TU Darmstadt / ULB / TUbiblio

Items in division

Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Date | Item Type | Language | No Grouping
Jump to: A | B | D | E | F | G | H | K | M | S
Number of items at this level: 55.

A

Akleylek, Sedat and Bindel, Nina and Buchmann, Johannes and Krämer, Juliane and Marson, Giorgia Azzurra (2016):
An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation.
In: International Conference on Cryptology AFRICACRYPT 2016, Springer, Fes, Morocco, p. 10, [Conference or Workshop Item]

Alagic, Gorjan and Broadbent, Anne and Fefferman, Bill and Gagliardoni, Tommaso and Schaffner, Christian and Jules, Michael St. (2016):
Computational Security of Quantum Encryption.
In: Lecture Notes in Computer Science - ICITS, In: Information Theoretic Security : 9th International Conference, ICITS 2016, Tacoma, WA, USA, August 9-12, 2016, Cham, Springer, pp. 47-71, [Online-Edition: https://doi.org/10.1007/978-3-319-49175-2],
[Book Section]

B

Brendel, Jacqueline and Fischlin, Marc and Günther, Felix (2019):
Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids.
In: ESORICS 2019 - The European Symposium on Research in Computer Security, Luxembourg, 23.-27.09.2019, pp. 521-541, ISBN 978-3-030-29962-0,
[Conference or Workshop Item]

Brendel, Jacqueline and Gerber, Nina (2019):
Sichere Instant Messaging Apps.
43, In: Datenschutz und Datensicherheit - DuD, (5), Springer, pp. 276-280, ISSN 1862-2607 (elektronische Version); 1614-0702 (gedruckte Version), DOI: 10.1007/s11623-019-1107-5,
[Article]

Bindel, Nina and Brendel, Jacqueline and Fischlin, Marc and Goncalves, Brian and Stebila, Douglas (2019):
Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange.
Chongqing, China, In: PQCrypto 2019, May 8-10, 2019, [Conference or Workshop Item]

Bock, Estuardo Alpirez and Brzuska, Chris and Fischlin, Marc and Janson, Christian and Michiels, Wil (2019):
Security Reductions for White-Box Key-Storage in Mobile Payments.
In: ePrint, eprint.iacr.org, [Online-Edition: https://eprint.iacr.org/2019/1014.pdf],
[Article]

Brendel, Jacqueline and Fischlin, Marc Foley, Simon N. and Gollmann, Dieter and Snekkenes, Einar (eds.) (2017):
Zero Round-Trip Time for the Extended Access Control Protocol.
In: Lecture notes in computer science, In: Computer Security – ESORICS 2017. 22nd European Symposium on Research in Computer Security, Proceedings, Cham, Springer International Publishing, pp. 297-314, DOI: 10.1007/978-3-319-66402-6,
[Book Section]

Brendel, Jacqueline and Fischlin, Marc and Günther, Felix and Janson, Christian Katz, Jonathan and Shacham, Hovav (eds.) (2017):
PRF-ODH: Relations, Instantiations, and Impossibility Results.
In: CRYPTO 2017 - 37th International Cryptology Conference, Springer, Santa Barbara, CA, USA, pp. 651-681, [Conference or Workshop Item]

Bernhard, David and Fischlin, Marc and Warinschi, Bogdan (2016):
On the Hardness of Proving CCA-Security of Signed ElGamal.
In: LNCS, In: Public-Key Cryptography - PKC 2016, Springer, Taipei, Taiwan, p. 24, ISBN 978-3-662-49384-7,
DOI: 10.1007/978-3-662-49384-7_3,
[Conference or Workshop Item]

Baecher, Paul (2014):
Cryptographic Reductions: Classification and Applications to Ideal Models.
TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/4000],
[Ph.D. Thesis]

Brzuska, Christina (2013):
On the Foundations of Key Exchange.
Darmstadt, TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/3414],
[Ph.D. Thesis]

Baecher, Paul and Fischlin, Marc and Schröder, Dominique Kiayias, Aggelos (ed.) (2011):
Expedient Non-malleability Notions for Hash Functions.
In: Lecture Notes in Computer Science, 6558, Springer, In: CT-RSA, pp. 268-283, [Conference or Workshop Item]

Baecher, Paul and Büscher, Niklas and Fischlin, Marc and Milde, Benjamin (2011):
Breaking reCAPTCHA: A Holistic Approach via Shape Recognition.
In: Future Challenges in Security and Privacy for Academia and Industry - 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011, pp. 56-67, DOI: 10.1007/978-3-642-21424-0_5,
[Online-Edition: https://doi.org/10.1007/978-3-642-21424-0\_5],
[Conference or Workshop Item]

D

Degabriele, Jean Paul and Janson, Christian and Struck, Patrick (2019):
Sponges Resist Leakage: The Case of Authenticated Encryption.
In: ASIACRYPT 2019 - the 25th Annual International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December, 8-12, [Online-Edition: https://eprint.iacr.org/2019/1034.pdf],
[Conference or Workshop Item]

Degabriele, Jean Paul and Fischlin, Marc (2018):
Simulatable Channels: Extended Security that is Universally Composable and Easier to Prove.
In: LNCS, In: Advances in Cryptology – ASIACRYPT 2018, Springer, In: Asiacrypt 2018 - the 24th Annual International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, Australia, December 02-06, 2018, [Online-Edition: https://asiacrypt.iacr.org/2018/index.html],
[Conference or Workshop Item]

Dowling, Benjamin and Günther, Felix and Herath, Udyani and Stebila, Douglas (2016):
Secure Logging Schemes and Certificate Transparency.
In: 21st European Symposium on Research in Computer Security (ESORICS 2016), Springer, Heraklion, Crete, Greece, [Conference or Workshop Item]

Dowling, Benjamin and Fischlin, Marc and Günther, Felix and Stebila, Douglas (2016):
A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol.
[Other]

Degabriele, Jean Paul and Fehr, Victoria and Fischlin, Marc and Gagliardoni, Tommaso and Günther, Felix and Marson, Giorgia Azzurra and Mittelbach, Arno and Paterson, Kenneth G. (2016):
Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol.
15, In: International Journal of Information Security, (6), Springer, pp. 637-657, ISSN 1615-5270, [Article]

Dowling, Benjamin and Fischlin, Marc and Günther, Felix and Stebila, Douglas (2015):
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates.
In: 22nd ACM Conference on Computer and Communications Security (CCS 2015), ACM, Denver, Colorado, USA, pp. 1197-1210, [Conference or Workshop Item]

Degabriele, Jean Paul and Fehr, Victoria and Fischlin, Marc and Gagliardoni, Tommaso and Günther, Felix and Marson, Giorgia Azzurra and Mittelbach, Arno and Paterson, Kenneth G. Chen, Liqun and Mitchell, Chris (eds.) (2014):
Unpicking PLAID: A Cryptographic Analysis of an ISO-standards-track Authentication Protocol.
In: Lecture Notes in Computer Science, In: Security Standardisation Research : Proceedings of the 1st International Conference on Research in Security Standardisation (SSR), Cham, Springer, pp. 1-25, [Book Section]

Dagdelen, Özgür (2013):
The Cryptographic Security of the German Electronic Identity Card.
Darmstadt, tuprints, TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/3507],
[Ph.D. Thesis]

Dagdelen, Özgür (2013):
The Cryptographic Security of the German Electronic Identity Card.
Darmstadt, tuprints, TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/3538],
[Ph.D. Thesis]

E

Ece, Olcay (2018):
Security of E-Mail-Encryption.
TU Darmstadt, [Bachelor Thesis]

Erwig, Andreas and Fischlin, Marc and Hald, Martin and Helm, Dominik and Kiel, Robert and Kübler, Florian and Kümmerlin, Michael and Laenge, Jakob and Rohrbach, Felix (2017):
Redactable Graph Hashing, Revisited.
In: ACISP 2017, [Conference or Workshop Item]

F

Fladung, Lukas and Nikolopoulos, Georgios M. and Alber, Gernot and Fischlin, Marc (2019):
Intercept-Resend Emulation Attacks against a Continuous-Variable Quantum Authentication Protocol with Physical Unclonable Keys.
3, In: Cryptography, (4), MDPI, DOI: 10.3390/cryptography3040025,
[Article]

Fischlin, Marc and Haagh, Helene (2019):
How to Sign with White-Boxed AES.
Santiago de Chile, Springer, In: Latincrypt 2019, Oct. 2–4, 2019, [Conference or Workshop Item]

Fischlin, Marc and Günther, Felix (2019):
Modeling Memory Faults in Signature and Encryption Schemes.
In: eprint, eprint.iacr.org, [Online-Edition: https://eprint.iacr.org/2019/1053.pdf],
[Article]

Fischlin, Marc and Mazaheri, Sogol (2018):
Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks.
In: 2018 IEEE 31st Computer Security Foundations Symposium (CSF), IEEE, In: 2018 IEEE 31st Computer Security Foundations Symposium (CSF), Oxford, UK, 9.-12.7. 2018, DOI: 10.1109/CSF.2018.00013,
[Conference or Workshop Item]

Fischlin, Marc and Harasser, Patrick (2018):
Invisible Sanitizable Signatures and Public-Key Encryption are Equivalent.
In: Springer International Publishing, LNCS 10892, In: Applied Cryptography and Network Security - ACNS 2018, In: 16th International Conference, ACNS 2018, Leuven, Belgium, 2.7.-4.7. 2018, pp. 202-220, [Online-Edition: https://www.springer.com/us/book/9783319933863],
[Conference or Workshop Item]

Fischlin, Marc and Günther, Felix (2017):
Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates.
In: 2nd IEEE European Symposium on Security and Privacy (EuroS&P 2017), IEEE, Paris, France, [Conference or Workshop Item]

Fischlin, Marc and Günther, Felix and Schmidt, Benedikt and Warinschi, Bogdan (2016):
Key Confirmation in Key Exchange: A Formal Treatment and Implications for TLS 1.3.
In: 37th IEEE Symposium on Security and Privacy (S&P 2016), IEEE, San Jose, California, USA, [Conference or Workshop Item]

Fischlin, Marc and Günther, Felix and Marson, Giorgia Azzurra and Paterson, Kenneth G. (2015):
Data Is a Stream: Security of Stream-Based Channels.
In: Advances in Cryptology - CRYPTO 2015, Springer, Santa Barbara, CA, USA, pp. 545-564, [Conference or Workshop Item]

Fehr, Victoria and Fischlin, Marc (2015):
Sanitizable Signcryption: Sanitization over Encrypted Data (Full Version).
2015, In: IACR Cryptology ePrint Archive, p. 765, [Article]

Fischlin, Marc and Günther, Felix (2014):
Multi-Stage Key Exchange and the Case of Google's QUIC Protocol.
In: CCS '14 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, ACM, Scottsdale, Arizona, USA, p. 12, [Conference or Workshop Item]

Fischlin, Marc and Pinkas, Benny and Sadeghi, Ahmad-Reza and Schneider, Thomas and Visconti, Ivan (2011):
Secure Set Intersection with Untrusted Hardware Tokens.
In: 11th Cryptographers' Track at the RSA Conference (CT-RSA'11), Springer, pp. 1-16, DOI: 10.1007/978-3-642-19074-2_1,
[Online-Edition: https://encrypto.de/papers/FPSSV11.pdf],
[Conference or Workshop Item]

Fischlin, Marc and Onete, Cristina Lopez, Javier and Tsudik, Gene (eds.) (2011):
Relaxed Security Notions for Signatures of Knowledge.
6715, In: ACNS, pp. 309-326, [Conference or Workshop Item]

Fischlin, Marc and Fischlin, Roger (2011):
Efficient Non-Malleable Commitment Schemes.
24, In: J. Cryptology, (1), Springer, [Online-Edition: http://www.minicrypt.de],
[Journal]

G

Geihs, Matthias and Nikiforov, Oleg and Demirel, Denise and Sauer, Alexander and Butin, Denis and Günther, Felix and Alber, Gernot and Walther, Thomas and Buchmann, Johannes (2019):
The Status of Quantum-Based Long-Term Secure Communication over the Internet.
In: IEEE Transactions on Sustainable Computing, IEEE, ISSN 2377-3782, DOI: 10.1109/TSUSC.2019.2913948,
[Online-Edition: https://ieeexplore.ieee.org/document/8703121],
[Article]

Günther, Felix (2018):
Modeling Advanced Security Aspects of Key Exchange and Secure Channel Protocols.
Darmstadt, Technische Universität, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/7162],
[Ph.D. Thesis]

Günther, Felix and Mazaheri, Sogol (2017):
A Formal Treatment of Multi-key Channels.
In: CRYPTO 2017 - 37th International Cryptology Conference, Springer, Santa Barbara, CA, USA, [Conference or Workshop Item]

Gagliardoni, Tommaso and Karvelas, Nikolaos and Katzenbeisser, S. (2017):
ORAMs in a Quantum World.
In: PQCrypto 2017 - 8th International Workshop Post-Quantum Cryptography, Springer, Utrecht, The Netherlands, [Conference or Workshop Item]

Günther, Felix and Poettering, Bertram (2017):
Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes.
16, In: International Journal of Information Security, (3), Springer, pp. 281-297, ISSN 1615-5270, [Article]

Gagliardoni, Tommaso (2017):
Quantum Security of Cryptographic Primitives.
Darmstadt, Technische Universität Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/6019],
[Ph.D. Thesis]

Gagliardoni, Tommaso and Hülsing, Andreas and Schaffner, Christian (2016):
Semantic Security and Indistinguishability in the Quantum World.
In: LNCS, In: Advances in Cryptology – CRYPTO 2016, Springer, pp. 60-89, DOI: 10.1007/978-3-662-53015-3_3,
[Conference or Workshop Item]

Gagliotti Vigil, Martín Augusto (2015):
Trustworthy and Efficient Protection Schemes for Digital Archiving.
Darmstadt, TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/4669],
[Ph.D. Thesis]

Günther, Felix and Poettering, Bertram (2015):
Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes.
In: 20th Australasian Conference on Information Security and Privacy (ACISP 2015), Springer, Queensland University of Technology (QUT), Brisbane, Australia, pp. 195-212, [Conference or Workshop Item]

Günther, Felix and Manulis, Mark and Peter, Andreas Gritzalis, Dimitris and Kiayias, Aggelos and Askoxylakis, Ioannis (eds.) (2014):
Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation.
In: LNCS, In: Cryptology and Network Security (13th International Conference, CANS 2014), Springer, Heraklion, Crete, Greece, pp. 321-336, ISBN 978-3-319-12280-9,
[Conference or Workshop Item]

H

Hald, Martin (2018):
Cryptographic Analysis of the Bitmessage Protocol.
TU Darmstadt, [Master Thesis]

K

Kiel, Robert (2018):
Zero-Knowledge Contingent Payments.
TU Darmstadt, [Master Thesis]

Krüger, Stefan and Nadi, Sarah and Reif, Michael and Ali, Karim and Mezini, Mira and Bodden, Eric and Göpfert, Florian and Günther, Felix and Weinert, Christian and Demmler, Daniel and Kamath, Ram (2017):
CogniCrypt: Supporting Developers in using Cryptography.
In: Automated Software Engineering (ASE'17), Piscataway, NJ, USA, ACM, Piscataway, NJ, USA, DOI: 10.1109/ASE.2017.8115707,
[Online-Edition: http://dl.acm.org/citation.cfm?id=3155562.3155681],
[Conference or Workshop Item]

M

Marson, Giorgia Azzurra and Poettering, Bertram (2017):
Security Notions for Bidirectional Channels.
2017, In: IACR Transactions on Symmetric Cryptology, (Volume 2017 Issue 1), pp. 405-426, DOI: 10.13154/tosc.v2017.i1.405-426,
[Article]

Marson, Giorgia Azzurra (2017):
Real-World Aspects of Secure Channels: Fragmentation, Causality, and Forward Security.
Darmstadt, Technische Universität, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/6021],
[Ph.D. Thesis]

Mittelbach, Arno Andreas (2016):
Random Oracles in the Standard Model.
Darmstadt, Technische Universität, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5222],
[Ph.D. Thesis]

Mariano, Artur (2016):
High performance algorithms for lattice-based cryptanalysis.
Darmstadt, Technische Universität Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5752],
[Ph.D. Thesis]

S

Sitnikov, Konstantin (2017):
A Survey on Post-Quantum Key Exchange.
Darmstadt, Technische Universität, [Bachelor Thesis]

This list was generated on Thu Dec 12 01:48:13 2019 CET.