Mr Jacob Schuldt

  1. 2016
  2. Published

    Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results

    Degabriele, J., Paterson, K., Schuldt, J. & Woodage, J., Aug 2016, Advances in Cryptology – CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I. Robshaw, M. & Katz, J. (eds.). Springer Berlin / Heidelberg, Vol. 9814. p. 403-432 30 p. (Lecture Notes in Computer Science ; vol. 9814).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  3. 2015
  4. Published

    Security Against Related Randomness Attacks via Reconstructive Extractors

    Paterson, K., Sibborn, D., Schuldt, J. & Wee, H., 8 Dec 2015, Cryptography and Coding - 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings. Groth, J. (ed.). Springer Verlag, Vol. 9496. p. 23-40 18 p. (Lecture Notes in Computer Science; vol. 9496).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. 2014
  6. Published

    Big Bias Hunting in Amazonia: Large-Scale Computation and Exploitation of RC4 Biases (Invited Paper)

    Paterson, K. G., Poettering, B. & Schuldt, J. C. N., 2014, Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I. Sarkar, P. & Iwata, T. (eds.). Springer, p. 398-419 22 p. (Lecture Notes in Computer Science; vol. 8873).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Plaintext Recovery Attacks Against WPA/TKIP

    Paterson, K. G., Poettering, B. & Schuldt, J. C. N., 2014, Fast Software Encryption - 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers. p. 325-349 25 p. (Lecture Notes in Computer Science; vol. 8540).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Related Randomness Attacks for Public Key Encryption

    Paterson, K. G., Schuldt, J. C. N. & Sibborn, D. L., 2014, PKC 2014. Krawczyk, H. (ed.). Springer, Vol. 8383. p. 465-482 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. 2013
  10. Published

    On the Security of RC4 in TLS

    Alfardan, N., Bernstein, D. J., Paterson, K., Poettering, B. & Schuldt, J., Aug 2013, USENIX Security Symposium. USENIX

    Research output: Chapter in Book/Report/Conference proceedingChapter