Folgen
Ralf-Philipp Weinmann
Ralf-Philipp Weinmann
Comsecuris GmbH
Bestätigte E-Mail-Adresse bei comsecuris.com - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Breaking 104 bit WEP in less than 60 seconds
E Tews, RP Weinmann, A Pyshkin
Information Security Applications: 8th International Workshop, WISA 2007 …, 2007
3702007
Trawling for tor hidden services: Detection, measurement, deanonymization
A Biryukov, I Pustogarov, RP Weinmann
2013 IEEE Symposium on Security and Privacy, 80-94, 2013
3112013
Content and popularity analysis of Tor hidden services
A Biryukov, I Pustogarov, F Thill, RP Weinmann
2014 IEEE 34th International Conference on Distributed Computing Systems …, 2014
1922014
Analysis of the SMS4 block cipher
F Liu, W Ji, L Hu, J Ding, S Lv, A Pyshkin, RP Weinmann
Information Security and Privacy: 12th Australasian Conference, ACISP 2007 …, 2007
1392007
A systematic analysis of the Juniper Dual EC incident
S Checkoway, J Maskiewicz, C Garman, J Fried, S Cohney, M Green, ...
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
1132016
Baseband Attacks: Remote Exploitation of Memory Corruptions in Cellular Protocol Stacks.
RP Weinmann
WOOT, 12-21, 2012
1022012
iOS Hacker's Handbook
C Miller, D Blazakis, D DaiZovi, S Esser, V Iozzo, RP Weinmann
John Wiley & Sons, 2012
882012
MutantXL
J Ding, J Buchmann, MSE Mohamed, W Mohamed, RP Weinmann
Proceedings of the 1st international conference on Symbolic Computation and …, 2008
792008
A Framework for Automated {Architecture-Independent} Gadget Search
T Dullien, T Kornau, RP Weinmann
4th USENIX Workshop on Offensive Technologies (WOOT 10), 2010
712010
Block Ciphers Sensitive to Gröbner Basis Attacks.
J Buchmann, A Pyshkin, RP Weinmann
CT-RSA 3860, 313-331, 2006
632006
A zero-dimensional Gröbner basis for AES-128
J Buchmann, A Pyshkin, RP Weinmann
International Workshop on Fast Software Encryption, 78-88, 2006
552006
Analysis of the dvb common scrambling algorithm
RP Weinmann, K Wirt
Communications and Multimedia Security, 195-207, 2005
512005
Cryptanalysis of the DECT standard cipher
K Nohl, E Tews, RP Weinmann
International Workshop on Fast Software Encryption, 1-18, 2010
442010
Attacks on the DECT authentication mechanisms
S Lucks, A Schuler, E Tews, RP Weinmann, M Wenzel
Cryptographers’ Track at the RSA Conference, 48-65, 2009
412009
Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures
JS Coron, D Naccache, M Tibouchi, RP Weinmann
Annual International Cryptology Conference, 428-444, 2009
262009
Post-quantum signatures
J Buchmann, C Coronado, M Döring, D Engelbert, C Ludwig, R Overbeck, ...
Cryptology ePrint Archive, 2004
252004
All your baseband are belong to us
RP Weinmann
hack. lu, 2010
242010
Meet-in-the-middle attacks on SHA-3 candidates
D Khovratovich, I Nikolić, RP Weinmann
International Workshop on Fast Software Encryption, 228-245, 2009
232009
Block ciphers: algebraic cryptanalysis and Groebner bases
C Cid, RP Weinmann
Groebner bases, coding, and cryptography, 307-327, 2009
212009
Evaluating algebraic attacks on the AES
RP Weinmann
Diplom thesis, Technische Universität Darmstadt, 2003
162003
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20