Jörg Schwenk
Ruhr-Universität Bochum
H-index: 40
Europe-Germany
Top articles of Jörg Schwenk
Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation
arXiv preprint arXiv:2312.12422
2023/12/19
Marcus Brinkmann
H-Index: 4
Jörg Schwenk
H-Index: 25
Finding All Cross-Site Needles in the DOM Stack: A Comprehensive Methodology for the Automatic XS-Leak Detection in Web Browsers
2023/11/15
Interoperability between messaging services secure–implementation of encryption
Study for the Federal Network Agency
2023/4/28
Paul Rösler
H-Index: 5
Jörg Schwenk
H-Index: 25
Exploring the Unknown {DTLS} Universe: Analysis of the {DTLS} Server Ecosystem on the Internet
2023
Modern Cryptography: From RSA to Zero-Knowledge and Beyond
2023
Albrecht Beutelspacher
H-Index: 16
Jörg Schwenk
H-Index: 25
We really need to talk about session tickets: A {Large-Scale} analysis of cryptographic dangers with {TLS} session tickets
2023
Every Signature is Broken: On the Insecurity of Microsoft {Office’s}{OOXML} Signatures
2023
Isolated and exhausted: attacking operating systems via site isolation in the browser
2023
Marcus Brinkmann
H-Index: 4
Jörg Schwenk
H-Index: 25
Moderne Verfahren der Kryptographie: von RSA zu Zero-Knowledge und darüber hinaus
2022
Albrecht Beutelspacher
H-Index: 16
Jörg Schwenk
H-Index: 25
A reduction-based proof for authentication and session key security in three-party Kerberos
International Journal of Applied Cryptography
2022
Jörg Schwenk
H-Index: 25
Douglas Stebila
H-Index: 25
{TLS-Anvil}: Adapting Combinatorial Testing for {TLS} Libraries
2022
Oops... Code Execution and Content Spoofing: The First Comprehensive Analysis of {OpenDocument} Signatures
2022
Multiparty Computations
2024/3/5
Cryptographic Protocols
2022/11/26
Jörg Schwenk
H-Index: 25
Security of HTTP
2022/11/26
Jörg Schwenk
H-Index: 25
Cellular Networks
2022/11/26
Jörg Schwenk
H-Index: 25
Wireless LAN (WLAN)
2022/11/26
Jörg Schwenk
H-Index: 25