Dr. Christopher Wolf

Lehrstuhl für Kryptologie und IT-Sicherheit
Emmy Noether Gruppe für Langzeitsicherheit
Horst Görtz Institut für IT-Sicherheit
Ruhr-Universität Bochum
44780 Bochum
NA 5/69
Tel.: +49 (0)234 32 23265
Fax.: +49 (0)234 32 14430
E-Mail:christopher.wolf(at)ruhr-uni-bochum.de
Sprechstunde im Wintersemester 2012/13: Freitag, 11:15-11:50
Journals
- Christopher Wolf and Bart Preneel:
“Equivalent Keys in Multivariate Quadratic Public Key Systems”, to appear in Journal of Mathematical Cryptology, 45 pages
- Christopher Wolf, An Braeken and Bart Preneel:
“On the Security of Stepwise Triangular Systems", Designs, Codes and Cryptography 40(3), pp. 285-302, 2006.
- Patrick Fitzpatrick and Christopher Wolf:
“Direct division in factor rings", In Electronic Letters, Vol. 38, No. 21, p. 1253-1254, October 10, 2002.
Editor (international Level)
- Stefan Lucks, Ahmad-Reza Sadeghi and Christopher Wolf (Eds.):
“WEWoRC 2007 - Western Europen Workshop on Research in Cryptology”, In the Lecture Notes in Computer Science LNCS 4945, Springer, 2008.
- Christopher Wolf, Stefan Lucks and Po-Wah Yau (Eds.):
“WEWoRC 2005 - Western Europen Workshop on Research in Cryptology”, In the Lecture Notes in Informatics LNI P-74, Gesellschaft für Informatik, 2005.
International Conferences/Workshops (Peer reviewed)
- Michael Becher, Felix C. Freiling, Johannes Hoffmann, Thorsten Holz, Sebastian Uellenbeck, Christopher Wolf:
“Mobile Security Catching Up? - Revealing the Nuts and Bolts of the Security of Mobile Devices", IEEE Symposium on Security & Privacy 2011, Oakland.
- Andrey Bogdanov, Thomas Eisenbarth, Andy Rupp and Christopher Wolf:
“Time-Area Optimized Public-Key Engines-Cryptosystems as Replacement for Elliptic Curves?”, In Proceedings of Cryptographic Hardware and Embedded Systems – CHES 2008, Lecture Notes in Computer Science LNCS 5154, Springer-Verlag, pp. 45-61, 2008
- Jintai Ding, Christopher Wolf and Bo-Yin Yang:
"l-invertible cycles for multivariate quadratic public key cryptography", In Proceedings of Public Key Cryptography 2007, Lecture Notes in Computer Science LNCS 4450, Springer-Verlag, pp. 266-281, 2007.
- Christopher Wolf:
“Introduction to Multivariate Quadratic Public Key Systems and their Applications", In Proceedings of YACC 2006 – Yet Another Conference on Cryptography, Porquerolles, France, pp. 44-55.
- Christopher Wolf and Bart Preneel:
“Equivalent keys in multivariate quadratic public key systems",In Proceedings of PQCrypto 2006: International Workshop on Post-Quantum Cryptography, Leuven, Belgium, pp. 195-214.
- Jintai Ding, Jason E. Gower, Dieter Schmidt, Christopher Wolf and Zhinjun Yin:
"Complexity Estimates for the F4 Attack on the Perturbed Matsumoto-Imai Cryptosystem", In Proceedings of 10th IMA Internation Conference on Cryptography and Coding, Lecture Notes in Computer Science LNCS 3796, Springer-Verlag, pp. 262-277, 2005.
- An Braeken, Bart Preneel and Christopher Wolf:
"Normality of Vectorial Boolean Functions", In Proceedings of 10th IMA Internation Conference on Cryptography and Coding, Lecture Notes in Computer Science LNCS 3796, Springer-Verlag, pp. 186-200, 2005.
- Christopher Wolf and Bart Preneel:
“Equivalent Keys in HFE, C*, and variations" International Conference on Cryptology in Malaysia 2005, Lecture Notes in Computer Science LNCS 3715, S. Vaudenay (ed.), Springer-Verlag, pp. 33-49, 2005.
- Klaus Kursawe and Christopher Wolf:
"Trusted Computing or The Gatekeeper", In Proceedings of Landscapes of ICT and Social Accountability, P. Duquenoy, K. Kimppa, and C. Zielinski (eds.), pp. 339-354, 2005.
- An Braeken, Christopher Wolf and Bart Preneel:
"A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes", In Topics in Cryptology - CT-RSA 2005, The Cryptographers' Track at the RSA Conference, Lecture Notes in Computer Science LNCS 3376, A. Menezes (ed.), Springer-Verlag, pp. 29-43, 2005.
- Christopher Wolf and Bart Preneel:
"Superfluous Keys in Multivariate Quadratic Asymmetric Systems", In Public Key Cryptography, 8th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2005, Lecture Notes in Computer Science 3386, S. Vaudenay (ed.), Springer-Verlag, pp. 275-287, 2005.
- An Braeken, Christopher Wolf and Bart Preneel:
"Efficient Cryptanalysis of RSE(2)PKC and RSSE(2)PKC", In Security in Communication Networks, 4th International Conference, SCN 2004, Lecture Notes in Computer Science 3352, C. Blundo, and S. Cimato (eds.), Springer-Verlag, pp. 294-307, 2005.
- An Braeken, Christopher Wolf and Bart Preneel:
“A Randomised Algorithm for Checking the Normality of Cryptographic Boolean Functions", In 3rd International Conference on Theoretical Computer Science 2004, J. Levy, E. W. Mayr, and J. C. Mitchell (eds.), Kluwer, pp. 51-66, 2004.
- Christopher Wolf:
“Efficient Public Key Generation for HFE and Variations", In Cryptographic Algorithms and their Uses - 2004, E. Dawson, and W. Klemm (eds.), QUT Publications, pp. 78-93, 2004.
- Christopher Wolf:
“Deriving Public Polynomials Efficiently for HFE-like Systems", In 2nd Yet Another Conference on Cryptography (YACC), 1 pages, 2004.
- Christopher Wolf:
“Implementing Quartz in Java”, 3rd New European Schemes for Signatures, Integrity, and Encryption Workshop, Munich, Germany, November 6 - 7, 2002, 12 pages.
Editor (national level)
- Wolfgang Lindner and Christopher Wolf (Hrsg.):
“2. Kryptotag - Workshop über Kryptographie", Technical Report 2005-CW-1, COSIC, K.U.Leuven, Belgium and Ulmer Informatik Berichte 2005-02, University of Ulm, Germany, 12 pages, 2005.
- Stefan Lucks and Christopher Wolf (Hrsg.):
“1. Kryptotag - Workshop über Kryptographie", Technical Report 2004-CW-1, COSIC, K.U.Leuven, Belgium and TR 2004-10, Reihe Informatik, University of Mannheim, Germany, 17 pages, 2004.
Journals (national level)
- Christopher Wolf:
"Kurze Signaturen in Public Key Kryptographie: Multivariate Quadratische Polynome", In MultiSysteme & Internet Security Cookbook (MISC), 9 pages, 2006.
- Christopher Wolf and Erik Zenner:
“Zur Sicherheit von SHA-1, Tragweite und Konsequenzen - ein aktueller Überblick”, in Datenschutz und Datensicherheit 29 (5), pp. 275-278, 2005.
Ph.D. thesis / Diploma Thesis
- Christopher Wolf:
“Multivariate Quadratic Polynomials in Public Key Cryptography", PhD thesis, Katholieke Universiteit Leuven, B. Preneel (promotor), 156+xxiv pages, 2005.
- Christopher Wolf:
“Hidden Field Equations (HFE) - Variations ans Attacks”, Diploma Thesis, Universitaet Ulm, 2002.
National Conferences/Workshops (Peer reviewed)
- Christopher Wolf, Jörg Schwenk and Zidu Wang:
“Sicherheitsanalyse von Kreditkarten am Beispiel von EMV”, In GI Jahrestagung 2009.
- Christopher Wolf:
“Äquivalente Schlüssel in Multivariate Quadratic Public Key Systemen — Aktueller Stand”, In Proceedings of Kryptowochenende 2006 - Workshop über Kryptographie, F. Armknecht, D. Stegemann (ed.), Technical Report of the University of Mannheim, Department of Computer Science, TR-2006-013,pp. 6-9, 2006.
- Christopher Wolf:
“Über Hash-Funktionen”, In 4. Kryptotag, Technical Report University of Bochum, Ulrich Greveler (Hg.), Technical Report No. NDS-1/06, p. 4, May 11, 2006.
- Danny De Cock, Christopher Wolf and Bart Preneel:
"The Belgian Electronic Identity Card (Overview)", In Sicherheit 2006: Sicherheit - Schutz und Zuverlässigkeit, Beiträge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), Lecture Notes in Informatics (LNI) LNI P-77, J. Dittmann (ed.), Bonner Köllen Verlag, pp. 298-301, 2006.
- Christopher Wolf and Bart Preneel:
“Applications of Multivariate Quadratic Public Key Systems", In Sicherheit - Schutz und Zuverlässigkeit, Lecture Notes in Informatics LNI P-62, Gesellschaft für Informatik, pp. 413-424, 2005.
- Christopher Wolf, Patrick Fitzpatrick, Simon N. Foley and Emanuel Popovici:
“HFE in Java: Implementing Hidden Field Equations for Public Key Cryptography”, Irish Signals and Systems Conference ISSC, June 24 - 26, 2002, Cork, Ireland, 6 pages.
Further International Conferences/Workshops
- Christopher Wolf and Bart Preneel:
“Asymmetric Cryptography: Hidden Field Equations", In European Congress on Computational Methods in Applied Sciences and Engineering (ECCOMAS), Jyvaskyla University Press, 20 pages, 2004.
- Christopher Wolf:
“Overview of Hidden Field Equations", In Polynomial-based Cryptography 2004, 3 pages, 2004.