Follow
Ralf-Philipp Weinmann
Ralf-Philipp Weinmann
Comsecuris GmbH
Verified email at comsecuris.com - Homepage
Title
Cited by
Cited by
Year
Breaking 104 bit WEP in less than 60 seconds
E Tews, RP Weinmann, A Pyshkin
Information Security Applications: 8th International Workshop, WISA 2007 …, 2007
3752007
Trawling for tor hidden services: Detection, measurement, deanonymization
A Biryukov, I Pustogarov, RP Weinmann
2013 IEEE Symposium on Security and Privacy, 80-94, 2013
3212013
Content and popularity analysis of Tor hidden services
A Biryukov, I Pustogarov, F Thill, RP Weinmann
2014 IEEE 34th International Conference on Distributed Computing Systems …, 2014
2002014
Analysis of the SMS4 block cipher
F Liu, W Ji, L Hu, J Ding, S Lv, A Pyshkin, RP Weinmann
Information Security and Privacy: 12th Australasian Conference, ACISP 2007 …, 2007
1452007
A systematic analysis of the Juniper Dual EC incident
S Checkoway, J Maskiewicz, C Garman, J Fried, S Cohney, M Green, ...
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
1172016
Baseband Attacks: Remote Exploitation of Memory Corruptions in Cellular Protocol Stacks.
RP Weinmann
WOOT, 12-21, 2012
1062012
iOS Hacker's Handbook
C Miller, D Blazakis, D DaiZovi, S Esser, V Iozzo, RP Weinmann
John Wiley & Sons, 2012
892012
MutantXL
J Ding, J Buchmann, MSE Mohamed, W Mohamed, RP Weinmann
Proceedings of the 1st international conference on Symbolic Computation and …, 2008
832008
A Framework for Automated {Architecture-Independent} Gadget Search
T Dullien, T Kornau, RP Weinmann
4th USENIX Workshop on Offensive Technologies (WOOT 10), 2010
722010
Block Ciphers Sensitive to Gröbner Basis Attacks.
J Buchmann, A Pyshkin, RP Weinmann
CT-RSA 3860, 313-331, 2006
652006
A zero-dimensional Gröbner basis for AES-128
J Buchmann, A Pyshkin, RP Weinmann
International Workshop on Fast Software Encryption, 78-88, 2006
562006
Analysis of the dvb common scrambling algorithm
RP Weinmann, K Wirt
Communications and Multimedia Security, 195-207, 2005
532005
Cryptanalysis of the DECT standard cipher
K Nohl, E Tews, RP Weinmann
International Workshop on Fast Software Encryption, 1-18, 2010
452010
Attacks on the DECT authentication mechanisms
S Lucks, A Schuler, E Tews, RP Weinmann, M Wenzel
Cryptographers’ Track at the RSA Conference, 48-65, 2009
422009
Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures
JS Coron, D Naccache, M Tibouchi, RP Weinmann
Annual International Cryptology Conference, 428-444, 2009
262009
Post-quantum signatures
J Buchmann, C Coronado, M Döring, D Engelbert, C Ludwig, R Overbeck, ...
Cryptology ePrint Archive, 2004
262004
All your baseband are belong to us
RP Weinmann
hack. lu, 2010
242010
Meet-in-the-middle attacks on SHA-3 candidates
D Khovratovich, I Nikolić, RP Weinmann
International Workshop on Fast Software Encryption, 228-245, 2009
222009
Block ciphers: algebraic cryptanalysis and Groebner bases
C Cid, RP Weinmann
Groebner bases, coding, and cryptography, 307-327, 2009
212009
Variants of Bleichenbacher’s low-exponent attack on PKCS# 1 RSA signatures
U Kühn, A Pyshkin, E Tews, RP Weinmann
SICHERHEIT 2008–Sicherheit, Schutz und Zuverlässigkeit. Beiträge der 4 …, 2008
162008
The system can't perform the operation now. Try again later.
Articles 1–20