Bertram Poettering

From MaRDI portal
Person:1653253



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Formalizing hash-then-sign signatures2024-11-12Paper
On secure ratcheting with immediate decryption
Advances in Cryptology – ASIACRYPT 2022
2023-08-25Paper
Sequential digital signatures for cryptographic software-update authentication
Computer Security – ESORICS 2022
2023-07-28Paper
Encrypt-to-Self: Securely Outsourcing Storage
1511.68047
2022-12-22Paper
Cryptanalysis of OCB2: attacks on authenticity and confidentiality
Journal of Cryptology
2020-11-06Paper
Cryptanalysis of OCB2: attacks on authenticity and confidentiality
Advances in Cryptology – CRYPTO 2019
2020-05-20Paper
Subverting decryption in AEAD2020-05-06Paper
Lossy trapdoor permutations with improved lossiness2020-01-28Paper
Towards bidirectional ratcheted key exchange2018-09-12Paper
Shorter double-authentication preventing signatures for small address spaces2018-07-17Paper
Hashing solutions instead of generating problems: on the interactive certification of RSA moduli2018-05-29Paper
Hybrid encryption in a multi-user setting, revisited2018-05-16Paper
KEM combiners2018-05-16Paper
On the one-per-message unforgeability of (EC)DSA and its variants2018-01-19Paper
Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures
Lecture Notes in Computer Science
2017-06-13Paper
Selective opening security from simulatable data encapsulation
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
From Identification to Signatures, Tightly: A Framework and Generic Transforms
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
Cryptographic enforcement of information flow policies without public information
Applied Cryptography and Network Security
2016-03-10Paper
Cold boot attacks in the discrete logarithm setting
Lecture Notes in Computer Science
2016-03-02Paper
Linkable message tagging: solving the key distribution problem of signature schemes
Information Security and Privacy
2015-10-20Paper
Plaintext Recovery Attacks Against WPA/TKIP
Fast Software Encryption
2015-09-18Paper
A more cautious approach to security against mass surveillance
Fast Software Encryption
2015-09-18Paper
Even more practical secure logging: tree-based seekable sequential key generators
Computer Security - ESORICS 2014
2015-07-27Paper
Double-authentication-preventing signatures
Computer Security - ESORICS 2014
2015-07-24Paper
Big Bias Hunting in Amazonia: Large-Scale Computation and Exploitation of RC4 Biases (Invited Paper)
Lecture Notes in Computer Science
2015-01-16Paper
ASICS: Authenticated key exchange security incorporating certification systems
Lecture Notes in Computer Science
2014-10-16Paper
Practical secure logging: seekable sequential key generators
Lecture Notes in Computer Science
2014-10-16Paper
Simple, efficient and strongly KI-secure hierarchical key assignment schemes
Topics in Cryptology – CT-RSA 2013
2013-03-18Paper
Publicly verifiable ciphertexts
Lecture Notes in Computer Science
2012-09-25Paper
Affiliation-hiding authentication with minimal bandwidth consumption
Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication
2011-10-14Paper
Private discovery of common social contacts
Applied Cryptography and Network Security
2011-06-28Paper
Taming Big Brother Ambitions: More Privacy for Secret Handshakes
Privacy Enhancing Technologies
2010-08-10Paper
Redactable signatures for tree-structured data: definitions and constructions
Applied Cryptography and Network Security
2010-07-06Paper
Privacy-preserving group discovery with linear complexity
Applied Cryptography and Network Security
2010-07-06Paper
Affiliation-hiding key exchange with untrusted group authorities
Applied Cryptography and Network Security
2010-07-06Paper


Research outcomes over time


This page was built for person: Bertram Poettering