Прати
Bertram Poettering
Bertram Poettering
IBM Research Labs - Zurich
Верификована је имејл адреса на zurich.ibm.com
Наслов
Навело
Навело
Година
On the security of {RC4} in {TLS}
N AlFardan, DJ Bernstein, KG Paterson, B Poettering, JCN Schuldt
22nd USENIX Security Symposium (USENIX Security 13), 305-320, 2013
2712013
Redactable signatures for tree-structured data: Definitions and constructions
C Brzuska, H Busch, O Dagdelen, M Fischlin, M Franz, S Katzenbeisser, ...
Applied Cryptography and Network Security: 8th International Conference …, 2010
1552010
Towards bidirectional ratcheted key exchange
B Poettering, P Rösler
Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018
1072018
On the security of RC4 in TLS and WPA
NJ AlFardan, DJ Bernstein, KG Paterson, B Poettering, JCN Schuldt
USENIX Security Symposium 173, 2013
932013
KEM combiners
F Giacon, F Heuer, B Poettering
Public-Key Cryptography–PKC 2018: 21st IACR International Conference on …, 2018
812018
A more cautious approach to security against mass surveillance
JP Degabriele, P Farshim, B Poettering
Fast Software Encryption: 22nd International Workshop, FSE 2015, Istanbul …, 2015
792015
On the provable security of (EC) DSA signatures
M Fersch, E Kiltz, B Poettering
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
702016
Private discovery of common social contacts
E De Cristofaro, M Manulis, B Poettering
International journal of information security 12, 49-65, 2013
672013
Cryptanalysis of OCB2: attacks on authenticity and confidentiality
A Inoue, T Iwata, K Minematsu, B Poettering
Journal of Cryptology 33 (4), 1871-1913, 2020
642020
Plaintext recovery attacks against WPA/TKIP
KG Paterson, B Poettering, JCN Schuldt
Fast Software Encryption: 21st International Workshop, FSE 2014, London, UK …, 2015
482015
From identification to signatures, tightly: A framework and generic transforms
M Bellare, B Poettering, D Stebila
Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the …, 2016
442016
ASICS: Authenticated key exchange security incorporating certification systems
C Boyd, C Cremers, M Feltz, KG Paterson, B Poettering, D Stebila
International Journal of Information Security 16, 151-171, 2017
432017
Simple, efficient and strongly KI-secure hierarchical key assignment schemes
ESV Freire, KG Paterson, B Poettering
Cryptographers’ Track at the RSA Conference, 101-114, 2013
432013
Double-authentication-preventing signatures
B Poettering, D Stebila
International Journal of Information Security 16, 1-22, 2017
372017
Double-authentication-preventing signatures
B Poettering, D Stebila
Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014
362014
Privacy-preserving group discovery with linear complexity
M Manulis, B Pinkas, B Poettering
International Conference on Applied Cryptography and Network Security, 420-437, 2010
342010
Big bias hunting in amazonia: Large-scale computation and exploitation of RC4 biases
KG Paterson, B Poettering, JCN Schuldt
Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014
322014
Security notions for bidirectional channels
GA Marson, B Poettering
Cryptology ePrint Archive, 2017
292017
Practical secure logging: Seekable sequential key generators
GA Marson, B Poettering
European Symposium on Research in Computer Security, 111-128, 2013
292013
Subverting decryption in AEAD
M Armour, B Poettering
Cryptography and Coding: 17th IMA International Conference, IMACC 2019 …, 2019
272019
Систем тренутно не може да изврши ову радњу. Пробајте поново касније.
Чланци 1–20