Paul Rösler

Orcid: 0000-0002-2324-5671

Affiliations:
  • New York University, New York, NY, USA
  • TU Darmstadt, Germany
  • Ruhr University Bochum, Germany (PhD 2021)


According to our database1, Paul Rösler authored at least 18 papers between 2016 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Unique-Path Identity Based Encryption With Applications to Strongly Secure Messaging.
IACR Cryptol. ePrint Arch., 2023

Interoperability in End-to-End Encrypted Messaging.
IACR Cryptol. ePrint Arch., 2023

ASMesh: Anonymous and Secure Messaging in Mesh Networks Using Stronger, Anonymous Double Ratchet.
IACR Cryptol. ePrint Arch., 2023

2022
Strongly Anonymous Ratcheted Key Exchange.
IACR Cryptol. ePrint Arch., 2022

On the Worst-Case Inefficiency of CGKA.
IACR Cryptol. ePrint Arch., 2022

2021
Cryptographic foundations of modern stateful and continuous key exchange primitives.
PhD thesis, 2021

SoK: Game-based Security Models for Group Key Exchange.
IACR Cryptol. ePrint Arch., 2021

2020
Combiners for AEAD.
IACR Cryptol. ePrint Arch., 2020

On the Price of Concurrency in Group Ratcheting Protocols.
IACR Cryptol. ePrint Arch., 2020

Determining the Core Primitive for Optimally Secure Ratcheting.
IACR Cryptol. ePrint Arch., 2020

2019
Flexible Authenticated and Confidential Channel Establishment (fACCE): Analyzing the Noise Protocol Framework.
IACR Cryptol. ePrint Arch., 2019

2018
Ratcheted key exchange, revisited.
IACR Cryptol. ePrint Arch., 2018

More is Less: On the End-to-End Security of Group Chats in Signal, WhatsApp, and Threema.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

Towards Bidirectional Ratcheted Key Exchange.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

2017
More is Less: How Group Chats Weaken the Security of Instant Messengers Signal, WhatsApp, and Threema.
IACR Cryptol. ePrint Arch., 2017

Attacking Deterministic Signature Schemes using Fault Attacks.
IACR Cryptol. ePrint Arch., 2017

2016
How to Break Microsoft Rights Management Services.
Proceedings of the 10th USENIX Workshop on Offensive Technologies, 2016

Your Cloud in My Company: Modern Rights Management Services Revisited.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016


  Loading...