Martin Grothe
Martin Grothe
PhD Student, Network- and Datasecurity, Ruhr-University Bochum
Verified email at - Homepage
Cited by
Cited by
The dangers of key reuse: practical attacks on IPsec IKE
D Felsch, M Grothe, J Schwenk, A Czubak, M Szymanek
Proceedings of the 27th USENIX Conference on Security Symposium, 567-583, 2018
1 Trillion Dollar Refund–How To Spoof PDF Signatures
V Mladenov, C Mainka, KM zu Selhausen, M Grothe, J Schwenk
How to Break Microsoft Rights Management Services.
M Grothe, C Mainka, P Rösler, J Schwenk
WOOT, 2016
Your Cloud in my Company: Modern Rights Management Services Revisited
M Grothe, P Rösler, J Jupke, J Kaiser, C Mainka, J Schwenk
Breaking PPTP VPNs via RADIUS Encryption
M Horst, M Grothe, T Jager, J Schwenk
International Conference on Cryptology and Network Security, 159-175, 2016
Breaking and Fixing Gridcoin
M Grothe, T Niemann, J Somorovsky, J Schwenk
Proceedings of the 11th USENIX Conference on Offensive Technologies, 14-14, 2017
The system can't perform the operation now. Try again later.
Articles 1–6