Veröffentlichungen
Randomly Failed! The State of Randomness in Current Java Implementations
2013 - Kai Michaelis, Christopher Meyer, Jörg Schwenk
Cryptography track at RSA Conference 2013 (CT-RSA 2013) [Paper] [Slides]A new approach for WS-Policy Intersection using Partial Ordered Sets
2013 - Christian Mainka, Jörg Schwenk
5th Central European Workshop on Services and their Composition, ZEUS 2013 February 21-22, 2013, Rostock, Germany [PDF]On the analysis of cryptographic assumptions in the generic ring model
2013 - Tibor Jager, Jörg Schwenk
Journal of Cryptology [IACR ePrint archive]Tightly secure signatures and public-key encryption
2012 - Dennis Hofheinz, Tibor Jager
CRYPTO 2012 [Full Version]Waters signatures with optimal security reduction
2012 - Dennis Hofheinz, Tibor Jager, Edward Knapp
PKC 2012 [Full Version]Down to the Bare Metal: Using Processor Features for Binary Analysis
2012 - Carsten Willems, Ralf Hund, Amit Vasudevan, Andreas Fobian, Dennis Felsch, Thorsten Holz
Annual Computer Security Applications Conference (ACSAC), Orlando, FL, December 2012 [pdf]UI Redressing Attacks on Android Devices
2012 - Marcus Niemietz, Jörg Schwenk
Black Hat Abu Dhabi 2012Sometimes it's better to be STUCK! - SAML Transportation Unit for Cryptographic Keys
2012 - Christopher Meyer, Florian Feldmann, Jörg Schwenk
15th Annual International Conference on Information Security and Cryptology, ICISC 2012 [Slides] [Paper]SS-FP: Browser Fingerprinting using HTML Parser Quirks
2012 - Erwan Abgrall, Yves Le Traon, Martin Monperrus, Sylvain Gombault, Mario Heiderich, Alain Ribault
[Cornell University]Scriptless Attacks – Stealing the Pie Without Touching the Sill
2012 - Mario Heiderich, Marcus Niemietz, Felix Schuster, Thorsten Holz, Jörg Schwenk
19th ACM Conference on Computer and Communications Security (CCS), Raleigh, NC, October 2012 [PDF]