XMSS: eXtended Merkle signature scheme A Hülsing, D Butin, S Gazdag, J Rijneveld, A Mohaisen | 212 | 2018 |
Body-worn cameras for police accountability: Opportunities and risks F Coudert, D Butin, D Le Métayer Computer law & security review 31 (6), 749-762, 2015 | 169 | 2015 |
Post-quantum cryptography: state of the art JA Buchmann, D Butin, F Göpfert, A Petzoldt The New Codebreakers: Essays Dedicated to David Kahn on the Occasion of His …, 2016 | 84 | 2016 |
State management for hash-based signatures D McGrew, P Kampanakis, S Fluhrer, SL Gazdag, D Butin, J Buchmann Security Standardisation Research: Third International Conference, SSR 2016 …, 2016 | 61 | 2016 |
Hash-based signatures: State of play D Butin IEEE security & privacy 15 (4), 37-43, 2017 | 59 | 2017 |
XMSS: Extended hash-based signatures A Hülsing, D Butin, S Gazdag, A Mohaisen Internet Engineering Task Force, Internet-Draft draft-irtf-cfrg-xmss-hash …, 2018 | 55 | 2018 |
Log Design for Accountability D Butin, M Chicote, D Le Métayer Security and Privacy Workshops (SPW), 2013 IEEE, 1-7, 2013 | 54 | 2013 |
Differential power analysis of XMSS and SPHINCS MJ Kannwischer, A Genêt, D Butin, J Krämer, J Buchmann Constructive Side-Channel Analysis and Secure Design: 9th International …, 2018 | 53 | 2018 |
Strong accountability: beyond vague promises D Butin, M Chicote, D Le Métayer Reloading Data Protection: Multidisciplinary Insights and Contemporary …, 2013 | 40 | 2013 |
The status of quantum-key-distribution-based long-term secure internet communication M Geihs, O Nikiforov, D Demirel, A Sauer, D Butin, F Günther, G Alber, ... IEEE Transactions on Sustainable Computing 6 (1), 19-29, 2019 | 33 | 2019 |
Log analysis for data protection accountability D Butin, D Le Métayer International Symposium on Formal Methods, 163-178, 2014 | 28 | 2014 |
Context hiding multi-key linearly homomorphic authenticators L Schabhüser, D Butin, J Buchmann Topics in Cryptology–CT-RSA 2019: The Cryptographers' Track at the RSA …, 2019 | 23 | 2019 |
Post-quantum authentication in OpenSSL with hash-based signatures D Butin, J Wälde, J Buchmann 2017 Tenth International Conference on Mobile Computing and Ubiquitous …, 2017 | 19 | 2017 |
Hash-based signatures: An outline for a new standard A Hülsing, SL Gazdag, D Butin, J Buchmann NIST Workshop on Cybersecurity in a Post-Quantum World, 1-12, 2015 | 12 | 2015 |
A guide to end-to-end privacy accountability D Butin, D Le Métayer 2015 IEEE/ACM 1st International Workshop on TEchnical and LEgal aspects of …, 2015 | 11 | 2015 |
Real-world post-quantum digital signatures D Butin, SL Gazdag, J Buchmann Cyber Security and Privacy: 4th Cyber Security and Privacy Innovation Forum …, 2015 | 11 | 2015 |
Inductive Analysis of Security Protocols in Isabelle/HOL with Applications to Electronic Voting D Butin Dublin City University, 2012 | 8 | 2012 |
RFC 8391: XMSS: eXtended Merkle Signature Scheme A Huelsing, D Butin, S Gazdag, J Rijneveld, A Mohaisen RFC Editor, 2018 | 7 | 2018 |
Towards a multidisciplinary framework to include privacy in the design of video surveillance systems Z Ma, D Butin, F Jaime, F Coudert, A Kung, C Gayrel, A Maña, C Jouvray, ... Privacy Technologies and Policy: Second Annual Privacy Forum, APF 2014 …, 2014 | 7 | 2014 |
Internet-draft: Xmss: Extended hash-based signatures A Hülsing, D Butin, S Gazdag, J Rijneveld, A Mohaisen Internet Engineering Task Force, 2017 | 6 | 2017 |