Publications of Johannes A. Buchmann Books Informatik, Festschrift zum 60. Geburtstag von Günter Hotz, Teubner, Stuttgart, Leipzig, 1992, Herausgeber, mit H. Ganzinger, W.J. Paul. Einführung in die Kryptographie, 1.Auflage, Springer-Verlag, 1999, 229p. Einführung in die Kryptographie, 2., durchges. u. erw. Aufl., Springer-Verlag, 2001, 230 p. Einführung in die Kryptographie, 3., durchges. u. erw. Aufl., Springer-Verlag, 2004, 266 p. Introduction to Cryptography, Undergraduate Texts in Mathematics, Springer-Verlag, 2001, 281 p. Introduction to Cryptography, Undergraduate Texts in Mathematics, Second Edition, Springer-Verlag, 2004, 335 p. Introduction to Cryptography, japanische Übersetzung, Springer-Verlag, 2001. Introducao a Criptografia, Editora Berkeley, 2002, 312 p. Introduction to Cryptography, Übersetzung auf Farsi, 2003, . Coding Theory, cryptography and related areas, Herausgeber, mit T. Hoeholdt, H. Stichtenoth, H. Tapia-Recillas, Springer-Verlag, 1999. Binary quadratic forms – an algorithmic approach, Springer-Verlag, Algorithms and Computation in Mathematics, Volume 20, 2007, 318 p, with U. Vollmer. Einführung in die Kryptographie, 4., durchges. u. erw. Aufl., Springer-Verlag, 2008, 278 p. Papers Zahlengeometrische Kettenbruchalgorithmen zur Einheitenberechnung, Dissertation, Köln 1982. A criterion for the equivalence of two ideals, EUROSAM 84, Lecture Notes in Computer Science 174, (1984), 333-340. A generalization of Voronoi's unit algorithm I, J. Number Theory 20, (1985), 177-191. A generalization of Voronoi's unit algorithm II, J. Number Theory 20, (1985), 192-209. Abschätzung der Periodenlänge einer verallgemeinerten Kettenbruchentwicklung, J. Reine Angew. Math. 361, (1985), 27-34. Computation of independent units in number fields by Dirichlet's method, AAECC-3 1985, Lecture Notes in Computer Science 229, (1986), 302-305, mit A. Pethö. The generalized Voronoi-Algorithm in totally real algebraic number fields, Proceedings EUROCAL 85, Lecture Notes in Computer Science 204, (1986), 479-486. Generalized continued fractions and number theoretic computations, MathematischStatistische Sektion, Forschungsgesellschaft Joanneum, Bericht Nr. 269, (1986), 1-30. The computation of the fundamental unit of totally complex quartic orders, Math. Comp. 48, (1987), 39-54. On principal ideal testing in totally complex quartic fields and the determination of certain cyclotomic constants, Math. Comp. 48, (1987), 55-66, mit H.C. Williams. On the computation of units and class numbers by a generalization of Lagrange's algorithm, J. Number Theory 26, (1987), 8-30. On the period length of the generalized Lagrange algorithm, J. Number Theory 26, (1987), 31-37. An algorithm for testing Leopoldt's conjecture, J. Number Theory 27, (1987), 92-105, mit J.W. Sands. On principal ideal testing in algebraic number fields, J. Symbolic Computation, 4, (1987), 11-19, mit H.C. Williams. Zur Komplexität der Berechnung von Einheiten und Klassenzahlen algebraischer Zahlkörper, Habilitationsschrift, Düsseldorf 1987. A key exchange system based on imaginary quadratic fields, J. Cryptology 1, (1988), 107-118, mit H.C. Williams. On the infrastructure of the principal ideal class of an algebraic number field of unit rank one, Math. Comp. 50, (1988), 569-579, mit H.C. Williams. Computation of independent units in number fields by Dirichlet's method, Math. Comp. 52, (1989), 149-159, mit A. Peth ö. Supplement to computation of independent units in number fields by Dirichlet's method, Math. Comp. 52, (1989), 1-14, mit A. Pethö. Leopoldt's Conjecture in parameterized families, Proc. Am. Math. Soc. 104, (1989), 43-48, mit J.W. Sands. On the computation of totally real quartic fields of small discriminant, Math. Comp. 52, (1989), 161-174, mit D. Ford. Computation of class groups of totally complex quartic fields, Math. Comp. 53, (1989), 387397, mit M. Pohst und J.v.Schmettow. Computing a lattice basis from a system of generating vectors, Proceedings EUROCAL 87, Springer Lecture Notes in Computer Science 378, (1989), 54-63, mit M. Pohst. On the complexity of computing class groups of algebraic number fields, Proceedings AAECC-6, Springer Lecture Notes in Computer Science 357, (1989), 122-130, mit M. Pohst. On the computation of unit groups and class groups of totally real quartic fields, Math. Comp. 53, (1989), 387-397, mit M. Pohst und J. v. Schmettow. On the computation of the class number of an algebraic number field, Math. Comp. 53, (1989), 679-688, mit H.C. Williams. On the existence of a short proof for the value of the class number and regulator of a real quadratic field, Proceedings of NATO ASI Number Theory and Applications, Kluwer Academic Publishers 1989, 327-346, mit H.C. Williams. On the complexity and efficiency of a new key exchange system, Proceedings CRYPTO '88, Lecture Notes in Computer Science 434, (1989), 597 - 616, mit S. Düllmann und H.C. Williams. A key exchange system based on real quadratic fields, Proceedings CRYPTO 88, Lecture Notes in Computer Science bf 435, (1989), 335 -343, mit H.C. Williams. Complexity of algorithms in algebraic number theory, Proceedings CNTA 1988, de Gruyter, Berlin 1990, 37-54. On generalized continued fraction expansions of short period length, Publ. Math. 37, (1990), 109-114. P-adic computation of real quadratic class numbers, Math. Comp. 54, April 1990, 855 - 868, mit J. Sands und H.C. Williams. A subexponential algorithm for the determination of class groups and regulators of algebraic number fields, Séminaire de Théorie des Nombres, Paris 1988-1989, Birkhäuser Boston Basel Berlin, 1990, 27-41. A probabilistic class group and regulator algorithm and its implementation, Proceedings of the Colloquium on Number Theory, Debrecen, 1989, Computational Number Theory, Walter de Gruyter, Berlin 1991, 54-72, mit S. Düllmann. Implementation of a key exchange protocol using real quadratic fields, Proceedings EUROCRYPT 90, Springer Lecture Notes in Computer Science 473, (1991), 8-109, with H.C. Williams and R. Scheidler. Some remarks concerning the complexity of computing class groups of quadratic fields, Journal of Complexity 7, (1991), 311-315. mit H.C. Williams. Quadratic fields and cryptography, in Number Theory and Cryptology, Cambridge University Press 1990, 9-26, mit H.C. Williams. On the computation of discrete logarithms in class groups, Proceedings CRYPTO 90, Springer Lecture Notes in Computer Science 537, (1991), 134-139, mit S. Düllmann. Constructing nonresidues in finite fields and the extended Riemann Hypothesis, Proceedings STOC 91, ACM Press 1991, 72-79, mit V. Shoup. Computing the number of points of elliptic curves over finite fields, Proceedings ISSAC 91, ACM Press 1991, 179-182, mit V. Müller. Number theoretic algorithms and cryptology, Proceedings FCT 91, Springer Lecture Notes in Computer Science 529, (1991), 16-21. Lower bounds for , an elementary approach, Publ. Math. 38, (1991), 145-163. mit K. Györy, M. Mignotte, N. Tzanakis. On short representations of orders and number fields , 1992, mit O..v. Sprang. Distributed class group computation, mit S. Düllmann, in Informatik, Festschrift zum 60. Geburtstag von Günter Hotz, Teubner, Stuttgart, Leipzig, 1992. Tools for proving zero knowledge, Proceedings EUROCRYPT 92, Springer Lecture Notes in Computer Science 658, (1993), 356-365, mit I. Biehl, B. Meyer, Christian Thiel, Christoph Thiel. Enumeration of quartic fields of small discriminant, Math. Comp. 61, (1993), 873-879, mit D. Ford und M. Pohst. A key exchange protocol using real quadratic fields, Journal of Cryptology, 7, (1994), 171199, mit R. Scheidler und H.C. Williams. An implementation of the general number field sieve, Proceedings CRYPTO 93, Springer Lecture Notes in Computer Science 773, (1994), 159-165, mit Jürgen Loho und Jörg Zayer. Algorithms for quadratic orders, Proceedings of Symposia in Applied Math., 48, (1994), 425449, mit Ingrid Biehl. Reducing lattice bases by means of approximations, Proceedings of ANTS 94, Springer Lecture Notes in Computer Science 877, (1994), 160-168. A practical version of the generalized Lagrange algorithm, Exp. Math., 3, (1994), 200-207, mit Max Jüntgen und Michael Pohst. Cryptographic protocols based on the discrete logarithm problem in real quadratic number fields, Proceedings CRYPTO 94, Springer Lecture Notes in Computer Science 839, (1994), 56-60, mit I. Biehl und C. Thiel. Approximating rings of integers in number fields, Séminaire de Théorie des Nombres Bordeaux 6, (1994), 221-260, mit H.W. Lenstra Jr. On unit groups and class groups of quadratic fields of signature (2,1), Math. Comp 62, (1994), 387-390, mit M. Pohst und J.v. Schmettow Algorithms in finite abelian groups, Proceedings of Number Theoretic and Algebraic Methods in Computer Science (NTAMCS) 1993, World Scientific Publisher (1995). Short representations of quadratic integers, Math. Appl. 325, (1995), 159-185, mit Christoph Thiel und Hugh Williams. Faktorisierung großer Zahlen, Spektrum der Wissenschaften 9, (1996), 80-89. On smooth ideals in number fields, J. Number Theory 59, (1996), 82-87, mit Christine Hollinger. Constructing nonresidues in finite fields and the extended Riemann hypothesis, Math. Comp. 65, (1996), 1311-1326, mit Victor Shoup. A one way function based on ideal arithmetic in number fields, Proceedings CRYPTO 97, Springer Lecture Notes in Computer Science 1294, (1997), 385-394, mit Sachar Paulus. On some computational problems in finite abelian groups, Math. Comp. 66, (1997), 16631687, mit Edlyn Teske und Michael Jacobson. An analysis of the reduction algorithms for binary quadratic forms, in Voronoi's Impact on Modern Science, Institute of Mathematics Kyiv, 1998, 71-98, mit Ingrid Biehl. Sieving Methods for Class Group Computation, in Algorithmic Algebra and Number Theory , B.H. Matzat, G.-M. Greuel, G.Hiss (eds.), Springer Verlag 1998, 3-10, mit M. Jacobson, S. Neis, P. Theobald, D. Weber. Zahlentheorie und Kryptographie, Jahrbuch der Akademie der Wissenschaften und Literatur, Mainz, 1998. La factorisation des grands nombres, Pour la Science, No. 251, Septembre 1998, 88-96. On factor refinement in number fields, Math. comp. 68 (1999), 345-350, mit F. Eisenbrand. Discrete Logarithms: Recent Progress, Coding Theory, cryptography and related areas, Springer-Verlag 1999, mit D. Weber. Wie sicher ist die Public-Key-Kryptographie, Tagungsband Systemsicherheit 2000, DuDFachbeiträge, 105-116, mit M. Maurer. FlexiPKI - Realisierung einer flexiblen Public-Key-Infrastruktur, Tagungsband Systemsicherheit 2000, DuD-Fachbeiträge, 309-314, mit M. Tak und M. Ruppert. Cryptography based on number fields with large regulator, Journal de Théorie des Nombres Bordeaux 12 (2000), 293-307, mit Markus Maurer und Bodo Möller. Efficient construction of cryptographically strong elliptic curves, INDOCRYPT 2000, LNCS 1977, Springer-Verlag, New York, 191-201, mit Harald Baier. Wie sicher kann Sicherheit sein, in Sicherheitskonzepte für das Internet, G. Müller und Martin Reichenbach, (Hrsg.), Springer-Verlag, 2001, 45-54. A survey on IQ cryptography, in Public-Key Cryptography and Computational Number Theory, Walter de Gruyter, Berlin - New York, 2001, 1-15, mit S. Hamdy. How secure can security possibly be, in Safety of Modern Technical Systems, 2001, 587-594, mit C. Ludwig. A signature scheme based on the intractability of computing roots, Design, Codes, and Cryptography 25 (2002), 223-236. mit I. Biehl, S. Hamdy, A. Meyer. An IND-CCA2 Public-Key Cryptosystem with fast decryption, 4th International Conference on Information Security and Cryptology ICIS'01, LNCS 2288, 2002, 51-71, mit K. Sakurai and T. Takagi Aus- und Weiterbildung in IT-Sicherheit, in IT-Sicherheit im verteilten Chaos, Tagungsband 8. Deutscher IT-Sicherheitskongress des BSI 2003, SecuMedia Verlag, 2003, 179-190, mit C. Busch und H. Baier. Number field cryptography, in High Primes and Misdemeanors: Lectures in Honour of the 60th Birthday of Hugh Cowie Williams, vol. 41 of Fields Institute Communications, 2004, 111-121, mit T. Takagi, U. Vollmer. Computing the structure of a finite abelian group, to appear in Math. Comp., mit A. Schmidt. Post quantum signatures, submitted to Design, Codes, and Cryptography., mit C. Coronado, M. Döring, D. Engelbert, C. Ludwig, R. Overbeck, A. Schmidt, U. Vollmer, R. Weinmann. Practical lattice basis sampling reduction, Cryptology ePrint Archive, mit C. Ludwig. Stefan G. Weber, Roberto Araujo, Johannes Buchmann: On Coercion-Resistant Electronic Elections with Linear Work. ARES 2007: 908-916 Alexander Wiesmaier, Marcus Lippert, Vangelis Karatsiolis, Georgios Raptis, Johannes Buchmann: An Evaluated Certification Services System for the German National Root CA Legally binding and trustworthy Transactions in E-Business and E-Government. CSREA EEE 2005: 103-110 Tobias Straub, Thilo-Alexander Ginkel, Johannes Buchmann: A Multipurpose Delegation Proxy for WWW Credentials. EuroPKI 2005: 1-21 Alexander Wiesmaier, Mike Fisher, Marcus Lippert, Johannes Buchmann: Ouflanking and Securely Using the PIN/TAN-System. Security and Management 2005: 313-319 Alexander Wiesmaier, Vangelis Karatsiolis, Marcus Lippert, Johannes Buchmann: The Workshop - Implementing Well Structured Enterprise Applications. Software Engineering Research and Practice 2005: 947 Alexander Wiesmaier, Vangelis Karatsiolis, Marcus Lippert, Johannes Buchmann: The Workshop - Implementing Well Structured Enterprise Applications CoRR abs/cs/0506050: (2005) Johannes Buchmann, Christoph Ludwig: Practical Lattice Basis Sampling Reduction. ANTS 2006: 222-237. Johannes Buchmann, Andrei Pyshkin, Ralf-Philipp Weinmann: Block Ciphers Sensitive to Gröbner Basis Attacks. CT-RSA 2006: 313-331 Sebastian Fritsch, Vangelis Karatsiolis, Marcus Lippert, Alexander Wiesmaier, Johannes Buchmann: Towards Secure Electronic Workflows. EuroPKI 2006: 154-168 Johannes Buchmann, Andrei Pyshkin, Ralf-Philipp Weinmann: A Zero-Dimensional Gröbner Basis for AES-128. FSE 2006: 78-88 Johannes Buchmann, Luis Carlos Coronado García, Erik Dahmen, Martin Döring, Elena Klintsevich: CMSS - An Improved Merkle Signature Scheme. INDOCRYPT 2006: 349-363 Alexander Wiesmaier, Ulrich Rauchschwalbe, Christoph Ludwig, Birgit Henhapl, Markus Ruppert, Johannes Buchmann: Intrinsically Legal-For-Trade Objects by Digital Signatures. Sicherheit 2006: 218-221 Alexander Wiesmaier, Ulrich Rauchschwalbe, Christoph Ludwig, Birgit Henhapl, Markus Ruppert, Johannes Buchmann: Intrinsically Legal-For-Trade Objects by Digital Signatures CoRR abs/cs/0603011: (2006) Johannes Buchmann, Alexander May, Ulrich Vollmer: Perspectives for cryptographic longterm security. Commun. ACM 49(9): 50-55 (2006) Marcus Lippert, Vangelis Karatsiolis, Alexander Wiesmaier, Johannes Buchmann: Life-cycle management of X.509 certificates based on LDAP directories. Journal of Computer Security 14(5): 419-439 (2006) Johannes Buchmann, Erik Dahmen, Elena Klintsevich, Katsuyuki Okeya, Camille Vuillaume: Merkle Signatures with Virtually Unlimited Signature Capacity. ACNS 2007: 31-45 Johannes Buchmann, Martin Döring, Richard Lindner: Efficiency Improvement for NTRU. Sicherheit 2008: 163-178 Sebastian Rohde, Thomas Eisenbarth, Erik Dahmen, Johannes Buchmann, Christof Paar Efficient Hash-Based Signatures on Embedded Devices SECSI - Secure Component and System Identification, 2008 Jintai Ding, Johannes Buchmann, Mohamed Saied Emam Mohamed, Wael Said Abd Elmageed Mohamed and Ralf-Philipp Weinmann MutantXL, in Proceedings of the SCC 2008 Johannes Buchmann, Richard Lindner, Markus Rückert, Explicit hard instances of the shortest vector problem, PQCrypto 2008, to appear Johannes Buchmann, Erik Dahmen, Michael Schneider, Merkle tree traversal revisited 2nd International Workshop on Post-Quantum Cryptography - PQCrypto 2008, to appear S. Rohde, T. Eisenbarth, E. Dahmen, J. Buchmann, C. Paar Fast Hash-Based Signatures on Constrained Devices Eighth Smart Card Research and Advanced Application Conference - CARDIS 2008, to appear J. Buchmann, M. Kaiser Computer Proven Correctness of the Rabin Public-Key Scheme Proceedings of World Academy of Science, Engineering and Technology Volume 21, May 25-27, 2007, Vienna, Austria Lecture Notes Introduction to theoretical crytography, Vorlesungsskipt 1991 mit I. Biehl. Algorithms for factoring integers, lecture notes, 1992, mit V. Müller. Primality testing, lecture notes, 1992, mit V. Müller. Einführung in die Computeralgebra, Vorlesung, 1992, mit V. Müller. Informatik I, Darmstadt, 1999. Informatik II, Saarbrücken, 1993, mit V. Müller. PKI, Darmstadt 2005.