Görtz

Results: 55



#Item
1Cryptography / Radio electronics / Block ciphers / KeeLoq / Rolling code / Data Encryption Standard / ICE

Cryptanalysis of KeeLoq with COPACOBANA Martin Novotný1,2, Timo Kasper1 Horst Görtz Institute for IT-Security Ruhr University Bochum 1

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2009-09-22 19:00:54
2

SoK: Exploiting Network Printers Jens Müller, Vladislav Mladenov, Juraj Somorovsky, Jörg Schwenk Horst Görtz Institute for IT-Security, Ruhr University Bochum , , juraj.so

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 16:01:58
    3

    Breaking and Fixing Gridcoin Martin Grothe, Tobias Niemann, Juraj Somorovsky, Jörg Schwenk Horst Görtz Institute for IT Security, Ruhr University Bochum {firstname.lastname}@rub.de Abstract

    Add to Reading List

    Source URL: www.nds.rub.de

    Language: English - Date: 2017-08-13 20:57:42
      4

      Improved Information Set Decoding Decoding Random Linear Codes in O(20.054n) Alexander May, Alexander Meurer, Enrico Thomae ASIACRYPT 2011, Seoul HORST GÖRTZ INSTITUTE FOR IT-SECURITY

      Add to Reading List

      Source URL: www5.rz.rub.de

      Language: English - Date: 2011-12-05 07:34:34
        5

        Automatic Recognition, Processing and Attacking of Single Sign-On Protocols with Burp Suite Christian Mainka∗ , Vladislav Mladenov† , Tim Guenther , and Jörg Schwenk Horst Görtz Institute, Ruhr-University Bochum, G

        Add to Reading List

        Source URL: nds.rub.de

        Language: English - Date: 2015-10-30 05:21:14
          6

          Same-Origin Policy: Evaluation in Modern Browsers Jörg Schwenk, Marcus Niemietz, and Christian Mainka Horst Görtz Institute for IT Security, Chair for Network and Data Security Ruhr-University Bochum Abstract

          Add to Reading List

          Source URL: www.nds.rub.de

          Language: English - Date: 2017-07-13 05:46:45
            7

            Scriptless Attacks – Stealing the Pie Without Touching the Sill Mario Heiderich, Marcus Niemietz, Felix Schuster, Thorsten Holz, Jörg Schwenk Horst Görtz Institute for IT-Security Ruhr-University Bochum, Germany

            Add to Reading List

            Source URL: www.nds.rub.de

            Language: English - Date: 2012-08-16 02:39:46
              8

              Leveraging Semantic Signatures for Bug Search in Binary Programs Jannik Pewny† , Felix Schuster† , Christian Rossow‡ , Lukas Bernhard† , Thorsten Holz† † Horst Görtz Institute for IT-Security (HGI)

              Add to Reading List

              Source URL: www.ei.rub.de

              - Date: 2014-10-22 03:57:33
                9

                Quantifying the Security of Graphical Passwords: The Case of Android Unlock Patterns Sebastian Uellenbeck, Markus Dürmuth, Christopher Wolf, and Thorsten Holz Horst Görtz Institute for IT-Security, Ruhr-University Boch

                Add to Reading List

                Source URL: ei.rub.de

                - Date: 2013-09-26 05:07:39
                  UPDATE