Journal Articles
  • Benedikt Auerbach, Bertram Poettering. Hashing Solutions Instead of Generating Problems: On the Interactive Certification of RSA Moduli. IACR PKC 2018.
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]

  • Federico Giacon, Eike Kiltz, Bertram Poettering. Hybrid Encryption in a Multi-user Setting, Revisited. IACR PKC.
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]

  • Federico Giacon, Felix Heuer, Bertram Poettering. KEM Combiners. IACR PKC.
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]

  • Giorgia Azzurra Marson, Bertram Poettering . Security Notions for Bidirectional Channels. IACR Transactions on Symmetric Cryptology Volume 2017 Issue 1.
    PDF [pdf] Springer Link [published version]

  • Mark Manulis, Bertram Poettering, Douglas Stebila. Plaintext awareness in identity-based key encapsulation. International Journal of Information Security (IJIS, 2013), IACR ePrint 2012/559.
    PDF [pdf] Springer Link [published version]

  • Emiliano De Cristofaro, Mark Manulis, Bertram Poettering. Private discovery of common social contacts. International Journal of Information Security (IJIS, 2013), IACR ePrint 2011/026.
    PDF [pdf] Springer Link [published version]

  • Juan Gonz ález Nieto, Mark Manulis, Bertram Poettering, Jothi Rangasamy, Douglas Stebila. Publicly verifiable ciphertexts. Journal of Computer Security (JCS, 2013), IACR ePrint 2012/357.
    PDF [pdf] Springer Link [published version]

Articles at refereed conferences
  • Jean Paul Degabriele, Pooya Farshim, Bertram Poettering. A More Cautious Approach to Security Against Mass Surveillance. FSE 2015.


  • Bertram Poettering, Dale Sibborn. Cold boot attacks in the discrete logarithm setting. CT-RSA 2015 .


  • Kenneth G. Paterson, Bertram Poettering, Jacob C.N. Schuldt. Big Bias Hunting in Amazonia: Large-Scale Computation and Exploitation of RC4 Biases (Invited Paper). ASIACRYPT 2014.
    Springer Link [published version]

  • Bertram Poettering, Douglas Stebila. Double-Authentication-Preventing Signatures. ESORICS 2014, IACR ePrint 2013/333.
    PDF [pdf] Springer Link [published version]

  • Giorgia Azzurra Marson, Bertram Poettering. Even More Practical Secure Logging: Tree-Based Seekable Sequential Key Generators. ESORICS 2014.
    Springer Link [published version]

  • Alexandre Pinto, Bertram Poettering, Jacob C.N. Schuldt. Multi-Recipient Encryption, Revisited. ASIACCS 2014.
    URL [url]

  • Kenneth G. Paterson, Bertram Poettering, Jacob C.N. Schuldt. Plaintext Recovery Attacks Against WPA/TKIP. Fast Software Encryption 2014 (to appear).
    PDF [pdf]

  • Colin Boyd, Cas Cremers, Michele Feltz, Kenneth G. Paterson, Bertram Poettering, Douglas Stebila. ASICS: Authenticated Key Exchange Security Incorporating Certification Systems. ESORICS 2013, IACR ePrint 2013/398.
    PDF [pdf] Springer Link [published version]

  • Nadhem AlFardan, Daniel J. Bernstein, Kenneth G. Paterson, Bertram Poettering, Jacob C.N. Schuldt. On the Security of RC4 in TLS. USENIX Security 2013.
    URL [url]

  • Giorgia Azzurra Marson, Bertram Poettering. Practical Secure Logging: Seekable Sequential Key Generators. ESORICS 2013, IACR ePrint 2013/397.
    PDF [pdf] Springer Link [published version] URL [url]

  • Nils Fleischhacker, Felix Günther, Franziskus Kiefer, Mark Manulis, Bertram Poettering. Pseudorandom signatures. ASIACCS 2013, IACR ePrint 2011/673.
    PDF [pdf] URL [url] Bibtex [bibtex]

  • Eduarda S. V. Freire, Kenneth G. Paterson, Bertram Poettering. Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes. CT-RSA 2013, IACR ePrint 2012/645.
    PDF [pdf] Springer Link [published version]

  • Mark Manulis, Bertram Poettering. Affiliation-Hiding Authentication with Minimal Bandwidth Consumption. WISTP 2011 (Best student paper).
    Springer Link [published version]

  • Mark Manulis, Bertram Poettering. Practical affiliation-hiding authentication from improved polynomial interpolation. ASIACCS 2011, IACR ePrint 2010/659.
    PDF [pdf] URL [url]

  • Mark Manulis, Bertram Poettering, Gene Tsudik. Affiliation-Hiding Key Exchange with Untrusted Group Authorities. ACNS 2010.
    Springer Link [published version]

  • Mark Manulis, Benny Pinkas, Bertram Poettering. Privacy-Preserving Group Discovery with Linear Complexity. ACNS 2010.
    Springer Link [published version]

  • Christina Brzuska, Heike Busch, Özgür Dagdelen, Marc Fischlin, Martin Franz, Stefan Katzenbeisser, Mark Manulis, Cristina Onete, Andreas Peter, Bertram Poettering, Dominique Schröder. Redactable Signatures for Tree-Structured Data: Definitions and Constructions. ACNS 2010.
    Springer Link [published version]

  • Mark Manulis, Bertram Poettering, Gene Tsudik. Taming Big Brother Ambitions: More Privacy for Secret Handshakes. PETS 2010.
    Springer Link [published version]

Surveys
  • Mark Manulis, Nils Fleischhacker, Felix Günther, Franziskus Kiefer, Bertram Poettering. Group Signatures: Authentication with Privacy. In cooperation with BSI (German Federal Office for Information Security), 2012 See also the project website (in German)..
    URL [url]

Preprints
  • Jason Crampton, Naomi Farley, Gregory Gutin, Mark Jones, Bertram Poettering. Cryptographic Enforcement of Information Flow Policies without Public Information. arXiv:1410.5567.
    URL [url]

  • Bertram Poettering, Douglas Stebila. Double-Authentication-Preventing Signatures. ESORICS 2014, IACR ePrint 2013/333.
    PDF [pdf] Springer Link [published version]

  • Felix Günther, Bertram Poettering. Linkable Message Tagging: Solving the key distribution problem of signature schemes. IACR ePrint 2014/014.
    PDF [pdf]

  • Kenneth G. Paterson, Bertram Poettering, Jacob C.N. Schuldt. Plaintext Recovery Attacks Against WPA/TKIP. Fast Software Encryption 2014 (to appear).
    PDF [pdf]

  • Colin Boyd, Cas Cremers, Michele Feltz, Kenneth G. Paterson, Bertram Poettering, Douglas Stebila. ASICS: Authenticated Key Exchange Security Incorporating Certification Systems. ESORICS 2013, IACR ePrint 2013/398.
    PDF [pdf] Springer Link [published version]

  • Nadhem AlFardan, Daniel J. Bernstein, Kenneth G. Paterson, Bertram Poettering, Jacob C.N. Schuldt. On the Security of RC4 in TLS and WPA. .
    URL [url]

  • Mark Manulis, Bertram Poettering, Douglas Stebila. Plaintext awareness in identity-based key encapsulation. International Journal of Information Security (IJIS, 2013), IACR ePrint 2012/559.
    PDF [pdf] Springer Link [published version]

  • Giorgia Azzurra Marson, Bertram Poettering. Practical Secure Logging: Seekable Sequential Key Generators. ESORICS 2013, IACR ePrint 2013/397.
    PDF [pdf] Springer Link [published version] URL [url]

  • Emiliano De Cristofaro, Mark Manulis, Bertram Poettering. Private discovery of common social contacts. International Journal of Information Security (IJIS, 2013), IACR ePrint 2011/026.
    PDF [pdf] Springer Link [published version]

  • Nils Fleischhacker, Felix Günther, Franziskus Kiefer, Mark Manulis, Bertram Poettering. Pseudorandom signatures. ASIACCS 2013, IACR ePrint 2011/673.
    PDF [pdf] URL [url] Bibtex [bibtex]

  • Juan Gonz ález Nieto, Mark Manulis, Bertram Poettering, Jothi Rangasamy, Douglas Stebila. Publicly verifiable ciphertexts. Journal of Computer Security (JCS, 2013), IACR ePrint 2012/357.
    PDF [pdf] Springer Link [published version]

  • Eduarda S. V. Freire, Kenneth G. Paterson, Bertram Poettering. Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes. CT-RSA 2013, IACR ePrint 2012/645.
    PDF [pdf] Springer Link [published version]

  • Mark Manulis, Bertram Poettering. Practical affiliation-hiding authentication from improved polynomial interpolation. ASIACCS 2011, IACR ePrint 2010/659.
    PDF [pdf] URL [url]

Theses
  • Bertram Poettering. Privacy Protection for Authentication Protocols. Ph.D. thesis (Technical University Darmstadt, Jan 2012).
    URL [url]

  • Bertram Poettering. Incidence Geometry and its Applications in Cryptography. Master thesis in Mathematics (University of Hamburg, Mar 2009).


  • Bertram Poettering. Very Long Baseline Interferometry (VLBI) on Longwave by Synchronization by Aid of Time Signals. Master thesis in Computer Science (University of Hamburg, Feb 2008).