Bertram Poettering
Orcid: 0000-0001-6525-5141
According to our database1,
Bertram Poettering
authored at least 58 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Proceedings of the Public-Key Cryptography - PKC 2024, 2024
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024
2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Security Standardisation Research - 8th International Conference, 2023
2022
Proceedings of the Computer Security - ESORICS 2022, 2022
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022
2021
Proceedings of the Topics in Cryptology - CT-RSA 2021, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the Computer Security - ESORICS 2020, 2020
Proceedings of the CYSARM@CCS '20: Proceedings of the 2nd Workshop on Cyber-Security Arms Race, 2020
2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the Cryptography and Coding - 17th IMA International Conference, 2019
Proceedings of the Topics in Cryptology - CT-RSA 2019, 2019
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019
2018
Proceedings of the Public-Key Cryptography - PKC 2018, 2018
Hashing Solutions Instead of Generating Problems: On the Interactive Certification of RSA Moduli.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018
Proceedings of the 31st IEEE Computer Security Foundations Symposium, 2018
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018
Proceedings of the Progress in Cryptology - AFRICACRYPT 2018, 2018
2017
Cryptographic enforcement of information flow policies without public information via tree partitions.
J. Comput. Secur., 2017
With one it is easy, with many it gets complicated: Understanding Channel Security for Groups.
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Theory of Cryptography - 15th International Conference, 2017
Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures.
Proceedings of the Public-Key Cryptography - PKC 2017, 2017
2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016
2015
Proceedings of the Fast Software Encryption - 22nd International Workshop, 2015
Proceedings of the Topics in Cryptology, 2015
Proceedings of the Applied Cryptography and Network Security, 2015
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015
2014
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
Big Bias Hunting in Amazonia: Large-Scale Computation and Exploitation of RC4 Biases (Invited Paper).
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014
2013
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
Proceedings of the Computer Security - ESORICS 2013, 2013
Proceedings of the Computer Security - ESORICS 2013, 2013
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012
2011
Proceedings of the Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
Proceedings of the Applied Cryptography and Network Security, 2011
2010
Proceedings of the Privacy Enhancing Technologies, 10th International Symposium, 2010
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010