| 2008 |
| 11 | | Ulrich Kühn,
Andrei Pyshkin,
Erik Tews,
Ralf-Philipp Weinmann:
Variants of Bleichenbacher's Low-Exponent Attack on PKCS#1 RSA Signatures.
Sicherheit 2008: 97-109 |
| 10 | EE | Ulrich Kühn:
Breaking the Shin-Shin-Rhee remotely keyed encryption schemes.
Inf. Process. Lett. 105(6): 236-240 (2008) |
| 2007 |
| 9 | EE | Ulrich Kühn,
Marcel Selhorst,
Christian Stüble:
Realizing property-based attestation and sealing with commonly available hard- and software.
STC 2007: 50-57 |
| 2006 |
| 8 | EE | Ulrich Kühn:
Analysis of a Database and Index Encryption Scheme - Problems and Fixes.
Secure Data Management 2006: 146-159 |
| 2005 |
| 7 | EE | Ulrich Kühn,
Klaus Kursawe,
Stefan Lucks,
Ahmad-Reza Sadeghi,
Christian Stüble:
Secure Data Management in Trusted Computing.
CHES 2005: 324-338 |
| 6 | EE | Zinaida Benenson,
Ulrich Kühn,
Stefan Lucks:
Cryptographic Attack Metrics.
Dependability Metrics 2005: 133-156 |
| 2003 |
| 5 | EE | Ulrich Kühn:
Side-Channel Attacks on Textbook RSA and ElGamal Encryption.
Public Key Cryptography 2003: 324-336 |
| 2002 |
| 4 | EE | Ulrich Kühn:
Improved Cryptanalysis of MISTY1.
FSE 2002: 61-75 |
| 2001 |
| 3 | EE | Ulrich Kühn:
Cryptanalysis of Reduced-Round MISTY.
EUROCRYPT 2001: 325-339 |
| 2 | | Ulrich Kühn:
A randomized parallel algorithm for Voronoi diagrams based on symmetric convex distance functions.
Discrete Applied Mathematics 109(1-2): 177-196 (2001) |
| 1998 |
| 1 | EE | Ulrich Kühn:
Local Calculation of Voronoi Diagrams.
Inf. Process. Lett. 68(6): 307-312 (1998) |