Author of the publication

Variants of Bleichenbacher's Low-Exponent Attack on PKCS#1 RSA Signatures.

, , , and . Sicherheit, volume P-128 of LNI, page 97-109. GI, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Systematic Analysis of the Juniper Dual EC Incident., , , , , , , , and . IACR Cryptology ePrint Archive, (2016)A Systematic Analysis of the Juniper Dual EC Incident., , , , , , , , , and . ACM Conference on Computer and Communications Security, page 468-479. ACM, (2016)Analysis of the DVB Common Scrambling Algorithm., and . Communications and Multimedia Security, volume 175 of IFIP, page 195-207. Springer, (2004)Where did I leave my keys?: lessons from the Juniper Dual EC incident., , , , , , , , , and . Commun. ACM, 61 (11): 148-155 (2018)Post-Quantum Signatures., , , , , , , , and . IACR Cryptology ePrint Archive, (2004)Meet-in-the-Middle Attacks on SHA-3 Candidates., , and . FSE, volume 5665 of Lecture Notes in Computer Science, page 228-245. Springer, (2009)Attacks on the DECT Authentication Mechanisms., , , , and . CT-RSA, volume 5473 of Lecture Notes in Computer Science, page 48-65. Springer, (2009)Block Ciphers Sensitive to Gröbner Basis Attacks., , and . CT-RSA, volume 3860 of Lecture Notes in Computer Science, page 313-331. Springer, (2006)Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization., , and . IEEE Symposium on Security and Privacy, page 80-94. IEEE Computer Society, (2013)Practical Cryptanalysis of ISO 9796-2 and EMV Signatures., , , and . J. Cryptology, 29 (3): 632-656 (2016)