Veröffentlichungen

Efficient Signatures with Tight Real World Security in the Random-Oracle Model

2014 - Christoph Bader

In Proceedings of the 13th International Conference, CANS 2014 [paper]

Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks

2014 - Christopher Meyer, Juraj Somorovsky, Jörg Schwenk, Eugen Weiss, Sebastian Schinzel, Erik Tews

USENIX Security 2014 [Slides] [pdf]

New Modular Compilers for Authenticated Key Exchange

2014 - Yong Li, Sven Schäge, Zheng Yang, Christoph Bader, Jörg Schwenk

In Proceedings the 12th International Conference, ACNS 2014 [Paper]

On the Security of the Pre-Shared Key Ciphersuites of TLS

2014 - Yong Li, Sven Schäge, Zheng Yang, Florian Kohlar, Jörg Schwenk

In Proceedings of the 17th International Conference on Practice and Theory in Public-Key Cryptography (PKC), 2014 [Paper]

SAML Privacy-Enhancing Profile

2014 - Moritz Horsch, Max Tuengerthal, Tobias Wich

Open Identity Summit 2014 [PDF]

Secure Fallback Authentication and the Trusted Friend Attack

2014 - Ashar Javed, David Bletgen, Florian Kohlar, Markus Dürmuth, Jörg Schwenk

Proceedings International Conference on Distributed Computing Systems Workshops (ICDCS Workshops), 2014.

One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography

2013 - Tibor Jager, Kenneth G. Paterson, Juraj Somorovsky

In Proceedings of the Network and Distributed System Security Symposium (NDSS), 2013 [CryptoChallenge] [paper]

Strongly Secure One-round Group Authenticated Key Exchange in the Standard Model

2013 - Yong Li, Zheng Yang

In Proceedings of the 12th International Conference, CANS 2013 [Paper]

mXSS Attacks: Attacking well-secured Web-Applications by using innerHTML Mutations

2013 - Mario Heiderich, Jörg Schwenk, Tilman Frosch, Jonas Magazinius, Edward Z. Yang

20th ACM Conference on Computer and Communications Security (CCS), Berlin, Germany, November 2013 [PDF]

On the security of TLS renegotiation

2013 - Florian Bergsma, Florian Kohlar, Douglas Stebila

ACM Conference on Computer and Communications Security
Seite: