More is Less: On the End-to-End Security of Group Chats in Signal, WhatsApp, and Threema P Rösler, C Mainka, J Schwenk IEEE European Symposium on Security and Privacy (EuroS&P) 2018, 2017 | 158* | 2017 |
Towards Bidirectional Ratcheted Key Exchange B Poettering, P Rösler IACR International Cryptology Conference (Crypto) 2018, 3-32, 2018 | 97 | 2018 |
Attacking Deterministic Signature Schemes using Fault Attacks D Poddebniak, S Schinzel, J Somorovsky, M Lochter, P Rösler IEEE European Symposium on Security and Privacy (EuroS&P) 2018, 2017 | 77 | 2017 |
Determining the Core Primitive for Optimally Secure Ratcheting F Balli, P Rösler, S Vaudenay IACR International Conference on the Theory and Application of Cryptology …, 2020 | 35 | 2020 |
On the Price of Concurrency in Group Ratcheting Protocols A Bienstock, Y Dodis, P Rösler IACR Theory of Cryptography Conference (TCC) 2020, 198-228, 2020 | 32 | 2020 |
Asynchronous Ratcheted Key Exchange B Poettering, P Rösler IACR Cryptology ePrint Archive 2018, 296, 2018 | 31* | 2018 |
Flexible Authenticated and Confidential Channel Establishment (fACCE): Analyzing the Noise Protocol Framework. B Dowling, P Rösler, J Schwenk IACR International Conference on Practice and Theory of Public-Key …, 2019 | 19 | 2019 |
SoK: Game-Based Security Models for Group Key Exchange B Poettering, P Rösler, J Schwenk, D Stebila Topics in Cryptology (CT-RSA) 2021, 2021 | 17 | 2021 |
How to Break Microsoft Rights Management Services M Grothe, C Mainka, P Rösler, J Schwenk USENIX Workshop on Offensive Technologies (WOOT) 2016, 2016 | 17 | 2016 |
On the Worst-Case Inefficiency of CGKA A Bienstock, Y Dodis, S Garg, G Grogan, M Hajiabadi, P Rösler IACR Theory of Cryptography Conference (TCC) 2022, 2022 | 10 | 2022 |
Combiners for AEAD B Poettering, P Rösler IACR Transactions on Symmetric Cryptology (ToSC) 2020 (1), 121-143, 2020 | 10 | 2020 |
Your Cloud in my Company: Modern Rights Management Services Revisited M Grothe, C Mainka, P Rösler, J Jupke, J Kaiser, J Schwenk IEEE International Conference on Availability, Reliability and Security …, 2016 | 9 | 2016 |
Strongly Anonymous Ratcheted Key Exchange B Dowling, E Hauck, D Riepel, P Rösler IACR International Conference on the Theory and Application of Cryptology …, 2022 | 8 | 2022 |
On the End-to-End Security of Group Chats in Instant Messaging Protocols P Rösler Ruhr University Bochum, 2018 | 6 | 2018 |
Interoperability in end-to-end encrypted messaging J Len, E Ghosh, P Grubbs, P Rösler Cryptology ePrint Archive, 2023 | 5 | 2023 |
Unique-Path Identity Based Encryption with Applications to Strongly Secure Messaging P Rösler, D Slamanig, C Striecks IACR International Conference on the Theory and Applications of …, 2023 | 5 | 2023 |
LAVA: Log authentication and verification algorithm E Bajramovic, C Fein, M Frinken, P Rösler, F Freiling Digital Threats: Research and Practice 4 (3), 1-17, 2023 | 2* | 2023 |
Security of Ibex P Gerhart, P Rösler, D Schröder Technical report, July 2023. URL https://threema. ch/press-files …, 2023 | 1 | 2023 |
Interoperability between Messaging Services – Secure Implementation of Encryption P Rösler, J Schwenk | 1 | 2023 |
ASMesh: Anonymous and Secure Messaging in Mesh Networks using Stronger, Anonymous Double Ratchet A Bienstock, P Rösler, Y Tang ACM Conference on Computer and Communications Security (CCS) 2023, 2023 | 1 | 2023 |