default search action
Ralf-Philipp Weinmann
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [j2]Stephen Checkoway, Jacob Maskiewicz, Christina Garman, Joshua Fried, Shaanan Cohney, Matthew Green, Nadia Heninger, Ralf-Philipp Weinmann, Eric Rescorla, Hovav Shacham:
Where did I leave my keys?: lessons from the Juniper Dual EC incident. Commun. ACM 61(11): 148-155 (2018) - 2016
- [j1]Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Ralf-Philipp Weinmann:
Practical Cryptanalysis of ISO 9796-2 and EMV Signatures. J. Cryptol. 29(3): 632-656 (2016) - [c16]Stephen Checkoway, Jacob Maskiewicz, Christina Garman, Joshua Fried, Shaanan Cohney, Matthew Green, Nadia Heninger, Ralf-Philipp Weinmann, Eric Rescorla, Hovav Shacham:
A Systematic Analysis of the Juniper Dual EC Incident. CCS 2016: 468-479 - [i9]Stephen Checkoway, Shaanan Cohney, Christina Garman, Matthew Green, Nadia Heninger, Jacob Maskiewicz, Eric Rescorla, Hovav Shacham, Ralf-Philipp Weinmann:
A Systematic Analysis of the Juniper Dual EC Incident. IACR Cryptol. ePrint Arch. 2016: 376 (2016) - 2014
- [c15]Alex Biryukov, Ivan Pustogarov, Fabrice Thill, Ralf-Philipp Weinmann:
Content and Popularity Analysis of Tor Hidden Services. ICDCS Workshops 2014: 188-193 - 2013
- [c14]Alex Biryukov, Ivan Pustogarov, Ralf-Philipp Weinmann:
Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization. IEEE Symposium on Security and Privacy 2013: 80-94 - [i8]Alex Biryukov, Ivan Pustogarov, Ralf-Philipp Weinmann:
Content and popularity analysis of Tor hidden services. CoRR abs/1308.6768 (2013) - 2012
- [c13]Alex Biryukov, Ivan Pustogarov, Ralf-Philipp Weinmann:
TorScan: Tracing Long-Lived Connections and Differential Scanning Attacks. ESORICS 2012: 469-486 - [c12]Ralf-Philipp Weinmann:
Baseband Attacks: Remote Exploitation of Memory Corruptions in Cellular Protocol Stacks. WOOT 2012: 12-21 - [i7]Alex Biryukov, Ivan Pustogarov, Ralf-Philipp Weinmann:
TorScan: Deanonymizing Connections Using Topology Leaks. ERCIM News 2012(90) (2012) - [i6]Alex Biryukov, Ivan Pustogarov, Ralf-Philipp Weinmann:
TorScan: Tracing Long-lived Connections and Differential Scanning Attacks. IACR Cryptol. ePrint Arch. 2012: 432 (2012) - 2010
- [c11]Karsten Nohl, Erik Tews, Ralf-Philipp Weinmann:
Cryptanalysis of the DECT Standard Cipher. FSE 2010: 1-18 - [c10]Thomas Dullien, Tim Kornau, Ralf-Philipp Weinmann:
A Framework for Automated Architecture-Independent Gadget Search. WOOT 2010
2000 – 2009
- 2009
- [b1]Ralf-Philipp Weinmann:
Algebraic methods in block cipher cryptanalysis. Darmstadt University of Technology, Germany, 2009, pp. 1-113 - [c9]Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Ralf-Philipp Weinmann:
Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures. CRYPTO 2009: 428-444 - [c8]Stefan Lucks, Andreas Schuler, Erik Tews, Ralf-Philipp Weinmann, Matthias Wenzel:
Attacks on the DECT Authentication Mechanisms. CT-RSA 2009: 48-65 - [c7]Dmitry Khovratovich, Ivica Nikolic, Ralf-Philipp Weinmann:
Meet-in-the-Middle Attacks on SHA-3 Candidates. FSE 2009: 228-245 - [p1]Carlos Cid, Ralf-Philipp Weinmann:
Block Ciphers: Algebraic Cryptanalysis and Gröbner Bases. Gröbner Bases, Coding, and Cryptography 2009: 307-327 - [i5]Stefan Lucks, Andreas Schuler, Erik Tews, Ralf-Philipp Weinmann, Matthias Wenzel:
Attacks on the DECT authentication mechanisms. IACR Cryptol. ePrint Arch. 2009: 78 (2009) - [i4]Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Ralf-Philipp Weinmann:
Practical Cryptanalysis of ISO/IEC 9796-2 and EMV Signatures. IACR Cryptol. ePrint Arch. 2009: 203 (2009) - 2008
- [c6]Ulrich Kühn, Andrei Pyshkin, Erik Tews, Ralf-Philipp Weinmann:
Variants of Bleichenbacher's Low-Exponent Attack on PKCS#1 RSA Signatures. Sicherheit 2008: 97-109 - 2007
- [c5]Fen Liu, Wen Ji, Lei Hu, Jintai Ding, Shuwang Lv, Andrei Pyshkin, Ralf-Philipp Weinmann:
Analysis of the SMS4 Block Cipher. ACISP 2007: 158-170 - [c4]Erik Tews, Ralf-Philipp Weinmann, Andrei Pyshkin:
Breaking 104 Bit WEP in Less Than 60 Seconds. WISA 2007: 188-202 - [i3]Erik Tews, Ralf-Philipp Weinmann, Andrei Pyshkin:
Breaking 104 bit WEP in less than 60 seconds. IACR Cryptol. ePrint Arch. 2007: 120 (2007) - 2006
- [c3]Johannes Buchmann, Andrei Pyshkin, Ralf-Philipp Weinmann:
Block Ciphers Sensitive to Gröbner Basis Attacks. CT-RSA 2006: 313-331 - [c2]Johannes Buchmann, Andrei Pyshkin, Ralf-Philipp Weinmann:
A Zero-Dimensional Gröbner Basis for AES-128. FSE 2006: 78-88 - 2005
- [i2]Johannes Buchmann, Andrei Pychkine, Ralf-Philipp Weinmann:
Block ciphers sensitive to Groebner Basis Attacks. IACR Cryptol. ePrint Arch. 2005: 200 (2005) - 2004
- [c1]Ralf-Philipp Weinmann, Kai Wirt:
Analysis of the DVB Common Scrambling Algorithm. Communications and Multimedia Security 2004: 195-207 - [i1]Johannes Buchmann, Luis Carlos Coronado García, Martin Döring, Daniela Engelbert, Christoph Ludwig, Raphael Overbeck, Arthur Schmidt, Ulrich Vollmer, Ralf-Philipp Weinmann:
Post-Quantum Signatures. IACR Cryptol. ePrint Arch. 2004: 297 (2004)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:40 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint