Obserwuj
Bertram Poettering
Bertram Poettering
IBM Research Labs - Zurich
Zweryfikowany adres z zurich.ibm.com
Tytuł
Cytowane przez
Cytowane przez
Rok
On the security of {RC4} in {TLS}
N AlFardan, DJ Bernstein, KG Paterson, B Poettering, JCN Schuldt
22nd USENIX Security Symposium (USENIX Security 13), 305-320, 2013
2602013
Redactable signatures for tree-structured data: Definitions and constructions
C Brzuska, H Busch, O Dagdelen, M Fischlin, M Franz, S Katzenbeisser, ...
Applied Cryptography and Network Security: 8th International Conference …, 2010
1442010
On the security of RC4 in TLS and WPA
NJ AlFardan, DJ Bernstein, KG Paterson, B Poettering, JCN Schuldt
USENIX Security Symposium 173, 2013
942013
Towards bidirectional ratcheted key exchange
B Poettering, P Rösler
Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018
922018
Private discovery of common social contacts
E De Cristofaro, M Manulis, B Poettering
International journal of information security 12, 49-65, 2013
682013
A more cautious approach to security against mass surveillance
JP Degabriele, P Farshim, B Poettering
Fast Software Encryption: 22nd International Workshop, FSE 2015, Istanbul …, 2015
662015
KEM combiners
F Giacon, F Heuer, B Poettering
Public-Key Cryptography–PKC 2018: 21st IACR International Conference on …, 2018
602018
Cryptanalysis of OCB2: attacks on authenticity and confidentiality
A Inoue, T Iwata, K Minematsu, B Poettering
Journal of Cryptology 33 (4), 1871-1913, 2020
572020
On the provable security of (EC) DSA signatures
M Fersch, E Kiltz, B Poettering
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
552016
Plaintext recovery attacks against WPA/TKIP
KG Paterson, B Poettering, JCN Schuldt
Fast Software Encryption: 21st International Workshop, FSE 2014, London, UK …, 2015
452015
ASICS: Authenticated key exchange security incorporating certification systems
C Boyd, C Cremers, M Feltz, KG Paterson, B Poettering, D Stebila
International Journal of Information Security 16, 151-171, 2017
412017
From identification to signatures, tightly: A framework and generic transforms
M Bellare, B Poettering, D Stebila
Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the …, 2016
402016
Simple, efficient and strongly KI-secure hierarchical key assignment schemes
ESV Freire, KG Paterson, B Poettering
Cryptographers’ Track at the RSA Conference, 101-114, 2013
372013
Double-authentication-preventing signatures
B Poettering, D Stebila
International Journal of Information Security 16, 1-22, 2017
342017
Privacy-preserving group discovery with linear complexity
M Manulis, B Pinkas, B Poettering
Applied Cryptography and Network Security: 8th International Conference …, 2010
332010
Double-authentication-preventing signatures
B Poettering, D Stebila
Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014
312014
Big bias hunting in amazonia: Large-scale computation and exploitation of RC4 biases
KG Paterson, B Poettering, JCN Schuldt
Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014
312014
Practical secure logging: Seekable sequential key generators
GA Marson, B Poettering
Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013
272013
Security notions for bidirectional channels
GA Marson, B Poettering
Cryptology ePrint Archive, 2017
262017
Deterring certificate subversion: efficient double-authentication-preventing signatures
M Bellare, B Poettering, D Stebila
Public-Key Cryptography–PKC 2017: 20th IACR International Conference on …, 2017
242017
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20