BibTeX records: Bertram Poettering

download as .bib file

@inproceedings{DBLP:conf/pkc/PoetteringR24,
  author       = {Bertram Poettering and
                  Simon Rastikian},
  editor       = {Qiang Tang and
                  Vanessa Teague},
  title        = {Formalizing Hash-then-Sign Signatures},
  booktitle    = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia,
                  April 15-17, 2024, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14601},
  pages        = {289--315},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-57718-5\_10},
  doi          = {10.1007/978-3-031-57718-5\_10},
  timestamp    = {Fri, 26 Apr 2024 08:19:02 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/PoetteringR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/FeoPS23,
  author       = {Luca De Feo and
                  Bertram Poettering and
                  Alessandro Sorniotti},
  title        = {On the (In)Security of ElGamal in OpenPGP},
  journal      = {Commun. {ACM}},
  volume       = {66},
  number       = {6},
  pages        = {107--115},
  year         = {2023},
  url          = {https://doi.org/10.1145/3592835},
  doi          = {10.1145/3592835},
  timestamp    = {Tue, 18 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cacm/FeoPS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/FrederiksenHPT23,
  author       = {Tore Kasper Frederiksen and
                  Julia Hesse and
                  Bertram Poettering and
                  Patrick Towa},
  title        = {Attribute-based Single Sign-On: Secure, Private, and Efficient},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2023},
  number       = {4},
  pages        = {35--65},
  year         = {2023},
  url          = {https://doi.org/10.56553/popets-2023-0097},
  doi          = {10.56553/POPETS-2023-0097},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/popets/FrederiksenHPT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/PoetteringR23,
  author       = {Bertram Poettering and
                  Simon Rastikian},
  editor       = {Felix G{\"{u}}nther and
                  Julia Hesse},
  title        = {A Study of {KEM} Generalizations},
  booktitle    = {Security Standardisation Research - 8th International Conference,
                  {SSR} 2023, Lyon, France, April 22-23, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13895},
  pages        = {53--77},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30731-7\_3},
  doi          = {10.1007/978-3-031-30731-7\_3},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/PoetteringR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PoetteringR23,
  author       = {Bertram Poettering and
                  Simon Rastikian},
  title        = {A study of {KEM} generalizations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {272},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/272},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/PoetteringR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FrederiksenHPT23,
  author       = {Tore Kasper Frederiksen and
                  Julia Hesse and
                  Bertram Poettering and
                  Patrick Towa},
  title        = {Attribute-based Single Sign-On: Secure, Private, and Efficient},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {915},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/915},
  timestamp    = {Mon, 03 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FrederiksenHPT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ArmourP22,
  author       = {Marcel Armour and
                  Bertram Poettering},
  title        = {Algorithm substitution attacks against receivers},
  journal      = {Int. J. Inf. Sec.},
  volume       = {21},
  number       = {5},
  pages        = {1027--1050},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10207-022-00596-5},
  doi          = {10.1007/S10207-022-00596-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/ArmourP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/PijnenburgP22,
  author       = {Jeroen Pijnenburg and
                  Bertram Poettering},
  editor       = {Shweta Agrawal and
                  Dongdai Lin},
  title        = {On Secure Ratcheting with Immediate Decryption},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13793},
  pages        = {89--118},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22969-5\_4},
  doi          = {10.1007/978-3-031-22969-5\_4},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/PijnenburgP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/PoetteringR22,
  author       = {Bertram Poettering and
                  Simon Rastikian},
  editor       = {Vijayalakshmi Atluri and
                  Roberto Di Pietro and
                  Christian Damsgaard Jensen and
                  Weizhi Meng},
  title        = {Sequential Digital Signatures for Cryptographic Software-Update Authentication},
  booktitle    = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research
                  in Computer Security, Copenhagen, Denmark, September 26-30, 2022,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13555},
  pages        = {255--274},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17146-8\_13},
  doi          = {10.1007/978-3-031-17146-8\_13},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/PoetteringR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArmourP22,
  author       = {Marcel Armour and
                  Bertram Poettering},
  title        = {Algorithm Substitution Attacks against Receivers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {604},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/604},
  timestamp    = {Mon, 20 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArmourP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PoetteringR22,
  author       = {Bertram Poettering and
                  Simon Rastikian},
  title        = {Sequential Digital Signatures for Cryptographic Software-Update Authentication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {995},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/995},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PoetteringR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FeoPS21,
  author       = {Luca De Feo and
                  Bertram Poettering and
                  Alessandro Sorniotti},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Giovanni Vigna and
                  Elaine Shi},
  title        = {On the (In)Security of ElGamal in OpenPGP},
  booktitle    = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
  pages        = {2066--2080},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460120.3485257},
  doi          = {10.1145/3460120.3485257},
  timestamp    = {Tue, 16 Nov 2021 12:59:46 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/FeoPS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/PoetteringRSS21,
  author       = {Bertram Poettering and
                  Paul R{\"{o}}sler and
                  J{\"{o}}rg Schwenk and
                  Douglas Stebila},
  editor       = {Kenneth G. Paterson},
  title        = {SoK: Game-Based Security Models for Group Key Exchange},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2021 - Cryptographers' Track at the
                  {RSA} Conference 2021, Virtual Event, May 17-20, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12704},
  pages        = {148--176},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75539-3\_7},
  doi          = {10.1007/978-3-030-75539-3\_7},
  timestamp    = {Mon, 28 Aug 2023 21:17:50 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/PoetteringRSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2112-09411,
  author       = {Andr{\'{e}} Noll Barreto and
                  Stefan K{\"{o}}psell and
                  Arsenia Chorti and
                  Bertram Poettering and
                  Jens Jelitto and
                  Julia Hesse and
                  Jonathan Boole and
                  Konrad Rieck and
                  Marios Kountouris and
                  Dave Singel{\'{e}}e and
                  Kumar Ashwinee},
  title        = {Towards Intelligent Context-Aware 6G Security},
  journal      = {CoRR},
  volume       = {abs/2112.09411},
  year         = {2021},
  url          = {https://arxiv.org/abs/2112.09411},
  eprinttype    = {arXiv},
  eprint       = {2112.09411},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2112-09411.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PoetteringRSS21,
  author       = {Bertram Poettering and
                  Paul R{\"{o}}sler and
                  J{\"{o}}rg Schwenk and
                  Douglas Stebila},
  title        = {SoK: Game-based Security Models for Group Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {305},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/305},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PoetteringRSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FeoPS21,
  author       = {Luca De Feo and
                  Bertram Poettering and
                  Alessandro Sorniotti},
  title        = {On the (in)security of ElGamal in OpenPGP},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {923},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/923},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FeoPS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/InoueIMP20,
  author       = {Akiko Inoue and
                  Tetsu Iwata and
                  Kazuhiko Minematsu and
                  Bertram Poettering},
  title        = {Cryptanalysis of {OCB2:} Attacks on Authenticity and Confidentiality},
  journal      = {J. Cryptol.},
  volume       = {33},
  number       = {4},
  pages        = {1871--1913},
  year         = {2020},
  url          = {https://doi.org/10.1007/s00145-020-09359-8},
  doi          = {10.1007/S00145-020-09359-8},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/InoueIMP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/PoetteringR20,
  author       = {Bertram Poettering and
                  Paul R{\"{o}}sler},
  title        = {Combiners for {AEAD}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {1},
  pages        = {121--143},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.i1.121-143},
  doi          = {10.13154/TOSC.V2020.I1.121-143},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/PoetteringR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/PijnenburgP20,
  author       = {Jeroen Pijnenburg and
                  Bertram Poettering},
  title        = {Key Assignment Schemes with Authenticated Encryption, revisited},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {2},
  pages        = {40--67},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.i2.40-67},
  doi          = {10.13154/TOSC.V2020.I2.40-67},
  timestamp    = {Tue, 04 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/PijnenburgP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PijnenburgP20,
  author       = {Jeroen Pijnenburg and
                  Bertram Poettering},
  editor       = {Liqun Chen and
                  Chris J. Mitchell and
                  Thanassis Giannetsos and
                  Daniele Sgandurra},
  title        = {Efficiency Improvements for Encrypt-to-Self},
  booktitle    = {CYSARM@CCS '20: Proceedings of the 2nd Workshop on Cyber-Security
                  Arms Race, Virtual Event, USA, November, 2020},
  pages        = {13--23},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3411505.3418438},
  doi          = {10.1145/3411505.3418438},
  timestamp    = {Thu, 11 Nov 2021 13:43:43 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/PijnenburgP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/PijnenburgP20,
  author       = {Jeroen Pijnenburg and
                  Bertram Poettering},
  editor       = {Liqun Chen and
                  Ninghui Li and
                  Kaitai Liang and
                  Steve A. Schneider},
  title        = {Encrypt-to-Self: Securely Outsourcing Storage},
  booktitle    = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research
                  in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18,
                  2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12308},
  pages        = {635--654},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-58951-6\_31},
  doi          = {10.1007/978-3-030-58951-6\_31},
  timestamp    = {Fri, 02 Jul 2021 20:12:27 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/PijnenburgP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2009-02667,
  author       = {Jeroen Pijnenburg and
                  Bertram Poettering},
  title        = {Efficiency Improvements for Encrypt-to-Self},
  journal      = {CoRR},
  volume       = {abs/2009.02667},
  year         = {2020},
  url          = {https://arxiv.org/abs/2009.02667},
  eprinttype    = {arXiv},
  eprint       = {2009.02667},
  timestamp    = {Thu, 17 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2009-02667.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PoetteringR20,
  author       = {Bertram Poettering and
                  Paul R{\"{o}}sler},
  title        = {Combiners for {AEAD}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {232},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/232},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PoetteringR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PijnenburgP20,
  author       = {Jeroen Pijnenburg and
                  Bertram Poettering},
  title        = {Key Assignment Schemes with Authenticated Encryption, revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {612},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/612},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PijnenburgP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PijnenburgP20a,
  author       = {Jeroen Pijnenburg and
                  Bertram Poettering},
  title        = {Encrypt-to-self: Securely Outsourcing Storage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {847},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/847},
  timestamp    = {Mon, 27 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PijnenburgP20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ArmourP19,
  author       = {Marcel Armour and
                  Bertram Poettering},
  title        = {Substitution Attacks against Message Authentication},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {3},
  pages        = {152--168},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i3.152-168},
  doi          = {10.13154/TOSC.V2019.I3.152-168},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/ArmourP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/InoueIMP19,
  author       = {Akiko Inoue and
                  Tetsu Iwata and
                  Kazuhiko Minematsu and
                  Bertram Poettering},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Cryptanalysis of {OCB2:} Attacks on Authenticity and Confidentiality},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11692},
  pages        = {3--31},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26948-7\_1},
  doi          = {10.1007/978-3-030-26948-7\_1},
  timestamp    = {Wed, 21 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/InoueIMP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/AuerbachKPS19,
  author       = {Benedikt Auerbach and
                  Eike Kiltz and
                  Bertram Poettering and
                  Stefan Schoenen},
  editor       = {Mitsuru Matsui},
  title        = {Lossy Trapdoor Permutations with Improved Lossiness},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2019 - The Cryptographers' Track at
                  the {RSA} Conference 2019, San Francisco, CA, USA, March 4-8, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11405},
  pages        = {230--250},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-12612-4\_12},
  doi          = {10.1007/978-3-030-12612-4\_12},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/AuerbachKPS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/ArmourP19,
  author       = {Marcel Armour and
                  Bertram Poettering},
  editor       = {Martin Albrecht},
  title        = {Subverting Decryption in {AEAD}},
  booktitle    = {Cryptography and Coding - 17th {IMA} International Conference, {IMACC}
                  2019, Oxford, UK, December 16-18, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11929},
  pages        = {22--41},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-35199-1\_2},
  doi          = {10.1007/978-3-030-35199-1\_2},
  timestamp    = {Fri, 15 Dec 2023 20:21:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/ArmourP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/InoueIMP19,
  author       = {Akiko Inoue and
                  Tetsu Iwata and
                  Kazuhiko Minematsu and
                  Bertram Poettering},
  title        = {Cryptanalysis of {OCB2:} Attacks on Authenticity and Confidentiality},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {311},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/311},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/InoueIMP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArmourP19,
  author       = {Marcel Armour and
                  Bertram Poettering},
  title        = {Subverting Decryption in {AEAD}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {987},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/987},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArmourP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArmourP19a,
  author       = {Marcel Armour and
                  Bertram Poettering},
  title        = {Substitution Attacks against Message Authentication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {989},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/989},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArmourP19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/Poettering18,
  author       = {Bertram Poettering},
  editor       = {Antoine Joux and
                  Abderrahmane Nitaj and
                  Tajjeeddine Rachidi},
  title        = {Shorter Double-Authentication Preventing Signatures for Small Address
                  Spaces},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2018 - 10th International Conference
                  on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10831},
  pages        = {344--361},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-89339-6\_19},
  doi          = {10.1007/978-3-319-89339-6\_19},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/Poettering18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/PoetteringR18,
  author       = {Bertram Poettering and
                  Paul R{\"{o}}sler},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Towards Bidirectional Ratcheted Key Exchange},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10991},
  pages        = {3--32},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96884-1\_1},
  doi          = {10.1007/978-3-319-96884-1\_1},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/PoetteringR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/EugsterMP18,
  author       = {Patrick Eugster and
                  Giorgia Azzurra Marson and
                  Bertram Poettering},
  title        = {A Cryptographic Look at Multi-party Channels},
  booktitle    = {31st {IEEE} Computer Security Foundations Symposium, {CSF} 2018, Oxford,
                  United Kingdom, July 9-12, 2018},
  pages        = {31--45},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/CSF.2018.00010},
  doi          = {10.1109/CSF.2018.00010},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/EugsterMP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GiaconKP18,
  author       = {Federico Giacon and
                  Eike Kiltz and
                  Bertram Poettering},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {Hybrid Encryption in a Multi-user Setting, Revisited},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10769},
  pages        = {159--189},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76578-5\_6},
  doi          = {10.1007/978-3-319-76578-5\_6},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GiaconKP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GiaconHP18,
  author       = {Federico Giacon and
                  Felix Heuer and
                  Bertram Poettering},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {{KEM} Combiners},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10769},
  pages        = {190--218},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76578-5\_7},
  doi          = {10.1007/978-3-319-76578-5\_7},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GiaconHP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AuerbachP18,
  author       = {Benedikt Auerbach and
                  Bertram Poettering},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {Hashing Solutions Instead of Generating Problems: On the Interactive
                  Certification of {RSA} Moduli},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10770},
  pages        = {403--430},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76581-5\_14},
  doi          = {10.1007/978-3-319-76581-5\_14},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AuerbachP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AuerbachP18,
  author       = {Benedikt Auerbach and
                  Bertram Poettering},
  title        = {Hashing solutions instead of generating problems: On the interactive
                  certification of {RSA} moduli},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {13},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/013},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AuerbachP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GiaconHP18,
  author       = {Federico Giacon and
                  Felix Heuer and
                  Bertram Poettering},
  title        = {{KEM} Combiners},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {24},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/024},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GiaconHP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Poettering18,
  author       = {Bertram Poettering},
  title        = {Shorter double-authentication preventing signatures for small address
                  spaces},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {223},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/223},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Poettering18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PoetteringR18,
  author       = {Bertram Poettering and
                  Paul R{\"{o}}sler},
  title        = {Ratcheted key exchange, revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {296},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/296},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PoetteringR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Poettering18a,
  author       = {Bertram Poettering},
  title        = {Breaking the confidentiality of {OCB2}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1087},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1087},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Poettering18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AuerbachKPS18,
  author       = {Benedikt Auerbach and
                  Eike Kiltz and
                  Bertram Poettering and
                  Stefan Schoenen},
  title        = {Lossy Trapdoor Permutations with Improved Lossiness},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1183},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1183},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AuerbachKPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/PoetteringS17,
  author       = {Bertram Poettering and
                  Douglas Stebila},
  title        = {Double-authentication-preventing signatures},
  journal      = {Int. J. Inf. Sec.},
  volume       = {16},
  number       = {1},
  pages        = {1--22},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10207-015-0307-8},
  doi          = {10.1007/S10207-015-0307-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/PoetteringS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BoydCFPPS17,
  author       = {Colin Boyd and
                  Cas Cremers and
                  Mich{\`{e}}le Feltz and
                  Kenneth G. Paterson and
                  Bertram Poettering and
                  Douglas Stebila},
  title        = {{ASICS:} authenticated key exchange security incorporating certification
                  systems},
  journal      = {Int. J. Inf. Sec.},
  volume       = {16},
  number       = {2},
  pages        = {151--171},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10207-015-0312-y},
  doi          = {10.1007/S10207-015-0312-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/BoydCFPPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/GuntherP17,
  author       = {Felix G{\"{u}}nther and
                  Bertram Poettering},
  title        = {Linkable message tagging: solving the key distribution problem of
                  signature schemes},
  journal      = {Int. J. Inf. Sec.},
  volume       = {16},
  number       = {3},
  pages        = {281--297},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10207-016-0327-z},
  doi          = {10.1007/S10207-016-0327-Z},
  timestamp    = {Fri, 12 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/GuntherP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/CramptonFGJP17,
  author       = {Jason Crampton and
                  Naomi Farley and
                  Gregory Z. Gutin and
                  Mark Jones and
                  Bertram Poettering},
  title        = {Cryptographic enforcement of information flow policies without public
                  information via tree partitions},
  journal      = {J. Comput. Secur.},
  volume       = {25},
  number       = {6},
  pages        = {511--535},
  year         = {2017},
  url          = {https://doi.org/10.3233/JCS-16863},
  doi          = {10.3233/JCS-16863},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/CramptonFGJP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/MarsonP17,
  author       = {Giorgia Azzurra Marson and
                  Bertram Poettering},
  title        = {Security Notions for Bidirectional Channels},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {1},
  pages        = {405--426},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i1.405-426},
  doi          = {10.13154/TOSC.V2017.I1.405-426},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/MarsonP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BellarePS17,
  author       = {Mihir Bellare and
                  Bertram Poettering and
                  Douglas Stebila},
  editor       = {Serge Fehr},
  title        = {Deterring Certificate Subversion: Efficient Double-Authentication-Preventing
                  Signatures},
  booktitle    = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Amsterdam, The
                  Netherlands, March 28-31, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10175},
  pages        = {121--151},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54388-7\_5},
  doi          = {10.1007/978-3-662-54388-7\_5},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BellarePS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/FerschKP17,
  author       = {Manuel Fersch and
                  Eike Kiltz and
                  Bertram Poettering},
  editor       = {Yael Kalai and
                  Leonid Reyzin},
  title        = {On the One-Per-Message Unforgeability of {(EC)DSA} and Its Variants},
  booktitle    = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
                  Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10678},
  pages        = {519--534},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70503-3\_17},
  doi          = {10.1007/978-3-319-70503-3\_17},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/FerschKP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MarsonP17,
  author       = {Giorgia Azzurra Marson and
                  Bertram Poettering},
  title        = {Security Notions for Bidirectional Channels},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {161},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/161},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MarsonP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MarsonP17a,
  author       = {Giorgia Azzurra Marson and
                  Bertram Poettering},
  title        = {With one it is easy, with many it gets complicated: Understanding
                  Channel Security for Groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {786},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/786},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MarsonP17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GiaconKP17,
  author       = {Federico Giacon and
                  Eike Kiltz and
                  Bertram Poettering},
  title        = {Hybrid Encryption in a Multi-User Setting, Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {843},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/843},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GiaconKP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FerschKP17,
  author       = {Manuel Fersch and
                  Eike Kiltz and
                  Bertram Poettering},
  title        = {On the One-Per-Message Unforgeability of {(EC)DSA} and its Variants},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {890},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/890},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FerschKP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/HeuerP16,
  author       = {Felix Heuer and
                  Bertram Poettering},
  editor       = {Jung Hee Cheon and
                  Tsuyoshi Takagi},
  title        = {Selective Opening Security from Simulatable Data Encapsulation},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10032},
  pages        = {248--277},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53890-6\_9},
  doi          = {10.1007/978-3-662-53890-6\_9},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/HeuerP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BellarePS16,
  author       = {Mihir Bellare and
                  Bertram Poettering and
                  Douglas Stebila},
  editor       = {Jung Hee Cheon and
                  Tsuyoshi Takagi},
  title        = {From Identification to Signatures, Tightly: {A} Framework and Generic
                  Transforms},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10032},
  pages        = {435--464},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53890-6\_15},
  doi          = {10.1007/978-3-662-53890-6\_15},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BellarePS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FerschKP16,
  author       = {Manuel Fersch and
                  Eike Kiltz and
                  Bertram Poettering},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {On the Provable Security of {(EC)DSA} Signatures},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {1651--1662},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978413},
  doi          = {10.1145/2976749.2978413},
  timestamp    = {Tue, 10 Nov 2020 20:00:49 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/FerschKP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CramptonFGJP16,
  author       = {Jason Crampton and
                  Naomi Farley and
                  Gregory Z. Gutin and
                  Mark Jones and
                  Bertram Poettering},
  title        = {Cryptographic Enforcement of Information Flow Policies without Public
                  Information via Tree Partitions},
  journal      = {CoRR},
  volume       = {abs/1608.08386},
  year         = {2016},
  url          = {http://arxiv.org/abs/1608.08386},
  eprinttype    = {arXiv},
  eprint       = {1608.08386},
  timestamp    = {Thu, 05 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/CramptonFGJP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HeuerP16,
  author       = {Felix Heuer and
                  Bertram Poettering},
  title        = {Selective Opening Security from Simulatable Data Encapsulation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {845},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/845},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HeuerP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellarePS16,
  author       = {Mihir Bellare and
                  Bertram Poettering and
                  Douglas Stebila},
  title        = {Deterring Certificate Subversion: Efficient Double-Authentication-Preventing
                  Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1016},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1016},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellarePS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GuntherP15,
  author       = {Felix G{\"{u}}nther and
                  Bertram Poettering},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {Linkable Message Tagging: Solving the Key Distribution Problem of
                  Signature Schemes},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {195--212},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_12},
  doi          = {10.1007/978-3-319-19962-7\_12},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/GuntherP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/CramptonFGJP15,
  author       = {Jason Crampton and
                  Naomi Farley and
                  Gregory Z. Gutin and
                  Mark Jones and
                  Bertram Poettering},
  editor       = {Tal Malkin and
                  Vladimir Kolesnikov and
                  Allison Bishop Lewko and
                  Michalis Polychronakis},
  title        = {Cryptographic Enforcement of Information Flow Policies Without Public
                  Information},
  booktitle    = {Applied Cryptography and Network Security - 13th International Conference,
                  {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9092},
  pages        = {389--408},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28166-7\_19},
  doi          = {10.1007/978-3-319-28166-7\_19},
  timestamp    = {Thu, 05 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/CramptonFGJP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/PoetteringS15,
  author       = {Bertram Poettering and
                  Dale L. Sibborn},
  editor       = {Kaisa Nyberg},
  title        = {Cold Boot Attacks in the Discrete Logarithm Setting},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2015, The Cryptographer's Track at
                  the {RSA} Conference 2015, San Francisco, CA, USA, April 20-24, 2015.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9048},
  pages        = {449--465},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-16715-2\_24},
  doi          = {10.1007/978-3-319-16715-2\_24},
  timestamp    = {Thu, 14 Oct 2021 10:27:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/PoetteringS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/DegabrieleFP15,
  author       = {Jean Paul Degabriele and
                  Pooya Farshim and
                  Bertram Poettering},
  editor       = {Gregor Leander},
  title        = {A More Cautious Approach to Security Against Mass Surveillance},
  booktitle    = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015,
                  Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9054},
  pages        = {579--598},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48116-5\_28},
  doi          = {10.1007/978-3-662-48116-5\_28},
  timestamp    = {Sat, 19 Oct 2019 20:27:47 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/DegabrieleFP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PoetteringS15,
  author       = {Bertram Poettering and
                  Dale L. Sibborn},
  title        = {Cold Boot Attacks in the Discrete Logarithm Setting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {57},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/057},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PoetteringS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DegabrieleFP15,
  author       = {Jean Paul Degabriele and
                  Pooya Farshim and
                  Bertram Poettering},
  title        = {A More Cautious Approach to Security Against Mass Surveillance},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {748},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/748},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DegabrieleFP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ManulisPS14,
  author       = {Mark Manulis and
                  Bertram Poettering and
                  Douglas Stebila},
  title        = {Plaintext awareness in identity-based key encapsulation},
  journal      = {Int. J. Inf. Sec.},
  volume       = {13},
  number       = {1},
  pages        = {25--49},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10207-013-0218-5},
  doi          = {10.1007/S10207-013-0218-5},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/ManulisPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/PatersonPS14,
  author       = {Kenneth G. Paterson and
                  Bertram Poettering and
                  Jacob C. N. Schuldt},
  editor       = {Palash Sarkar and
                  Tetsu Iwata},
  title        = {Big Bias Hunting in Amazonia: Large-Scale Computation and Exploitation
                  of {RC4} Biases (Invited Paper)},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8873},
  pages        = {398--419},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45611-8\_21},
  doi          = {10.1007/978-3-662-45611-8\_21},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/PatersonPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PintoPS14,
  author       = {Alexandre Pinto and
                  Bertram Poettering and
                  Jacob C. N. Schuldt},
  editor       = {Shiho Moriai and
                  Trent Jaeger and
                  Kouichi Sakurai},
  title        = {Multi-recipient encryption, revisited},
  booktitle    = {9th {ACM} Symposium on Information, Computer and Communications Security,
                  {ASIA} {CCS} '14, Kyoto, Japan - June 03 - 06, 2014},
  pages        = {229--238},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2590296.2590329},
  doi          = {10.1145/2590296.2590329},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/PintoPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MarsonP14,
  author       = {Giorgia Azzurra Marson and
                  Bertram Poettering},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {Even More Practical Secure Logging: Tree-Based Seekable Sequential
                  Key Generators},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8713},
  pages        = {37--54},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11212-1\_3},
  doi          = {10.1007/978-3-319-11212-1\_3},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/MarsonP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/PoetteringS14,
  author       = {Bertram Poettering and
                  Douglas Stebila},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {Double-Authentication-Preventing Signatures},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8712},
  pages        = {436--453},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11203-9\_25},
  doi          = {10.1007/978-3-319-11203-9\_25},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/PoetteringS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/PatersonPS14,
  author       = {Kenneth G. Paterson and
                  Bertram Poettering and
                  Jacob C. N. Schuldt},
  editor       = {Carlos Cid and
                  Christian Rechberger},
  title        = {Plaintext Recovery Attacks Against {WPA/TKIP}},
  booktitle    = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
                  London, UK, March 3-5, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8540},
  pages        = {325--349},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-46706-0\_17},
  doi          = {10.1007/978-3-662-46706-0\_17},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/PatersonPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CramptonFGJP14,
  author       = {Jason Crampton and
                  Naomi Farley and
                  Gregory Z. Gutin and
                  Mark Jones and
                  Bertram Poettering},
  title        = {Cryptographic Enforcement of Information Flow Policies without Public
                  Information},
  journal      = {CoRR},
  volume       = {abs/1410.5567},
  year         = {2014},
  url          = {http://arxiv.org/abs/1410.5567},
  eprinttype    = {arXiv},
  eprint       = {1410.5567},
  timestamp    = {Thu, 05 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/CramptonFGJP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuntherP14,
  author       = {Felix G{\"{u}}nther and
                  Bertram Poettering},
  title        = {Linkable Message Tagging: Solving the key distribution problem of
                  signature schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {14},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/014},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuntherP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MarsonP14,
  author       = {Giorgia Azzurra Marson and
                  Bertram Poettering},
  title        = {Even more practical secure logging: Tree-based Seekable Sequential
                  Key Generators},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {479},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/479},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MarsonP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/CristofaroMP13,
  author       = {Emiliano De Cristofaro and
                  Mark Manulis and
                  Bertram Poettering},
  title        = {Private discovery of common social contacts},
  journal      = {Int. J. Inf. Sec.},
  volume       = {12},
  number       = {1},
  pages        = {49--65},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10207-012-0183-4},
  doi          = {10.1007/S10207-012-0183-4},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/CristofaroMP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/NietoMPRS13,
  author       = {Juan Manuel Gonz{\'{a}}lez Nieto and
                  Mark Manulis and
                  Bertram Poettering and
                  Jothi Rangasamy and
                  Douglas Stebila},
  title        = {Publicly verifiable ciphertexts},
  journal      = {J. Comput. Secur.},
  volume       = {21},
  number       = {5},
  pages        = {749--778},
  year         = {2013},
  url          = {https://doi.org/10.3233/JCS-130473},
  doi          = {10.3233/JCS-130473},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/NietoMPRS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FleischhackerGKMP13,
  author       = {Nils Fleischhacker and
                  Felix G{\"{u}}nther and
                  Franziskus Kiefer and
                  Mark Manulis and
                  Bertram Poettering},
  editor       = {Kefei Chen and
                  Qi Xie and
                  Weidong Qiu and
                  Ninghui Li and
                  Wen{-}Guey Tzeng},
  title        = {Pseudorandom signatures},
  booktitle    = {8th {ACM} Symposium on Information, Computer and Communications Security,
                  {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013},
  pages        = {107--118},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2484313.2484325},
  doi          = {10.1145/2484313.2484325},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/FleischhackerGKMP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/FreirePP13,
  author       = {Eduarda S. V. Freire and
                  Kenneth G. Paterson and
                  Bertram Poettering},
  editor       = {Ed Dawson},
  title        = {Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment
                  Schemes},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2013 - The Cryptographers' Track at
                  the {RSA} Conference 2013, San Francisco,CA, USA, February 25-March
                  1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7779},
  pages        = {101--114},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36095-4\_7},
  doi          = {10.1007/978-3-642-36095-4\_7},
  timestamp    = {Wed, 22 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/FreirePP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MarsonP13,
  author       = {Giorgia Azzurra Marson and
                  Bertram Poettering},
  editor       = {Jason Crampton and
                  Sushil Jajodia and
                  Keith Mayes},
  title        = {Practical Secure Logging: Seekable Sequential Key Generators},
  booktitle    = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research
                  in Computer Security, Egham, UK, September 9-13, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8134},
  pages        = {111--128},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40203-6\_7},
  doi          = {10.1007/978-3-642-40203-6\_7},
  timestamp    = {Wed, 25 Sep 2019 18:03:15 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/MarsonP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BoydCFPPS13,
  author       = {Colin Boyd and
                  Cas Cremers and
                  Mich{\`{e}}le Feltz and
                  Kenneth G. Paterson and
                  Bertram Poettering and
                  Douglas Stebila},
  editor       = {Jason Crampton and
                  Sushil Jajodia and
                  Keith Mayes},
  title        = {{ASICS:} Authenticated Key Exchange Security Incorporating Certification
                  Systems},
  booktitle    = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research
                  in Computer Security, Egham, UK, September 9-13, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8134},
  pages        = {381--399},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40203-6\_22},
  doi          = {10.1007/978-3-642-40203-6\_22},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BoydCFPPS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AlFardanBPPS13,
  author       = {Nadhem J. AlFardan and
                  Daniel J. Bernstein and
                  Kenneth G. Paterson and
                  Bertram Poettering and
                  Jacob C. N. Schuldt},
  editor       = {Samuel T. King},
  title        = {On the Security of {RC4} in {TLS}},
  booktitle    = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC,
                  USA, August 14-16, 2013},
  pages        = {305--320},
  publisher    = {{USENIX} Association},
  year         = {2013},
  url          = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/paper/alFardan},
  timestamp    = {Mon, 01 Feb 2021 08:42:56 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/AlFardanBPPS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PoetteringS13,
  author       = {Bertram Poettering and
                  Douglas Stebila},
  title        = {Double-authentication-preventing signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {333},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/333},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PoetteringS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MarsonP13,
  author       = {Giorgia Azzurra Marson and
                  Bertram Poettering},
  title        = {Practical Secure Logging: Seekable Sequential Key Generators},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {397},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/397},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MarsonP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoydCFPPS13,
  author       = {Colin Boyd and
                  Cas Cremers and
                  Mich{\`{e}}le Feltz and
                  Kenneth G. Paterson and
                  Bertram Poettering and
                  Douglas Stebila},
  title        = {{ASICS:} Authenticated Key Exchange Security Incorporating Certification
                  Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {398},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/398},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoydCFPPS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatersonPS13,
  author       = {Kenneth G. Paterson and
                  Bertram Poettering and
                  Jacob C. N. Schuldt},
  title        = {Plaintext Recovery Attacks Against {WPA/TKIP}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {748},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/748},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatersonPS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/dnb/Poettering12,
  author       = {Bertram Poettering},
  title        = {Privacy protection for authentication protocols},
  school       = {Darmstadt University of Technology, Germany},
  year         = {2012},
  url          = {http://tuprints.ulb.tu-darmstadt.de/2867/},
  urn          = {urn:nbn:de:tuda-tuprints-28676},
  timestamp    = {Sat, 17 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/dnb/Poettering12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/NietoMPRS12,
  author       = {Juan Manuel Gonz{\'{a}}lez Nieto and
                  Mark Manulis and
                  Bertram Poettering and
                  Jothi Rangasamy and
                  Douglas Stebila},
  editor       = {Ivan Visconti and
                  Roberto De Prisco},
  title        = {Publicly Verifiable Ciphertexts},
  booktitle    = {Security and Cryptography for Networks - 8th International Conference,
                  {SCN} 2012, Amalfi, Italy, September 5-7, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7485},
  pages        = {393--410},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32928-9\_22},
  doi          = {10.1007/978-3-642-32928-9\_22},
  timestamp    = {Thu, 23 Jun 2022 19:58:57 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/NietoMPRS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NietoMPRS12,
  author       = {Juan Manuel Gonz{\'{a}}lez Nieto and
                  Mark Manulis and
                  Bertram Poettering and
                  Jothi Rangasamy and
                  Douglas Stebila},
  title        = {Publicly Verifiable Ciphertexts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {357},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/357},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NietoMPRS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ManulisPS12,
  author       = {Mark Manulis and
                  Bertram Poettering and
                  Douglas Stebila},
  title        = {Plaintext Awareness in Identity-Based Key Encapsulation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {559},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/559},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ManulisPS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FreirePP12,
  author       = {Eduarda S. V. Freire and
                  Kenneth G. Paterson and
                  Bertram Poettering},
  title        = {Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment
                  Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {645},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/645},
  timestamp    = {Wed, 22 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FreirePP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/CristofaroMP11,
  author       = {Emiliano De Cristofaro and
                  Mark Manulis and
                  Bertram Poettering},
  editor       = {Javier L{\'{o}}pez and
                  Gene Tsudik},
  title        = {Private Discovery of Common Social Contacts},
  booktitle    = {Applied Cryptography and Network Security - 9th International Conference,
                  {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6715},
  pages        = {147--165},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21554-4\_9},
  doi          = {10.1007/978-3-642-21554-4\_9},
  timestamp    = {Thu, 29 Aug 2019 08:10:02 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/CristofaroMP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ManulisP11,
  author       = {Mark Manulis and
                  Bertram Poettering},
  editor       = {Bruce S. N. Cheung and
                  Lucas Chi Kwong Hui and
                  Ravi S. Sandhu and
                  Duncan S. Wong},
  title        = {Practical affiliation-hiding authentication from improved polynomial
                  interpolation},
  booktitle    = {Proceedings of the 6th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2011, Hong Kong, China, March 22-24,
                  2011},
  pages        = {286--295},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1966913.1966950},
  doi          = {10.1145/1966913.1966950},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ManulisP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/ManulisP11,
  author       = {Mark Manulis and
                  Bertram Poettering},
  editor       = {Claudio A. Ardagna and
                  Jianying Zhou},
  title        = {Affiliation-Hiding Authentication with Minimal Bandwidth Consumption},
  booktitle    = {Information Security Theory and Practice. Security and Privacy of
                  Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6633},
  pages        = {85--99},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21040-2\_6},
  doi          = {10.1007/978-3-642-21040-2\_6},
  timestamp    = {Mon, 21 Mar 2022 18:09:53 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/ManulisP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CristofaroMP11,
  author       = {Emiliano De Cristofaro and
                  Mark Manulis and
                  Bertram Poettering},
  title        = {Private Discovery of Common Social Contacts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {26},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/026},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CristofaroMP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FleischhackerGKMP11,
  author       = {Nils Fleischhacker and
                  Felix G{\"{u}}nther and
                  Franziskus Kiefer and
                  Mark Manulis and
                  Bertram Poettering},
  title        = {Pseudorandom Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {673},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/673},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FleischhackerGKMP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BrzuskaBDFFKMOPPS10,
  author       = {Christina Brzuska and
                  Heike Busch and
                  {\"{O}}zg{\"{u}}r Dagdelen and
                  Marc Fischlin and
                  Martin Franz and
                  Stefan Katzenbeisser and
                  Mark Manulis and
                  Cristina Onete and
                  Andreas Peter and
                  Bertram Poettering and
                  Dominique Schr{\"{o}}der},
  editor       = {Jianying Zhou and
                  Moti Yung},
  title        = {Redactable Signatures for Tree-Structured Data: Definitions and Constructions},
  booktitle    = {Applied Cryptography and Network Security, 8th International Conference,
                  {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6123},
  pages        = {87--104},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13708-2\_6},
  doi          = {10.1007/978-3-642-13708-2\_6},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/BrzuskaBDFFKMOPPS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ManulisPT10,
  author       = {Mark Manulis and
                  Bertram Poettering and
                  Gene Tsudik},
  editor       = {Jianying Zhou and
                  Moti Yung},
  title        = {Affiliation-Hiding Key Exchange with Untrusted Group Authorities},
  booktitle    = {Applied Cryptography and Network Security, 8th International Conference,
                  {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6123},
  pages        = {402--419},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13708-2\_24},
  doi          = {10.1007/978-3-642-13708-2\_24},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/ManulisPT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ManulisPP10,
  author       = {Mark Manulis and
                  Benny Pinkas and
                  Bertram Poettering},
  editor       = {Jianying Zhou and
                  Moti Yung},
  title        = {Privacy-Preserving Group Discovery with Linear Complexity},
  booktitle    = {Applied Cryptography and Network Security, 8th International Conference,
                  {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6123},
  pages        = {420--437},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13708-2\_25},
  doi          = {10.1007/978-3-642-13708-2\_25},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/ManulisPP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/ManulisPT10,
  author       = {Mark Manulis and
                  Bertram Poettering and
                  Gene Tsudik},
  editor       = {Mikhail J. Atallah and
                  Nicholas J. Hopper},
  title        = {Taming Big Brother Ambitions: More Privacy for Secret Handshakes},
  booktitle    = {Privacy Enhancing Technologies, 10th International Symposium, {PETS}
                  2010, Berlin, Germany, July 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6205},
  pages        = {149--165},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14527-8\_9},
  doi          = {10.1007/978-3-642-14527-8\_9},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/ManulisPT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ManulisP10,
  author       = {Mark Manulis and
                  Bertram Poettering},
  title        = {Practical Affiliation-Hiding Authentication from Improved Polynomial
                  Interpolation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {659},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/659},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ManulisP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics