Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Ralf-Philipp Weinmann
@article{DBLP:journals/cacm/CheckowayMGFCGH18, author = {Stephen Checkoway and Jacob Maskiewicz and Christina Garman and Joshua Fried and Shaanan Cohney and Matthew Green and Nadia Heninger and Ralf{-}Philipp Weinmann and Eric Rescorla and Hovav Shacham}, title = {Where did {I} leave my keys?: lessons from the Juniper Dual {EC} incident}, journal = {Commun. {ACM}}, volume = {61}, number = {11}, pages = {148--155}, year = {2018}, url = {https://doi.org/10.1145/3266291}, doi = {10.1145/3266291}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/CheckowayMGFCGH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/CoronNTW16, author = {Jean{-}S{\'{e}}bastien Coron and David Naccache and Mehdi Tibouchi and Ralf{-}Philipp Weinmann}, title = {Practical Cryptanalysis of {ISO} 9796-2 and {EMV} Signatures}, journal = {J. Cryptol.}, volume = {29}, number = {3}, pages = {632--656}, year = {2016}, url = {https://doi.org/10.1007/s00145-015-9205-5}, doi = {10.1007/S00145-015-9205-5}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/CoronNTW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CheckowayMGFC0H16, author = {Stephen Checkoway and Jacob Maskiewicz and Christina Garman and Joshua Fried and Shaanan Cohney and Matthew Green and Nadia Heninger and Ralf{-}Philipp Weinmann and Eric Rescorla and Hovav Shacham}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {A Systematic Analysis of the Juniper Dual {EC} Incident}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {468--479}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978395}, doi = {10.1145/2976749.2978395}, timestamp = {Tue, 10 Nov 2020 20:00:49 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CheckowayMGFC0H16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CheckowayCG0HMR16, author = {Stephen Checkoway and Shaanan Cohney and Christina Garman and Matthew Green and Nadia Heninger and Jacob Maskiewicz and Eric Rescorla and Hovav Shacham and Ralf{-}Philipp Weinmann}, title = {A Systematic Analysis of the Juniper Dual {EC} Incident}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {376}, year = {2016}, url = {http://eprint.iacr.org/2016/376}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CheckowayCG0HMR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcsw/BiryukovPTW14, author = {Alex Biryukov and Ivan Pustogarov and Fabrice Thill and Ralf{-}Philipp Weinmann}, title = {Content and Popularity Analysis of Tor Hidden Services}, booktitle = {34th International Conference on Distributed Computing Systems Workshops {(ICDCS} 2014 Workshops), Madrid, Spain, June 30 - July 3, 2014}, pages = {188--193}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ICDCSW.2014.20}, doi = {10.1109/ICDCSW.2014.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcsw/BiryukovPTW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BiryukovPW13, author = {Alex Biryukov and Ivan Pustogarov and Ralf{-}Philipp Weinmann}, title = {Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization}, booktitle = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley, CA, USA, May 19-22, 2013}, pages = {80--94}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SP.2013.15}, doi = {10.1109/SP.2013.15}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/BiryukovPW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BiryukovPW13, author = {Alex Biryukov and Ivan Pustogarov and Ralf{-}Philipp Weinmann}, title = {Content and popularity analysis of Tor hidden services}, journal = {CoRR}, volume = {abs/1308.6768}, year = {2013}, url = {http://arxiv.org/abs/1308.6768}, eprinttype = {arXiv}, eprint = {1308.6768}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/BiryukovPW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BiryukovPW12, author = {Alex Biryukov and Ivan Pustogarov and Ralf{-}Philipp Weinmann}, editor = {Sara Foresti and Moti Yung and Fabio Martinelli}, title = {TorScan: Tracing Long-Lived Connections and Differential Scanning Attacks}, booktitle = {Computer Security - {ESORICS} 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7459}, pages = {469--486}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33167-1\_27}, doi = {10.1007/978-3-642-33167-1\_27}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BiryukovPW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/woot/Weinmann12, author = {Ralf{-}Philipp Weinmann}, editor = {Elie Bursztein and Thomas Dullien}, title = {Baseband Attacks: Remote Exploitation of Memory Corruptions in Cellular Protocol Stacks}, booktitle = {6th {USENIX} Workshop on Offensive Technologies, WOOT'12, August 6-7, 2012, Bellevue, WA, USA, Proceedings}, pages = {12--21}, publisher = {{USENIX} Association}, year = {2012}, url = {http://www.usenix.org/conference/woot12/24-baseband-attacks-remote-exploitation-memory-corruptions-cellular-protocol}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/woot/Weinmann12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ercim/BiryukovPW12, author = {Alex Biryukov and Ivan Pustogarov and Ralf{-}Philipp Weinmann}, title = {TorScan: Deanonymizing Connections Using Topology Leaks}, journal = {{ERCIM} News}, volume = {2012}, number = {90}, year = {2012}, url = {http://ercim-news.ercim.eu/en90/special/torscan-deanonymizing-connections-using-topology-leaks}, timestamp = {Wed, 22 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ercim/BiryukovPW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BiryukovPW12, author = {Alex Biryukov and Ivan Pustogarov and Ralf{-}Philipp Weinmann}, title = {TorScan: Tracing Long-lived Connections and Differential Scanning Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {432}, year = {2012}, url = {http://eprint.iacr.org/2012/432}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BiryukovPW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/NohlTW10, author = {Karsten Nohl and Erik Tews and Ralf{-}Philipp Weinmann}, editor = {Seokhie Hong and Tetsu Iwata}, title = {Cryptanalysis of the {DECT} Standard Cipher}, booktitle = {Fast Software Encryption, 17th International Workshop, {FSE} 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6147}, pages = {1--18}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13858-4\_1}, doi = {10.1007/978-3-642-13858-4\_1}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/NohlTW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/woot/DullienKW10, author = {Thomas Dullien and Tim Kornau and Ralf{-}Philipp Weinmann}, editor = {Charlie Miller and Hovav Shacham}, title = {A Framework for Automated Architecture-Independent Gadget Search}, booktitle = {4th {USENIX} Workshop on Offensive Technologies, {WOOT} '10, Washington, D.C., USA, August 9, 2010}, publisher = {{USENIX} Association}, year = {2010}, url = {https://www.usenix.org/conference/woot10/framework-automated-architecture-independent-gadget-search}, timestamp = {Mon, 01 Feb 2021 08:41:52 +0100}, biburl = {https://dblp.org/rec/conf/woot/DullienKW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/de/Weinmann2009, author = {Ralf{-}Philipp Weinmann}, title = {Algebraic methods in block cipher cryptanalysis}, school = {Darmstadt University of Technology, Germany}, year = {2009}, url = {http://tuprints.ulb.tu-darmstadt.de/1362/}, urn = {urn:nbn:de:tuda-tuprints-13624}, timestamp = {Sat, 17 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/de/Weinmann2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CoronNTW09, author = {Jean{-}S{\'{e}}bastien Coron and David Naccache and Mehdi Tibouchi and Ralf{-}Philipp Weinmann}, editor = {Shai Halevi}, title = {Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures}, booktitle = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5677}, pages = {428--444}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03356-8\_25}, doi = {10.1007/978-3-642-03356-8\_25}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CoronNTW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/LucksSTWW09, author = {Stefan Lucks and Andreas Schuler and Erik Tews and Ralf{-}Philipp Weinmann and Matthias Wenzel}, editor = {Marc Fischlin}, title = {Attacks on the {DECT} Authentication Mechanisms}, booktitle = {Topics in Cryptology - {CT-RSA} 2009, The Cryptographers' Track at the {RSA} Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5473}, pages = {48--65}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00862-7\_4}, doi = {10.1007/978-3-642-00862-7\_4}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/LucksSTWW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/KhovratovichNW09, author = {Dmitry Khovratovich and Ivica Nikolic and Ralf{-}Philipp Weinmann}, editor = {Orr Dunkelman}, title = {Meet-in-the-Middle Attacks on {SHA-3} Candidates}, booktitle = {Fast Software Encryption, 16th International Workshop, {FSE} 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5665}, pages = {228--245}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03317-9\_14}, doi = {10.1007/978-3-642-03317-9\_14}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/KhovratovichNW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/09/CidW09, author = {Carlos Cid and Ralf{-}Philipp Weinmann}, editor = {Massimiliano Sala and Shojiro Sakata and Teo Mora and Carlo Traverso and Ludovic Perret}, title = {Block Ciphers: Algebraic Cryptanalysis and Gr{\"{o}}bner Bases}, booktitle = {Gr{\"{o}}bner Bases, Coding, and Cryptography}, pages = {307--327}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-540-93806-4\_17}, doi = {10.1007/978-3-540-93806-4\_17}, timestamp = {Mon, 16 Sep 2019 14:43:20 +0200}, biburl = {https://dblp.org/rec/books/sp/09/CidW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LucksSTWW09, author = {Stefan Lucks and Andreas Schuler and Erik Tews and Ralf{-}Philipp Weinmann and Matthias Wenzel}, title = {Attacks on the {DECT} authentication mechanisms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {78}, year = {2009}, url = {http://eprint.iacr.org/2009/078}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LucksSTWW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoronNTW09, author = {Jean{-}S{\'{e}}bastien Coron and David Naccache and Mehdi Tibouchi and Ralf{-}Philipp Weinmann}, title = {Practical Cryptanalysis of {ISO/IEC} 9796-2 and {EMV} Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {203}, year = {2009}, url = {http://eprint.iacr.org/2009/203}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoronNTW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/KuhnPTW08, author = {Ulrich K{\"{u}}hn and Andrei Pyshkin and Erik Tews and Ralf{-}Philipp Weinmann}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {Variants of Bleichenbacher's Low-Exponent Attack on PKCS{\#}1 {RSA} Signatures}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {97--109}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21520}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/KuhnPTW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LiuJHDLPW07, author = {Fen Liu and Wen Ji and Lei Hu and Jintai Ding and Shuwang Lv and Andrei Pyshkin and Ralf{-}Philipp Weinmann}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Analysis of the {SMS4} Block Cipher}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {158--170}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_13}, doi = {10.1007/978-3-540-73458-1\_13}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LiuJHDLPW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/TewsWP07, author = {Erik Tews and Ralf{-}Philipp Weinmann and Andrei Pyshkin}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {Breaking 104 Bit {WEP} in Less Than 60 Seconds}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {188--202}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_14}, doi = {10.1007/978-3-540-77535-5\_14}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/TewsWP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TewsWP07, author = {Erik Tews and Ralf{-}Philipp Weinmann and Andrei Pyshkin}, title = {Breaking 104 bit {WEP} in less than 60 seconds}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {120}, year = {2007}, url = {http://eprint.iacr.org/2007/120}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TewsWP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/BuchmannPW06, author = {Johannes Buchmann and Andrei Pyshkin and Ralf{-}Philipp Weinmann}, editor = {David Pointcheval}, title = {Block Ciphers Sensitive to Gr{\"{o}}bner Basis Attacks}, booktitle = {Topics in Cryptology - {CT-RSA} 2006, The Cryptographers' Track at the {RSA} Conference 2006, San Jose, CA, USA, February 13-17, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3860}, pages = {313--331}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11605805\_20}, doi = {10.1007/11605805\_20}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/BuchmannPW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BuchmannPW06, author = {Johannes Buchmann and Andrei Pyshkin and Ralf{-}Philipp Weinmann}, editor = {Matthew J. B. Robshaw}, title = {A Zero-Dimensional Gr{\"{o}}bner Basis for {AES-128}}, booktitle = {Fast Software Encryption, 13th International Workshop, {FSE} 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4047}, pages = {78--88}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11799313\_6}, doi = {10.1007/11799313\_6}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/BuchmannPW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BuchmannPW05, author = {Johannes Buchmann and Andrei Pychkine and Ralf{-}Philipp Weinmann}, title = {Block ciphers sensitive to Groebner Basis Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {200}, year = {2005}, url = {http://eprint.iacr.org/2005/200}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BuchmannPW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/WeinmannW04, author = {Ralf{-}Philipp Weinmann and Kai Wirt}, editor = {David Chadwick and Bart Preneel}, title = {Analysis of the {DVB} Common Scrambling Algorithm}, booktitle = {Communications and Multimedia Security - 8th {IFIP} {TC-6} {TC-11} Conference on Communications and Multimedia Security, Sept. 15-18, 2004, Windermere, The Lake District, United Kingdom}, series = {{IFIP}}, volume = {175}, pages = {195--207}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/0-387-24486-7\_15}, doi = {10.1007/0-387-24486-7\_15}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cms/WeinmannW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BuchmannGDELOSVW04, author = {Johannes Buchmann and Luis Carlos Coronado Garc{\'{\i}}a and Martin D{\"{o}}ring and Daniela Engelbert and Christoph Ludwig and Raphael Overbeck and Arthur Schmidt and Ulrich Vollmer and Ralf{-}Philipp Weinmann}, title = {Post-Quantum Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {297}, year = {2004}, url = {http://eprint.iacr.org/2004/297}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BuchmannGDELOSVW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.