default search action
Ulrich Kühn 0001
Person information
- affiliation: ACM, New York City, NY, USA
- affiliation (former): DZBANK AG, Germany
- affiliation (former): Technical University Berlin, Deutsche Telekom Laboratories, Germany
- affiliation (former): Sirrix AG Security Rechnologies, Bochum, Germany
- affiliation (former): Dresdner Bank AG, Frankfurt am Main, Gemany
- affiliation (PhD 1998): University of Münster, Germany
Other persons with the same name
- Ulrich Kühn — disambiguation page
- Ulrich Kühn 0002 — Stadt Hamburg, Hamburgischer Beauftragter für Datenschutz, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2010
- [c9]Ulrich Kühn:
On Security Protocols for Desktop Sharing. Sicherheit 2010: 229-240
2000 – 2009
- 2008
- [j5]Ulrich Kühn:
Breaking the Shin-Shin-Rhee remotely keyed encryption schemes. Inf. Process. Lett. 105(6): 236-240 (2008) - [c8]Ulrich Kühn, Andrei Pyshkin, Erik Tews, Ralf-Philipp Weinmann:
Variants of Bleichenbacher's Low-Exponent Attack on PKCS#1 RSA Signatures. Sicherheit 2008: 97-109 - 2007
- [j4]Ulrich Kühn, Stefan Lucks:
Auf dem Weg zu neuen Hashfunktionen - Ein Wettbewerb. Datenschutz und Datensicherheit 31(8): 596-601 (2007) - [c7]Ulrich Kühn, Marcel Selhorst, Christian Stüble:
Realizing property-based attestation and sealing with commonly available hard- and software. STC 2007: 50-57 - 2006
- [j3]Ulrich Kühn:
Aktuelle Entwicklungen bei RSA-Signaturen - Implementierungsfehler beim PKCS#1-Padding. Datenschutz und Datensicherheit 30(12): 763-767 (2006) - [c6]Ulrich Kühn:
Analysis of a Database and Index Encryption Scheme - Problems and Fixes. Secure Data Management 2006: 146-159 - 2005
- [c5]Ulrich Kühn, Klaus Kursawe, Stefan Lucks, Ahmad-Reza Sadeghi, Christian Stüble:
Secure Data Management in Trusted Computing. CHES 2005: 324-338 - [c4]Zinaida Benenson, Ulrich Kühn, Stefan Lucks:
Cryptographic Attack Metrics. Dependability Metrics 2005: 133-156 - 2003
- [c3]Ulrich Kühn:
Side-Channel Attacks on Textbook RSA and ElGamal Encryption. Public Key Cryptography 2003: 324-336 - 2002
- [c2]Ulrich Kühn:
Improved Cryptanalysis of MISTY1. FSE 2002: 61-75 - 2001
- [j2]Ulrich Kühn:
A randomized parallel algorithm for Voronoi diagrams based on symmetric convex distance functions. Discret. Appl. Math. 109(1-2): 177-196 (2001) - [c1]Ulrich Kühn:
Cryptanalysis of Reduced-Round MISTY. EUROCRYPT 2001: 325-339
1990 – 1999
- 1998
- [b1]Ulrich Kühn:
Lokale Eigenschaften in der algorithmischen Geometrie mit Anwendungen in der Parallelverarbeitung. University of Münster, Germany, 1998, pp. I, 1-116 - [j1]Ulrich Kühn:
Local Calculation of Voronoi Diagrams. Inf. Process. Lett. 68(6): 307-312 (1998)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-04 03:07 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint