Bertram Poettering

From MaRDI portal
Revision as of 17:03, 24 September 2023 by Import230924090903 (talk | contribs) (Created automatically from import230924090903)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Person:1653253

Available identifiers

zbMath Open poettering.bertramMaRDI QIDQ1653253

List of research outcomes





PublicationDate of PublicationType
Formalizing hash-then-sign signatures2024-11-12Paper
On secure ratcheting with immediate decryption2023-08-25Paper
Sequential digital signatures for cryptographic software-update authentication2023-07-28Paper
Encrypt-to-Self: Securely Outsourcing Storage2022-12-22Paper
Cryptanalysis of OCB2: attacks on authenticity and confidentiality2020-11-06Paper
Cryptanalysis of OCB2: attacks on authenticity and confidentiality2020-05-20Paper
Subverting decryption in AEAD2020-05-06Paper
Lossy trapdoor permutations with improved lossiness2020-01-28Paper
Towards bidirectional ratcheted key exchange2018-09-12Paper
Shorter double-authentication preventing signatures for small address spaces2018-07-17Paper
Hashing solutions instead of generating problems: on the interactive certification of RSA moduli2018-05-29Paper
Hybrid encryption in a multi-user setting, revisited2018-05-16Paper
KEM combiners2018-05-16Paper
On the one-per-message unforgeability of (EC)DSA and its variants2018-01-19Paper
Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures2017-06-13Paper
Selective Opening Security from Simulatable Data Encapsulation2017-01-06Paper
From Identification to Signatures, Tightly: A Framework and Generic Transforms2017-01-06Paper
Cold Boot Attacks in the Discrete Logarithm Setting2016-03-02Paper
Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes2015-10-20Paper
Plaintext Recovery Attacks Against WPA/TKIP2015-09-18Paper
A More Cautious Approach to Security Against Mass Surveillance2015-09-18Paper
Even More Practical Secure Logging: Tree-Based Seekable Sequential Key Generators2015-07-27Paper
Double-Authentication-Preventing Signatures2015-07-24Paper
Big Bias Hunting in Amazonia: Large-Scale Computation and Exploitation of RC4 Biases (Invited Paper)2015-01-16Paper
Practical Secure Logging: Seekable Sequential Key Generators2014-10-16Paper
ASICS: Authenticated Key Exchange Security Incorporating Certification Systems2014-10-16Paper
Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes2013-03-18Paper
Publicly Verifiable Ciphertexts2012-09-25Paper
Affiliation-Hiding Authentication with Minimal Bandwidth Consumption2011-10-14Paper
Private Discovery of Common Social Contacts2011-06-28Paper
Taming Big Brother Ambitions: More Privacy for Secret Handshakes2010-08-10Paper
Redactable Signatures for Tree-Structured Data: Definitions and Constructions2010-07-06Paper
Affiliation-Hiding Key Exchange with Untrusted Group Authorities2010-07-06Paper
Privacy-Preserving Group Discovery with Linear Complexity2010-07-06Paper

Research outcomes over time

This page was built for person: Bertram Poettering