Johannes Buchmann focuses on Theoretical computer science, Computer security, Algorithm, Discrete mathematics and Hash function. His study in Theoretical computer science is interdisciplinary in nature, drawing from both Signature, Lattice, Merkle signature scheme and Digital signature. He combines subjects such as Scheme and Public-key cryptography with his study of Signature.
His Computer security research is multidisciplinary, incorporating perspectives in Term and The Internet. As a member of one scientific family, he mostly works in the field of Algorithm, focusing on Post-quantum cryptography and, on occasion, Tree traversal and MD6. The various areas that Johannes Buchmann examines in his Discrete mathematics study include Zero, Quadratic equation and Algebraic number, Quadratic integer.
Theoretical computer science, Computer security, Cryptography, Discrete mathematics and Algorithm are his primary areas of study. His Theoretical computer science research is multidisciplinary, incorporating elements of Lattice problem, Lattice, Cryptosystem, Scheme and Computation. His Computer security research is multidisciplinary, incorporating elements of Term and Digital signature.
The Cryptography study combines topics in areas such as Quantum computer, Post-quantum cryptography and Encryption. His biological study spans a wide range of topics, including Quadratic equation, Algebraic number, Algebra and Combinatorics. His work on Cryptanalysis as part of general Algorithm study is frequently linked to Lattice-based cryptography, therefore connecting diverse disciplines of science.
Johannes Buchmann spends much of his time researching Theoretical computer science, Computer security, Cryptography, Scheme and Cloud computing. He combines subjects such as Homomorphic encryption, Correctness, Verifiable computing, Verifiable secret sharing and Computation with his study of Theoretical computer science. His Computer security research includes elements of Term and Digital signature.
His work carried out in the field of Cryptography brings together such families of science as Quantum computer and Blind signature. His research investigates the connection with Scheme and areas like Signature which intersect with concerns in Hash function, Algorithm and Homomorphic secret sharing. In his study, which falls under the umbrella issue of Hash function, Cryptography law, Cryptography standards, Strong cryptography, PKCS #1 and Financial cryptography is strongly linked to Post-quantum cryptography.
The scientist’s investigation covers issues in Cryptography, Theoretical computer science, Computer security, Post-quantum cryptography and Scheme. His Cryptography research integrates issues from Security analysis, Quantum computer, Cloud computing and Public-key cryptography. His studies deal with areas such as Homomorphic encryption, Secure multi-party computation, Computation, Verifiable secret sharing and Learning with errors as well as Theoretical computer science.
His study in Computer security is interdisciplinary in nature, drawing from both Term, Protocol and Digital signature. His Post-quantum cryptography research includes themes of Hash function, Financial cryptography, Cryptography standards, PKCS #1 and Strong cryptography. Johannes Buchmann usually deals with PKCS #1 and limits it to topics linked to ID-based cryptography and Cryptography law.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Post Quantum Cryptography
Daniel J. Bernstein;Johannes Buchmann;Erik Dahmen.
Introduction to Cryptography
Johannes A. Buchmann.
XMSS - a practical forward secure signature scheme based on minimal security assumptions
Johannes Buchmann;Erik Dahmen;Andreas Hülsing.
PQCrypto'11 Proceedings of the 4th international conference on Post-Quantum Cryptography (2011)
On the design of hardware building blocks for modern lattice-based encryption schemes
Norman Göttert;Thomas Feller;Michael Schneider;Johannes Buchmann.
cryptographic hardware and embedded systems (2012)
A key-exchange system based on imaginary quadratic fields
J. Buchmann;H. C. Williams.
Journal of Cryptology (1988)
A subexponential algorithm for the determination of class groups and regulators of algebraic number fields
Public Key Cryptography — PKC 2012
Marc Fischlin;Johannes Buchmann;Mark Manulis.
CMSS: an improved merkle signature scheme
Johannes Buchmann;Luis Carlos Coronado García;Erik Dahmen;Martin Döring.
international conference on cryptology in india (2006)
XMSS : a practical forward secure signature scheme based on minimal security assumptions
Johannes Buchmann;Erik Dahmen;Andreas Hülsing;B.-Y. Yang.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (2011)
Merkle Signatures with Virtually Unlimited Signature Capacity
Johannes Buchmann;Erik Dahmen;Elena Klintsevich;Katsuyuki Okeya.
applied cryptography and network security (2007)
Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: