Bertram Poettering
Bertram Poettering
IBM Research Labs - Zurich
Geverifieerd e-mailadres voor zurich.ibm.com
Titel
Geciteerd door
Geciteerd door
Jaar
On the Security of RC4 in {TLS}
N AlFardan, DJ Bernstein, KG Paterson, B Poettering, JCN Schuldt
22nd {USENIX} Security Symposium ({USENIX} Security 13), 305-320, 2013
2162013
Redactable signatures for tree-structured data: Definitions and constructions
C Brzuska, H Busch, O Dagdelen, M Fischlin, M Franz, S Katzenbeisser, ...
International Conference on Applied Cryptography and Network Security, 87-104, 2010
1262010
On the Security of RC4 in TLS and WPA
NJ AlFardan, DJ Bernstein, KG Paterson, B Poettering, JCN Schuldt
USENIX Security Symposium, 173, 2013
782013
Private discovery of common social contacts
E De Cristofaro, M Manulis, B Poettering
International journal of information security 12 (1), 49-65, 2013
602013
Towards bidirectional ratcheted key exchange
B Poettering, P Rösler
Annual International Cryptology Conference, 3-32, 2018
422018
A more cautious approach to security against mass surveillance
JP Degabriele, P Farshim, B Poettering
International Workshop on Fast Software Encryption, 579-598, 2015
422015
Plaintext recovery attacks against WPA/TKIP
KG Paterson, B Poettering, JCN Schuldt
International Workshop on Fast Software Encryption, 325-349, 2014
402014
Cryptanalysis of OCB2: attacks on authenticity and confidentiality
A Inoue, T Iwata, K Minematsu, B Poettering
Journal of Cryptology 33 (4), 1871-1913, 2020
312020
ASICS: Authenticated key exchange security incorporating certification systems
C Boyd, C Cremers, M Feltz, KG Paterson, B Poettering, D Stebila
International Journal of Information Security 16 (2), 151-171, 2017
312017
Simple, efficient and strongly KI-secure hierarchical key assignment schemes
ESV Freire, KG Paterson, B Poettering
Cryptographers’ Track at the RSA Conference, 101-114, 2013
302013
Big bias hunting in amazonia: Large-scale computation and exploitation of RC4 biases
KG Paterson, B Poettering, JCN Schuldt
International Conference on the Theory and Application of Cryptology and …, 2014
292014
Privacy-preserving group discovery with linear complexity
M Manulis, B Pinkas, B Poettering
International Conference on Applied Cryptography and Network Security, 420-437, 2010
292010
From identification to signatures, tightly: A framework and generic transforms
M Bellare, B Poettering, D Stebila
International Conference on the Theory and Application of Cryptology and …, 2016
262016
Double-authentication-preventing signatures
B Poettering, D Stebila
International Journal of Information Security 16 (1), 1-22, 2017
252017
Practical secure logging: Seekable sequential key generators
GA Marson, B Poettering
European Symposium on Research in Computer Security, 111-128, 2013
222013
Affiliation-hiding key exchange with untrusted group authorities
M Manulis, B Poettering, G Tsudik
International Conference on Applied Cryptography and Network Security, 402-419, 2010
222010
On the provable security of (EC) DSA signatures
M Fersch, E Kiltz, B Poettering
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
212016
KEM combiners
F Giacon, F Heuer, B Poettering
IACR International Workshop on Public Key Cryptography, 190-218, 2018
192018
Security notions for bidirectional channels
GA Marson, B Poettering
IACR Transactions on Symmetric Cryptology, 405-426, 2017
172017
Asynchronous ratcheted key exchange
B Poettering, P Rösler
Cryptology ePrint Archive, Report 2018/296, 2018
152018
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20