Ver­öf­fent­li­chun­gen

Prime and Pre­ju­di­ce: Pri­ma­li­ty Tes­ting Under Ad­ver­sa­ri­al Con­di­ti­ons

2018 - Mar­tin R. Al­brecht, Jake Mas­si­mo, Ken­neth G. Pa­ter­son, Juraj So­mo­rovs­ky

ACM CCS 2018 [eprint]

In Se­arch of Cur­veSwap: Me­a­su­ring El­lip­tic Curve Im­ple­men­ta­ti­ons in the Wild

2018 - Luke Va­len­ta, Nick Sul­liv­an, An­to­nio Sanso

In IEEE Eu­ropean Sym­po­si­um on Se­cu­ri­ty and Pri­va­cy (EuroS&P), 2018 [IEEE Web­site]

Towards Bi­di­rec­tio­nal Rat­che­ted Key Ex­chan­ge

2018 - Ber­tram Poet­te­ring, Paul Rös­ler

In Ad­van­ces in Cryp­to­lo­gy, IACR CRYP­TO 2018 [ex­ten­ded ver­si­on]

Efail: Brea­king S/MIME and Open­PGP Email En­cryp­ti­on using Ex­fil­tra­ti­on Chan­nels

2018 - Da­mi­an Pod­debni­ak, Chris­ti­an Dre­sen, Jens Mül­ler, Fa­bi­an Ising, Se­bas­ti­an Schin­zel, Simon Fried­ber­ger, Juraj So­mo­rovs­ky, Jörg Schwenk

27th USE­NIX Se­cu­ri­ty Sym­po­si­um (USE­NIX Se­cu­ri­ty 18) [full ver­si­on]

The Dan­gers of Key Reuse: Prac­tical At­tacks on IPsec IKE

2018 - Den­nis Felsch, Mar­tin Gro­the, Jörg Schwenk, Adam Czu­bak, Mar­cin Szy­ma­n­ek

27th USE­NIX Se­cu­ri­ty Sym­po­si­um, Au­gust 15–17, 2018, Bal­ti­more, MD, USA [Ori­gi­nal Pu­bli­ca­ti­on] [Video of the Talk] [Pre­vious Work 1] [Pre­vious Work 2] [Paper] [Sli­des]

Re­turn Of Blei­chen­ba­cher’s Ora­cle Thre­at (ROBOT)

2018 - Hanno Böck, Juraj So­mo­rovs­ky, Craig Young

27th USE­NIX Se­cu­ri­ty Sym­po­si­um (USE­NIX Se­cu­ri­ty 18) [At­tack web­site]

Post­Script Un­dead: Pw­ning the Web with a 35 Years Old Lan­gua­ge

2018 - Jens Mül­ler, Vla­dis­lav Mla­de­nov, Den­nis Felsch, Jörg Schwenk

21st In­ter­na­tio­nal Sym­po­si­um on Re­se­arch in At­tacks, In­tru­si­ons, and De­fen­ses (RAID 2018) [Paper]

Se­cu­ri­ty Ana­ly­sis of eIDAS – The Cross-Coun­try Au­then­ti­ca­ti­on Sche­me in Eu­ro­pe

2018 - Nils En­gel­bertz, Nu­rul­lah Er­i­no­la, David Her­ring, Vla­dis­lav Mla­de­nov, Juraj So­mo­rovs­ky, Jörg Schwenk

12th USE­NIX Work­shop on Of­fen­si­ve Tech­no­lo­gies (WOOT '18) [pdf]

Eva­lua­ti­on of eID and Trust Ser­vices

2018 - Nils En­gel­bertz, Nu­rul­lah Er­i­no­la, David Her­ring, Juraj So­mo­rovs­ky, Vla­dis­lav Mla­de­nov

[pdf]

At­ta­cking De­ter­mi­nis­tic Si­gna­tu­re Sche­mes using Fault At­tacks

2018 - Da­mi­an Pod­debni­ak, Juraj So­mo­rovs­ky, Se­bas­ti­an Schin­zel, Man­fred Loch­ter, Paul Rös­ler

IEEE Eu­ropean Sym­po­si­um on Se­cu­ri­ty and Pri­va­cy, EuroS&P 2018 [full ver­si­on]
Seite: