Follow
Paul Rösler
Paul Rösler
FAU Erlangen-Nürnberg
Verified email at fau.de - Homepage
Title
Cited by
Cited by
Year
More is Less: On the End-to-End Security of Group Chats in Signal, WhatsApp, and Threema
P Rösler, C Mainka, J Schwenk
IEEE European Symposium on Security and Privacy (EuroS&P) 2018, 2017
1602017
Towards Bidirectional Ratcheted Key Exchange
B Poettering, P Rösler
IACR International Cryptology Conference (Crypto) 2018, 3-32, 2018
952018
Attacking Deterministic Signature Schemes using Fault Attacks
D Poddebniak, S Schinzel, J Somorovsky, M Lochter, P Rösler
IEEE European Symposium on Security and Privacy (EuroS&P) 2018, 2017
752017
Determining the Core Primitive for Optimally Secure Ratcheting
F Balli, P Rösler, S Vaudenay
IACR International Conference on the Theory and Application of Cryptology …, 2020
342020
On the Price of Concurrency in Group Ratcheting Protocols
A Bienstock, Y Dodis, P Rösler
IACR Theory of Cryptography Conference (TCC) 2020, 198-228, 2020
332020
Asynchronous Ratcheted Key Exchange
B Poettering, P Rösler
IACR Cryptology ePrint Archive 2018, 296, 2018
27*2018
Flexible Authenticated and Confidential Channel Establishment (fACCE): Analyzing the Noise Protocol Framework.
B Dowling, P Rösler, J Schwenk
IACR International Conference on Practice and Theory of Public-Key …, 2019
192019
SoK: Game-Based Security Models for Group Key Exchange
B Poettering, P Rösler, J Schwenk, D Stebila
Topics in Cryptology (CT-RSA) 2021, 2021
182021
How to Break Microsoft Rights Management Services
M Grothe, C Mainka, P Rösler, J Schwenk
USENIX Workshop on Offensive Technologies (WOOT) 2016, 2016
172016
On the Worst-Case Inefficiency of CGKA
A Bienstock, Y Dodis, S Garg, G Grogan, M Hajiabadi, P Rösler
IACR Theory of Cryptography Conference (TCC) 2022, 2022
102022
Strongly Anonymous Ratcheted Key Exchange
B Dowling, E Hauck, D Riepel, P Rösler
IACR International Conference on the Theory and Application of Cryptology …, 2022
92022
Combiners for AEAD
B Poettering, P Rösler
IACR Transactions on Symmetric Cryptology (ToSC) 2020 (1), 121-143, 2020
92020
Your Cloud in my Company: Modern Rights Management Services Revisited
M Grothe, C Mainka, P Rösler, J Jupke, J Kaiser, J Schwenk
IEEE International Conference on Availability, Reliability and Security …, 2016
92016
On the End-to-End Security of Group Chats in Instant Messaging Protocols
P Rösler
Ruhr University Bochum, 2018
62018
Unique-Path Identity Based Encryption with Applications to Strongly Secure Messaging
P Rösler, D Slamanig, C Striecks
IACR International Conference on the Theory and Applications of …, 2023
52023
Interoperability in end-to-end encrypted messaging
J Len, E Ghosh, P Grubbs, P Rösler
Cryptology ePrint Archive, 2023
42023
LAVA: Log authentication and verification algorithm
E Bajramovic, C Fein, M Frinken, P Rösler, F Freiling
Digital Threats: Research and Practice 4 (3), 1-17, 2023
2*2023
Security of Ibex
P Gerhart, P Rösler, D Schröder
Technical report, July 2023. URL https://threema. ch/press-files …, 2023
12023
Interoperability between Messaging Services – Secure Implementation of Encryption
P Rösler, J Schwenk
12023
ASMesh: Anonymous and Secure Messaging in Mesh Networks using Stronger, Anonymous Double Ratchet
A Bienstock, P Rösler, Y Tang
ACM Conference on Computer and Communications Security (CCS) 2023, 2023
12023
The system can't perform the operation now. Try again later.
Articles 1–20