Publikationsliste
2024
Bayreuther, S.; Berger, R.; Dörre, F.; Mechler, J.; Müller-Quade, J.
HiddenΔ-Fairness: A Novel Notion for Fair Secure Two-Party Computation
2024. Information Security and Privacy. Ed.: T. Zhu. Pt. 2, 330–349, Springer Nature Singapore. doi:10.1007/978-981-97-5028-3_17
HiddenΔ-Fairness: A Novel Notion for Fair Secure Two-Party Computation
2024. Information Security and Privacy. Ed.: T. Zhu. Pt. 2, 330–349, Springer Nature Singapore. doi:10.1007/978-981-97-5028-3_17
Bayreuther, S.; Berger, R.; Dörre, F.; Mechler, J.; Müller-Quade, J.
Hidden ∆-fairness: A Novel Notion for Fair Secure: Two-Party Computation
2024. 36. Kryptotag, 2 S., Gesellschaft für Informatik (GI). doi:10.18420/cdm-2024-36-32
Hidden ∆-fairness: A Novel Notion for Fair Secure: Two-Party Computation
2024. 36. Kryptotag, 2 S., Gesellschaft für Informatik (GI). doi:10.18420/cdm-2024-36-32
Bayreuther, S.; Berger, R.; Dörre, F.; Mechler, J.; Müller-Quade, J.
Hidden -fairness: A Novel Notion for Fair Secure Two-Party Computation
2024. Cryptology ePrint Archive
Hidden
2024. Cryptology ePrint Archive
Benz, L.; Beskorovajnov, W.; Eilebrecht, S.; Gröll, R.; Müller, M.; Müller-Quade, J.
Chosen-Ciphertext Secure Dual-Receiver Encryption in the Standard Model Based on Post-quantum Assumptions
2024. Public-Key Cryptography – PKC 2024 : 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15–17, 2024, Proceedings. Part IV. Ed.: Q. Tang, 257–288, Springer Nature Switzerland. doi:10.1007/978-3-031-57728-4_9
Chosen-Ciphertext Secure Dual-Receiver Encryption in the Standard Model Based on Post-quantum Assumptions
2024. Public-Key Cryptography – PKC 2024 : 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15–17, 2024, Proceedings. Part IV. Ed.: Q. Tang, 257–288, Springer Nature Switzerland. doi:10.1007/978-3-031-57728-4_9
Berger, R.; Dörre, F.; Koch, A.
Two-Party Decision Tree Training from Updatable Order-Revealing Encryption
2024. Applied Cryptography and Network Security : 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings. Part I. Ed.: C. Pöpper, 288–317, Springer International Publishing. doi:10.1007/978-3-031-54770-6_12
Two-Party Decision Tree Training from Updatable Order-Revealing Encryption
2024. Applied Cryptography and Network Security : 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings. Part I. Ed.: C. Pöpper, 288–317, Springer International Publishing. doi:10.1007/978-3-031-54770-6_12
Bindel, N.; Bonnetain, X.; Tiepelt, M.; Virdia, F.
Quantum Lattice Enumeration in Limited Depth
2024. Advances in Cryptology – CRYPTO 2024 – 44th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2024, Proceedings, Part VI. Ed.: L. Reyzin, 72 – 106, Springer Nature Switzerland. doi:10.1007/978-3-031-68391-6_3
Quantum Lattice Enumeration in Limited Depth
2024. Advances in Cryptology – CRYPTO 2024 – 44th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2024, Proceedings, Part VI. Ed.: L. Reyzin, 72 – 106, Springer Nature Switzerland. doi:10.1007/978-3-031-68391-6_3
Brandt, N.; Maier, S.; Müller, T.; Müller-Quade, J.
On the Correlation Complexity of MPC with Cheater Identification
2024. Financial Cryptography and Data Security – 27th International Conference, FC 2023, Bol, Brač, Croatia, May 1–5, 2023, Revised Selected Papers, Part I. Ed.: F. Baldimtsi, 129 – 146, Springer Nature Switzerland. doi:10.1007/978-3-031-47754-6_8
On the Correlation Complexity of MPC with Cheater Identification
2024. Financial Cryptography and Data Security – 27th International Conference, FC 2023, Bol, Brač, Croatia, May 1–5, 2023, Revised Selected Papers, Part I. Ed.: F. Baldimtsi, 129 – 146, Springer Nature Switzerland. doi:10.1007/978-3-031-47754-6_8
Canbolat, S.; Fruböse, C.; Elbez, G.; Hagenmeyer, V.
Extended Abstract: Assessing GNSS Vulnerabilities in Smart Grids
2024. 21st Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA ’24)
Extended Abstract: Assessing GNSS Vulnerabilities in Smart Grids
2024. 21st Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA ’24)
Mechler, J.
Frameworks and Protocols for Composable Multi-Party Computation. Dissertation
2024, September 30. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000174597
Frameworks and Protocols for Composable Multi-Party Computation. Dissertation
2024, September 30. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000174597
Tiepelt, M.; Eaton, E.; Stebila, D.
Making an Asymmetric PAKE Quantum-Annoying by Hiding Group Elements
2024. Computer Security – ESORICS 2023. Ed.: G. Tsudik. Pt. 1, 168–188, Springer Nature Switzerland. doi:10.1007/978-3-031-50594-2_9
Making an Asymmetric PAKE Quantum-Annoying by Hiding Group Elements
2024. Computer Security – ESORICS 2023. Ed.: G. Tsudik. Pt. 1, 168–188, Springer Nature Switzerland. doi:10.1007/978-3-031-50594-2_9
Tiepelt, M.; Martin, C.; Maeurer, N.
Post-Quantum Ready Key Agreement for Aviation
2024. IACR Communications in Cryptology, 1 (1), 17. doi:10.62056/aebn2isfg
Post-Quantum Ready Key Agreement for Aviation
2024. IACR Communications in Cryptology, 1 (1), 17. doi:10.62056/aebn2isfg
2023
Attema, T.; Fehr, S.; Klooß, M.
Fiat–Shamir Transformation of Multi-Round Interactive Proofs (Extended Version)
2023. Journal of Cryptology, 36 (4), Art.-Nr.: 36. doi:10.1007/s00145-023-09478-y
Fiat–Shamir Transformation of Multi-Round Interactive Proofs (Extended Version)
2023. Journal of Cryptology, 36 (4), Art.-Nr.: 36. doi:10.1007/s00145-023-09478-y
Baum, C.; Braun, L.; Saint Guilhem, C. D. De; Klooß, M.; Orsini, E.; Roy, L.; Scholl, P.
Publicly Verifiable Zero-Knowledge and Post-Quantum Signatures from VOLE-in-the-Head
2023. Advances in Cryptology – CRYPTO 2023 – 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023, Proceedings, Part V. Ed.: H. Handschuh, 581–615, Springer Nature Switzerland. doi:10.1007/978-3-031-38554-4_19
Publicly Verifiable Zero-Knowledge and Post-Quantum Signatures from VOLE-in-the-Head
2023. Advances in Cryptology – CRYPTO 2023 – 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023, Proceedings, Part V. Ed.: H. Handschuh, 581–615, Springer Nature Switzerland. doi:10.1007/978-3-031-38554-4_19
Benz, L.; Beskorovajnov, W.; Eilebrecht, S.; Müller-Quade, J.; Ottenhues, A.; Schwerdt, R.
Sender-binding Key Encapsulation
2023. Public-Key Cryptography – PKC 2023 – 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7–10, 2023, Proceedings, Part I. Ed.: A. Boldyreva, 744 – 773, Springer Nature Switzerland. doi:10.1007/978-3-031-31368-4_26
Sender-binding Key Encapsulation
2023. Public-Key Cryptography – PKC 2023 – 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7–10, 2023, Proceedings, Part I. Ed.: A. Boldyreva, 744 – 773, Springer Nature Switzerland. doi:10.1007/978-3-031-31368-4_26
Berger, R.; Broadnax, B.; Klooß, M.; Mechler, J.; Müller-Quade, J.; Ottenhues, A.; Raiber, M.
Composable Long-Term Security with Rewinding
2023. Theory of Cryptography – 21st International Conference, TCC 2023, Taipei, Taiwan, November 29–December 2, 2023, Proceedings, Part IV. Ed.: G. Rothblum, 510 – 541, Springer Nature Switzerland. doi:10.1007/978-3-031-48624-1_19
Composable Long-Term Security with Rewinding
2023. Theory of Cryptography – 21st International Conference, TCC 2023, Taipei, Taiwan, November 29–December 2, 2023, Proceedings, Part IV. Ed.: G. Rothblum, 510 – 541, Springer Nature Switzerland. doi:10.1007/978-3-031-48624-1_19
Berger, R. M.; Broadnax, B.; Klooß, M.; Mechler, J.; Müller-Quade, J.; Ottenhues, A.; Raiber, M.
Composable Long-Term Security with Rewinding
2023. Theory of Cryptography. 21th International Conference, TCC 2023. Proceedings, Part 1. Ed.: G. Rothblum, Springer-Verlag
Composable Long-Term Security with Rewinding
2023. Theory of Cryptography. 21th International Conference, TCC 2023. Proceedings, Part 1. Ed.: G. Rothblum, Springer-Verlag
Dörre, F.; Mechler, J.; Müller-Quade, J.
Practically Efficient Private Set Intersection From Trusted Hardware with Side-Channels
2023. Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Springer-Verlag. doi:10.1007/978-981-99-8730-6_9
Practically Efficient Private Set Intersection From Trusted Hardware with Side-Channels
2023. Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Springer-Verlag. doi:10.1007/978-981-99-8730-6_9
Faller, S.; Ottenhues, A.; Ottenhues, J.
Composable Oblivious Pseudo-random Functions via Garbled Circuits
2023. Progress in Cryptology – LATINCRYPT 2023 – 8th International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2023, Quito, Ecuador, October 3–6, 2023, Proceedings. Ed.: A. Aly, 249 – 270, Springer Nature Switzerland. doi:10.1007/978-3-031-44469-2_13
Composable Oblivious Pseudo-random Functions via Garbled Circuits
2023. Progress in Cryptology – LATINCRYPT 2023 – 8th International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2023, Quito, Ecuador, October 3–6, 2023, Proceedings. Ed.: A. Aly, 249 – 270, Springer Nature Switzerland. doi:10.1007/978-3-031-44469-2_13
Fetzer, V.; Klooß, M.; Müller-Quade, J.; Raiber, M.; Rupp, A.
Universally Composable Auditable Surveillance
2023. Advances in Cryptology – ASIACRYPT 2023 – 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4–8, 2023, Proceedings, Part II. Ed.: J. Guo, 453 – 487, Springer Nature Singapore. doi:10.1007/978-981-99-8724-5_14
Universally Composable Auditable Surveillance
2023. Advances in Cryptology – ASIACRYPT 2023 – 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4–8, 2023, Proceedings, Part II. Ed.: J. Guo, 453 – 487, Springer Nature Singapore. doi:10.1007/978-981-99-8724-5_14
Klooß, M.
On Efficient Zero-Knowledge Arguments. Dissertation
2023, Februar 20. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000156118
On Efficient Zero-Knowledge Arguments. Dissertation
2023, Februar 20. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000156118
Tiepelt, M.; Eaton, E.; Stebila, D.
Making an Asymmetric PAKE Quantum-Annoying by Hiding Group Elements
2023. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000164970
Making an Asymmetric PAKE Quantum-Annoying by Hiding Group Elements
2023. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000164970
Volkamer, M.; Mayer, A.; Neumann, S.; Beckert, B.; Budurushi, J.; Grunwald, A.; Krimmer, R.; Kulyk, O.; Küsters, R.; Müller-Quade, J.
Online-Wahlen und digitale Abstimmungen – eine Einordnung aktueller Entwicklungen
2023. DGRI Jahrbuch 2021/2022, 141–160, Verlag Dr. Otto Schmidt. doi:10.9785/9783504387914-010
Online-Wahlen und digitale Abstimmungen – eine Einordnung aktueller Entwicklungen
2023. DGRI Jahrbuch 2021/2022, 141–160, Verlag Dr. Otto Schmidt. doi:10.9785/9783504387914-010
2022
Agrikola, T.; Couteau, G.; Maier, S.
Anonymous Whistleblowing over Authenticated Channels
2022. Theory of Cryptography – 20th International Conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022, Proceedings, Part II. Ed.: E. Kiltz, 685–714, Springer Nature Switzerland. doi:10.1007/978-3-031-22365-5_24
Anonymous Whistleblowing over Authenticated Channels
2022. Theory of Cryptography – 20th International Conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022, Proceedings, Part II. Ed.: E. Kiltz, 685–714, Springer Nature Switzerland. doi:10.1007/978-3-031-22365-5_24
Attema, T.; Fehr, S.; Klooß, M.
Fiat-Shamir Transformation of Multi-round Interactive Proofs
2022. Theory of Cryptography – 20th International Conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022, Proceedings, Part I. Ed.: E. Kiltz, 113–142, Springer Nature Switzerland. doi:10.1007/978-3-031-22318-1_5
Fiat-Shamir Transformation of Multi-round Interactive Proofs
2022. Theory of Cryptography – 20th International Conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022, Proceedings, Part I. Ed.: E. Kiltz, 113–142, Springer Nature Switzerland. doi:10.1007/978-3-031-22318-1_5
Bayreuther, S.; Jacob, F.; Grotz, M.; Kartmann, R.; Peller-Konrad, F.; Paus, F.; Hartenstein, H.; Asfour, T.
BlueSky: Combining Task Planning and Activity-Centric Access Control for Assistive Humanoid Robots
2022. SACMAT ’22: Proceedings of the 27th ACM on Symposium on Access Control Models and TechnologiesJune 2022, New York NY USA, June 8 - 10, 2022. Ed.: S. Dietrich, 185–194, Association for Computing Machinery (ACM). doi:10.1145/3532105.3535018
BlueSky: Combining Task Planning and Activity-Centric Access Control for Assistive Humanoid Robots
2022. SACMAT ’22: Proceedings of the 27th ACM on Symposium on Access Control Models and TechnologiesJune 2022, New York NY USA, June 8 - 10, 2022. Ed.: S. Dietrich, 185–194, Association for Computing Machinery (ACM). doi:10.1145/3532105.3535018
Beckert, B.; Budurushi, J.; Grunwald, A.; Krimmer, R.; Kulyk, O.; Küsters, R.; Mayer, A.; Müller-Quade, J.; Neumann, S.; Volkamer, M.
Recent Developments in the Context of Online Elections and Digital Polls in Germany
2022. Sicherheit 2022 : Sicherheit, Schutz und Zuverlässigkeit : Konferenzband der 11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 5.-8. April 2022 in Karlsruhe. Hrsg.: C. Wressnegger, Gesellschaft für Informatik (GI). doi:10.18420/sicherheit2022_16
Recent Developments in the Context of Online Elections and Digital Polls in Germany
2022. Sicherheit 2022 : Sicherheit, Schutz und Zuverlässigkeit : Konferenzband der 11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 5.-8. April 2022 in Karlsruhe. Hrsg.: C. Wressnegger, Gesellschaft für Informatik (GI). doi:10.18420/sicherheit2022_16
Beskorovajnov, W.; Gröll, R.; Müller-Quade, J.; Ottenhues, A.; Schwerdt, R.
A New Security Notion for PKC in the Standard Model: Weaker, Simpler, and Still Realizing Secure Channels
2022. Public-Key Cryptography – PKC 2022. Ed.: G. Hanaoka. Vol. 2, 316–344, Springer International Publishing. doi:10.1007/978-3-030-97131-1_11
A New Security Notion for PKC in the Standard Model: Weaker, Simpler, and Still Realizing Secure Channels
2022. Public-Key Cryptography – PKC 2022. Ed.: G. Hanaoka. Vol. 2, 316–344, Springer International Publishing. doi:10.1007/978-3-030-97131-1_11
Couteau, G.; Goudarzi, D.; Klooß, M.; Reichle, M.
Sharp: Short Relaxed Range Proofs
2022. CCS ’22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Ed.: H. Yin Conference: CCS ’22: 2022 ACM SIGSAC Conference on Computer and Communications Security Los Angeles CA USA November 7 - 11, 2022, 609–622, Association for Computing Machinery (ACM). doi:10.1145/3548606.3560628
Sharp: Short Relaxed Range Proofs
2022. CCS ’22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Ed.: H. Yin Conference: CCS ’22: 2022 ACM SIGSAC Conference on Computer and Communications Security Los Angeles CA USA November 7 - 11, 2022, 609–622, Association for Computing Machinery (ACM). doi:10.1145/3548606.3560628
Doerner, D.; Mechler, J.; Müller-Quade, J.
Hardening the Security of Server-Aided MPC Using Remotely Unhackable Hardware Modules
2022. GI SICHERHEIT 2022, Ed.: C. Wressnegger, 83–99, Gesellschaft für Informatik (GI). doi:10.18420/sicherheit2022_05
Hardening the Security of Server-Aided MPC Using Remotely Unhackable Hardware Modules
2022. GI SICHERHEIT 2022, Ed.: C. Wressnegger, 83–99, Gesellschaft für Informatik (GI). doi:10.18420/sicherheit2022_05
Fetzer, V.; Keller, M.; Maier, S.; Raiber, M.; Rupp, A.; Schwerdt, R.
PUBA: Privacy-Preserving User-Data Bookkeeping and Analytics
2022. Proceedings on Privacy Enhancing Technologies, 2022 (2), 447–516. doi:10.2478/popets-2022-0054
PUBA: Privacy-Preserving User-Data Bookkeeping and Analytics
2022. Proceedings on Privacy Enhancing Technologies, 2022 (2), 447–516. doi:10.2478/popets-2022-0054
Jacob, F.; Bayreuther, S.; Hartenstein, H.
On CRDTs in Byzantine Environments : Conflict Freedom, Equivocation Tolerance, and the Matrix Replicated Data Type
2022. Sicherheit 2022 : Sicherheit, Schutz und Zuverlässigkeit. Hrsg.: C. Wressnegger, 113–128, Gesellschaft für Informatik (GI). doi:10.18420/sicherheit2022_07
On CRDTs in Byzantine Environments : Conflict Freedom, Equivocation Tolerance, and the Matrix Replicated Data Type
2022. Sicherheit 2022 : Sicherheit, Schutz und Zuverlässigkeit. Hrsg.: C. Wressnegger, 113–128, Gesellschaft für Informatik (GI). doi:10.18420/sicherheit2022_07
Maier, S.
On Security Notions for Multi-Party Computation. Dissertation
2022, November 4. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000151951
On Security Notions for Multi-Party Computation. Dissertation
2022, November 4. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000151951
Marquardt, K.; Happe, L.; Koch, A.; Wagner, I.
IT Mission: Interdisziplinäre Online Expeditionen
2022, Juli 12. easeCorona (2022), Würzburg, Deutschland, 11.–12. Juli 2022
IT Mission: Interdisziplinäre Online Expeditionen
2022, Juli 12. easeCorona (2022), Würzburg, Deutschland, 11.–12. Juli 2022
2021
Agrikola, T.
On Foundations of Protecting Computations. Dissertation
2021, Juni 17. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000133798
On Foundations of Protecting Computations. Dissertation
2021, Juni 17. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000133798
Beckert, B.; Budurushi, J.; Grunwald, A.; Krimmer, R.; Kulyk, O.; Küsters, R.; Mayer, A.; Müller-Quade, J.; Neumann, S.; Volkamer, M.
Aktuelle Entwicklungen im Kontext von Online-Wahlen und digitalen Abstimmungen
2021. doi:10.5445/IR/1000137300
Aktuelle Entwicklungen im Kontext von Online-Wahlen und digitalen Abstimmungen
2021. doi:10.5445/IR/1000137300
Berger, R. M.; Tiepelt, M.
On Forging SPHINCS -Haraka Signatures on a Fault-Tolerant Quantum Computer
2021. Progress in Cryptology – LATINCRYPT 2021 – 7th International Conference on Cryptology and Information Security in Latin America, Bogotá, Colombia, October 6–8, 2021, Proceedings. Ed.: P. Longa, 44–63, Springer International Publishing. doi:10.1007/978-3-030-88238-9_3
On Forging SPHINCS
2021. Progress in Cryptology – LATINCRYPT 2021 – 7th International Conference on Cryptology and Information Security in Latin America, Bogotá, Colombia, October 6–8, 2021, Proceedings. Ed.: P. Longa, 44–63, Springer International Publishing. doi:10.1007/978-3-030-88238-9_3
Beskorovajnov, W.; Dörre, F.; Hartung, G.; Koch, A.; Müller-Quade, J.; Strufe, T.
ConTra Corona: Contact Tracing against the Coronavirus by Bridging the Centralized–Decentralized Divide for Stronger Privacy
2021. Advances in Cryptology – ASIACRYPT 2021: 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6–10, 2021, Proceedings, Part II. Ed.: M. Tibouchi, 665–695, Springer-Verlag. doi:10.1007/978-3-030-92075-3_23
ConTra Corona: Contact Tracing against the Coronavirus by Bridging the Centralized–Decentralized Divide for Stronger Privacy
2021. Advances in Cryptology – ASIACRYPT 2021: 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6–10, 2021, Proceedings, Part II. Ed.: M. Tibouchi, 665–695, Springer-Verlag. doi:10.1007/978-3-030-92075-3_23
Beskorovajnov, W.; Dörre, F.; Hartung, G.; Koch, A.; Müller-Quade, J.; Strufe, T.
ConTra Corona : Contact Tracing against the Coronavirus by Bridging the Centralized–Decentralized Divide for Stronger Privacy
2021. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000139714
ConTra Corona : Contact Tracing against the Coronavirus by Bridging the Centralized–Decentralized Divide for Stronger Privacy
2021. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000139714
Boenisch, F.; Munz, R.; Tiepelt, M.; Hanisch, S.; Kuhn, C.; Francis, P.
Side-Channel Attacks on Query-Based Data Anonymization
2021. CCS ’21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, November 2021, 1254–1265, Association for Computing Machinery (ACM). doi:10.1145/3460120.3484751
Side-Channel Attacks on Query-Based Data Anonymization
2021. CCS ’21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, November 2021, 1254–1265, Association for Computing Machinery (ACM). doi:10.1145/3460120.3484751
Broadnax, B.; Koch, A.; Mechler, J.; Müller, T.; Müller-Quade, J.; Nagel, M.
Fortified Multi-Party Computation: Taking Advantage of Simple Secure Hardware Modules
2021. Proceedings on privacy enhancing technologies, 2021 (4), 312–338. doi:10.2478/popets-2021-0072
Fortified Multi-Party Computation: Taking Advantage of Simple Secure Hardware Modules
2021. Proceedings on privacy enhancing technologies, 2021 (4), 312–338. doi:10.2478/popets-2021-0072
Broadnax, B.; Mechler, J.; Müller-Quade, J.
Environmentally Friendly Composable Multi-party Computation in the Plain Model from Standard (Timed) Assumptions
2021. Theory of Cryptography – 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021, Proceedings, Part I. Ed.: K. Nissim, 750–781, Springer International Publishing. doi:10.1007/978-3-030-90459-3_25
Environmentally Friendly Composable Multi-party Computation in the Plain Model from Standard (Timed) Assumptions
2021. Theory of Cryptography – 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021, Proceedings, Part I. Ed.: K. Nissim, 750–781, Springer International Publishing. doi:10.1007/978-3-030-90459-3_25
Couteau, G.; Klooß, M.; Lin, H.; Reichle, M.
Efficient Range Proofs with Transparent Setup from Bounded Integer Commitments
2021. Advances in Cryptology – EUROCRYPT 2021. Ed.: A. Canteaut, 247–277, Springer International Publishing. doi:10.1007/978-3-030-77883-5_9
Efficient Range Proofs with Transparent Setup from Bounded Integer Commitments
2021. Advances in Cryptology – EUROCRYPT 2021. Ed.: A. Canteaut, 247–277, Springer International Publishing. doi:10.1007/978-3-030-77883-5_9
Ernst, J.; Koch, A.
Private Stream Aggregation with Labels in the Standard Model
2021. Proceedings on Privacy Enhancing Technologies, 2021 (4), 117–138. doi:10.2478/popets-2021-0063
Private Stream Aggregation with Labels in the Standard Model
2021. Proceedings on Privacy Enhancing Technologies, 2021 (4), 117–138. doi:10.2478/popets-2021-0063
Faller, S. H.; Baumer, P.; Klooß, M.; Koch, A.; Ottenhues, A.; Raiber, M.
Black-Box Accumulation Based on Lattices
2021. Cryptography and Coding : 18th IMA International Conference, IMACC 2021, Virtual Event, December 14–15, 2021, Proceedings. Ed.: M. B. Paterson, 220–246, Springer. doi:10.1007/978-3-030-92641-0_11
Black-Box Accumulation Based on Lattices
2021. Cryptography and Coding : 18th IMA International Conference, IMACC 2021, Virtual Event, December 14–15, 2021, Proceedings. Ed.: M. B. Paterson, 220–246, Springer. doi:10.1007/978-3-030-92641-0_11
Jacob, F.; Bayreuther, S.; Hartenstein, H.
On Conflict-Free Replicated Data Types and Equivocation in Byzantine Setups
2021. arxiv. doi:10.5445/IR/1000137905
On Conflict-Free Replicated Data Types and Equivocation in Byzantine Setups
2021. arxiv. doi:10.5445/IR/1000137905
Klooß, M.
On Expected Polynomial Runtime in Cryptography
2021. Theory of Cryptography : 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021, Proceedings, Part I. Ed.: K. Nissim, 558–590, Springer International Publishing. doi:10.1007/978-3-030-90459-3_19
On Expected Polynomial Runtime in Cryptography
2021. Theory of Cryptography : 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021, Proceedings, Part I. Ed.: K. Nissim, 558–590, Springer International Publishing. doi:10.1007/978-3-030-90459-3_19
Koch, A.; Schrempp, M.; Kirsten, M.
Card-Based Cryptography Meets Formal Verification
2021. New generation computing, 39, 115–158. doi:10.1007/s00354-020-00120-0
Card-Based Cryptography Meets Formal Verification
2021. New generation computing, 39, 115–158. doi:10.1007/s00354-020-00120-0
Stengele, O.; Raiber, M.; Müller-Quade, J.; Hartenstein, H.
ETHTID: Deployable Threshold Information Disclosure on Ethereum
2021. 3rd IEEE International Conference on Blockchain Computing and Applications (BCCA), Tartu, EST, November 15-16, 2021, 127–134, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/BCCA53669.2021.9657019
ETHTID: Deployable Threshold Information Disclosure on Ethereum
2021. 3rd IEEE International Conference on Blockchain Computing and Applications (BCCA), Tartu, EST, November 15-16, 2021, 127–134, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/BCCA53669.2021.9657019
Stengele, O.; Raiber, M.; Müller-Quade, J.; Hartenstein, H.
ETHTID: Deployable Threshold Information Disclosure on Ethereum
2021
ETHTID: Deployable Threshold Information Disclosure on Ethereum
2021
2020
Agrikola, T.; Couteau, G.; Hofheinz, D.
The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iO
2020. Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part I Hrsg.: Kiayias, Aggelos; Kohlweiss, Markulf; Wallden, Petros; Zikas, Vassilis, 187–219, Springer. doi:10.1007/978-3-030-45374-9_7
The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iO
2020. Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part I Hrsg.: Kiayias, Aggelos; Kohlweiss, Markulf; Wallden, Petros; Zikas, Vassilis, 187–219, Springer. doi:10.1007/978-3-030-45374-9_7
Agrikola, T.; Couteau, G.; Ishai, Y.; Jarecki, S.; Sahai, A.
On Pseudorandom Encodings
2020. doi:10.5445/IR/1000129644
On Pseudorandom Encodings
2020. doi:10.5445/IR/1000129644
Agrikola, T.; Couteau, G.; Ishai, Y.; Jarecki, S.; Sahai, A.
On Pseudorandom Encodings
2020. Theory of Cryptography – 18th International Conference, TCC 2020, Durham, NC, USA, November 16–19, 2020, Proceedings, Part III. Ed.: R. Pass, 639–669, Springer International Publishing. doi:10.1007/978-3-030-64381-2_23
On Pseudorandom Encodings
2020. Theory of Cryptography – 18th International Conference, TCC 2020, Durham, NC, USA, November 16–19, 2020, Proceedings, Part III. Ed.: R. Pass, 639–669, Springer International Publishing. doi:10.1007/978-3-030-64381-2_23
Agrikola, T.; Hofheinz, D.; Kastner, J.
On Instantiating the Algebraic Group Model from Falsifiable Assumptions
2020. Advances in cryptology - EUROCRYPT 2020 : 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020 : proceedings. Part 2., 96–126, Springer. doi:10.1007/978-3-030-45724-2_4
On Instantiating the Algebraic Group Model from Falsifiable Assumptions
2020. Advances in cryptology - EUROCRYPT 2020 : 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020 : proceedings. Part 2., 96–126, Springer. doi:10.1007/978-3-030-45724-2_4
Arzamasov, V.; Schwerdt, R.; Karrari, S.; Böhm, K.; Nguyen, T. B.
Privacy Measures and Storage Technologies for Battery-Based Load Hiding - an Overview and Experimental Study
2020. e-Energy ’20: Proceedings of the Eleventh ACM International Conference on Future Energy Systems, Melbourne, Australia, 22 - 26 June 2020, 178–195, Association for Computing Machinery (ACM). doi:10.1145/3396851.3398320
Privacy Measures and Storage Technologies for Battery-Based Load Hiding - an Overview and Experimental Study
2020. e-Energy ’20: Proceedings of the Eleventh ACM International Conference on Future Energy Systems, Melbourne, Australia, 22 - 26 June 2020, 178–195, Association for Computing Machinery (ACM). doi:10.1145/3396851.3398320
Dowsley, R.; Müller-Quade, J.; Nascimento, A. C. A.
On the Composability of Statistically Secure Random Oblivious Transfer
2020. Entropy, 22 (1), 107. doi:10.3390/e22010107
On the Composability of Statistically Secure Random Oblivious Transfer
2020. Entropy, 22 (1), 107. doi:10.3390/e22010107
Fetzer, V.; Hoffmann, M.; Nagel, M.; Rupp, A.; Schwerdt, R.
P4TC - Provably-Secure yet Practical Privacy-Preserving Toll Collection
2020. Proceedings on privacy enhancing technologies, 2020 (3), 62–152. doi:10.2478/popets-2020-0046
P4TC - Provably-Secure yet Practical Privacy-Preserving Toll Collection
2020. Proceedings on privacy enhancing technologies, 2020 (3), 62–152. doi:10.2478/popets-2020-0046
Hartung, G. R.
Advanced Cryptographic Techniques for Protecting Log Data. Dissertation
2020, März 12. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000117650
Advanced Cryptographic Techniques for Protecting Log Data. Dissertation
2020, März 12. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000117650
Hoffmann, M.; Klooß, M.; Raiber, M.; Rupp, A.
Black-Box Wallets: Fast Anonymous Two-Way Payments for Constrained Devices
2020. Proceedings on privacy enhancing technologies, 2020 (1), 165–194. doi:10.2478/popets-2020-0010
Black-Box Wallets: Fast Anonymous Two-Way Payments for Constrained Devices
2020. Proceedings on privacy enhancing technologies, 2020 (1), 165–194. doi:10.2478/popets-2020-0010
Koch, A.; Walzer, S.
Foundations for actively secure card-based cryptography
2020. 10th International Conference on Fun with Algorithms (FUN 2021). Ed.: M. Farach-Colton, Art.-Nr.: 17, Schloss Dagstuhl - Leibniz-Zentrum für Informatik (LZI). doi:10.4230/LIPIcs.FUN.2021.17
Foundations for actively secure card-based cryptography
2020. 10th International Conference on Fun with Algorithms (FUN 2021). Ed.: M. Farach-Colton, Art.-Nr.: 17, Schloss Dagstuhl - Leibniz-Zentrum für Informatik (LZI). doi:10.4230/LIPIcs.FUN.2021.17
Nagel, M.
Anonymous Point Collection - Improved Models and Security Definitions. Dissertation
2020, Oktober 22. KIT Scientific Publishing. doi:10.5445/KSP/1000117751
Anonymous Point Collection - Improved Models and Security Definitions. Dissertation
2020, Oktober 22. KIT Scientific Publishing. doi:10.5445/KSP/1000117751
Rill, J.
Towards Applying Cryptographic Security Models to Real-World Systems. Dissertation
2020, April 27. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000118648
Towards Applying Cryptographic Security Models to Real-World Systems. Dissertation
2020, April 27. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000118648
2019
Achenbach, D.; Gröll, R.; Hackenjos, T.; Koch, A.; Löwe, B.; Mechler, J.; Müller-Quade, J.; Rill, J.
Your Money or Your Life—Modeling and Analyzing the Security of Electronic Payment in the UC Framework
2019. Financial Cryptography and Data Security – 23rd International Conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18–22, 2019, Revised Selected Papers. Ed.: I. Goldberg, 243–261, Springer International Publishing. doi:10.1007/978-3-030-32101-7_16
Your Money or Your Life—Modeling and Analyzing the Security of Electronic Payment in the UC Framework
2019. Financial Cryptography and Data Security – 23rd International Conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18–22, 2019, Revised Selected Papers. Ed.: I. Goldberg, 243–261, Springer International Publishing. doi:10.1007/978-3-030-32101-7_16
Baumgart, I.; Börsig, M.; Goerke, N.; Hackenjos, T.; Rill, J.; Wehmer, M.
Who Controls Your Energy? On the (In)Security of Residential Battery Energy Storage Systems
2019. 2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), Beijing, China, 21-23 October 2019, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SmartGridComm.2019.8909749
Who Controls Your Energy? On the (In)Security of Residential Battery Energy Storage Systems
2019. 2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), Beijing, China, 21-23 October 2019, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SmartGridComm.2019.8909749
Beckert, B.; Brelle, A.; Grimm, R.; Huber, N.; Kirsten, M.; Küsters, R.; Müller-Quade, J.; Noppel, M.; Reinhard, K.; Schwab, J.; Schwerdt, R.; Truderung, T.; Volkamer, M.; Winter, C.
GI Elections with POLYAS: a Road to End-to-End Verifiable Elections
2019. Fourth International Joint Conference on Electronic Voting (E-Vote-ID 2019), 1-4 October 2019, Lochau / Bregenz, Austria - Proceedings. Ed.: M. Volkamer; B. Beckert, 293–294, Gesellschaft für Informatik (GI)
GI Elections with POLYAS: a Road to End-to-End Verifiable Elections
2019. Fourth International Joint Conference on Electronic Voting (E-Vote-ID 2019), 1-4 October 2019, Lochau / Bregenz, Austria - Proceedings. Ed.: M. Volkamer; B. Beckert, 293–294, Gesellschaft für Informatik (GI)
Broadnax, B.
New Frameworks for Concurrently Composable Multi-Party Computation. Dissertation
2019. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000091915
New Frameworks for Concurrently Composable Multi-Party Computation. Dissertation
2019. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000091915
D’Anvers, J.-P.; Tiepelt, M.; Vercauteren, F.; Verbauwhede, I.
Timing Attacks on Error Correcting Codes in Post-Quantum Schemes
2019. Proceedings of 3rd ACM Workshop on Theory of Implementation Security Workshop - TIS’19, 2–9, Association for Computing Machinery (ACM). doi:10.1145/3338467.3358948
Timing Attacks on Error Correcting Codes in Post-Quantum Schemes
2019. Proceedings of 3rd ACM Workshop on Theory of Implementation Security Workshop - TIS’19, 2–9, Association for Computing Machinery (ACM). doi:10.1145/3338467.3358948
Hoffmann, M.; Klooß, M.; Rupp, A.
Efficient Zero-Knowledge Arguments in the Discrete Log Setting, Revisited
2019. Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2093–2110, Association for Computing Machinery (ACM). doi:10.1145/3319535.3354251
Efficient Zero-Knowledge Arguments in the Discrete Log Setting, Revisited
2019. Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2093–2110, Association for Computing Machinery (ACM). doi:10.1145/3319535.3354251
Klooß, M.; Lehmann, A.; Rupp, A.
(R)CCA Secure Updatable Encryption with Integrity Protection
2019. Advances in Cryptology – EUROCRYPT 2019 – 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part I. Ed.: Y. Ishai, 68–99, Springer International Publishing. doi:10.1007/978-3-030-17653-2_3
(R)CCA Secure Updatable Encryption with Integrity Protection
2019. Advances in Cryptology – EUROCRYPT 2019 – 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part I. Ed.: Y. Ishai, 68–99, Springer International Publishing. doi:10.1007/978-3-030-17653-2_3
Koch, A.
Cryptographic Protocols from Physical Assumptions. Dissertation
2019. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000097756
Cryptographic Protocols from Physical Assumptions. Dissertation
2019. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000097756
Koch, A.; Schrempp, M.; Kirsten, M.
Card-Based Cryptography Meets Formal Verification
2019. Advances in Cryptology – ASIACRYPT 2019 : 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings. Part I. Ed.: S.D. Galbraith, 488–517, Springer. doi:10.1007/978-3-030-34578-5_18
Card-Based Cryptography Meets Formal Verification
2019. Advances in Cryptology – ASIACRYPT 2019 : 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings. Part I. Ed.: S.D. Galbraith, 488–517, Springer. doi:10.1007/978-3-030-34578-5_18
Koch, A.; Schrempp, M.; Kirsten, M.
Card-Based Cryptography Meets Formal Verification
2019. doi:10.5445/IR/1000120005
Card-Based Cryptography Meets Formal Verification
2019. doi:10.5445/IR/1000120005
Müller-Quade, J.; Beyerer, J.; Broadnax, B.
Editorial
2019. Automatisierungstechnik, 67 (5), 359–360. doi:10.1515/auto-2019-0044
Editorial
2019. Automatisierungstechnik, 67 (5), 359–360. doi:10.1515/auto-2019-0044
Schwerdt, R.; Nagel, M.; Fetzer, V.; Gräf, T.; Rupp, A.
P6V2G: A Privacy-preserving V2G Scheme for Two-way Payments and Reputation
2019. Energy informatics, 2 (S1), Article number: 32. doi:10.1186/s42162-019-0075-1
P6V2G: A Privacy-preserving V2G Scheme for Two-way Payments and Reputation
2019. Energy informatics, 2 (S1), Article number: 32. doi:10.1186/s42162-019-0075-1
Tiepelt, M.; Szepieniec, A.
Quantum LLL with an application to mersenne number cryptosystems
2019. Progress in Cryptology – LATINCRYPT 2019: 6th International Conference on Cryptology and Information Security in Latin America, Santiago de Chile, Chile, October 2–4, 2019, Proceedings. Ed.: P. Schwabe, 3–23, Springer. doi:10.1007/978-3-030-30530-7_1
Quantum LLL with an application to mersenne number cryptosystems
2019. Progress in Cryptology – LATINCRYPT 2019: 6th International Conference on Cryptology and Information Security in Latin America, Santiago de Chile, Chile, October 2–4, 2019, Proceedings. Ed.: P. Schwabe, 3–23, Springer. doi:10.1007/978-3-030-30530-7_1