Ralf-Philipp Weinmann

According to our database1, Ralf-Philipp Weinmann authored at least 25 papers between 2004 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2018
Where did I leave my keys?: lessons from the Juniper Dual EC incident.
Commun. ACM, 2018

2016
Practical Cryptanalysis of ISO 9796-2 and EMV Signatures.
J. Cryptol., 2016

A Systematic Analysis of the Juniper Dual EC Incident.
IACR Cryptol. ePrint Arch., 2016

A Systematic Analysis of the Juniper Dual EC Incident.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2014
Content and Popularity Analysis of Tor Hidden Services.
Proceedings of the 34th International Conference on Distributed Computing Systems Workshops (ICDCS 2014 Workshops), Madrid, Spain, June 30, 2014

2013
Content and popularity analysis of Tor hidden services.
CoRR, 2013

Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

2012
TorScan: Tracing Long-lived Connections and Differential Scanning Attacks.
IACR Cryptol. ePrint Arch., 2012

TorScan: Deanonymizing Connections Using Topology Leaks.
ERCIM News, 2012

Baseband Attacks: Remote Exploitation of Memory Corruptions in Cellular Protocol Stacks.
Proceedings of the 6th USENIX Workshop on Offensive Technologies, 2012

2010
A Framework for Automated Architecture-Independent Gadget Search.
Proceedings of the 4th USENIX Workshop on Offensive Technologies, 2010

Cryptanalysis of the DECT Standard Cipher.
Proceedings of the Fast Software Encryption, 17th International Workshop, 2010

2009
Algebraic methods in block cipher cryptanalysis.
PhD thesis, 2009

Attacks on the DECT authentication mechanisms.
IACR Cryptol. ePrint Arch., 2009

Practical Cryptanalysis of ISO/IEC 9796-2 and EMV Signatures.
IACR Cryptol. ePrint Arch., 2009

Meet-in-the-Middle Attacks on SHA-3 Candidates.
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009

Block Ciphers: Algebraic Cryptanalysis and Gröbner Bases.
Proceedings of the Gröbner Bases, Coding, and Cryptography, 2009

2008
Variants of Bleichenbacher's Low-Exponent Attack on PKCS#1 RSA Signatures.
Proceedings of the Sicherheit 2008: Sicherheit, 2008

2007
Breaking 104 bit WEP in less than 60 seconds.
IACR Cryptol. ePrint Arch., 2007

Analysis of the SMS4 Block Cipher.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

2006
A Zero-Dimensional Gröbner Basis for AES-128.
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006

Block Ciphers Sensitive to Gröbner Basis Attacks.
Proceedings of the Topics in Cryptology, 2006

2005
Block ciphers sensitive to Groebner Basis Attacks.
IACR Cryptol. ePrint Arch., 2005

2004
Post-Quantum Signatures.
IACR Cryptol. ePrint Arch., 2004

Analysis of the DVB Common Scrambling Algorithm.
Proceedings of the Communications and Multimedia Security, 2004


  Loading...