Author of the publication

Variants of Bleichenbacher's Low-Exponent Attack on PKCS#1 RSA Signatures.

, , , and . Sicherheit, volume P-128 of LNI, page 97-109. GI, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DECT Security Analysis.. IACR Cryptology ePrint Archive, (2012)Side Channels in the McEliece PKC., , , , and . PQCrypto, volume 5299 of Lecture Notes in Computer Science, page 216-229. Springer, (2008)Security analysis of a widely deployed locking system., , , , and . ACM Conference on Computer and Communications Security, page 929-940. ACM, (2013)Variants of Bleichenbacher's Low-Exponent Attack on PKCS#1 RSA Signatures., , , and . Sicherheit, volume P-128 of LNI, page 97-109. GI, (2008)Attacks on the WEP protocol.. IACR Cryptology ePrint Archive, (2007)Efficiently Outsourcing Multiparty Computation under Multiple Keys., , and . IACR Cryptology ePrint Archive, (2013)MoP-2-MoP - Mobile Private Microblogging., , , , , and . Financial Cryptography, volume 8437 of Lecture Notes in Computer Science, page 384-396. Springer, (2014)Attacks on the DECT Authentication Mechanisms., , , , and . CT-RSA, volume 5473 of Lecture Notes in Computer Science, page 48-65. Springer, (2009)Trust The Wire, They Always Told Me!: On Practical Non-Destructive Wire-Tap Attacks Against Ethernet., , , , and . WISEC, page 43-48. ACM, (2016)On the Privacy and Performance of Mobile Anonymous Microblogging., , , , , and . IEEE Trans. Information Forensics and Security, 11 (7): 1578-1591 (2016)