TU Darmstadt / ULB / TUbiblio

Einträge mit Organisationseinheit "20 Fachbereich Informatik > Angewandte Kryptographie"

Exportieren als [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Springe zu: A | B | D | E | F | G | H | K | L | M | O | P | R | S | T | V | W
Es werden nur Einträge angezeigt, bei denen keine untergeordnete Organisationseinheit ausgewählt wurde. Anzahl: 127.

A

Arnold, Paula ; Berndt, Sebastian ; Eisenbarth, Thomas ; Orlt, Maximilian (2024)
Polynomial sharings on two secrets: Buy one, get one free.
In: Transactions on Cryptographic Hardware and Embedded System, 2024 (3)
doi: 10.46586/tches.v2024.i3.671-706
Artikel, Bibliographie

Alkeilani Alkadri, Nabil (2022)
On Lattice-Based Signatures with Advanced Functionalities.
Technische Universität Darmstadt
doi: 10.26083/tuprints-00020793
Dissertation, Erstveröffentlichung, Verlagsversion

Avarikioti, Zeta ; Litos, Orfeas Stefanos Thyfronitis (2022)
Suborn Channels: Incentives Against Timelock Bribes.
26th International Conference of Financial Cryptography. Grenada (02.05.2022-06.05.2022)
doi: 10.1007/978-3-031-18283-9_24
Konferenzveröffentlichung, Bibliographie

Agrawal, Shweta ; Maitra, Monosij ; Vempati, Narasimha Sai ; Yamada, Shota
Hrsg.: Malkin, Tal ; Peikert, Chris (2021)
Functional Encryption for Turing Machines with Dynamic Bounded Collusion from LWE.
41st Annual International Cryptology Conference (CRYPTO 2021). virtual Conference (16.08.2021-20.08.2021)
doi: 10.1007/978-3-030-84259-8_9
Konferenzveröffentlichung, Bibliographie

Aumayr, Lukas ; Ersoy, Oguzhan ; Erwig, Andreas ; Faust, Sebastian ; Hostáková, Kristina ; Maffei, Matteo ; Moreno-Sanchez, Pedro ; Riahi, Siavash (2021)
Bitcoin-Compatible Virtual Channels.
42nd IEEE Symposium on Security and Privacy. virtual Conference (23.05.2021-27.05.2021)
Konferenzveröffentlichung, Bibliographie

Avarikioti, Zeta ; Thyfronitis Litos, Orfeas Stefanos ; Wattenhofer, Roger (2020)
Cerberus Channels: Incentivizing Watchtowers for Bitcoin.
24th International Conference on Financial Cryptography and Data Security. Kota Kinabalu, Malaysia (10.02.2020-14.02.2020)
doi: 10.1007/978-3-030-51280-4_19
Konferenzveröffentlichung, Bibliographie

Agrawal, Shweta ; Libert, Benoit ; Maitra, Monosij ; Titiu, Radu (2020)
Adaptive simulation security for inner product functional encryption.
23rd IACR International Conference on Practice and Theory of Public-Key Cryptography(PKC 2020). virtual Conference (01.06.2020-04.06.2020)
doi: 10.1007/978-3-030-45374-9_2
Konferenzveröffentlichung, Bibliographie

Alkeilani Alkadri, Nabil ; Das, Poulami ; Erwig, Andreas ; Faust, Sebastian ; Krämer, Juliane ; Riahi, Siavash ; Struck, Patrick (2020)
Deterministic Wallets in a Quantum World.
The 27th ACM Conference on Computer and Communications Security (CCS 2020). virtual Conference (09.11.2020-13.11.2020)
Konferenzveröffentlichung, Bibliographie

Agrawal, Shweta ; Maitra, Monosij ; Yamada, Shota (2019)
Attribute Based Encryption for Deterministic Finite Automata from DLIN.
17th International Confernce on Theory of Cryptography Conference (TCC 2019). Nuremberg, Germany (01.12.2019-05.12.2019)
doi: 10.1007/978-3-030-36033-7_4
Konferenzveröffentlichung, Bibliographie

Agrawal, Shweta ; Maitra, Monosij ; Yamada, Shota (2019)
Attribute based encryption (and more) for nondeterministic finite automata from LWE.
39th Annual International Cryptology Conference (CRYPTO 2019). Santa Barbara, USA (18.08.2019-22.08.2019)
doi: 10.1007/978-3-030-26951-7_26
Konferenzveröffentlichung, Bibliographie

Amler, Hendrik (2018)
Evaluation of payment channel networks for micropayments.
Technische Universität Darmstadt
Masterarbeit, Bibliographie

Agrawal, Shweta ; Maitra, Monosij (2018)
FE and iO for turing machines from minimal assumptions.
16th International Confernce on Theory of Cryptography Conference (TCC 2018). Panaji, India (11.11.2018-14.11.2018)
doi: 10.1007/978-3-030-03810-6_18
Konferenzveröffentlichung, Bibliographie

Andrychowicz, Marcin ; Dziembowski, Stefan ; Faust, Sebastian (2016)
Circuit Compilers with O(1/log (n)) Leakage Rate.
Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II.
doi: 10.1007/978-3-662-49896-5_21
Konferenzveröffentlichung, Bibliographie

Andrychowicz, Marcin ; Dziembowski, Stefan ; Faust, Sebastian (2016)
Circuit Compilers with O(1/ log(n)) Leakage Rate.
In: IACR Cryptology ePrint Archive, 2016
Artikel, Bibliographie

Andrychowicz, Marcin ; Damgard, Ivan ; Dziembowski, Stefan ; Faust, Sebastian ; Polychroniadou, Antigoni (2015)
Efficient Leakage Resilient Circuit Compilers.
Topics in Cryptology - CT-RSA 2015, The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings.
doi: 10.1007/978-3-319-16715-2_17
Konferenzveröffentlichung, Bibliographie

B

Berti, Francesco (2023)
Reconsidering Generic Composition: the modes A10, A11 and A12 are insecure.
28th Australasian Conference on Information Security and Privacy. Brisbane, Australia (05.07.2023-07.07.2023)
doi: 10.1007/978-3-031-35486-1
Konferenzveröffentlichung, Bibliographie

Brian, Gianluca ; Faust, Sebastian ; Micheli, Elena ; Venturi, Daniele (2022)
Continuously Non-malleable Codes Against Bounded-Depth Tampering.
28th International Conference on the Theory and Application of Cryptology and Information Security. Taipei, Taiwan (05.12.2022-09.12.2022)
doi: 10.1007/978-3-031-22972-5_14
Konferenzveröffentlichung, Bibliographie

Berti, Francesco ; Bhasin, Shivam ; Breier, Jakob ; Hou, Xiaolu ; Poussier, Romain ; Standaert, François-Xavier ; Udvarhelyi, Balasz (2022)
A Finer-Grain Analysis of the Leakage (Non) Resilience of OCB.
Conference on Cryptographic Hardware and Embedded Systems (CHES 2022). Leuven, Belgium (18.09.2022-21.09.2022)
doi: 10.46586/tches.v2022.i1.461-481
Konferenzveröffentlichung, Bibliographie

Berti, Francesco (2020)
Authentication in the presence of side-channel leakage.
Université Catholique de Louvain
Dissertation, Bibliographie

Balasch, Josep ; Faust, Sebastian ; Gierlichs, Benedikt ; Paglialonga, Clara ; Standaert, Francois-Xavier (2017)
Consolidating Inner Product Masking.
In: Cryptology ePrint Archive, 2017 (1047)
Artikel, Bibliographie

Balasch, Josep ; Faust, Sebastian ; Gierlichs, Benedikt ; Paglialonga, Clara ; Standaert, Francois-Xavier (2017)
Consolidating Inner Product Masking.
Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I.
doi: 10.1007/978-3-319-70694-8_25
Konferenzveröffentlichung, Bibliographie

Barthe, Gilles ; Dupressoir, Francois ; Faust, Sebastian ; Gregoire, Benjamin ; Standaert, Francois-Xavier ; Strub, Pierre-Yves (2017)
Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model.
Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part I.
doi: 10.1007/978-3-319-56620-7_19
Konferenzveröffentlichung, Bibliographie

Brody, Joshua ; Dziembowski, Stefan ; Faust, Sebastian ; Pietrzak, Krzysztof (2017)
Position-Based Cryptography and Multiparty Communication Complexity.
Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I.
doi: 10.1007/978-3-319-70500-2_3
Konferenzveröffentlichung, Bibliographie

Brody, Joshua ; Dziembowski, Stefan ; Faust, Sebastian ; Pietrzak, Krzysztof (2016)
Position-Based Cryptography and Multiparty Communication Complexity.
In: IACR Cryptology ePrint Archive, 2016
Artikel, Bibliographie

Barthe, Gilles ; Dupressoir, Francois ; Faust, Sebastian ; Gregoire, Benjamin ; Standaert, Francois-Xavier ; Strub, Pierre-Yves (2016)
Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model.
In: IACR Cryptology ePrint Archive, 2016
Artikel, Bibliographie

Balasch, Josep ; Faust, Sebastian ; Gierlichs, Benedikt (2015)
Inner Product Masking Revisited.
Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I.
doi: 10.1007/978-3-662-46800-5_19
Konferenzveröffentlichung, Bibliographie

Balasch, Josep ; Faust, Sebastian ; Gierlichs, Benedikt (2015)
Inner Product Masking Revisited.
In: IACR Cryptology ePrint Archive, 2015
Artikel, Bibliographie

Balasch, Josep ; Faust, Sebastian ; Gierlichs, Benedikt ; Verbauwhede, Ingrid (2012)
Theory and Practice of a Leakage Resilient Masking Scheme.
Advances in Cryptology - ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings.
doi: 10.1007/978-3-642-34961-4_45
Konferenzveröffentlichung, Bibliographie

D

Das, Poulami ; Erwig, Andreas ; Faust, Sebastian (2024)
Shared-Custodial Password-Authenticated Deterministic Wallets.
14th International Conference on Security and Cryptography for Networks (SCN 2024). Amalfi, Italy (11.09.2024 - 13.09.2024)
doi: 10.1007/978-3-031-71073-5_16
Konferenzveröffentlichung, Bibliographie

Das, Poulami (2023)
Secure Infrastructures in the Realm of Decentralization.
Technische Universität Darmstadt
doi: 10.26083/tuprints-00024422
Dissertation, Erstveröffentlichung, Verlagsversion

Das, Poulami ; Hesse, Julia ; Lehmann, Anja (2022)
DPaSE: Distributed Password-Authenticated Symmetric-Key Encryption, or How to Get Many Keys from One Password.
2022 ACM on Asia Conference on Computer and Communications Security. Nagasaki, Japan (30.05.2022-02.06.2022)
doi: 10.1145/3488932.3517389
Konferenzveröffentlichung, Bibliographie

Das, Poulami ; Erwig, Andreas ; Faust, Sebastian ; Loss, Julian ; Riahi, Siavash (2021)
The Exact Security of BIP32 Wallets.
27th ACM Conference on Computer and Communications Security. virtual Conference (15.11.2021-19.11.2021)
doi: 10.1145/3460120.3484807
Konferenzveröffentlichung, Bibliographie

Dziembowski, Stefan ; Fabiański, Grzegorz ; Faust, Sebastian ; Riahi, Siavash
Hrsg.: Lee, James R. (2021)
Lower Bounds for Off-Chain Protocols: Exploring the Limits of Plasma.
virtual Conference (06.01.2021-08.01.2021)
doi: 10.4230/LIPIcs.ITCS.2021.72
Konferenzveröffentlichung, Bibliographie

Das, Poulami ; Faust, Sebastian ; Loss, Julian (2019)
A Formal Treatment of Deterministic Wallets.
ACM CCS 2019 - Symposium on Computer and Communications Security. London, UK (11.11.2019-11.11.2019)
Konferenzveröffentlichung, Bibliographie

Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian ; Hesse, Julia ; Hostakova, Kristina (2019)
Multiparty Virtual State Channels.
38th Annual International Conference on the Theory and Applications of Cryptographic Techniques.
Konferenzveröffentlichung, Bibliographie

Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian ; Malinowski, Daniel (2019)
Perun: Virtual Payment Hubs over Cryptocurrencies.
39th IEEE Symposium on Security and Privacy. THE HYATT REGENCY, SAN FRANCISCO, CA (21.05.2018-23.05.2018)
Konferenzveröffentlichung, Bibliographie

Dziembowski, Stefan ; Faust, Sebastian ; Zebrowski, Karol (2019)
Simple Refreshing in the Noisy Leakage Model.
The 25th Annual International Conference on the Theory and Application of Cryptology and Information Security. Kobe, Japan (08.12.2019-12.12.2019)
Konferenzveröffentlichung, Bibliographie

Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian (2018)
FairSwap: How to fairly exchange digital goods.
25th ACM Conference on Computer and Communications Security (CCS). Toronto, Canada (15.10.2018-19.10.2018)
Konferenzveröffentlichung, Bibliographie

Dziembowski, Stefan ; Faust, Sebastian ; Hostakova, Kristina (2018)
General State Channel Networks.
25th ACM Conference on Computer and Communications Security (CCS). Toronto, Canada (15.10.2018-19.10.2018)
doi: 10.1145/3243734.3243856
Konferenzveröffentlichung, Bibliographie

Damgard, Ivan ; Faust, Sebastian ; Mukherjee, Pratyay ; Venturi, Daniele (2017)
Bounded Tamper Resilience: How to Go Beyond the Algebraic Barrier.
In: J. Cryptology, 30 (1)
doi: 10.1007/s00145-015-9218-0
Artikel, Bibliographie

Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian ; Malinowski, Daniel (2017)
PERUN: Virtual Payment Channels over Cryptographic Currencies.
In: IACR Cryptology ePrint Archive, 2017
Artikel, Bibliographie

Dziembowski, Stefan ; Faust, Sebastian ; Standaert, Francois-Xavier (2016)
Private Circuits III: Hardware Trojan-Resilience via Testing Amplification.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016.
doi: 10.1145/2976749.2978419
Konferenzveröffentlichung, Bibliographie

Dziembowski, Stefan ; Faust, Sebastian ; Herold, Gottfried ; Journault, Anthony ; Masny, Daniel ; Standaert, Francois-Xavier (2016)
Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems.
Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part II.
doi: 10.1007/978-3-662-53008-5_10
Konferenzveröffentlichung, Bibliographie

Dziembowski, Stefan ; Faust, Sebastian ; Skorski, Maciej (2016)
Optimal Amplification of Noisy Leakages.
Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part II.
doi: 10.1007/978-3-662-49099-0_11
Konferenzveröffentlichung, Bibliographie

Dziembowski, Stefan ; Faust, Sebastian ; Herold, Gottfried ; Journault, Anthony ; Masny, Daniel ; Standaert, Francois-Xavier (2016)
Towards Sound Fresh Re-Keying with Hard (Physical) Learning Problems.
In: IACR Cryptology ePrint Archive, 2016
Artikel, Bibliographie

Dziembowski, Stefan ; Faust, Sebastian ; Standaert, Francois-Xavier (2016)
Private Circuits III: Hardware Trojan-Resilience via Testing Amplification.
In: IACR Cryptology ePrint Archive, 2016
Artikel, Bibliographie

Dziembowski, Stefan ; Faust, Sebastian ; Kolmogorov, Vladimir ; Pietrzak, Krzysztof (2015)
Proofs of Space.
Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II.
doi: 10.1007/978-3-662-48000-7_29
Konferenzveröffentlichung, Bibliographie

Dziembowski, Stefan ; Faust, Sebastian ; Skorski, Maciej (2015)
Noisy Leakage Revisited.
Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II.
doi: 10.1007/978-3-662-46803-6_6
Konferenzveröffentlichung, Bibliographie

Duc, Alexandre ; Faust, Sebastian ; Standaert, Francois-Xavier (2015)
Making Masking Security Proofs Concrete - Or How to Evaluate the Security of Any Leaking Device.
Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I.
doi: 10.1007/978-3-662-46800-5_16
Konferenzveröffentlichung, Bibliographie

Damgard, Ivan ; Faust, Sebastian ; Mukherjee, Pratyay ; Venturi, Daniele (2015)
The Chaining Lemma and Its Application.
Information Theoretic Security - 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings.
doi: 10.1007/978-3-319-17470-9_11
Konferenzveröffentlichung, Bibliographie

Duc, Alexandre ; Faust, Sebastian ; Standaert, Francois-Xavier (2015)
Making Masking Security Proofs Concrete Or How to Evaluate the Security of any Leaking Device.
In: IACR Cryptology ePrint Archive, 2015
Artikel, Bibliographie

Duc, Alexandre ; Dziembowski, Stefan ; Faust, Sebastian (2014)
Unifying Leakage Models: From Probing Attacks to Noisy Leakage.
Advances in Cryptology - EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings.
doi: 10.1007/978-3-642-55220-5_24
Konferenzveröffentlichung, Bibliographie

Duc, Alexandre ; Dziembowski, Stefan ; Faust, Sebastian (2014)
Unifying Leakage Models: from Probing Attacks to Noisy Leakage.
In: IACR Cryptology ePrint Archive, 2014
Artikel, Bibliographie

Damgard, Ivan ; Faust, Sebastian ; Mukherjee, Pratyay ; Venturi, Daniele (2014)
The Chaining Lemma and its application.
In: IACR Cryptology ePrint Archive, 2014
Artikel, Bibliographie

Damgard, Ivan ; Faust, Sebastian ; Mukherjee, Pratyay ; Venturi, Daniele (2013)
Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier.
Advances in Cryptology - ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II.
doi: 10.1007/978-3-642-42045-0_8
Konferenzveröffentlichung, Bibliographie

Damgard, Ivan ; Faust, Sebastian ; Mukherjee, Pratyay ; Venturi, Daniele (2013)
Bounded Tamper Resilience: How to go beyond the Algebraic Barrier.
In: IACR Cryptology ePrint Archive, 2013
Artikel, Bibliographie

Dziembowski, Stefan ; Faust, Sebastian ; Kolmogorov, Vladimir ; Pietrzak, Krzysztof (2013)
Proofs of Space.
In: IACR Cryptology ePrint Archive, 2013
Artikel, Bibliographie

Damgard, Ivan ; Faust, Sebastian ; Hazay, Carmit (2012)
Secure Two-Party Computation with Low Communication.
Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings.
doi: 10.1007/978-3-642-28914-9_4
Konferenzveröffentlichung, Bibliographie

Dziembowski, Stefan ; Faust, Sebastian (2012)
Leakage-Resilient Circuits without Computational Assumptions.
Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings.
doi: 10.1007/978-3-642-28914-9_13
Konferenzveröffentlichung, Bibliographie

Dziembowski, Stefan ; Faust, Sebastian (2011)
Leakage-Resilient Cryptography from the Inner-Product Extractor.
Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings.
doi: 10.1007/978-3-642-25385-0_38
Konferenzveröffentlichung, Bibliographie

Damgard, Ivan ; Faust, Sebastian ; Hazay, Carmit (2011)
Secure Two-Party Computation with Low Communication.
In: IACR Cryptology ePrint Archive, 2011
Artikel, Bibliographie

Dziembowski, Stefan ; Faust, Sebastian (2011)
Leakage-Resilient Cryptography From the Inner-Product Extractor.
In: IACR Cryptology ePrint Archive, 2011
Artikel, Bibliographie

Danezis, George ; Diaz, Claudia ; Faust, Sebastian ; Käsper, Emilia ; Troncoso, Carmela ; Preneel, Bart (2007)
Efficient Negative Databases from Cryptographic Hash Functions.
Information Security, 10th International Conference, ISC 2007, Valparaiso, Chile, October 9-12, 2007, Proceedings.
doi: 10.1007/978-3-540-75496-1_28
Konferenzveröffentlichung, Bibliographie

E

Erwig, Andreas (2023)
Provably Secure Advanced Cryptographic Wallets.
Technische Universität Darmstadt
doi: 10.26083/tuprints-00024454
Dissertation, Erstveröffentlichung, Verlagsversion

Erwig, Andreas ; Riahi, Siavash (2022)
Deterministic Wallets for Adaptor Signatures.
27th European Symposium on Research in Computer Security (ESORICS 2022). Copenhagen, Denmark (26.09.2022-30.09.2022)
doi: 10.1007/978-3-031-17146-8_24
Konferenzveröffentlichung, Bibliographie

Erwig, Andreas ; Faust, Sebastian ; Hostáková, Kristina ; Maitra, Monosij ; Riahi, Siavash (2021)
Two-Party Adaptor Signatures From Identification Schemes.
Report, Bibliographie

Erwig, Andreas ; Faust, Sebastian ; Hostáková, Kristina ; Maitra, Monosij ; Riahi, Siavash (2021)
Two-Party Adaptor Signatures From Identification Schemes.
24th International Conference on Practice and Theory of Public-Key Cryptography. virtual Conference (09.05.2021-13.05.2021)
Konferenzveröffentlichung, Bibliographie

Erwig, Andreas ; Hesse, Julia ; Orlt, Maximilian ; Riahi, Siavash (2020)
Fuzzy Asymmetric Password-Authenticated Key Exchange.
26th Annual International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt 2020). virtual Conference (07.12.2020-11.12.2020)
Konferenzveröffentlichung, Bibliographie

Eckey, Lisa ; Faust, Sebastian ; Schlosser, Benjamin (2020)
OptiSwap: Fast Optimistic Fair Exchange.
15th ACM Asia Conference on Computer and Communications Security (ASIA CCS '20). virtual Conference (05.10.2020-09.10.2020)
doi: 10.1145/3320269.3384749
Konferenzveröffentlichung, Bibliographie

Eckey, Lisa (2020)
Blockchain Scalability through Secure Optimistic Protocols.
Technische Universität Darmstadt
doi: 10.25534/tuprints-00014041
Dissertation, Erstveröffentlichung, Verlagsversion

Escudeiro, Nuno ; Escudeiro, Paula ; Soares, Fernando ; Thyfronitis Litos, Orfeas Stefanos ; Norberto, Marcelo ; Lopes, Jorge (2017)
Recognition of hand configuration: A critical factor in automatic sign language translation.
12th Iberian Conference on Information Systems and Technologies (CISTI). Lisbon, Portugal (21.06.2017-24.06.2017)
doi: 10.23919/CISTI.2017.7975724
Konferenzveröffentlichung, Bibliographie

Eckey, Lisa ; Faust, Sebastian ; Loss, Julian (2017)
Efficient Algorithms for Broadcast and Consensus Based on Proofs of Work.
In: IACR Cryptology ePrint Archive, 2017
Artikel, Bibliographie

F

Frassetto, Tommaso ; Jauernig, Patrick ; Koisser, David ; Kretzler, David ; Schlosser, Benjamin ; Faust, Sebastian ; Sadeghi, Ahmad-Reza (2023)
POSE: Practical Off-chain Smart Contract Execution.
Network and Distributed System Security Symposium 2023. San Diego, USA (27.02.2023-03.03.2023)
Konferenzveröffentlichung, Bibliographie

Faust, Sebastian ; Hazay, Carmit ; Kretzler, David ; Schlosser, Benjamin (2023)
Putting the Online Phase on a Diet: Covert Security from Short MACs.
CT-RSA 2023: The Cryptographers' Track at RSA Conference. San Francisco, USA (24.04.2023-27.04.2023)
Konferenzveröffentlichung, Bibliographie

Faust, Sebastian ; Krämer, Juliane ; Orlt, Maximilian ; Struck, Patrick (2022)
On the Related-Key Attack Security of Authenticated Encryption Schemes.
13th Conference on Security and Cryptography for Networks. Amalfi, Italy (12.09.2022-14.09.2022)
doi: 10.1007/978-3-031-14791-3_16
Konferenzveröffentlichung, Bibliographie

Faust, Sebastian ; Hazay, Carmit ; Kretzler, David ; Schlosser, Benjamin (2022)
Financially Backed Covert Security.
International Conference on Practice and Theory of Public-Key Cryptography 2022. virtual Conference (08.03.2022-11.03.2022)
doi: 10.1007/978-3-030-97131-1_4
Konferenzveröffentlichung, Bibliographie

Faust, Sebastian ; Hazay, Carmit ; Kretzler, David ; Schlosser, Benjamin (2021)
Generic Compiler for Publicly Verifiable Covert Multi-Party Computation.
40th Annual International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt 2021). Zagreb, Croatia (17.10.2021-21.10.2021)
Konferenzveröffentlichung, Bibliographie

Faust, Sebastian ; Hazay, Carmit ; Venturi, Daniele (2018)
Outsourced pattern matching.
In: Int. J. Inf. Sec., 17 (3)
doi: 10.1007/s10207-017-0374-0
Artikel, Bibliographie

Faust, Sebastian ; Paglialonga, Clara ; Schneider, Tobias (2017)
Amortizing Randomness Complexity in Private Circuits.
Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I.
doi: 10.1007/978-3-319-70694-8_27
Konferenzveröffentlichung, Bibliographie

Faust, Sebastian ; Hostakova, Kristina ; Mukherjee, Pratyay ; Venturi, Daniele (2017)
Non-Malleable Codes for Space-Bounded Tampering.
Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part II.
doi: 10.1007/978-3-319-63715-0_4
Konferenzveröffentlichung, Bibliographie

Faust, Sebastian ; Hostakova, Kristina ; Mukherjee, Pratyay ; Venturi, Daniele (2017)
Non-Malleable Codes for Space-Bounded Tampering.
In: IACR Cryptology ePrint Archive, 2017
Artikel, Bibliographie

Faust, Sebastian ; Grosso, Vincent ; Pozo, Santos Merino Del ; Paglialonga, Clara ; Standaert, Francois-Xavier (2017)
Composable Masking Schemes in the Presence of Physical Defaults and the Robust Probing Model.
In: IACR Cryptology ePrint Archive, 2017
Artikel, Bibliographie

Faust, Sebastian ; Paglialonga, Clara ; Schneider, Tobias (2017)
Amortizing Randomness Complexity in Private Circuits.
In: IACR Cryptology ePrint Archive, 2017
Artikel, Bibliographie

Faust, Sebastian ; Hazay, Carmit ; Nielsen, Jesper Buus ; Nordholt, Peter Sebastian ; Zottarel, Angela (2016)
Signature Schemes Secure Against Hard-to-Invert Leakage.
In: J. Cryptology, 29 (2)
doi: 10.1007/s00145-015-9197-1
Artikel, Bibliographie

Faust, Sebastian ; Mukherjee, Pratyay ; Venturi, Daniele ; Wichs, Daniel (2016)
Efficient Non-Malleable Codes and Key Derivation for Poly-Size Tampering Circuits.
In: IEEE Trans. Information Theory, 62 (12)
doi: 10.1109/TIT.2016.2613919
Artikel, Bibliographie

Faust, Sebastian ; Masny, Daniel ; Venturi, Daniele (2016)
Chosen-Ciphertext Security from Subset Sum.
Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I.
doi: 10.1007/978-3-662-49384-7_2
Konferenzveröffentlichung, Bibliographie

Faust, Sebastian ; Mukherjee, Pratyay ; Nielsen, Jesper Buus ; Venturi, Daniele (2015)
A Tamper and Leakage Resilient von Neumann Architecture.
Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings.
doi: 10.1007/978-3-662-46447-2_26
Konferenzveröffentlichung, Bibliographie

Faust, Sebastian ; Masny, Daniel ; Venturi, Daniele (2015)
Chosen-Ciphertext Security from Subset Sum.
In: IACR Cryptology ePrint Archive, 2015
Artikel, Bibliographie

Faust, Sebastian ; Rabin, Tal ; Reyzin, Leonid ; Tromer, Eran ; Vaikuntanathan, Vinod (2014)
Protecting Circuits from Computationally Bounded and Noisy Leakage.
In: SIAM J. Comput., 43 (5)
doi: 10.1137/120880343
Artikel, Bibliographie

Faust, Sebastian ; Mukherjee, Pratyay ; Venturi, Daniele ; Wichs, Daniel (2014)
Efficient Non-malleable Codes and Key-Derivation for Poly-size Tampering Circuits.
Advances in Cryptology - EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings.
doi: 10.1007/978-3-642-55220-5_7
Konferenzveröffentlichung, Bibliographie

Faust, Sebastian ; Mukherjee, Pratyay ; Nielsen, Jesper Buus ; Venturi, Daniele (2014)
Continuous Non-malleable Codes.
Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings.
doi: 10.1007/978-3-642-54242-8_20
Konferenzveröffentlichung, Bibliographie

Faust, Sebastian ; Mukherjee, Pratyay ; Nielsen, Jesper Buus ; Venturi, Daniele (2014)
Continuous Non-malleable Codes.
In: IACR Cryptology ePrint Archive, 2014
Artikel, Bibliographie

Faust, Sebastian ; Mukherjee, Pratyay ; Nielsen, Jesper Buus ; Venturi, Daniele (2014)
A Tamper and Leakage Resilient Random Access Machine.
In: IACR Cryptology ePrint Archive, 2014
Artikel, Bibliographie

Faust, Sebastian ; Hazay, Carmit ; Venturi, Daniele (2014)
Outsourced Pattern Matching.
In: IACR Cryptology ePrint Archive, 2014
Artikel, Bibliographie

Faust, Sebastian ; Hazay, Carmit ; Venturi, Daniele (2013)
Outsourced Pattern Matching.
Automata, Languages, and Programming - 40th International Colloquium, ICALP 2013, Riga, Latvia, July 8-12, 2013, Proceedings, Part II.
doi: 10.1007/978-3-642-39212-2_48
Konferenzveröffentlichung, Bibliographie

Faust, Sebastian ; Mukherjee, Pratyay ; Venturi, Daniele ; Wichs, Daniel (2013)
Efficient Non-Malleable Codes and Key-Derivation for Poly-Size Tampering Circuits.
In: IACR Cryptology ePrint Archive, 2013
Artikel, Bibliographie

Faust, Sebastian ; Hazay, Carmit ; Nielsen, Jesper Buus ; Nordholt, Peter Sebastian ; Zottarel, Angela (2012)
Signature Schemes Secure against Hard-to-Invert Leakage.
Advances in Cryptology - ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings.
doi: 10.1007/978-3-642-34961-4_8
Konferenzveröffentlichung, Bibliographie

Faust, Sebastian ; Pietrzak, Krzysztof ; Schipper, Joachim (2012)
Practical Leakage-Resilient Symmetric Cryptography.
Cryptographic Hardware and Embedded Systems - CHES 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings.
doi: 10.1007/978-3-642-33027-8_13
Konferenzveröffentlichung, Bibliographie

Faust, Sebastian ; Kohlweiss, Markulf ; Marson, Giorgia Azzurra ; Venturi, Daniele (2012)
On the Non-malleability of the Fiat-Shamir Transform.
Progress in Cryptology - INDOCRYPT 2012, 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings.
doi: 10.1007/978-3-642-34931-7_5
Konferenzveröffentlichung, Bibliographie

Faust, Sebastian ; Hazay, Carmit ; Nielsen, Jesper Buus ; Nordholt, Peter Sebastian ; Zottarel, Angela (2012)
Signature Schemes Secure against Hard-to-Invert Leakage.
In: IACR Cryptology ePrint Archive, 2012
Artikel, Bibliographie

Faust, Sebastian ; Kohlweiss, Markulf ; Marson, Giorgia Azzurra ; Venturi, Daniele (2012)
On the Non-malleability of the Fiat-Shamir Transform.
In: IACR Cryptology ePrint Archive, 2012
Artikel, Bibliographie

Faust, Sebastian ; Pietrzak, Krzysztof ; Venturi, Daniele (2011)
Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience.
Automata, Languages and Programming - 38th International Colloquium, ICALP 2011, Zurich, Switzerland, July 4-8, 2011, Proceedings, Part I.
doi: 10.1007/978-3-642-22006-7_33
Konferenzveröffentlichung, Bibliographie

Faust, Sebastian ; Pietrzak, Krzysztof ; Venturi, Daniele (2011)
Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience.
In: IACR Cryptology ePrint Archive, 2011
Artikel, Bibliographie

Faust, Sebastian ; Rabin, Tal ; Reyzin, Leonid ; Tromer, Eran ; Vaikuntanathan, Vinod (2010)
Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases.
Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 - June 3, 2010. Proceedings.
doi: 10.1007/978-3-642-13190-5_7
Konferenzveröffentlichung, Bibliographie

Faust, Sebastian ; Kiltz, Eike ; Pietrzak, Krzysztof ; Rothblum, Guy N. (2010)
Leakage-Resilient Signatures.
Theory of Cryptography, 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings.
doi: 10.1007/978-3-642-11799-2_21
Konferenzveröffentlichung, Bibliographie

Faust, Sebastian ; Kiltz, Eike ; Pietrzak, Krzysztof ; Rothblum, Guy N. (2009)
Leakage-Resilient Signatures.
In: IACR Cryptology ePrint Archive, 2009
Artikel, Bibliographie

Faust, Sebastian ; Reyzin, Leonid ; Tromer, Eran (2009)
Protecting Circuits from Computationally-Bounded Leakage.
In: IACR Cryptology ePrint Archive, 2009
Artikel, Bibliographie

Faust, Sebastian ; Käsper, Emilia ; Lucks, Stefan (2008)
Efficient Simultaneous Broadcast.
Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings.
doi: 10.1007/978-3-540-78440-1_11
Konferenzveröffentlichung, Bibliographie

G

Grosso, Vincent ; Standaert, Francois-Xavier ; Faust, Sebastian (2015)
Masking vs. Multiparty Computation: How Large is the Gap for AES?
In: IACR Cryptology ePrint Archive, 2015
Artikel, Bibliographie

Grosso, Vincent ; Standaert, Francois-Xavier ; Faust, Sebastian (2014)
Masking vs. multiparty computation: how large is the gap for AES?
In: J. Cryptographic Engineering, 4 (1)
doi: 10.1007/s13389-014-0073-y
Artikel, Bibliographie

Grosso, Vincent ; Standaert, Francois-Xavier ; Faust, Sebastian (2013)
Masking vs. Multiparty Computation: How Large Is the Gap for AES?
Cryptographic Hardware and Embedded Systems - CHES 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings.
doi: 10.1007/978-3-642-40349-1_23
Konferenzveröffentlichung, Bibliographie

H

Hostáková, Kristina (2021)
Foundations of Generalized State Channel Networks.
Technische Universität Darmstadt
doi: 10.26083/tuprints-00017476
Dissertation, Erstveröffentlichung, Verlagsversion

K

Kretzler, David (2024)
Distributed Computation Meets Blockchain: Advanced Cryptographic Services from Blockchain Features.
Technische Universität Darmstadt
doi: 10.26083/tuprints-00028661
Dissertation, Erstveröffentlichung, Verlagsversion

Kiayias, Aggelos ; Thyfronitis Litos, Orfeas Stefanos (2020)
A Composable Security Treatment of the Lightning Network.
33rd IEEE Computer Security Foundations Symposium (CSF 2020). virtual Conference (22.06.2020-26.06.2020)
doi: 10.1109/CSF49147.2020.00031
Konferenzveröffentlichung, Bibliographie

Kiayias, Aggelos ; Livshits, Benjamin ; Monteoliva Mosteiro, Andrés ; Thyfronitis Litos, Orfeas Stefanos (2019)
A Puff of Steem: Security Analysis of Decentralized Content Curation.
International Conference on Blockchain Economics, Security and Protocols (Tokenomics 2019). Paris, France (06.05.2019-07.05.2019)
doi: 10.4230/OASIcs.Tokenomics.2019.3
Konferenzveröffentlichung, Bibliographie

Kohlweiss, Markulf ; Faust, Sebastian ; Fritsch, Lothar ; Gedrojc, Bartek ; Preneel, Bart (2007)
Efficient Oblivious Augmented Maps: Location-Based Services with a Payment Broker.
Privacy Enhancing Technologies, 7th International Symposium, PET 2007 Ottawa, Canada, June 20-22, 2007, Revised Selected Papers.
doi: 10.1007/978-3-540-75551-7_6
Konferenzveröffentlichung, Bibliographie

L

Lohr, Matthias ; Schlosser, Benjamin ; Jürjens, Jan ; Staab, Matthias (2020)
Cost Fairness for Blockchain-Based Two-Party Exchang Protocols.
3rd IEEE International Conference on Blockchain. virtual Conference (02.11.2020-06.11.2020)
Konferenzveröffentlichung, Bibliographie

M

Maitra, Monosij (2020)
Fine-Grained Encryption for Uniform Models of Computation.
Indian Institute of Technology of Madras
Dissertation, Bibliographie

Maitra, M. ; Mukherjee, A. (2014)
Convergence of the Min-Sum Decoding Scheme for LDPC Codes from a Dynamical Systems Perspective.
4th International Conference of Emerging Applications of Information Technology. Kolkata, India (19.12.2014-21.12.2014)
doi: 10.1109/EAIT.2014.40
Konferenzveröffentlichung, Bibliographie

O

Orlt, Maximilian (2024)
Leakage and Fault Resilience of Cryptographic Implementations.
Technische Universität Darmstadt
doi: 10.26083/tuprints-00027794
Dissertation, Erstveröffentlichung, Verlagsversion

P

Paglialonga, Clara (2021)
Provable Secure Countermeasures Against Side-Channel Attacks.
Technische Universität Darmstadt
doi: 10.26083/tuprints-00018597
Dissertation, Erstveröffentlichung, Verlagsversion

R

Riahi, Siavash (2023)
On the (im)possibility of building off-chain protocols from minimal assumptions.
Technische Universität Darmstadt
doi: 10.26083/tuprints-00024399
Dissertation, Erstveröffentlichung, Verlagsversion

S

Schlosser, Benjamin (2024)
Improving Scalability, Privacy, and Decentralization of Blockchains and their Applications via Multiparty Computation.
Technische Universität Darmstadt
doi: 10.26083/tuprints-00028820
Dissertation, Erstveröffentlichung, Verlagsversion

T

Thyfronitis Litos, Orfeas Stefanos ; Zindros, Dionysis (2017)
Trust Is Risk: A Decentralized Financial Trust Platform.
21st International Conference on Financial Cryptography and Data Security. Sliema, Malta (03.04.2017-07.04.2017)
doi: 10.1007/978-3-319-70972-7_19
Konferenzveröffentlichung, Bibliographie

V

Villeneuve, Come du Crest de (2018)
Evaluation of the Efficiency of different Architectures and Pathfinding Algorithms.
Technische Universität Darmstadt
Masterarbeit, Bibliographie

Varky, Jacek (2018)
TeePay – Using Trusted Execution Environments for Off-chain Payment.
Technische Universität Darmstadt
Masterarbeit, Bibliographie

W

Wijden, Marius van der (2018)
Payment and State Channels in practice.
Technische Universität Darmstadt
Masterarbeit, Bibliographie

Diese Liste wurde am Sun Dec 22 02:01:51 2024 CET generiert.