Marcus Brinkmann
Marcus Brinkmann
Verified email at
Cited by
Cited by
On the classification of APN functions up to dimension five
M Brinkmann, G Leander
Designs, Codes and Cryptography 49 (1), 273-288, 2008
Coyotos microkernel specification
JS Shapiro, E Northup, MS Doerrie, S Sridhar, NH Walfield, M Brinkmann
The EROS Group, LLC, 0.5 edition, 24, 2007
A critique of the GNU Hurd multi-server operating system
NH Walfield, M Brinkmann
ACM SIGOPS Operating Systems Review 41 (4), 30-39, 2007
“Johnny, you are fired!”–Spoofing OpenPGP and S/MIME Signatures in Emails
J Müller, M Brinkmann, D Poddebniak, H Böck, S Schinzel, J Somorovsky, ...
28th {USENIX} Security Symposium ({USENIX} Security 19), 1011-1028, 2019
Raccoon Attack: Finding and Exploiting {Most-Significant-Bit-Oracles} in {TLS-DH (E})
R Merget, M Brinkmann, N Aviram, J Somorovsky, J Mittmann, J Schwenk
30th USENIX Security Symposium (USENIX Security 21), 213-230, 2021
{ALPACA}: Application Layer Protocol Confusion-Analyzing and Mitigating Cracks in {TLS} Authentication
M Brinkmann, C Dresen, R Merget, D Poddebniak, J Müller, ...
30th USENIX Security Symposium (USENIX Security 21), 4293-4310, 2021
Re: What’s Up Johnny?
J Müller, M Brinkmann, D Poddebniak, S Schinzel, J Schwenk
International Conference on Applied Cryptography and Network Security, 24-42, 2019
Mitigation of Attacks on Email End-to-End Encryption
J Schwenk, M Brinkmann, D Poddebniak, J Müller, J Somorovsky, ...
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
Linearly self-equivalent APN permutations in small dimension
C Beierle, M Brinkmann, G Leander
IEEE Transactions on Information Theory 67 (7), 4863-4875, 2021
STEED—Usable End-to-End Encryption
W Koch, M Brinkmann
White Paper, Oct, 2011
Porting the GNU Hurd to the L4 Microkernel
M Brinkmann
Free Software Foundation Inc, 2003
Mailto: Me Your Secrets. On Bugs and Features in Email End-to-End Encryption
J Müller, M Brinkmann, D Poddebniak, S Schinzel, J Schwenk
2020 IEEE Conference on Communications and Network Security (CNS), 1-9, 2020
Extended Affine and CCZ Equivalence up to Dimension 4
M Brinkmann
Cryptology ePrint Archive, 2019
" I {don’t} know why I check this...''-Investigating Expert Users' Strategies to Detect Email Signature Spoofing Attacks
P Mayer, D Poddebniak, K Fischer, M Brinkmann, J Somorovsky, A Sasse, ...
Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022), 77-96, 2022
Classification of Almost Perfect Nonlinear Functions up to Dimension Five
M Brinkmann
Isolated and Exhausted: Attacking Operating Systems via Site Isolation in the Browser
M Gierlings, M Brinkmann, J Schwenk
Operating System Design and Implementation
T Petazzoni, M Brinkmann, N Walfield, M Gorman, JS Shapiro
Improving Usability via Access Decomposition and Policy Refinement
NH Walfield, M Brinkmann
The system can't perform the operation now. Try again later.
Articles 1–18