Journal Articles
- Benedikt Auerbach, Bertram Poettering. Hashing Solutions Instead of Generating Problems: On the Interactive Certification of RSA Moduli. IACR PKC 2018.
[pdf] [published version] [bibtex]
- Federico Giacon, Eike Kiltz, Bertram Poettering. Hybrid Encryption in a Multi-user Setting, Revisited. IACR PKC.
[pdf] [published version] [bibtex]
- Federico Giacon, Felix Heuer, Bertram Poettering. KEM Combiners. IACR PKC.
[pdf] [published version] [bibtex]
- Giorgia Azzurra Marson, Bertram Poettering
. Security Notions for Bidirectional Channels. IACR Transactions on Symmetric Cryptology Volume 2017 Issue 1.
[pdf] [published version]
- Mark Manulis, Bertram Poettering, Douglas Stebila. Plaintext awareness in identity-based key encapsulation. International Journal of Information Security (IJIS, 2013), IACR ePrint 2012/559.
[pdf] [published version]
- Emiliano De Cristofaro, Mark Manulis, Bertram Poettering. Private discovery of common social contacts. International Journal of Information Security (IJIS, 2013), IACR ePrint 2011/026.
[pdf] [published version]
- Juan Gonz ález Nieto, Mark Manulis, Bertram Poettering, Jothi Rangasamy, Douglas Stebila. Publicly verifiable ciphertexts. Journal of Computer Security (JCS, 2013), IACR ePrint 2012/357.
[pdf] [published version]
Articles at refereed conferences
- Jean Paul Degabriele, Pooya Farshim, Bertram Poettering. A More Cautious Approach to Security Against Mass Surveillance. FSE 2015.
- Bertram Poettering, Dale Sibborn. Cold boot attacks in the discrete logarithm setting. CT-RSA 2015 .
- Kenneth G. Paterson, Bertram Poettering, Jacob C.N. Schuldt. Big Bias Hunting in Amazonia: Large-Scale Computation and Exploitation of RC4 Biases (Invited Paper). ASIACRYPT 2014.
[published version]
- Bertram Poettering, Douglas Stebila. Double-Authentication-Preventing Signatures. ESORICS 2014, IACR ePrint 2013/333.
[pdf] [published version]
- Giorgia Azzurra Marson, Bertram Poettering. Even More Practical Secure Logging: Tree-Based Seekable Sequential Key Generators. ESORICS 2014.
[published version]
- Alexandre Pinto, Bertram Poettering, Jacob C.N. Schuldt. Multi-Recipient Encryption, Revisited. ASIACCS 2014.
[url]
- Kenneth G. Paterson, Bertram Poettering, Jacob C.N. Schuldt. Plaintext Recovery Attacks Against WPA/TKIP. Fast Software Encryption 2014 (to appear).
[pdf]
- Colin Boyd, Cas Cremers, Michele Feltz, Kenneth G. Paterson, Bertram Poettering, Douglas Stebila. ASICS: Authenticated Key Exchange Security Incorporating Certification Systems. ESORICS 2013, IACR ePrint 2013/398.
[pdf] [published version]
- Nadhem AlFardan, Daniel J. Bernstein, Kenneth G. Paterson, Bertram Poettering, Jacob C.N. Schuldt. On the Security of RC4 in TLS. USENIX Security 2013.
[url]
- Giorgia Azzurra Marson, Bertram Poettering. Practical Secure Logging: Seekable Sequential Key Generators. ESORICS 2013, IACR ePrint 2013/397.
[pdf] [published version] [url]
- Nils Fleischhacker, Felix Günther, Franziskus Kiefer, Mark Manulis, Bertram Poettering. Pseudorandom signatures. ASIACCS 2013, IACR ePrint 2011/673.
[pdf] [url] [bibtex]
- Eduarda S. V. Freire, Kenneth G. Paterson, Bertram Poettering. Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes. CT-RSA 2013, IACR ePrint 2012/645.
[pdf] [published version]
- Mark Manulis, Bertram Poettering. Affiliation-Hiding Authentication with Minimal Bandwidth Consumption. WISTP 2011 (Best student paper).
[published version]
- Mark Manulis, Bertram Poettering. Practical affiliation-hiding authentication from improved polynomial interpolation. ASIACCS 2011, IACR ePrint 2010/659.
[pdf] [url]
- Mark Manulis, Bertram Poettering, Gene Tsudik. Affiliation-Hiding Key Exchange with Untrusted Group Authorities. ACNS 2010.
[published version]
- Mark Manulis, Benny Pinkas, Bertram Poettering. Privacy-Preserving Group Discovery with Linear Complexity. ACNS 2010.
[published version]
- Christina Brzuska, Heike Busch, Özgür Dagdelen, Marc Fischlin, Martin Franz, Stefan Katzenbeisser, Mark Manulis, Cristina Onete, Andreas Peter, Bertram Poettering, Dominique Schröder. Redactable Signatures for Tree-Structured Data: Definitions and Constructions. ACNS 2010.
[published version]
- Mark Manulis, Bertram Poettering, Gene Tsudik. Taming Big Brother Ambitions: More Privacy for Secret Handshakes. PETS 2010.
[published version]
Surveys
- Mark Manulis, Nils Fleischhacker, Felix Günther, Franziskus Kiefer, Bertram Poettering. Group Signatures: Authentication with Privacy. In cooperation with BSI (German Federal Office for Information Security), 2012
See also the project website (in German)..
[url]
Preprints
- Jason Crampton, Naomi Farley, Gregory Gutin, Mark Jones, Bertram Poettering. Cryptographic Enforcement of Information Flow Policies without Public Information. arXiv:1410.5567.
[url]
- Bertram Poettering, Douglas Stebila. Double-Authentication-Preventing Signatures. ESORICS 2014, IACR ePrint 2013/333.
[pdf] [published version]
- Felix Günther, Bertram Poettering. Linkable Message Tagging: Solving the key distribution problem of signature schemes. IACR ePrint 2014/014.
[pdf]
- Kenneth G. Paterson, Bertram Poettering, Jacob C.N. Schuldt. Plaintext Recovery Attacks Against WPA/TKIP. Fast Software Encryption 2014 (to appear).
[pdf]
- Colin Boyd, Cas Cremers, Michele Feltz, Kenneth G. Paterson, Bertram Poettering, Douglas Stebila. ASICS: Authenticated Key Exchange Security Incorporating Certification Systems. ESORICS 2013, IACR ePrint 2013/398.
[pdf] [published version]
- Nadhem AlFardan, Daniel J. Bernstein, Kenneth G. Paterson, Bertram Poettering, Jacob C.N. Schuldt. On the Security of RC4 in TLS and WPA. .
[url]
- Mark Manulis, Bertram Poettering, Douglas Stebila. Plaintext awareness in identity-based key encapsulation. International Journal of Information Security (IJIS, 2013), IACR ePrint 2012/559.
[pdf] [published version]
- Giorgia Azzurra Marson, Bertram Poettering. Practical Secure Logging: Seekable Sequential Key Generators. ESORICS 2013, IACR ePrint 2013/397.
[pdf] [published version] [url]
- Emiliano De Cristofaro, Mark Manulis, Bertram Poettering. Private discovery of common social contacts. International Journal of Information Security (IJIS, 2013), IACR ePrint 2011/026.
[pdf] [published version]
- Nils Fleischhacker, Felix Günther, Franziskus Kiefer, Mark Manulis, Bertram Poettering. Pseudorandom signatures. ASIACCS 2013, IACR ePrint 2011/673.
[pdf] [url] [bibtex]
- Juan Gonz ález Nieto, Mark Manulis, Bertram Poettering, Jothi Rangasamy, Douglas Stebila. Publicly verifiable ciphertexts. Journal of Computer Security (JCS, 2013), IACR ePrint 2012/357.
[pdf] [published version]
- Eduarda S. V. Freire, Kenneth G. Paterson, Bertram Poettering. Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes. CT-RSA 2013, IACR ePrint 2012/645.
[pdf] [published version]
- Mark Manulis, Bertram Poettering. Practical affiliation-hiding authentication from improved polynomial interpolation. ASIACCS 2011, IACR ePrint 2010/659.
[pdf] [url]
Theses
- Bertram Poettering. Privacy Protection for Authentication Protocols. Ph.D. thesis (Technical University Darmstadt, Jan 2012).
[url]
- Bertram Poettering. Incidence Geometry and its Applications in Cryptography. Master thesis in Mathematics (University of Hamburg, Mar 2009).
- Bertram Poettering. Very Long Baseline Interferometry (VLBI) on Longwave by Synchronization by Aid of Time Signals. Master thesis in Computer Science (University of Hamburg, Feb 2008).