Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Bertram Poettering
@inproceedings{DBLP:conf/pkc/PoetteringR24, author = {Bertram Poettering and Simon Rastikian}, editor = {Qiang Tang and Vanessa Teague}, title = {Formalizing Hash-then-Sign Signatures}, booktitle = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14601}, pages = {289--315}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57718-5\_10}, doi = {10.1007/978-3-031-57718-5\_10}, timestamp = {Fri, 26 Apr 2024 08:19:02 +0200}, biburl = {https://dblp.org/rec/conf/pkc/PoetteringR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/FeoPS23, author = {Luca De Feo and Bertram Poettering and Alessandro Sorniotti}, title = {On the (In)Security of ElGamal in OpenPGP}, journal = {Commun. {ACM}}, volume = {66}, number = {6}, pages = {107--115}, year = {2023}, url = {https://doi.org/10.1145/3592835}, doi = {10.1145/3592835}, timestamp = {Tue, 18 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cacm/FeoPS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/FrederiksenHPT23, author = {Tore Kasper Frederiksen and Julia Hesse and Bertram Poettering and Patrick Towa}, title = {Attribute-based Single Sign-On: Secure, Private, and Efficient}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2023}, number = {4}, pages = {35--65}, year = {2023}, url = {https://doi.org/10.56553/popets-2023-0097}, doi = {10.56553/POPETS-2023-0097}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/popets/FrederiksenHPT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secsr/PoetteringR23, author = {Bertram Poettering and Simon Rastikian}, editor = {Felix G{\"{u}}nther and Julia Hesse}, title = {A Study of {KEM} Generalizations}, booktitle = {Security Standardisation Research - 8th International Conference, {SSR} 2023, Lyon, France, April 22-23, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13895}, pages = {53--77}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30731-7\_3}, doi = {10.1007/978-3-031-30731-7\_3}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secsr/PoetteringR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PoetteringR23, author = {Bertram Poettering and Simon Rastikian}, title = {A study of {KEM} generalizations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {272}, year = {2023}, url = {https://eprint.iacr.org/2023/272}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/PoetteringR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FrederiksenHPT23, author = {Tore Kasper Frederiksen and Julia Hesse and Bertram Poettering and Patrick Towa}, title = {Attribute-based Single Sign-On: Secure, Private, and Efficient}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {915}, year = {2023}, url = {https://eprint.iacr.org/2023/915}, timestamp = {Mon, 03 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FrederiksenHPT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/ArmourP22, author = {Marcel Armour and Bertram Poettering}, title = {Algorithm substitution attacks against receivers}, journal = {Int. J. Inf. Sec.}, volume = {21}, number = {5}, pages = {1027--1050}, year = {2022}, url = {https://doi.org/10.1007/s10207-022-00596-5}, doi = {10.1007/S10207-022-00596-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/ArmourP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/PijnenburgP22, author = {Jeroen Pijnenburg and Bertram Poettering}, editor = {Shweta Agrawal and Dongdai Lin}, title = {On Secure Ratcheting with Immediate Decryption}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13793}, pages = {89--118}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22969-5\_4}, doi = {10.1007/978-3-031-22969-5\_4}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/PijnenburgP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/PoetteringR22, author = {Bertram Poettering and Simon Rastikian}, editor = {Vijayalakshmi Atluri and Roberto Di Pietro and Christian Damsgaard Jensen and Weizhi Meng}, title = {Sequential Digital Signatures for Cryptographic Software-Update Authentication}, booktitle = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13555}, pages = {255--274}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17146-8\_13}, doi = {10.1007/978-3-031-17146-8\_13}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/PoetteringR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArmourP22, author = {Marcel Armour and Bertram Poettering}, title = {Algorithm Substitution Attacks against Receivers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {604}, year = {2022}, url = {https://eprint.iacr.org/2022/604}, timestamp = {Mon, 20 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArmourP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PoetteringR22, author = {Bertram Poettering and Simon Rastikian}, title = {Sequential Digital Signatures for Cryptographic Software-Update Authentication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {995}, year = {2022}, url = {https://eprint.iacr.org/2022/995}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PoetteringR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FeoPS21, author = {Luca De Feo and Bertram Poettering and Alessandro Sorniotti}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {On the (In)Security of ElGamal in OpenPGP}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {2066--2080}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3485257}, doi = {10.1145/3460120.3485257}, timestamp = {Tue, 16 Nov 2021 12:59:46 +0100}, biburl = {https://dblp.org/rec/conf/ccs/FeoPS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/PoetteringRSS21, author = {Bertram Poettering and Paul R{\"{o}}sler and J{\"{o}}rg Schwenk and Douglas Stebila}, editor = {Kenneth G. Paterson}, title = {SoK: Game-Based Security Models for Group Key Exchange}, booktitle = {Topics in Cryptology - {CT-RSA} 2021 - Cryptographers' Track at the {RSA} Conference 2021, Virtual Event, May 17-20, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12704}, pages = {148--176}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75539-3\_7}, doi = {10.1007/978-3-030-75539-3\_7}, timestamp = {Mon, 28 Aug 2023 21:17:50 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/PoetteringRSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2112-09411, author = {Andr{\'{e}} Noll Barreto and Stefan K{\"{o}}psell and Arsenia Chorti and Bertram Poettering and Jens Jelitto and Julia Hesse and Jonathan Boole and Konrad Rieck and Marios Kountouris and Dave Singel{\'{e}}e and Kumar Ashwinee}, title = {Towards Intelligent Context-Aware 6G Security}, journal = {CoRR}, volume = {abs/2112.09411}, year = {2021}, url = {https://arxiv.org/abs/2112.09411}, eprinttype = {arXiv}, eprint = {2112.09411}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2112-09411.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PoetteringRSS21, author = {Bertram Poettering and Paul R{\"{o}}sler and J{\"{o}}rg Schwenk and Douglas Stebila}, title = {SoK: Game-based Security Models for Group Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {305}, year = {2021}, url = {https://eprint.iacr.org/2021/305}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PoetteringRSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FeoPS21, author = {Luca De Feo and Bertram Poettering and Alessandro Sorniotti}, title = {On the (in)security of ElGamal in OpenPGP}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {923}, year = {2021}, url = {https://eprint.iacr.org/2021/923}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FeoPS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/InoueIMP20, author = {Akiko Inoue and Tetsu Iwata and Kazuhiko Minematsu and Bertram Poettering}, title = {Cryptanalysis of {OCB2:} Attacks on Authenticity and Confidentiality}, journal = {J. Cryptol.}, volume = {33}, number = {4}, pages = {1871--1913}, year = {2020}, url = {https://doi.org/10.1007/s00145-020-09359-8}, doi = {10.1007/S00145-020-09359-8}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/InoueIMP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/PoetteringR20, author = {Bertram Poettering and Paul R{\"{o}}sler}, title = {Combiners for {AEAD}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {1}, pages = {121--143}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.i1.121-143}, doi = {10.13154/TOSC.V2020.I1.121-143}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/PoetteringR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/PijnenburgP20, author = {Jeroen Pijnenburg and Bertram Poettering}, title = {Key Assignment Schemes with Authenticated Encryption, revisited}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {2}, pages = {40--67}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.i2.40-67}, doi = {10.13154/TOSC.V2020.I2.40-67}, timestamp = {Tue, 04 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/PijnenburgP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PijnenburgP20, author = {Jeroen Pijnenburg and Bertram Poettering}, editor = {Liqun Chen and Chris J. Mitchell and Thanassis Giannetsos and Daniele Sgandurra}, title = {Efficiency Improvements for Encrypt-to-Self}, booktitle = {CYSARM@CCS '20: Proceedings of the 2nd Workshop on Cyber-Security Arms Race, Virtual Event, USA, November, 2020}, pages = {13--23}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3411505.3418438}, doi = {10.1145/3411505.3418438}, timestamp = {Thu, 11 Nov 2021 13:43:43 +0100}, biburl = {https://dblp.org/rec/conf/ccs/PijnenburgP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/PijnenburgP20, author = {Jeroen Pijnenburg and Bertram Poettering}, editor = {Liqun Chen and Ninghui Li and Kaitai Liang and Steve A. Schneider}, title = {Encrypt-to-Self: Securely Outsourcing Storage}, booktitle = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12308}, pages = {635--654}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-58951-6\_31}, doi = {10.1007/978-3-030-58951-6\_31}, timestamp = {Fri, 02 Jul 2021 20:12:27 +0200}, biburl = {https://dblp.org/rec/conf/esorics/PijnenburgP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2009-02667, author = {Jeroen Pijnenburg and Bertram Poettering}, title = {Efficiency Improvements for Encrypt-to-Self}, journal = {CoRR}, volume = {abs/2009.02667}, year = {2020}, url = {https://arxiv.org/abs/2009.02667}, eprinttype = {arXiv}, eprint = {2009.02667}, timestamp = {Thu, 17 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2009-02667.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PoetteringR20, author = {Bertram Poettering and Paul R{\"{o}}sler}, title = {Combiners for {AEAD}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {232}, year = {2020}, url = {https://eprint.iacr.org/2020/232}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PoetteringR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PijnenburgP20, author = {Jeroen Pijnenburg and Bertram Poettering}, title = {Key Assignment Schemes with Authenticated Encryption, revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {612}, year = {2020}, url = {https://eprint.iacr.org/2020/612}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PijnenburgP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PijnenburgP20a, author = {Jeroen Pijnenburg and Bertram Poettering}, title = {Encrypt-to-self: Securely Outsourcing Storage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {847}, year = {2020}, url = {https://eprint.iacr.org/2020/847}, timestamp = {Mon, 27 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PijnenburgP20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ArmourP19, author = {Marcel Armour and Bertram Poettering}, title = {Substitution Attacks against Message Authentication}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {3}, pages = {152--168}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i3.152-168}, doi = {10.13154/TOSC.V2019.I3.152-168}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/ArmourP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/InoueIMP19, author = {Akiko Inoue and Tetsu Iwata and Kazuhiko Minematsu and Bertram Poettering}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Cryptanalysis of {OCB2:} Attacks on Authenticity and Confidentiality}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11692}, pages = {3--31}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26948-7\_1}, doi = {10.1007/978-3-030-26948-7\_1}, timestamp = {Wed, 21 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/InoueIMP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/AuerbachKPS19, author = {Benedikt Auerbach and Eike Kiltz and Bertram Poettering and Stefan Schoenen}, editor = {Mitsuru Matsui}, title = {Lossy Trapdoor Permutations with Improved Lossiness}, booktitle = {Topics in Cryptology - {CT-RSA} 2019 - The Cryptographers' Track at the {RSA} Conference 2019, San Francisco, CA, USA, March 4-8, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11405}, pages = {230--250}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-12612-4\_12}, doi = {10.1007/978-3-030-12612-4\_12}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/AuerbachKPS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/ArmourP19, author = {Marcel Armour and Bertram Poettering}, editor = {Martin Albrecht}, title = {Subverting Decryption in {AEAD}}, booktitle = {Cryptography and Coding - 17th {IMA} International Conference, {IMACC} 2019, Oxford, UK, December 16-18, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11929}, pages = {22--41}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-35199-1\_2}, doi = {10.1007/978-3-030-35199-1\_2}, timestamp = {Fri, 15 Dec 2023 20:21:14 +0100}, biburl = {https://dblp.org/rec/conf/ima/ArmourP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/InoueIMP19, author = {Akiko Inoue and Tetsu Iwata and Kazuhiko Minematsu and Bertram Poettering}, title = {Cryptanalysis of {OCB2:} Attacks on Authenticity and Confidentiality}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {311}, year = {2019}, url = {https://eprint.iacr.org/2019/311}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/InoueIMP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArmourP19, author = {Marcel Armour and Bertram Poettering}, title = {Subverting Decryption in {AEAD}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {987}, year = {2019}, url = {https://eprint.iacr.org/2019/987}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArmourP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArmourP19a, author = {Marcel Armour and Bertram Poettering}, title = {Substitution Attacks against Message Authentication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {989}, year = {2019}, url = {https://eprint.iacr.org/2019/989}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArmourP19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/Poettering18, author = {Bertram Poettering}, editor = {Antoine Joux and Abderrahmane Nitaj and Tajjeeddine Rachidi}, title = {Shorter Double-Authentication Preventing Signatures for Small Address Spaces}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2018 - 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10831}, pages = {344--361}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-89339-6\_19}, doi = {10.1007/978-3-319-89339-6\_19}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/Poettering18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/PoetteringR18, author = {Bertram Poettering and Paul R{\"{o}}sler}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Towards Bidirectional Ratcheted Key Exchange}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10991}, pages = {3--32}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96884-1\_1}, doi = {10.1007/978-3-319-96884-1\_1}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/PoetteringR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/EugsterMP18, author = {Patrick Eugster and Giorgia Azzurra Marson and Bertram Poettering}, title = {A Cryptographic Look at Multi-party Channels}, booktitle = {31st {IEEE} Computer Security Foundations Symposium, {CSF} 2018, Oxford, United Kingdom, July 9-12, 2018}, pages = {31--45}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CSF.2018.00010}, doi = {10.1109/CSF.2018.00010}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/EugsterMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GiaconKP18, author = {Federico Giacon and Eike Kiltz and Bertram Poettering}, editor = {Michel Abdalla and Ricardo Dahab}, title = {Hybrid Encryption in a Multi-user Setting, Revisited}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10769}, pages = {159--189}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76578-5\_6}, doi = {10.1007/978-3-319-76578-5\_6}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GiaconKP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GiaconHP18, author = {Federico Giacon and Felix Heuer and Bertram Poettering}, editor = {Michel Abdalla and Ricardo Dahab}, title = {{KEM} Combiners}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10769}, pages = {190--218}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76578-5\_7}, doi = {10.1007/978-3-319-76578-5\_7}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GiaconHP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AuerbachP18, author = {Benedikt Auerbach and Bertram Poettering}, editor = {Michel Abdalla and Ricardo Dahab}, title = {Hashing Solutions Instead of Generating Problems: On the Interactive Certification of {RSA} Moduli}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10770}, pages = {403--430}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76581-5\_14}, doi = {10.1007/978-3-319-76581-5\_14}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AuerbachP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AuerbachP18, author = {Benedikt Auerbach and Bertram Poettering}, title = {Hashing solutions instead of generating problems: On the interactive certification of {RSA} moduli}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {13}, year = {2018}, url = {http://eprint.iacr.org/2018/013}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AuerbachP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GiaconHP18, author = {Federico Giacon and Felix Heuer and Bertram Poettering}, title = {{KEM} Combiners}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {24}, year = {2018}, url = {http://eprint.iacr.org/2018/024}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GiaconHP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Poettering18, author = {Bertram Poettering}, title = {Shorter double-authentication preventing signatures for small address spaces}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {223}, year = {2018}, url = {http://eprint.iacr.org/2018/223}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Poettering18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PoetteringR18, author = {Bertram Poettering and Paul R{\"{o}}sler}, title = {Ratcheted key exchange, revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {296}, year = {2018}, url = {https://eprint.iacr.org/2018/296}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PoetteringR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Poettering18a, author = {Bertram Poettering}, title = {Breaking the confidentiality of {OCB2}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1087}, year = {2018}, url = {https://eprint.iacr.org/2018/1087}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Poettering18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AuerbachKPS18, author = {Benedikt Auerbach and Eike Kiltz and Bertram Poettering and Stefan Schoenen}, title = {Lossy Trapdoor Permutations with Improved Lossiness}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1183}, year = {2018}, url = {https://eprint.iacr.org/2018/1183}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AuerbachKPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/PoetteringS17, author = {Bertram Poettering and Douglas Stebila}, title = {Double-authentication-preventing signatures}, journal = {Int. J. Inf. Sec.}, volume = {16}, number = {1}, pages = {1--22}, year = {2017}, url = {https://doi.org/10.1007/s10207-015-0307-8}, doi = {10.1007/S10207-015-0307-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/PoetteringS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BoydCFPPS17, author = {Colin Boyd and Cas Cremers and Mich{\`{e}}le Feltz and Kenneth G. Paterson and Bertram Poettering and Douglas Stebila}, title = {{ASICS:} authenticated key exchange security incorporating certification systems}, journal = {Int. J. Inf. Sec.}, volume = {16}, number = {2}, pages = {151--171}, year = {2017}, url = {https://doi.org/10.1007/s10207-015-0312-y}, doi = {10.1007/S10207-015-0312-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/BoydCFPPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/GuntherP17, author = {Felix G{\"{u}}nther and Bertram Poettering}, title = {Linkable message tagging: solving the key distribution problem of signature schemes}, journal = {Int. J. Inf. Sec.}, volume = {16}, number = {3}, pages = {281--297}, year = {2017}, url = {https://doi.org/10.1007/s10207-016-0327-z}, doi = {10.1007/S10207-016-0327-Z}, timestamp = {Fri, 12 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/GuntherP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/CramptonFGJP17, author = {Jason Crampton and Naomi Farley and Gregory Z. Gutin and Mark Jones and Bertram Poettering}, title = {Cryptographic enforcement of information flow policies without public information via tree partitions}, journal = {J. Comput. Secur.}, volume = {25}, number = {6}, pages = {511--535}, year = {2017}, url = {https://doi.org/10.3233/JCS-16863}, doi = {10.3233/JCS-16863}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/CramptonFGJP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/MarsonP17, author = {Giorgia Azzurra Marson and Bertram Poettering}, title = {Security Notions for Bidirectional Channels}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {1}, pages = {405--426}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i1.405-426}, doi = {10.13154/TOSC.V2017.I1.405-426}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/MarsonP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BellarePS17, author = {Mihir Bellare and Bertram Poettering and Douglas Stebila}, editor = {Serge Fehr}, title = {Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures}, booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10175}, pages = {121--151}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54388-7\_5}, doi = {10.1007/978-3-662-54388-7\_5}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BellarePS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/FerschKP17, author = {Manuel Fersch and Eike Kiltz and Bertram Poettering}, editor = {Yael Kalai and Leonid Reyzin}, title = {On the One-Per-Message Unforgeability of {(EC)DSA} and Its Variants}, booktitle = {Theory of Cryptography - 15th International Conference, {TCC} 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10678}, pages = {519--534}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70503-3\_17}, doi = {10.1007/978-3-319-70503-3\_17}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/FerschKP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MarsonP17, author = {Giorgia Azzurra Marson and Bertram Poettering}, title = {Security Notions for Bidirectional Channels}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {161}, year = {2017}, url = {http://eprint.iacr.org/2017/161}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MarsonP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MarsonP17a, author = {Giorgia Azzurra Marson and Bertram Poettering}, title = {With one it is easy, with many it gets complicated: Understanding Channel Security for Groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {786}, year = {2017}, url = {http://eprint.iacr.org/2017/786}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MarsonP17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GiaconKP17, author = {Federico Giacon and Eike Kiltz and Bertram Poettering}, title = {Hybrid Encryption in a Multi-User Setting, Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {843}, year = {2017}, url = {http://eprint.iacr.org/2017/843}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GiaconKP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FerschKP17, author = {Manuel Fersch and Eike Kiltz and Bertram Poettering}, title = {On the One-Per-Message Unforgeability of {(EC)DSA} and its Variants}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {890}, year = {2017}, url = {http://eprint.iacr.org/2017/890}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FerschKP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/HeuerP16, author = {Felix Heuer and Bertram Poettering}, editor = {Jung Hee Cheon and Tsuyoshi Takagi}, title = {Selective Opening Security from Simulatable Data Encapsulation}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10032}, pages = {248--277}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53890-6\_9}, doi = {10.1007/978-3-662-53890-6\_9}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/HeuerP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BellarePS16, author = {Mihir Bellare and Bertram Poettering and Douglas Stebila}, editor = {Jung Hee Cheon and Tsuyoshi Takagi}, title = {From Identification to Signatures, Tightly: {A} Framework and Generic Transforms}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10032}, pages = {435--464}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53890-6\_15}, doi = {10.1007/978-3-662-53890-6\_15}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BellarePS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FerschKP16, author = {Manuel Fersch and Eike Kiltz and Bertram Poettering}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {On the Provable Security of {(EC)DSA} Signatures}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {1651--1662}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978413}, doi = {10.1145/2976749.2978413}, timestamp = {Tue, 10 Nov 2020 20:00:49 +0100}, biburl = {https://dblp.org/rec/conf/ccs/FerschKP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/CramptonFGJP16, author = {Jason Crampton and Naomi Farley and Gregory Z. Gutin and Mark Jones and Bertram Poettering}, title = {Cryptographic Enforcement of Information Flow Policies without Public Information via Tree Partitions}, journal = {CoRR}, volume = {abs/1608.08386}, year = {2016}, url = {http://arxiv.org/abs/1608.08386}, eprinttype = {arXiv}, eprint = {1608.08386}, timestamp = {Thu, 05 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/CramptonFGJP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HeuerP16, author = {Felix Heuer and Bertram Poettering}, title = {Selective Opening Security from Simulatable Data Encapsulation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {845}, year = {2016}, url = {http://eprint.iacr.org/2016/845}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HeuerP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellarePS16, author = {Mihir Bellare and Bertram Poettering and Douglas Stebila}, title = {Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1016}, year = {2016}, url = {http://eprint.iacr.org/2016/1016}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellarePS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GuntherP15, author = {Felix G{\"{u}}nther and Bertram Poettering}, editor = {Ernest Foo and Douglas Stebila}, title = {Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {195--212}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_12}, doi = {10.1007/978-3-319-19962-7\_12}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/GuntherP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/CramptonFGJP15, author = {Jason Crampton and Naomi Farley and Gregory Z. Gutin and Mark Jones and Bertram Poettering}, editor = {Tal Malkin and Vladimir Kolesnikov and Allison Bishop Lewko and Michalis Polychronakis}, title = {Cryptographic Enforcement of Information Flow Policies Without Public Information}, booktitle = {Applied Cryptography and Network Security - 13th International Conference, {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9092}, pages = {389--408}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28166-7\_19}, doi = {10.1007/978-3-319-28166-7\_19}, timestamp = {Thu, 05 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/CramptonFGJP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/PoetteringS15, author = {Bertram Poettering and Dale L. Sibborn}, editor = {Kaisa Nyberg}, title = {Cold Boot Attacks in the Discrete Logarithm Setting}, booktitle = {Topics in Cryptology - {CT-RSA} 2015, The Cryptographer's Track at the {RSA} Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9048}, pages = {449--465}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-16715-2\_24}, doi = {10.1007/978-3-319-16715-2\_24}, timestamp = {Thu, 14 Oct 2021 10:27:48 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/PoetteringS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/DegabrieleFP15, author = {Jean Paul Degabriele and Pooya Farshim and Bertram Poettering}, editor = {Gregor Leander}, title = {A More Cautious Approach to Security Against Mass Surveillance}, booktitle = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9054}, pages = {579--598}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48116-5\_28}, doi = {10.1007/978-3-662-48116-5\_28}, timestamp = {Sat, 19 Oct 2019 20:27:47 +0200}, biburl = {https://dblp.org/rec/conf/fse/DegabrieleFP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PoetteringS15, author = {Bertram Poettering and Dale L. Sibborn}, title = {Cold Boot Attacks in the Discrete Logarithm Setting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {57}, year = {2015}, url = {http://eprint.iacr.org/2015/057}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PoetteringS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DegabrieleFP15, author = {Jean Paul Degabriele and Pooya Farshim and Bertram Poettering}, title = {A More Cautious Approach to Security Against Mass Surveillance}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {748}, year = {2015}, url = {http://eprint.iacr.org/2015/748}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DegabrieleFP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/ManulisPS14, author = {Mark Manulis and Bertram Poettering and Douglas Stebila}, title = {Plaintext awareness in identity-based key encapsulation}, journal = {Int. J. Inf. Sec.}, volume = {13}, number = {1}, pages = {25--49}, year = {2014}, url = {https://doi.org/10.1007/s10207-013-0218-5}, doi = {10.1007/S10207-013-0218-5}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/ManulisPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/PatersonPS14, author = {Kenneth G. Paterson and Bertram Poettering and Jacob C. N. Schuldt}, editor = {Palash Sarkar and Tetsu Iwata}, title = {Big Bias Hunting in Amazonia: Large-Scale Computation and Exploitation of {RC4} Biases (Invited Paper)}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8873}, pages = {398--419}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45611-8\_21}, doi = {10.1007/978-3-662-45611-8\_21}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/PatersonPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PintoPS14, author = {Alexandre Pinto and Bertram Poettering and Jacob C. N. Schuldt}, editor = {Shiho Moriai and Trent Jaeger and Kouichi Sakurai}, title = {Multi-recipient encryption, revisited}, booktitle = {9th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '14, Kyoto, Japan - June 03 - 06, 2014}, pages = {229--238}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2590296.2590329}, doi = {10.1145/2590296.2590329}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/PintoPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MarsonP14, author = {Giorgia Azzurra Marson and Bertram Poettering}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {Even More Practical Secure Logging: Tree-Based Seekable Sequential Key Generators}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8713}, pages = {37--54}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11212-1\_3}, doi = {10.1007/978-3-319-11212-1\_3}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/MarsonP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/PoetteringS14, author = {Bertram Poettering and Douglas Stebila}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {Double-Authentication-Preventing Signatures}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8712}, pages = {436--453}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11203-9\_25}, doi = {10.1007/978-3-319-11203-9\_25}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/PoetteringS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/PatersonPS14, author = {Kenneth G. Paterson and Bertram Poettering and Jacob C. N. Schuldt}, editor = {Carlos Cid and Christian Rechberger}, title = {Plaintext Recovery Attacks Against {WPA/TKIP}}, booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014, London, UK, March 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8540}, pages = {325--349}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-46706-0\_17}, doi = {10.1007/978-3-662-46706-0\_17}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/PatersonPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/CramptonFGJP14, author = {Jason Crampton and Naomi Farley and Gregory Z. Gutin and Mark Jones and Bertram Poettering}, title = {Cryptographic Enforcement of Information Flow Policies without Public Information}, journal = {CoRR}, volume = {abs/1410.5567}, year = {2014}, url = {http://arxiv.org/abs/1410.5567}, eprinttype = {arXiv}, eprint = {1410.5567}, timestamp = {Thu, 05 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/CramptonFGJP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuntherP14, author = {Felix G{\"{u}}nther and Bertram Poettering}, title = {Linkable Message Tagging: Solving the key distribution problem of signature schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {14}, year = {2014}, url = {http://eprint.iacr.org/2014/014}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuntherP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MarsonP14, author = {Giorgia Azzurra Marson and Bertram Poettering}, title = {Even more practical secure logging: Tree-based Seekable Sequential Key Generators}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {479}, year = {2014}, url = {http://eprint.iacr.org/2014/479}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MarsonP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/CristofaroMP13, author = {Emiliano De Cristofaro and Mark Manulis and Bertram Poettering}, title = {Private discovery of common social contacts}, journal = {Int. J. Inf. Sec.}, volume = {12}, number = {1}, pages = {49--65}, year = {2013}, url = {https://doi.org/10.1007/s10207-012-0183-4}, doi = {10.1007/S10207-012-0183-4}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/CristofaroMP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/NietoMPRS13, author = {Juan Manuel Gonz{\'{a}}lez Nieto and Mark Manulis and Bertram Poettering and Jothi Rangasamy and Douglas Stebila}, title = {Publicly verifiable ciphertexts}, journal = {J. Comput. Secur.}, volume = {21}, number = {5}, pages = {749--778}, year = {2013}, url = {https://doi.org/10.3233/JCS-130473}, doi = {10.3233/JCS-130473}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/NietoMPRS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FleischhackerGKMP13, author = {Nils Fleischhacker and Felix G{\"{u}}nther and Franziskus Kiefer and Mark Manulis and Bertram Poettering}, editor = {Kefei Chen and Qi Xie and Weidong Qiu and Ninghui Li and Wen{-}Guey Tzeng}, title = {Pseudorandom signatures}, booktitle = {8th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013}, pages = {107--118}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2484313.2484325}, doi = {10.1145/2484313.2484325}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/FleischhackerGKMP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/FreirePP13, author = {Eduarda S. V. Freire and Kenneth G. Paterson and Bertram Poettering}, editor = {Ed Dawson}, title = {Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes}, booktitle = {Topics in Cryptology - {CT-RSA} 2013 - The Cryptographers' Track at the {RSA} Conference 2013, San Francisco,CA, USA, February 25-March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7779}, pages = {101--114}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36095-4\_7}, doi = {10.1007/978-3-642-36095-4\_7}, timestamp = {Wed, 22 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/FreirePP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MarsonP13, author = {Giorgia Azzurra Marson and Bertram Poettering}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {Practical Secure Logging: Seekable Sequential Key Generators}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {111--128}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_7}, doi = {10.1007/978-3-642-40203-6\_7}, timestamp = {Wed, 25 Sep 2019 18:03:15 +0200}, biburl = {https://dblp.org/rec/conf/esorics/MarsonP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BoydCFPPS13, author = {Colin Boyd and Cas Cremers and Mich{\`{e}}le Feltz and Kenneth G. Paterson and Bertram Poettering and Douglas Stebila}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {{ASICS:} Authenticated Key Exchange Security Incorporating Certification Systems}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {381--399}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_22}, doi = {10.1007/978-3-642-40203-6\_22}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BoydCFPPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AlFardanBPPS13, author = {Nadhem J. AlFardan and Daniel J. Bernstein and Kenneth G. Paterson and Bertram Poettering and Jacob C. N. Schuldt}, editor = {Samuel T. King}, title = {On the Security of {RC4} in {TLS}}, booktitle = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC, USA, August 14-16, 2013}, pages = {305--320}, publisher = {{USENIX} Association}, year = {2013}, url = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/paper/alFardan}, timestamp = {Mon, 01 Feb 2021 08:42:56 +0100}, biburl = {https://dblp.org/rec/conf/uss/AlFardanBPPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PoetteringS13, author = {Bertram Poettering and Douglas Stebila}, title = {Double-authentication-preventing signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {333}, year = {2013}, url = {http://eprint.iacr.org/2013/333}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PoetteringS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MarsonP13, author = {Giorgia Azzurra Marson and Bertram Poettering}, title = {Practical Secure Logging: Seekable Sequential Key Generators}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {397}, year = {2013}, url = {http://eprint.iacr.org/2013/397}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MarsonP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoydCFPPS13, author = {Colin Boyd and Cas Cremers and Mich{\`{e}}le Feltz and Kenneth G. Paterson and Bertram Poettering and Douglas Stebila}, title = {{ASICS:} Authenticated Key Exchange Security Incorporating Certification Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {398}, year = {2013}, url = {http://eprint.iacr.org/2013/398}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoydCFPPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatersonPS13, author = {Kenneth G. Paterson and Bertram Poettering and Jacob C. N. Schuldt}, title = {Plaintext Recovery Attacks Against {WPA/TKIP}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {748}, year = {2013}, url = {http://eprint.iacr.org/2013/748}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatersonPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/dnb/Poettering12, author = {Bertram Poettering}, title = {Privacy protection for authentication protocols}, school = {Darmstadt University of Technology, Germany}, year = {2012}, url = {http://tuprints.ulb.tu-darmstadt.de/2867/}, urn = {urn:nbn:de:tuda-tuprints-28676}, timestamp = {Sat, 17 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/dnb/Poettering12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/NietoMPRS12, author = {Juan Manuel Gonz{\'{a}}lez Nieto and Mark Manulis and Bertram Poettering and Jothi Rangasamy and Douglas Stebila}, editor = {Ivan Visconti and Roberto De Prisco}, title = {Publicly Verifiable Ciphertexts}, booktitle = {Security and Cryptography for Networks - 8th International Conference, {SCN} 2012, Amalfi, Italy, September 5-7, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7485}, pages = {393--410}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32928-9\_22}, doi = {10.1007/978-3-642-32928-9\_22}, timestamp = {Thu, 23 Jun 2022 19:58:57 +0200}, biburl = {https://dblp.org/rec/conf/scn/NietoMPRS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NietoMPRS12, author = {Juan Manuel Gonz{\'{a}}lez Nieto and Mark Manulis and Bertram Poettering and Jothi Rangasamy and Douglas Stebila}, title = {Publicly Verifiable Ciphertexts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {357}, year = {2012}, url = {http://eprint.iacr.org/2012/357}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NietoMPRS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ManulisPS12, author = {Mark Manulis and Bertram Poettering and Douglas Stebila}, title = {Plaintext Awareness in Identity-Based Key Encapsulation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {559}, year = {2012}, url = {http://eprint.iacr.org/2012/559}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ManulisPS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FreirePP12, author = {Eduarda S. V. Freire and Kenneth G. Paterson and Bertram Poettering}, title = {Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {645}, year = {2012}, url = {http://eprint.iacr.org/2012/645}, timestamp = {Wed, 22 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FreirePP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/CristofaroMP11, author = {Emiliano De Cristofaro and Mark Manulis and Bertram Poettering}, editor = {Javier L{\'{o}}pez and Gene Tsudik}, title = {Private Discovery of Common Social Contacts}, booktitle = {Applied Cryptography and Network Security - 9th International Conference, {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6715}, pages = {147--165}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21554-4\_9}, doi = {10.1007/978-3-642-21554-4\_9}, timestamp = {Thu, 29 Aug 2019 08:10:02 +0200}, biburl = {https://dblp.org/rec/conf/acns/CristofaroMP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ManulisP11, author = {Mark Manulis and Bertram Poettering}, editor = {Bruce S. N. Cheung and Lucas Chi Kwong Hui and Ravi S. Sandhu and Duncan S. Wong}, title = {Practical affiliation-hiding authentication from improved polynomial interpolation}, booktitle = {Proceedings of the 6th {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2011, Hong Kong, China, March 22-24, 2011}, pages = {286--295}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1966913.1966950}, doi = {10.1145/1966913.1966950}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ManulisP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/ManulisP11, author = {Mark Manulis and Bertram Poettering}, editor = {Claudio A. Ardagna and Jianying Zhou}, title = {Affiliation-Hiding Authentication with Minimal Bandwidth Consumption}, booktitle = {Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6633}, pages = {85--99}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21040-2\_6}, doi = {10.1007/978-3-642-21040-2\_6}, timestamp = {Mon, 21 Mar 2022 18:09:53 +0100}, biburl = {https://dblp.org/rec/conf/wistp/ManulisP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CristofaroMP11, author = {Emiliano De Cristofaro and Mark Manulis and Bertram Poettering}, title = {Private Discovery of Common Social Contacts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {26}, year = {2011}, url = {http://eprint.iacr.org/2011/026}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CristofaroMP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FleischhackerGKMP11, author = {Nils Fleischhacker and Felix G{\"{u}}nther and Franziskus Kiefer and Mark Manulis and Bertram Poettering}, title = {Pseudorandom Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {673}, year = {2011}, url = {http://eprint.iacr.org/2011/673}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FleischhackerGKMP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/BrzuskaBDFFKMOPPS10, author = {Christina Brzuska and Heike Busch and {\"{O}}zg{\"{u}}r Dagdelen and Marc Fischlin and Martin Franz and Stefan Katzenbeisser and Mark Manulis and Cristina Onete and Andreas Peter and Bertram Poettering and Dominique Schr{\"{o}}der}, editor = {Jianying Zhou and Moti Yung}, title = {Redactable Signatures for Tree-Structured Data: Definitions and Constructions}, booktitle = {Applied Cryptography and Network Security, 8th International Conference, {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6123}, pages = {87--104}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13708-2\_6}, doi = {10.1007/978-3-642-13708-2\_6}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/BrzuskaBDFFKMOPPS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ManulisPT10, author = {Mark Manulis and Bertram Poettering and Gene Tsudik}, editor = {Jianying Zhou and Moti Yung}, title = {Affiliation-Hiding Key Exchange with Untrusted Group Authorities}, booktitle = {Applied Cryptography and Network Security, 8th International Conference, {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6123}, pages = {402--419}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13708-2\_24}, doi = {10.1007/978-3-642-13708-2\_24}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/ManulisPT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ManulisPP10, author = {Mark Manulis and Benny Pinkas and Bertram Poettering}, editor = {Jianying Zhou and Moti Yung}, title = {Privacy-Preserving Group Discovery with Linear Complexity}, booktitle = {Applied Cryptography and Network Security, 8th International Conference, {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6123}, pages = {420--437}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13708-2\_25}, doi = {10.1007/978-3-642-13708-2\_25}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/ManulisPP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/ManulisPT10, author = {Mark Manulis and Bertram Poettering and Gene Tsudik}, editor = {Mikhail J. Atallah and Nicholas J. Hopper}, title = {Taming Big Brother Ambitions: More Privacy for Secret Handshakes}, booktitle = {Privacy Enhancing Technologies, 10th International Symposium, {PETS} 2010, Berlin, Germany, July 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6205}, pages = {149--165}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14527-8\_9}, doi = {10.1007/978-3-642-14527-8\_9}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/pet/ManulisPT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ManulisP10, author = {Mark Manulis and Bertram Poettering}, title = {Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {659}, year = {2010}, url = {http://eprint.iacr.org/2010/659}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ManulisP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.