Follow
Marcus Brinkmann
Marcus Brinkmann
Verified email at rub.de
Title
Cited by
Cited by
Year
On the classification of APN functions up to dimension five
M Brinkmann, G Leander
Designs, Codes and Cryptography 49 (1), 273-288, 2008
1322008
Raccoon Attack: Finding and Exploiting {Most-Significant-Bit-Oracles} in {TLS-DH (E})
R Merget, M Brinkmann, N Aviram, J Somorovsky, J Mittmann, J Schwenk
30th USENIX Security Symposium (USENIX Security 21), 213-230, 2021
342021
“Johnny, you are fired!”–Spoofing OpenPGP and S/MIME Signatures in Emails
J Müller, M Brinkmann, D Poddebniak, H Böck, S Schinzel, J Somorovsky, ...
28th {USENIX} Security Symposium ({USENIX} Security 19), 1011-1028, 2019
322019
{ALPACA}: Application Layer Protocol Confusion-Analyzing and Mitigating Cracks in {TLS} Authentication
M Brinkmann, C Dresen, R Merget, D Poddebniak, J Müller, ...
30th USENIX Security Symposium (USENIX Security 21), 4293-4310, 2021
232021
Coyotos microkernel specification
JS Shapiro, E Northup, MS Doerrie, S Sridhar, NH Walfield, M Brinkmann
The EROS Group, LLC, 0.5 edition, 24, 2007
22*2007
A critique of the GNU Hurd multi-server operating system
NH Walfield, M Brinkmann
ACM SIGOPS Operating Systems Review 41 (4), 30-39, 2007
222007
Re: What’s Up Johnny? Covert Content Attacks on Email End-to-End Encryption
J Müller, M Brinkmann, D Poddebniak, S Schinzel, J Schwenk
Applied Cryptography and Network Security: 17th International Conference …, 2019
182019
Mitigation of Attacks on Email End-to-End Encryption
J Schwenk, M Brinkmann, D Poddebniak, J Müller, J Somorovsky, ...
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
152020
Linearly self-equivalent APN permutations in small dimension
C Beierle, M Brinkmann, G Leander
IEEE Transactions on Information Theory 67 (7), 4863-4875, 2021
92021
Mailto: Me Your Secrets. On Bugs and Features in Email End-to-End Encryption
J Müller, M Brinkmann, D Poddebniak, S Schinzel, J Schwenk
2020 IEEE Conference on Communications and Network Security (CNS), 1-9, 2020
62020
STEED—Usable End-to-End Encryption
W Koch, M Brinkmann
White Paper, Oct, 2011
62011
Extended Affine and CCZ Equivalence up to Dimension 4
M Brinkmann
Cryptology ePrint Archive, 2019
52019
Porting the GNU Hurd to the L4 Microkernel
M Brinkmann
Free Software Foundation Inc, 2003
42003
" I {don’t} know why I check this...''-Investigating Expert Users' Strategies to Detect Email Signature Spoofing Attacks
P Mayer, D Poddebniak, K Fischer, M Brinkmann, J Somorovsky, A Sasse, ...
Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022), 77-96, 2022
32022
Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation
F Bäumer, M Brinkmann, J Schwenk
arXiv preprint arXiv:2312.12422, 2023
12023
Isolated and Exhausted: Attacking Operating Systems via Site Isolation in the Browser
M Gierlings, M Brinkmann, J Schwenk
32nd USENIX Security Symposium (USENIX Security 23), 7037-7054, 2023
12023
Leaky McEliece: Secret Key Recovery From Highly Erroneous Side-Channel Information
M Brinkmann, C Chuengsatiansup, A May, J Nowakowski, Y Yarom
Cryptology ePrint Archive, 2023
2023
Classification of Almost Perfect Nonlinear Functions up to Dimension Five
M Brinkmann
2007
Operating System Design and Implementation
T Petazzoni, M Brinkmann, N Walfield, M Gorman, JS Shapiro
Improving Usability via Access Decomposition and Policy Refinement
NH Walfield, M Brinkmann
The system can't perform the operation now. Try again later.
Articles 1–20