Filtern
Dokumenttyp
- Dissertation (23) (entfernen)
Institut
- Institut für Europäische Urbanistik (4)
- Institut für Strukturmechanik (ISM) (4)
- Bauhaus-Institut für zukunftsweisende Infrastruktursysteme (b.is) (2)
- F. A. Finger-Institut für Baustoffkunde (FIB) (2)
- Juniorprofessur Urban Energy Systems (1)
- Professur Bauchemie und Polymere Werkstoffe (1)
- Professur Biotechnologie in der Ressourcenwirtschaft (1)
- Professur Denkmalpflege und Baugeschichte (1)
- Professur Medieninformatik (1)
- Professur Medienmanagement (1)
Schlagworte
- Finite-Elemente-Methode (2)
- Modellbildung (2)
- Stadtentwicklung (2)
- Abaqus (1)
- Abfall (1)
- Abwasser (1)
- Acceleration (1)
- Actor-Network-Theory (1)
- Aerodynamic Stability (1)
- Architektur (1)
- BIM (1)
- BSCF (1)
- Bauentwurf (1)
- Bauökologie (1)
- Berechnung (1)
- Beton (1)
- Biogas (1)
- Biomass (1)
- Biomass Technology (1)
- Biomasse (1)
- Biotechnologie (1)
- Bogotá (1)
- Brikettierung (1)
- Briquette Production (1)
- Briquetting (1)
- Brückenbau (1)
- Building Information Modelling (1)
- Bunker (1)
- CSMF (1)
- Cement (1)
- Chile (1)
- Data (1)
- Denkmalpflege (1)
- Design (1)
- Developing Countries (1)
- Dynamische Messungen (1)
- ERP (1)
- Energiebedarf (1)
- Energieverbrauch (1)
- Enterprise Resource Planning (1)
- Entwicklungsländer (1)
- Erinnerung (1)
- Ethnographie (1)
- Fernsehserie (1)
- Festbett (1)
- Finite Element Model (1)
- Fluid-Structure Interaction (1)
- Fracture (1)
- Frost-Tausalz-Widerstand (1)
- General Plan (1)
- Geschichte (1)
- Heterotopie (1)
- Historische Kulturlandschaft (1)
- Immersion (1)
- Indonesia (1)
- Informal Sector (1)
- Informationssystem (1)
- Infrastruktur (1)
- Isogeometrische Analyse (1)
- Kartierung (1)
- Keramik (1)
- Kompost (1)
- Kryptologie (1)
- Kulturerbe (1)
- Kulturlandschaft (1)
- Kulturraum (1)
- LSCF (1)
- Latin American city (1)
- Life Cycle Assessment (1)
- Lomonosov (1)
- Lomonossow (1)
- Mass Tuned Damper (1)
- Medienwissenschaft (1)
- Mongolia (1)
- Montecarlo Simulation (1)
- Muslim (1)
- NURBS (1)
- Nachbehandlung (1)
- Nachbehandlungsmittel (1)
- Nachhaltigkeit (1)
- Narration (1)
- Narrativität (1)
- Numerische Berechnung (1)
- Optimization (1)
- Oranienbaum (1)
- Organisationsforschung (1)
- Palimpsest (1)
- Parametric Design (1)
- Perowskit (1)
- Pflanzenkohle (1)
- Phase field model (1)
- Phenomeology (1)
- Phänomenologie (1)
- Power Ultrasound (1)
- Prognosemodelle (1)
- Qualitative Evaluation (1)
- Quality TV (1)
- Regionalplanung (1)
- Relikte (1)
- Resource Management (1)
- SAP (1)
- Santiago de Chile (1)
- Sauerstoff (1)
- Schwingung (1)
- Schwingungsanalyse (1)
- Schüttung (1)
- Segregation (1)
- Semiotik (1)
- Sensitivitätsanalyse (1)
- Serialität (1)
- Siedlung (1)
- Simulationsprozess (1)
- Spurensuche (1)
- SrMnO3 (1)
- Stabilität (1)
- Stadtkern (1)
- Stadtzentrum (1)
- Straßenbeton (1)
- Strukturdynamik (1)
- TV-Serie (1)
- Thermal Fluid-Structure Interaction (1)
- Tricalcium silicate (1)
- UDDT (1)
- Unsicherheitsanalyse (1)
- Urbanistik (1)
- Verkehrsinfrastruktur (1)
- Vortex Induced Vibration (1)
- Waste to Energy (1)
- Wechselwirkung (1)
- Wohnungssektor (1)
- Zement (1)
- Zwangsmigration (1)
- aesthetics (1)
- art (1)
- building information modelling (1)
- concrete pavements (1)
- culture (1)
- curing compounds (1)
- finite element method (1)
- heritage (1)
- iPiT® (1)
- incompiuto siciliano (1)
- incompletion (1)
- infrastructure studies (1)
- integrated sanitation system (1)
- isogeometric analysis (1)
- modern ruins (1)
- mortar method (1)
- moslem settlements (1)
- new alternative sanitation systems NASS (1)
- phenomenology method (1)
- soziotechnisches Gemenge (1)
- spatial concept (1)
- spatial structures (1)
- strategic and territorial planning (1)
- unfinished public works (1)
- urban centrality (1)
- urban development strategies (1)
- urban semiotics (1)
Erscheinungsjahr
- 2017 (23) (entfernen)
During the previous decades, the upcoming demand for security in the digital world, e.g., the Internet, lead to numerous groundbreaking research topics in the field of cryptography. This thesis focuses on the design and analysis of cryptographic primitives and schemes to be used for authentication of data and communication endpoints, i.e., users. It is structured into three parts, where we present the first freely scalable multi-block-length block-cipher-based compression function (Counter-bDM) in the first part. The presented design is accompanied by a thorough security analysis regarding its preimage and collision security. The second and major part is devoted to password hashing. It is motivated by the large amount of leaked password during the last years and our discovery of side-channel attacks on scrypt – the first modern password scrambler that allowed to parameterize the amount of memory required to compute a password hash. After summarizing which properties we expect from a modern password scrambler, we (1) describe a cache-timing attack on scrypt based on its password-dependent memory-access pattern and (2) outline an additional attack vector – garbage-collector attacks – that exploits optimization which may disregard to overwrite the internally used memory. Based on our observations, we introduce Catena – the first memory-demanding password-scrambling framework that allows a password-independent memory-access pattern for resistance to the aforementioned attacks. Catena was submitted to the Password Hashing Competition (PHC) and, after two years of rigorous analysis, ended up as a finalist gaining special recognition for its agile framework approach and side-channel resistance. We provide six instances of Catena suitable for a variety of applications. We close the second part of this thesis with an overview of modern password scramblers regarding their functional, security, and general properties; supported by a brief analysis of their resistance to garbage-collector attacks. The third part of this thesis is dedicated to the integrity (authenticity of data) of nonce-based authenticated encryption schemes (NAE). We introduce the so-called j-IV-Collision Attack, allowing to obtain an upper bound for an adversary that is provided with a first successful forgery and tries to efficiently compute j additional forgeries for a particular NAE scheme (in short: reforgeability). Additionally, we introduce the corresponding security notion j-INT-CTXT and provide a comparative analysis (regarding j-INT-CTXT security) of the third-round submission to the CAESAR competition and the four classical and widely used NAE schemes CWC, CCM, EAX, and GCM.