TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 66.

Degabriele, Jean Paul and Fischlin, Marc (2018):
Simulatable Channels: Extended Security that is Universally Composable and Easier to Prove.
In: Advances in Cryptology – ASIACRYPT 2018, Springer, In: Asiacrypt 2018 - the 24th Annual International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, Australia, December 02-06, 2018, In: LNCS, [Online-Edition: https://asiacrypt.iacr.org/2018/index.html],
[Conference or Workshop Item]

Fischlin, Marc and Mazaheri, Sogol (2018):
Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks.
In: 2018 IEEE 31st Computer Security Foundations Symposium (CSF), IEEE, In: 2018 IEEE 31st Computer Security Foundations Symposium (CSF), Oxford, UK, 9.-12.7. 2018, DOI: 10.1109/CSF.2018.00013,
[Conference or Workshop Item]

Fischlin, Marc and Harasser, Patrick (2018):
Invisible Sanitizable Signatures and Public-Key Encryption are Equivalent.
In: Applied Cryptography and Network Security - ACNS 2018, In: 16th International Conference, ACNS 2018, Leuven, Belgium, 2.7.-4.7. 2018, In: Springer International Publishing, LNCS 10892, [Online-Edition: https://www.springer.com/us/book/9783319933863],
[Conference or Workshop Item]

Brendel, Jacqueline and Fischlin, Marc
Foley, Simon N. and Gollmann, Dieter and Snekkenes, Einar (eds.) (2017):
Zero Round-Trip Time for the Extended Access Control Protocol.
In: Computer Security – ESORICS 2017. 22nd European Symposium on Research in Computer Security, Proceedings, Cham, Springer International Publishing, pp. 297-314, DOI: 10.1007/978-3-319-66402-6,
[Book Section]

Brendel, Jacqueline and Fischlin, Marc and Günther, Felix and Janson, Christian
Katz, Jonathan and Shacham, Hovav (eds.) (2017):
PRF-ODH: Relations, Instantiations, and Impossibility Results.
In: CRYPTO 2017 - 37th International Cryptology Conference, Springer, Santa Barbara, CA, USA, [Conference or Workshop Item]

Erwig, Andreas and Fischlin, Marc and Hald, Martin and Helm, Dominik and Kiel, Robert and Kübler, Florian and Kümmerlin, Michael and Laenge, Jakob and Rohrbach, Felix (2017):
Redactable Graph Hashing, Revisited.
In: ACISP 2017, [Conference or Workshop Item]

Fischlin, Marc and Günther, Felix (2017):
Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates.
In: 2nd IEEE European Symposium on Security and Privacy (EuroS&P 2017), IEEE, Paris, France, [Conference or Workshop Item]

Fischlin, Marc and Herzberg, Amir and Noon, Hon Bin and Shulman, Haya (2016):
Obfuscation Combiners.
In: International Cryptology Conference (CRYPTO), Santa Barbara, CA, USA, [Conference or Workshop Item]

Fischlin, Marc and Günther, Felix and Schmidt, Benedikt and Warinschi, Bogdan (2016):
Key Confirmation in Key Exchange: A Formal Treatment and Implications for TLS 1.3.
In: 37th IEEE Symposium on Security and Privacy (S&P 2016), IEEE, San Jose, California, USA, [Conference or Workshop Item]

Bernhard, David and Fischlin, Marc and Warinschi, Bogdan (2016):
On the Hardness of Proving CCA-Security of Signed ElGamal.
In: Public-Key Cryptography - PKC 2016, Springer, Taipei, Taiwan, In: LNCS, ISBN 978-3-662-49384-7,
DOI: 10.1007/978-3-662-49384-7_3,
[Conference or Workshop Item]

Dowling, Benjamin and Fischlin, Marc and Günther, Felix and Stebila, Douglas (2016):
A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol.
[Other]

Degabriele, Jean Paul and Fehr, Victoria and Fischlin, Marc and Gagliardoni, Tommaso and Günther, Felix and Marson, Giorgia Azzurra and Mittelbach, Arno and Paterson, Kenneth G. (2016):
Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol.
In: International Journal of Information Security, Springer, pp. 637-657, 15, (6), ISSN 1615-5270,
[Article]

Dowling, Benjamin and Fischlin, Marc and Günther, Felix and Stebila, Douglas (2015):
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates.
In: 22nd ACM Conference on Computer and Communications Security (CCS 2015), ACM, Denver, Colorado, USA, [Conference or Workshop Item]

Fischlin, Marc and Mazaheri, Sogol (2015):
Notions of Deniable Message Authentication.
In: Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, ACM, Denver, Colorado, USA, In: WPES '15, ISBN 978-1-4503-3820-2,
DOI: 10.1145/2808138.2808143,
[Conference or Workshop Item]

Fischlin, Marc and Günther, Felix and Marson, Giorgia Azzurra and Paterson, Kenneth G. (2015):
Data Is a Stream: Security of Stream-Based Channels.
In: Advances in Cryptology - CRYPTO 2015, Springer, Santa Barbara, CA, USA, [Conference or Workshop Item]

Egert, Rolf and Fischlin, Marc and Gens, David and Jacob, Sven and Senker, Matthias and Tillmans, Jörg (2015):
Privately computing set-union and set-intersection cardinality via bloom filters.
In: Information Security and Privacy (ACISP), Springer International, pp. 413-430, [Article]

Fehr, Victoria and Fischlin, Marc (2015):
Sanitizable Signcryption: Sanitization over Encrypted Data (Full Version).
In: IACR Cryptology ePrint Archive, p. 765, 2015, [Article]

Fischlin, Marc and Günther, Felix (2014):
Multi-Stage Key Exchange and the Case of Google's QUIC Protocol.
In: CCS '14 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, ACM, Scottsdale, Arizona, USA, [Conference or Workshop Item]

Dagdelen, Özgür and Fischlin, Marc (2014):
Intercepting Tokens in Cryptographic Protocols: The Empire Strikes Back in the Clone Wars.
In: ISIT 2014 - IEEE International Symposium on Information Theory, Honolulu HI USA, [Conference or Workshop Item]

Brzuska, Christina and Fischlin, Marc and Smart, Nigel and Warinschi, Bogdan and Williams, Stephen (2014):
Less is more: relaxed yet composable security notions for key exchange.
In: Int. J. Inf. Sec., pp. 267-297, 12, (4), [Article]

Fischlin, Marc and Lehmann, Anja and Pietrzak, Krzysztof (2014):
Robust Multi-Property Combiners for Hash Functions.
In: J. Cryptology, 27, DOI: 10.1007/s00145-013-9148-7,
[Conference or Workshop Item]

Degabriele, Jean Paul and Fehr, Victoria and Fischlin, Marc and Gagliardoni, Tommaso and Günther, Felix and Marson, Giorgia Azzurra and Mittelbach, Arno and Paterson, Kenneth G.
Chen, Liqun and Mitchell, Chris (eds.) (2014):
Unpicking PLAID: A Cryptographic Analysis of an ISO-standards-track Authentication Protocol.
In: Security Standardisation Research : Proceedings of the 1st International Conference on Research in Security Standardisation (SSR), Cham, Springer, pp. 1-25, [Book Section]

Dagdelen, Özgür and Fischlin, Marc and Gagliardoni, Tommaso (2013):
The Fiat-Shamir Transformation in a Quantum World.
In: Asiacrypt 2013, Springer, In: LNCS, [Conference or Workshop Item]

Volkamer, Melanie and Renaud, Karen
Fischlin, Marc and Katzenbeisser, Stefan (eds.) (2013):
Mental Models – General Introduction and Review of Their Application to Human-Centred Security.
In: Number Theory and Cryptography, Springer Berlin Heidelberg, pp. 255-280, DOI: 10.1007/978-3-642-42001-6_18,
[Book Section]

Brzuska, Christina and Fischlin, Marc and Smart, Nigel and Warinschi, Bogdan and Williams, Stephen (2013):
Less is more: relaxed yet composable security notions for key exchange.
In: Int. J. Inf. Sec, pp. 267-297, 12, (4), [Article]

Deiseroth, B. and Fehr, Victoria and Fischlin, Marc and Maasz, M. and Reimers, Nils and Stein, R. (2013):
Computing on Authenticated Data for Adjustable Predicates.
In: Lecture Notes in Computer Science, pp. 53-68, 7954, [Article]

Fischlin, Marc and Fleischhacker, Nils (2013):
Limitations of the Meta-Reduction Technique: The Case of Schnorr Signatures.
In: Lecture Notes in Computer Science, Volume 7881, pp. 444-460, [Article]

Fischlin, Marc and Onete, Cristina (2013):
Subtle Kinks in Distance-Bounding: an Analysis of Prominent Protocols.
In: Security and Privacy in Wireless and Mobile Networks, pp. 195-206, [Article]

Dagdelen, Özgür and Fischlin, Marc and Gagliardoni, Tommaso and Marson, Giorgia Azzurra and Mittelbach, Arno and Onete, Cristina (2013):
A Cryptographic Analysis of OPACITY.
In: ESORICS 2013, Springer, In: LNCS, [Conference or Workshop Item]

Dagdelen, Özgür and Fischlin, Marc and Gagliardoni, Tommaso (2013):
The Fiat-Shamir Transformation in the Quantum World.
In: ASIACRYPT 2013, Bangalore, India, [Conference or Workshop Item]

Baecher, Paul and Farshim, Pooya and Fischlin, Marc and Stam, Martijn (2013):
Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions.
In: Lecture Notes in Computer Science, pp. 426-443, 7881, [Article]

Baecher, Paul and Brzuska, Christina and Fischlin, Marc (2013):
Notions of Black-Box Reductions.
In: Lecture Notes in Computer Science, pp. 269-315, 8269, [Article]

Fischlin, Marc and Katzenbeisser, Stefan (2013):
Number Theory and Cryptography.
Springer, 8260, [Book]

Fischlin, Marc and Onete, Cristina (2013):
Terrorism in Distance Bounding: Modeling Terrorist-Fraud Resistance.
In: ACNS, Springer, In: LNCS, [Conference or Workshop Item]

Fischlin, Marc and Buchmann, Johannes and Manulis, Mark (eds.) (2012):
Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography.
Springer, ISBN 978-3-642-30056-1,
DOI: 10.1007/978-3-642-30057-8,
[Conference or Workshop Item]

Bender, Jens and Dagdelen, Özgür and Fischlin, Marc and Kügler, Dennis (2012):
The PACE|AA Protocol for Machine Readable Travel Documents, and Its Security.
In: Financial Cryptography, Springer-Verlag, In: Lecture Notes in Computer Science, [Conference or Workshop Item]

Brzuska, Christina and Dagdelen, Özgür and Fischlin, Marc (2012):
TLS, PACE, and EAC: A Cryptographic View at Modern Key Exchange Protocols.
In: Sicherheit 2012, Gesellschaft für Informatik, In: Sicherheit 2012, P-195, [Conference or Workshop Item]

Fischlin, Marc and Libert, B. and Manulis, Mark (2011):
Non-Interactive and Re-Usable Universally Composable String Commitments with Adaptive Security.
In: ASIACRYPT 2011, [Conference or Workshop Item]

Boneh, Dan and Dagdelen, Özgür and Fischlin, Marc and Lehmann, Anja and Schaffner, Christian and Zhandry, Mark (2011):
Random Oracles in a Quantum World.
In: 17th International Conference on Theory and Application of Cryptology and Information Security, [Conference or Workshop Item]

Fischlin, Marc and Pinkas, Benny and Sadeghi, Ahmad-Reza and Schneider, Thomas and Visconti, Ivan (2011):
Secure Set Intersection with Untrusted Hardware Tokens.
In: 11th Cryptographers' Track at the RSA Conference (CT-RSA'11), Springer, DOI: 10.1007/978-3-642-19074-2_1,
[Conference or Workshop Item]

Baecher, Paul and Büscher, Niklas and Fischlin, Marc and Milde, Benjamin (2011):
Breaking reCAPTCHA: A Holistic Approach via Shape Recognition.
In: Future Challenges in Security and Privacy for Academia and Industry - 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011, DOI: 10.1007/978-3-642-21424-0_5,
[Online-Edition: https://doi.org/10.1007/978-3-642-21424-0\_5],
[Conference or Workshop Item]

Fischlin, Marc and Fischlin, Roger (2011):
Efficient Non-Malleable Commitment Schemes.
In: J. Cryptology, Springer, 24, (1), [Online-Edition: http://www.minicrypt.de],
[Journal]

Baecher, Paul and Fischlin, Marc and Schröder, Dominique
Kiayias, Aggelos (ed.) (2011):
Expedient Non-malleability Notions for Hash Functions.
Springer, In: CT-RSA, In: Lecture Notes in Computer Science, 6558, [Conference or Workshop Item]

Ries, Sebastian and Fischlin, Marc and Martucci, Leonardo and Mühlhäuser, Max (2011):
Learning Whom to Trust in a Privacy-Friendly Way.
In: Proceedings of the 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-11), [Conference or Workshop Item]

Brzuska, Christina and Fischlin, Marc and Schröder, Heike and Katzenbeisser, Stefan (2011):
Physically Uncloneable Functions in the Universal Composition Framework.
In: Advances in Cryptography (CRYPTO 2011), Springer, [Conference or Workshop Item]

Fischlin, Marc and Onete, Cristina
Lopez, Javier and Tsudik, Gene (eds.) (2011):
Relaxed Security Notions for Signatures of Knowledge.
In: ACNS, 6715, [Conference or Workshop Item]

Fischlin, Marc and Lehmann, Anja and Ristenpart, Thomas and Shrimpton, Thomas and Stam, Martijn and Tessaro, Stefano (2010):
Random Oracles With(out) Programmability.
In: Asiacrypt 2010, Springer, In: Lecture Notes in Computer Science, [Conference or Workshop Item]

Baecher, Paul and Fischlin, Marc and Gordon, Lior and Langenberg, Robert and Lützow, Michael and Schröder, Dominique (2010):
CAPTCHAs: The Good, the Bad, and the Ugly.
In: Sicherheit 2010, Gesellschaft fuer Informatik (GI), In: Lecture Notes in Informatics, [Conference or Workshop Item]

Dagdelen, Özgür and Fischlin, Marc (2010):
Security Analysis of the Extended Access Control Protocol for Machine Readable Travel Documents.
In: 13th Information Security Conference, Springer, Boca Raton, USA, In: Lecture Notes in Computer Science, [Conference or Workshop Item]

Eikemeier, Oliver and Fischlin, Marc and Goetzmann, Jens-Fabian and Lehmann, Anja and Schroeder, Peter and Schröder, Dominique and Wagner, Daniel (2010):
History-Free Aggregate Message Authentication Codes.
In: Security and Cryptography for Networks (SCN) 2010, Springer, In: Lecture Notes in Computer Science, [Conference or Workshop Item]

Galindo, David and Libert, Benoit and Fischlin, Marc and Fuchsbauer, Georg and Lehmann, Anja and Manulis, Mark and Schröder, Dominique (2010):
Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions.
In: Africacrypt 2010, Springer, In: Lecture Notes in Computer Science, 6055, [Conference or Workshop Item]

Dent, Alexander and Fischlin, Marc and Manulis, Mark and Schröder, Dominique and Stam, Martijn (2010):
Confidential Signatures and Deterministic Signcryption.
In: 13th International Conference on Practice and Theory in Public Key Cryptography (PKC 2010), Springer, In: LNCS, [Conference or Workshop Item]

Dent, Alexander and Fischlin, Marc and Manulis, Mark and Schröder, Dominique and Stam, Martijn (2010):
Confidential Signatures and Deterministic Signcryption.
In: Public-Key Cryptography (PKC), Springer-Verlag, In: Lecture Notes in Computer Science, 6056, [Conference or Workshop Item]

Fischlin, Marc and Schröder, Dominique (2010):
On the Impossibility of Three-Move Blind Signature Schemes.
In: Advances in Cryptology - Eurocrypt, Springer-Verlag, In: Lecture Notes in Computer Science, 6110, [Conference or Workshop Item]

Galindo, David and Libert, Benoit and Fischlin, Marc and Fuchsbauer, Georg and Lehmann, Anja and Manulis, Mark and Schröder, Dominique (2010):
Public-Key Encryption with Non-interactive Opening: New Constructions and Stronger Definitions.
In: Progress in Cryptology - AFRICACRYPT 2010, Springer, In: LNCS, [Conference or Workshop Item]

Brzuska, Christina and Busch, Heike and Dagdelen, Özgür and Fischlin, Marc and Franz, Martin and Katzenbeisser, Stefan and Manulis, Mark and Onete, Cristina and Peter, Andreas and Poettering, Bertram and Schröder, Dominique (2010):
Redactable Signatures for Tree-Structured Data: Definitions and Constructions.
In: Applied Cryptography and Network Security (ACNS) 2010, Springer, In: Lecture Notes in Computer Science, 6055, [Conference or Workshop Item]

Brzuska, Christina and Fischlin, Marc and Lehmann, Anja and Schröder, Dominique (2010):
Unlinkability of Sanitizable Signatures.
In: Public-Key Cryptography (PKC), Springer-Verlag, In: Lecture Notes in Computer Science, 6056, [Conference or Workshop Item]

Fischlin, Marc and Lehmann, Anja (2010):
Hash Function Combiners in SSL and TLS.
In: CT-RSA, Springer-Verlag, In: Lecture Notes in Computer Science, [Conference or Workshop Item]

Fischlin, Marc and Lehmann, Anja (2010):
Delayed-Key Message Authentication for Streams.
In: Theory of Cryptography Conference (TCC), Springer-Verlag, In: Lecture Notes in Computer Science, [Conference or Workshop Item]

Boldyreva, Alexandra and Cash, David and Fischlin, Marc and Warinschi, Bogdan (2009):
Foundations of Non-Malleable Hash and One-Way Functions.
In: Asiacrypt 2009, Springer, In: Lecture Notes in Computer Science, 5912, [Conference or Workshop Item]

Brzuska, Christina and Fischlin, Marc and Lehmann, Anja and Schröder, Dominique (2009):
Sanitizable Signatures: How to Partially Delegate Control for Authenticated Data.
In: Biometrics and Electronic Signatures - Research and Applications (BIOSIG) 2009, Gesellschaft fuer Informatik (GI), In: Lecture Notes in Informatics, [Conference or Workshop Item]

Bender, Jens and Fischlin, Marc and Kügler, Dennis (2009):
Security Analysis of the PACE Key-Agreement Protocol.
In: Information Security Conference (ISC) 2009, Springer, In: Lecture Notes in Computer Science, 5735, [Conference or Workshop Item]

Lucks, Stefan and Schuler, Andreas and Tews, Erik and Weinmann, Ralf-Philipp and Wenzel, Matthias
Fischlin, Marc (ed.) (2009):
Attacks on the DECT authentication mechanisms.
In: CT-RSA 2009, Springer, San Francisco, CA, USA, In: LNCS, ISBN 978-3-642-00861-0,
[Conference or Workshop Item]

Fischlin, Marc (2009):
RSA Cryptographers' Track. Lecture Notes in Computer Science.
Springer, 5473, [Book]

Fischlin, Marc and Schröder, Dominique (2009):
Security of Blind Signatures under Aborts.
In: Public Key Cryptography (PKC 2009), [Conference or Workshop Item]

Brzuska, Christina and Fischlin, Marc and Freudenreich, Tobias and Lehmann, Anja and Page, Marcus and Schelbert, Jakob and Schröder, Dominique and Volk, Florian (2009):
Security of Sanitizable Signatures Revisited.
In: Public Key Cryptography (PKC 2009), [Conference or Workshop Item]

This list was generated on Tue Jun 18 01:30:23 2019 CEST.