Vulnerability Report: Attacks on PDF Certification

2021 - Simon Rohlmann, Vladislav Mladenov, Christian Mainka, Jörg Schwenk

[html] [pdf]

Over 100 Bugs in a Row: Security Analysis of the Top-Rated Joomla Extensions

2021 - Marcus Niemietz, Mario Korth, Christian Mainka, Juraj Somorovsky

arXiv 2021 [] [PDF]

Vulnerability Report Attacks bypassing the signature validation in PDF (Shadow Attacks)

2020 - Christian Mainka, Vladislav Mladenov, Simon Rohlmann, Jörg Schwenk


Vulnerability Report: Attacks bypassing confidentiality in encrypted PDF

2019 - Jens Müller, Fabian Ising, Vladislav Mladenov, Christian Mainka, Sebastian Schinzel, Jörg Schwenk

[html] [pdf]

Produktivität von Wissenschaftlerinnen und Wissenschaftlern in den Fachbereichen der GMDS: Analyse der GMS-Beiträge zwischen 2004 und 2018

2019 - Pobiruchin M, Wiesner M, Steuer S, Maximilian Westers, Zowalla R

Deutsche Gesellschaft für Medizinische Informatik, Biometrie und Epidemiologie e.V. (GMDS). 64. Jahrestagung der GMDS. Dortmund, 08.-11.09.2019. Düsseldorf: German Medical Science GMS Publishing House; 2019. DocAbstr. 51

Technology Adoption, Motivational Aspects, and Privacy Concerns of Wearables in the German Running Community

2019 - Wiesner M, Zowalla R, Suleder J, Maximilian Westers, Pobiruchin M

Field Study JMIR Mhealth Uhealth 2018;6(12): e201

Extended Affine and CCZ Equivalence up to Dimension 4

2019 - Marcus Brinkmann

A complete classification of all vectorial boolean functions in up to dimension 4, up to extended affine and CCZ equivalence. Work done as part of my diploma thesis in 2008, and since then cited as personal communication. [ePrint] [pdf]

Vulnerability Report: Attacks bypassing the signature validation in PDF

2019 - Vladislav Mladenov, Christian Mainka, Karsten Meyer zu Selhausen, Martin Grothe, Jörg Schwenk


Evaluation of eID and Trust Services

2018 - Nils Engelbertz, Nurullah Erinola, David Herring, Juraj Somorovsky, Vladislav Mladenov


Validierung des PROSIT CHD Type 2 Diabetes Herzinfarktmodells Diabetologie und Stoffwechsel

2017 - Seitz P, Fendrich L, Hempe H, Rickmann J, Christophidis B, Lankes S, Reimchen H, Maximilian Westers, Baumann B, Laha A, Suleder J, Sailer F, Schramm W

Attacks on OpenID Connect

2016 - Vladislav Mladenov, Christian Mainka


How Secure is TextSecure?

2014 - Tilman Frosch, Christian Mainka, Christoph Bader, Florian Bergsma, Jörg Schwenk, Thorsten Holz

Cryptology ePrint Archive, Report 2014/904, 31 Oct 2014 [pdf]

SS-FP: Browser Fingerprinting using HTML Parser Quirks

2012 - Erwan Abgrall, Yves Le Traon, Martin Monperrus, Sylvain Gombault, Mario Heiderich, Alain Ribault

[Cornell University]

STEED — Usable End-to-End Encryption

2011 - Werner Koch, Marcus Brinkmann

White Paper, g10code GmbH [PDF]

Efficient Authenticated Wireless Roaming via Tunnels

2009 - Andreas Noack,

Technical Report. Full paper with security proof. [PDF]

Classification of Almost Perfect Nonlinear Functions up to Dimension Five

2007 - Marcus Brinkmann

Diplomarbeit an der Fakultät für Mathematik Ruhr-Universiät Bochum. [PDF]

Compartmented Security for Browsers

2007 - Sebastian Gajek, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy

Technical Report HGI-TR-2007-001, Horst Görtz Institute for IT Security, Ruhr-University Bochum, 2007. [pdf]

Fingercasting - Joint Fingerprinting and Decryption of Broadcast Messages

2006 - Ahmad-Reza Sadeghi, Andre Adelsbach, Ulrich Huber,

Technical Report detailing the ACISP 2006 paper below. A preliminary version is available from the authors:

First Summary Report on Asymmetric Watermarking

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, P. Bas, S. Katzenbeisser (Eds.), M. Barni, A. De Rosa

ECRYPT, Network of Excellence in Cryptology, Project Deliverable (D.WVL.3), 2005. [pdf]

Property-Based Broadcast Encryption for Multi-level Security Policies

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Christian Stüble, Ulrich Huber,

Technical Report detailing the ICISC 2005 paper below. A preliminary version is available from the authors

Secure Software Delivery and Installation in Embedded Systems

2005 - Ahmad-Reza Sadeghi, Andre Adelsbach, Ulrich Huber,

Technical Report detailing the ISPEC 2005 conference paper below.

Cryptographic Semantics For The Algebraic Models

2002 - Andre Adelsbach, Christian Stüble, S. Creese, B. Pfitzmann, P. Ryan, W. Simmonds, S. Steinbrechner, M. Steiner, M. Waidner

MAFTIA Deliverable D8, February 2002 [pdf]

Final Report on Verification and Assessment

2002 - Ahmad-Reza Sadeghi, Andre Adelsbach, Christian Stüble,

MAFTIA Deliverable D22, Project IST-1999-11583, January 2002.