Publications

On Password Guessing with GPUs and FPGAs

2014 - Markus Dürmuth, Thorsten Kranz

PASSWORDS 2014 Conference, 2014. [pdf]

Secure Fallback Authentication and the Trusted Friend Attack

2014 - Ashar Javed, David Bletgen, Florian Kohlar, Markus Dürmuth, Jörg Schwenk

Proceedings International Conference on Distributed Computing Systems Workshops (ICDCS Workshops), 2014.

Statistics on Password Re-use and Adaptive Strength for Financial Accounts

2014 - Daniel V. Bailey, Markus Dürmuth, Chris­tof Paar

Proceedings 9th International Conference on Security and Cryptography (SCN), 2014. [PDF]

Typing passwords with voice recognition --or-- How to authenticate to Google Glass

2014 - Daniel Bailey, Markus Dürmuth, Chris­tof Paar

Adventures in Authentication: WAY Workshop. 2014. [PDF]

Quantifying the Security of Graphical Passwords: The Case of Android Unlock Patterns

2013 - Sebastian Uellenbeck, Markus Dürmuth, Christopher Wolf, Thorsten Holz

ACM Conference on Computer and Communications Security (CCS), Berlin, November 2013 [PDF]

Useful Password Hashing: How to Waste Computing Cycles with Style

2013 - Markus Dürmuth

Proceedings of the 2013 New security paradigms workshop (NSPW) Pages 31-40 ACM, 2013 [PDF]

Evaluation of Standardized Password-Based Key Derivation against Parallel Processing Platforms

2013 - Markus Dürmuth, Tim Güneysu, Markus Kasper, Chris­tof Paar, Tolga Yalcin, Ralf Zimmermann

Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012 [DOI] [BibTeX] [pdf] [bib]

Achieving anonymity against major face recognition algorithms

2013 - Benedikt Driessen, Markus Dürmuth

Proceedings Communications and Multimedia Security (CMS 2013), LNCS 8099, Springer, 2013. [PDF]

Anonymität und Gesichtserkennung

2013 - Benedikt Driessen, Markus Dürmuth

digma, Zeitschrift für Datenrecht und Informationssicherheit, 2013.

Adaptive password-strength meters from Markov models

2012 - Claude Castelluccia, Markus Dürmuth, Daniele Perito

Proceedings 19th Network & Distributed System Security Symposium (NDSS 12). Internet Society, 2012. [PDF]

Timed revocation of user data: Long expiration times from existing infrastructure

2012 - Sirke Reimann , Markus Dürmuth

Proceedings Workshop on Privacy in the Electronic Society (WPES), 2012.

Deniable encryption with negligible detection probability: An interactive construction

2011 - Markus Dürmuth, David Mandell Freeman

Proceedings Advances in Cryptology (EUROCRYPT 11), Springer, 2011

Acoustic Side-Channel Attacks on Printers

2010 - Michael Backes, Markus Dürmuth, Sebastian Gerling, Manfred Pinkal, Caroline Sporleder

Proceedings USENIX Security Symposium, 2010.

Speaker Recognition in Encrypted Voice Streams

2010 - Michael Backes, Goran Doychev, Markus Dürmuth, Boris Köpf

Proceedings European Symposium on Research in Computer Security (ESORICS), 2010. (Preliminary version appeared in the Grande Region Security and Reliability Day, Saarbrücken, 2010.)

A Provably Secure and Efficient Countermeasure against Timing Attacks

2009 - Boris Köpf, Markus Dürmuth

Proceedings of the 22nd IEEE Computer Security Foundations Symposium (CSF), 2009.

Tempest in a Teapot: Compromising Reflections Revisited

2009 - Michael Backes, Tongbo Chen, Markus Dürmuth, Hendrik P. A. Lensch, Martin Welk

Proceedings of the IEEE Symposium on Security and Privacy (SSP '09), Mai 2009.

Compromising Reflections - or - How to Read LCD Monitors Around the Corner

2008 - Michael Backes, Markus Dürmuth, Dominique Unruh

Proceedings of the IEEE Symposium on Security and Privacy (SSP '08), Mai 2008.

Datenspionage / Wie Brillengläser Geheimnisse verraten

2008 - Michael Backes, Markus Dürmuth, Dominique Unruh

In iX Magazin für Professionelle Informationstechnik, Heise Verlag, Hannover, May 2008.

OAEP is Secure Under Key-dependent Messages

2008 - Michael Backes, Markus Dürmuth, Dominique Unruh

Proceedings of ASIACRYPT, December 2008.

Böse Textdokumente – Postscript gone wild

2007 - Michael Backes, Markus Dürmuth, Dominique Unruh

iX Magazin für Professionelle Informationstechnik, Heise Verlag, Hannover, August 2007.
Page: