Name
Affiliation
Papers
ANDY RUPP
Ruhr-Universität Bochum, Bochum
29
Collaborators
Citations 
PageRank 
59
196
16.95
Referers 
Referees 
References 
438
504
386
Search Limit
100504
Title
Citations
PageRank
Year
Black-Box Wallets: Fast Anonymous Two-Way Payments for Constrained Devices00.342020
P4TC - Provably-Secure yet Practical Privacy-Preserving Toll Collection.00.342020
P6V2G: A Privacy-Preserving V2G Scheme for Two-Way Payments and Reputation.00.342019
(R)CCA Secure Updatable Encryption with Integrity Protection.00.342019
Efficient Zero-Knowledge Arguments in the Discrete Log Setting, Revisited10.362019
P4TC - Provably-Secure yet Practical Privacy-Preserving Toll Collection.00.342018
BBA+: Improving the Security and Applicability of Privacy-Preserving Point Collection.10.372017
New Techniques for Structural Batch Verification in Bilinear Groups with Applications to Groth-Sahai Proofs.00.342017
Reconfigurable Cryptography: A Flexible Approach to Long-Term Security.00.342016
Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts.60.412016
Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way.20.372016
Cryptographic Theory Meets Practice: Efficient and Privacy-Preserving Payments for Public Transport30.402015
Standard versus Selective Opening Security: Separation and Equivalence Results.130.762014
Polynomial Spaces: A New Framework for Composite-to-Prime-Order Transformations.170.662014
P4R: Privacy-Preserving Pre-Payments with Refunds for Transportation Systems.30.382013
Efficient threshold zero-knowledge with applications to user-centric protocols20.372012
Hardware SLE solvers: Efficient building blocks for cryptographic and cryptanalyticapplications10.362011
The Semi-Generic Group Model and Applications to Pairing-Based Cryptography50.402010
A Real-World Attack Breaking A5/1 within Hours171.052008
Time-Area Optimized Public-Key Engines: -Cryptosystems as Replacement for Elliptic Curves?391.712008
Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems90.482008
Cryptanalysis with COPACOBANA352.452008
Time-Area Optimized Public-Key Engines: Mq-Cryptosystems As Replacement For Elliptic Curves?00.342008
On Black-Box Ring Extraction and Integer Factorization50.492008
Faster Multi-exponentiation through Caching: Accelerating (EC)DSA Signature Verification90.582008
A Hardware-Assisted Realtime Attack on A5/2 Without Precomputations80.892007
Cryptanalytic Time-Memory Tradeoffs on COPACOBANA00.342007
On the equivalence of RSA and factoring regarding generic ring algorithms140.702006
Packet trace manipulation rramework for test labs60.722004