Bertram Poettering

From MaRDI portal
Person:1653253

Available identifiers

zbMath Open poettering.bertramMaRDI QIDQ1653253

List of research outcomes





PublicationDate of PublicationType
Formalizing hash-then-sign signatures2024-11-12Paper
On secure ratcheting with immediate decryption2023-08-25Paper
Sequential digital signatures for cryptographic software-update authentication2023-07-28Paper
Encrypt-to-Self: Securely Outsourcing Storage2022-12-22Paper
Cryptanalysis of OCB2: attacks on authenticity and confidentiality2020-11-06Paper
Cryptanalysis of OCB2: attacks on authenticity and confidentiality2020-05-20Paper
Subverting decryption in AEAD2020-05-06Paper
Lossy trapdoor permutations with improved lossiness2020-01-28Paper
Towards bidirectional ratcheted key exchange2018-09-12Paper
Shorter double-authentication preventing signatures for small address spaces2018-07-17Paper
Hashing solutions instead of generating problems: on the interactive certification of RSA moduli2018-05-29Paper
Hybrid encryption in a multi-user setting, revisited2018-05-16Paper
KEM combiners2018-05-16Paper
On the one-per-message unforgeability of (EC)DSA and its variants2018-01-19Paper
Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures2017-06-13Paper
Selective opening security from simulatable data encapsulation2017-01-06Paper
From Identification to Signatures, Tightly: A Framework and Generic Transforms2017-01-06Paper
Cryptographic enforcement of information flow policies without public information2016-03-10Paper
Cold boot attacks in the discrete logarithm setting2016-03-02Paper
Linkable message tagging: solving the key distribution problem of signature schemes2015-10-20Paper
Plaintext Recovery Attacks Against WPA/TKIP2015-09-18Paper
A more cautious approach to security against mass surveillance2015-09-18Paper
Even more practical secure logging: tree-based seekable sequential key generators2015-07-27Paper
Double-authentication-preventing signatures2015-07-24Paper
Big Bias Hunting in Amazonia: Large-Scale Computation and Exploitation of RC4 Biases (Invited Paper)2015-01-16Paper
ASICS: Authenticated key exchange security incorporating certification systems2014-10-16Paper
Practical secure logging: seekable sequential key generators2014-10-16Paper
Simple, efficient and strongly KI-secure hierarchical key assignment schemes2013-03-18Paper
Publicly verifiable ciphertexts2012-09-25Paper
Affiliation-hiding authentication with minimal bandwidth consumption2011-10-14Paper
Private discovery of common social contacts2011-06-28Paper
Taming Big Brother Ambitions: More Privacy for Secret Handshakes2010-08-10Paper
Redactable signatures for tree-structured data: definitions and constructions2010-07-06Paper
Privacy-preserving group discovery with linear complexity2010-07-06Paper
Affiliation-hiding key exchange with untrusted group authorities2010-07-06Paper

Research outcomes over time

This page was built for person: Bertram Poettering