Bertram Poettering

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Formalizing hash-then-sign signatures2024-11-12Paper
On secure ratcheting with immediate decryption
Advances in Cryptology – ASIACRYPT 2022
2023-08-25Paper
Sequential digital signatures for cryptographic software-update authentication
Computer Security – ESORICS 2022
2023-07-28Paper
Encrypt-to-Self: Securely Outsourcing Storage
1511.68047
2022-12-22Paper
Cryptanalysis of OCB2: attacks on authenticity and confidentiality
Journal of Cryptology
2020-11-06Paper
Cryptanalysis of OCB2: attacks on authenticity and confidentiality
Advances in Cryptology – CRYPTO 2019
2020-05-20Paper
Subverting decryption in AEAD2020-05-06Paper
Lossy trapdoor permutations with improved lossiness2020-01-28Paper
Towards bidirectional ratcheted key exchange2018-09-12Paper
Shorter double-authentication preventing signatures for small address spaces2018-07-17Paper
Hashing solutions instead of generating problems: on the interactive certification of RSA moduli2018-05-29Paper
Hybrid encryption in a multi-user setting, revisited2018-05-16Paper
KEM combiners2018-05-16Paper
On the one-per-message unforgeability of (EC)DSA and its variants2018-01-19Paper
Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures
Lecture Notes in Computer Science
2017-06-13Paper
Selective opening security from simulatable data encapsulation
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
From Identification to Signatures, Tightly: A Framework and Generic Transforms
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
Cryptographic enforcement of information flow policies without public information
Applied Cryptography and Network Security
2016-03-10Paper
Cold boot attacks in the discrete logarithm setting
Lecture Notes in Computer Science
2016-03-02Paper
Linkable message tagging: solving the key distribution problem of signature schemes
Information Security and Privacy
2015-10-20Paper
Plaintext Recovery Attacks Against WPA/TKIP
Fast Software Encryption
2015-09-18Paper
A more cautious approach to security against mass surveillance
Fast Software Encryption
2015-09-18Paper
Even more practical secure logging: tree-based seekable sequential key generators
Computer Security - ESORICS 2014
2015-07-27Paper
Double-authentication-preventing signatures
Computer Security - ESORICS 2014
2015-07-24Paper
Big Bias Hunting in Amazonia: Large-Scale Computation and Exploitation of RC4 Biases (Invited Paper)
Lecture Notes in Computer Science
2015-01-16Paper
ASICS: Authenticated key exchange security incorporating certification systems
Lecture Notes in Computer Science
2014-10-16Paper
Practical secure logging: seekable sequential key generators
Lecture Notes in Computer Science
2014-10-16Paper
Simple, efficient and strongly KI-secure hierarchical key assignment schemes
Topics in Cryptology – CT-RSA 2013
2013-03-18Paper
Publicly verifiable ciphertexts
Lecture Notes in Computer Science
2012-09-25Paper
Affiliation-hiding authentication with minimal bandwidth consumption
Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication
2011-10-14Paper
Private discovery of common social contacts
Applied Cryptography and Network Security
2011-06-28Paper
Taming Big Brother Ambitions: More Privacy for Secret Handshakes
Privacy Enhancing Technologies
2010-08-10Paper
Redactable signatures for tree-structured data: definitions and constructions
Applied Cryptography and Network Security
2010-07-06Paper
Privacy-preserving group discovery with linear complexity
Applied Cryptography and Network Security
2010-07-06Paper
Affiliation-hiding key exchange with untrusted group authorities
Applied Cryptography and Network Security
2010-07-06Paper


Research outcomes over time


This page was built for person: Bertram Poettering