[{"status":"public","publication":"Computer Security -- ESORICS 2015","type":"book_chapter","extern":"1","language":[{"iso":"eng"}],"user_id":"83504","_id":"15899","citation":{"ieee":"T. Jager, J. Schwenk, and J. Somorovsky, “Practical Invalid Curve Attacks on TLS-ECDH,” in <i>Computer Security -- ESORICS 2015</i>, Cham, 2015.","chicago":"Jager, Tibor, Jörg Schwenk, and Juraj Somorovsky. “Practical Invalid Curve Attacks on TLS-ECDH.” In <i>Computer Security -- ESORICS 2015</i>. Cham, 2015. <a href=\"https://doi.org/10.1007/978-3-319-24174-6_21\">https://doi.org/10.1007/978-3-319-24174-6_21</a>.","ama":"Jager T, Schwenk J, Somorovsky J. Practical Invalid Curve Attacks on TLS-ECDH. In: <i>Computer Security -- ESORICS 2015</i>. Cham; 2015. doi:<a href=\"https://doi.org/10.1007/978-3-319-24174-6_21\">10.1007/978-3-319-24174-6_21</a>","bibtex":"@inbook{Jager_Schwenk_Somorovsky_2015, place={Cham}, title={Practical Invalid Curve Attacks on TLS-ECDH}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-24174-6_21\">10.1007/978-3-319-24174-6_21</a>}, booktitle={Computer Security -- ESORICS 2015}, author={Jager, Tibor and Schwenk, Jörg and Somorovsky, Juraj}, year={2015} }","short":"T. Jager, J. Schwenk, J. Somorovsky, in: Computer Security -- ESORICS 2015, Cham, 2015.","mla":"Jager, Tibor, et al. “Practical Invalid Curve Attacks on TLS-ECDH.” <i>Computer Security -- ESORICS 2015</i>, 2015, doi:<a href=\"https://doi.org/10.1007/978-3-319-24174-6_21\">10.1007/978-3-319-24174-6_21</a>.","apa":"Jager, T., Schwenk, J., &#38; Somorovsky, J. (2015). Practical Invalid Curve Attacks on TLS-ECDH. In <i>Computer Security -- ESORICS 2015</i>. Cham. <a href=\"https://doi.org/10.1007/978-3-319-24174-6_21\">https://doi.org/10.1007/978-3-319-24174-6_21</a>"},"year":"2015","place":"Cham","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783319241739","9783319241746"]},"publication_status":"published","doi":"10.1007/978-3-319-24174-6_21","main_file_link":[{"url":"https://www.nds.ruhr-uni-bochum.de/research/publications/ESORICS15/"}],"title":"Practical Invalid Curve Attacks on TLS-ECDH","author":[{"last_name":"Jager","full_name":"Jager, Tibor","first_name":"Tibor"},{"first_name":"Jörg","full_name":"Schwenk, Jörg","last_name":"Schwenk"},{"orcid":"0000-0002-3593-7720","last_name":"Somorovsky","id":"83504","full_name":"Somorovsky, Juraj","first_name":"Juraj"}],"date_created":"2020-02-15T09:41:17Z","date_updated":"2022-01-06T06:52:39Z"}]
