Bertram Poettering
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – today
- 2019
- [j9]Marcel Armour, Bertram Poettering:
Substitution Attacks against Message Authentication. IACR Trans. Symmetric Cryptol. 2019(3): 152-168 (2019) - [c35]Akiko Inoue, Tetsu Iwata
, Kazuhiko Minematsu
, Bertram Poettering
:
Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality. CRYPTO (1) 2019: 3-31 - [c34]Benedikt Auerbach, Eike Kiltz
, Bertram Poettering, Stefan Schoenen:
Lossy Trapdoor Permutations with Improved Lossiness. CT-RSA 2019: 230-250 - [i31]Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu, Bertram Poettering:
Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality. IACR Cryptology ePrint Archive 2019: 311 (2019) - [i30]Marcel Armour, Bertram Poettering:
Subverting Decryption in AEAD. IACR Cryptology ePrint Archive 2019: 987 (2019) - [i29]Marcel Armour, Bertram Poettering:
Substitution Attacks against Message Authentication. IACR Cryptology ePrint Archive 2019: 989 (2019) - 2018
- [c33]Bertram Poettering:
Shorter Double-Authentication Preventing Signatures for Small Address Spaces. AFRICACRYPT 2018: 344-361 - [c32]Bertram Poettering, Paul Rösler
:
Towards Bidirectional Ratcheted Key Exchange. CRYPTO (1) 2018: 3-32 - [c31]Patrick Eugster, Giorgia Azzurra Marson, Bertram Poettering:
A Cryptographic Look at Multi-party Channels. CSF 2018: 31-45 - [c30]Federico Giacon, Eike Kiltz
, Bertram Poettering:
Hybrid Encryption in a Multi-user Setting, Revisited. Public Key Cryptography (1) 2018: 159-189 - [c29]Federico Giacon, Felix Heuer, Bertram Poettering:
KEM Combiners. Public Key Cryptography (1) 2018: 190-218 - [c28]Benedikt Auerbach, Bertram Poettering:
Hashing Solutions Instead of Generating Problems: On the Interactive Certification of RSA Moduli. Public Key Cryptography (2) 2018: 403-430 - [i28]Benedikt Auerbach, Bertram Poettering:
Hashing solutions instead of generating problems: On the interactive certification of RSA moduli. IACR Cryptology ePrint Archive 2018: 13 (2018) - [i27]Federico Giacon, Felix Heuer, Bertram Poettering:
KEM Combiners. IACR Cryptology ePrint Archive 2018: 24 (2018) - [i26]Bertram Poettering:
Shorter double-authentication preventing signatures for small address spaces. IACR Cryptology ePrint Archive 2018: 223 (2018) - [i25]Bertram Poettering, Paul Rösler:
Ratcheted key exchange, revisited. IACR Cryptology ePrint Archive 2018: 296 (2018) - [i24]Bertram Poettering:
Breaking the confidentiality of OCB2. IACR Cryptology ePrint Archive 2018: 1087 (2018) - [i23]Benedikt Auerbach, Eike Kiltz, Bertram Poettering, Stefan Schoenen:
Lossy Trapdoor Permutations with Improved Lossiness. IACR Cryptology ePrint Archive 2018: 1183 (2018) - 2017
- [j8]Bertram Poettering, Douglas Stebila:
Double-authentication-preventing signatures. Int. J. Inf. Sec. 16(1): 1-22 (2017) - [j7]Colin Boyd, Cas Cremers, Michèle Feltz, Kenneth G. Paterson, Bertram Poettering, Douglas Stebila:
ASICS: authenticated key exchange security incorporating certification systems. Int. J. Inf. Sec. 16(2): 151-171 (2017) - [j6]Felix Günther, Bertram Poettering:
Linkable message tagging: solving the key distribution problem of signature schemes. Int. J. Inf. Sec. 16(3): 281-297 (2017) - [j5]Jason Crampton, Naomi Farley, Gregory Z. Gutin, Mark Jones, Bertram Poettering:
Cryptographic enforcement of information flow policies without public information via tree partitions. Journal of Computer Security 25(6): 511-535 (2017) - [j4]Giorgia Azzurra Marson, Bertram Poettering:
Security Notions for Bidirectional Channels. IACR Trans. Symmetric Cryptol. 2017(1): 405-426 (2017) - [c27]Mihir Bellare, Bertram Poettering, Douglas Stebila:
Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures. Public Key Cryptography (2) 2017: 121-151 - [c26]Manuel Fersch, Eike Kiltz
, Bertram Poettering:
On the One-Per-Message Unforgeability of (EC)DSA and Its Variants. TCC (2) 2017: 519-534 - [i22]Giorgia Azzurra Marson, Bertram Poettering:
Security Notions for Bidirectional Channels. IACR Cryptology ePrint Archive 2017: 161 (2017) - [i21]Giorgia Azzurra Marson, Bertram Poettering:
With one it is easy, with many it gets complicated: Understanding Channel Security for Groups. IACR Cryptology ePrint Archive 2017: 786 (2017) - [i20]Federico Giacon, Eike Kiltz, Bertram Poettering:
Hybrid Encryption in a Multi-User Setting, Revisited. IACR Cryptology ePrint Archive 2017: 843 (2017) - [i19]Manuel Fersch, Eike Kiltz, Bertram Poettering:
On the One-Per-Message Unforgeability of (EC)DSA and its Variants. IACR Cryptology ePrint Archive 2017: 890 (2017) - 2016
- [c25]Felix Heuer, Bertram Poettering:
Selective Opening Security from Simulatable Data Encapsulation. ASIACRYPT (2) 2016: 248-277 - [c24]Mihir Bellare, Bertram Poettering, Douglas Stebila:
From Identification to Signatures, Tightly: A Framework and Generic Transforms. ASIACRYPT (2) 2016: 435-464 - [c23]Manuel Fersch, Eike Kiltz
, Bertram Poettering:
On the Provable Security of (EC)DSA Signatures. ACM Conference on Computer and Communications Security 2016: 1651-1662 - [i18]Jason Crampton, Naomi Farley, Gregory Z. Gutin, Mark Jones, Bertram Poettering:
Cryptographic Enforcement of Information Flow Policies without Public Information via Tree Partitions. CoRR abs/1608.08386 (2016) - [i17]Felix Heuer, Bertram Poettering:
Selective Opening Security from Simulatable Data Encapsulation. IACR Cryptology ePrint Archive 2016: 845 (2016) - [i16]Mihir Bellare, Bertram Poettering, Douglas Stebila:
Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures. IACR Cryptology ePrint Archive 2016: 1016 (2016) - 2015
- [c22]Felix Günther, Bertram Poettering:
Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes. ACISP 2015: 195-212 - [c21]Jason Crampton, Naomi Farley, Gregory Z. Gutin, Mark Jones, Bertram Poettering:
Cryptographic Enforcement of Information Flow Policies Without Public Information. ACNS 2015: 389-408 - [c20]Bertram Poettering, Dale L. Sibborn:
Cold Boot Attacks in the Discrete Logarithm Setting. CT-RSA 2015: 449-465 - [c19]Jean Paul Degabriele, Pooya Farshim, Bertram Poettering:
A More Cautious Approach to Security Against Mass Surveillance. FSE 2015: 579-598 - [i15]Bertram Poettering, Dale L. Sibborn:
Cold Boot Attacks in the Discrete Logarithm Setting. IACR Cryptology ePrint Archive 2015: 57 (2015) - [i14]Jean Paul Degabriele, Pooya Farshim, Bertram Poettering:
A More Cautious Approach to Security Against Mass Surveillance. IACR Cryptology ePrint Archive 2015: 748 (2015) - 2014
- [j3]Mark Manulis
, Bertram Poettering, Douglas Stebila:
Plaintext awareness in identity-based key encapsulation. Int. J. Inf. Sec. 13(1): 25-49 (2014) - [c18]Kenneth G. Paterson, Bertram Poettering, Jacob C. N. Schuldt:
Big Bias Hunting in Amazonia: Large-Scale Computation and Exploitation of RC4 Biases (Invited Paper). ASIACRYPT (1) 2014: 398-419 - [c17]Alexandre Pinto, Bertram Poettering, Jacob C. N. Schuldt:
Multi-recipient encryption, revisited. AsiaCCS 2014: 229-238 - [c16]Giorgia Azzurra Marson, Bertram Poettering:
Even More Practical Secure Logging: Tree-Based Seekable Sequential Key Generators. ESORICS (2) 2014: 37-54 - [c15]Bertram Poettering, Douglas Stebila:
Double-Authentication-Preventing Signatures. ESORICS (1) 2014: 436-453 - [c14]Kenneth G. Paterson, Bertram Poettering, Jacob C. N. Schuldt:
Plaintext Recovery Attacks Against WPA/TKIP. FSE 2014: 325-349 - [i13]Jason Crampton, Naomi Farley, Gregory Z. Gutin, Mark Jones, Bertram Poettering:
Cryptographic Enforcement of Information Flow Policies without Public Information. CoRR abs/1410.5567 (2014) - [i12]Felix Günther, Bertram Poettering:
Linkable Message Tagging: Solving the key distribution problem of signature schemes. IACR Cryptology ePrint Archive 2014: 14 (2014) - [i11]Giorgia Azzurra Marson, Bertram Poettering:
Even more practical secure logging: Tree-based Seekable Sequential Key Generators. IACR Cryptology ePrint Archive 2014: 479 (2014) - 2013
- [j2]Emiliano De Cristofaro, Mark Manulis
, Bertram Poettering:
Private discovery of common social contacts. Int. J. Inf. Sec. 12(1): 49-65 (2013) - [j1]Juan Manuel González Nieto, Mark Manulis
, Bertram Poettering, Jothi Rangasamy
, Douglas Stebila:
Publicly verifiable ciphertexts. Journal of Computer Security 21(5): 749-778 (2013) - [c13]Nils Fleischhacker
, Felix Günther, Franziskus Kiefer, Mark Manulis
, Bertram Poettering:
Pseudorandom signatures. AsiaCCS 2013: 107-118 - [c12]Eduarda S. V. Freire, Kenneth G. Paterson, Bertram Poettering:
Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes. CT-RSA 2013: 101-114 - [c11]Giorgia Azzurra Marson, Bertram Poettering:
Practical Secure Logging: Seekable Sequential Key Generators. ESORICS 2013: 111-128 - [c10]Colin Boyd, Cas Cremers, Michèle Feltz, Kenneth G. Paterson, Bertram Poettering, Douglas Stebila:
ASICS: Authenticated Key Exchange Security Incorporating Certification Systems. ESORICS 2013: 381-399 - [c9]Nadhem J. AlFardan, Daniel J. Bernstein, Kenneth G. Paterson, Bertram Poettering, Jacob C. N. Schuldt:
On the Security of RC4 in TLS. USENIX Security Symposium 2013: 305-320 - [i10]Bertram Poettering, Douglas Stebila:
Double-authentication-preventing signatures. IACR Cryptology ePrint Archive 2013: 333 (2013) - [i9]Giorgia Azzurra Marson, Bertram Poettering:
Practical Secure Logging: Seekable Sequential Key Generators. IACR Cryptology ePrint Archive 2013: 397 (2013) - [i8]Colin Boyd, Cas Cremers, Michèle Feltz, Kenneth G. Paterson, Bertram Poettering, Douglas Stebila:
ASICS: Authenticated Key Exchange Security Incorporating Certification Systems. IACR Cryptology ePrint Archive 2013: 398 (2013) - [i7]Kenneth G. Paterson, Bertram Poettering, Jacob C. N. Schuldt:
Plaintext Recovery Attacks Against WPA/TKIP. IACR Cryptology ePrint Archive 2013: 748 (2013) - 2012
- [b1]Bertram Poettering:
Privacy protection for authentication protocols. Darmstadt University of Technology, Germany, 2012, pp. 1-152 - [c8]Juan Manuel González Nieto, Mark Manulis
, Bertram Poettering, Jothi Rangasamy
, Douglas Stebila:
Publicly Verifiable Ciphertexts. SCN 2012: 393-410 - [i6]Juan Manuel González Nieto, Mark Manulis, Bertram Poettering, Jothi Rangasamy, Douglas Stebila:
Publicly Verifiable Ciphertexts. IACR Cryptology ePrint Archive 2012: 357 (2012) - [i5]Mark Manulis, Bertram Poettering, Douglas Stebila:
Plaintext Awareness in Identity-Based Key Encapsulation. IACR Cryptology ePrint Archive 2012: 559 (2012) - [i4]Eduarda S. V. Freire, Kenneth G. Paterson, Bertram Poettering:
Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes. IACR Cryptology ePrint Archive 2012: 645 (2012) - 2011
- [c7]Emiliano De Cristofaro, Mark Manulis
, Bertram Poettering:
Private Discovery of Common Social Contacts. ACNS 2011: 147-165 - [c6]Mark Manulis
, Bertram Poettering:
Practical affiliation-hiding authentication from improved polynomial interpolation. AsiaCCS 2011: 286-295 - [c5]Mark Manulis
, Bertram Poettering:
Affiliation-Hiding Authentication with Minimal Bandwidth Consumption. WISTP 2011: 85-99 - [i3]Emiliano De Cristofaro, Mark Manulis, Bertram Poettering:
Private Discovery of Common Social Contacts. IACR Cryptology ePrint Archive 2011: 26 (2011) - [i2]Nils Fleischhacker, Felix Günther, Franziskus Kiefer, Mark Manulis, Bertram Poettering:
Pseudorandom Signatures. IACR Cryptology ePrint Archive 2011: 673 (2011) - 2010
- [c4]Christina Brzuska, Heike Busch, Özgür Dagdelen, Marc Fischlin, Martin Franz, Stefan Katzenbeisser, Mark Manulis
, Cristina Onete, Andreas Peter, Bertram Poettering, Dominique Schröder
:
Redactable Signatures for Tree-Structured Data: Definitions and Constructions. ACNS 2010: 87-104 - [c3]Mark Manulis
, Bertram Poettering, Gene Tsudik:
Affiliation-Hiding Key Exchange with Untrusted Group Authorities. ACNS 2010: 402-419 - [c2]Mark Manulis
, Benny Pinkas, Bertram Poettering:
Privacy-Preserving Group Discovery with Linear Complexity. ACNS 2010: 420-437 - [c1]Mark Manulis
, Bertram Poettering, Gene Tsudik:
Taming Big Brother Ambitions: More Privacy for Secret Handshakes. Privacy Enhancing Technologies 2010: 149-165 - [i1]Mark Manulis, Bertram Poettering:
Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation. IACR Cryptology ePrint Archive 2010: 659 (2010)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org and opencitations.net to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy.
Citation data
Add a list of citing articles from to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter accout. At the same time, Twitter will persitently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2019-11-01 21:04 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint