Publications

Useful Password Hashing: How to Waste Computing Cycles with Style

2013 - Markus Dürmuth

Proceedings of the 2013 New security paradigms workshop (NSPW) Pages 31-40 ACM, 2013 [PDF]

Evaluation of Standardized Password-Based Key Derivation against Parallel Processing Platforms

2013 - Markus Dürmuth, Tim Güneysu, Markus Kasper, Chris­tof Paar, Tolga Yalcin, Ralf Zimmermann

Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012 [DOI] [BibTeX] [pdf] [bib]

Achieving anonymity against major face recognition algorithms

2013 - Benedikt Driessen, Markus Dürmuth

Proceedings Communications and Multimedia Security (CMS 2013), LNCS 8099, Springer, 2013. [PDF]

Anonymität und Gesichtserkennung

2013 - Benedikt Driessen, Markus Dürmuth

digma, Zeitschrift für Datenrecht und Informationssicherheit, 2013.

Adaptive password-strength meters from Markov models

2012 - Claude Castelluccia, Markus Dürmuth, Daniele Perito

Proceedings 19th Network & Distributed System Security Symposium (NDSS 12). Internet Society, 2012. [PDF]

Timed revocation of user data: Long expiration times from existing infrastructure

2012 - Sirke Reimann , Markus Dürmuth

Proceedings Workshop on Privacy in the Electronic Society (WPES), 2012.

Deniable encryption with negligible detection probability: An interactive construction

2011 - Markus Dürmuth, David Mandell Freeman

Proceedings Advances in Cryptology (EUROCRYPT 11), Springer, 2011

Acoustic Side-Channel Attacks on Printers

2010 - Michael Backes, Markus Dürmuth, Sebastian Gerling, Manfred Pinkal, Caroline Sporleder

Proceedings USENIX Security Symposium, 2010.

Speaker Recognition in Encrypted Voice Streams

2010 - Michael Backes, Goran Doychev, Markus Dürmuth, Boris Köpf

Proceedings European Symposium on Research in Computer Security (ESORICS), 2010. (Preliminary version appeared in the Grande Region Security and Reliability Day, Saarbrücken, 2010.)

A Provably Secure and Efficient Countermeasure against Timing Attacks

2009 - Boris Köpf, Markus Dürmuth

Proceedings of the 22nd IEEE Computer Security Foundations Symposium (CSF), 2009.
Page: