Veröffentlichungen
On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption
2015 - Tibor Jager, Jörg Schwenk, Juraj Somorovsky
ACM CCS 2015 [pdf]Practical Invalid Curve Attacks on TLS-ECDH
2015 - Tibor Jager, Jörg Schwenk, Juraj Somorovsky
ESORICS 2015 [pdf]Not so Smart: On Smart TV Apps
2015 - Marcus Niemietz, Juraj Somorovsky, Christian Mainka, Jörg Schwenk
International Workshop on Secure Internet of Things (SIoT 2015, Vienna, Austria) [pdf]Waiting for CSP — Securing Legacy Web Applications with JSAgents
2015 - Mario Heiderich, Marcus Niemietz, Jörg Schwenk
Waiting for CSP — Securing Legacy Web Applications with JSAgents, ESORICS 2015, 20th European Symposium on Research in Computer Security [ESORICS 2015] [PDF file]How to Break XML Encryption - Automatically
2015 - Dennis Kupser, Christian Mainka, Jörg Schwenk, Juraj Somorovsky
In Proceedings of the 9th USENIX Workshop on Offensive Technologies (WOOT), 2015 [pdf]Semi-Automated Fuzzy MCDM and Lattice Solutions for WS-Policy Intersection
2015 - Jörg Schwenk
IEEE 5th International Workshop on Security and Privacy Engineering SPE2015, within IEEE SERVICES 2015 June 27 and July 2, 2015, New York, NY, USAOwning Your Home Network: Router Security Revisited
2015 - Marcus Niemietz, Jörg Schwenk
W2SP 2015: Web 2.0 Security & Privacy 2015 (San Jose, California) [Workshop] [PDF]Tightly Secure Authenticated Key Exchange
2015 - Christoph Bader, Dennis Hofheinz, Tibor Jager, Eike Kiltz, Yong Li
TCC 2015 [paper]On the Selective Opening Security of Practical Public-Key Encryption Schemes
2015 - Felix Heuer, Tibor Jager, Eike Kiltz, Sven Schäge
PKC 2015One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model
2015 - Florian Bergsma, Tibor Jager, Jörg Schwenk
PKC 2015 [link]