BibTeX records: Ralf-Philipp Weinmann

download as .bib file

@article{DBLP:journals/cacm/CheckowayMGFCGH18,
  author       = {Stephen Checkoway and
                  Jacob Maskiewicz and
                  Christina Garman and
                  Joshua Fried and
                  Shaanan Cohney and
                  Matthew Green and
                  Nadia Heninger and
                  Ralf{-}Philipp Weinmann and
                  Eric Rescorla and
                  Hovav Shacham},
  title        = {Where did {I} leave my keys?: lessons from the Juniper Dual {EC} incident},
  journal      = {Commun. {ACM}},
  volume       = {61},
  number       = {11},
  pages        = {148--155},
  year         = {2018},
  url          = {https://doi.org/10.1145/3266291},
  doi          = {10.1145/3266291},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/CheckowayMGFCGH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/CoronNTW16,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  David Naccache and
                  Mehdi Tibouchi and
                  Ralf{-}Philipp Weinmann},
  title        = {Practical Cryptanalysis of {ISO} 9796-2 and {EMV} Signatures},
  journal      = {J. Cryptol.},
  volume       = {29},
  number       = {3},
  pages        = {632--656},
  year         = {2016},
  url          = {https://doi.org/10.1007/s00145-015-9205-5},
  doi          = {10.1007/S00145-015-9205-5},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/CoronNTW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CheckowayMGFC0H16,
  author       = {Stephen Checkoway and
                  Jacob Maskiewicz and
                  Christina Garman and
                  Joshua Fried and
                  Shaanan Cohney and
                  Matthew Green and
                  Nadia Heninger and
                  Ralf{-}Philipp Weinmann and
                  Eric Rescorla and
                  Hovav Shacham},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {A Systematic Analysis of the Juniper Dual {EC} Incident},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {468--479},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978395},
  doi          = {10.1145/2976749.2978395},
  timestamp    = {Tue, 10 Nov 2020 20:00:49 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CheckowayMGFC0H16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CheckowayCG0HMR16,
  author       = {Stephen Checkoway and
                  Shaanan Cohney and
                  Christina Garman and
                  Matthew Green and
                  Nadia Heninger and
                  Jacob Maskiewicz and
                  Eric Rescorla and
                  Hovav Shacham and
                  Ralf{-}Philipp Weinmann},
  title        = {A Systematic Analysis of the Juniper Dual {EC} Incident},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {376},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/376},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CheckowayCG0HMR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcsw/BiryukovPTW14,
  author       = {Alex Biryukov and
                  Ivan Pustogarov and
                  Fabrice Thill and
                  Ralf{-}Philipp Weinmann},
  title        = {Content and Popularity Analysis of Tor Hidden Services},
  booktitle    = {34th International Conference on Distributed Computing Systems Workshops
                  {(ICDCS} 2014 Workshops), Madrid, Spain, June 30 - July 3, 2014},
  pages        = {188--193},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICDCSW.2014.20},
  doi          = {10.1109/ICDCSW.2014.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcsw/BiryukovPTW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BiryukovPW13,
  author       = {Alex Biryukov and
                  Ivan Pustogarov and
                  Ralf{-}Philipp Weinmann},
  title        = {Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {80--94},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.15},
  doi          = {10.1109/SP.2013.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/BiryukovPW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BiryukovPW13,
  author       = {Alex Biryukov and
                  Ivan Pustogarov and
                  Ralf{-}Philipp Weinmann},
  title        = {Content and popularity analysis of Tor hidden services},
  journal      = {CoRR},
  volume       = {abs/1308.6768},
  year         = {2013},
  url          = {http://arxiv.org/abs/1308.6768},
  eprinttype    = {arXiv},
  eprint       = {1308.6768},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/BiryukovPW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BiryukovPW12,
  author       = {Alex Biryukov and
                  Ivan Pustogarov and
                  Ralf{-}Philipp Weinmann},
  editor       = {Sara Foresti and
                  Moti Yung and
                  Fabio Martinelli},
  title        = {TorScan: Tracing Long-Lived Connections and Differential Scanning
                  Attacks},
  booktitle    = {Computer Security - {ESORICS} 2012 - 17th European Symposium on Research
                  in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7459},
  pages        = {469--486},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33167-1\_27},
  doi          = {10.1007/978-3-642-33167-1\_27},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BiryukovPW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/woot/Weinmann12,
  author       = {Ralf{-}Philipp Weinmann},
  editor       = {Elie Bursztein and
                  Thomas Dullien},
  title        = {Baseband Attacks: Remote Exploitation of Memory Corruptions in Cellular
                  Protocol Stacks},
  booktitle    = {6th {USENIX} Workshop on Offensive Technologies, WOOT'12, August 6-7,
                  2012, Bellevue, WA, USA, Proceedings},
  pages        = {12--21},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {http://www.usenix.org/conference/woot12/24-baseband-attacks-remote-exploitation-memory-corruptions-cellular-protocol},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/woot/Weinmann12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ercim/BiryukovPW12,
  author       = {Alex Biryukov and
                  Ivan Pustogarov and
                  Ralf{-}Philipp Weinmann},
  title        = {TorScan: Deanonymizing Connections Using Topology Leaks},
  journal      = {{ERCIM} News},
  volume       = {2012},
  number       = {90},
  year         = {2012},
  url          = {http://ercim-news.ercim.eu/en90/special/torscan-deanonymizing-connections-using-topology-leaks},
  timestamp    = {Wed, 22 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ercim/BiryukovPW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BiryukovPW12,
  author       = {Alex Biryukov and
                  Ivan Pustogarov and
                  Ralf{-}Philipp Weinmann},
  title        = {TorScan: Tracing Long-lived Connections and Differential Scanning
                  Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {432},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/432},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BiryukovPW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/NohlTW10,
  author       = {Karsten Nohl and
                  Erik Tews and
                  Ralf{-}Philipp Weinmann},
  editor       = {Seokhie Hong and
                  Tetsu Iwata},
  title        = {Cryptanalysis of the {DECT} Standard Cipher},
  booktitle    = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
                  Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6147},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13858-4\_1},
  doi          = {10.1007/978-3-642-13858-4\_1},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/NohlTW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/woot/DullienKW10,
  author       = {Thomas Dullien and
                  Tim Kornau and
                  Ralf{-}Philipp Weinmann},
  editor       = {Charlie Miller and
                  Hovav Shacham},
  title        = {A Framework for Automated Architecture-Independent Gadget Search},
  booktitle    = {4th {USENIX} Workshop on Offensive Technologies, {WOOT} '10, Washington,
                  D.C., USA, August 9, 2010},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {https://www.usenix.org/conference/woot10/framework-automated-architecture-independent-gadget-search},
  timestamp    = {Mon, 01 Feb 2021 08:41:52 +0100},
  biburl       = {https://dblp.org/rec/conf/woot/DullienKW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/de/Weinmann2009,
  author       = {Ralf{-}Philipp Weinmann},
  title        = {Algebraic methods in block cipher cryptanalysis},
  school       = {Darmstadt University of Technology, Germany},
  year         = {2009},
  url          = {http://tuprints.ulb.tu-darmstadt.de/1362/},
  urn          = {urn:nbn:de:tuda-tuprints-13624},
  timestamp    = {Sat, 17 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/de/Weinmann2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CoronNTW09,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  David Naccache and
                  Mehdi Tibouchi and
                  Ralf{-}Philipp Weinmann},
  editor       = {Shai Halevi},
  title        = {Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {428--444},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_25},
  doi          = {10.1007/978-3-642-03356-8\_25},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CoronNTW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/LucksSTWW09,
  author       = {Stefan Lucks and
                  Andreas Schuler and
                  Erik Tews and
                  Ralf{-}Philipp Weinmann and
                  Matthias Wenzel},
  editor       = {Marc Fischlin},
  title        = {Attacks on the {DECT} Authentication Mechanisms},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2009, The Cryptographers' Track at
                  the {RSA} Conference 2009, San Francisco, CA, USA, April 20-24, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5473},
  pages        = {48--65},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00862-7\_4},
  doi          = {10.1007/978-3-642-00862-7\_4},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/LucksSTWW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KhovratovichNW09,
  author       = {Dmitry Khovratovich and
                  Ivica Nikolic and
                  Ralf{-}Philipp Weinmann},
  editor       = {Orr Dunkelman},
  title        = {Meet-in-the-Middle Attacks on {SHA-3} Candidates},
  booktitle    = {Fast Software Encryption, 16th International Workshop, {FSE} 2009,
                  Leuven, Belgium, February 22-25, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5665},
  pages        = {228--245},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03317-9\_14},
  doi          = {10.1007/978-3-642-03317-9\_14},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/KhovratovichNW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/09/CidW09,
  author       = {Carlos Cid and
                  Ralf{-}Philipp Weinmann},
  editor       = {Massimiliano Sala and
                  Shojiro Sakata and
                  Teo Mora and
                  Carlo Traverso and
                  Ludovic Perret},
  title        = {Block Ciphers: Algebraic Cryptanalysis and Gr{\"{o}}bner Bases},
  booktitle    = {Gr{\"{o}}bner Bases, Coding, and Cryptography},
  pages        = {307--327},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-540-93806-4\_17},
  doi          = {10.1007/978-3-540-93806-4\_17},
  timestamp    = {Mon, 16 Sep 2019 14:43:20 +0200},
  biburl       = {https://dblp.org/rec/books/sp/09/CidW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LucksSTWW09,
  author       = {Stefan Lucks and
                  Andreas Schuler and
                  Erik Tews and
                  Ralf{-}Philipp Weinmann and
                  Matthias Wenzel},
  title        = {Attacks on the {DECT} authentication mechanisms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {78},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/078},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LucksSTWW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoronNTW09,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  David Naccache and
                  Mehdi Tibouchi and
                  Ralf{-}Philipp Weinmann},
  title        = {Practical Cryptanalysis of {ISO/IEC} 9796-2 and {EMV} Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {203},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/203},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoronNTW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/KuhnPTW08,
  author       = {Ulrich K{\"{u}}hn and
                  Andrei Pyshkin and
                  Erik Tews and
                  Ralf{-}Philipp Weinmann},
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {Variants of Bleichenbacher's Low-Exponent Attack on PKCS{\#}1 {RSA}
                  Signatures},
  booktitle    = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  pages        = {97--109},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21520},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/KuhnPTW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LiuJHDLPW07,
  author       = {Fen Liu and
                  Wen Ji and
                  Lei Hu and
                  Jintai Ding and
                  Shuwang Lv and
                  Andrei Pyshkin and
                  Ralf{-}Philipp Weinmann},
  editor       = {Josef Pieprzyk and
                  Hossein Ghodosi and
                  Ed Dawson},
  title        = {Analysis of the {SMS4} Block Cipher},
  booktitle    = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
                  2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4586},
  pages        = {158--170},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73458-1\_13},
  doi          = {10.1007/978-3-540-73458-1\_13},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LiuJHDLPW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/TewsWP07,
  author       = {Erik Tews and
                  Ralf{-}Philipp Weinmann and
                  Andrei Pyshkin},
  editor       = {Sehun Kim and
                  Moti Yung and
                  Hyung{-}Woo Lee},
  title        = {Breaking 104 Bit {WEP} in Less Than 60 Seconds},
  booktitle    = {Information Security Applications, 8th International Workshop, {WISA}
                  2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4867},
  pages        = {188--202},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77535-5\_14},
  doi          = {10.1007/978-3-540-77535-5\_14},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/TewsWP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TewsWP07,
  author       = {Erik Tews and
                  Ralf{-}Philipp Weinmann and
                  Andrei Pyshkin},
  title        = {Breaking 104 bit {WEP} in less than 60 seconds},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {120},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/120},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TewsWP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/BuchmannPW06,
  author       = {Johannes Buchmann and
                  Andrei Pyshkin and
                  Ralf{-}Philipp Weinmann},
  editor       = {David Pointcheval},
  title        = {Block Ciphers Sensitive to Gr{\"{o}}bner Basis Attacks},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2006, The Cryptographers' Track at
                  the {RSA} Conference 2006, San Jose, CA, USA, February 13-17, 2006,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3860},
  pages        = {313--331},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11605805\_20},
  doi          = {10.1007/11605805\_20},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/BuchmannPW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BuchmannPW06,
  author       = {Johannes Buchmann and
                  Andrei Pyshkin and
                  Ralf{-}Philipp Weinmann},
  editor       = {Matthew J. B. Robshaw},
  title        = {A Zero-Dimensional Gr{\"{o}}bner Basis for {AES-128}},
  booktitle    = {Fast Software Encryption, 13th International Workshop, {FSE} 2006,
                  Graz, Austria, March 15-17, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4047},
  pages        = {78--88},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11799313\_6},
  doi          = {10.1007/11799313\_6},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/BuchmannPW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BuchmannPW05,
  author       = {Johannes Buchmann and
                  Andrei Pychkine and
                  Ralf{-}Philipp Weinmann},
  title        = {Block ciphers sensitive to Groebner Basis Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {200},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/200},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BuchmannPW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/WeinmannW04,
  author       = {Ralf{-}Philipp Weinmann and
                  Kai Wirt},
  editor       = {David Chadwick and
                  Bart Preneel},
  title        = {Analysis of the {DVB} Common Scrambling Algorithm},
  booktitle    = {Communications and Multimedia Security - 8th {IFIP} {TC-6} {TC-11}
                  Conference on Communications and Multimedia Security, Sept. 15-18,
                  2004, Windermere, The Lake District, United Kingdom},
  series       = {{IFIP}},
  volume       = {175},
  pages        = {195--207},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/0-387-24486-7\_15},
  doi          = {10.1007/0-387-24486-7\_15},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cms/WeinmannW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BuchmannGDELOSVW04,
  author       = {Johannes Buchmann and
                  Luis Carlos Coronado Garc{\'{\i}}a and
                  Martin D{\"{o}}ring and
                  Daniela Engelbert and
                  Christoph Ludwig and
                  Raphael Overbeck and
                  Arthur Schmidt and
                  Ulrich Vollmer and
                  Ralf{-}Philipp Weinmann},
  title        = {Post-Quantum Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {297},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/297},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BuchmannGDELOSVW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics