Bertram Poettering

Orcid: 0000-0001-6525-5141

According to our database1, Bertram Poettering authored at least 58 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Formalizing Hash-then-Sign Signatures.
Proceedings of the Public-Key Cryptography - PKC 2024, 2024

Digital Signatures with Outsourced Hashing.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

2023
Attribute-based Single Sign-On: Secure, Private, and Efficient.
IACR Cryptol. ePrint Arch., 2023

A Study of KEM Generalizations.
Proceedings of the Security Standardisation Research - 8th International Conference, 2023

2022
Algorithm Substitution Attacks against Receivers.
IACR Cryptol. ePrint Arch., 2022

Sequential Digital Signatures for Cryptographic Software-Update Authentication.
Proceedings of the Computer Security - ESORICS 2022, 2022

On Secure Ratcheting with Immediate Decryption.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

2021
Towards Intelligent Context-Aware 6G Security.
CoRR, 2021

SoK: Game-Based Security Models for Group Key Exchange.
Proceedings of the Topics in Cryptology - CT-RSA 2021, 2021

On the (In)Security of ElGamal in OpenPGP.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Combiners for AEAD.
IACR Cryptol. ePrint Arch., 2020

Key Assignment Schemes with Authenticated Encryption, revisited.
IACR Cryptol. ePrint Arch., 2020

Encrypt-to-Self: Securely Outsourcing Storage.
Proceedings of the Computer Security - ESORICS 2020, 2020

Efficiency Improvements for Encrypt-to-Self.
Proceedings of the CYSARM@CCS '20: Proceedings of the 2nd Workshop on Cyber-Security Arms Race, 2020

2019
Substitution Attacks against Message Authentication.
IACR Cryptol. ePrint Arch., 2019

Subverting Decryption in AEAD.
Proceedings of the Cryptography and Coding - 17th IMA International Conference, 2019

Lossy Trapdoor Permutations with Improved Lossiness.
Proceedings of the Topics in Cryptology - CT-RSA 2019, 2019

Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

2018
Ratcheted key exchange, revisited.
IACR Cryptol. ePrint Arch., 2018

Breaking the confidentiality of OCB2.
IACR Cryptol. ePrint Arch., 2018

Hybrid Encryption in a Multi-user Setting, Revisited.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

KEM Combiners.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

Hashing Solutions Instead of Generating Problems: On the Interactive Certification of RSA Moduli.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

A Cryptographic Look at Multi-party Channels.
Proceedings of the 31st IEEE Computer Security Foundations Symposium, 2018

Towards Bidirectional Ratcheted Key Exchange.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

Shorter Double-Authentication Preventing Signatures for Small Address Spaces.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2018, 2018

2017
Cryptographic enforcement of information flow policies without public information via tree partitions.
J. Comput. Secur., 2017

With one it is easy, with many it gets complicated: Understanding Channel Security for Groups.
IACR Cryptol. ePrint Arch., 2017

Security Notions for Bidirectional Channels.
IACR Cryptol. ePrint Arch., 2017

On the One-Per-Message Unforgeability of (EC)DSA and Its Variants.
Proceedings of the Theory of Cryptography - 15th International Conference, 2017

Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures.
Proceedings of the Public-Key Cryptography - PKC 2017, 2017

2016
On the Provable Security of (EC)DSA Signatures.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Selective Opening Security from Simulatable Data Encapsulation.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

From Identification to Signatures, Tightly: A Framework and Generic Transforms.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
A More Cautious Approach to Security Against Mass Surveillance.
Proceedings of the Fast Software Encryption - 22nd International Workshop, 2015

Cold Boot Attacks in the Discrete Logarithm Setting.
Proceedings of the Topics in Cryptology, 2015

Cryptographic Enforcement of Information Flow Policies Without Public Information.
Proceedings of the Applied Cryptography and Network Security, 2015

Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015

2014
Plaintext Recovery Attacks Against WPA/TKIP.
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014

Double-Authentication-Preventing Signatures.
Proceedings of the Computer Security - ESORICS 2014, 2014

Even More Practical Secure Logging: Tree-Based Seekable Sequential Key Generators.
Proceedings of the Computer Security - ESORICS 2014, 2014

Multi-recipient encryption, revisited.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

Big Bias Hunting in Amazonia: Large-Scale Computation and Exploitation of RC4 Biases (Invited Paper).
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
On the Security of RC4 in TLS.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Practical Secure Logging: Seekable Sequential Key Generators.
Proceedings of the Computer Security - ESORICS 2013, 2013

ASICS: Authenticated Key Exchange Security Incorporating Certification Systems.
Proceedings of the Computer Security - ESORICS 2013, 2013

Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes.
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013

Pseudorandom signatures.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
Privacy protection for authentication protocols.
PhD thesis, 2012

Plaintext Awareness in Identity-Based Key Encapsulation.
IACR Cryptol. ePrint Arch., 2012

Publicly Verifiable Ciphertexts.
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012

2011
Affiliation-Hiding Authentication with Minimal Bandwidth Consumption.
Proceedings of the Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, 2011

Practical affiliation-hiding authentication from improved polynomial interpolation.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

Private Discovery of Common Social Contacts.
Proceedings of the Applied Cryptography and Network Security, 2011

2010
Taming Big Brother Ambitions: More Privacy for Secret Handshakes.
Proceedings of the Privacy Enhancing Technologies, 10th International Symposium, 2010

Affiliation-Hiding Key Exchange with Untrusted Group Authorities.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

Privacy-Preserving Group Discovery with Linear Complexity.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

Redactable Signatures for Tree-Structured Data: Definitions and Constructions.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010


  Loading...