Follow
Ralf-Philipp Weinmann
Ralf-Philipp Weinmann
Comsecuris GmbH
Verified email at comsecuris.com - Homepage
Title
Cited by
Cited by
Year
Breaking 104 bit WEP in less than 60 seconds
E Tews, RP Weinmann, A Pyshkin
International Workshop on Information Security Applications, 188-202, 2007
3472007
Trawling for tor hidden services: Detection, measurement, deanonymization
A Biryukov, I Pustogarov, RP Weinmann
2013 IEEE Symposium on Security and Privacy, 80-94, 2013
2712013
Content and popularity analysis of Tor hidden services
A Biryukov, I Pustogarov, F Thill, RP Weinmann
2014 IEEE 34th International Conference on Distributed Computing Systems …, 2014
1622014
Analysis of the SMS4 block cipher
F Liu, W Ji, L Hu, J Ding, S Lv, A Pyshkin, RP Weinmann
Australasian Conference on Information Security and Privacy, 158-170, 2007
1162007
A systematic analysis of the Juniper Dual EC incident
S Checkoway, J Maskiewicz, C Garman, J Fried, S Cohney, M Green, ...
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
912016
Baseband Attacks: Remote Exploitation of Memory Corruptions in Cellular Protocol Stacks.
RP Weinmann
WOOT, 12-21, 2012
882012
iOS Hacker's Handbook
C Miller, D Blazakis, D DaiZovi, S Esser, V Iozzo, RP Weinmann
John Wiley & Sons, 2012
832012
MutantXL
J Ding, J Buchmann, MSE Mohamed, WSAE Mohamed, RP Weinmann
792008
A Framework for Automated {Architecture-Independent} Gadget Search
T Dullien, T Kornau, RP Weinmann
4th USENIX Workshop on Offensive Technologies (WOOT 10), 2010
682010
Block ciphers sensitive to Gröbner basis attacks
J Buchmann, A Pyshkin, RP Weinmann
Cryptographers’ Track at the RSA Conference, 313-331, 2006
562006
Analysis of the dvb common scrambling algorithm
RP Weinmann, K Wirt
Communications and Multimedia Security, 195-207, 2005
502005
A zero-dimensional Gröbner basis for AES-128
J Buchmann, A Pyshkin, RP Weinmann
International Workshop on Fast Software Encryption, 78-88, 2006
472006
Cryptanalysis of the DECT standard cipher
K Nohl, E Tews, RP Weinmann
International Workshop on Fast Software Encryption, 1-18, 2010
412010
Attacks on the DECT authentication mechanisms
S Lucks, A Schuler, E Tews, RP Weinmann, M Wenzel
Cryptographers’ Track at the RSA Conference, 48-65, 2009
392009
Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures
JS Coron, D Naccache, M Tibouchi, RP Weinmann
Annual International Cryptology Conference, 428-444, 2009
242009
All your baseband are belong to us
RP Weinmann
hack. lu, 2010
232010
Post-quantum signatures
J Buchmann, C Coronado, M Döring, D Engelbert, C Ludwig, R Overbeck, ...
Cryptology ePrint Archive, 2004
232004
Meet-in-the-middle attacks on SHA-3 candidates
D Khovratovich, I Nikolić, RP Weinmann
International Workshop on Fast Software Encryption, 228-245, 2009
222009
Block ciphers: algebraic cryptanalysis and Groebner bases
C Cid, RP Weinmann
Groebner bases, coding, and cryptography, 307-327, 2009
182009
Evaluating algebraic attacks on the AES
RP Weinmann
Diplom thesis, Technische Universität Darmstadt, 2003
162003
The system can't perform the operation now. Try again later.
Articles 1–20