Bertram Poettering
Bertram Poettering
IBM Research Labs - Zurich
Verified email at zurich.ibm.com
Title
Cited by
Cited by
Year
On the Security of RC4 in {TLS}
N AlFardan, DJ Bernstein, KG Paterson, B Poettering, JCN Schuldt
22nd {USENIX} Security Symposium ({USENIX} Security 13), 305-320, 2013
2582013
Redactable signatures for tree-structured data: definitions and constructions
C Brzuska, H Busch, O Dagdelen, M Fischlin, M Franz, S Katzenbeisser, ...
International Conference on Applied Cryptography and Network Security, 87-104, 2010
1172010
Private discovery of common social contacts
E De Cristofaro, M Manulis, B Poettering
International Journal of Information Security 12 (1), 49-65, 2013
512013
A more cautious approach to security against mass surveillance
JP Degabriele, P Farshim, B Poettering
International Workshop on Fast Software Encryption, 579-598, 2015
352015
Plaintext recovery attacks against WPA/TKIP
KG Paterson, B Poettering, JCN Schuldt
International Workshop on Fast Software Encryption, 325-349, 2014
332014
ASICS: Authenticated key exchange security incorporating certification systems
C Boyd, C Cremers, M Feltz, KG Paterson, B Poettering, D Stebila
International Journal of Information Security 16 (2), 151-171, 2017
312017
Simple, efficient and strongly KI-secure hierarchical key assignment schemes
ESV Freire, KG Paterson, B Poettering
Cryptographers’ Track at the RSA Conference, 101-114, 2013
272013
Privacy-preserving group discovery with linear complexity
M Manulis, B Pinkas, B Poettering
International Conference on Applied Cryptography and Network Security, 420-437, 2010
262010
Big bias hunting in amazonia: Large-scale computation and exploitation of RC4 biases
KG Paterson, B Poettering, JCN Schuldt
International Conference on the Theory and Application of Cryptology and …, 2014
242014
Towards bidirectional ratcheted key exchange
B Poettering, P Rösler
Annual International Cryptology Conference, 3-32, 2018
232018
From identification to signatures, tightly: A framework and generic transforms
M Bellare, B Poettering, D Stebila
International Conference on the Theory and Application of Cryptology and …, 2016
232016
Double-authentication-preventing signatures
B Poettering, D Stebila
International Journal of Information Security 16 (1), 1-22, 2017
212017
Cryptanalysis of OCB2: Attacks on authenticity and confidentiality
A Inoue, T Iwata, K Minematsu, B Poettering
Journal of Cryptology, 1-43, 2020
202020
Practical secure logging: Seekable sequential key generators
GA Marson, B Poettering
European Symposium on Research in Computer Security, 111-128, 2013
192013
Affiliation-hiding key exchange with untrusted group authorities
M Manulis, B Poettering, G Tsudik
International Conference on Applied Cryptography and Network Security, 402-419, 2010
192010
Security notions for bidirectional channels
GA Marson, B Poettering
IACR Transactions on Symmetric Cryptology, 405-426, 2017
152017
On the provable security of (EC) DSA signatures
M Fersch, E Kiltz, B Poettering
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
152016
Publicly verifiable ciphertexts
JG Nieto, M Manulis, B Poettering, J Rangasamy, D Stebila
Journal of computer security 21 (5), 749-778, 2013
142013
Deterring certificate subversion: efficient double-authentication-preventing signatures
M Bellare, B Poettering, D Stebila
IACR International Workshop on Public Key Cryptography, 121-151, 2017
132017
Even more practical secure logging: Tree-based seekable sequential key generators
GA Marson, B Poettering
European Symposium on Research in Computer Security, 37-54, 2014
132014
The system can't perform the operation now. Try again later.
Articles 1–20