On the classification of APN functions up to dimension five M Brinkmann, G Leander Designs, Codes and Cryptography 49 (1), 273-288, 2008 | 137 | 2008 |
Raccoon Attack: Finding and Exploiting {Most-Significant-Bit-Oracles} in {TLS-DH (E}) R Merget, M Brinkmann, N Aviram, J Somorovsky, J Mittmann, J Schwenk 30th USENIX Security Symposium (USENIX Security 21), 213-230, 2021 | 44 | 2021 |
“Johnny, you are fired!”–Spoofing OpenPGP and S/MIME Signatures in Emails J Müller, M Brinkmann, D Poddebniak, H Böck, S Schinzel, J Somorovsky, ... 28th {USENIX} Security Symposium ({USENIX} Security 19), 1011-1028, 2019 | 38 | 2019 |
{ALPACA}: Application Layer Protocol Confusion-Analyzing and Mitigating Cracks in {TLS} Authentication M Brinkmann, C Dresen, R Merget, D Poddebniak, J Müller, ... 30th USENIX Security Symposium (USENIX Security 21), 4293-4310, 2021 | 27 | 2021 |
Coyotos microkernel specification JS Shapiro, E Northup, MS Doerrie, S Sridhar, NH Walfield, M Brinkmann The EROS Group, LLC, 0.5 edition, 24, 2007 | 22* | 2007 |
A critique of the GNU Hurd multi-server operating system NH Walfield, M Brinkmann ACM SIGOPS Operating Systems Review 41 (4), 30-39, 2007 | 22 | 2007 |
Re: What’s Up Johnny? Covert Content Attacks on Email End-to-End Encryption J Müller, M Brinkmann, D Poddebniak, S Schinzel, J Schwenk Applied Cryptography and Network Security: 17th International Conference …, 2019 | 19 | 2019 |
Mitigation of Attacks on Email End-to-End Encryption J Schwenk, M Brinkmann, D Poddebniak, J Müller, J Somorovsky, ... Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 18 | 2020 |
Linearly self-equivalent APN permutations in small dimension C Beierle, M Brinkmann, G Leander IEEE Transactions on Information Theory 67 (7), 4863-4875, 2021 | 10 | 2021 |
Mailto: Me Your Secrets. On Bugs and Features in Email End-to-End Encryption J Müller, M Brinkmann, D Poddebniak, S Schinzel, J Schwenk 2020 IEEE Conference on Communications and Network Security (CNS), 1-9, 2020 | 7 | 2020 |
" I {don’t} know why I check this...''-Investigating Expert Users' Strategies to Detect Email Signature Spoofing Attacks P Mayer, D Poddebniak, K Fischer, M Brinkmann, J Somorovsky, A Sasse, ... Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022), 77-96, 2022 | 6 | 2022 |
STEED—Usable End-to-End Encryption W Koch, M Brinkmann White Paper, Oct, 2011 | 6 | 2011 |
Extended Affine and CCZ Equivalence up to Dimension 4 M Brinkmann Cryptology ePrint Archive, 2019 | 5 | 2019 |
Porting the GNU Hurd to the L4 Microkernel M Brinkmann Free Software Foundation Inc, 2003 | 4 | 2003 |
Terrapin Attack: Breaking {SSH} Channel Integrity By Sequence Number Manipulation F Bäumer, M Brinkmann, J Schwenk 33rd USENIX Security Symposium (USENIX Security 24), 2024 | 2 | 2024 |
Isolated and Exhausted: Attacking Operating Systems via Site Isolation in the Browser M Gierlings, M Brinkmann, J Schwenk 32nd USENIX Security Symposium (USENIX Security 23), 7037-7054, 2023 | 2 | 2023 |
Leaky McEliece: Secret Key Recovery From Highly Erroneous Side-Channel Information M Brinkmann, C Chuengsatiansup, A May, J Nowakowski, Y Yarom Cryptology ePrint Archive, 2023 | 1 | 2023 |
Classification of Almost Perfect Nonlinear Functions up to Dimension Five M Brinkmann | 1 | 2007 |
Operating System Design and Implementation T Petazzoni, M Brinkmann, N Walfield, M Gorman, JS Shapiro | | |
Improving Usability via Access Decomposition and Policy Refinement NH Walfield, M Brinkmann | | |