Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Leaky McEliece: Secret Key Recovery From Highly Erroneous Side-Channel Information., , , , and . IACR Cryptol. ePrint Arch., (2023)"I don't know why I check this..." - Investigating Expert Users' Strategies to Detect Email Signature Spoofing Attacks., , , , , , , and . SOUPS @ USENIX Security Symposium, page 77-96. USENIX Association, (2022)Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E)., , , , , and . USENIX Security Symposium, page 213-230. USENIX Association, (2021)Linearly Self-Equivalent APN Permutations in Small Dimension., , and . IEEE Trans. Inf. Theory, 67 (7): 4863-4875 (2021)Mailto: Me Your Secrets. On Bugs and Features in Email End-to-End Encryption., , , , and . CNS, page 1-9. IEEE, (2020)Re: What's Up Johnny? - Covert Content Attacks on Email End-to-End Encryption., , , , and . ACNS, volume 11464 of Lecture Notes in Computer Science, page 24-42. Springer, (2019)On the classification of APN functions up to dimension five., and . Des. Codes Cryptogr., 49 (1-3): 273-288 (2008)A critique of the GNU hurd multi-server operating system., and . ACM SIGOPS Oper. Syst. Rev., 41 (4): 30-39 (2007)Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E)., , , , , and . IACR Cryptol. ePrint Arch., (2020)Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation., , and . CoRR, (2023)