Pijnenburg, Jeroen; Poettering, Bertram On secure ratcheting with immediate decryption. (English) Zbl 1519.94182 Agrawal, Shweta (ed.) et al., Advances in cryptology – ASIACRYPT 2022. 28th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, December 5–9, 2022. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 13793, 89-118 (2023). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Pijnenburg} and \textit{B. Poettering}, Lect. Notes Comput. Sci. 13793, 89--118 (2023; Zbl 1519.94182) Full Text: DOI
Poettering, Bertram; Rastikian, Simon Sequential digital signatures for cryptographic software-update authentication. (English) Zbl 1524.68045 Atluri, Vijayalakshmi (ed.) et al., Computer security – ESORICS 2022. 27th European symposium on research in computer security, Copenhagen, Denmark, September 26–30, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13555, 255-274 (2022). MSC: 68M25 94A60 94A62 PDFBibTeX XMLCite \textit{B. Poettering} and \textit{S. Rastikian}, Lect. Notes Comput. Sci. 13555, 255--274 (2022; Zbl 1524.68045) Full Text: DOI
Pijnenburg, Jeroen; Poettering, Bertram Encrypt-to-self: securely outsourcing storage. (English) Zbl 1511.68047 Chen, Liqun (ed.) et al., Computer security – ESORICS 2020. 25th European symposium on research in computer security, ESORICS 2020, Guildford, UK, September 14–18, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12308, 635-654 (2020). MSC: 68M25 68P20 68P25 94A60 PDFBibTeX XMLCite \textit{J. Pijnenburg} and \textit{B. Poettering}, Lect. Notes Comput. Sci. 12308, 635--654 (2020; Zbl 1511.68047) Full Text: DOI
Inoue, Akiko; Iwata, Tetsu; Minematsu, Kazuhiko; Poettering, Bertram Cryptanalysis of OCB2: attacks on authenticity and confidentiality. (English) Zbl 1453.94089 J. Cryptology 33, No. 4, 1871-1913 (2020). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{A. Inoue} et al., J. Cryptology 33, No. 4, 1871--1913 (2020; Zbl 1453.94089) Full Text: DOI
Inoue, Akiko; Iwata, Tetsu; Minematsu, Kazuhiko; Poettering, Bertram Cryptanalysis of OCB2: attacks on authenticity and confidentiality. (English) Zbl 1456.94089 Boldyreva, Alexandra (ed.) et al., Advances in cryptology – CRYPTO 2019. 39th annual international cryptology conference, Santa Barbara, CA, USA, August 18–22, 2019. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11692, 3-31 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Inoue} et al., Lect. Notes Comput. Sci. 11692, 3--31 (2019; Zbl 1456.94089) Full Text: DOI
Armour, Marcel; Poettering, Bertram Subverting decryption in AEAD. (English) Zbl 1454.94043 Albrecht, Martin (ed.), Cryptography and coding. 17th IMA international conference, IMACC 2019, Oxford, UK, December 16–18, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11929, 22-41 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Armour} and \textit{B. Poettering}, Lect. Notes Comput. Sci. 11929, 22--41 (2019; Zbl 1454.94043) Full Text: DOI Link
Auerbach, Benedikt; Kiltz, Eike; Poettering, Bertram; Schoenen, Stefan Lossy trapdoor permutations with improved lossiness. (English) Zbl 1509.94060 Matsui, Mitsuru (ed.), Topics in cryptology – CT-RSA 2019. The cryptographers’ track at the RSA conference 2019, San Francisco, CA, USA, March 4–8, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11405, 230-250 (2019). MSC: 94A60 05A05 PDFBibTeX XMLCite \textit{B. Auerbach} et al., Lect. Notes Comput. Sci. 11405, 230--250 (2019; Zbl 1509.94060) Full Text: DOI
Poettering, Bertram; Rösler, Paul Towards bidirectional ratcheted key exchange. (English) Zbl 1420.94090 Shacham, Hovav (ed.) et al., Advances in cryptology – CRYPTO 2018. 38th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10991, 3-32 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{B. Poettering} and \textit{P. Rösler}, Lect. Notes Comput. Sci. 10991, 3--32 (2018; Zbl 1420.94090) Full Text: DOI
Poettering, Bertram Shorter double-authentication preventing signatures for small address spaces. (English) Zbl 1423.94132 Joux, Antoine (ed.) et al., Progress in cryptology – AFRICACRYPT 2018. 10th international conference on cryptology in Africa, Marrakesh, Morocco, May 7–9, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10831, 344-361 (2018). MSC: 94A62 PDFBibTeX XMLCite \textit{B. Poettering}, Lect. Notes Comput. Sci. 10831, 344--361 (2018; Zbl 1423.94132) Full Text: DOI
Auerbach, Benedikt; Poettering, Bertram Hashing solutions instead of generating problems: on the interactive certification of RSA moduli. (English) Zbl 1420.94035 Abdalla, Michel (ed.) et al., Public-key cryptography – PKC 2018. 21st IACR international conference on practice and theory of public-key cryptography, Rio de Janeiro, Brazil, March 25–29, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10770, 403-430 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{B. Auerbach} and \textit{B. Poettering}, Lect. Notes Comput. Sci. 10770, 403--430 (2018; Zbl 1420.94035) Full Text: DOI
Giacon, Federico; Heuer, Felix; Poettering, Bertram KEM combiners. (English) Zbl 1385.94037 Abdalla, Michel (ed.) et al., Public-key cryptography – PKC 2018. 21st IACR international conference on practice and theory of public-key cryptography, Rio de Janeiro, Brazil, March 25–29, 2018. Proceedings. Part I. Cham: Springer (ISBN 978-3-319-76577-8/pbk; 978-3-319-76578-5/ebook). Lecture Notes in Computer Science 10769, 190-218 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{F. Giacon} et al., Lect. Notes Comput. Sci. 10769, 190--218 (2018; Zbl 1385.94037) Full Text: DOI
Giacon, Federico; Kiltz, Eike; Poettering, Bertram Hybrid encryption in a multi-user setting, revisited. (English) Zbl 1385.94038 Abdalla, Michel (ed.) et al., Public-key cryptography – PKC 2018. 21st IACR international conference on practice and theory of public-key cryptography, Rio de Janeiro, Brazil, March 25–29, 2018. Proceedings. Part I. Cham: Springer (ISBN 978-3-319-76577-8/pbk; 978-3-319-76578-5/ebook). Lecture Notes in Computer Science 10769, 159-189 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{F. Giacon} et al., Lect. Notes Comput. Sci. 10769, 159--189 (2018; Zbl 1385.94038) Full Text: DOI
Fersch, Manuel; Kiltz, Eike; Poettering, Bertram On the one-per-message unforgeability of (EC)DSA and its variants. (English) Zbl 1406.94052 Kalai, Yael (ed.) et al., Theory of cryptography. 15th international conference, TCC 2017, Baltimore, MD, USA, November 12–15, 2017. Proceedings. Part II. Cham: Springer (ISBN 978-3-319-70502-6/pbk; 978-3-319-70503-3/ebook). Lecture Notes in Computer Science 10678, 519-534 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Fersch} et al., Lect. Notes Comput. Sci. 10678, 519--534 (2017; Zbl 1406.94052) Full Text: DOI
Bellare, Mihir; Poettering, Bertram; Stebila, Douglas Deterring certificate subversion: efficient double-authentication-preventing signatures. (English) Zbl 1400.94117 Fehr, Serge (ed.), Public-key cryptography – PKC 2017. 20th IACR international conference on practice and theory in public-key cryptography, Amsterdam, The Netherlands, March 28–31, 2017. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-54387-0/pbk; 978-3-662-54388-7/ebook). Lecture Notes in Computer Science 10175, 121-151 (2017). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{M. Bellare} et al., Lect. Notes Comput. Sci. 10175, 121--151 (2017; Zbl 1400.94117) Full Text: DOI
Bellare, Mihir; Poettering, Bertram; Stebila, Douglas From identification to signatures, tightly: a framework and generic transforms. (English) Zbl 1407.94083 Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4-8, 2016. Proceedings. Part II. Berlin: Springer. Lect. Notes Comput. Sci. 10032, 435-464 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Bellare} et al., Lect. Notes Comput. Sci. 10032, 435--464 (2016; Zbl 1407.94083) Full Text: DOI
Heuer, Felix; Poettering, Bertram Selective opening security from simulatable data encapsulation. (English) Zbl 1407.94119 Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4-8, 2016. Proceedings. Part II. Berlin: Springer. Lect. Notes Comput. Sci. 10032, 248-277 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{F. Heuer} and \textit{B. Poettering}, Lect. Notes Comput. Sci. 10032, 248--277 (2016; Zbl 1407.94119) Full Text: DOI
Crampton, Jason; Farley, Naomi; Gutin, Gregory; Jones, Mark; Poettering, Bertram Cryptographic enforcement of information flow policies without public information. (English) Zbl 1443.94053 Malkin, Tal (ed.) et al., Applied cryptography and network security. 13th international conference, ACNS 2015, New York, NY, USA, June 2–5, 2015. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 9092, 389-408 (2015). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{J. Crampton} et al., Lect. Notes Comput. Sci. 9092, 389--408 (2015; Zbl 1443.94053) Full Text: DOI arXiv
Poettering, Bertram; Sibborn, Dale L. Cold boot attacks in the discrete logarithm setting. (English) Zbl 1382.94155 Nyberg, Kaisa (ed.), Topics in cryptology – CT-RSA 2015. The cryptographer’s track at the RSA conference 2015, San Francisco, CA, USA, April 20–24, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-16714-5/pbk; 978-3-319-16715-2/ebook). Lecture Notes in Computer Science 9048, 449-465 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{B. Poettering} and \textit{D. L. Sibborn}, Lect. Notes Comput. Sci. 9048, 449--465 (2015; Zbl 1382.94155) Full Text: DOI
Günther, Felix; Poettering, Bertram Linkable message tagging: solving the key distribution problem of signature schemes. (English) Zbl 1368.94144 Foo, Ernest (ed.) et al., Information security and privacy. 20th Australasian conference, ACISP 2015, Brisbane, QLD, Australia, June 29 – July 1, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-19961-0/pbk; 978-3-319-19962-7/ebook). Lecture Notes in Computer Science 9144, 195-212 (2015). MSC: 94A62 PDFBibTeX XMLCite \textit{F. Günther} and \textit{B. Poettering}, Lect. Notes Comput. Sci. 9144, 195--212 (2015; Zbl 1368.94144) Full Text: DOI
Degabriele, Jean Paul; Farshim, Pooya; Poettering, Bertram A more cautious approach to security against mass surveillance. (English) Zbl 1382.94087 Leander, Gregor (ed.), Fast software encryption. 22nd international workshop, FSE 2015, Istanbul, Turkey, March 8–11, 2015. Revised selected papers. Berlin: Springer (ISBN 978-3-662-48115-8/pbk; 978-3-662-48116-5/ebook). Lecture Notes in Computer Science 9054, 579-598 (2015). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{J. P. Degabriele} et al., Lect. Notes Comput. Sci. 9054, 579--598 (2015; Zbl 1382.94087) Full Text: DOI
Paterson, Kenneth; Poettering, Bertram; Schuldt, Jacob Plaintext recovery attacks against WPA/TKIP. (English) Zbl 1382.94152 Cid, Carlos (ed.) et al., Fast software encryption. 21st international workshop, FSE 2014, London, UK, March 3–5, 2014. Revised selected papers. Berlin: Springer (ISBN 978-3-662-46705-3/pbk; 978-3-662-46706-0/ebook). Lecture Notes in Computer Science 8540, 325-349 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Paterson} et al., Lect. Notes Comput. Sci. 8540, 325--349 (2015; Zbl 1382.94152) Full Text: DOI
Marson, Giorgia Azzurra; Poettering, Bertram Even more practical secure logging: tree-based seekable sequential key generators. (English) Zbl 1443.94074 Kutyłowski, Mirosław (ed.) et al., Computer security – ESORICS 2014. 19th European symposium on research in computer security, Wrocław, Poland, September 7–11, 2014. Proceedings, Part II. Berlin: Springer. Lect. Notes Comput. Sci. 8713, 37-54 (2014). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{G. A. Marson} and \textit{B. Poettering}, Lect. Notes Comput. Sci. 8713, 37--54 (2014; Zbl 1443.94074) Full Text: DOI
Poettering, Bertram; Stebila, Douglas Double-authentication-preventing signatures. (English) Zbl 1443.94100 Kutyłowski, Mirosław (ed.) et al., Computer security – ESORICS 2014. 19th European symposium on research in computer security, Wrocław, Poland, September 7–11, 2014. Proceedings, Part I. Berlin: Springer. Lect. Notes Comput. Sci. 8712, 436-453 (2014). MSC: 94A62 PDFBibTeX XMLCite \textit{B. Poettering} and \textit{D. Stebila}, Lect. Notes Comput. Sci. 8712, 436--453 (2014; Zbl 1443.94100) Full Text: DOI Link
Paterson, Kenneth G.; Poettering, Bertram; Schuldt, Jacob C. N. Big bias hunting in Amazonia: large-scale computation and exploitation of RC4 biases (invited paper). (English) Zbl 1306.94082 Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-45610-1/pbk). Lecture Notes in Computer Science 8873, 398-419 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{K. G. Paterson} et al., Lect. Notes Comput. Sci. 8873, 398--419 (2014; Zbl 1306.94082) Full Text: DOI
Boyd, Colin; Cremers, Cas; Feltz, Michèle; Paterson, Kenneth G.; Poettering, Bertram; Stebila, Douglas ASICS: Authenticated key exchange security incorporating certification systems. (English) Zbl 1443.94089 Crampton, Jason (ed.) et al., Computer security – ESORICS 2013. 18th European symposium on research in computer security, Egham, UK, September 9–13, 2013. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 8134, 381-399 (2013). MSC: 94A62 PDFBibTeX XMLCite \textit{C. Boyd} et al., Lect. Notes Comput. Sci. 8134, 381--399 (2013; Zbl 1443.94089) Full Text: DOI Link
Marson, Giorgia Azzurra; Poettering, Bertram Practical secure logging: seekable sequential key generators. (English) Zbl 1443.94073 Crampton, Jason (ed.) et al., Computer security – ESORICS 2013. 18th European symposium on research in computer security, Egham, UK, September 9–13, 2013. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 8134, 111-128 (2013). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{G. A. Marson} and \textit{B. Poettering}, Lect. Notes Comput. Sci. 8134, 111--128 (2013; Zbl 1443.94073) Full Text: DOI
Freire, Eduarda S. V.; Paterson, Kenneth G.; Poettering, Bertram Simple, efficient and strongly KI-secure hierarchical key assignment schemes. (English) Zbl 1312.94050 Dawson, Ed (ed.), Topics in cryptology – CT-RSA 2013. The cryptographers’ track at the RSA conference 2013, San Francisco, CA, USA, February 25–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36094-7/pbk). Lecture Notes in Computer Science 7779, 101-114 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{E. S. V. Freire} et al., Lect. Notes Comput. Sci. 7779, 101--114 (2013; Zbl 1312.94050) Full Text: DOI
González Nieto, Juan Manuel; Manulis, Mark; Poettering, Bertram; Rangasamy, Jothi; Stebila, Douglas Publicly verifiable ciphertexts. (English) Zbl 1344.94047 Visconti, Ivan (ed.) et al., Security and cryptography for networks. 8th international conference, SCN 2012, Amalfi, Italy, September 5–7, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32927-2/pbk). Lecture Notes in Computer Science 7485, 393-410 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{J. M. González Nieto} et al., Lect. Notes Comput. Sci. 7485, 393--410 (2012; Zbl 1344.94047) Full Text: DOI Link
Manulis, Mark; Poettering, Bertram Affiliation-hiding authentication with minimal bandwidth consumption. (English) Zbl 1443.94096 Ardagna, Claudio A. (ed.) et al., Information security theory and practice. Security and privacy of mobile devices in wireless communication. 5th IFIP WG 11.2 international workshop, WISTP 2011, Heraklion, Crete, Greece, June 1–3, 2011. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 6633, 85-99 (2011). MSC: 94A62 PDFBibTeX XML Full Text: DOI
De Cristofaro, Emiliano; Manulis, Mark; Poettering, Bertram Private discovery of common social contacts. (English) Zbl 1443.94054 Lopez, Javier (ed.) et al., Applied cryptography and network security. 9th international conference, ACNS 2011, Nerja, Spain, June 7–10, 2011. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 6715, 147-165 (2011). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{E. De Cristofaro} et al., Lect. Notes Comput. Sci. 6715, 147--165 (2011; Zbl 1443.94054) Full Text: DOI Link
Manulis, Mark; Poettering, Bertram; Tsudik, Gene Taming big brother ambitions: More privacy for secret handshakes. (English) Zbl 1443.94098 Atallah, Mikhail J. (ed.) et al., Privacy enhancing technologies. 10th international symposium, PETS 2010, Berlin, Germany, July 21–23, 2010. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 6205, 149-165 (2010). MSC: 94A62 68P25 PDFBibTeX XML Full Text: DOI
Manulis, Mark; Pinkas, Benny; Poettering, Bertram Privacy-preserving group discovery with linear complexity. (English) Zbl 1443.94095 Zhou, Jianying (ed.) et al., Applied cryptography and network security. 8th international conference, ACNS 2010, Beijing, China, June 22–25, 2010. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 6123, 420-437 (2010). MSC: 94A62 68P25 PDFBibTeX XMLCite \textit{M. Manulis} et al., Lect. Notes Comput. Sci. 6123, 420--437 (2010; Zbl 1443.94095) Full Text: DOI
Manulis, Mark; Poettering, Bertram; Tsudik, Gene Affiliation-hiding key exchange with untrusted group authorities. (English) Zbl 1443.94097 Zhou, Jianying (ed.) et al., Applied cryptography and network security. 8th international conference, ACNS 2010, Beijing, China, June 22–25, 2010. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 6123, 402-419 (2010). MSC: 94A62 68P25 PDFBibTeX XMLCite \textit{M. Manulis} et al., Lect. Notes Comput. Sci. 6123, 402--419 (2010; Zbl 1443.94097) Full Text: DOI
Brzuska, Christina; Busch, Heike; Dagdelen, Oezguer; Fischlin, Marc; Franz, Martin; Katzenbeisser, Stefan; Manulis, Mark; Onete, Cristina; Peter, Andreas; Poettering, Bertram; Schröder, Dominique Redactable signatures for tree-structured data: definitions and constructions. (English) Zbl 1315.94112 Zhou, Jianying (ed.) et al., Applied cryptography and network security. 8th international conference, ACNS 2010, Beijing, China, June 22–25, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13707-5/pbk). Lecture Notes in Computer Science 6123, 87-104 (2010). MSC: 94A62 PDFBibTeX XMLCite \textit{C. Brzuska} et al., Lect. Notes Comput. Sci. 6123, 87--104 (2010; Zbl 1315.94112) Full Text: DOI