TU Darmstadt / ULB / TUbiblio

Browsen nach Person

Ebene hoch
Gruppiere nach: Keine Gruppierung | Typ des Eintrags | Datum | Sprache
Anzahl der Einträge: 69.

Degabriele, Jean Paul ; Fischlin, Marc :
Simulatable Channels: Extended Security that is Universally Composable and Easier to Prove.
[Online-Edition: https://asiacrypt.iacr.org/2018/index.html]
In: Asiacrypt 2018 - the 24th Annual International Conference on the Theory and Application of Cryptology and Information Security, December 02-06, 2018, Brisbane, Australia. In: LNCS . Springer
[Konferenz- oder Workshop-Beitrag] , (2018) (Im Druck)

Fischlin, Marc ; Mazaheri, Sogol :
Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks.
In: 2018 IEEE 31st Computer Security Foundations Symposium (CSF), 9.-12.7. 2018, Oxford, UK. 2018 IEEE 31st Computer Security Foundations Symposium (CSF) IEEE
[Konferenz- oder Workshop-Beitrag] , (2018)

Fischlin, Marc ; Harasser, Patrick :
Invisible Sanitizable Signatures and Public-Key Encryption are Equivalent.
[Online-Edition: https://www.springer.com/us/book/9783319933863]
In: 16th International Conference, ACNS 2018, 2.7.-4.7. 2018, Leuven, Belgium. In: Springer International Publishing , LNCS 10892 .
[Konferenz- oder Workshop-Beitrag] , (2018)

Brendel, Jacqueline ; Fischlin, Marc :
Zero Round-Trip Time for the Extended Access Control Protocol.
In: Security and Cryptology , 22 (10492). Springer International Publishing
[Konferenz- oder Workshop-Beitrag] , (2017)

Brendel, Jacqueline ; Fischlin, Marc :
Zero Round-Trip Time for the Extended Access Control Protocol.
ESORICS 2017 - 22nd European Symposium on Research in Computer Security
[Konferenz- oder Workshop-Beitrag] , (2017)

Brendel, Jacqueline ; Fischlin, Marc ; Günther, Felix ; Janson, Christian :
PRF-ODH: Relations, Instantiations, and Impossibility Results.
CRYPTO 2017 - 37th International Cryptology Conference Springer
[Konferenz- oder Workshop-Beitrag] , (2017)

Erwig, Andreas ; Fischlin, Marc ; Hald, Martin ; Helm, Dominik ; Kiel, Robert ; Kübler, Florian ; Kümmerlin, Michael ; Laenge, Jakob ; Rohrbach, Felix :
Redactable Graph Hashing, Revisited.
ACISP 2017
[Konferenz- oder Workshop-Beitrag] , (2017)

Fischlin, Marc ; Günther, Felix :
Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates.
2nd IEEE European Symposium on Security and Privacy (EuroS&P 2017) IEEE
[Konferenz- oder Workshop-Beitrag] , (2017)

Brendel, Jacqueline ; Fischlin, Marc ; Günther, Felix ; Janson, Christian
Katz, Jonathan ; Shacham, Hovav (eds.) :

PRF-ODH: Relations, Instantiations, and Impossibility Results.
In: Advances in Cryptology — CRYPTO 2017, Cham. Springer International Publishing , Cham
[Konferenz- oder Workshop-Beitrag] , (2017)

Brendel, Jacqueline ; Fischlin, Marc
Foley, Simon N. ; Gollmann, Dieter ; Snekkenes, Einar (eds.) :

Zero Round-Trip Time for the Extended Access Control Protocol.
In: Computer Security — ESORICS 2017, Cham. Springer International Publishing , Cham
[Konferenz- oder Workshop-Beitrag] , (2017)

Fischlin, Marc ; Herzberg, Amir ; Noon, Hon Bin ; Shulman, Haya :
Obfuscation Combiners.
International Cryptology Conference (CRYPTO)
[Konferenz- oder Workshop-Beitrag] , (2016)

Fischlin, Marc ; Günther, Felix ; Schmidt, Benedikt ; Warinschi, Bogdan :
Key Confirmation in Key Exchange: A Formal Treatment and Implications for TLS 1.3.
37th IEEE Symposium on Security and Privacy (S&P 2016) IEEE
[Konferenz- oder Workshop-Beitrag] , (2016)

Bernhard, David ; Fischlin, Marc ; Warinschi, Bogdan :
On the Hardness of Proving CCA-Security of Signed ElGamal.
In: LNCS (9614). Springer
[Konferenz- oder Workshop-Beitrag] , (2016)

Dowling, Benjamin ; Fischlin, Marc ; Günther, Felix ; Stebila, Douglas :
A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol.

[Anderes] , (2016)

Degabriele, Jean Paul ; Fehr, Victoria ; Fischlin, Marc ; Gagliardoni, Tommaso ; Günther, Felix ; Marson, Giorgia Azzurra ; Mittelbach, Arno ; Paterson, Kenneth G. :
Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol.
In: International Journal of Information Security (IJIS)
[Artikel] , (2016)

Dowling, Benjamin ; Fischlin, Marc ; Günther, Felix ; Stebila, Douglas :
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates.
22nd ACM Conference on Computer and Communications Security (CCS 2015) ACM
[Konferenz- oder Workshop-Beitrag] , (2015)

Fischlin, Marc ; Mazaheri, Sogol :
Notions of Deniable Message Authentication.
In: WPES '15 . ACM
[Konferenz- oder Workshop-Beitrag] , (2015)

Fischlin, Marc ; Günther, Felix ; Marson, Giorgia Azzurra ; Paterson, Kenneth G. :
Data Is a Stream: Security of Stream-Based Channels.
Advances in Cryptology - CRYPTO 2015 Springer
[Konferenz- oder Workshop-Beitrag] , (2015)

Egert, Rolf ; Fischlin, Marc ; Gens, David ; Jacob, Sven ; Senker, Matthias ; Tillmans, Jörg :
Privately computing set-union and set-intersection cardinality via bloom filters.
In: Information Security and Privacy (ACISP) pp. 413-430.
[Artikel] , (2015)

Fehr, Victoria ; Fischlin, Marc :
Sanitizable Signcryption: Sanitization over Encrypted Data (Full Version).
In: IACR Cryptology ePrint Archive, 2015 p. 765.
[Artikel] , (2015)

Fischlin, Marc ; Günther, Felix :
Multi-Stage Key Exchange and the Case of Google's QUIC Protocol.
CCS '14 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security ACM
[Konferenz- oder Workshop-Beitrag] , (2014)

Dagdelen, Özgür ; Fischlin, Marc :
Intercepting Tokens in Cryptographic Protocols: The Empire Strikes Back in the Clone Wars.
ISIT 2014 - IEEE International Symposium on Information Theory
[Konferenz- oder Workshop-Beitrag] , (2014)

Brzuska, Christina ; Fischlin, Marc ; Smart, Nigel ; Warinschi, Bogdan ; Williams, Stephen :
Less is more: relaxed yet composable security notions for key exchange.
In: Int. J. Inf. Sec., 12 (4) pp. 267-297.
[Artikel] , (2014)

Fischlin, Marc ; Lehmann, Anja ; Pietrzak, Krzysztof :
Robust Multi-Property Combiners for Hash Functions.
J. Cryptology
[Konferenz- oder Workshop-Beitrag] , (2014)

Degabriele, Jean Paul ; Fehr, Victoria ; Fischlin, Marc ; Gagliardoni, Tommaso ; Günther, Felix ; Marson, Giorgia Azzurra ; Mittelbach, Arno ; Paterson, Kenneth G.
Chen, Liqun ; Mitchell, Chris (eds.) :

Unpicking PLAID: A Cryptographic Analysis of an ISO-standards-track Authentication Protocol.
In: LNCS (8893). Springer
[Konferenz- oder Workshop-Beitrag] , (2014)

Dagdelen, Özgür ; Fischlin, Marc ; Gagliardoni, Tommaso :
The Fiat-Shamir Transformation in a Quantum World.
In: LNCS . Springer
[Konferenz- oder Workshop-Beitrag] , (2013)

Volkamer, Melanie ; Renaud, Karen
Fischlin, Marc ; Katzenbeisser, Stefan (eds.) :

Mental Models – General Introduction and Review of Their Application to Human-Centred Security.
In: Number Theory and Cryptography. Lecture Notes in Computer Science, 8260. Springer Berlin Heidelberg Berlin-Heidelberg , pp. 255-280. ISBN 978-3-642-42000-9
[Buchkapitel] , (2013)

Brzuska, Christina ; Fischlin, Marc ; Smart, Nigel ; Warinschi, Bogdan ; Williams, Stephen :
Less is more: relaxed yet composable security notions for key exchange.
In: Int. J. Inf. Sec, 12 (4) pp. 267-297.
[Artikel] , (2013)

Deiseroth, B. ; Fehr, Victoria ; Fischlin, Marc ; Maasz, M. ; Reimers, Nils ; Stein, R. :
Computing on Authenticated Data for Adjustable Predicates.
In: Lecture Notes in Computer Science, 7954 pp. 53-68.
[Artikel] , (2013)

Fischlin, Marc ; Fleischhacker, Nils :
Limitations of the Meta-Reduction Technique: The Case of Schnorr Signatures.
In: Lecture Notes in Computer Science, Volume 7881 pp. 444-460.
[Artikel] , (2013)

Fischlin, Marc ; Onete, Cristina :
Subtle Kinks in Distance-Bounding: an Analysis of Prominent Protocols.
In: Security and Privacy in Wireless and Mobile Networks pp. 195-206.
[Artikel] , (2013)

Dagdelen, Özgür ; Fischlin, Marc ; Gagliardoni, Tommaso ; Marson, Giorgia Azzurra ; Mittelbach, Arno ; Onete, Cristina :
A Cryptographic Analysis of OPACITY.
In: LNCS . Springer
[Konferenz- oder Workshop-Beitrag] , (2013)

Dagdelen, Özgür ; Fischlin, Marc ; Gagliardoni, Tommaso :
The Fiat-Shamir Transformation in the Quantum World.
ASIACRYPT 2013
[Konferenz- oder Workshop-Beitrag] , (2013)

Baecher, Paul ; Farshim, Pooya ; Fischlin, Marc ; Stam, Martijn :
Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions.
In: Lecture Notes in Computer Science, 7881 pp. 426-443.
[Artikel] , (2013)

Baecher, Paul ; Brzuska, Christina ; Fischlin, Marc :
Notions of Black-Box Reductions.
In: Lecture Notes in Computer Science, 8269 pp. 269-315.
[Artikel] , (2013)

Fischlin, Marc ; Katzenbeisser, Stefan:
Number Theory and Cryptography.
Springer
[Buch] , (2013)

Fischlin, Marc ; Onete, Cristina :
Terrorism in Distance Bounding: Modeling Terrorist-Fraud Resistance.
In: LNCS . Springer
[Konferenz- oder Workshop-Beitrag] , (2013)

Fischlin, Marc ; Buchmann, Johannes ; Manulis, Mark (eds.) :
Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography.
Fischlin, Marc ; Buchmann, Johannes ; Manulis, Mark (eds.), Springer
[Konferenz- oder Workshop-Beitrag] , (2012)

Bender, Jens ; Dagdelen, Özgür ; Fischlin, Marc ; Kügler, Dennis :
The PACE|AA Protocol for Machine Readable Travel Documents, and Its Security.
In: Lecture Notes in Computer Science . Springer-Verlag
[Konferenz- oder Workshop-Beitrag] , (2012)

Brzuska, Christina ; Dagdelen, Özgür ; Fischlin, Marc :
TLS, PACE, and EAC: A Cryptographic View at Modern Key Exchange Protocols.
In: Sicherheit 2012 , P-195 . Gesellschaft für Informatik
[Konferenz- oder Workshop-Beitrag] , (2012)

Fischlin, Marc ; Libert, B. ; Manulis, Mark :
Non-Interactive and Re-Usable Universally Composable String Commitments with Adaptive Security.
ASIACRYPT 2011
[Konferenz- oder Workshop-Beitrag] , (2011)

Boneh, Dan ; Dagdelen, Özgür ; Fischlin, Marc ; Lehmann, Anja ; Schaffner, Christian ; Zhandry, Mark :
Random Oracles in a Quantum World.
17th International Conference on Theory and Application of Cryptology and Information Security
[Konferenz- oder Workshop-Beitrag] , (2011)

Fischlin, Marc ; Pinkas, Benny ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Visconti, Ivan :
Secure Set Intersection with Untrusted Hardware Tokens.
11th Cryptographers' Track at the RSA Conference (CT-RSA'11) Springer
[Konferenz- oder Workshop-Beitrag] , (2011)

Baecher, Paul ; Büscher, Niklas ; Fischlin, Marc ; Milde, Benjamin :
Breaking reCAPTCHA: A Holistic Approach via Shape Recognition.
[Online-Edition: https://doi.org/10.1007/978-3-642-21424-0\_5]
In: Future Challenges in Security and Privacy for Academia and Industry - 26th IFIP TC 11 International Information Security Conference, SEC 2011, June 7-9, 2011, Lucerne, Switzerland.
[Konferenz- oder Workshop-Beitrag] , (2011)

Fischlin, Marc ; Fischlin, Roger :
Efficient Non-Malleable Commitment Schemes.
[Online-Edition: http://www.minicrypt.de]
Springer , pp. 203-244.
[Zeitschriftenheft oder -band] , (2011)

Baecher, Paul ; Fischlin, Marc ; Schröder, Dominique
Kiayias, Aggelos (ed.) :

Expedient Non-malleability Notions for Hash Functions.
In: CT-RSA. In: Lecture Notes in Computer Science , 6558 . Springer
[Konferenz- oder Workshop-Beitrag] , (2011)

Ries, Sebastian ; Fischlin, Marc ; Martucci, Leonardo ; Mühlhäuser, Max :
Learning Whom to Trust in a Privacy-Friendly Way.
Proceedings of the 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-11)
[Konferenz- oder Workshop-Beitrag] , (2011)

Brzuska, Christina ; Fischlin, Marc ; Schröder, Heike ; Katzenbeisser, Stefan :
Physically Uncloneable Functions in the Universal Composition Framework.
Advances in Cryptography (CRYPTO 2011) Springer
[Konferenz- oder Workshop-Beitrag] , (2011)

Fischlin, Marc ; Onete, Cristina
Lopez, Javier ; Tsudik, Gene (eds.) :

Relaxed Security Notions for Signatures of Knowledge.
In: ACNS.
[Konferenz- oder Workshop-Beitrag] , (2011)

Fischlin, Marc ; Lehmann, Anja ; Ristenpart, Thomas ; Shrimpton, Thomas ; Stam, Martijn ; Tessaro, Stefano :
Random Oracles With(out) Programmability.
In: Lecture Notes in Computer Science . Springer
[Konferenz- oder Workshop-Beitrag] , (2010)

Baecher, Paul ; Fischlin, Marc ; Gordon, Lior ; Langenberg, Robert ; Lützow, Michael ; Schröder, Dominique :
CAPTCHAs: The Good, the Bad, and the Ugly.
In: Lecture Notes in Informatics . Gesellschaft fuer Informatik (GI)
[Konferenz- oder Workshop-Beitrag] , (2010)

Dagdelen, Özgür ; Fischlin, Marc :
Security Analysis of the Extended Access Control Protocol for Machine Readable Travel Documents.
In: Lecture Notes in Computer Science . Springer
[Konferenz- oder Workshop-Beitrag] , (2010)

Eikemeier, Oliver ; Fischlin, Marc ; Goetzmann, Jens-Fabian ; Lehmann, Anja ; Schroeder, Peter ; Schröder, Dominique ; Wagner, Daniel :
History-Free Aggregate Message Authentication Codes.
In: Lecture Notes in Computer Science . Springer
[Konferenz- oder Workshop-Beitrag] , (2010)

Galindo, David ; Libert, Benoit ; Fischlin, Marc ; Fuchsbauer, Georg ; Lehmann, Anja ; Manulis, Mark ; Schröder, Dominique :
Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions.
In: Lecture Notes in Computer Science , 6055 . Springer
[Konferenz- oder Workshop-Beitrag] , (2010)

Dent, Alexander ; Fischlin, Marc ; Manulis, Mark ; Schröder, Dominique ; Stam, Martijn :
Confidential Signatures and Deterministic Signcryption.
In: LNCS . Springer
[Konferenz- oder Workshop-Beitrag] , (2010)

Dent, Alexander ; Fischlin, Marc ; Manulis, Mark ; Schröder, Dominique ; Stam, Martijn :
Confidential Signatures and Deterministic Signcryption.
In: Lecture Notes in Computer Science , 6056 . Springer-Verlag
[Konferenz- oder Workshop-Beitrag] , (2010)

Fischlin, Marc ; Schröder, Dominique :
On the Impossibility of Three-Move Blind Signature Schemes.
In: Lecture Notes in Computer Science , 6110 . Springer-Verlag
[Konferenz- oder Workshop-Beitrag] , (2010)

Galindo, David ; Libert, Benoit ; Fischlin, Marc ; Fuchsbauer, Georg ; Lehmann, Anja ; Manulis, Mark ; Schröder, Dominique :
Public-Key Encryption with Non-interactive Opening: New Constructions and Stronger Definitions.
In: LNCS . Springer
[Konferenz- oder Workshop-Beitrag] , (2010)

Brzuska, Christina ; Busch, Heike ; Dagdelen, Özgür ; Fischlin, Marc ; Franz, Martin ; Katzenbeisser, Stefan ; Manulis, Mark ; Onete, Cristina ; Peter, Andreas ; Poettering, Bertram ; Schröder, Dominique :
Redactable Signatures for Tree-Structured Data: Definitions and Constructions.
In: Lecture Notes in Computer Science , 6055 . Springer
[Konferenz- oder Workshop-Beitrag] , (2010)

Brzuska, Christina ; Fischlin, Marc ; Lehmann, Anja ; Schröder, Dominique :
Unlinkability of Sanitizable Signatures.
In: Lecture Notes in Computer Science , 6056 . Springer-Verlag
[Konferenz- oder Workshop-Beitrag] , (2010)

Fischlin, Marc ; Lehmann, Anja :
Hash Function Combiners in SSL and TLS.
In: Lecture Notes in Computer Science . Springer-Verlag
[Konferenz- oder Workshop-Beitrag] , (2010)

Fischlin, Marc ; Lehmann, Anja :
Delayed-Key Message Authentication for Streams.
In: Lecture Notes in Computer Science . Springer-Verlag
[Konferenz- oder Workshop-Beitrag] , (2010)

Boldyreva, Alexandra ; Cash, David ; Fischlin, Marc ; Warinschi, Bogdan :
Foundations of Non-Malleable Hash and One-Way Functions.
In: Lecture Notes in Computer Science , 5912 . Springer
[Konferenz- oder Workshop-Beitrag] , (2009)

Brzuska, Christina ; Fischlin, Marc ; Lehmann, Anja ; Schröder, Dominique :
Sanitizable Signatures: How to Partially Delegate Control for Authenticated Data.
In: Lecture Notes in Informatics . Gesellschaft fuer Informatik (GI)
[Konferenz- oder Workshop-Beitrag] , (2009)

Bender, Jens ; Fischlin, Marc ; Kügler, Dennis :
Security Analysis of the PACE Key-Agreement Protocol.
In: Lecture Notes in Computer Science , 5735 . Springer
[Konferenz- oder Workshop-Beitrag] , (2009)

Lucks, Stefan ; Schuler, Andreas ; Tews, Erik ; Weinmann, Ralf-Philipp ; Wenzel, Matthias
Fischlin, Marc (ed.) :

Attacks on the DECT authentication mechanisms.
In: LNCS (5473). Springer
[Konferenz- oder Workshop-Beitrag] , (2009)

Fischlin, Marc:
RSA Cryptographers' Track. Lecture Notes in Computer Science.
Springer
[Buch] , (2009)

Fischlin, Marc ; Schröder, Dominique :
Security of Blind Signatures under Aborts.
Public Key Cryptography (PKC 2009)
[Konferenz- oder Workshop-Beitrag] , (2009)

Brzuska, Christina ; Fischlin, Marc ; Freudenreich, Tobias ; Lehmann, Anja ; Page, Marcus ; Schelbert, Jakob ; Schröder, Dominique ; Volk, Florian :
Security of Sanitizable Signatures Revisited.
Public Key Cryptography (PKC 2009)
[Konferenz- oder Workshop-Beitrag] , (2009)

Diese Liste wurde am Sat Dec 15 03:01:05 2018 CET generiert.