TU Darmstadt / ULB / TUbiblio

Items in division

Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Date | Item Type | Language | No Grouping
Jump to: A | B | C | D | E | F | G | H | K | M | S | T
Number of items at this level (without sub-levels): 68.

A

Akleylek, Sedat ; Bindel, Nina ; Buchmann, Johannes ; Krämer, Juliane ; Marson, Giorgia Azzurra (2016):
An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation.
In: International Conference on Cryptology AFRICACRYPT 2016, p. 10,
Springer, Fes, Morocco, [Conference or Workshop Item]

Alagic, Gorjan ; Broadbent, Anne ; Fefferman, Bill ; Gagliardoni, Tommaso ; Schaffner, Christian ; Jules, Michael St. (2016):
Computational Security of Quantum Encryption.
In: Lecture Notes in Computer Science - ICITS, 10015, In: Information Theoretic Security : 9th International Conference, ICITS 2016, Tacoma, WA, USA, August 9-12, 2016, pp. 47-71, Cham, Springer, ISBN 978-3-319-49174-5,
[Book Section]

B

Bock, Estuardo Alpirez ; Brzuska, Chris ; Fischlin, Marc ; Janson, Christian ; Michiels, Wil (2020):
Security Reductions for White-Box Key-Storage in Mobile Payments.
Asiacrypt 2020 - 26th Annual International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, Korea, 06.-10.12., [Conference or Workshop Item]

Brendel, Jacqueline ; Fischlin, Marc ; Günther, Felix ; Janson, Christian ; Stebila, Douglas (2020):
Towards Post-Quantum Security for Signal's X3DH Handshake.
27th Selected Areas in Cryptography (SAC 2020), virtual Conference, 19.-23.10., [Conference or Workshop Item]

Brendel, Jacqueline ; Fischlin, Marc ; Günther, Felix ; Stebila, Douglas (2019):
Challenges in Proving Post-Quantum Key Exchanges Based on Key Encapsulation Mechanisms.
Cryptology ePrint Archive, 2019/1356, [Report]

Brendel, Jacqueline (2019):
Future-Proofing Key Exchange Protocols.
Darmstadt, Technische Universität,
DOI: 10.25534/tuprints-00009642,
[Ph.D. Thesis]

Brendel, Jacqueline ; Fischlin, Marc ; Günther, Felix (2019):
Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids.
pp. 521-541, ESORICS 2019 - The European Symposium on Research in Computer Security, Luxembourg, 23.-27.09.2019, ISBN 978-3-030-29962-0,
[Conference or Workshop Item]

Brendel, Jacqueline ; Gerber, Nina (2019):
Sichere Instant Messaging Apps.
In: Datenschutz und Datensicherheit - DuD, 43 (5), pp. 276-280. Springer, ISSN 1862-2607 (elektronische Version); 1614-0702 (gedruckte Version),
DOI: 10.1007/s11623-019-1107-5,
[Article]

Bindel, Nina ; Brendel, Jacqueline ; Fischlin, Marc ; Goncalves, Brian ; Stebila, Douglas (2019):
Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange.
Chongqing, China, PQCrypto 2019, May 8-10, 2019, [Conference or Workshop Item]

Bock, Estuardo Alpirez ; Brzuska, Chris ; Fischlin, Marc ; Janson, Christian ; Michiels, Wil (2019):
Security Reductions for White-Box Key-Storage in Mobile Payments.
In: ePrint, [Article]

Brendel, Jacqueline ; Fischlin, Marc
Foley, Simon N. ; Gollmann, Dieter ; Snekkenes, Einar (eds.) (2017):
Zero Round-Trip Time for the Extended Access Control Protocol.
In: Lecture notes in computer science, 1, In: Computer Security – ESORICS 2017. 22nd European Symposium on Research in Computer Security, Proceedings, pp. 297-314, Cham, Springer International Publishing, ISBN 978-3-319-66401-9,
DOI: 10.1007/978-3-319-66402-6,
[Book Section]

Brendel, Jacqueline ; Fischlin, Marc ; Günther, Felix ; Janson, Christian
Katz, Jonathan ; Shacham, Hovav (eds.) (2017):
PRF-ODH: Relations, Instantiations, and Impossibility Results.
In: CRYPTO 2017 - 37th International Cryptology Conference, pp. 651-681,
Springer, Santa Barbara, CA, USA, [Conference or Workshop Item]

Bernhard, David ; Fischlin, Marc ; Warinschi, Bogdan (2016):
On the Hardness of Proving CCA-Security of Signed ElGamal.
In: LNCS, In: Public-Key Cryptography - PKC 2016, p. 24,
Springer, Taipei, Taiwan, ISBN 978-3-662-49384-7,
DOI: 10.1007/978-3-662-49384-7_3,
[Conference or Workshop Item]

Baecher, Paul (2014):
Cryptographic Reductions: Classification and Applications to Ideal Models.
TU Darmstadt,
[Ph.D. Thesis]

Brzuska, Christina (2013):
On the Foundations of Key Exchange.
Darmstadt, TU Darmstadt,
[Ph.D. Thesis]

Baecher, Paul ; Fischlin, Marc ; Schröder, Dominique
Kiayias, Aggelos (ed.) (2011):
Expedient Non-malleability Notions for Hash Functions.
In: Lecture Notes in Computer Science, 6558, pp. 268-283, Springer, CT-RSA, [Conference or Workshop Item]

Baecher, Paul ; Büscher, Niklas ; Fischlin, Marc ; Milde, Benjamin (2011):
Breaking reCAPTCHA: A Holistic Approach via Shape Recognition.
pp. 56-67, Future Challenges in Security and Privacy for Academia and Industry - 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011, DOI: 10.1007/978-3-642-21424-0_5,
[Conference or Workshop Item]

C

Cremers, Cas ; Düzlü, Samed ; Fiedler, Rune ; Fischlin, Marc ; Janson, Christian (2021):
BUFFing signature schemes beyond unforgeability and the case of post-quantum signature.
42nd IEEE Symposium on Security and Privacy, virtual Conference, 23.-27.05.2021, [Conference or Workshop Item]

D

Davies, Gareth T. ; Janson, Christian ; Martin, Daniel P. (2020):
Client-oblivious OPRAM.
The 22nd International Conference on Information and Communications Security (ICICS 2020), virtual Conference, 24.-27.08., [Conference or Workshop Item]

Degabriele, Jean Paul ; Janson, Christian ; Struck, Patrick (2019):
Sponges Resist Leakage: The Case of Authenticated Encryption.
ASIACRYPT 2019 - 25th Annual International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, 08.-12.12., [Conference or Workshop Item]

Degabriele, Jean Paul ; Fischlin, Marc (2018):
Simulatable Channels: Extended Security that is Universally Composable and Easier to Prove.
In: LNCS, In: Advances in Cryptology – ASIACRYPT 2018,
Springer, Asiacrypt 2018 - the 24th Annual International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, Australia, December 02-06, 2018, [Conference or Workshop Item]

Dowling, Benjamin ; Günther, Felix ; Herath, Udyani ; Stebila, Douglas (2016):
Secure Logging Schemes and Certificate Transparency.
In: 21st European Symposium on Research in Computer Security (ESORICS 2016),
Springer, Heraklion, Crete, Greece, [Conference or Workshop Item]

Degabriele, Jean Paul ; Fehr, Victoria ; Fischlin, Marc ; Gagliardoni, Tommaso ; Günther, Felix ; Marson, Giorgia Azzurra ; Mittelbach, Arno ; Paterson, Kenneth G. (2016):
Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol.
In: International Journal of Information Security, 15 (6), pp. 637-657. Springer, ISSN 1615-5270,
[Article]

Dowling, Benjamin ; Fischlin, Marc ; Günther, Felix ; Stebila, Douglas (2016):
A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol.
In: Cryptology ePrint Archive, 2016 (81), pp. 1-33. International Association for Cryptologic Research (IACR), [Article]

Dowling, Benjamin ; Fischlin, Marc ; Günther, Felix ; Stebila, Douglas (2015):
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates.
In: 22nd ACM Conference on Computer and Communications Security (CCS 2015), pp. 1197-1210,
ACM, Denver, Colorado, USA, [Conference or Workshop Item]

Degabriele, Jean Paul ; Fehr, Victoria ; Fischlin, Marc ; Gagliardoni, Tommaso ; Günther, Felix ; Marson, Giorgia Azzurra ; Mittelbach, Arno ; Paterson, Kenneth G.
Chen, Liqun ; Mitchell, Chris (eds.) (2014):
Unpicking PLAID: A Cryptographic Analysis of an ISO-standards-track Authentication Protocol.
In: Lecture Notes in Computer Science, In: Security Standardisation Research : Proceedings of the 1st International Conference on Research in Security Standardisation (SSR), pp. 1-25, Cham, Springer, ISBN 978-3-319-14054-4,
[Book Section]

Dagdelen, Özgür (2013):
The Cryptographic Security of the German Electronic Identity Card.
Darmstadt, tuprints, TU Darmstadt,
[Ph.D. Thesis]

Dagdelen, Özgür (2013):
The Cryptographic Security of the German Electronic Identity Card.
Darmstadt, tuprints, TU Darmstadt,
[Ph.D. Thesis]

E

Ece, Olcay (2018):
Security of E-Mail-Encryption.
TU Darmstadt, [Bachelor Thesis]

Erwig, Andreas ; Fischlin, Marc ; Hald, Martin ; Helm, Dominik ; Kiel, Robert ; Kübler, Florian ; Kümmerlin, Michael ; Laenge, Jakob ; Rohrbach, Felix (2017):
Redactable Graph Hashing, Revisited.
In: ACISP 2017,
[Conference or Workshop Item]

F

Fischlin, Marc ; Rohrbach, Felix (2021):
Single-to-Multi-Theorem Transformations for Non-Interactive Statistical Zero-Knowledge.
24th International Conference on Practice and Theory of Public-Key Cryptography, virtual Conference, 9.-13.05.2021, [Conference or Workshop Item]

Fischlin, Marc ; Günther, Felix ; Muth, Philipp (2020):
Information-Theoretic Security of Cryptographic Channels.
In: Information and Communications Security, pp. 295-311,
Springer Nature, 22nd International Conference on Information and Communications Security (ICICS 2020), virtual Conference, 24.-26.08.2021, ISBN 978-3-030-61078-4,
DOI: 10.1007/978-3-030-61078-4_17,
[Conference or Workshop Item]

Fischlin, Marc ; Harasser, Patrick ; Janson, Christian (2020):
Signatures from Sequential-OR Proofs.
EUROCRYPT 2020: 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, 10.-14. May 2020, [Conference or Workshop Item]

Fladung, Lukas ; Nikolopoulos, Georgios M. ; Alber, Gernot ; Fischlin, Marc (2019):
Intercept-Resend Emulation Attacks against a Continuous-Variable Quantum Authentication Protocol with Physical Unclonable Keys.
In: Cryptography, 3 (4), MDPI, DOI: 10.3390/cryptography3040025,
[Article]

Fischlin, Marc ; Haagh, Helene (2019):
How to Sign with White-Boxed AES.
Santiago de Chile, Springer, Latincrypt 2019, Oct. 2–4, 2019, [Conference or Workshop Item]

Fischlin, Marc ; Günther, Felix (2019):
Modeling Memory Faults in Signature and Encryption Schemes.
In: eprint, eprint.iacr.org, [Article]

Fischlin, Marc ; Mazaheri, Sogol (2018):
Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks.
In: 2018 IEEE 31st Computer Security Foundations Symposium (CSF),
IEEE, 2018 IEEE 31st Computer Security Foundations Symposium (CSF), Oxford, UK, 9.-12.7. 2018, DOI: 10.1109/CSF.2018.00013,
[Conference or Workshop Item]

Fischlin, Marc ; Harasser, Patrick (2018):
Invisible Sanitizable Signatures and Public-Key Encryption are Equivalent.
In: Springer International Publishing, LNCS 10892, In: Applied Cryptography and Network Security - ACNS 2018, pp. 202-220,
16th International Conference, ACNS 2018, Leuven, Belgium, 2.7.-4.7. 2018, [Conference or Workshop Item]

Fischlin, Marc ; Günther, Felix (2017):
Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates.
In: 2nd IEEE European Symposium on Security and Privacy (EuroS&P 2017),
IEEE, Paris, France, [Conference or Workshop Item]

Fischlin, Marc ; Günther, Felix ; Schmidt, Benedikt ; Warinschi, Bogdan (2016):
Key Confirmation in Key Exchange: A Formal Treatment and Implications for TLS 1.3.
In: 37th IEEE Symposium on Security and Privacy (S&P 2016),
IEEE, San Jose, California, USA, [Conference or Workshop Item]

Fischlin, Marc ; Günther, Felix ; Marson, Giorgia Azzurra ; Paterson, Kenneth G. (2015):
Data Is a Stream: Security of Stream-Based Channels.
In: Advances in Cryptology - CRYPTO 2015, pp. 545-564,
Springer, Santa Barbara, CA, USA, [Conference or Workshop Item]

Fehr, Victoria ; Fischlin, Marc (2015):
Sanitizable Signcryption: Sanitization over Encrypted Data (Full Version).
In: IACR Cryptology ePrint Archive, 2015, p. 765. [Article]

Fischlin, Marc ; Günther, Felix (2014):
Multi-Stage Key Exchange and the Case of Google's QUIC Protocol.
In: CCS '14 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, p. 12,
ACM, Scottsdale, Arizona, USA, [Conference or Workshop Item]

Fischlin, Marc ; Pinkas, Benny ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Visconti, Ivan (2011):
Secure Set Intersection with Untrusted Hardware Tokens.
In: 11th Cryptographers' Track at the RSA Conference (CT-RSA'11), pp. 1-16,
Springer, DOI: 10.1007/978-3-642-19074-2_1,
[Conference or Workshop Item]

Fischlin, Marc ; Onete, Cristina
Lopez, Javier ; Tsudik, Gene (eds.) (2011):
Relaxed Security Notions for Signatures of Knowledge.
6715, pp. 309-326, ACNS, [Conference or Workshop Item]

Fischlin, Marc ; Fischlin, Roger (2011):
Efficient Non-Malleable Commitment Schemes.
In: Journal of Cryptology, 24 (1), pp. 203-244. Springer, e-ISSN 1432-1378,
DOI: 10.1007/s00145-009-9043-4,
[Article]

G

Gonzalez, Ruben ; Hülsing, Andreas ; Kannwischer, Matthias ; Krämer, Juliane ; Lange, Tanja ; Stöttinger, Marc ; Waitz, Elisabeth ; Wiggers, Thom ; Yang, Bo-Yin (2021):
Verifying Post-Quantum Signatures in 8kB of RAM.
In: Post-Quantum Cryptography : 12th International Workshop, PQCrypto 2021 Proceedings,
k. A., Springer, PQCrypto 2021 The Twelfth International Conference on Post-Quantum Cryptography, virtual Conference, July 20-22, 2021, ISBN 978-3-030-81292-8,
[Conference or Workshop Item]

Geihs, Matthias ; Nikiforov, Oleg ; Demirel, Denise ; Sauer, Alexander ; Butin, Denis ; Günther, Felix ; Alber, Gernot ; Walther, Thomas ; Buchmann, Johannes (2019):
The Status of Quantum-Based Long-Term Secure Communication over the Internet.
In: IEEE Transactions on Sustainable Computing, IEEE, ISSN 2377-3782,
DOI: htps://doi.org/10.1109/TSUSC.2019.2913948,
[Article]

Günther, Felix (2018):
Modeling Advanced Security Aspects of Key Exchange and Secure Channel Protocols.
Darmstadt, Technische Universität,
[Ph.D. Thesis]

Günther, Felix ; Mazaheri, Sogol (2017):
A Formal Treatment of Multi-key Channels.
In: CRYPTO 2017 - 37th International Cryptology Conference,
Springer, Santa Barbara, CA, USA, [Conference or Workshop Item]

Gagliardoni, Tommaso ; Karvelas, Nikolaos ; Katzenbeisser, S. (2017):
ORAMs in a Quantum World.
In: PQCrypto 2017 - 8th International Workshop Post-Quantum Cryptography,
Springer, Utrecht, The Netherlands, [Conference or Workshop Item]

Günther, Felix ; Poettering, Bertram (2017):
Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes.
In: International Journal of Information Security, 16 (3), pp. 281-297. Springer, ISSN 1615-5270,
[Article]

Gagliardoni, Tommaso (2017):
Quantum Security of Cryptographic Primitives.
Darmstadt, Technische Universität Darmstadt,
[Ph.D. Thesis]

Gagliardoni, Tommaso ; Hülsing, Andreas ; Schaffner, Christian (2016):
Semantic Security and Indistinguishability in the Quantum World.
In: LNCS, In: Advances in Cryptology – CRYPTO 2016, pp. 60-89,
Springer, DOI: 10.1007/978-3-662-53015-3_3,
[Conference or Workshop Item]

Gagliotti Vigil, Martín Augusto (2015):
Trustworthy and Efficient Protection Schemes for Digital Archiving.
Darmstadt, TU Darmstadt,
[Ph.D. Thesis]

Günther, Felix ; Poettering, Bertram (2015):
Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes.
In: 20th Australasian Conference on Information Security and Privacy (ACISP 2015), pp. 195-212,
Springer, Queensland University of Technology (QUT), Brisbane, Australia, [Conference or Workshop Item]

Günther, Felix ; Manulis, Mark ; Peter, Andreas
Gritzalis, Dimitris ; Kiayias, Aggelos ; Askoxylakis, Ioannis (eds.) (2014):
Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation.
In: LNCS, In: Cryptology and Network Security (13th International Conference, CANS 2014), pp. 321-336,
Springer, Heraklion, Crete, Greece, ISBN 978-3-319-12280-9,
[Conference or Workshop Item]

H

Heinze, Dennis ; Classen, Jiska ; Rohrbach, Felix (2020):
MagicPairing: Apple’s Take on Securing Bluetooth Peripherals.
13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, VIRTUAL, July 08.-10., 2020, DOI: 10.1145/3395351.3399343,
[Conference or Workshop Item]

Hald, Martin (2018):
Cryptographic Analysis of the Bitmessage Protocol.
TU Darmstadt, [Master Thesis]

K

Kiel, Robert (2018):
Zero-Knowledge Contingent Payments.
TU Darmstadt, [Master Thesis]

Krüger, Stefan ; Nadi, Sarah ; Reif, Michael ; Ali, Karim ; Mezini, Mira ; Bodden, Eric ; Göpfert, Florian ; Günther, Felix ; Weinert, Christian ; Demmler, Daniel ; Kamath, Ram (2017):
CogniCrypt: Supporting Developers in using Cryptography.
In: Automated Software Engineering (ASE'17),
Piscataway, NJ, USA, ACM, Piscataway, NJ, USA, DOI: 10.1109/ASE.2017.8115707,
[Conference or Workshop Item]

M

Mazaheri, Sogol (2020):
Cryptographic Primitives that Resist Backdooring and Subversion. (Publisher's Version)
Darmstadt, Technische Universität,
DOI: 10.25534/tuprints-00014550,
[Ph.D. Thesis]

Marson, Giorgia Azzurra ; Poettering, Bertram (2017):
Security Notions for Bidirectional Channels.
In: IACR Transactions on Symmetric Cryptology, 2017 (1), pp. 405-426. DOI: 10.13154/tosc.v2017.i1.405-426,
[Article]

Marson, Giorgia Azzurra (2017):
Real-World Aspects of Secure Channels: Fragmentation, Causality, and Forward Security.
Darmstadt, Technische Universität,
[Ph.D. Thesis]

Mittelbach, Arno Andreas (2016):
Random Oracles in the Standard Model.
Darmstadt, Technische Universität,
[Ph.D. Thesis]

Mariano, Artur (2016):
High performance algorithms for lattice-based cryptanalysis.
Darmstadt, Technische Universität Darmstadt,
[Ph.D. Thesis]

S

Sitnikov, Konstantin (2017):
A Survey on Post-Quantum Key Exchange.
Darmstadt, Technische Universität, [Bachelor Thesis]

T

Tillmanns, Jörn ; Classen, Jiska ; Rohrbach, Felix ; Hollick, Matthias (2020):
Firmware Insider: Bluetooth Randomness is Mostly Random.
14th USENIX Workshop on Offensive Technologies (WOOT 2020), virtual Conference, 11.08., [Conference or Workshop Item]

This list was generated on Sun Sep 19 01:24:47 2021 CEST.