Görtz

Results: 55



#Item
1Cryptanalysis of KeeLoq with COPACOBANA Martin Novotný1,2, Timo Kasper1 Horst Görtz Institute for IT-Security Ruhr University Bochum 1

Cryptanalysis of KeeLoq with COPACOBANA Martin Novotný1,2, Timo Kasper1 Horst Görtz Institute for IT-Security Ruhr University Bochum 1

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2009-09-22 19:00:54
2SoK: Exploiting Network Printers Jens Müller, Vladislav Mladenov, Juraj Somorovsky, Jörg Schwenk Horst Görtz Institute for IT-Security, Ruhr University Bochum , , juraj.so

SoK: Exploiting Network Printers Jens Müller, Vladislav Mladenov, Juraj Somorovsky, Jörg Schwenk Horst Görtz Institute for IT-Security, Ruhr University Bochum , , juraj.so

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 16:01:58
    3Breaking and Fixing Gridcoin Martin Grothe, Tobias Niemann, Juraj Somorovsky, Jörg Schwenk Horst Görtz Institute for IT Security, Ruhr University Bochum {firstname.lastname}@rub.de  Abstract

    Breaking and Fixing Gridcoin Martin Grothe, Tobias Niemann, Juraj Somorovsky, Jörg Schwenk Horst Görtz Institute for IT Security, Ruhr University Bochum {firstname.lastname}@rub.de Abstract

    Add to Reading List

    Source URL: www.nds.rub.de

    Language: English - Date: 2017-08-13 20:57:42
      4Improved Information Set Decoding Decoding Random Linear Codes in O(20.054n) Alexander May, Alexander Meurer, Enrico Thomae ASIACRYPT 2011, Seoul  HORST GÖRTZ INSTITUTE FOR IT-SECURITY

      Improved Information Set Decoding Decoding Random Linear Codes in O(20.054n) Alexander May, Alexander Meurer, Enrico Thomae ASIACRYPT 2011, Seoul HORST GÖRTZ INSTITUTE FOR IT-SECURITY

      Add to Reading List

      Source URL: www5.rz.rub.de

      Language: English - Date: 2011-12-05 07:34:34
        5Automatic Recognition, Processing and Attacking of Single Sign-On Protocols with Burp Suite Christian Mainka∗ , Vladislav Mladenov† , Tim Guenther , and Jörg Schwenk Horst Görtz Institute, Ruhr-University Bochum, G

        Automatic Recognition, Processing and Attacking of Single Sign-On Protocols with Burp Suite Christian Mainka∗ , Vladislav Mladenov† , Tim Guenther , and Jörg Schwenk Horst Görtz Institute, Ruhr-University Bochum, G

        Add to Reading List

        Source URL: nds.rub.de

        Language: English - Date: 2015-10-30 05:21:14
          6Same-Origin Policy: Evaluation in Modern Browsers Jörg Schwenk, Marcus Niemietz, and Christian Mainka Horst Görtz Institute for IT Security, Chair for Network and Data Security Ruhr-University Bochum  Abstract

          Same-Origin Policy: Evaluation in Modern Browsers Jörg Schwenk, Marcus Niemietz, and Christian Mainka Horst Görtz Institute for IT Security, Chair for Network and Data Security Ruhr-University Bochum Abstract

          Add to Reading List

          Source URL: www.nds.rub.de

          Language: English - Date: 2017-07-13 05:46:45
            7Scriptless Attacks – Stealing the Pie Without Touching the Sill Mario Heiderich, Marcus Niemietz, Felix Schuster, Thorsten Holz, Jörg Schwenk Horst Görtz Institute for IT-Security Ruhr-University Bochum, Germany

            Scriptless Attacks – Stealing the Pie Without Touching the Sill Mario Heiderich, Marcus Niemietz, Felix Schuster, Thorsten Holz, Jörg Schwenk Horst Görtz Institute for IT-Security Ruhr-University Bochum, Germany

            Add to Reading List

            Source URL: www.nds.rub.de

            Language: English - Date: 2012-08-16 02:39:46
              8Leveraging Semantic Signatures for Bug Search in Binary Programs Jannik Pewny† , Felix Schuster† , Christian Rossow‡ , Lukas Bernhard† , Thorsten Holz† †  Horst Görtz Institute for IT-Security (HGI)

              Leveraging Semantic Signatures for Bug Search in Binary Programs Jannik Pewny† , Felix Schuster† , Christian Rossow‡ , Lukas Bernhard† , Thorsten Holz† † Horst Görtz Institute for IT-Security (HGI)

              Add to Reading List

              Source URL: www.ei.rub.de

              - Date: 2014-10-22 03:57:33
                9Quantifying the Security of Graphical Passwords: The Case of Android Unlock Patterns Sebastian Uellenbeck, Markus Dürmuth, Christopher Wolf, and Thorsten Holz Horst Görtz Institute for IT-Security, Ruhr-University Boch

                Quantifying the Security of Graphical Passwords: The Case of Android Unlock Patterns Sebastian Uellenbeck, Markus Dürmuth, Christopher Wolf, and Thorsten Holz Horst Görtz Institute for IT-Security, Ruhr-University Boch

                Add to Reading List

                Source URL: ei.rub.de

                - Date: 2013-09-26 05:07:39