Ralf-Philipp Weinmann
Ralf-Philipp Weinmann
managing director @ Comsecuris UG; CEO @ Kunnamon, Inc.
Verified email at comsecuris.com - Homepage
Title
Cited by
Cited by
Year
Breaking 104 bit WEP in less than 60 seconds
E Tews, RP Weinmann, A Pyshkin
International Workshop on Information Security Applications, 188-202, 2007
3242007
Trawling for tor hidden services: Detection, measurement, deanonymization
A Biryukov, I Pustogarov, RP Weinmann
2013 IEEE Symposium on Security and Privacy, 80-94, 2013
2312013
Content and popularity analysis of Tor hidden services
A Biryukov, I Pustogarov, F Thill, RP Weinmann
2014 IEEE 34th International Conference on Distributed Computing Systems …, 2014
1272014
Analysis of the SMS4 block cipher
F Liu, W Ji, L Hu, J Ding, S Lv, A Pyshkin, RP Weinmann
Australasian Conference on Information Security and Privacy, 158-170, 2007
1072007
iOS Hacker's Handbook
C Miller, D Blazakis, D DaiZovi, S Esser, V Iozzo, RP Weinmann
John Wiley & Sons, 2012
852012
Baseband Attacks: Remote Exploitation of Memory Corruptions in Cellular Protocol Stacks.
RP Weinmann
WOOT, 12-21, 2012
782012
A systematic analysis of the Juniper Dual EC incident
S Checkoway, J Maskiewicz, C Garman, J Fried, S Cohney, M Green, ...
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
762016
MutantXL
J Ding, J Buchmann, MSE Mohamed, WSAE Mohamed, RP Weinmann
742008
A Framework for Automated Architecture-Independent Gadget Search.
T Dullien, T Kornau, RP Weinmann
WOOT, 2010
642010
Block ciphers sensitive to Gröbner basis attacks
J Buchmann, A Pyshkin, RP Weinmann
Cryptographers’ Track at the RSA Conference, 313-331, 2006
492006
Analysis of the dvb common scrambling algorithm
RP Weinmann, K Wirt
Communications and Multimedia Security, 195-207, 2005
472005
A zero-dimensional Gröbner basis for AES-128
J Buchmann, A Pyshkin, RP Weinmann
International Workshop on Fast Software Encryption, 78-88, 2006
402006
Cryptanalysis of the DECT standard cipher
K Nohl, E Tews, RP Weinmann
International Workshop on Fast Software Encryption, 1-18, 2010
392010
Attacks on the DECT authentication mechanisms
S Lucks, A Schuler, E Tews, RP Weinmann, M Wenzel
Cryptographers’ Track at the RSA Conference, 48-65, 2009
362009
Post-Quantum Signatures.
JA Buchmann, LCC García, M Döring, D Engelbert, C Ludwig, ...
IACR Cryptol. ePrint Arch. 2004, 297, 2004
242004
Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures
JS Coron, D Naccache, M Tibouchi, RP Weinmann
Annual International Cryptology Conference, 428-444, 2009
232009
Meet-in-the-middle attacks on SHA-3 candidates
D Khovratovich, I Nikolić, RP Weinmann
International Workshop on Fast Software Encryption, 228-245, 2009
222009
All your baseband are belong to us
RP Weinmann
hack. lu, 2010
212010
Block ciphers: algebraic cryptanalysis and Groebner bases
C Cid, RP Weinmann
Groebner bases, coding, and cryptography, 307-327, 2009
162009
Evaluating algebraic attacks on the AES
RP Weinmann
Diplom thesis, Technische Universität Darmstadt, 2003
162003
The system can't perform the operation now. Try again later.
Articles 1–20