[{"extern":"1","language":[{"iso":"eng"}],"_id":"15899","user_id":"83504","status":"public","publication":"Computer Security -- ESORICS 2015","type":"book_chapter","title":"Practical Invalid Curve Attacks on TLS-ECDH","doi":"10.1007/978-3-319-24174-6_21","main_file_link":[{"url":"https://www.nds.ruhr-uni-bochum.de/research/publications/ESORICS15/"}],"date_updated":"2022-01-06T06:52:39Z","date_created":"2020-02-15T09:41:17Z","author":[{"first_name":"Tibor","last_name":"Jager","full_name":"Jager, Tibor"},{"first_name":"Jörg","full_name":"Schwenk, Jörg","last_name":"Schwenk"},{"first_name":"Juraj","id":"83504","full_name":"Somorovsky, Juraj","last_name":"Somorovsky","orcid":"0000-0002-3593-7720"}],"year":"2015","place":"Cham","citation":{"chicago":"Jager, Tibor, Jörg Schwenk, and Juraj Somorovsky. “Practical Invalid Curve Attacks on TLS-ECDH.” In <i>Computer Security -- ESORICS 2015</i>. Cham, 2015. <a href=\"https://doi.org/10.1007/978-3-319-24174-6_21\">https://doi.org/10.1007/978-3-319-24174-6_21</a>.","ieee":"T. Jager, J. Schwenk, and J. Somorovsky, “Practical Invalid Curve Attacks on TLS-ECDH,” in <i>Computer Security -- ESORICS 2015</i>, Cham, 2015.","ama":"Jager T, Schwenk J, Somorovsky J. Practical Invalid Curve Attacks on TLS-ECDH. In: <i>Computer Security -- ESORICS 2015</i>. Cham; 2015. doi:<a href=\"https://doi.org/10.1007/978-3-319-24174-6_21\">10.1007/978-3-319-24174-6_21</a>","bibtex":"@inbook{Jager_Schwenk_Somorovsky_2015, place={Cham}, title={Practical Invalid Curve Attacks on TLS-ECDH}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-24174-6_21\">10.1007/978-3-319-24174-6_21</a>}, booktitle={Computer Security -- ESORICS 2015}, author={Jager, Tibor and Schwenk, Jörg and Somorovsky, Juraj}, year={2015} }","mla":"Jager, Tibor, et al. “Practical Invalid Curve Attacks on TLS-ECDH.” <i>Computer Security -- ESORICS 2015</i>, 2015, doi:<a href=\"https://doi.org/10.1007/978-3-319-24174-6_21\">10.1007/978-3-319-24174-6_21</a>.","short":"T. Jager, J. Schwenk, J. Somorovsky, in: Computer Security -- ESORICS 2015, Cham, 2015.","apa":"Jager, T., Schwenk, J., &#38; Somorovsky, J. (2015). Practical Invalid Curve Attacks on TLS-ECDH. In <i>Computer Security -- ESORICS 2015</i>. Cham. <a href=\"https://doi.org/10.1007/978-3-319-24174-6_21\">https://doi.org/10.1007/978-3-319-24174-6_21</a>"},"publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783319241739","9783319241746"]},"publication_status":"published"}]
