E-Mail: bmoeller@acm.org WWW: https://www.bmoeller.de/ |
Adam Langley, Nagendra Modadugu, Bodo Moeller:
Transport Layer Security (TLS) False Start.
draft-ietf-tls-falsestart-02.
May 11, 2016.
Bodo Moeller, Adam Langley:
TLS Fallback Signaling Cipher Suite Value (SCSV) for Preventing Protocol Downgrade Attacks.
RFC 7507.
April 2015.
Bodo Möller, Thai Duong, Krzysztof Kotowicz :
This POODLE Bites: Exploiting The SSL 3.0 Fallback.
September 2014.
Bodo Möller, Andy Rupp:
Faster Multi-Exponentiation through Caching: Accelerating (EC)DSA Signature Verification.
–
Rafail Ostrovsky, Roberto De Prisco, and Ivan Visconti (Eds.):
Security and Cryptography for Networks – SCN 2008.
LNCS 5229.
Springer-Verlag, 2008.
39–56.
ISBN-10 3-540-85854-7, ISBN-13 978-3-540-85854-6, ISSN 0302-9743.
Bodo Möller, Andy Rupp:
Faster Multi-Exponentiation through Caching: Accelerating (EC)DSA Signature Verification.
Cryptology ePrint Archive, Report 2007/470, http://eprint.iacr.org/
.
[PDF]
Tim Güneysu, Bodo Möller, Christof Paar:
Dynamic Intellectual Property Protection for Reconfigurable Devices.
–
Proceedings: IEEE International Conference on Field-Programmable Technology – ICFPT 2007.
IEEE, 2008.
169–176.
ISBN 978-1-4244-1472-7.
[PDF]
Sebastian Gajek, Lijun Liao, Bodo Möller, Jörg Schwenk:
SSL-over-SOAP: Towards a Token-based Key Establishment Framework for Web Services.
–
Cesare Pautasso, Thomas Gschwind (Eds.):
Proceedings of the 2nd ECOWS Workshop on Emerging Web Services Technology – WEWST 2007.
CEUR Workshop Proceedings Vol-313, 2008.
ISSN 1613-0073.
(Workshop within the 5th IEEE European Conference on Web Services – ECOWS 2007.)
[PDF]
Bodo Möller:
Anmerkungen zur Gültigkeit von Zertifikaten.
–
Rainer Koschke, Otthein Herzog, Karl-Heinz Rödiger, Marc Ronthaler (Hrsg.):
INFORMATIK 2007 – Informatik trifft Logistik, Band 2.
Lecture Notes in Informatics (LNI) P-110.
GI e. V., 2007.
179–183.
ISBN 978-3-88579-204-8, ISSN 1617-5468.
(From workshop "Kryptografie in Theorie und Praxis" within "INFORMATIK 2007".)
[PDF]
Tim Güneysu, Bodo Möller, Christof Paar:
New Protection Mechanisms for Intellectual Property in Reconfigurable Logic.
–
Proceedings: 15th Annual IEEE Symposium on Field-Programmable Custom Computing Machines – FCCM 2007.
IEEE, 2007.
287–288.
ISBN-10 0-7695-2940-2, ISBN-13 978-0-7695-2940-0.
(Extended poster abstract.)
[PDF]
Bodo Möller:
Beweisbar sichere Verschlüsselung.
Vorlesung an der Ruhr-Universität Bochum im Sommersemester 2007.
Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, Bodo Möller, David Pointcheval:
Strong Password-Based Authentication in TLS using the Three-Party Group Diffie-Hellman Protocol.
–
International Journal of Security and Networks (IJSN) 2 (2007) 284–296.
ISSN 1747-8413 (online), ISSN 1747-8405 (print).
Simon Blake-Wilson, Nelson Bolyard, Vipul Gupta, Chris Hawk, Bodo Moeller:
Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS).
RFC 4492.
IETF, May 2006.
Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, Bodo Möller, David Pointcheval:
Provably Secure Password-Based Authentication in TLS.
–
Shiuhpyng Shieh, Sushil Jajodia (Eds.):
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security – ASIACCS'06.
ACM, 2006.
35–45.
ISBN 1-59593-272-0.
[PDF]
Bodo Möller:
SRP (Secure Remote Passwords) weakness.
–
sci.cypt, 6 Jun 2005,
Message-ID <d80v0o$pi7$1@lnx107.hrz.tu-darmstadt.de>.
(Addendum in <d816lv$sfl$1@lnx107.hrz.tu-darmstadt.de>.)
Bodo Möller:
Binary exponentiation /
Right-to-left exponentiation /
Signed digit exponentiation /
Simultaneous exponentiation /
Sliding window exponentiation /
2k-ary exponentiation.
–
Henk C. A. van Tilborg (Ed.):
Encyclopedia of Cryptography and Security.
Springer-Verlag, 2005.
ISBN 0-387-23473-X.
Bodo Möller:
Fractional Windows Revisited: Improved Signed-Digit Representations for Efficient Exponentiation.
–
Choonsik Park, Seongtaek Chee (Eds.):
Information Security and Cryptology – ICISC 2004.
LNCS 3506.
Springer-Verlag, 2005.
137–153.
ISBN-10 3-540-26226-1, ISBN-13 978-3-540-26226-8, ISSN 0302-9743.
[PDF]
Bodo Möller:
A Public-Key Encryption Scheme with Pseudo-Random Ciphertexts.
–
Pierangela Samarati, Peter Ryan, Dieter Gollmann, Refik Molva (Eds.):
Computer Security – ESORICS 2004.
LNCS 3193.
Springer-Verlag, 2004.
335–351.
ISBN 3-540-22987-6, ISSN 0302-9743.
[PDF]
Bodo Möller:
Security of CBC Ciphersuites in SSL/TLS: Problems and Countermeasures.
http://www.openssl.org/~bodo/tls-cbc.txt
(Last updated 2004-05-20.)
Bodo Möller:
Public-Key Cryptography – Theory and Practice.
Dissertation.
Technische Universität Darmstadt, Fachbereich Informatik, 2003.
1. Introduction
Part I: Theory
2. Public-Key Cryptography and Provable Security
3. Hybrid Public-Key Encryption: The DHAES Construction
4. A Public-Key Cryptosystem for Length-Preserving Chaumian MixesPart II: Practice
5. Exponentiation and Multi-Exponentiation in Public-Key Cryptography
6. Efficient Exponentiation
7. Efficient Multi-Exponentiation
8. Elliptic Curve Point Multiplication with Resistance against Side-Channel Attacks
[PDF]
Bodo Möller:
Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes.
–
Marc Joye (Ed.):
Topics in Cryptology – CT-RSA 2003.
LNCS 2612.
Springer-Verlag, 2003.
244–262.
ISBN 3-540-00847-0, ISSN 0302-9743.
(Revised version of TI-5/02.)
[PDF]
Bodo Möller:
Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes.
TU Darmstadt, Fachbereich Informatik, Technical Report TI-5/02, 9th August 2002.
(Superseded by CT-RSA 2003 version.)
[PDF]
Bodo Möller:
Improved Techniques for Fast Exponentiation.
–
Pil Joong Lee, Chae Hoon Lim (Eds.):
Information Security and Cryptology – ICISC 2002.
LNCS 2587.
Springer-Verlag, 2003.
298–312.
ISBN 3-540-00716-4, ISSN 0302-9743.
[PDF]
Bodo Möller:
Parallelizable Elliptic Curve Point Multiplication Method with Resistance against Side-Channel Attacks.
–
Agnes Hui Chan, Virgil Gligor (Eds.):
Information Security – ISC 2002.
LNCS 2433.
Springer-Verlag, 2002.
402–413.
ISBN 3-540-44270-7, ISSN 0302-9743.
(Downloadable file includes notes not contained in ISC 2002 version.)
[PDF]
Tetsuya Izu, Bodo Möller, Tsuyoshi Takagi:
Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks.
–
Alfred Menezes, Palash Sarkar (Eds.):
Progress in Cryptology – INDOCRYPT 2002.
LNCS 2551.
Springer-Verlag, 2002.
296–313.
ISBN 3-540-00263-4, ISSN 0302-9743.
(Downloadable file includes errata not contained in INDOCRYPT 2002 version.)
[PDF]
Bodo Möller:
Securing Elliptic Curve Point Multiplication against Side-Channel Attacks.
–
George I. Davida, Yair Frankel (Eds.):
Information Security – ISC 2001.
LNCS 2200.
Springer-Verlag, 2001.
324–334.
ISBN 3-540-42662-0, ISSN 0302-9743.
(Downloadable file includes efficiency improvement addendum and errata not contained in ISC 2001 version.)
[PDF]
Bodo Möller:
Algorithms for Multi-exponentiation.
–
Serge Vaudenay, Amr M. Youssef (Eds.):
Selected Areas in Cryptography – SAC 2001.
LNCS 2259.
Springer-Verlag, 2001.
165–180.
ISBN 3-540-43066-0, ISSN 0302-9743.
(Revised version of TI-8/01.)
[PDF]
Bodo Möller:
Algorithms for multi-exponentiation.
TU Darmstadt, Fachbereich Informatik, Technical Report TI-8/01, 27th April 2001.
(Superseded by SAC 2001 version.)
[PDF]
Birgit Henhapl, Bodo Möller:
Public-Key-Infrastrukturen.
–
HMD Praxis der Wirtschaftsinformatik Heft 216 (2000) 58–66.
ISBN 3-932588-80-0, ISSN 1436-3011.
Bodo Möller:
Sicherheit durch Open Source.
–
Michael Barabas, Gerhard Rossbach (Hrsg.):
Internet – E-Business-Strategien für die Unternehmensentwicklung /
Deutscher Internet-Kongress 2000.
dpunkt-Verlag, Heidelberg, 2000.
239–246.
ISBN 3-932588-89-4.
(OpenSSL als Beispiel für Open-Source-Sicherheitssoftware.)
Johannes Buchmann, Markus Maurer, Bodo Möller:
Cryptography based on number fields with large regulator.
–
Journal de Théorie des Nombres de Bordeaux 12 (2000) 293–307.
ISSN 1246-7405.
(Revised version of TI-5/00.)
[PDF; also available in PostScript format]
Johannes Buchmann, Markus Maurer, Bodo Möller:
Cryptography based on number fields with large regulator.
TU Darmstadt, Fachbereich Informatik, Technical Report TI-5/00, 6th June 2000.
(Superseded by JTNB version.)
[PDF]
Safuat Hamdy, Bodo Möller:
Security of Cryptosystems Based on Class Groups of Imaginary Quadratic Orders.
–
Tatsuaki Okamoto (Ed.):
Advances in Cryptology – ASIACRYPT 2000.
LNCS 1976.
Springer-Verlag, 2000.
234–247.
ISBN 3-540-41404-5, ISSN 0302-9743.
(Revised version of TI-4/00.
Downloadable file includes addendum not contained in ASIACRYPT 2000 version.)
[PDF]
Safuat Hamdy, Bodo Möller:
Security of Cryptosystems Based on Class Groups of Imaginary Quadratic Orders.
TU Darmstadt, Fachbereich Informatik, Technical Report TI-4/00, 29th May 2000.
(Superseded by ASIACRYPT 2000 version.)
[PDF]
Bodo Möller:
Algebraische Petrinetze.
Diplomarbeit.
Universität Hamburg, Fachbereich Informatik, 1. Oktober 1999.
[PDF]
The OpenSSL Project:
OpenSSL.
(I joined the OpenSSL development team in March 1999.)
Bodo Möller:
Benutzerüberwachte Erzeugung von DSA-Schlüsseln in Chipkarten.
–
Patrick Horster (Hrsg.):
Sicherheitsinfrastrukturen.
DuD-Fachbeiträge, Vieweg, 1999.
238–246.
ISBN 3-528-05709-2.
(Die Formatierung des Beitrags im Tagungsband weicht von der hier verfügbaren Fassung ab.)
[PDF]
Bodo Möller:
Lineare Invarianten algebraischer Petrinetze.
Studienarbeit.
Universität Hamburg, Fachbereich Informatik, 14. Januar 1999.
Bodo Möller:
Schwächen des ec-PIN-Verfahrens.
Manuskript, 18. Februar 1997.
[PDF]
Bodo Möller:
Wegweiser durch den Dschungel der PGP-Versionen.
–
Martin Rost, Michael Schack (Hrsg.):
Der Internet-Praktiker – Referenz und Programme.
Verlag Heinz Heise, Hannover, 1995.
140–142.
ISBN 3-88229-063-3.
[Image] | [Text] | |||||||
Name: | Bodo Möller | |||||||
... in HTML, you can write: | Bodo Möller | |||||||
... in (La)TeX, you can write: | Bodo M{\"o}ller | |||||||
Pronunciation in IPA (International Phonetic Alphabet): |
ˈboːdo ˈmœlɐ (SAMPA transcription: "bo:do "m9l6 ) |
|||||||
Transcription in Katakana: | ボード・メラー | |||||||
Transcription in Hangeul: | 보도 멀러 |
Various ways to (mis-)spell may name
(search machine targets for this page, not for human consumption):
Bodo Möller, Bodo Moeller, Bodo M¨oller, Bodo Mo¨ller, Bodo Moller, Bodo MM-vller, Bodo Mvller, Bodo M ller