{"user_id":"83504","citation":{"short":"R. Merget, M. Brinkmann, N. Aviram, J. Somorovsky, J. Mittmann, J. Schwenk, in: 30th {USENIX} Security Symposium ({USENIX} Security 21), {USENIX} Association, 2021, pp. 213–230.","apa":"Merget, R., Brinkmann, M., Aviram, N., Somorovsky, J., Mittmann, J., & Schwenk, J. (2021). Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E). 30th {USENIX} Security Symposium ({USENIX} Security 21), 213–230.","chicago":"Merget, Robert, Marcus Brinkmann, Nimrod Aviram, Juraj Somorovsky, Johannes Mittmann, and Jörg Schwenk. “Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E).” In 30th {USENIX} Security Symposium ({USENIX} Security 21), 213–30. {USENIX} Association, 2021.","bibtex":"@inproceedings{Merget_Brinkmann_Aviram_Somorovsky_Mittmann_Schwenk_2021, title={Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E)}, booktitle={30th {USENIX} Security Symposium ({USENIX} Security 21)}, publisher={{USENIX} Association}, author={Merget, Robert and Brinkmann, Marcus and Aviram, Nimrod and Somorovsky, Juraj and Mittmann, Johannes and Schwenk, Jörg}, year={2021}, pages={213–230} }","ieee":"R. Merget, M. Brinkmann, N. Aviram, J. Somorovsky, J. Mittmann, and J. Schwenk, “Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E),” in 30th {USENIX} Security Symposium ({USENIX} Security 21), 2021, pp. 213–230.","mla":"Merget, Robert, et al. “Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E).” 30th {USENIX} Security Symposium ({USENIX} Security 21), {USENIX} Association, 2021, pp. 213–30.","ama":"Merget R, Brinkmann M, Aviram N, Somorovsky J, Mittmann J, Schwenk J. Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E). In: 30th {USENIX} Security Symposium ({USENIX} Security 21). {USENIX} Association; 2021:213-230."},"publication_identifier":{"isbn":["978-1-939133-24-3"]},"title":"Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E)","date_updated":"2022-01-06T06:57:01Z","year":"2021","department":[{"_id":"632"}],"publication":"30th {USENIX} Security Symposium ({USENIX} Security 21)","publisher":"{USENIX} Association","type":"conference","page":"213-230","author":[{"first_name":"Robert","last_name":"Merget","full_name":"Merget, Robert"},{"first_name":"Marcus","full_name":"Brinkmann, Marcus","last_name":"Brinkmann"},{"first_name":"Nimrod","full_name":"Aviram, Nimrod","last_name":"Aviram"},{"full_name":"Somorovsky, Juraj","id":"83504","last_name":"Somorovsky","first_name":"Juraj","orcid":"0000-0002-3593-7720"},{"first_name":"Johannes","full_name":"Mittmann, Johannes","last_name":"Mittmann"},{"first_name":"Jörg","full_name":"Schwenk, Jörg","last_name":"Schwenk"}],"_id":"25332","date_created":"2021-10-04T18:55:36Z","status":"public","language":[{"iso":"eng"}]}