The semi-generic group model and applications to pairing-based cryptography

2010 - Tibor Jager, Andy Rupp


Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model

2010 - Kristiyan Haralambiev, Tibor Jager, Eike Kiltz, Vic­tor Shoup

PKC 2010

Mobile Machine Operation in Underground Networks and the Security Question

2010 - Andreas Noack, Christoph Müller

escar'10 - 8th conference on Embedded Security in Cars, Bremen, Germany [Conference Link]

Generic Compilers for Authenticated Key Exchange

2010 - Tibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk

In Proceedings of ASIACRYPT 2010, Singapore [Full Version]

Mutual Preimage Authentication for fast Handover in Enterprise Networks

2010 - Andreas Noack, Mark Borrmann

The 5th International Symposium on Information Security (IS'10), Greece, 2010

Security Analysis of OpenID

2010 - Pavol Sovis, Florian Kohlar, Jörg Schwenk

In "Securing Electronic Business Processes - Highlights of the Information Security Solutions Europe 2010 Conference", 2010. [Camery Ready]

Group Key Agreement Performance in Wireless Mesh Networks

2010 - Andreas Noack, Jörg Schwenk

35th Annual IEEE Conference on Local Computer Networks and Workshops, LCN 2010 [Konferenz]

A New RSA-Based Signature Scheme

2010 - Sven Schäge, Jörg Schwenk

AFRICACRYPT 2010, Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. [Springer Link]

Strea­ming-Ba­sed Ve­ri­fi­ca­ti­on of XML Si­gna­tu­res in SOAP Mes­sa­ges

2010 - Juraj Somorovsky, Meiko Jensen, Jörg Schwenk

In Pro­cee­dings of the IEEE In­ter­na­tio­nal Work­shop on Web Ser­vice and Busi­ness Pro­cess Se­cu­ri­ty (WSBPS), Miami, Flo­ri­da, U.S.A., 2010.