Folgen
Bertram Poettering
Bertram Poettering
IBM Research Labs - Zurich
Bestätigte E-Mail-Adresse bei zurich.ibm.com
Titel
Zitiert von
Zitiert von
Jahr
On the Security of RC4 in TLS.
NJ AlFardan, DJ Bernstein, KG Paterson, B Poettering, JCN Schuldt
USENIX Security Symposium 2013, 2013
2392013
Redactable signatures for tree-structured data: Definitions and constructions
C Brzuska, H Busch, O Dagdelen, M Fischlin, M Franz, S Katzenbeisser, ...
Applied Cryptography and Network Security: 8th International Conference …, 2010
1392010
On the security of RC4 in TLS and WPA
NJ AlFardan, DJ Bernstein, KG Paterson, B Poettering, JCN Schuldt
USENIX Security Symposium 173, 2013
862013
Towards bidirectional ratcheted key exchange
B Poettering, P Rösler
Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018
702018
Private discovery of common social contacts
E De Cristofaro, M Manulis, B Poettering
International journal of information security 12, 49-65, 2013
672013
A more cautious approach to security against mass surveillance
JP Degabriele, P Farshim, B Poettering
Fast Software Encryption: 22nd International Workshop, FSE 2015, Istanbul …, 2015
552015
On the provable security of (EC) DSA signatures
M Fersch, E Kiltz, B Poettering
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
452016
Plaintext recovery attacks against WPA/TKIP
KG Paterson, B Poettering, JCN Schuldt
Fast Software Encryption: 21st International Workshop, FSE 2014, London, UK …, 2015
442015
Cryptanalysis of OCB2: attacks on authenticity and confidentiality
A Inoue, T Iwata, K Minematsu, B Poettering
Journal of Cryptology 33 (4), 1871-1913, 2020
422020
ASICS: Authenticated key exchange security incorporating certification systems
C Boyd, C Cremers, M Feltz, KG Paterson, B Poettering, D Stebila
International Journal of Information Security 16, 151-171, 2017
412017
Double-authentication-preventing signatures
B Poettering, D Stebila
International Journal of Information Security 16, 1-22, 2017
392017
KEM combiners
F Giacon, F Heuer, B Poettering
Public-Key Cryptography–PKC 2018: 21st IACR International Conference on …, 2018
362018
Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes.
ESV Freire, KG Paterson, B Poettering
CT-RSA 7779, 101-114, 2013
342013
From identification to signatures, tightly: a framework and generic transforms
M Bellare, B Poettering, D Stebila
Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the …, 2016
312016
Big bias hunting in amazonia: Large-scale computation and exploitation of RC4 biases
KG Paterson, B Poettering, JCN Schuldt
Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014
292014
Privacy-preserving group discovery with linear complexity
M Manulis, B Pinkas, B Poettering
Applied Cryptography and Network Security: 8th International Conference …, 2010
282010
Practical secure logging: Seekable sequential key generators
GA Marson, B Poettering
Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013
242013
Affiliation-hiding key exchange with untrusted group authorities
M Manulis, B Poettering, G Tsudik
Applied Cryptography and Network Security: 8th International Conference …, 2010
222010
Deterring certificate subversion: efficient double-authentication-preventing signatures
M Bellare, B Poettering, D Stebila
Public-Key Cryptography–PKC 2017: 20th IACR International Conference on …, 2017
212017
Asynchronous ratcheted key exchange
B Poettering, P Rösler
Cryptology ePrint Archive, 2018
192018
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20