Breaking 104 bit WEP in less than 60 seconds E Tews, RP Weinmann, A Pyshkin Information Security Applications: 8th International Workshop, WISA 2007 …, 2007 | 374 | 2007 |
Trawling for tor hidden services: Detection, measurement, deanonymization A Biryukov, I Pustogarov, RP Weinmann 2013 IEEE Symposium on Security and Privacy, 80-94, 2013 | 310 | 2013 |
Content and popularity analysis of Tor hidden services A Biryukov, I Pustogarov, F Thill, RP Weinmann 2014 IEEE 34th International Conference on Distributed Computing Systems …, 2014 | 193 | 2014 |
Analysis of the SMS4 block cipher F Liu, W Ji, L Hu, J Ding, S Lv, A Pyshkin, RP Weinmann Information Security and Privacy: 12th Australasian Conference, ACISP 2007 …, 2007 | 140 | 2007 |
A systematic analysis of the Juniper Dual EC incident S Checkoway, J Maskiewicz, C Garman, J Fried, S Cohney, M Green, ... Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 115 | 2016 |
Baseband Attacks: Remote Exploitation of Memory Corruptions in Cellular Protocol Stacks. RP Weinmann WOOT, 12-21, 2012 | 103 | 2012 |
iOS Hacker's Handbook C Miller, D Blazakis, D DaiZovi, S Esser, V Iozzo, RP Weinmann John Wiley & Sons, 2012 | 88 | 2012 |
MutantXL J Ding, J Buchmann, MSE Mohamed, W Mohamed, RP Weinmann Proceedings of the 1st international conference on Symbolic Computation and …, 2008 | 83 | 2008 |
A Framework for Automated {Architecture-Independent} Gadget Search T Dullien, T Kornau, RP Weinmann 4th USENIX Workshop on Offensive Technologies (WOOT 10), 2010 | 72 | 2010 |
Block Ciphers Sensitive to Gröbner Basis Attacks. J Buchmann, A Pyshkin, RP Weinmann CT-RSA 3860, 313-331, 2006 | 65 | 2006 |
A zero-dimensional Gröbner basis for AES-128 J Buchmann, A Pyshkin, RP Weinmann International Workshop on Fast Software Encryption, 78-88, 2006 | 55 | 2006 |
Analysis of the dvb common scrambling algorithm RP Weinmann, K Wirt Communications and Multimedia Security, 195-207, 2005 | 52 | 2005 |
Cryptanalysis of the DECT standard cipher K Nohl, E Tews, RP Weinmann International Workshop on Fast Software Encryption, 1-18, 2010 | 44 | 2010 |
Attacks on the DECT authentication mechanisms S Lucks, A Schuler, E Tews, RP Weinmann, M Wenzel Cryptographers’ Track at the RSA Conference, 48-65, 2009 | 41 | 2009 |
Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures JS Coron, D Naccache, M Tibouchi, RP Weinmann Annual International Cryptology Conference, 428-444, 2009 | 26 | 2009 |
Post-quantum signatures J Buchmann, C Coronado, M Döring, D Engelbert, C Ludwig, R Overbeck, ... Cryptology ePrint Archive, 2004 | 26 | 2004 |
All your baseband are belong to us RP Weinmann hack. lu, 2010 | 24 | 2010 |
Meet-in-the-middle attacks on SHA-3 candidates D Khovratovich, I Nikolić, RP Weinmann International Workshop on Fast Software Encryption, 228-245, 2009 | 22 | 2009 |
Block ciphers: algebraic cryptanalysis and Groebner bases C Cid, RP Weinmann Groebner bases, coding, and cryptography, 307-327, 2009 | 21 | 2009 |
Evaluating algebraic attacks on the AES RP Weinmann Diplom thesis, Technische Universität Darmstadt, 2003 | 16 | 2003 |