Ralf-Philipp Weinmann
Ralf-Philipp Weinmann
Director, Comsecuris UG (haftungsbeschränkt)
Verified email at comsecuris.com - Homepage
Title
Cited by
Cited by
Year
Pinocchio: Nearly practical verifiable computation
B Parno, J Howell, C Gentry, M Raykova
2013 IEEE Symposium on Security and Privacy, 238-252, 2013
864*2013
Breaking 104 bit WEP in less than 60 seconds
E Tews, RP Weinmann, A Pyshkin
International Workshop on Information Security Applications, 188-202, 2007
3112007
Content and popularity analysis of Tor hidden services
A Biryukov, I Pustogarov, F Thill, RP Weinmann
2014 IEEE 34th International Conference on Distributed Computing Systems …, 2014
1082014
Analysis of the SMS4 block cipher
F Liu, W Ji, L Hu, J Ding, S Lv, A Pyshkin, RP Weinmann
Australasian Conference on Information Security and Privacy, 158-170, 2007
952007
iOS Hacker's Handbook
C Miller, D Blazakis, D DaiZovi, S Esser, V Iozzo, RP Weinmann
John Wiley & Sons, 2012
802012
MutantXL
J Ding, J Buchmann, MSE Mohamed, WSAE Mohamed, RP Weinmann
722008
Baseband Attacks: Remote Exploitation of Memory Corruptions in Cellular Protocol Stacks.
RP Weinmann
WOOT, 12-21, 2012
702012
A systematic analysis of the Juniper Dual EC incident
S Checkoway, J Maskiewicz, C Garman, J Fried, S Cohney, M Green, ...
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
692016
A Framework for Automated Architecture-Independent Gadget Search.
T Dullien, T Kornau, RP Weinmann
WOOT, 2010
602010
Block ciphers sensitive to Gröbner basis attacks
J Buchmann, A Pyshkin, RP Weinmann
Cryptographers’ Track at the RSA Conference, 313-331, 2006
502006
Analysis of the dvb common scrambling algorithm
RP Weinmann, K Wirt
Communications and Multimedia Security, 195-207, 2005
442005
Cryptographic hash function Edon-R′
D Gligoroski, RS Ødegård, M Mihova, SJ Knapskog, A Drápal, V Klima, ...
2009 Proceedings of the 1st International Workshop on Security and …, 2009
412009
A zero-dimensional Gröbner basis for AES-128
J Buchmann, A Pyshkin, RP Weinmann
International Workshop on Fast Software Encryption, 78-88, 2006
402006
Cryptanalysis of the DECT standard cipher
K Nohl, E Tews, RP Weinmann
International Workshop on Fast Software Encryption, 1-18, 2010
392010
Attacks on the DECT authentication mechanisms
S Lucks, A Schuler, E Tews, RP Weinmann, M Wenzel
Cryptographers’ Track at the RSA Conference, 48-65, 2009
352009
Post-Quantum Signatures.
JA Buchmann, LCC García, M Döring, D Engelbert, C Ludwig, ...
IACR Cryptol. ePrint Arch. 2004, 297, 2004
242004
Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures
JS Coron, D Naccache, M Tibouchi, RP Weinmann
Annual International Cryptology Conference, 428-444, 2009
232009
Meet-in-the-middle attacks on SHA-3 candidates
D Khovratovich, I Nikolić, RP Weinmann
International Workshop on Fast Software Encryption, 228-245, 2009
212009
All your baseband are belong to us
RP Weinmann
hack. lu, 2010
202010
Block ciphers: algebraic cryptanalysis and Groebner bases
C Cid, RP Weinmann
Groebner bases, coding, and cryptography, 307-327, 2009
162009
The system can't perform the operation now. Try again later.
Articles 1–20