[{"language":[{"iso":"eng"}],"extern":"1","_id":"15899","user_id":"83504","status":"public","type":"book_chapter","publication":"Computer Security -- ESORICS 2015","title":"Practical Invalid Curve Attacks on TLS-ECDH","main_file_link":[{"url":"https://www.nds.ruhr-uni-bochum.de/research/publications/ESORICS15/"}],"doi":"10.1007/978-3-319-24174-6_21","date_updated":"2022-01-06T06:52:39Z","author":[{"first_name":"Tibor","last_name":"Jager","full_name":"Jager, Tibor"},{"last_name":"Schwenk","full_name":"Schwenk, Jörg","first_name":"Jörg"},{"last_name":"Somorovsky","orcid":"0000-0002-3593-7720","full_name":"Somorovsky, Juraj","id":"83504","first_name":"Juraj"}],"date_created":"2020-02-15T09:41:17Z","year":"2015","place":"Cham","citation":{"ama":"Jager T, Schwenk J, Somorovsky J. Practical Invalid Curve Attacks on TLS-ECDH. In: <i>Computer Security -- ESORICS 2015</i>. Cham; 2015. doi:<a href=\"https://doi.org/10.1007/978-3-319-24174-6_21\">10.1007/978-3-319-24174-6_21</a>","chicago":"Jager, Tibor, Jörg Schwenk, and Juraj Somorovsky. “Practical Invalid Curve Attacks on TLS-ECDH.” In <i>Computer Security -- ESORICS 2015</i>. Cham, 2015. <a href=\"https://doi.org/10.1007/978-3-319-24174-6_21\">https://doi.org/10.1007/978-3-319-24174-6_21</a>.","ieee":"T. Jager, J. Schwenk, and J. Somorovsky, “Practical Invalid Curve Attacks on TLS-ECDH,” in <i>Computer Security -- ESORICS 2015</i>, Cham, 2015.","bibtex":"@inbook{Jager_Schwenk_Somorovsky_2015, place={Cham}, title={Practical Invalid Curve Attacks on TLS-ECDH}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-24174-6_21\">10.1007/978-3-319-24174-6_21</a>}, booktitle={Computer Security -- ESORICS 2015}, author={Jager, Tibor and Schwenk, Jörg and Somorovsky, Juraj}, year={2015} }","short":"T. Jager, J. Schwenk, J. Somorovsky, in: Computer Security -- ESORICS 2015, Cham, 2015.","mla":"Jager, Tibor, et al. “Practical Invalid Curve Attacks on TLS-ECDH.” <i>Computer Security -- ESORICS 2015</i>, 2015, doi:<a href=\"https://doi.org/10.1007/978-3-319-24174-6_21\">10.1007/978-3-319-24174-6_21</a>.","apa":"Jager, T., Schwenk, J., &#38; Somorovsky, J. (2015). Practical Invalid Curve Attacks on TLS-ECDH. In <i>Computer Security -- ESORICS 2015</i>. Cham. <a href=\"https://doi.org/10.1007/978-3-319-24174-6_21\">https://doi.org/10.1007/978-3-319-24174-6_21</a>"},"publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783319241739","9783319241746"]}}]
