Dr Bertram Poettering

  1. 2018
  2. Forthcoming

    Towards Bidirectional Ratcheted Key Exchange

    Poettering, B. & Rösler, P. 3 Jun 2018 p. 1 30 p.

    Research output: Contribution to conferencePaper

  3. E-pub ahead of print

    Shorter Double-Authentication Preventing Signatures for Small Address Spaces

    Poettering, B. 6 Apr 2018 p. 344-361 18 p.

    Research output: Contribution to conferencePaper

  4. Forthcoming

    A Cryptographic Look at Multi-Party Channels

    Eugster, P., Marson, G. A. & Poettering, B. 31 Mar 2018 p. 1-15 15 p.

    Research output: Contribution to conferencePaper

  5. Published

    Hashing solutions instead of generating problems: On the interactive certification of RSA moduli

    Auerbach, B. & Poettering, B. 1 Mar 2018 p. 403-430 27 p.

    Research output: Contribution to conferencePaper

  6. Published

    Hybrid Encryption in a Multi-User Setting, Revisited

    Giacon, F., Kiltz, E. & Poettering, B. 2018 p. 1-30 30 p.

    Research output: Contribution to conferencePaper

  7. Forthcoming

    KEM Combiners

    Giacon, F., Heuer, F. & Poettering, B. 2018 p. 1-29 29 p.

    Research output: Contribution to conferencePaper

  8. 2017
  9. Published

    On the One-Per-Message Unforgeability of (EC)DSA and Its Variants

    Fersch, M., Kiltz, E. & Poettering, B. 5 Nov 2017 p. 519-534 16 p.

    Research output: Contribution to conferencePaper

  10. Published

    Cryptographic Enforcement of Information Flow Policies without Public Information via Tree Partitions

    Crampton, J., Farley, N., Gutin, G., Jones, M. & Poettering, B. 31 May 2017 In : Journal of Computer Security. p. 1-25 25 p.

    Research output: Contribution to journalArticle

  11. Published

    ASICS: authenticated key exchange security incorporating certification systems

    Boyd, C., Cremers, C., Feltz, M., Paterson, K., Poettering, B. & Stebila, D. 1 Apr 2017 In : International Journal of Information Security. 16, 2, p. 151-171 21 p.

    Research output: Contribution to journalArticle

  12. 2015
  13. Forthcoming

    Cryptographic Enforcement of Information Flow Policies without Public Information

    Crampton, J., Farley, N., Gutin, G., Jones, M. & Poettering, B. 2015 13th International Conference on Applied Cryptography and Network Security (ACNS 2015) . (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. 2014
  15. Published

    Big Bias Hunting in Amazonia: Large-Scale Computation and Exploitation of RC4 Biases (Invited Paper)

    Paterson, K. G., Poettering, B. & Schuldt, J. C. N. 2014 Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I. Sarkar, P. & Iwata, T. (eds.). Springer, Vol. 8873, p. 398-419 22 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Plaintext Recovery Attacks Against WPA/TKIP

    Paterson, K. G., Poettering, B. & Schuldt, J. C. N. 2014 Fast Software Encryption - 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers. p. 325-349 25 p. (Lecture Notes in Computer Science; vol. 8540)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. 2013
  18. Published

    ASICS: Authenticated Key Exchange Security Incorporating Certification Systems

    Boyd, C., Cremers, C., Feltz, M., Paterson, K., Poettering, B. & Stebila, D. Sep 2013 ESORICS 2013. Springer, Vol. 8134, p. 381-399 19 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    On the Security of RC4 in TLS

    Alfardan, N., Bernstein, D. J., Paterson, K., Poettering, B. & Schuldt, J. Aug 2013 USENIX Security Symposium. USENIX

    Research output: Chapter in Book/Report/Conference proceedingChapter

  20. Published

    Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes

    Freire, E. S. V., Paterson, K. G. & Poettering, B. 2013 CT-RSA 2013. Dawson, E. (ed.). Springer, Vol. 7779, p. 101-114 14 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution