Bertram Poettering

Orcid: 0000-0001-6525-5141

According to our database1, Bertram Poettering authored at least 57 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Formalizing Hash-then-Sign Signatures.
Proceedings of the Public-Key Cryptography - PKC 2024, 2024

2023
Attribute-based Single Sign-On: Secure, Private, and Efficient.
Proc. Priv. Enhancing Technol., October, 2023

On the (In)Security of ElGamal in OpenPGP.
Commun. ACM, June, 2023

A study of KEM generalizations.
IACR Cryptol. ePrint Arch., 2023

2022
Algorithm substitution attacks against receivers.
Int. J. Inf. Sec., 2022

Sequential Digital Signatures for Cryptographic Software-Update Authentication.
IACR Cryptol. ePrint Arch., 2022

On Secure Ratcheting with Immediate Decryption.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

2021
SoK: Game-based Security Models for Group Key Exchange.
IACR Cryptol. ePrint Arch., 2021

Towards Intelligent Context-Aware 6G Security.
CoRR, 2021

2020
Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality.
J. Cryptol., 2020

Combiners for AEAD.
IACR Cryptol. ePrint Arch., 2020

Encrypt-to-self: Securely Outsourcing Storage.
IACR Cryptol. ePrint Arch., 2020

Key Assignment Schemes with Authenticated Encryption, revisited.
IACR Cryptol. ePrint Arch., 2020

Efficiency Improvements for Encrypt-to-Self.
Proceedings of the CYSARM@CCS '20: Proceedings of the 2nd Workshop on Cyber-Security Arms Race, 2020

2019
Substitution Attacks against Message Authentication.
IACR Cryptol. ePrint Arch., 2019

Subverting Decryption in AEAD.
IACR Cryptol. ePrint Arch., 2019

2018
Ratcheted key exchange, revisited.
IACR Cryptol. ePrint Arch., 2018

Breaking the confidentiality of OCB2.
IACR Cryptol. ePrint Arch., 2018

Shorter double-authentication preventing signatures for small address spaces.
IACR Cryptol. ePrint Arch., 2018

KEM Combiners.
IACR Cryptol. ePrint Arch., 2018

Hashing solutions instead of generating problems: On the interactive certification of RSA moduli.
IACR Cryptol. ePrint Arch., 2018

Lossy Trapdoor Permutations with Improved Lossiness.
IACR Cryptol. ePrint Arch., 2018

A Cryptographic Look at Multi-party Channels.
Proceedings of the 31st IEEE Computer Security Foundations Symposium, 2018

Towards Bidirectional Ratcheted Key Exchange.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

2017
Cryptographic enforcement of information flow policies without public information via tree partitions.
J. Comput. Secur., 2017

Double-authentication-preventing signatures.
Int. J. Inf. Sec., 2017

Linkable message tagging: solving the key distribution problem of signature schemes.
Int. J. Inf. Sec., 2017

ASICS: authenticated key exchange security incorporating certification systems.
Int. J. Inf. Sec., 2017

With one it is easy, with many it gets complicated: Understanding Channel Security for Groups.
IACR Cryptol. ePrint Arch., 2017

Security Notions for Bidirectional Channels.
IACR Cryptol. ePrint Arch., 2017

Hybrid Encryption in a Multi-User Setting, Revisited.
IACR Cryptol. ePrint Arch., 2017

On the One-Per-Message Unforgeability of (EC)DSA and its Variants.
IACR Cryptol. ePrint Arch., 2017

2016
Selective Opening Security from Simulatable Data Encapsulation.
IACR Cryptol. ePrint Arch., 2016

Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures.
IACR Cryptol. ePrint Arch., 2016

On the Provable Security of (EC)DSA Signatures.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

From Identification to Signatures, Tightly: A Framework and Generic Transforms.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
Cold Boot Attacks in the Discrete Logarithm Setting.
IACR Cryptol. ePrint Arch., 2015

A More Cautious Approach to Security Against Mass Surveillance.
IACR Cryptol. ePrint Arch., 2015

Cryptographic Enforcement of Information Flow Policies Without Public Information.
Proceedings of the Applied Cryptography and Network Security, 2015

2014
Plaintext awareness in identity-based key encapsulation.
Int. J. Inf. Sec., 2014

Even more practical secure logging: Tree-based Seekable Sequential Key Generators.
IACR Cryptol. ePrint Arch., 2014

Multi-recipient encryption, revisited.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

Big Bias Hunting in Amazonia: Large-Scale Computation and Exploitation of RC4 Biases (Invited Paper).
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
Private discovery of common social contacts.
Int. J. Inf. Sec., 2013

Plaintext Recovery Attacks Against WPA/TKIP.
IACR Cryptol. ePrint Arch., 2013

Practical Secure Logging: Seekable Sequential Key Generators.
IACR Cryptol. ePrint Arch., 2013

On the Security of RC4 in TLS.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

2012
Privacy protection for authentication protocols.
PhD thesis, 2012

Publicly Verifiable Ciphertexts.
IACR Cryptol. ePrint Arch., 2012

Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes.
IACR Cryptol. ePrint Arch., 2012

2011
Pseudorandom Signatures.
IACR Cryptol. ePrint Arch., 2011

Affiliation-Hiding Authentication with Minimal Bandwidth Consumption.
Proceedings of the Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, 2011

2010
Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation.
IACR Cryptol. ePrint Arch., 2010

Taming Big Brother Ambitions: More Privacy for Secret Handshakes.
Proceedings of the Privacy Enhancing Technologies, 10th International Symposium, 2010

Affiliation-Hiding Key Exchange with Untrusted Group Authorities.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

Privacy-Preserving Group Discovery with Linear Complexity.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

Redactable Signatures for Tree-Structured Data: Definitions and Constructions.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010


  Loading...