Publikationsliste
2023
Attema, T.; Fehr, S.; Klooß, M.
Fiat–Shamir Transformation of Multi-Round Interactive Proofs (Extended Version)
2023. Journal of Cryptology, 36 (4), Art.-Nr.: 36. doi:10.1007/s00145-023-09478-y
Fiat–Shamir Transformation of Multi-Round Interactive Proofs (Extended Version)
2023. Journal of Cryptology, 36 (4), Art.-Nr.: 36. doi:10.1007/s00145-023-09478-y
Benz, L.; Beskorovajnov, W.; Eilebrecht, S.; Müller-Quade, J.; Ottenhues, A.; Schwerdt, R.
Sender-binding Key Encapsulation
2023. Public-Key Cryptography – PKC 2023 – 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7–10, 2023, Proceedings, Part I. Ed.: A. Boldyreva, 744 – 773, Springer Nature Switzerland AG. doi:10.1007/978-3-031-31368-4_26
Sender-binding Key Encapsulation
2023. Public-Key Cryptography – PKC 2023 – 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7–10, 2023, Proceedings, Part I. Ed.: A. Boldyreva, 744 – 773, Springer Nature Switzerland AG. doi:10.1007/978-3-031-31368-4_26
Klooß, M.
On Efficient Zero-Knowledge Arguments. Dissertation
2023, Februar 20. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000156118
On Efficient Zero-Knowledge Arguments. Dissertation
2023, Februar 20. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000156118
2022
Agrikola, T.; Couteau, G.; Maier, S.
Anonymous Whistleblowing over Authenticated Channels
2022. Theory of Cryptography – 20th International Conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022, Proceedings, Part II. Ed.: E. Kiltz, 685–714, Springer Nature Switzerland AG. doi:10.1007/978-3-031-22365-5_24
Anonymous Whistleblowing over Authenticated Channels
2022. Theory of Cryptography – 20th International Conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022, Proceedings, Part II. Ed.: E. Kiltz, 685–714, Springer Nature Switzerland AG. doi:10.1007/978-3-031-22365-5_24
Attema, T.; Fehr, S.; Klooß, M.
Fiat-Shamir Transformation of Multi-round Interactive Proofs
2022. Theory of Cryptography – 20th International Conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022, Proceedings, Part I. Ed.: E. Kiltz, 113–142, Springer Nature Switzerland AG. doi:10.1007/978-3-031-22318-1_5
Fiat-Shamir Transformation of Multi-round Interactive Proofs
2022. Theory of Cryptography – 20th International Conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022, Proceedings, Part I. Ed.: E. Kiltz, 113–142, Springer Nature Switzerland AG. doi:10.1007/978-3-031-22318-1_5
Bayreuther, S.; Jacob, F.; Grotz, M.; Kartmann, R.; Peller-Konrad, F.; Paus, F.; Hartenstein, H.; Asfour, T.
BlueSky: Combining Task Planning and Activity-Centric Access Control for Assistive Humanoid Robots
2022. SACMAT ’22: Proceedings of the 27th ACM on Symposium on Access Control Models and TechnologiesJune 2022, New York NY USA, June 8 - 10, 2022. Ed.: S. Dietrich, 185–194, Association for Computing Machinery (ACM). doi:10.1145/3532105.3535018
BlueSky: Combining Task Planning and Activity-Centric Access Control for Assistive Humanoid Robots
2022. SACMAT ’22: Proceedings of the 27th ACM on Symposium on Access Control Models and TechnologiesJune 2022, New York NY USA, June 8 - 10, 2022. Ed.: S. Dietrich, 185–194, Association for Computing Machinery (ACM). doi:10.1145/3532105.3535018
Beckert, B.; Budurushi, J.; Grunwald, A.; Krimmer, R.; Kulyk, O.; Küsters, R.; Mayer, A.; Müller-Quade, J.; Neumann, S.; Volkamer, M.
Recent Developments in the Context of Online Elections and Digital Polls in Germany
2022. Sicherheit 2022 : Sicherheit, Schutz und Zuverlässigkeit : Konferenzband der 11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 5.-8. April 2022 in Karlsruhe. Hrsg.: C. Wressnegger, Gesellschaft für Informatik (GI). doi:10.18420/sicherheit2022_16
Recent Developments in the Context of Online Elections and Digital Polls in Germany
2022. Sicherheit 2022 : Sicherheit, Schutz und Zuverlässigkeit : Konferenzband der 11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 5.-8. April 2022 in Karlsruhe. Hrsg.: C. Wressnegger, Gesellschaft für Informatik (GI). doi:10.18420/sicherheit2022_16
Beskorovajnov, W.; Gröll, R.; Müller-Quade, J.; Ottenhues, A.; Schwerdt, R.
A New Security Notion for PKC in the Standard Model: Weaker, Simpler, and Still Realizing Secure Channels
2022. Public-Key Cryptography – PKC 2022. Ed.: G. Hanaoka. Vol. 2, 316–344, Springer International Publishing. doi:10.1007/978-3-030-97131-1_11
A New Security Notion for PKC in the Standard Model: Weaker, Simpler, and Still Realizing Secure Channels
2022. Public-Key Cryptography – PKC 2022. Ed.: G. Hanaoka. Vol. 2, 316–344, Springer International Publishing. doi:10.1007/978-3-030-97131-1_11
Couteau, G.; Goudarzi, D.; Klooß, M.; Reichle, M.
Sharp: Short Relaxed Range Proofs
2022. CCS ’22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Ed.: H. Yin Conference: CCS ’22: 2022 ACM SIGSAC Conference on Computer and Communications Security Los Angeles CA USA November 7 - 11, 2022, 609–622, Association for Computing Machinery (ACM). doi:10.1145/3548606.3560628
Sharp: Short Relaxed Range Proofs
2022. CCS ’22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Ed.: H. Yin Conference: CCS ’22: 2022 ACM SIGSAC Conference on Computer and Communications Security Los Angeles CA USA November 7 - 11, 2022, 609–622, Association for Computing Machinery (ACM). doi:10.1145/3548606.3560628
Doerner, D.; Mechler, J.; Müller-Quade, J.
Hardening the Security of Server-Aided MPC Using Remotely Unhackable Hardware Modules
2022. GI SICHERHEIT 2022, Ed.: C. Wressnegger, 83–99, Gesellschaft für Informatik (GI). doi:10.18420/sicherheit2022_05
Hardening the Security of Server-Aided MPC Using Remotely Unhackable Hardware Modules
2022. GI SICHERHEIT 2022, Ed.: C. Wressnegger, 83–99, Gesellschaft für Informatik (GI). doi:10.18420/sicherheit2022_05
Fetzer, V.; Keller, M.; Maier, S.; Raiber, M.; Rupp, A.; Schwerdt, R.
PUBA: Privacy-Preserving User-Data Bookkeeping and Analytics
2022. Proceedings on Privacy Enhancing Technologies, 2022 (2), 447–516. doi:10.2478/popets-2022-0054
PUBA: Privacy-Preserving User-Data Bookkeeping and Analytics
2022. Proceedings on Privacy Enhancing Technologies, 2022 (2), 447–516. doi:10.2478/popets-2022-0054
Jacob, F.; Bayreuther, S.; Hartenstein, H.
On CRDTs in Byzantine Environments : Conflict Freedom, Equivocation Tolerance, and the Matrix Replicated Data Type
2022. Sicherheit 2022 : Sicherheit, Schutz und Zuverlässigkeit. Hrsg.: C. Wressnegger, 113–128, Gesellschaft für Informatik (GI). doi:10.18420/sicherheit2022_07
On CRDTs in Byzantine Environments : Conflict Freedom, Equivocation Tolerance, and the Matrix Replicated Data Type
2022. Sicherheit 2022 : Sicherheit, Schutz und Zuverlässigkeit. Hrsg.: C. Wressnegger, 113–128, Gesellschaft für Informatik (GI). doi:10.18420/sicherheit2022_07
Maier, S.
On Security Notions for Multi-Party Computation. Dissertation
2022, November 4. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000151951
On Security Notions for Multi-Party Computation. Dissertation
2022, November 4. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000151951
Marquardt, K.; Happe, L.; Koch, A.; Wagner, I.
IT Mission: Interdisziplinäre Online Expeditionen
2022, Juli 12. easeCorona (2022), Würzburg, Deutschland, 11.–12. Juli 2022
IT Mission: Interdisziplinäre Online Expeditionen
2022, Juli 12. easeCorona (2022), Würzburg, Deutschland, 11.–12. Juli 2022
2021
Agrikola, T.
On Foundations of Protecting Computations. Dissertation
2021, Juni 17. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000133798
On Foundations of Protecting Computations. Dissertation
2021, Juni 17. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000133798
Beckert, B.; Budurushi, J.; Grunwald, A.; Krimmer, R.; Kulyk, O.; Küsters, R.; Mayer, A.; Müller-Quade, J.; Neumann, S.; Volkamer, M.
Aktuelle Entwicklungen im Kontext von Online-Wahlen und digitalen Abstimmungen
2021. doi:10.5445/IR/1000137300
Aktuelle Entwicklungen im Kontext von Online-Wahlen und digitalen Abstimmungen
2021. doi:10.5445/IR/1000137300
Berger, R. M.; Tiepelt, M.
On Forging SPHINCS-Haraka Signatures on a Fault-Tolerant Quantum Computer
2021. Progress in Cryptology – LATINCRYPT 2021 – 7th International Conference on Cryptology and Information Security in Latin America, Bogotá, Colombia, October 6–8, 2021, Proceedings. Ed.: P. Longa, 44–63, Springer International Publishing. doi:10.1007/978-3-030-88238-9_3
On Forging SPHINCS-Haraka Signatures on a Fault-Tolerant Quantum Computer
2021. Progress in Cryptology – LATINCRYPT 2021 – 7th International Conference on Cryptology and Information Security in Latin America, Bogotá, Colombia, October 6–8, 2021, Proceedings. Ed.: P. Longa, 44–63, Springer International Publishing. doi:10.1007/978-3-030-88238-9_3
Beskorovajnov, W.; Dörre, F.; Hartung, G.; Koch, A.; Müller-Quade, J.; Strufe, T.
ConTra Corona: Contact Tracing against the Coronavirus by Bridging the Centralized–Decentralized Divide for Stronger Privacy
2021. Advances in Cryptology – ASIACRYPT 2021: 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6–10, 2021, Proceedings, Part II. Ed.: M. Tibouchi, 665–695, Springer Verlag. doi:10.1007/978-3-030-92075-3_23
ConTra Corona: Contact Tracing against the Coronavirus by Bridging the Centralized–Decentralized Divide for Stronger Privacy
2021. Advances in Cryptology – ASIACRYPT 2021: 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6–10, 2021, Proceedings, Part II. Ed.: M. Tibouchi, 665–695, Springer Verlag. doi:10.1007/978-3-030-92075-3_23
Beskorovajnov, W.; Dörre, F.; Hartung, G.; Koch, A.; Müller-Quade, J.; Strufe, T.
ConTra Corona : Contact Tracing against the Coronavirus by Bridging the Centralized–Decentralized Divide for Stronger Privacy
2021. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000139714
ConTra Corona : Contact Tracing against the Coronavirus by Bridging the Centralized–Decentralized Divide for Stronger Privacy
2021. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000139714
Boenisch, F.; Munz, R.; Tiepelt, M.; Hanisch, S.; Kuhn, C.; Francis, P.
Side-Channel Attacks on Query-Based Data Anonymization
2021. CCS ’21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, November 2021, 1254–1265, Association for Computing Machinery (ACM). doi:10.1145/3460120.3484751
Side-Channel Attacks on Query-Based Data Anonymization
2021. CCS ’21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, November 2021, 1254–1265, Association for Computing Machinery (ACM). doi:10.1145/3460120.3484751
Broadnax, B.; Koch, A.; Mechler, J.; Müller, T.; Müller-Quade, J.; Nagel, M.
Fortified Multi-Party Computation: Taking Advantage of Simple Secure Hardware Modules
2021. Proceedings on privacy enhancing technologies, 2021 (4), 312–338. doi:10.2478/popets-2021-0072
Fortified Multi-Party Computation: Taking Advantage of Simple Secure Hardware Modules
2021. Proceedings on privacy enhancing technologies, 2021 (4), 312–338. doi:10.2478/popets-2021-0072
Broadnax, B.; Mechler, J.; Müller-Quade, J.
Environmentally Friendly Composable Multi-party Computation in the Plain Model from Standard (Timed) Assumptions
2021. Theory of Cryptography – 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021, Proceedings, Part I. Ed.: K. Nissim, 750–781, Springer International Publishing. doi:10.1007/978-3-030-90459-3_25
Environmentally Friendly Composable Multi-party Computation in the Plain Model from Standard (Timed) Assumptions
2021. Theory of Cryptography – 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021, Proceedings, Part I. Ed.: K. Nissim, 750–781, Springer International Publishing. doi:10.1007/978-3-030-90459-3_25
Couteau, G.; Klooß, M.; Lin, H.; Reichle, M.
Efficient Range Proofs with Transparent Setup from Bounded Integer Commitments
2021. Advances in Cryptology – EUROCRYPT 2021. Ed.: A. Canteaut, 247–277, Springer International Publishing. doi:10.1007/978-3-030-77883-5_9
Efficient Range Proofs with Transparent Setup from Bounded Integer Commitments
2021. Advances in Cryptology – EUROCRYPT 2021. Ed.: A. Canteaut, 247–277, Springer International Publishing. doi:10.1007/978-3-030-77883-5_9
Ernst, J.; Koch, A.
Private Stream Aggregation with Labels in the Standard Model
2021. Proceedings on Privacy Enhancing Technologies, 2021 (4), 117–138. doi:10.2478/popets-2021-0063
Private Stream Aggregation with Labels in the Standard Model
2021. Proceedings on Privacy Enhancing Technologies, 2021 (4), 117–138. doi:10.2478/popets-2021-0063
Faller, S. H.; Baumer, P.; Klooß, M.; Koch, A.; Ottenhues, A.; Raiber, M.
Black-Box Accumulation Based on Lattices
2021. Cryptography and Coding : 18th IMA International Conference, IMACC 2021, Virtual Event, December 14–15, 2021, Proceedings. Ed.: M. B. Paterson, 220–246, Springer. doi:10.1007/978-3-030-92641-0_11
Black-Box Accumulation Based on Lattices
2021. Cryptography and Coding : 18th IMA International Conference, IMACC 2021, Virtual Event, December 14–15, 2021, Proceedings. Ed.: M. B. Paterson, 220–246, Springer. doi:10.1007/978-3-030-92641-0_11
Jacob, F.; Bayreuther, S.; Hartenstein, S.
On Conflict-Free Replicated Data Types and Equivocation in Byzantine Setups
2021. arxiv. doi:10.5445/IR/1000137905
On Conflict-Free Replicated Data Types and Equivocation in Byzantine Setups
2021. arxiv. doi:10.5445/IR/1000137905
Klooß, M.
On Expected Polynomial Runtime in Cryptography
2021. Theory of Cryptography : 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021, Proceedings, Part I. Ed.: K. Nissim, 558–590, Springer International Publishing. doi:10.1007/978-3-030-90459-3_19
On Expected Polynomial Runtime in Cryptography
2021. Theory of Cryptography : 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021, Proceedings, Part I. Ed.: K. Nissim, 558–590, Springer International Publishing. doi:10.1007/978-3-030-90459-3_19
Koch, A.; Schrempp, M.; Kirsten, M.
Card-Based Cryptography Meets Formal Verification
2021. New generation computing, 39, 115–158. doi:10.1007/s00354-020-00120-0
Card-Based Cryptography Meets Formal Verification
2021. New generation computing, 39, 115–158. doi:10.1007/s00354-020-00120-0
Stengele, O.; Raiber, M.; Müller-Quade, J.; Hartenstein, H.
ETHTID: Deployable Threshold Information Disclosure on Ethereum
2021. 3rd IEEE International Conference on Blockchain Computing and Applications (BCCA), Tartu, EST, November 15-16, 2021, 127–134, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/BCCA53669.2021.9657019
ETHTID: Deployable Threshold Information Disclosure on Ethereum
2021. 3rd IEEE International Conference on Blockchain Computing and Applications (BCCA), Tartu, EST, November 15-16, 2021, 127–134, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/BCCA53669.2021.9657019
Stengele, O.; Raiber, M.; Müller-Quade, J.; Hartenstein, H.
ETHTID: Deployable Threshold Information Disclosure on Ethereum
2021
ETHTID: Deployable Threshold Information Disclosure on Ethereum
2021
2020
Agrikola, T.; Couteau, G.; Hofheinz, D.
The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iO
2020. Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part I Hrsg.: Kiayias, Aggelos; Kohlweiss, Markulf; Wallden, Petros; Zikas, Vassilis, 187–219, Springer. doi:10.1007/978-3-030-45374-9_7
The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iO
2020. Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part I Hrsg.: Kiayias, Aggelos; Kohlweiss, Markulf; Wallden, Petros; Zikas, Vassilis, 187–219, Springer. doi:10.1007/978-3-030-45374-9_7
Agrikola, T.; Couteau, G.; Ishai, Y.; Jarecki, S.; Sahai, A.
On Pseudorandom Encodings
2020. doi:10.5445/IR/1000129644
On Pseudorandom Encodings
2020. doi:10.5445/IR/1000129644
Agrikola, T.; Couteau, G.; Ishai, Y.; Jarecki, S.; Sahai, A.
On Pseudorandom Encodings
2020. Theory of Cryptography – 18th International Conference, TCC 2020, Durham, NC, USA, November 16–19, 2020, Proceedings, Part III. Ed.: R. Pass, 639–669, Springer International Publishing. doi:10.1007/978-3-030-64381-2_23
On Pseudorandom Encodings
2020. Theory of Cryptography – 18th International Conference, TCC 2020, Durham, NC, USA, November 16–19, 2020, Proceedings, Part III. Ed.: R. Pass, 639–669, Springer International Publishing. doi:10.1007/978-3-030-64381-2_23
Agrikola, T.; Hofheinz, D.; Kastner, J.
On Instantiating the Algebraic Group Model from Falsifiable Assumptions
2020. Advances in cryptology - EUROCRYPT 2020 : 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020 : proceedings. Part 2., 96–126, Springer. doi:10.1007/978-3-030-45724-2_4
On Instantiating the Algebraic Group Model from Falsifiable Assumptions
2020. Advances in cryptology - EUROCRYPT 2020 : 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020 : proceedings. Part 2., 96–126, Springer. doi:10.1007/978-3-030-45724-2_4
Arzamasov, V.; Schwerdt, R.; Karrari, S.; Böhm, K.; Nguyen, T. B.
Privacy Measures and Storage Technologies for Battery-Based Load Hiding - an Overview and Experimental Study
2020. e-Energy ’20: Proceedings of the Eleventh ACM International Conference on Future Energy Systems, Melbourne, Australia, 22 - 26 June 2020, 178–195, Association for Computing Machinery (ACM). doi:10.1145/3396851.3398320
Privacy Measures and Storage Technologies for Battery-Based Load Hiding - an Overview and Experimental Study
2020. e-Energy ’20: Proceedings of the Eleventh ACM International Conference on Future Energy Systems, Melbourne, Australia, 22 - 26 June 2020, 178–195, Association for Computing Machinery (ACM). doi:10.1145/3396851.3398320
Dowsley, R.; Müller-Quade, J.; Nascimento, A. C. A.
On the Composability of Statistically Secure Random Oblivious Transfer
2020. Entropy, 22 (1), 107. doi:10.3390/e22010107
On the Composability of Statistically Secure Random Oblivious Transfer
2020. Entropy, 22 (1), 107. doi:10.3390/e22010107
Fetzer, V.; Hoffmann, M.; Nagel, M.; Rupp, A.; Schwerdt, R.
P4TC - Provably-Secure yet Practical Privacy-Preserving Toll Collection
2020. Proceedings on privacy enhancing technologies, 2020 (3), 62–152. doi:10.2478/popets-2020-0046
P4TC - Provably-Secure yet Practical Privacy-Preserving Toll Collection
2020. Proceedings on privacy enhancing technologies, 2020 (3), 62–152. doi:10.2478/popets-2020-0046
Hartung, G. R.
Advanced Cryptographic Techniques for Protecting Log Data. Dissertation
2020, März 12. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000117650
Advanced Cryptographic Techniques for Protecting Log Data. Dissertation
2020, März 12. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000117650
Hoffmann, M.; Klooß, M.; Raiber, M.; Rupp, A.
Black-Box Wallets: Fast Anonymous Two-Way Payments for Constrained Devices
2020. Proceedings on privacy enhancing technologies, 2020 (1), 165–194. doi:10.2478/popets-2020-0010
Black-Box Wallets: Fast Anonymous Two-Way Payments for Constrained Devices
2020. Proceedings on privacy enhancing technologies, 2020 (1), 165–194. doi:10.2478/popets-2020-0010
Koch, A.; Walzer, S.
Foundations for actively secure card-based cryptography
2020. 10th International Conference on Fun with Algorithms (FUN 2021). Ed.: M. Farach-Colton, Art.-Nr.: 17, Schloss Dagstuhl - Leibniz-Zentrum für Informatik (LZI). doi:10.4230/LIPIcs.FUN.2021.17
Foundations for actively secure card-based cryptography
2020. 10th International Conference on Fun with Algorithms (FUN 2021). Ed.: M. Farach-Colton, Art.-Nr.: 17, Schloss Dagstuhl - Leibniz-Zentrum für Informatik (LZI). doi:10.4230/LIPIcs.FUN.2021.17
Nagel, M.
Anonymous Point Collection - Improved Models and Security Definitions. Dissertation
2020, Oktober 22. KIT Scientific Publishing. doi:10.5445/KSP/1000117751
Anonymous Point Collection - Improved Models and Security Definitions. Dissertation
2020, Oktober 22. KIT Scientific Publishing. doi:10.5445/KSP/1000117751
Rill, J.
Towards Applying Cryptographic Security Models to Real-World Systems. Dissertation
2020, April 27. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000118648
Towards Applying Cryptographic Security Models to Real-World Systems. Dissertation
2020, April 27. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000118648
2019
Achenbach, D.; Gröll, R.; Hackenjos, T.; Koch, A.; Löwe, B.; Mechler, J.; Müller-Quade, J.; Rill, J.
Your Money or Your Life—Modeling and Analyzing the Security of Electronic Payment in the UC Framework
2019. Financial Cryptography and Data Security – 23rd International Conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18–22, 2019, Revised Selected Papers. Ed.: I. Goldberg, 243–261, Springer International Publishing. doi:10.1007/978-3-030-32101-7_16
Your Money or Your Life—Modeling and Analyzing the Security of Electronic Payment in the UC Framework
2019. Financial Cryptography and Data Security – 23rd International Conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18–22, 2019, Revised Selected Papers. Ed.: I. Goldberg, 243–261, Springer International Publishing. doi:10.1007/978-3-030-32101-7_16
Beckert, B.; Brelle, A.; Grimm, R.; Huber, N.; Kirsten, M.; Küsters, R.; Müller-Quade, J.; Noppel, M.; Reinhard, K.; Schwab, J.; Schwerdt, R.; Truderung, T.; Volkamer, M.; Winter, C.
GI Elections with POLYAS: a Road to End-to-End Verifiable Elections
2019. Fourth International Joint Conference on Electronic Voting (E-Vote-ID 2019), 1-4 October 2019, Lochau / Bregenz, Austria - Proceedings. Ed.: M. Volkamer; B. Beckert, 293–294, Gesellschaft für Informatik (GI)
GI Elections with POLYAS: a Road to End-to-End Verifiable Elections
2019. Fourth International Joint Conference on Electronic Voting (E-Vote-ID 2019), 1-4 October 2019, Lochau / Bregenz, Austria - Proceedings. Ed.: M. Volkamer; B. Beckert, 293–294, Gesellschaft für Informatik (GI)
Broadnax, B.
New Frameworks for Concurrently Composable Multi-Party Computation. Dissertation
2019. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000091915
New Frameworks for Concurrently Composable Multi-Party Computation. Dissertation
2019. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000091915
D’Anvers, J.-P.; Tiepelt, M.; Vercauteren, F.; Verbauwhede, I.
Timing Attacks on Error Correcting Codes in Post-Quantum Schemes
2019. Proceedings of 3rd ACM Workshop on Theory of Implementation Security Workshop - TIS’19, 2–9, Association for Computing Machinery (ACM). doi:10.1145/3338467.3358948
Timing Attacks on Error Correcting Codes in Post-Quantum Schemes
2019. Proceedings of 3rd ACM Workshop on Theory of Implementation Security Workshop - TIS’19, 2–9, Association for Computing Machinery (ACM). doi:10.1145/3338467.3358948
Hoffmann, M.; Klooß, M.; Rupp, A.
Efficient Zero-Knowledge Arguments in the Discrete Log Setting, Revisited
2019. Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2093–2110, Association for Computing Machinery (ACM). doi:10.1145/3319535.3354251
Efficient Zero-Knowledge Arguments in the Discrete Log Setting, Revisited
2019. Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2093–2110, Association for Computing Machinery (ACM). doi:10.1145/3319535.3354251
Klooß, M.; Lehmann, A.; Rupp, A.
(R)CCA Secure Updatable Encryption with Integrity Protection
2019. Advances in Cryptology – EUROCRYPT 2019 – 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part I. Ed.: Y. Ishai, 68–99, Springer International Publishing. doi:10.1007/978-3-030-17653-2_3
(R)CCA Secure Updatable Encryption with Integrity Protection
2019. Advances in Cryptology – EUROCRYPT 2019 – 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part I. Ed.: Y. Ishai, 68–99, Springer International Publishing. doi:10.1007/978-3-030-17653-2_3
Koch, A.
Cryptographic Protocols from Physical Assumptions. Dissertation
2019. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000097756
Cryptographic Protocols from Physical Assumptions. Dissertation
2019. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000097756
Koch, A.; Schrempp, M.; Kirsten, M.
Card-Based Cryptography Meets Formal Verification
2019. Advances in Cryptology – ASIACRYPT 2019 : 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings. Part I. Ed.: S.D. Galbraith, 488–517, Springer. doi:10.1007/978-3-030-34578-5_18
Card-Based Cryptography Meets Formal Verification
2019. Advances in Cryptology – ASIACRYPT 2019 : 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings. Part I. Ed.: S.D. Galbraith, 488–517, Springer. doi:10.1007/978-3-030-34578-5_18
Koch, A.; Schrempp, M.; Kirsten, M.
Card-Based Cryptography Meets Formal Verification
2019. doi:10.5445/IR/1000120005
Card-Based Cryptography Meets Formal Verification
2019. doi:10.5445/IR/1000120005
Müller-Quade, J.; Beyerer, J.; Broadnax, B.
Editorial
2019. Automatisierungstechnik, 67 (5), 359–360. doi:10.1515/auto-2019-0044
Editorial
2019. Automatisierungstechnik, 67 (5), 359–360. doi:10.1515/auto-2019-0044
Schwerdt, R.; Nagel, M.; Fetzer, V.; Gräf, T.; Rupp, A.
P6V2G: A Privacy-preserving V2G Scheme for Two-way Payments and Reputation
2019. Energy informatics, 2 (S1), Article number: 32. doi:10.1186/s42162-019-0075-1
P6V2G: A Privacy-preserving V2G Scheme for Two-way Payments and Reputation
2019. Energy informatics, 2 (S1), Article number: 32. doi:10.1186/s42162-019-0075-1
Tiepelt, M.; Szepieniec, A.
Quantum LLL with an application to mersenne number cryptosystems
2019. Progress in Cryptology – LATINCRYPT 2019: 6th International Conference on Cryptology and Information Security in Latin America, Santiago de Chile, Chile, October 2–4, 2019, Proceedings. Ed.: P. Schwabe, 3–23, Springer. doi:10.1007/978-3-030-30530-7_1
Quantum LLL with an application to mersenne number cryptosystems
2019. Progress in Cryptology – LATINCRYPT 2019: 6th International Conference on Cryptology and Information Security in Latin America, Santiago de Chile, Chile, October 2–4, 2019, Proceedings. Ed.: P. Schwabe, 3–23, Springer. doi:10.1007/978-3-030-30530-7_1
2018
Agrikola, T.; Hofheinz, D.
Interactively Secure Groups from Obfuscation
2018. Public-Key Cryptography – PKC 2018. Ed.: M. Abdalla, 341–370, Springer. doi:10.1007/978-3-319-76581-5_12
Interactively Secure Groups from Obfuscation
2018. Public-Key Cryptography – PKC 2018. Ed.: M. Abdalla, 341–370, Springer. doi:10.1007/978-3-319-76581-5_12
Broadnax, B.; Fetzer, V.; Müller-Quade, J.; Rupp, A.
Non-malleability vs. CCA-Security: The Case of Commitments
2018. 21st IACR International Conference on Practice and Theory of Public-Key Cryptography (PKC 2018), Rio De Janeiro, BR, March 25-29, 2018. Ed.: M. Abdalla, 312–337, Springer International Publishing. doi:10.1007/978-3-319-76581-5_11
Non-malleability vs. CCA-Security: The Case of Commitments
2018. 21st IACR International Conference on Practice and Theory of Public-Key Cryptography (PKC 2018), Rio De Janeiro, BR, March 25-29, 2018. Ed.: M. Abdalla, 312–337, Springer International Publishing. doi:10.1007/978-3-319-76581-5_11
Broadnax, B.; Huber, M.; Löwe, B.; Jörn Müller-Quade; Patrik Scheidecker
Towards Efficient Software Protection Obeying Kerckhoffs’s Principle using Tamper-proof Hardware
2018. Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, ICETE 2018 - Volume 2: SECRYPT, Porto, P, July 26-28, 2018., 719–724, INSTICC. doi:10.5220/0006906107190724
Towards Efficient Software Protection Obeying Kerckhoffs’s Principle using Tamper-proof Hardware
2018. Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, ICETE 2018 - Volume 2: SECRYPT, Porto, P, July 26-28, 2018., 719–724, INSTICC. doi:10.5220/0006906107190724
Broadnax, B.; Löwe, B.; Mechler, J.; Müller-Quade, J.; Nagel, M.
Sicherheit auf festem Fundament – Starke Sicherheit durch vertrauenswürdige Hardware
2018. Datenschutz und Datensicherheit, 42 (2), 74–78. doi:10.1007/s11623-018-0897-1
Sicherheit auf festem Fundament – Starke Sicherheit durch vertrauenswürdige Hardware
2018. Datenschutz und Datensicherheit, 42 (2), 74–78. doi:10.1007/s11623-018-0897-1
Hackenjos, T.; Mechler, J.; Rill, J.
IT-Sicherheit - ein rechtsfreier Raum?
2018. Datenschutz und Datensicherheit, 42 (5), 286–290. doi:10.1007/s11623-018-0942-0
IT-Sicherheit - ein rechtsfreier Raum?
2018. Datenschutz und Datensicherheit, 42 (5), 286–290. doi:10.1007/s11623-018-0942-0
Hofheinz, D.; Müller-Quade, J.; Unruh, D.
On the (Im-)Possibility of Extending Coin Toss
2018. Journal of cryptology, 31 (4), 1120–1163. doi:10.1007/s00145-018-9296-x
On the (Im-)Possibility of Extending Coin Toss
2018. Journal of cryptology, 31 (4), 1120–1163. doi:10.1007/s00145-018-9296-x
Löwe, B.
Kryptographische Protokolle mit einfachen Hardwarebausteinen als Vertrauensanker - mit unterschiedlichen Vertrauensmodellen am Beispiel von kryptographischen Wahlverfahren, sicheren Bezahlsystemen und Softwareschutzverfahren. Dissertation
2018. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000087321
Kryptographische Protokolle mit einfachen Hardwarebausteinen als Vertrauensanker - mit unterschiedlichen Vertrauensmodellen am Beispiel von kryptographischen Wahlverfahren, sicheren Bezahlsystemen und Softwareschutzverfahren. Dissertation
2018. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000087321
Mechler, J.; Müller-Quade, J.; Nilges, T.
Reusing Tamper-Proof Hardware in UC-Secure Protocols
2018. Public-Key Cryptography – PKC 2018. 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25–29, 2018. Proceedings, Part I. Ed.: M. Abdalla, 463–493, Springer International Publishing. doi:10.1007/978-3-319-76578-5_16
Reusing Tamper-Proof Hardware in UC-Secure Protocols
2018. Public-Key Cryptography – PKC 2018. 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25–29, 2018. Proceedings, Part I. Ed.: M. Abdalla, 463–493, Springer International Publishing. doi:10.1007/978-3-319-76578-5_16