default search action
Bertram Poettering
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c44]Bertram Poettering, Simon Rastikian:
Formalizing Hash-then-Sign Signatures. Public Key Cryptography (1) 2024: 289-315 - 2023
- [j15]Luca De Feo, Bertram Poettering, Alessandro Sorniotti:
On the (In)Security of ElGamal in OpenPGP. Commun. ACM 66(6): 107-115 (2023) - [j14]Tore Kasper Frederiksen, Julia Hesse, Bertram Poettering, Patrick Towa:
Attribute-based Single Sign-On: Secure, Private, and Efficient. Proc. Priv. Enhancing Technol. 2023(4): 35-65 (2023) - [c43]Bertram Poettering, Simon Rastikian:
A Study of KEM Generalizations. SSR 2023: 53-77 - [i42]Bertram Poettering, Simon Rastikian:
A study of KEM generalizations. IACR Cryptol. ePrint Arch. 2023: 272 (2023) - [i41]Tore Kasper Frederiksen, Julia Hesse, Bertram Poettering, Patrick Towa:
Attribute-based Single Sign-On: Secure, Private, and Efficient. IACR Cryptol. ePrint Arch. 2023: 915 (2023) - 2022
- [j13]Marcel Armour, Bertram Poettering:
Algorithm substitution attacks against receivers. Int. J. Inf. Sec. 21(5): 1027-1050 (2022) - [c42]Jeroen Pijnenburg, Bertram Poettering:
On Secure Ratcheting with Immediate Decryption. ASIACRYPT (3) 2022: 89-118 - [c41]Bertram Poettering, Simon Rastikian:
Sequential Digital Signatures for Cryptographic Software-Update Authentication. ESORICS (2) 2022: 255-274 - [i40]Marcel Armour, Bertram Poettering:
Algorithm Substitution Attacks against Receivers. IACR Cryptol. ePrint Arch. 2022: 604 (2022) - [i39]Bertram Poettering, Simon Rastikian:
Sequential Digital Signatures for Cryptographic Software-Update Authentication. IACR Cryptol. ePrint Arch. 2022: 995 (2022) - 2021
- [c40]Luca De Feo, Bertram Poettering, Alessandro Sorniotti:
On the (In)Security of ElGamal in OpenPGP. CCS 2021: 2066-2080 - [c39]Bertram Poettering, Paul Rösler, Jörg Schwenk, Douglas Stebila:
SoK: Game-Based Security Models for Group Key Exchange. CT-RSA 2021: 148-176 - [i38]André Noll Barreto, Stefan Köpsell, Arsenia Chorti, Bertram Poettering, Jens Jelitto, Julia Hesse, Jonathan Boole, Konrad Rieck, Marios Kountouris, Dave Singelée, Kumar Ashwinee:
Towards Intelligent Context-Aware 6G Security. CoRR abs/2112.09411 (2021) - [i37]Bertram Poettering, Paul Rösler, Jörg Schwenk, Douglas Stebila:
SoK: Game-based Security Models for Group Key Exchange. IACR Cryptol. ePrint Arch. 2021: 305 (2021) - [i36]Luca De Feo, Bertram Poettering, Alessandro Sorniotti:
On the (in)security of ElGamal in OpenPGP. IACR Cryptol. ePrint Arch. 2021: 923 (2021) - 2020
- [j12]Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu, Bertram Poettering:
Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality. J. Cryptol. 33(4): 1871-1913 (2020) - [j11]Bertram Poettering, Paul Rösler:
Combiners for AEAD. IACR Trans. Symmetric Cryptol. 2020(1): 121-143 (2020) - [j10]Jeroen Pijnenburg, Bertram Poettering:
Key Assignment Schemes with Authenticated Encryption, revisited. IACR Trans. Symmetric Cryptol. 2020(2): 40-67 (2020) - [c38]Jeroen Pijnenburg, Bertram Poettering:
Efficiency Improvements for Encrypt-to-Self. CYSARM@CCS 2020: 13-23 - [c37]Jeroen Pijnenburg, Bertram Poettering:
Encrypt-to-Self: Securely Outsourcing Storage. ESORICS (1) 2020: 635-654 - [i35]Jeroen Pijnenburg, Bertram Poettering:
Efficiency Improvements for Encrypt-to-Self. CoRR abs/2009.02667 (2020) - [i34]Bertram Poettering, Paul Rösler:
Combiners for AEAD. IACR Cryptol. ePrint Arch. 2020: 232 (2020) - [i33]Jeroen Pijnenburg, Bertram Poettering:
Key Assignment Schemes with Authenticated Encryption, revisited. IACR Cryptol. ePrint Arch. 2020: 612 (2020) - [i32]Jeroen Pijnenburg, Bertram Poettering:
Encrypt-to-self: Securely Outsourcing Storage. IACR Cryptol. ePrint Arch. 2020: 847 (2020)
2010 – 2019
- 2019
- [j9]Marcel Armour, Bertram Poettering:
Substitution Attacks against Message Authentication. IACR Trans. Symmetric Cryptol. 2019(3): 152-168 (2019) - [c36]Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu, Bertram Poettering:
Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality. CRYPTO (1) 2019: 3-31 - [c35]Benedikt Auerbach, Eike Kiltz, Bertram Poettering, Stefan Schoenen:
Lossy Trapdoor Permutations with Improved Lossiness. CT-RSA 2019: 230-250 - [c34]Marcel Armour, Bertram Poettering:
Subverting Decryption in AEAD. IMACC 2019: 22-41 - [i31]Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu, Bertram Poettering:
Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality. IACR Cryptol. ePrint Arch. 2019: 311 (2019) - [i30]Marcel Armour, Bertram Poettering:
Subverting Decryption in AEAD. IACR Cryptol. ePrint Arch. 2019: 987 (2019) - [i29]Marcel Armour, Bertram Poettering:
Substitution Attacks against Message Authentication. IACR Cryptol. ePrint Arch. 2019: 989 (2019) - 2018
- [c33]Bertram Poettering:
Shorter Double-Authentication Preventing Signatures for Small Address Spaces. AFRICACRYPT 2018: 344-361 - [c32]Bertram Poettering, Paul Rösler:
Towards Bidirectional Ratcheted Key Exchange. CRYPTO (1) 2018: 3-32 - [c31]Patrick Eugster, Giorgia Azzurra Marson, Bertram Poettering:
A Cryptographic Look at Multi-party Channels. CSF 2018: 31-45 - [c30]Federico Giacon, Eike Kiltz, Bertram Poettering:
Hybrid Encryption in a Multi-user Setting, Revisited. Public Key Cryptography (1) 2018: 159-189 - [c29]Federico Giacon, Felix Heuer, Bertram Poettering:
KEM Combiners. Public Key Cryptography (1) 2018: 190-218 - [c28]Benedikt Auerbach, Bertram Poettering:
Hashing Solutions Instead of Generating Problems: On the Interactive Certification of RSA Moduli. Public Key Cryptography (2) 2018: 403-430 - [i28]Benedikt Auerbach, Bertram Poettering:
Hashing solutions instead of generating problems: On the interactive certification of RSA moduli. IACR Cryptol. ePrint Arch. 2018: 13 (2018) - [i27]Federico Giacon, Felix Heuer, Bertram Poettering:
KEM Combiners. IACR Cryptol. ePrint Arch. 2018: 24 (2018) - [i26]Bertram Poettering:
Shorter double-authentication preventing signatures for small address spaces. IACR Cryptol. ePrint Arch. 2018: 223 (2018) - [i25]Bertram Poettering, Paul Rösler:
Ratcheted key exchange, revisited. IACR Cryptol. ePrint Arch. 2018: 296 (2018) - [i24]Bertram Poettering:
Breaking the confidentiality of OCB2. IACR Cryptol. ePrint Arch. 2018: 1087 (2018) - [i23]Benedikt Auerbach, Eike Kiltz, Bertram Poettering, Stefan Schoenen:
Lossy Trapdoor Permutations with Improved Lossiness. IACR Cryptol. ePrint Arch. 2018: 1183 (2018) - 2017
- [j8]Bertram Poettering, Douglas Stebila:
Double-authentication-preventing signatures. Int. J. Inf. Sec. 16(1): 1-22 (2017) - [j7]Colin Boyd, Cas Cremers, Michèle Feltz, Kenneth G. Paterson, Bertram Poettering, Douglas Stebila:
ASICS: authenticated key exchange security incorporating certification systems. Int. J. Inf. Sec. 16(2): 151-171 (2017) - [j6]Felix Günther, Bertram Poettering:
Linkable message tagging: solving the key distribution problem of signature schemes. Int. J. Inf. Sec. 16(3): 281-297 (2017) - [j5]Jason Crampton, Naomi Farley, Gregory Z. Gutin, Mark Jones, Bertram Poettering:
Cryptographic enforcement of information flow policies without public information via tree partitions. J. Comput. Secur. 25(6): 511-535 (2017) - [j4]Giorgia Azzurra Marson, Bertram Poettering:
Security Notions for Bidirectional Channels. IACR Trans. Symmetric Cryptol. 2017(1): 405-426 (2017) - [c27]Mihir Bellare, Bertram Poettering, Douglas Stebila:
Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures. Public Key Cryptography (2) 2017: 121-151 - [c26]Manuel Fersch, Eike Kiltz, Bertram Poettering:
On the One-Per-Message Unforgeability of (EC)DSA and Its Variants. TCC (2) 2017: 519-534 - [i22]Giorgia Azzurra Marson, Bertram Poettering:
Security Notions for Bidirectional Channels. IACR Cryptol. ePrint Arch. 2017: 161 (2017) - [i21]Giorgia Azzurra Marson, Bertram Poettering:
With one it is easy, with many it gets complicated: Understanding Channel Security for Groups. IACR Cryptol. ePrint Arch. 2017: 786 (2017) - [i20]Federico Giacon, Eike Kiltz, Bertram Poettering:
Hybrid Encryption in a Multi-User Setting, Revisited. IACR Cryptol. ePrint Arch. 2017: 843 (2017) - [i19]Manuel Fersch, Eike Kiltz, Bertram Poettering:
On the One-Per-Message Unforgeability of (EC)DSA and its Variants. IACR Cryptol. ePrint Arch. 2017: 890 (2017) - 2016
- [c25]Felix Heuer, Bertram Poettering:
Selective Opening Security from Simulatable Data Encapsulation. ASIACRYPT (2) 2016: 248-277 - [c24]Mihir Bellare, Bertram Poettering, Douglas Stebila:
From Identification to Signatures, Tightly: A Framework and Generic Transforms. ASIACRYPT (2) 2016: 435-464 - [c23]Manuel Fersch, Eike Kiltz, Bertram Poettering:
On the Provable Security of (EC)DSA Signatures. CCS 2016: 1651-1662 - [i18]Jason Crampton, Naomi Farley, Gregory Z. Gutin, Mark Jones, Bertram Poettering:
Cryptographic Enforcement of Information Flow Policies without Public Information via Tree Partitions. CoRR abs/1608.08386 (2016) - [i17]Felix Heuer, Bertram Poettering:
Selective Opening Security from Simulatable Data Encapsulation. IACR Cryptol. ePrint Arch. 2016: 845 (2016) - [i16]Mihir Bellare, Bertram Poettering, Douglas Stebila:
Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures. IACR Cryptol. ePrint Arch. 2016: 1016 (2016) - 2015
- [c22]Felix Günther, Bertram Poettering:
Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes. ACISP 2015: 195-212 - [c21]Jason Crampton, Naomi Farley, Gregory Z. Gutin, Mark Jones, Bertram Poettering:
Cryptographic Enforcement of Information Flow Policies Without Public Information. ACNS 2015: 389-408 - [c20]Bertram Poettering, Dale L. Sibborn:
Cold Boot Attacks in the Discrete Logarithm Setting. CT-RSA 2015: 449-465 - [c19]Jean Paul Degabriele, Pooya Farshim, Bertram Poettering:
A More Cautious Approach to Security Against Mass Surveillance. FSE 2015: 579-598 - [i15]Bertram Poettering, Dale L. Sibborn:
Cold Boot Attacks in the Discrete Logarithm Setting. IACR Cryptol. ePrint Arch. 2015: 57 (2015) - [i14]Jean Paul Degabriele, Pooya Farshim, Bertram Poettering:
A More Cautious Approach to Security Against Mass Surveillance. IACR Cryptol. ePrint Arch. 2015: 748 (2015) - 2014
- [j3]Mark Manulis, Bertram Poettering, Douglas Stebila:
Plaintext awareness in identity-based key encapsulation. Int. J. Inf. Sec. 13(1): 25-49 (2014) - [c18]Kenneth G. Paterson, Bertram Poettering, Jacob C. N. Schuldt:
Big Bias Hunting in Amazonia: Large-Scale Computation and Exploitation of RC4 Biases (Invited Paper). ASIACRYPT (1) 2014: 398-419 - [c17]Alexandre Pinto, Bertram Poettering, Jacob C. N. Schuldt:
Multi-recipient encryption, revisited. AsiaCCS 2014: 229-238 - [c16]Giorgia Azzurra Marson, Bertram Poettering:
Even More Practical Secure Logging: Tree-Based Seekable Sequential Key Generators. ESORICS (2) 2014: 37-54 - [c15]Bertram Poettering, Douglas Stebila:
Double-Authentication-Preventing Signatures. ESORICS (1) 2014: 436-453 - [c14]Kenneth G. Paterson, Bertram Poettering, Jacob C. N. Schuldt:
Plaintext Recovery Attacks Against WPA/TKIP. FSE 2014: 325-349 - [i13]Jason Crampton, Naomi Farley, Gregory Z. Gutin, Mark Jones, Bertram Poettering:
Cryptographic Enforcement of Information Flow Policies without Public Information. CoRR abs/1410.5567 (2014) - [i12]Felix Günther, Bertram Poettering:
Linkable Message Tagging: Solving the key distribution problem of signature schemes. IACR Cryptol. ePrint Arch. 2014: 14 (2014) - [i11]Giorgia Azzurra Marson, Bertram Poettering:
Even more practical secure logging: Tree-based Seekable Sequential Key Generators. IACR Cryptol. ePrint Arch. 2014: 479 (2014) - 2013
- [j2]Emiliano De Cristofaro, Mark Manulis, Bertram Poettering:
Private discovery of common social contacts. Int. J. Inf. Sec. 12(1): 49-65 (2013) - [j1]Juan Manuel González Nieto, Mark Manulis, Bertram Poettering, Jothi Rangasamy, Douglas Stebila:
Publicly verifiable ciphertexts. J. Comput. Secur. 21(5): 749-778 (2013) - [c13]Nils Fleischhacker, Felix Günther, Franziskus Kiefer, Mark Manulis, Bertram Poettering:
Pseudorandom signatures. AsiaCCS 2013: 107-118 - [c12]Eduarda S. V. Freire, Kenneth G. Paterson, Bertram Poettering:
Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes. CT-RSA 2013: 101-114 - [c11]Giorgia Azzurra Marson, Bertram Poettering:
Practical Secure Logging: Seekable Sequential Key Generators. ESORICS 2013: 111-128 - [c10]Colin Boyd, Cas Cremers, Michèle Feltz, Kenneth G. Paterson, Bertram Poettering, Douglas Stebila:
ASICS: Authenticated Key Exchange Security Incorporating Certification Systems. ESORICS 2013: 381-399 - [c9]Nadhem J. AlFardan, Daniel J. Bernstein, Kenneth G. Paterson, Bertram Poettering, Jacob C. N. Schuldt:
On the Security of RC4 in TLS. USENIX Security Symposium 2013: 305-320 - [i10]Bertram Poettering, Douglas Stebila:
Double-authentication-preventing signatures. IACR Cryptol. ePrint Arch. 2013: 333 (2013) - [i9]Giorgia Azzurra Marson, Bertram Poettering:
Practical Secure Logging: Seekable Sequential Key Generators. IACR Cryptol. ePrint Arch. 2013: 397 (2013) - [i8]Colin Boyd, Cas Cremers, Michèle Feltz, Kenneth G. Paterson, Bertram Poettering, Douglas Stebila:
ASICS: Authenticated Key Exchange Security Incorporating Certification Systems. IACR Cryptol. ePrint Arch. 2013: 398 (2013) - [i7]Kenneth G. Paterson, Bertram Poettering, Jacob C. N. Schuldt:
Plaintext Recovery Attacks Against WPA/TKIP. IACR Cryptol. ePrint Arch. 2013: 748 (2013) - 2012
- [b1]Bertram Poettering:
Privacy protection for authentication protocols. Darmstadt University of Technology, Germany, 2012, pp. 1-152 - [c8]Juan Manuel González Nieto, Mark Manulis, Bertram Poettering, Jothi Rangasamy, Douglas Stebila:
Publicly Verifiable Ciphertexts. SCN 2012: 393-410 - [i6]Juan Manuel González Nieto, Mark Manulis, Bertram Poettering, Jothi Rangasamy, Douglas Stebila:
Publicly Verifiable Ciphertexts. IACR Cryptol. ePrint Arch. 2012: 357 (2012) - [i5]Mark Manulis, Bertram Poettering, Douglas Stebila:
Plaintext Awareness in Identity-Based Key Encapsulation. IACR Cryptol. ePrint Arch. 2012: 559 (2012) - [i4]Eduarda S. V. Freire, Kenneth G. Paterson, Bertram Poettering:
Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes. IACR Cryptol. ePrint Arch. 2012: 645 (2012) - 2011
- [c7]Emiliano De Cristofaro, Mark Manulis, Bertram Poettering:
Private Discovery of Common Social Contacts. ACNS 2011: 147-165 - [c6]Mark Manulis, Bertram Poettering:
Practical affiliation-hiding authentication from improved polynomial interpolation. AsiaCCS 2011: 286-295 - [c5]Mark Manulis, Bertram Poettering:
Affiliation-Hiding Authentication with Minimal Bandwidth Consumption. WISTP 2011: 85-99 - [i3]Emiliano De Cristofaro, Mark Manulis, Bertram Poettering:
Private Discovery of Common Social Contacts. IACR Cryptol. ePrint Arch. 2011: 26 (2011) - [i2]Nils Fleischhacker, Felix Günther, Franziskus Kiefer, Mark Manulis, Bertram Poettering:
Pseudorandom Signatures. IACR Cryptol. ePrint Arch. 2011: 673 (2011) - 2010
- [c4]Christina Brzuska, Heike Busch, Özgür Dagdelen, Marc Fischlin, Martin Franz, Stefan Katzenbeisser, Mark Manulis, Cristina Onete, Andreas Peter, Bertram Poettering, Dominique Schröder:
Redactable Signatures for Tree-Structured Data: Definitions and Constructions. ACNS 2010: 87-104 - [c3]Mark Manulis, Bertram Poettering, Gene Tsudik:
Affiliation-Hiding Key Exchange with Untrusted Group Authorities. ACNS 2010: 402-419 - [c2]Mark Manulis, Benny Pinkas, Bertram Poettering:
Privacy-Preserving Group Discovery with Linear Complexity. ACNS 2010: 420-437 - [c1]Mark Manulis, Bertram Poettering, Gene Tsudik:
Taming Big Brother Ambitions: More Privacy for Secret Handshakes. Privacy Enhancing Technologies 2010: 149-165 - [i1]Mark Manulis, Bertram Poettering:
Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation. IACR Cryptol. ePrint Arch. 2010: 659 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 20:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint