007
682007
Solving underdetermined systems of multivariate quadratic equations revisited
E Thomae, C Wolf
International Workshop on Public Key Cryptography, 156-171, 2012
622012
Large Superfluous Keys in ultivariate uadratic Asymmetric Systems
C Wolf, B Preneel
International Workshop on Public Key Cryptography, 275-287, 2005
602005
Equivalent keys in HFE, C*, and variations
C Wolf, B Preneel
International Conference on Cryptology in Malaysia, 33-49, 2005
462005
Small Public Keys and Fast Verification for ultivariate uadratic Public Key Systems
A Petzoldt, E Thomae, S Bulygin, C Wolf
International Workshop on Cryptographic Hardware and Embedded Systems, 475-490, 2011
312011
The Belgian Electronic Identity Card (Overview).
D De Cock, C Wolf, B Preneel
Sicherheit 77, 298-301, 2006
302006
Cryptanalysis of enhanced TTS, STS and all its variants, or: why cross-terms are important
E Thomae, C Wolf
International Conference on Cryptology in Africa, 188-202, 2012
292012
Equivalent keys in ℳultivariate uadratic public key systems
C Wolf, B Preneel
Journal of Mathematical Cryptology 4 (4), 375-415, 2011
272011
On the security of stepwise triangular systems
C Wolf, A Braeken, B Preneel
Designs, Codes and Cryptography 40 (3), 285-302, 2006
262006
Asymmetric Cryptography: Hidden Field Equations.
C Wolf, B Preneel
IACR Cryptology ePrint Archive 2004, 72, 2004
232004
The system can't perform the operation now. Try again later.
Articles 1–20