Cited By
View all- Ryan KHe KSullivan GHeninger NMeng WJensen CCremers CKirda E(2023)Passive SSH Key Compromise via LatticesProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3616629(2886-2900)Online publication date: 15-Nov-2023
- Beutelspacher ASchwenk JWolfenstetter KBeutelspacher ASchwenk JWolfenstetter K(2022)Kryptologische GrundlagenModerne Verfahren der Kryptographie10.1007/978-3-662-65718-8_2(7-32)Online publication date: 2-Dec-2022
- Schwenk JSchwenk J(2022)Cryptography: Integrity and AuthenticityGuide to Internet Cryptography10.1007/978-3-031-19439-9_3(43-62)Online publication date: 26-Nov-2022
- Show More Cited By



