{"page":"407--425","year":"2015","citation":{"ieee":"T. Jager, J. Schwenk, and J. Somorovsky, “Practical Invalid Curve Attacks on TLS-ECDH,” in Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I, 2015, pp. 407--425.","short":"T. Jager, J. Schwenk, J. Somorovsky, in: Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I, 2015, pp. 407--425.","bibtex":"@inproceedings{Jager_Schwenk_Somorovsky_2015, title={Practical Invalid Curve Attacks on TLS-ECDH}, DOI={10.1007/978-3-319-24174-6_21}, booktitle={Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I}, author={Jager, Tibor and Schwenk, Jörg and Somorovsky, Juraj}, year={2015}, pages={407--425} }","mla":"Jager, Tibor, et al. “Practical Invalid Curve Attacks on TLS-ECDH.” Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I, 2015, pp. 407--425, doi:10.1007/978-3-319-24174-6_21.","chicago":"Jager, Tibor, Jörg Schwenk, and Juraj Somorovsky. “Practical Invalid Curve Attacks on TLS-ECDH.” In Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I, 407--425, 2015. https://doi.org/10.1007/978-3-319-24174-6_21.","apa":"Jager, T., Schwenk, J., & Somorovsky, J. (2015). Practical Invalid Curve Attacks on TLS-ECDH. In Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I (pp. 407--425). https://doi.org/10.1007/978-3-319-24174-6_21","ama":"Jager T, Schwenk J, Somorovsky J. Practical Invalid Curve Attacks on TLS-ECDH. In: Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I. ; 2015:407--425. doi:10.1007/978-3-319-24174-6_21"},"type":"conference","doi":"10.1007/978-3-319-24174-6_21","date_updated":"2022-01-06T06:58:57Z","_id":"3122","date_created":"2018-06-07T09:18:33Z","status":"public","publication":"Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I","department":[{"_id":"558"}],"author":[{"full_name":"Jager, Tibor","first_name":"Tibor","id":"64669","last_name":"Jager"},{"full_name":"Schwenk, Jörg","first_name":"Jörg","last_name":"Schwenk"},{"last_name":"Somorovsky","full_name":"Somorovsky, Juraj","first_name":"Juraj"}],"user_id":"38235","title":"Practical Invalid Curve Attacks on TLS-ECDH","extern":"1"}