Bertram Poettering
Bertram Poettering
IBM Research Labs - Zurich
Verified email at zurich.ibm.com
Title
Cited by
Cited by
Year
On the Security of RC4 in {TLS}
N AlFardan, DJ Bernstein, KG Paterson, B Poettering, JCN Schuldt
22nd {USENIX} Security Symposium ({USENIX} Security 13), 305-320, 2013
2182013
Redactable signatures for tree-structured data: Definitions and constructions
C Brzuska, H Busch, O Dagdelen, M Fischlin, M Franz, S Katzenbeisser, ...
International Conference on Applied Cryptography and Network Security, 87-104, 2010
1282010
On the Security of RC4 in TLS and WPA
NJ AlFardan, DJ Bernstein, KG Paterson, B Poettering, JCN Schuldt
USENIX Security Symposium, 173, 2013
822013
Private discovery of common social contacts
E De Cristofaro, M Manulis, B Poettering
International journal of information security 12 (1), 49-65, 2013
622013
A more cautious approach to security against mass surveillance
JP Degabriele, P Farshim, B Poettering
International Workshop on Fast Software Encryption, 579-598, 2015
472015
Towards bidirectional ratcheted key exchange
B Poettering, P Rösler
Annual International Cryptology Conference, 3-32, 2018
442018
Plaintext recovery attacks against WPA/TKIP
KG Paterson, B Poettering, JCN Schuldt
International Workshop on Fast Software Encryption, 325-349, 2014
402014
ASICS: Authenticated key exchange security incorporating certification systems
C Boyd, C Cremers, M Feltz, KG Paterson, B Poettering, D Stebila
International Journal of Information Security 16 (2), 151-171, 2017
342017
Cryptanalysis of OCB2: attacks on authenticity and confidentiality
A Inoue, T Iwata, K Minematsu, B Poettering
Journal of Cryptology 33 (4), 1871-1913, 2020
322020
Simple, efficient and strongly KI-secure hierarchical key assignment schemes
ESV Freire, KG Paterson, B Poettering
Cryptographers’ Track at the RSA Conference, 101-114, 2013
312013
Double-authentication-preventing signatures
B Poettering, D Stebila
International Journal of Information Security 16 (1), 1-22, 2017
302017
Privacy-preserving group discovery with linear complexity
M Manulis, B Pinkas, B Poettering
International Conference on Applied Cryptography and Network Security, 420-437, 2010
302010
Big bias hunting in amazonia: Large-scale computation and exploitation of RC4 biases
KG Paterson, B Poettering, JCN Schuldt
International Conference on the Theory and Application of Cryptology and …, 2014
292014
From identification to signatures, tightly: A framework and generic transforms
M Bellare, B Poettering, D Stebila
International Conference on the Theory and Application of Cryptology and …, 2016
262016
On the provable security of (EC) DSA signatures
M Fersch, E Kiltz, B Poettering
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
262016
Practical secure logging: Seekable sequential key generators
GA Marson, B Poettering
European Symposium on Research in Computer Security, 111-128, 2013
222013
Affiliation-hiding key exchange with untrusted group authorities
M Manulis, B Poettering, G Tsudik
International Conference on Applied Cryptography and Network Security, 402-419, 2010
222010
KEM combiners
F Giacon, F Heuer, B Poettering
IACR International Workshop on Public Key Cryptography, 190-218, 2018
202018
Security notions for bidirectional channels
GA Marson, B Poettering
IACR Transactions on Symmetric Cryptology, 405-426, 2017
182017
Deterring certificate subversion: efficient double-authentication-preventing signatures
M Bellare, B Poettering, D Stebila
IACR International Workshop on Public Key Cryptography, 121-151, 2017
162017
The system can't perform the operation now. Try again later.
Articles 1–20