Follow
Martin Grothe
Martin Grothe
Senior Cyber Security Architect @ EY
Verified email at rub.de - Homepage
Title
Cited by
Cited by
Year
The dangers of key reuse: practical attacks on IPsec IKE
D Felsch, M Grothe, J Schwenk, A Czubak, M Szymanek
Proceedings of the 27th USENIX Conference on Security Symposium, 567-583, 2018
432018
1 Trillion Dollar Refund–How To Spoof PDF Signatures
V Mladenov, C Mainka, KM zu Selhausen, M Grothe, J Schwenk
21*
How to Break Microsoft Rights Management Services.
M Grothe, C Mainka, P Rösler, J Schwenk
WOOT, 2016
172016
Your Cloud in my Company: Modern Rights Management Services Revisited
M Grothe, P Rösler, J Jupke, J Kaiser, C Mainka, J Schwenk
9*
Breaking and Fixing Gridcoin
M Grothe, T Niemann, J Somorovsky, J Schwenk
Proceedings of the 11th USENIX Conference on Offensive Technologies, 14-14, 2017
52017
The system can't perform the operation now. Try again later.
Articles 1–5