Regine Endsuleit
Karlsruhe Institute of Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Regine Endsuleit.
International Journal of Information Security | 2002
Rainer Steinwandt; Willi Geiselmann; Regine Endsuleit
Abstract.We describe several attacks on Polly Cracker, a public key cryptosystem proposed by Fellows and Koblitz. The first kind of attack shows that variations in the CPU time needed for evaluating polynomials can leak significant information about the secret key. This kind of attack might also be of interest when dealing with other cryptosystems using polynomial evaluations, like Patarin’s hidden fields equations.Next, we exhibit some “structural” weaknesses in Polly Cracker’s encryption procedure. In particular, we demonstrate that with the parameters considered in a book by Koblitz it is often possible to reveal the private key easily.
International Workshop on Engineering Societies in the Agents World | 2003
Jacques Calmet; Anusch Daemi; Regine Endsuleit; Thilo Mie
We outline a model for a society of agents based upon one of the classical theories of sociology: The Webers model. We first investigate its links to agent technology through its relationship with the modeling of micro economy and the concept of expected utility. Then, some of the features of an agent society are enhanced by imposing security and validation requirements. We show that a societal concept from Sociology can be implemented through methods of Computer Science and thus is made feasible.
availability, reliability and security | 2006
Regine Endsuleit; Thilo Mie
We present a P2P filesharing system that allows redundant storage of shared files in a way that no participating server ever stores data that could compromise its operator. Instead, only fragments that do not contain any information about the original file in the information theoretic sense are uploaded. Reconstruction of a file requires all fragments it has been decomposed into. By this, in conjunction with other cryptographic methods, we yield significant legal advantages for server operators, as well as censorship-resistance, anonymity, secure routing, authenticated file update and integrity checks.
availability, reliability and security | 2007
Regine Endsuleit; Christoph Amma
Endsuleit and Mie (2003) have proposed a model for the robust and private evaluation of a function within a group of cooperating mobile agents, called an agent alliance. The model has been given abstractly and is based on a cryptographic protocol for secure multi-party computation. This paper aims on the investigation of the complexity of a threshold signature performed within the alliance model. The goal is to achieve a practical security model in which agents can be allowed to act fully autonomously in their users name without relying on a trusted authority
workshops on enabling technologies: infrastracture for collaborative enterprises | 2004
Regine Endsuleit; Jacques Calmet
We propose to adapt the recently published model for secure multiagent computation (R. Endsuleit et al., 2003) to grid technology. Since the model is based on a protocol for secure multiparty computation we achieve computations that are robust against a (user-defined) maximum number of wrong or missing inputs. Furthermore, all computations and data stay private until they are returned to their originator. Being able to use mobile agents in a per se nontrusted environment like a grid opens up a variety of possibilities for sensitive applications.
system analysis and modeling | 2004
Regine Endsuleit; Arno Wagner
system analysis and modeling | 2003
Regine Endsuleit; Thilo Mie
Archive | 2004
Jacques Calmet; Pierre Maret; Regine Endsuleit
Archive | 2002
Regine Endsuleit; Thilo Mie
Symposium on Multiagent Systems, Robotics and Cybernetics: Theory and Practice, . | 2005
Jacques Calmet; Regine Endsuleit; Pierre Maret