TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 14.

Degabriele, Jean Paul and Fehr, Victoria and Fischlin, Marc and Gagliardoni, Tommaso and Günther, Felix and Marson, Giorgia Azzurra and Mittelbach, Arno and Paterson, Kenneth G. (2016):
Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol.
In: International Journal of Information Security, Springer, pp. 637-657, 15, (6), ISSN 1615-5270,
[Article]

Brzuska, Christina and Farshim, Pooya and Mittelbach, Arno
Dodis, Yevgeniy and Nielsen, Arno Buus (eds.) (2015):
Random-Oracle Uninstantiability from Indistinguishability Obfuscation.
In: Theory of Cryptography. TCC 2015., Springer, Warsaw, Poland, In: Lecture Notes in Computer Science 9015, ISBN 978-3-662-46497-7,
DOI: 10.1007/978-3-662-46497-7_17,
[Conference or Workshop Item]

Brzuska, Christina and Mittelbach, Arno
Sarkar, Palash and Iwata, Tetsu (eds.) (2014):
Indistinguishability Obfuscation versus Multi-Bit Point Obfuscation with Auxiliary Input.
In: Advances in Cryptology – ASIACRYPT 2014. 20th International Conference on the Theory and Application of Cryptology and Information Security. Proceedings., Berlin, Heidelberg, Springer, pp. 142-161, DOI: 10.1007/978-3-662-45608-8_8,
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-662-45608-8_...],
[Book Section]

Brzuska, Christina and Farshim, Pooya and Mittelbach, Arno
Garay, Arno A. and Gennaro, Rosario (eds.) (2014):
Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources.
In: Advances in Cryptology – CRYPTO 2014. 34th Annual Cryptology Conference. Santa Barbara, CA, USA. August 17-21, 2014. Proceedings., Springer, Santa Barbara, CA, USA, In: Lecture Notes in Computer Science 8616, 1, ISBN 978-3-662-44370-5,
DOI: 10.1007/978-3-662-44371-2_11,
[Conference or Workshop Item]

Mittelbach, Arno
Oswald, Elisabeth and Nguyen, Arno Q. (eds.) (2014):
Salvaging Indifferentiability in a Multi-stage Setting.
In: Advances in Cryptology – EUROCRYPT 2014. 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings., Springer, Copenhagen, Denmark, In: LNCS 8441, ISBN 978-3-642-55219-9,
DOI: 10.1007/978-3-642-55220-5_33,
[Conference or Workshop Item]

Brzuska, Christina and Mittelbach, Arno (2014):
Using Indistinguishability Obfuscation via UCEs.
In: Advances in Cryptology – ASIACRYPT 2014. 20th International Conference on the Theory and Application of Cryptology and Information Security., Berlin, Heidelberg, Springer, pp. 22-141, DOI: 10.1007/978-3-662-45608-8,
[Book Section]

Degabriele, Jean Paul and Fehr, Victoria and Fischlin, Marc and Gagliardoni, Tommaso and Günther, Felix and Marson, Giorgia Azzurra and Mittelbach, Arno and Paterson, Kenneth G.
Chen, Liqun and Mitchell, Chris (eds.) (2014):
Unpicking PLAID: A Cryptographic Analysis of an ISO-standards-track Authentication Protocol.
In: Security Standardisation Research : Proceedings of the 1st International Conference on Research in Security Standardisation (SSR), Cham, Springer, pp. 1-25, [Book Section]

Dagdelen, Ö. and Fischlin, M. and Gagliardoni, Tommaso and Marson, Giorgia Azzurra and Mittelbach, Arno and Onete, Cristina (2013):
A Cryptographic Analysis of OPACITY.
In: ESORICS 2013.IACR Cryptology ePrint Archive, [Article]

Dagdelen, Özgür and Fischlin, Marc and Gagliardoni, Tommaso and Marson, Giorgia Azzurra and Mittelbach, Arno and Onete, Cristina (2013):
A Cryptographic Analysis of OPACITY.
In: ESORICS 2013, Springer, In: LNCS, [Conference or Workshop Item]

Mittelbach, Arno (2013):
Cryptophia’s Short Combiner for Collision-Resistant Hash Functions (best student paper).
In: Applied Cryptography and Network Security, Springer, In: Lecture Notes in Computer Science, [Conference or Workshop Item]

Baecher, Paul and Brzuska, Christina and Mittelbach, Arno (2013):
Reset Indifferentiability and its Consequences.
In: Advances in Cryptology - ASIACRYPT 2013, Springer, In: Lecture Notes in Computer Science, [Conference or Workshop Item]

Mittelbach, Arno (2012):
Hash Combiners for Second Pre-image Resistance, Target Collision Resistance and Pre-image Resistance Have Long Output.
In: Security and Cryptography for Networks, Springer, In: Lecture Notes in Computer Science, [Conference or Workshop Item]

Lehmann, Lasse and Mittelbach, Arno and Rensing, Christoph and Steinmetz, Ralf (2010):
Automatic Detection and Visualisation of Overlap for Tracking of Information Flow.
In: Proceedings of I-KNOW 2010, 10th International Conference on Knowledge Management and Knowledge Technologies, Verlag der Technischen Universität Graz, pp. 186-198, [Book Section]

Mittelbach, Arno and Lehmann, Lasse and Rensing, Christoph and Steinmetz, Ralf (2010):
Automatic Detection of Local Reuse.
In: Proceedings 5th European Conference on Technology Enhanced Learning (EC-TEL), Springer Verlag, pp. 229-244, [Book Section]

This list was generated on Tue Oct 15 01:05:55 2019 CEST.