What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Jörg Schwenk
Google Scholar
80
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/uss
Towards Internet-Based State Learning of TLS State Machines.
Marcel Maehren
Nurullah Erinola
Robert Merget
Jörg Schwenk
Juraj Somorovsky
2024
conf/uss
With Great Power Come Great Side Channels: Statistical Timing Side-Channel Analyses with Bounded Type-1 Errors.
Martin Dunsche
Marcel Maehren
Nurullah Erinola
Robert Merget
Nicolai Bissantz
Juraj Somorovsky
Jörg Schwenk
2024
conf/uss
Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation.
Fabian Bäumer
Marcus Brinkmann
Jörg Schwenk
2023
conf/ccs
Finding All Cross-Site Needles in the DOM Stack: A Comprehensive Methodology for the Automatic XS-Leak Detection in Web Browsers.
Dominik Trevor Noß
Lukas Knittel
Christian Mainka
Marcus Niemietz
Jörg Schwenk
2023
conf/uss
Isolated and Exhausted: Attacking Operating Systems via Site Isolation in the Browser.
Matthias Gierlings
Marcus Brinkmann
Jörg Schwenk
2023
conf/uss
We Really Need to Talk About Session Tickets: A Large-Scale Analysis of Cryptographic Dangers with TLS Session Tickets.
Sven Hebrok
Simon Nachtigall
Marcel Maehren
Nurullah Erinola
Robert Merget
Juraj Somorovsky
Jörg Schwenk
2023
conf/uss
Exploring the Unknown DTLS Universe: Analysis of the DTLS Server Ecosystem on the Internet.
Nurullah Erinola
Marcel Maehren
Robert Merget
Juraj Somorovsky
Jörg Schwenk
2023
conf/uss
Every Signature is Broken: On the Insecurity of Microsoft Office's OOXML Signatures.
Simon Rohlmann
Vladislav Mladenov
Christian Mainka
Daniel Hirschberger
Jörg Schwenk
2022
conf/ccs
DISTINCT: Identity Theft using In-Browser Communications in Dual-Window Single Sign-On.
Louis Jannett
Vladislav Mladenov
Christian Mainka
Jörg Schwenk
2022
conf/uss
TLS-Anvil: Adapting Combinatorial Testing for TLS Libraries.
Marcel Maehren
Philipp Nieting
Sven Hebrok
Robert Merget
Juraj Somorovsky
Jörg Schwenk
2022
conf/uss
Oops... Code Execution and Content Spoofing: The First Comprehensive Analysis of OpenDocument Signatures.
Simon Rohlmann
Christian Mainka
Vladislav Mladenov
Jörg Schwenk
2021
conf/ccs
XSinator.com: From a Formal Model to the Automatic Evaluation of Cross-Site Leaks in Web Browsers.
Lukas Knittel
Christian Mainka
Marcus Niemietz
Dominik Trevor Noß
Jörg Schwenk
2021
conf/uss
Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E).
Robert Merget
Marcus Brinkmann
Nimrod Aviram
Juraj Somorovsky
Johannes Mittmann
Jörg Schwenk
2021
conf/uss
ALPACA: Application Layer Protocol Confusion - Analyzing and Mitigating Cracks in TLS Authentication.
Marcus Brinkmann
Christian Dresen
Robert Merget
Damian Poddebniak
Jens Müller
Juraj Somorovsky
Jörg Schwenk
Sebastian Schinzel
2021
conf/sp
Breaking the Specification: PDF Certification.
Simon Rohlmann
Vladislav Mladenov
Christian Mainka
Jörg Schwenk
2021
conf/ndss
Processing Dangerous Paths - On Security and Privacy of the Portable Document Format.
Jens Müller
Dominik Noss
Christian Mainka
Vladislav Mladenov
Jörg Schwenk
2021
conf/ctrsa
SoK: Game-Based Security Models for Group Key Exchange.
Bertram Poettering
Paul Rösler
Jörg Schwenk
Douglas Stebila
2020
journals/popets
T0RTT: Non-Interactive Immediate Forward-Secret Single-Pass Circuit Construction.
Sebastian Lauer
Kai Gellert
Robert Merget
Tobias Handirk
Jörg Schwenk
2020
conf/ccs
Mitigation of Attacks on Email End-to-End Encryption.
Jörg Schwenk
Marcus Brinkmann
Damian Poddebniak
Jens Müller
Juraj Somorovsky
Sebastian Schinzel
2020
conf/acns
Powerless Security.
Stefan Hoffmann
Jens Müller
Jörg Schwenk
Gerd Bumiller
2020
conf/cns
Mailto: Me Your Secrets. On Bugs and Features in Email End-to-End Encryption.
Jens Müller
Marcus Brinkmann
Damian Poddebniak
Sebastian Schinzel
Jörg Schwenk
2020
conf/pkc
Privacy-Preserving Authenticated Key Exchange and the Case of IKEv2.
Sven Schäge
Jörg Schwenk
Sebastian Lauer
2020
conf/pkc
Flexible Authenticated and Confidential Channel Establishment (fACCE): Analyzing the Noise Protocol Framework.
Benjamin Dowling
Paul Rösler
Jörg Schwenk
2019
conf/ccs
1 Trillion Dollar Refund: How To Spoof PDF Signatures.
Vladislav Mladenov
Christian Mainka
Karsten Meyer zu Selhausen
Martin Grothe
Jörg Schwenk
2019
conf/ccs
Practical Decryption exFiltration: Breaking PDF Encryption.
Jens Müller
Fabian Ising
Vladislav Mladenov
Christian Mainka
Sebastian Schinzel
Jörg Schwenk
2019
conf/uss
Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities.
Robert Merget
Juraj Somorovsky
Nimrod Aviram
Craig Young
Janis Fliegenschmidt
Jörg Schwenk
Yuval Shavitt
2019
conf/uss
"Johnny, you are fired!" - Spoofing OpenPGP and S/MIME Signatures in Emails.
Jens Müller
Marcus Brinkmann
Damian Poddebniak
Hanno Böck
Sebastian Schinzel
Juraj Somorovsky
Jörg Schwenk
2019
conf/acns
Re: What's Up Johnny? - Covert Content Attacks on Email End-to-End Encryption.
Jens Müller
Marcus Brinkmann
Damian Poddebniak
Sebastian Schinzel
Jörg Schwenk
2018
conf/uss
The Dangers of Key Reuse: Practical Attacks on IPsec IKE.
Dennis Felsch
Martin Grothe
Jörg Schwenk
Adam Czubak
Marcin Szymanek
2018
conf/uss
Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels.
Damian Poddebniak
Christian Dresen
Jens Müller
Fabian Ising
Sebastian Schinzel
Simon Friedberger
Juraj Somorovsky
Jörg Schwenk
2018
conf/eurosp
More is Less: On the End-to-End Security of Group Chats in Signal, WhatsApp, and Threema.
Paul Rösler
Christian Mainka
Jörg Schwenk
2017
journals/joc
Authenticated Confidential Channel Establishment and the Security of TLS-DHE.
Tibor Jager
Florian Kohlar
Sven Schäge
Jörg Schwenk
2017
conf/ccs
SECRET: On the Feasibility of a Secure, Efficient, and Collaborative Real-Time Web Editor.
Dennis Felsch
Christian Mainka
Vladislav Mladenov
Jörg Schwenk
2017
conf/uss
Same-Origin Policy: Evaluation in Modern Browsers.
Jörg Schwenk
Marcus Niemietz
Christian Mainka
2017
conf/sp
SoK: Exploiting Network Printers.
Jens Müller
Vladislav Mladenov
Juraj Somorovsky
Jörg Schwenk
2017
conf/acns
Simple Security Definitions for and Constructions of 0-RTT Key Exchange.
Britta Hale
Tibor Jager
Sebastian Lauer
Jörg Schwenk
2017
conf/eurosp
SoK: Single Sign-On Security - An Evaluation of OpenID Connect.
Christian Mainka
Vladislav Mladenov
Jörg Schwenk
Tobias Wich
2017
conf/esorics
DOMPurify: Client-Side Protection Against XSS and Markup Injection.
Mario Heiderich
Christopher Späth
Jörg Schwenk
2017
conf/cans
Out of the Dark: UI Redressing and Trustworthy Events.
Marcus Niemietz
Jörg Schwenk
2016
conf/eurosp
How Secure is TextSecure?
Tilman Frosch
Christian Mainka
Christoph Bader
Florian Bergsma
Jörg Schwenk
Thorsten Holz
2016
conf/eurosp
Do Not Trust Me: Using Malicious IdPs for Analyzing and Attacking Single Sign-on.
Christian Mainka
Vladislav Mladenov
Jörg Schwenk
2016
conf/cans
Breaking PPTP VPNs via RADIUS Encryption.
Matthias Horst
Martin Grothe
Tibor Jager
Jörg Schwenk
2015
conf/ccs
On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption.
Tibor Jager
Jörg Schwenk
Juraj Somorovsky
2015
conf/ccs
How Private is Your Private Cloud?: Security Analysis of Cloud Control Interfaces.
Dennis Felsch
Mario Heiderich
Frederic Schulz
Jörg Schwenk
2015
conf/esorics
Waiting for CSP - Securing Legacy Web Applications with JSAgents.
Mario Heiderich
Marcus Niemietz
Jörg Schwenk
2015
conf/esorics
AdIDoS - Adaptive and Intelligent Fully-Automatic Detection of Denial-of-Service Weaknesses in Web Services.
Christian Altmeier
Christian Mainka
Juraj Somorovsky
Jörg Schwenk
2015
conf/esorics
Practical Invalid Curve Attacks on TLS-ECDH.
Tibor Jager
Jörg Schwenk
Juraj Somorovsky
2015
conf/pkc
One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model.
Florian Bergsma
Tibor Jager
Jörg Schwenk
2014
conf/ccs
Your Software at my Service: Security Analysis of SaaS Single Sign-On Solutions in the Cloud.
Christian Mainka
Vladislav Mladenov
Florian Feldmann
Julian Krautwald
Jörg Schwenk
2014
conf/ccs
Guardians of the Clouds: When Identity Providers Fail.
Andreas Mayer
Marcus Niemietz
Vladislav Mladenov
Jörg Schwenk
2014
conf/ccs
Multi-Ciphersuite Security of the Secure Shell (SSH) Protocol.
Florian Bergsma
Benjamin Dowling
Florian Kohlar
Jörg Schwenk
Douglas Stebila
2014
conf/uss
Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks.
Christopher Meyer
Juraj Somorovsky
Eugen Weiss
Jörg Schwenk
Sebastian Schinzel
Erik Tews
2014
conf/acns
New Modular Compilers for Authenticated Key Exchange.
Yong Li
Sven Schäge
Zheng Yang
Christoph Bader
Jörg Schwenk
2014
conf/esorics
Modelling Time for Authenticated Key Exchange Protocols.
Jörg Schwenk
2014
conf/wisa
Systematically Breaking Online WYSIWYG Editors.
Ashar Javed
Jörg Schwenk
2014
conf/pkc
On the Security of the Pre-shared Key Ciphersuites of TLS.
Yong Li
Sven Schäge
Zheng Yang
Florian Kohlar
Jörg Schwenk
2013
journals/joc
On the Analysis of Cryptographic Assumptions in the Generic Ring Model.
Tibor Jager
Jörg Schwenk
2013
conf/ccs
mXSS attacks: attacking well-secured web-applications by using innerHTML mutations.
Mario Heiderich
Jörg Schwenk
Tilman Frosch
Jonas Magazinius
Edward Z. Yang
2013
conf/wisa
SoK: Lessons Learned from SSL/TLS Attacks.
Christopher Meyer
Jörg Schwenk
2013
conf/wisa
Towards Elimination of Cross-Site Scripting on Mobile Versions of Web Applications.
Ashar Javed
Jörg Schwenk
2013
conf/ctrsa
Randomly Failed! The State of Randomness in Current Java Implementations.
Kai Michaelis
Christopher Meyer
Jörg Schwenk
2012
conf/ccs
Scriptless attacks: stealing the pie without touching the sill.
Mario Heiderich
Marcus Niemietz
Felix Schuster
Thorsten Holz
Jörg Schwenk
2012
conf/uss
On Breaking SAML: Be Whoever You Want to Be.
Juraj Somorovsky
Andreas Mayer
Jörg Schwenk
Marco Kampmann
Meiko Jensen
2012
conf/crypto
On the Security of TLS-DHE in the Standard Model.
Tibor Jager
Florian Kohlar
Sven Schäge
Jörg Schwenk
2012
conf/icisc
Sometimes It's Better to Be STUCK! SAML Transportation Unit for Cryptographic Keys.
Christopher Meyer
Florian Feldmann
Jörg Schwenk
2012
conf/provsec
Strongly Authenticated Key Exchange Protocol from Bilinear Groups without Random Oracles.
Zheng Yang
Jörg Schwenk
2011
conf/ccs
All your clouds are belong to us: security analysis of cloud management interfaces.
Juraj Somorovsky
Mario Heiderich
Meiko Jensen
Jörg Schwenk
Nils Gruschka
Luigi Lo Iacono
2010
conf/fc
Attacking of SmartCard-Based Banking Applications with JavaScript-Based Rootkits.
Daniel Bußmeyer
Felix Gröbert
Jörg Schwenk
Christoph Wegener
2010
conf/fc
A CDH-Based Ring Signature Scheme with Short Signatures and Public Keys.
Sven Schäge
Jörg Schwenk
2010
conf/asiacrypt
Generic Compilers for Authenticated Key Exchange.
Tibor Jager
Florian Kohlar
Sven Schäge
Jörg Schwenk
2010
conf/africacrypt
A New RSA-Based Signature Scheme.
Sven Schäge
Jörg Schwenk
2009
conf/asiacrypt
On the Analysis of Cryptographic Assumptions in the Generic Ring Model.
Tibor Jager
Jörg Schwenk
2008
conf/ccs
Provably secure browser-based user-aware mutual authentication over TLS.
Sebastian Gajek
Mark Manulis
Ahmad-Reza Sadeghi
Jörg Schwenk
2008
conf/acisp
Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy.
Sebastian Gajek
Mark Manulis
Jörg Schwenk
2008
conf/provsec
Universally Composable Security Analysis of TLS.
Sebastian Gajek
Mark Manulis
Olivier Pereira
Ahmad-Reza Sadeghi
Jörg Schwenk
2008
conf/provsec
On the Equivalence of Generic Group Models.
Tibor Jager
Jörg Schwenk
2008
conf/esorics
A Browser-Based Kerberos Authentication Scheme.
Sebastian Gajek
Tibor Jager
Mark Manulis
Jörg Schwenk
2008
conf/icics
A Novel Solution for End-to-End Integrity Protection in Signed PGP Mail.
Lijun Liao
Jörg Schwenk
2007
conf/iwsec
On Security Models and Compilers for Group Key Exchange Protocols.
Emmanuel Bresson
Mark Manulis
Jörg Schwenk
1996
conf/eurocrypt
Public Key Encryption and Signature Schemes Based on Polynomials over Zn.
Jörg Schwenk
Jörg Eisfeld
Coauthors
Adam Czubak
(1)
Ahmad-Reza Sadeghi
(2)
Andreas Mayer
(2)
Ashar Javed
(2)
Benjamin Dowling
(2)
Bertram Poettering
(1)
Britta Hale
(1)
Christian Altmeier
(1)
Christian Dresen
(2)
Christian Mainka
(17)
Christoph Bader
(2)
Christoph Wegener
(1)
Christopher Meyer
(4)
Christopher Späth
(1)
Craig Young
(1)
Damian Poddebniak
(6)
Daniel Bußmeyer
(1)
Daniel Hirschberger
(1)
Dennis Felsch
(3)
Dominik Noss
(1)
Dominik Trevor Noß
(2)
Douglas Stebila
(2)
Edward Z. Yang
(1)
Emmanuel Bresson
(1)
Erik Tews
(1)
Eugen Weiss
(1)
Fabian Bäumer
(1)
Fabian Ising
(2)
Felix Gröbert
(1)
Felix Schuster
(1)
Florian Bergsma
(3)
Florian Feldmann
(2)
Florian Kohlar
(5)
Frederic Schulz
(1)
Gerd Bumiller
(1)
Hanno Böck
(1)
Janis Fliegenschmidt
(1)
Jens Müller
(10)
Johannes Mittmann
(1)
Jonas Magazinius
(1)
Jörg Eisfeld
(1)
Jörg Schwenk
(80)
Julian Krautwald
(1)
Juraj Somorovsky
(18)
Kai Gellert
(1)
Kai Michaelis
(1)
Karsten Meyer zu Selhausen
(1)
Lijun Liao
(1)
Louis Jannett
(1)
Luigi Lo Iacono
(1)
Lukas Knittel
(2)
Marcel Maehren
(5)
Marcin Szymanek
(1)
Marco Kampmann
(1)
Marcus Brinkmann
(8)
Marcus Niemietz
(7)
Mario Heiderich
(6)
Mark Manulis
(5)
Martin Dunsche
(1)
Martin Grothe
(3)
Matthias Gierlings
(1)
Matthias Horst
(1)
Meiko Jensen
(2)
Nicolai Bissantz
(1)
Nils Gruschka
(1)
Nimrod Aviram
(2)
Nurullah Erinola
(4)
Olivier Pereira
(1)
Paul Rösler
(3)
Philipp Nieting
(1)
Robert Merget
(9)
Sebastian Gajek
(4)
Sebastian Lauer
(3)
Sebastian Schinzel
(8)
Simon Friedberger
(1)
Simon Nachtigall
(1)
Simon Rohlmann
(3)
Stefan Hoffmann
(1)
Sven Hebrok
(2)
Sven Schäge
(8)
Thorsten Holz
(2)
Tibor Jager
(12)
Tilman Frosch
(2)
Tobias Handirk
(1)
Tobias Wich
(1)
Vladislav Mladenov
(13)
Yong Li
(2)
Yuval Shavitt
(1)
Zheng Yang
(3)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to