Zobrazeno 1 - 10
of 54
pro vyhledávání: '"Bertram Poettering"'
Autor:
Jeroen Pijnenburg, Bertram Poettering
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2020, Iss 2 (2020)
A popular cryptographic option to implement Hierarchical Access Control in organizations is to combine a key assignment scheme with a symmetric encryption scheme. In brief, key assignment associates with each object in the hierarchy a unique symmetri
Externí odkaz:
https://doaj.org/article/7eb72672005b4d43a5ebb5a0e1e0522e
Autor:
Bertram Poettering, Paul Rösler
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2020, Iss 1 (2020)
The Authenticated Encryption with Associated Data (AEAD) primitive, which integrates confidentiality and integrity services under a single roof, found wide-spread adoption in industry and became indispensable in practical protocol design. Recognizing
Externí odkaz:
https://doaj.org/article/fb3fb3256bd041a6a8620d9a0c5af0be
Publikováno v:
IACR Transactions on Symmetric Cryptology, Pp 405-426 (2017)
This paper closes a definitional gap in the context of modeling cryptographic two-party channels. We note that, while most security models for channels consider exclusively unidirectional communication, real-world protocols like TLS and SSH are rathe
Externí odkaz:
https://doaj.org/article/9284d1d6fbc74319affaf1d136153f8f
Autor:
Marcel Armour, Bertram Poettering
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2019, Iss 3 (2019)
This work introduces Algorithm Substitution Attacks (ASAs) on message authentication schemes. In light of revelations concerning mass surveillance, ASAs were initially introduced by Bellare, Paterson and Rogaway as a novel attack class against the co
Externí odkaz:
https://doaj.org/article/0d551dbf68454d0d91240c54146b0eff
Publikováno v:
CCS
Roughly four decades ago, Taher ElGamal put forward what is today one of the most widely known and best understood public key encryption schemes. ElGamal encryption has been used in many different contexts, chiefly among them by the OpenPGP email enc
Autor:
Marcel Armour, Bertram Poettering
Publikováno v:
International Journal of Information Security. 21:1027-1050
This work describes a class of Algorithm Substitution Attack (ASA) generically targeting the receiver of a communication between two parties. Our work provides a unified framework that applies to any scheme where a secret key is held by the receiver;
Autor:
Bertram Poettering, Simon Rastikian
Publikováno v:
Security Standardisation Research ISBN: 9783031307300
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::498e7e7c6367b510fd315cc3538a1008
https://doi.org/10.1007/978-3-031-30731-7_3
https://doi.org/10.1007/978-3-031-30731-7_3
Publikováno v:
Journal of Cryptology. 33:1871-1913
Autor:
Paul Rösler, Bertram Poettering
Publikováno v:
IACR Transactions on Symmetric Cryptology; Volume 2020, Issue 1; 121-143
IACR Transactions on Symmetric Cryptology, Vol 2020, Iss 1 (2020)
IACR Transactions on Symmetric Cryptology, Vol 2020, Iss 1 (2020)
The Authenticated Encryption with Associated Data (AEAD) primitive, which integrates confidentiality and integrity services under a single roof, found wide-spread adoption in industry and became indispensable in practical protocol design. Recognizing
Autor:
Bertram Poettering, Simon Rastikian
Publikováno v:
Computer Security – ESORICS 2022 ISBN: 9783031171451
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::89b16f3a9c35e38e1729bf17caade0d4
https://doi.org/10.1007/978-3-031-17146-8_13
https://doi.org/10.1007/978-3-031-17146-8_13