<?xml version="1.0" encoding="UTF-8"?>

<modsCollection xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-3.xsd">
<mods version="3.3">

<genre>conference paper</genre>

<titleInfo><title>Practical Invalid Curve Attacks on TLS-ECDH</title></titleInfo>





<name type="personal">
  <namePart type="given">Tibor</namePart>
  <namePart type="family">Jager</namePart>
  <role><roleTerm type="text">author</roleTerm> </role><identifier type="local">64669</identifier></name>
<name type="personal">
  <namePart type="given">Jörg</namePart>
  <namePart type="family">Schwenk</namePart>
  <role><roleTerm type="text">author</roleTerm> </role></name>
<name type="personal">
  <namePart type="given">Juraj</namePart>
  <namePart type="family">Somorovsky</namePart>
  <role><roleTerm type="text">author</roleTerm> </role></name>







<name type="corporate">
  <namePart></namePart>
  <identifier type="local">558</identifier>
  <role>
    <roleTerm type="text">department</roleTerm>
  </role>
</name>









<originInfo><dateIssued encoding="w3cdtf">2015</dateIssued>
</originInfo>



<relatedItem type="host"><titleInfo><title>Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I</title></titleInfo><identifier type="doi">10.1007/978-3-319-24174-6_21</identifier>
<part><extent unit="pages">407--425</extent>
</part>
</relatedItem>

<note type="extern">yes</note>
<extension>
<bibliographicCitation>
<chicago>Jager, Tibor, Jörg Schwenk, and Juraj Somorovsky. “Practical Invalid Curve Attacks on TLS-ECDH.” In &lt;i&gt;Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I&lt;/i&gt;, 407--425, 2015. &lt;a href=&quot;https://doi.org/10.1007/978-3-319-24174-6_21&quot;&gt;https://doi.org/10.1007/978-3-319-24174-6_21&lt;/a&gt;.</chicago>
<ieee>T. Jager, J. Schwenk, and J. Somorovsky, “Practical Invalid Curve Attacks on TLS-ECDH,” in &lt;i&gt;Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I&lt;/i&gt;, 2015, pp. 407--425.</ieee>
<ama>Jager T, Schwenk J, Somorovsky J. Practical Invalid Curve Attacks on TLS-ECDH. In: &lt;i&gt;Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I&lt;/i&gt;. ; 2015:407--425. doi:&lt;a href=&quot;https://doi.org/10.1007/978-3-319-24174-6_21&quot;&gt;10.1007/978-3-319-24174-6_21&lt;/a&gt;</ama>
<bibtex>@inproceedings{Jager_Schwenk_Somorovsky_2015, title={Practical Invalid Curve Attacks on TLS-ECDH}, DOI={&lt;a href=&quot;https://doi.org/10.1007/978-3-319-24174-6_21&quot;&gt;10.1007/978-3-319-24174-6_21&lt;/a&gt;}, booktitle={Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I}, author={Jager, Tibor and Schwenk, Jörg and Somorovsky, Juraj}, year={2015}, pages={407--425} }</bibtex>
<mla>Jager, Tibor, et al. “Practical Invalid Curve Attacks on TLS-ECDH.” &lt;i&gt;Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I&lt;/i&gt;, 2015, pp. 407--425, doi:&lt;a href=&quot;https://doi.org/10.1007/978-3-319-24174-6_21&quot;&gt;10.1007/978-3-319-24174-6_21&lt;/a&gt;.</mla>
<short>T. Jager, J. Schwenk, J. Somorovsky, in: Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I, 2015, pp. 407--425.</short>
<apa>Jager, T., Schwenk, J., &amp;#38; Somorovsky, J. (2015). Practical Invalid Curve Attacks on TLS-ECDH. In &lt;i&gt;Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I&lt;/i&gt; (pp. 407--425). &lt;a href=&quot;https://doi.org/10.1007/978-3-319-24174-6_21&quot;&gt;https://doi.org/10.1007/978-3-319-24174-6_21&lt;/a&gt;</apa>
</bibliographicCitation>
</extension>
<recordInfo><recordIdentifier>3122</recordIdentifier><recordCreationDate encoding="w3cdtf">2018-06-07T09:18:33Z</recordCreationDate><recordChangeDate encoding="w3cdtf">2022-01-06T06:58:57Z</recordChangeDate>
</recordInfo>
</mods>
</modsCollection>
