BibTeX records: Werner Schindler

download as .bib file

@article{DBLP:journals/tifs/ChenCSZSDP23,
  author       = {Li{-}Wei Chen and
                  Ziang Chen and
                  Werner Schindler and
                  Xianyue Zhao and
                  Heidemarie Schmidt and
                  Nan Du and
                  Ilia Polian},
  title        = {On Side-Channel Analysis of Memristive Cryptographic Circuits},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {18},
  pages        = {463--476},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIFS.2022.3223232},
  doi          = {10.1109/TIFS.2022.3223232},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChenCSZSDP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/newcas/PolianDS23,
  author       = {Ilia Polian and
                  Nan Du and
                  Werner Schindler},
  title        = {Overview of Memristive Cryptography},
  booktitle    = {21st {IEEE} Interregional {NEWCAS} Conference, {NEWCAS} 2023, Edinburgh,
                  United Kingdom, June 26-28, 2023},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/NEWCAS57931.2023.10198201},
  doi          = {10.1109/NEWCAS57931.2023.10198201},
  timestamp    = {Tue, 15 Aug 2023 11:43:59 +0200},
  biburl       = {https://dblp.org/rec/conf/newcas/PolianDS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/GohrLS22,
  author       = {Aron Gohr and
                  Friederike Laus and
                  Werner Schindler},
  title        = {Breaking Masked Implementations of the Clyde-Cipher by Means of Side-Channel
                  Analysis {A} Report on the {CHES} Challenge Side-Channel Contest 2020},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {4},
  pages        = {397--437},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i4.397-437},
  doi          = {10.46586/TCHES.V2022.I4.397-437},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/GohrLS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GohrLS22,
  author       = {Aron Gohr and
                  Friederike Laus and
                  Werner Schindler},
  title        = {Breaking Masked Implementations of the Clyde-Cipher by Means of Side-Channel
                  Analysis - {A} Report on the {CHES} Challenge Side-Channel Contest
                  2020},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {471},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/471},
  timestamp    = {Mon, 16 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GohrLS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/MittmannS21,
  author       = {Johannes Mittmann and
                  Werner Schindler},
  title        = {Timing attacks and local timing attacks against Barrett's modular
                  multiplication algorithm},
  journal      = {J. Cryptogr. Eng.},
  volume       = {11},
  number       = {4},
  pages        = {369--397},
  year         = {2021},
  url          = {https://doi.org/10.1007/s13389-020-00254-3},
  doi          = {10.1007/S13389-020-00254-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/MittmannS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/DugardinSG21,
  author       = {Margaux Dugardin and
                  Werner Schindler and
                  Sylvain Guilley},
  title        = {Stochastic methods defeat regular {RSA} exponentiation algorithms
                  with combined blinding methods},
  journal      = {J. Math. Cryptol.},
  volume       = {15},
  number       = {1},
  pages        = {408--433},
  year         = {2021},
  url          = {https://doi.org/10.1515/jmc-2020-0010},
  doi          = {10.1515/JMC-2020-0010},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/DugardinSG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GohrKS20,
  author       = {Aron Gohr and
                  Dominik Klein and
                  Werner Schindler},
  title        = {Verr{\"{a}}terischer Stromverbrauch},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {44},
  number       = {7},
  pages        = {431--435},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11623-020-1300-6},
  doi          = {10.1007/S11623-020-1300-6},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/GohrKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/GohrJS20,
  author       = {Aron Gohr and
                  Sven Jacob and
                  Werner Schindler},
  editor       = {Orr Dunkelman and
                  Michael J. Jacobson Jr. and
                  Colin O'Flynn},
  title        = {Subsampling and Knowledge Distillation on Adversarial Examples: New
                  Techniques for Deep Learning Based Side Channel Evaluations},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2020 - 27th International Conference,
                  Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12804},
  pages        = {567--592},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-81652-0\_22},
  doi          = {10.1007/978-3-030-81652-0\_22},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/GohrJS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GohrJS20,
  author       = {Aron Gohr and
                  Sven Jacob and
                  Werner Schindler},
  title        = {Efficient Solutions of the {CHES} 2018 {AES} Challenge Using Deep
                  Residual Neural Networks and Knowledge Distillation on Adversarial
                  Examples},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {165},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/165},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GohrJS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MittmannS20,
  author       = {Johannes Mittmann and
                  Werner Schindler},
  title        = {Timing attacks and local timing attacks against Barrett's modular
                  multiplication algorithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {946},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/946},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/MittmannS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/RohdeS19,
  author       = {Martina Rohde and
                  Werner Schindler},
  title        = {K{\"{u}}nstliche Intelligenz in Evaluierung und Zulassung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {43},
  number       = {10},
  pages        = {627--630},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11623-019-1177-4},
  doi          = {10.1007/S11623-019-1177-4},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/RohdeS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GohrJS19,
  author       = {Aron Gohr and
                  Sven Jacob and
                  Werner Schindler},
  title        = {{CHES} 2018 Side Channel Contest {CTF} - Solution of the {AES} Challenges},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {94},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/094},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GohrJS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuZFLZGJSBT19,
  author       = {Yongbo Hu and
                  Yeyang Zheng and
                  Pengwei Feng and
                  Lirui Liu and
                  Chen Zhang and
                  Aron Gohr and
                  Sven Jacob and
                  Werner Schindler and
                  Ileana Buhan and
                  Karim Tobich},
  title        = {Machine learning and side channel analysis in a {CTF} competition},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {860},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/860},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/HuZFLZGJSBT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/SchindlerW17,
  author       = {Werner Schindler and
                  Andreas Wiemers},
  title        = {Generic power attacks on {RSA} with {CRT} and exponent blinding: new
                  results},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {4},
  pages        = {255--272},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-016-0146-1},
  doi          = {10.1007/S13389-016-0146-1},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/SchindlerW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/Schindler16,
  author       = {Werner Schindler},
  title        = {Exclusive exponent blinding is not enough to prevent any timing attack
                  on {RSA}},
  journal      = {J. Cryptogr. Eng.},
  volume       = {6},
  number       = {2},
  pages        = {101--119},
  year         = {2016},
  url          = {https://doi.org/10.1007/s13389-016-0124-7},
  doi          = {10.1007/S13389-016-0124-7},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/Schindler16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Schindler15,
  author       = {Werner Schindler},
  editor       = {Tim G{\"{u}}neysu and
                  Helena Handschuh},
  title        = {Exclusive Exponent Blinding May Not Suffice to Prevent Timing Attacks
                  on {RSA}},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International
                  Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9293},
  pages        = {229--247},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48324-4\_12},
  doi          = {10.1007/978-3-662-48324-4\_12},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Schindler15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/SchindlerW14,
  author       = {Werner Schindler and
                  Andreas Wiemers},
  title        = {Power attacks in the presence of exponent blinding},
  journal      = {J. Cryptogr. Eng.},
  volume       = {4},
  number       = {4},
  pages        = {213--236},
  year         = {2014},
  url          = {https://doi.org/10.1007/s13389-014-0081-y},
  doi          = {10.1007/S13389-014-0081-Y},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/SchindlerW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/ClavierDDEGGHKLLNOSSSSVWW14,
  author       = {Christophe Clavier and
                  Jean{-}Luc Danger and
                  Guillaume Duc and
                  M. Abdelaziz Elaabid and
                  Beno{\^{\i}}t G{\'{e}}rard and
                  Sylvain Guilley and
                  Annelie Heuser and
                  Michael Kasper and
                  Yang Li and
                  Victor Lomn{\'{e}} and
                  Daisuke Nakatsu and
                  Kazuo Ohta and
                  Kazuo Sakiyama and
                  Laurent Sauvage and
                  Werner Schindler and
                  Marc St{\"{o}}ttinger and
                  Nicolas Veyrat{-}Charvillon and
                  Matthieu Walle and
                  Antoine Wurcker},
  title        = {Practical improvements of side-channel attacks on {AES:} feedback
                  from the 2nd {DPA} contest},
  journal      = {J. Cryptogr. Eng.},
  volume       = {4},
  number       = {4},
  pages        = {259--274},
  year         = {2014},
  url          = {https://doi.org/10.1007/s13389-014-0075-9},
  doi          = {10.1007/S13389-014-0075-9},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/ClavierDDEGGHKLLNOSSSSVWW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Schindler14,
  author       = {Werner Schindler},
  title        = {Exponent Blinding May Not Prevent Timing Attacks on {RSA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {869},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/869},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/Schindler14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/Schindler13,
  author       = {Werner Schindler},
  editor       = {Marc Fischlin and
                  Stefan Katzenbeisser},
  title        = {When Should an Implementation Attack Be Viewed as Successful?},
  booktitle    = {Number Theory and Cryptography - Papers in Honor of Johannes Buchmann
                  on the Occasion of His 60th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {8260},
  pages        = {139--150},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-42001-6\_11},
  doi          = {10.1007/978-3-642-42001-6\_11},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/Schindler13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/HeuserKSS12,
  author       = {Annelie Heuser and
                  Michael Kasper and
                  Werner Schindler and
                  Marc St{\"{o}}ttinger},
  editor       = {Orr Dunkelman},
  title        = {A New Difference Method for Side-Channel Analysis with High-Dimensional
                  Leakage Models},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2012 - The Cryptographers' Track at
                  the {RSA} Conference 2012, San Francisco, CA, USA, February 27 - March
                  2, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7178},
  pages        = {365--382},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-27954-6\_23},
  doi          = {10.1007/978-3-642-27954-6\_23},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/HeuserKSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/HeuserSS12,
  author       = {Annelie Heuser and
                  Werner Schindler and
                  Marc St{\"{o}}ttinger},
  editor       = {Wolfgang Rosenstiel and
                  Lothar Thiele},
  title        = {Revealing side-channel issues of complex circuits by enhanced leakage
                  models},
  booktitle    = {2012 Design, Automation {\&} Test in Europe Conference {\&}
                  Exhibition, {DATE} 2012, Dresden, Germany, March 12-16, 2012},
  pages        = {1179--1184},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/DATE.2012.6176672},
  doi          = {10.1109/DATE.2012.6176672},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/date/HeuserSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cosade/2012,
  editor       = {Werner Schindler and
                  Sorin A. Huss},
  title        = {Constructive Side-Channel Analysis and Secure Design - Third International
                  Workshop, {COSADE} 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7275},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29912-4},
  doi          = {10.1007/978-3-642-29912-4},
  isbn         = {978-3-642-29911-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/SchindlerI11,
  author       = {Werner Schindler and
                  Kouichi Itoh},
  editor       = {Javier L{\'{o}}pez and
                  Gene Tsudik},
  title        = {Exponent Blinding Does Not Always Lift (Partial) Spa Resistance to
                  Higher-Level Security},
  booktitle    = {Applied Cryptography and Network Security - 9th International Conference,
                  {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6715},
  pages        = {73--90},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21554-4\_5},
  doi          = {10.1007/978-3-642-21554-4\_5},
  timestamp    = {Thu, 29 Aug 2019 08:10:02 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/SchindlerI11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsd/HeuserKSS11,
  author       = {Annelie Heuser and
                  Michael Kasper and
                  Werner Schindler and
                  Marc St{\"{o}}ttinger},
  title        = {How a Symmetry Metric Assists Side-Channel Evaluation - {A} Novel
                  Model Verification Method for Power Analysis},
  booktitle    = {14th Euromicro Conference on Digital System Design, Architectures,
                  Methods and Tools, {DSD} 2011, August 31 - September 2, 2011, Oulu,
                  Finland},
  pages        = {674--681},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/DSD.2011.91},
  doi          = {10.1109/DSD.2011.91},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsd/HeuserKSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpt/KasperSS10,
  author       = {Michael Kasper and
                  Werner Schindler and
                  Marc St{\"{o}}ttinger},
  editor       = {Jinian Bian and
                  Qiang Zhou and
                  Peter Athanas and
                  Yajun Ha and
                  Kang Zhao},
  title        = {A stochastic method for security evaluation of cryptographic {FPGA}
                  implementations},
  booktitle    = {Proceedings of the International Conference on Field-Programmable
                  Technology, {FPT} 2010, 8-10 December 2010, Tsinghua University, Beijing,
                  China},
  pages        = {146--153},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/FPT.2010.5681772},
  doi          = {10.1109/FPT.2010.5681772},
  timestamp    = {Thu, 01 Feb 2018 14:20:39 +0100},
  biburl       = {https://dblp.org/rec/conf/fpt/KasperSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/StandaertKS09,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Fran{\c{c}}ois Koeune and
                  Werner Schindler},
  editor       = {Michel Abdalla and
                  David Pointcheval and
                  Pierre{-}Alain Fouque and
                  Damien Vergnaud},
  title        = {How to Compare Profiled Side-Channel Attacks?},
  booktitle    = {Applied Cryptography and Network Security, 7th International Conference,
                  {ACNS} 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5536},
  pages        = {485--498},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01957-9\_30},
  doi          = {10.1007/978-3-642-01957-9\_30},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/StandaertKS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/FinkeGS09,
  author       = {Thomas Finke and
                  Max Gebhardt and
                  Werner Schindler},
  editor       = {Christophe Clavier and
                  Kris Gaj},
  title        = {A New Side-Channel Attack on {RSA} Prime Generation},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International
                  Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5747},
  pages        = {141--155},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04138-9\_11},
  doi          = {10.1007/978-3-642-04138-9\_11},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/FinkeGS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/SchindlerW09,
  author       = {Werner Schindler and
                  Colin D. Walter},
  editor       = {Matthew Geoffrey Parker},
  title        = {Optimal Recovery of Secret Keys from Weak Side Channel Traces},
  booktitle    = {Cryptography and Coding, 12th {IMA} International Conference, Cryptography
                  and Coding 2009, Cirencester, UK, December 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5921},
  pages        = {446--468},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10868-6\_27},
  doi          = {10.1007/978-3-642-10868-6\_27},
  timestamp    = {Wed, 01 Sep 2021 10:36:08 +0200},
  biburl       = {https://dblp.org/rec/conf/ima/SchindlerW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/koc09/Schindler09,
  author       = {Werner Schindler},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Random Number Generators for Cryptographic Applications},
  booktitle    = {Cryptographic Engineering},
  pages        = {5--23},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-71817-0\_2},
  doi          = {10.1007/978-0-387-71817-0\_2},
  timestamp    = {Tue, 26 Jun 2018 16:12:55 +0200},
  biburl       = {https://dblp.org/rec/books/sp/koc09/Schindler09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/koc09/Schindler09a,
  author       = {Werner Schindler},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Evaluation Criteria for Physical Random Number Generators},
  booktitle    = {Cryptographic Engineering},
  pages        = {25--54},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-71817-0\_3},
  doi          = {10.1007/978-0-387-71817-0\_3},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/koc09/Schindler09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Schindler08,
  author       = {Werner Schindler},
  title        = {Advanced stochastic methods in side channel analysis on block ciphers
                  in the presence of masking},
  journal      = {J. Math. Cryptol.},
  volume       = {2},
  number       = {3},
  pages        = {291--310},
  year         = {2008},
  url          = {https://doi.org/10.1515/JMC.2008.013},
  doi          = {10.1515/JMC.2008.013},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/Schindler08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/KillmannS08,
  author       = {Wolfgang Killmann and
                  Werner Schindler},
  editor       = {Elisabeth Oswald and
                  Pankaj Rohatgi},
  title        = {A Design for a Physical {RNG} with Robust Entropy Estimators},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International
                  Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5154},
  pages        = {146--163},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85053-3\_10},
  doi          = {10.1007/978-3-540-85053-3\_10},
  timestamp    = {Thu, 14 Oct 2021 10:28:51 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/KillmannS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/AciicmezS08,
  author       = {Onur Acii{\c{c}}mez and
                  Werner Schindler},
  editor       = {Tal Malkin},
  title        = {A Vulnerability in {RSA} Implementations Due to Instruction Cache
                  Analysis and Its Demonstration on OpenSSL},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2008, The Cryptographers' Track at
                  the {RSA} Conference 2008, San Francisco, CA, USA, April 8-11, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4964},
  pages        = {256--273},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79263-5\_16},
  doi          = {10.1007/978-3-540-79263-5\_16},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/AciicmezS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/GebhardtIS08,
  author       = {Max Gebhardt and
                  Georg Illies and
                  Werner Schindler},
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {On an Approach to Compute (at least Almost) Exact Probabilities for
                  Differentia Hash Collision Paths},
  booktitle    = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  pages        = {111--125},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21521},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/GebhardtIS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GebhardtIS08,
  author       = {Max Gebhardt and
                  Georg Illies and
                  Werner Schindler},
  title        = {Computing Almost Exact Probabilities of Differential Hash Collision
                  Paths by Applying Appropriate Stochastic Methods},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {22},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/022},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GebhardtIS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/AciicmezSK07,
  author       = {Onur Acii{\c{c}}mez and
                  Werner Schindler and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  editor       = {Masayuki Abe},
  title        = {Cache Based Remote Timing Attack on the {AES}},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2007, The Cryptographers' Track at
                  the {RSA} Conference 2007, San Francisco, CA, USA, February 5-9, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4377},
  pages        = {271--286},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/11967668\_18},
  doi          = {10.1007/11967668\_18},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/AciicmezSK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gi/GebhardtIS07,
  author       = {Max Gebhardt and
                  Georg Illies and
                  Werner Schindler},
  editor       = {Rainer Koschke and
                  Otthein Herzog and
                  Karl{-}Heinz R{\"{o}}diger and
                  Marc Ronthaler},
  title        = {Hashkollisionen und Qualifizierte Zertifikate},
  booktitle    = {37. Jahrestagung der Gesellschaft f{\"{u}}r Informatik, Informatik
                  trifft Logistik, {INFORMATIK} 2007, Bremen, Germany, September 24-27,
                  2007, Band 2},
  series       = {{LNI}},
  volume       = {{P-110}},
  pages        = {174--178},
  publisher    = {{GI}},
  year         = {2007},
  url          = {https://dl.gi.de/handle/20.500.12116/22475},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gi/GebhardtIS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AciicmezS07,
  author       = {Onur Acii{\c{c}}mez and
                  Werner Schindler},
  title        = {A Major Vulnerability in {RSA} Implementations due to MicroArchitectural
                  Analysis Threat},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {336},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/336},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AciicmezS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/GebhardtIS06,
  author       = {Max Gebhardt and
                  Georg Illies and
                  Werner Schindler},
  editor       = {Jana Dittmann},
  title        = {A Note on the Practical Value of Single Hash Collisions for Special
                  File Formats},
  booktitle    = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar
                  2006 in Magdeburg},
  series       = {{LNI}},
  volume       = {{P-77}},
  pages        = {333--344},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/24792},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/GebhardtIS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AciicmezSK05,
  author       = {Onur Acii{\c{c}}mez and
                  Werner Schindler and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  editor       = {Vijay Atluri and
                  Catherine Meadows and
                  Ari Juels},
  title        = {Improving Brumley and Boneh timing attack on unprotected {SSL} implementations},
  booktitle    = {Proceedings of the 12th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005},
  pages        = {139--146},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1102120.1102140},
  doi          = {10.1145/1102120.1102140},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AciicmezSK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/SchindlerLP05,
  author       = {Werner Schindler and
                  Kerstin Lemke and
                  Christof Paar},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {A Stochastic Model for Differential Side Channel Cryptanalysis},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {30--46},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_3},
  doi          = {10.1007/11545262\_3},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/SchindlerLP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Schindler05,
  author       = {Werner Schindler},
  editor       = {Serge Vaudenay},
  title        = {On the Optimization of Side-Channel Attacks by Advanced Stochastic
                  Methods},
  booktitle    = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on
                  Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland,
                  January 23-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3386},
  pages        = {85--103},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30580-4\_7},
  doi          = {10.1007/978-3-540-30580-4\_7},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Schindler05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/LyS04,
  author       = {Van{-}Ly Le and
                  Werner Schindler},
  editor       = {Carlo Blundo and
                  Stelvio Cimato},
  title        = {How to Embed Short Cycles into Large Nonlinear Feedback-Shift Registers},
  booktitle    = {Security in Communication Networks, 4th International Conference,
                  {SCN} 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3352},
  pages        = {367--380},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30598-9\_26},
  doi          = {10.1007/978-3-540-30598-9\_26},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/LyS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0008349,
  author       = {Werner Schindler},
  title        = {Measures with symmetry properties},
  series       = {Lecture notes in mathematics},
  volume       = {1808},
  publisher    = {Springer},
  year         = {2003},
  isbn         = {978-3-540-00235-2},
  timestamp    = {Mon, 15 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/0008349.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gi/KillmannS03,
  author       = {Wolfgang Killmann and
                  Werner Schindler},
  editor       = {R{\"{u}}diger Grimm and
                  Hubert B. Keller and
                  Kai Rannenberg},
  title        = {{\"{U}}ber die Pr{\"{u}}ftiefe und Aussagekraft von IT-Sicherheitsgutachten},
  booktitle    = {33. Jahrestagung der Gesellschaft f{\"{u}}r Informatik, Schwerpunkt
                  "Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit", {INFORMATIK}
                  2003 - Mit Sicherheit Informatik, Frankfurt am Main, Germany, September
                  29 - October 2, 2003},
  series       = {{LNI}},
  volume       = {{P-36}},
  pages        = {203--214},
  publisher    = {{GI}},
  year         = {2003},
  url          = {https://dl.gi.de/handle/20.500.12116/29575},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gi/KillmannS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/SchindlerW03,
  author       = {Werner Schindler and
                  Colin D. Walter},
  editor       = {Kenneth G. Paterson},
  title        = {More Detail for a Combined Timing and Power Attack against Implementations
                  of {RSA}},
  booktitle    = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester,
                  UK, December 16-18, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2898},
  pages        = {245--263},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40974-8\_20},
  doi          = {10.1007/978-3-540-40974-8\_20},
  timestamp    = {Wed, 18 Mar 2020 16:01:02 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/SchindlerW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/Schindler03,
  author       = {Werner Schindler},
  editor       = {Kenneth G. Paterson},
  title        = {A Stochastical Model and Its Analysis for a Physical Random Number
                  Generator Presented At {CHES} 2002},
  booktitle    = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester,
                  UK, December 16-18, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2898},
  pages        = {276--289},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40974-8\_22},
  doi          = {10.1007/978-3-540-40974-8\_22},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/Schindler03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/SchindlerK02,
  author       = {Werner Schindler and
                  Wolfgang Killmann},
  editor       = {Burton S. Kaliski Jr. and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Evaluation Criteria for True (Physical) Random Number Generators Used
                  in Cryptographic Applications},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International
                  Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2523},
  pages        = {431--449},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36400-5\_31},
  doi          = {10.1007/3-540-36400-5\_31},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/SchindlerK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Schindler02,
  author       = {Werner Schindler},
  editor       = {David Naccache and
                  Pascal Paillier},
  title        = {A Combined Timing and Power Attack},
  booktitle    = {Public Key Cryptography, 5th International Workshop on Practice and
                  Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February
                  12-14, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2274},
  pages        = {263--279},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45664-3\_19},
  doi          = {10.1007/3-540-45664-3\_19},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Schindler02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/NiedermeyerS02,
  author       = {Frank Niedermeyer and
                  Werner Schindler},
  editor       = {Stelvio Cimato and
                  Clemente Galdi and
                  Giuseppe Persiano},
  title        = {On a Class of Key Agreement Protocols Which Cannot Be Unconditionally
                  Secure},
  booktitle    = {Security in Communication Networks, Third International Conference,
                  {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2576},
  pages        = {133--145},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36413-7\_10},
  doi          = {10.1007/3-540-36413-7\_10},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/NiedermeyerS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Schindler01,
  author       = {Werner Schindler},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  David Naccache and
                  Christof Paar},
  title        = {Efficient Online Tests for True Random Number Generators},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2001, Third International
                  Workshop, Paris, France, May 14-16, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2162},
  pages        = {103--117},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44709-1\_10},
  doi          = {10.1007/3-540-44709-1\_10},
  timestamp    = {Mon, 24 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/Schindler01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/SchindlerKQ01,
  author       = {Werner Schindler and
                  Fran{\c{c}}ois Koeune and
                  Jean{-}Jacques Quisquater},
  editor       = {Bahram Honary},
  title        = {Improving Divide and Conquer Attacks against Cryptosystems by Better
                  Error Detection / Correction Strategies},
  booktitle    = {Cryptography and Coding, 8th {IMA} International Conference, Cirencester,
                  UK, December 17-19, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2260},
  pages        = {245--267},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45325-3\_22},
  doi          = {10.1007/3-540-45325-3\_22},
  timestamp    = {Wed, 18 Mar 2020 16:01:01 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/SchindlerKQ01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Schindler00,
  author       = {Werner Schindler},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {A Timing Attack against {RSA} with the Chinese Remainder Theorem},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second
                  International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1965},
  pages        = {109--124},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44499-8\_8},
  doi          = {10.1007/3-540-44499-8\_8},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Schindler00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comgeo/Schindler94,
  author       = {Werner Schindler},
  title        = {Equivariant Mappings: a New Approach in Stochastic Simulations},
  journal      = {Comput. Geom.},
  volume       = {4},
  pages        = {327--343},
  year         = {1994},
  url          = {https://doi.org/10.1016/0925-7721(94)00012-3},
  doi          = {10.1016/0925-7721(94)00012-3},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comgeo/Schindler94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mor/Schindler94,
  author       = {Werner Schindler},
  title        = {A Generalization of Weyl's Integration Theorem and Its Meaning for
                  Stochastic Simulations},
  journal      = {Math. Oper. Res.},
  volume       = {19},
  number       = {3},
  pages        = {523--538},
  year         = {1994},
  url          = {https://doi.org/10.1287/moor.19.3.523},
  doi          = {10.1287/MOOR.19.3.523},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mor/Schindler94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comgeo/BokowskiRS91,
  author       = {J{\"{u}}rgen Bokowski and
                  J{\"{u}}rgen Richter{-}Gebert and
                  Werner Schindler},
  title        = {On the Distribution of Order Types},
  journal      = {Comput. Geom.},
  volume       = {1},
  pages        = {127--142},
  year         = {1991},
  url          = {https://doi.org/10.1016/0925-7721(92)90012-H},
  doi          = {10.1016/0925-7721(92)90012-H},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comgeo/BokowskiRS91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}