Follow
Bertram Poettering
Bertram Poettering
IBM Research Labs - Zurich
Verified email at zurich.ibm.com
Title
Cited by
Cited by
Year
On the security of {RC4} in {TLS}
N AlFardan, DJ Bernstein, KG Paterson, B Poettering, JCN Schuldt
22nd USENIX Security Symposium (USENIX Security 13), 305-320, 2013
2722013
Redactable signatures for tree-structured data: Definitions and constructions
C Brzuska, H Busch, O Dagdelen, M Fischlin, M Franz, S Katzenbeisser, ...
Applied Cryptography and Network Security: 8th International Conference …, 2010
1472010
Towards bidirectional ratcheted key exchange
B Poettering, P Rösler
Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018
1072018
On the security of RC4 in TLS and WPA
NJ AlFardan, DJ Bernstein, KG Paterson, B Poettering, JCN Schuldt
USENIX Security Symposium 173, 2013
952013
KEM combiners
F Giacon, F Heuer, B Poettering
Public-Key Cryptography–PKC 2018: 21st IACR International Conference on …, 2018
762018
A more cautious approach to security against mass surveillance
JP Degabriele, P Farshim, B Poettering
Fast Software Encryption: 22nd International Workshop, FSE 2015, Istanbul …, 2015
722015
Private discovery of common social contacts
E De Cristofaro, M Manulis, B Poettering
International journal of information security 12, 49-65, 2013
672013
On the provable security of (EC) DSA signatures
M Fersch, E Kiltz, B Poettering
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
662016
Cryptanalysis of OCB2: attacks on authenticity and confidentiality
A Inoue, T Iwata, K Minematsu, B Poettering
Journal of Cryptology 33 (4), 1871-1913, 2020
592020
Plaintext recovery attacks against WPA/TKIP
KG Paterson, B Poettering, JCN Schuldt
Fast Software Encryption: 21st International Workshop, FSE 2014, London, UK …, 2015
472015
ASICS: Authenticated key exchange security incorporating certification systems
C Boyd, C Cremers, M Feltz, KG Paterson, B Poettering, D Stebila
International Journal of Information Security 16, 151-171, 2017
432017
From identification to signatures, tightly: A framework and generic transforms
M Bellare, B Poettering, D Stebila
Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the …, 2016
422016
Simple, efficient and strongly KI-secure hierarchical key assignment schemes
ESV Freire, KG Paterson, B Poettering
Cryptographers’ Track at the RSA Conference, 101-114, 2013
422013
Double-authentication-preventing signatures
B Poettering, D Stebila
International Journal of Information Security 16, 1-22, 2017
382017
Double-authentication-preventing signatures
B Poettering, D Stebila
Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014
352014
Privacy-preserving group discovery with linear complexity
M Manulis, B Pinkas, B Poettering
Applied Cryptography and Network Security: 8th International Conference …, 2010
342010
Big bias hunting in amazonia: Large-scale computation and exploitation of RC4 biases
KG Paterson, B Poettering, JCN Schuldt
Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014
322014
Security notions for bidirectional channels
GA Marson, B Poettering
Cryptology ePrint Archive, 2017
292017
Asynchronous ratcheted key exchange
B Poettering, P Rösler
Cryptology ePrint Archive, 2018
282018
Practical secure logging: Seekable sequential key generators
GA Marson, B Poettering
Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013
282013
The system can't perform the operation now. Try again later.
Articles 1–20