BibTeX records: André Weimerskirch

download as .bib file

@article{DBLP:journals/dagstuhl-reports/KarglKMWG23,
  author       = {Frank Kargl and
                  Ioannis Krontiris and
                  Jason Millar and
                  Andr{\'{e}} Weimerskirch and
                  Kevin Gomez},
  title        = {Privacy Protection of Automated and Self-Driving Vehicles (Dagstuhl
                  Seminar 23242)},
  journal      = {Dagstuhl Reports},
  volume       = {13},
  number       = {6},
  pages        = {22--54},
  year         = {2023},
  url          = {https://doi.org/10.4230/DagRep.13.6.22},
  doi          = {10.4230/DAGREP.13.6.22},
  timestamp    = {Thu, 14 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-reports/KarglKMWG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/HuZWM22,
  author       = {Shengtuo Hu and
                  Qingzhao Zhang and
                  Andr{\'{e}} Weimerskirch and
                  Z. Morley Mao},
  editor       = {Yuji Suga and
                  Kouichi Sakurai and
                  Xuhua Ding and
                  Kazue Sako},
  title        = {Gatekeeper: {A} Gateway-based Broadcast Authentication Protocol for
                  the In-Vehicle Ethernet},
  booktitle    = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications
                  Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022},
  pages        = {494--507},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3488932.3517396},
  doi          = {10.1145/3488932.3517396},
  timestamp    = {Tue, 24 May 2022 13:40:31 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/HuZWM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/KarglKWW22,
  author       = {Frank Kargl and
                  Ioannis Krontiris and
                  Andr{\'{e}} Weimerskirch and
                  Ian Williams},
  title        = {Privacy Protection of Automated and Self-Driving Vehicles (Dagstuhl
                  Seminar 22042)},
  journal      = {Dagstuhl Reports},
  volume       = {12},
  number       = {1},
  pages        = {83--100},
  year         = {2022},
  url          = {https://doi.org/10.4230/DagRep.12.1.83},
  doi          = {10.4230/DAGREP.12.1.83},
  timestamp    = {Mon, 26 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-reports/KarglKWW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/BrechtTWWKHG18,
  author       = {Benedikt Brecht and
                  Dean Therriault and
                  Andr{\'{e}} Weimerskirch and
                  William Whyte and
                  Virendra Kumar and
                  Thorsten Hehn and
                  Roy Goudy},
  title        = {A Security Credential Management System for {V2X} Communications},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {19},
  number       = {12},
  pages        = {3850--3871},
  year         = {2018},
  url          = {https://doi.org/10.1109/TITS.2018.2797529},
  doi          = {10.1109/TITS.2018.2797529},
  timestamp    = {Tue, 24 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tits/BrechtTWWKHG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1802-05323,
  author       = {Benedikt Brecht and
                  Dean Therriault and
                  Andr{\'{e}} Weimerskirch and
                  William Whyte and
                  Virendra Kumar and
                  Thorsten Hehn and
                  Roy Goudy},
  title        = {A Security Credential Management System for {V2X} Communications},
  journal      = {CoRR},
  volume       = {abs/1802.05323},
  year         = {2018},
  url          = {http://arxiv.org/abs/1802.05323},
  eprinttype    = {arXiv},
  eprint       = {1802.05323},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1802-05323.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiuMWZ17,
  author       = {Jiafa Liu and
                  Di Ma and
                  Andr{\'{e}} Weimerskirch and
                  Haojin Zhu},
  editor       = {Jianying Zhou and
                  Ernesto Damiani},
  title        = {A Functional Co-Design towards Safe and Secure Vehicle Platooning},
  booktitle    = {Proceedings of the 3rd {ACM} Workshop on Cyber-Physical System Security,
                  CPSS@AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2, 2017},
  pages        = {81--90},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3055186.3055193},
  doi          = {10.1145/3055186.3055193},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LiuMWZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DominicCEMW16,
  author       = {Derrick Dominic and
                  Sumeet Chhawri and
                  Ryan M. Eustice and
                  Di Ma and
                  Andr{\'{e}} Weimerskirch},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Mathias Payer and
                  Stefan Mangard and
                  Alvaro A. C{\'{a}}rdenas and
                  Rakesh B. Bobba},
  title        = {Risk Assessment for Cooperative Automated Driving},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Cyber-Physical Systems Security
                  and Privacy, CPS-SPC@CCS 2016, Vienna, Austria, October 28, 2016},
  pages        = {47--58},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2994487.2994499},
  doi          = {10.1145/2994487.2994499},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DominicCEMW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/woot/BurakovaHMW16,
  author       = {Yelizaveta Burakova and
                  Bill Hass and
                  Leif Millar and
                  Andr{\'{e}} Weimerskirch},
  editor       = {Natalie Silvanovich and
                  Patrick Traynor},
  title        = {Truck Hacking: An Experimental Analysis of the {SAE} {J1939} Standard},
  booktitle    = {10th {USENIX} Workshop on Offensive Technologies, {WOOT} 16, Austin,
                  TX, USA, August 8-9, 2016},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/woot16/workshop-program/presentation/burakova},
  timestamp    = {Mon, 01 Feb 2021 08:41:54 +0100},
  biburl       = {https://dblp.org/rec/conf/woot/BurakovaHMW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Weimerskirch15,
  author       = {Andr{\'{e}} Weimerskirch},
  editor       = {Indrajit Ray and
                  Xiaofeng Wang and
                  Kui Ren},
  title        = {An Overview of Automotive Cybersecurity: Challenges and Solution Approaches},
  booktitle    = {Proceedings of the 5th International Workshop on Trustworthy Embedded
                  Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015},
  pages        = {53},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808414.2808423},
  doi          = {10.1145/2808414.2808423},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Weimerskirch15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vnc/WhyteWKH13,
  author       = {William Whyte and
                  Andr{\'{e}} Weimerskirch and
                  Virendra Kumar and
                  Thorsten Hehn},
  title        = {A security credential management system for {V2V} communications},
  booktitle    = {2013 {IEEE} Vehicular Networking Conference, Boston, MA, USA, December
                  16-18, 2013},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/VNC.2013.6737583},
  doi          = {10.1109/VNC.2013.6737583},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/vnc/WhyteWKH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/arc/GuneysuMW12,
  author       = {Tim G{\"{u}}neysu and
                  Igor L. Markov and
                  Andr{\'{e}} Weimerskirch},
  editor       = {Oliver C. S. Choy and
                  Ray C. C. Cheung and
                  Peter M. Athanas and
                  Kentaro Sano},
  title        = {Securely Sealing Multi-FPGA Systems},
  booktitle    = {Reconfigurable Computing: Architectures, Tools and Applications -
                  8th International Symposium, {ARC} 2012, Hong Kong, China, March 19-23,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7199},
  pages        = {276--289},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28365-9\_23},
  doi          = {10.1007/978-3-642-28365-9\_23},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/arc/GuneysuMW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Weimerskirch11,
  author       = {Andr{\'{e}} Weimerskirch},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Fixed-Base Exponentiation},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {482--485},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_29},
  doi          = {10.1007/978-1-4419-5906-5\_29},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Weimerskirch11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Weimerskirch11a,
  author       = {Andr{\'{e}} Weimerskirch},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Fixed-Exponent Exponentiation},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {485--486},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_30},
  doi          = {10.1007/978-1-4419-5906-5\_30},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Weimerskirch11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Weimerskirch11b,
  author       = {Andr{\'{e}} Weimerskirch},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Karatsuba Algorithm},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {666--669},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_35},
  doi          = {10.1007/978-1-4419-5906-5\_35},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Weimerskirch11b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/wi/10/WeimerskirchHHL10,
  author       = {Andr{\'{e}} Weimerskirch and
                  Jason J. Haas and
                  Yih{-}Chun Hu and
                  Kenneth P. Laberteaux},
  editor       = {Hannes Hartenstein and
                  Kenneth P. Laberteaux},
  title        = {Data Security in Vehicular Communication Networks},
  booktitle    = {{VANET:} Vehicular Applications and Inter-Networking Technologies},
  series       = {Intelligent transportation systems},
  pages        = {299--363},
  publisher    = {Wiley},
  year         = {2010},
  url          = {https://doi.org/10.1002/9780470740637.ch9},
  doi          = {10.1002/9780470740637.CH9},
  timestamp    = {Tue, 23 Jul 2019 12:02:26 +0200},
  biburl       = {https://dblp.org/rec/books/wi/10/WeimerskirchHHL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mobicom/2010vanet,
  editor       = {Timo Kosch and
                  Andr{\'{e}} Weimerskirch and
                  Marc Torrent{-}Moreno and
                  Marco Gruteser},
  title        = {Proceedings of the Seventh International Workshop on Vehicular Ad
                  Hoc Networks, {VANET} 2010, Chicago, IL, USA, September 24, 2010},
  publisher    = {{ACM}},
  year         = {2010},
  isbn         = {978-1-4503-0145-9},
  timestamp    = {Wed, 27 Apr 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobicom/2010vanet.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vnc/ButtyanHWW09,
  author       = {Levente Butty{\'{a}}n and
                  Tam{\'{a}}s Holczer and
                  Andr{\'{e}} Weimerskirch and
                  William Whyte},
  title        = {{SLOW:} {A} Practical pseudonym changing scheme for location privacy
                  in VANETs},
  booktitle    = {{IEEE} Vehicular Networking Conference, {VNC} 2009, Tokyo, Japan,
                  October 28-30, 2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/VNC.2009.5416380},
  doi          = {10.1109/VNC.2009.5416380},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/vnc/ButtyanHWW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mobicom/2009vanet,
  editor       = {Rajeev Shorey and
                  Andr{\'{e}} Weimerskirch and
                  Daniel Jiang and
                  Martin Mauve},
  title        = {Proceedings of the Sixth International Workshop on Vehicular Ad Hoc
                  Networks, {VANET} 2009, Beijing, China, September 25, 2009},
  publisher    = {{ACM}},
  year         = {2009},
  isbn         = {978-1-60558-737-0},
  timestamp    = {Wed, 27 Apr 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobicom/2009vanet.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LucksZWW09,
  author       = {Stefan Lucks and
                  Erik Zenner and
                  Andr{\'{e}} Weimerskirch and
                  Dirk Westhoff},
  title        = {Concrete Security for Entity Recognition: The Jane Doe Protocol (Full
                  Paper)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {175},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/175},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LucksZWW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/LucksZWW08,
  author       = {Stefan Lucks and
                  Erik Zenner and
                  Andr{\'{e}} Weimerskirch and
                  Dirk Westhoff},
  editor       = {Dipanwita Roy Chowdhury and
                  Vincent Rijmen and
                  Abhijit Das},
  title        = {Concrete Security for Entity Recognition: The Jane Doe Protocol},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2008, 9th International Conference
                  on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5365},
  pages        = {158--171},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89754-5\_13},
  doi          = {10.1007/978-3-540-89754-5\_13},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/LucksZWW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejes/WolfWW07,
  author       = {Marko Wolf and
                  Andr{\'{e}} Weimerskirch and
                  Thomas J. Wollinger},
  title        = {State of the Art: Embedding Security in Vehicles},
  journal      = {{EURASIP} J. Embed. Syst.},
  volume       = {2007},
  year         = {2007},
  url          = {https://doi.org/10.1155/2007/74706},
  doi          = {10.1155/2007/74706},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejes/WolfWW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/PaarW07,
  author       = {Christof Paar and
                  Andr{\'{e}} Weimerskirch},
  title        = {Embedded security in a pervasive world},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {12},
  number       = {3},
  pages        = {155--161},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.istr.2007.05.006},
  doi          = {10.1016/J.ISTR.2007.05.006},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/PaarW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WeimerskirchP06,
  author       = {Andr{\'{e}} Weimerskirch and
                  Christof Paar},
  title        = {Generalizations of the Karatsuba Algorithm for Efficient Implementations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {224},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/224},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WeimerskirchP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/WesthoffLPW05,
  author       = {Dirk Westhoff and
                  Bernd Lamparter and
                  Christof Paar and
                  Andr{\'{e}} Weimerskirch},
  title        = {On digital signatures in ad hoc networks},
  journal      = {Eur. Trans. Telecommun.},
  volume       = {16},
  number       = {5},
  pages        = {411--425},
  year         = {2005},
  url          = {https://doi.org/10.1002/ett.1061},
  doi          = {10.1002/ETT.1061},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ett/WesthoffLPW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gi/LucksZWW05,
  author       = {Stefan Lucks and
                  Erik Zenner and
                  Andr{\'{e}} Weimerskirch and
                  Dirk Westhoff},
  editor       = {Armin B. Cremers and
                  Rainer Manthey and
                  Peter Martini and
                  Volker Steinhage},
  title        = {Entity Recognition for Sensor Network Motes},
  booktitle    = {35. Jahrestagung der Gesellschaft f{\"{u}}r Informatik, Informatik
                  LIVE!, {INFORMATIK} 2005, Bonn, Germany, September 19-22, 2005, Band
                  2},
  series       = {{LNI}},
  volume       = {{P-68}},
  pages        = {145--149},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/28182},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gi/LucksZWW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcsw/HammellWGW05,
  author       = {Jonathan Hammell and
                  Andr{\'{e}} Weimerskirch and
                  Joao Gir{\~{a}}o and
                  Dirk Westhoff},
  title        = {Recognition in a Low-Power Environment},
  booktitle    = {25th International Conference on Distributed Computing Systems Workshops
                  {(ICDCS} 2005 Workshops), 6-10 June 2005, Columbus, OH, {USA}},
  pages        = {933--938},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICDCSW.2005.119},
  doi          = {10.1109/ICDCSW.2005.119},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcsw/HammellWGW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/WolfWP05,
  author       = {Marko Wolf and
                  Andr{\'{e}} Weimerskirch and
                  Christof Paar},
  editor       = {Hannes Federrath},
  title        = {Digital Rights Management Systeme {(DRMS)} als Enabling Technology
                  im Automobil},
  booktitle    = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April
                  2005 in Regensburg},
  series       = {{LNI}},
  volume       = {{P-62}},
  pages        = {193--196},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/28371},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/WolfWP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Weimerskirch05,
  author       = {Andr{\'{e}} Weimerskirch},
  editor       = {Henk C. A. van Tilborg},
  title        = {Fixed-Base Exponentiation},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_170},
  doi          = {10.1007/0-387-23483-7\_170},
  timestamp    = {Thu, 27 Jun 2019 15:50:13 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Weimerskirch05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Weimerskirch05a,
  author       = {Andr{\'{e}} Weimerskirch},
  editor       = {Henk C. A. van Tilborg},
  title        = {Fixed-Exponent Exponentiation},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_171},
  doi          = {10.1007/0-387-23483-7\_171},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Weimerskirch05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Weimerskirch05b,
  author       = {Andr{\'{e}} Weimerskirch},
  editor       = {Henk C. A. van Tilborg},
  title        = {Karatsuba algorithm},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_214},
  doi          = {10.1007/0-387-23483-7\_214},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Weimerskirch05b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/de/Weimerskirch2004,
  author       = {Andr{\'{e}} Weimerskirch},
  title        = {Authentication in ad-hoc and sensor networks},
  school       = {Ruhr University Bochum},
  year         = {2004},
  url          = {http://www-brs.ub.ruhr-uni-bochum.de/netahtml/HSS/Diss/WeimerskirchAndre/},
  urn          = {urn:nbn:de:hbz:294-13406},
  timestamp    = {Sat, 17 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/de/Weimerskirch2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WeimerskirchSS03,
  author       = {Andr{\'{e}} Weimerskirch and
                  Douglas Stebila and
                  Sheueling Chang Shantz},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Generic {GF(2)} Arithmetic in Software and Its Application to {ECC}},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {79--92},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_8},
  doi          = {10.1007/3-540-45067-X\_8},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/WeimerskirchSS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/WeimerskirchW03,
  author       = {Andr{\'{e}} Weimerskirch and
                  Dirk Westhoff},
  editor       = {Mitsuru Matsui and
                  Robert J. Zuccherato},
  title        = {Zero Common-Knowledge Authentication for Pervasive Networks},
  booktitle    = {Selected Areas in Cryptography, 10th Annual International Workshop,
                  {SAC} 2003, Ottawa, Canada, August 14-15, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3006},
  pages        = {73--87},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24654-1\_6},
  doi          = {10.1007/978-3-540-24654-1\_6},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/WeimerskirchW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sasn/WeimerskirchW03,
  author       = {Andr{\'{e}} Weimerskirch and
                  Dirk Westhoff},
  editor       = {Sanjeev Setia and
                  Vipin Swarup},
  title        = {Identity certified authentication for ad-hoc networks},
  booktitle    = {Proceedings of the 1st {ACM} Workshop on Security of ad hoc and Sensor
                  Networks, {SASN} 2003, Fairfax, Virginia, USA, 2003},
  pages        = {33--40},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/986858.986864},
  doi          = {10.1145/986858.986864},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sasn/WeimerskirchW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecco/PelletierW02,
  author       = {Olivier Pelletier and
                  Andr{\'{e}} Weimerskirch},
  editor       = {William B. Langdon and
                  Erick Cant{\'{u}}{-}Paz and
                  Keith E. Mathias and
                  Rajkumar Roy and
                  David Davis and
                  Riccardo Poli and
                  Karthik Balakrishnan and
                  Vasant G. Honavar and
                  G{\"{u}}nter Rudolph and
                  Joachim Wegener and
                  Larry Bull and
                  Mitchell A. Potter and
                  Alan C. Schultz and
                  Julian F. Miller and
                  Edmund K. Burke and
                  Natasa Jonoska},
  title        = {Algorithmic Self-assembly Of {DNA} Tiles And Its Application To Cryptanalysis},
  booktitle    = {{GECCO} 2002: Proceedings of the Genetic and Evolutionary Computation
                  Conference, New York, USA, 9-13 July 2002},
  pages        = {139--146},
  publisher    = {Morgan Kaufmann},
  year         = {2002},
  timestamp    = {Mon, 13 Nov 2017 18:15:11 +0100},
  biburl       = {https://dblp.org/rec/conf/gecco/PelletierW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WeimerskirchPS01,
  author       = {Andr{\'{e}} Weimerskirch and
                  Christof Paar and
                  Sheueling Chang Shantz},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Elliptic Curve Cryptography on a Palm {OS} Device},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {502--513},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_39},
  doi          = {10.1007/3-540-47719-5\_39},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/WeimerskirchPS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/WeimerskirchT01,
  author       = {Andr{\'{e}} Weimerskirch and
                  Gilles Thonet},
  editor       = {Kwangjo Kim},
  title        = {A Distributed Light-Weight Authentication Model for Ad-hoc Networks},
  booktitle    = {Information Security and Cryptology - {ICISC} 2001, 4th International
                  Conference Seoul, Korea, December 6-7, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2288},
  pages        = {341--354},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45861-1\_26},
  doi          = {10.1007/3-540-45861-1\_26},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/WeimerskirchT01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/cs-CR-0110009,
  author       = {Olivier Pelletier and
                  Andr{\'{e}} Weimerskirch},
  title        = {Algorithmic Self-Assembly of {DNA} Tiles and its Application to Cryptanalysis},
  journal      = {CoRR},
  volume       = {cs.CR/0110009},
  year         = {2001},
  url          = {https://arxiv.org/abs/cs/0110009},
  timestamp    = {Fri, 10 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/cs-CR-0110009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics