The following pages link to Bertram Poettering (Q1653253):
Displaying 31 items.
- Shorter double-authentication preventing signatures for small address spaces (Q1653254) (← links)
- Towards bidirectional ratcheted key exchange (Q1673377) (← links)
- On the one-per-message unforgeability of (EC)DSA and its variants (Q1690283) (← links)
- Hybrid encryption in a multi-user setting, revisited (Q1749279) (← links)
- KEM combiners (Q1749281) (← links)
- Hashing solutions instead of generating problems: on the interactive certification of RSA moduli (Q1753859) (← links)
- Subverting decryption in AEAD (Q2177651) (← links)
- Lossy trapdoor permutations with improved lossiness (Q2290453) (← links)
- Cold Boot Attacks in the Discrete Logarithm Setting (Q2790059) (← links)
- Publicly Verifiable Ciphertexts (Q2912808) (← links)
- Practical Secure Logging: Seekable Sequential Key Generators (Q2925562) (← links)
- ASICS: Authenticated Key Exchange Security Incorporating Certification Systems (Q2925565) (← links)
- Big Bias Hunting in Amazonia: Large-Scale Computation and Exploitation of RC4 Biases (Invited Paper) (Q2938856) (← links)
- Plaintext Recovery Attacks Against WPA/TKIP (Q2946917) (← links)
- A More Cautious Approach to Security Against Mass Surveillance (Q2946964) (← links)
- Selective Opening Security from Simulatable Data Encapsulation (Q2953779) (← links)
- From Identification to Signatures, Tightly: A Framework and Generic Transforms (Q2953785) (← links)
- Private Discovery of Common Social Contacts (Q3011305) (← links)
- Affiliation-Hiding Authentication with Minimal Bandwidth Consumption (Q3174452) (← links)
- Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes (Q3194597) (← links)
- Redactable Signatures for Tree-Structured Data: Definitions and Constructions (Q3575039) (← links)
- Affiliation-Hiding Key Exchange with Untrusted Group Authorities (Q3575058) (← links)
- Privacy-Preserving Group Discovery with Linear Complexity (Q3575059) (← links)
- Taming Big Brother Ambitions: More Privacy for Secret Handshakes (Q3579806) (← links)
- Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes (Q4910228) (← links)
- Double-Authentication-Preventing Signatures (Q5264270) (← links)
- Even More Practical Secure Logging: Tree-Based Seekable Sequential Key Generators (Q5264482) (← links)
- Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures (Q5738754) (← links)
- Cryptanalysis of OCB2: attacks on authenticity and confidentiality (Q5918828) (← links)
- Cryptanalysis of OCB2: attacks on authenticity and confidentiality (Q5919018) (← links)
- Formalizing hash-then-sign signatures (Q6635754) (← links)