1![Cryptanalysis of KeeLoq with COPACOBANA Martin Novotný1,2, Timo Kasper1 Horst Görtz Institute for IT-Security Ruhr University Bochum 1 Cryptanalysis of KeeLoq with COPACOBANA Martin Novotný1,2, Timo Kasper1 Horst Görtz Institute for IT-Security Ruhr University Bochum 1](https://www.pdfsearch.io/img/4174bea91854d93ee223da334b3e80a9.jpg) | Add to Reading ListSource URL: www.hyperelliptic.orgLanguage: English - Date: 2009-09-22 19:00:54
|
---|
2![SoK: Exploiting Network Printers Jens Müller, Vladislav Mladenov, Juraj Somorovsky, Jörg Schwenk Horst Görtz Institute for IT-Security, Ruhr University Bochum , , juraj.so SoK: Exploiting Network Printers Jens Müller, Vladislav Mladenov, Juraj Somorovsky, Jörg Schwenk Horst Görtz Institute for IT-Security, Ruhr University Bochum , , juraj.so](https://www.pdfsearch.io/img/7ebe45f359cbe579dc7d66bad698f2b9.jpg) | Add to Reading ListSource URL: www.ieee-security.orgLanguage: English - Date: 2017-04-03 16:01:58
|
---|
3![Breaking and Fixing Gridcoin Martin Grothe, Tobias Niemann, Juraj Somorovsky, Jörg Schwenk Horst Görtz Institute for IT Security, Ruhr University Bochum {firstname.lastname}@rub.de Abstract Breaking and Fixing Gridcoin Martin Grothe, Tobias Niemann, Juraj Somorovsky, Jörg Schwenk Horst Görtz Institute for IT Security, Ruhr University Bochum {firstname.lastname}@rub.de Abstract](https://www.pdfsearch.io/img/a3f2976b7e27b4d07e0f1fdeb8eac648.jpg) | Add to Reading ListSource URL: www.nds.rub.deLanguage: English - Date: 2017-08-13 20:57:42
|
---|
4![Improved Information Set Decoding Decoding Random Linear Codes in O(20.054n) Alexander May, Alexander Meurer, Enrico Thomae ASIACRYPT 2011, Seoul HORST GÖRTZ INSTITUTE FOR IT-SECURITY Improved Information Set Decoding Decoding Random Linear Codes in O(20.054n) Alexander May, Alexander Meurer, Enrico Thomae ASIACRYPT 2011, Seoul HORST GÖRTZ INSTITUTE FOR IT-SECURITY](https://www.pdfsearch.io/img/a8f10e08d6574e34dd84ba6370253785.jpg) | Add to Reading ListSource URL: www5.rz.rub.deLanguage: English - Date: 2011-12-05 07:34:34
|
---|
5![Automatic Recognition, Processing and Attacking of Single Sign-On Protocols with Burp Suite Christian Mainka∗ , Vladislav Mladenov† , Tim Guenther , and Jörg Schwenk Horst Görtz Institute, Ruhr-University Bochum, G Automatic Recognition, Processing and Attacking of Single Sign-On Protocols with Burp Suite Christian Mainka∗ , Vladislav Mladenov† , Tim Guenther , and Jörg Schwenk Horst Görtz Institute, Ruhr-University Bochum, G](https://www.pdfsearch.io/img/c9d77f294bd6212f6c9ba8708921cc6f.jpg) | Add to Reading ListSource URL: nds.rub.deLanguage: English - Date: 2015-10-30 05:21:14
|
---|
6![Same-Origin Policy: Evaluation in Modern Browsers Jörg Schwenk, Marcus Niemietz, and Christian Mainka Horst Görtz Institute for IT Security, Chair for Network and Data Security Ruhr-University Bochum Abstract Same-Origin Policy: Evaluation in Modern Browsers Jörg Schwenk, Marcus Niemietz, and Christian Mainka Horst Görtz Institute for IT Security, Chair for Network and Data Security Ruhr-University Bochum Abstract](https://www.pdfsearch.io/img/f2ffa9cc59f753ebadd70467e60875a6.jpg) | Add to Reading ListSource URL: www.nds.rub.deLanguage: English - Date: 2017-07-13 05:46:45
|
---|
7![Scriptless Attacks – Stealing the Pie Without Touching the Sill Mario Heiderich, Marcus Niemietz, Felix Schuster, Thorsten Holz, Jörg Schwenk Horst Görtz Institute for IT-Security Ruhr-University Bochum, Germany Scriptless Attacks – Stealing the Pie Without Touching the Sill Mario Heiderich, Marcus Niemietz, Felix Schuster, Thorsten Holz, Jörg Schwenk Horst Görtz Institute for IT-Security Ruhr-University Bochum, Germany](https://www.pdfsearch.io/img/e4d99a09922c42aac5b1e352f28c103a.jpg) | Add to Reading ListSource URL: www.nds.rub.deLanguage: English - Date: 2012-08-16 02:39:46
|
---|
8![Leveraging Semantic Signatures for Bug Search in Binary Programs Jannik Pewny† , Felix Schuster† , Christian Rossow‡ , Lukas Bernhard† , Thorsten Holz† † Horst Görtz Institute for IT-Security (HGI) Leveraging Semantic Signatures for Bug Search in Binary Programs Jannik Pewny† , Felix Schuster† , Christian Rossow‡ , Lukas Bernhard† , Thorsten Holz† † Horst Görtz Institute for IT-Security (HGI)](https://www.pdfsearch.io/img/c2aa158e8264b722468ab5c9120b8f05.jpg) | Add to Reading ListSource URL: www.ei.rub.de- Date: 2014-10-22 03:57:33
|
---|
9![Quantifying the Security of Graphical Passwords: The Case of Android Unlock Patterns Sebastian Uellenbeck, Markus Dürmuth, Christopher Wolf, and Thorsten Holz Horst Görtz Institute for IT-Security, Ruhr-University Boch Quantifying the Security of Graphical Passwords: The Case of Android Unlock Patterns Sebastian Uellenbeck, Markus Dürmuth, Christopher Wolf, and Thorsten Holz Horst Görtz Institute for IT-Security, Ruhr-University Boch](https://www.pdfsearch.io/img/917b19dcf655cbe1e703d909a90389b4.jpg) | Add to Reading ListSource URL: ei.rub.de- Date: 2013-09-26 05:07:39
|
---|