An extensive classification and analysis of attacks against Physical Unclonable Functions (PUFs)
Anagnostopoulos, Nikolaos Athanasios; Gabmeyer, Sebastian; Arul, Tolga; Katzenbeisser, Stefan
27th Crypto-Day
[Conference Proceedings]

Revisiting the Expected Cost of Solving uSVP and Applications to LWE
Albrecht, Martin; Göpfert, Florian; Vidria, Fernando; Wunderer, Thomas
ASIACRYPT 2017 - Advances in Cryptology
[Conference Proceedings]

Booters and certificates: An overview of TLS in the DDoS-as-a-Service landscape
Kuhnert, Benjamin; Steinberger, Jessica; Sperotto, Anna; Baier, Harald; Pras, Aiko
2nd International Conference on Advances in Computation, Communications and Services (ACCSE 2017)
[Conference Proceedings]

Approxis: a fast, robust, lightweight and approximate Disassembler considered in the field of memory forensics
Liebler, Lorenz; Baier, Harald
9th International Conference on Digital Forensics & Cyber Crime
[Conference Proceedings]

Design- und Implementierungsaspekte mobiler abgeleiteter IDs
Träder, Daniel; Zeier, Alexander; Heinemann, Andreas
D-A-CH Security 2017 Tagungsband
[Conference Proceedings]

Zur Wirksamkeit von Security Awareness Maßnahmen
Schembre, G.; Heinemann, Andreas
D-A-CH Security 2017 Tagungsband
[Conference Proceedings]

Towards enhancing the visual analysis of interdomain routing
Ulmer, Alex; Kohlhammer, Jörn; Shulman, Haya
International Joint Conference on Computer Vision and Computer Graphics Theory and Applications (VISIGRAPP) 12, 2017, Porto>
[Conference Paper]

Let’s get physical: Lässt sich User Experience physiologisch erfassen?
Gerber, Nina
Mensch und Computer 2016 - Tagungsband
[Conference Proceedings]

Sicherheitsaspekte und Vergleich der Blockchiffren LED und TEA
Pauer, Christof; Appel, Michael; Wiesmaier, Alex

Comparison of two Lightweight Stream Ciphers: MICKEY 2.0 \& WG-8
Patrick Jattke, Matthias Senker, Alex Wiesmaier

Comparison of Lightweight Stream Ciphers: MICKEY 2.0, WG-8, Grain and Trivium
Lennart Dietrich, Matthias Senker, Lulzim Murati, Patrick Jattke, Alex Wiesmaier

ECDSA and QUARTZ in Comparison with RSA
Patrick Lieb, Markus Schmidt, Alex Wiesmaier

A Survey on Protocols securing the Internet of Things: DTLS, IPSec and IEEE 802.11i
René Röpke, Timo Thräm, Johannes Wagener, Alex Wiesmaier

Security aspects and comparison of block ciphers LED and TEA
Pauer, Christof; Appel, Michael; Wiesmaier, Alex

A comparison of block ciphers SIMON, SPECK, and KATAN
Andreas Bossert, Steven Cooper, Alex Wiesmaier

Block ciphers for the IoT — SIMON, SPECK, KATAN, LED, TEA, PRESENT, and SEA compared
Appel, Michael; Bossert, Andreas; Cooper, Steven; Kußmaul, Tobias; Löffler, Johannes; Pauer, Christof; Wiesmaier, Alexander

A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol
Dowling, Benjamin; Fischlin, Marc; Günther, Felix; Stebila, Douglas
Cryptology ePrint Archive, p.1-33
[Journal Article]

Security Proofs for Participation Privacy and Stronger Verifiability for Helios
Bernhard, David; Kulyk, Oksana; Volkamer, Melanie

LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality (Full Paper)
Braun, Johannes; Buchmann, Johannes; Demirel, Denise; Fujiwara, Mikio; Geihs, Matthias; Moriai, Shiho; Sasaki, Masahide; Waseda, Atsushi
ASIA CCS '17: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, p.1-13
[Conference Proceedings]

Post-Quantum Attribute-Based Signatures from Lattice Assumptions
Bansarkhani, Rachid El; El Kaafarani, Ali
Cryptology ePrint Archive, p.1-28
[Journal Article]

Revisiting the Hybrid Attack: Improved Analysis and Refined Security Estimates
Wunderer, Thomas
Cryptology ePrint Archive, p.1-35
[Journal Article]

On the Security \& Privacy of Internet of Things Architectures and Systems
Vasilomanolakis, Emmanouil; Daubert, Jörg; Luthra, Manisha; Gazis, Vangelis; Wiesmaier, Alex; Kikiras, Panayotis
2015 International Workshop on Secure Internet of Things (SIoT), p.49-57
[Conference Proceedings]

Advanced Remote Firmware Upgrades Using TPM 2.0
Fuchs, Andreas; Krauß, Christoph; Repp, Jürgen
Proceedings of the 31th International Conference on ICT Systems Security and Privacy Protection (IFIP SEC)
[Conference Proceedings]

Evaluation of Lightweight TPMs for Automotive Software Updates over the Air
Petri, Richard; Springer, Markus; Zelle, Daniel; McDonald, Ira; Fuchs, Andreas; Krauß, Christoph
4th Embedded Security in Cars (escar) USA
[Conference Proceedings]

Zur Benutzbarkeit der AusweisApp2
Willomitzer, Jörg; Heinemann, Andreas; Margraf, Marian
Mensch & Computer Workshopband
[Conference Proceedings]

Usability-Untersuchung eines Papierprototypen für eine mobile Online-Ausweisfunktion des Personalausweises
Kostic, Sandra; Heinemann, Andreas; Margraf, Marian
GI-Jahrestagung, p.519-527
[Conference Proceedings]

Workshop: Nutzerzentrierte Sicherheit - NzS 2016
Heinemann, Andreas; Lange, Steffen; Margraf, Marian; Willomitzer, Jörg
GI-Jahrestagung, p.485-486
[Conference Proceedings]

In Whom Do We Trust - Sharing Security Events
Steinberger, J.; Kuhnert, B.; Sperotto, A.; Baier, H.; Pras, A.
Management and Security in the Age of Hyperconnectivity, p.111-124

Ludo - kids playing Distributed Denial of Service
Steinberger, J.; Santanna, J.; Spatharas, E.; Amler, H.; Breuer, N.; others
TERENA Networking Conf. (TNC16)
[Conference Proceedings]

Collaborative DDoS defense using flow-based security event information
Steinberger, J.; Kuhnert, B.; Sperotto, A.; Baier, H.; Pras, A.
NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium, p.516-522
[Conference Proceedings]