Publikationen

Publikationen

ASIC Accelerator in 28 nm for the Post-Quantum Digital Signature Scheme XMSS
Mohan, Prashanth; Wang, Wen; Jungk, Bernhard; Niederhagen, Ruben; Szefer, Jakub; Mai, Ken
International Conference on Computer Design (ICCD) 2020
[Conference Paper]


Sicherheit messen! Kennzahlensysteme zur Überwachung der Informationssicherheit
Stöwer, Mechthild; Kraft, Reiner
[Book Article]


Privacy and Robust Hashes. Privacy-Preserving Forensics for Image Re-Identification
Steinebach, Martin; Lutz, Sebastian; Liu, Huajian
[Journal Article]


Black-box caches fingerprinting
Klein, Amit; Heftrig, Elias; Shulman, Haya; Waidner, Michael
International Conference on emerging Networking EXperiments and Technologies (CoNEXT) 2020
[Conference Paper]


IT/OT-Security bei Internet of Railway Things (IoRT)
Arul, Tolga; Cosic, Jasmin; Drodt, Matthias; Friedrich, Marcus; Heinrich, Markus; Kant, Michael; Katzenbeisser, Stefan; Klarer, Helmut; Rauscher, Patrick; Schubert, Max; Still, Gerhard; Wallenhorst, Detlef; Zhdanova, Maria
[Report]


Gateway for Industrial Cyber-Physical Systems with Hardware-Based Trust Anchors
Bienhaus, Diethelm; Jäger, Lukas; Rieke, Roland; Krauß, Christoph
International Symposium on Intelligent Distributed Computing (IDC) 2019
[Conference Paper]


Desinformation aufdecken und bekämpfen
[Scientific Anthology]


Security Analysis of Automotive Protocols
Lauser, Timm; Zelle, Daniel; Krauß, Christoph
Computer Science in Cars Symposium (CSCS) 2020
[Conference Paper]


White Paper. Einwilligung. Möglich­keiten und Fallstricke aus der Konsumentenperspektive
Roßnagel, Alexander; Bile, Tamer; Nebel, Maxi; Geminn, Christian; Karaboga, Murat; Ebbers, Frank; Bremert, Benjamin; Stapf, Ingrid; Teebken, Mena; Thürmel, Verena; Ochs, Carsten; Uhlmann, Markus; Krämer, Nicole; Meier, Yannic; Kreutzer, Michael; Schreiber, Linda; Simo, Hervais
[Report]


XMSS and Embedded Systems
Wang, Wen; Jungk, Bernhard; Wälde, Julian; Deng, Shuwen; Gupta, Naina; Szefer, Jakub; Niederhagen, Ruben
International Conference on Selected Areas in Cryptography (SAC) 2019
[Conference Paper]


Interface to Network Security Functions (I2NSF) Terminology. Version 08
Hares, Susan; Strassner, John; Lopez, Diego R.; Xia, Liang; Birkholz, Henk
[Report]


Subverting Linux' Integrity Measurement Architecture
Bohling, Felix; Müller, Tobias; Eckel, Michael; Lindemann, Jens
International Conference on Availability, Reliability and Security (ARES) 2020
[Conference Paper]


An Improved Topic Masking Technique for Authorship Analysis
Halvani, Oren; Graner, Lukas; Regev, Roey; Marquardt, Philipp
International Conference on Availability, Reliability and Security (ARES) 2021
[Presentation]


Development and empirical optimization of an electrochemical analysis cell for the visualization of latent fingerprints and their chemical adhesives
Bergmann, Tommy; Gottschall, Sebastian; Fuchs, Enrico; Berlipp, Oliver; Labudde, Dirk
Gesellschaft für Informatik, Special Interest Group on Biometrics and Electronic Signatures (BIOSIG International Conference) 2020
[Conference Paper]


ISA Extensions for Finite Field Arithmetic - Accelerating Kyber and NewHope on RISC-V
Alkim, Erdem; Evkan, Hülya; Lahr, Norman; Niederhagen, Ruben; Petri, Richard
[Paper]


Detecting "DeepFakes" in H.264 Video Data Using Compression Ghost Artifacts
Frick, Raphael Antonius; Zmudzinski, Sascha; Steinebach, Martin
Annual Symposium on Electronic Imaging, Science and Technology 2020
[Journal Article]


The structural basis of the genetic code: amino acid recognition by aminoacyl-tRNA synthetases
Kaiser, F.; Krautwurst, S.; Salentin, S.; Haupt, V.J.; Leberecht, C.; Bittrich, S.; Labudde, D.; Schroeder, M.
[Journal Article]


Secure IT without vulnerabilities and back doors
Weber, Arnd; Heiser, Gernot; Kuhlmann, Dirk; Schallbruch, Martin; Chattopadhyay, Anupam; Guilley, Sylvain; Kasper, Michael; Krauß, Christoph; Krüger, Philipp S.; Reith, Steffen; Seifert, Jean-Pierre
[Journal Article]


Recht und Informatik - Voneinander lernen und gemeinsam handeln
Grimm, Rüdiger
[Book Article]


DICE harder: A hardware implementation of the device identifier composition engine
Jäger, Lukas; Petri, Richard
International Conference on Availability, Reliability and Security (ARES) 2020
[Conference Paper]


Detecting Fake News Spreaders on Twitter from a Multilingual Perspective
Vogel, Inna; Meghana, Meghana
International Conference on Data Science and Advanced Analytics (DSAA) 2020
[Conference Paper]


DaVinci: Android App Analysis beyond Frida via Dynamic System Call Instrumentation
Druffel, Alexander; Heid, Kris
International Conference on Applied Cryptography and Network Security (ACNS) 2020
[Conference Paper]


The Impact of DNS Insecurity on Time
Jeitner, P.; Shulman, H.; Waidner, M.
International Conference on Dependable Systems and Networks (DSN) 2020
[Conference Paper]


JAB Code - A Versatile Polychrome 2D Barcode
Berchtold, Waldemar; Liu, Huajian; Steinebach, Martin; Klein, Dominik; Senger, Tobias; Thenee, Nicolas
Annual Symposium on Electronic Imaging, Science and Technology 2020
[Journal Article]


Critical traffic analysis on the tor network
Platzer, Florian; Schäfer, Marcel; Steinebach, Martin
International Conference on Availability, Reliability and Security (ARES) 2020
[Conference Paper]


Detecting double compression and splicing using benfords first digit law
Frick, Raphael Antonius; Liu, Huajian; Steinebach, Martin
International Conference on Availability, Reliability and Security (ARES) 2020
[Conference Paper]


Post-Quantum TLS on Embedded Systems: Integrating and Evaluating Kyber and SPHINCS+ with mbed TLS
Bürstinghaus-Steinbach, Kevin; Krauß, Christoph; Niederhagen, Ruben; Schneider, Michael
ASIA Conference on Computer and Communications Security (ASIACCS) 2020
[Conference Paper]


A novel approach for generating synthetic datasets for digital forensics
Göbel, T.; Schäfer, T.; Hachenberger, J.; Türr, J.; Baier, H.
International Conference on Digital Forensics 2020
[Conference Paper]


Securing DNSSEC Keys via Threshold ECDSA from Generic MPC
Dalskov, Anders; Orlandi, Claudio; Keller, Marcel; Shrishak, Kris; Shulman, Haya
European Symposium on Research in Computer Security (ESORICS) 2020
[Conference Paper]


Data Mining zur Erfassung extremistischer Aktivitäten in Online-Netzwerken
Hamachers, Annika; Gundlach, Julia; Heereman, Wendy; Selzer, Annika; Yannikos, York
[Book Article]