TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 25.

Faust, Sebastian and Hazay, Carmit and Venturi, Daniele (2018):
Outsourced pattern matching.
In: Int. J. Inf. Sec., pp. 327-346, 17, (3), DOI: 10.1007/s10207-017-0374-0,
[Online-Edition: https://doi.org/10.1007/s10207-017-0374-0],
[Article]

Damgard, Ivan and Faust, Sebastian and Mukherjee, Pratyay and Venturi, Daniele (2017):
Bounded Tamper Resilience: How to Go Beyond the Algebraic Barrier.
In: J. Cryptology, pp. 152-190, 30, (1), DOI: 10.1007/s00145-015-9218-0,
[Online-Edition: https://doi.org/10.1007/s00145-015-9218-0],
[Article]

Faust, Sebastian and Hostakova, Kristina and Mukherjee, Pratyay and Venturi, Daniele (2017):
Non-Malleable Codes for Space-Bounded Tampering.
In: Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part II, DOI: 10.1007/978-3-319-63715-0₄,
[Online-Edition: https://doi.org/10.1007/978-3-319-63715-0_4],
[Conference or Workshop Item]

Faust, Sebastian and Hostakova, Kristina and Mukherjee, Pratyay and Venturi, Daniele (2017):
Non-Malleable Codes for Space-Bounded Tampering.
In: IACR Cryptology ePrint Archive, p. 530, 2017, [Online-Edition: http://eprint.iacr.org/2017/530],
[Article]

Faust, Sebastian and Masny, Daniel and Venturi, Daniele (2016):
Chosen-Ciphertext Security from Subset Sum.
In: Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I, DOI: 10.1007/978-3-662-49384-7₂,
[Online-Edition: https://doi.org/10.1007/978-3-662-49384-7_2],
[Conference or Workshop Item]

Faust, Sebastian and Mukherjee, Pratyay and Venturi, Daniele and Wichs, Daniel (2016):
Efficient Non-Malleable Codes and Key Derivation for Poly-Size Tampering Circuits.
In: IEEE Trans. Information Theory, pp. 7179-7194, 62, (12), DOI: 10.1109/TIT.2016.2613919,
[Online-Edition: https://doi.org/10.1109/TIT.2016.2613919],
[Article]

Damgard, Ivan and Faust, Sebastian and Mukherjee, Pratyay and Venturi, Daniele (2015):
The Chaining Lemma and Its Application.
In: Information Theoretic Security - 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings, DOI: 10.1007/978-3-319-17470-9₁₁,
[Online-Edition: https://doi.org/10.1007/978-3-319-17470-9_11],
[Conference or Workshop Item]

Faust, Sebastian and Masny, Daniel and Venturi, Daniele (2015):
Chosen-Ciphertext Security from Subset Sum.
In: IACR Cryptology ePrint Archive, p. 1223, 2015, [Online-Edition: http://eprint.iacr.org/2015/1223],
[Article]

Faust, Sebastian and Mukherjee, Pratyay and Nielsen, Jesper Buus and Venturi, Daniele (2015):
A Tamper and Leakage Resilient von Neumann Architecture.
In: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, DOI: 10.1007/978-3-662-46447-2₂₆,
[Online-Edition: https://doi.org/10.1007/978-3-662-46447-2_26],
[Conference or Workshop Item]

Dagdelen, Özgür and Venturi, Daniele (2014):
A Multi-Party Protocol for Privacy-Preserving Cooperative Linear System of Equations.
In: BalkancryptSec 2014 - International Conference on Cryptography and Information security, Springer, Istanbul, Turkey, In: LNCS, ISBN 978-3-319-21356-9,
DOI: 10.1007/978-3-319-21356-9_11,
[Conference or Workshop Item]

Damgard, Ivan and Faust, Sebastian and Mukherjee, Pratyay and Venturi, Daniele (2014):
The Chaining Lemma and its application.
In: IACR Cryptology ePrint Archive, p. 979, 2014, [Online-Edition: http://eprint.iacr.org/2014/979],
[Article]

Faust, Sebastian and Mukherjee, Pratyay and Nielsen, Jesper Buus and Venturi, Daniele (2014):
Continuous Non-malleable Codes.
In: IACR Cryptology ePrint Archive, p. 173, 2014, [Online-Edition: http://eprint.iacr.org/2014/173],
[Article]

Faust, Sebastian and Mukherjee, Pratyay and Nielsen, Jesper Buus and Venturi, Daniele (2014):
Continuous Non-malleable Codes.
In: Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings, DOI: 10.1007/978-3-642-54242-8₂₀,
[Online-Edition: https://doi.org/10.1007/978-3-642-54242-8_20],
[Conference or Workshop Item]

Faust, Sebastian and Mukherjee, Pratyay and Venturi, Daniele and Wichs, Daniel (2014):
Efficient Non-malleable Codes and Key-Derivation for Poly-size Tampering Circuits.
In: Advances in Cryptology - EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings, DOI: 10.1007/978-3-642-55220-5₇,
[Online-Edition: https://doi.org/10.1007/978-3-642-55220-5_7],
[Conference or Workshop Item]

Faust, Sebastian and Hazay, Carmit and Venturi, Daniele (2014):
Outsourced Pattern Matching.
In: IACR Cryptology ePrint Archive, p. 662, 2014, [Online-Edition: http://eprint.iacr.org/2014/662],
[Article]

Dagdelen, Özgür and Venturi, Daniele (2014):
A Second Look at Fischlin’s Transformation.
In: Africacrypt 2014, Marrakech, Morocco, [Conference or Workshop Item]

Faust, Sebastian and Mukherjee, Pratyay and Nielsen, Jesper Buus and Venturi, Daniele (2014):
A Tamper and Leakage Resilient Random Access Machine.
In: IACR Cryptology ePrint Archive, p. 338, 2014, [Online-Edition: http://eprint.iacr.org/2014/338],
[Article]

Damgard, Ivan and Faust, Sebastian and Mukherjee, Pratyay and Venturi, Daniele (2013):
Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier.
In: Advances in Cryptology - ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II, DOI: 10.1007/978-3-642-42045-0₈,
[Online-Edition: https://doi.org/10.1007/978-3-642-42045-0_8],
[Conference or Workshop Item]

Damgard, Ivan and Faust, Sebastian and Mukherjee, Pratyay and Venturi, Daniele (2013):
Bounded Tamper Resilience: How to go beyond the Algebraic Barrier.
In: IACR Cryptology ePrint Archive, p. 677, 2013, [Online-Edition: http://eprint.iacr.org/2013/677],
[Article]

Faust, Sebastian and Mukherjee, Pratyay and Venturi, Daniele and Wichs, Daniel (2013):
Efficient Non-Malleable Codes and Key-Derivation for Poly-Size Tampering Circuits.
In: IACR Cryptology ePrint Archive, p. 702, 2013, [Online-Edition: http://eprint.iacr.org/2013/702],
[Article]

Faust, Sebastian and Hazay, Carmit and Venturi, Daniele (2013):
Outsourced Pattern Matching.
In: Automata, Languages, and Programming - 40th International Colloquium, ICALP 2013, Riga, Latvia, July 8-12, 2013, Proceedings, Part II, DOI: 10.1007/978-3-642-39212-2₄₈,
[Online-Edition: https://doi.org/10.1007/978-3-642-39212-2_48],
[Conference or Workshop Item]

Faust, Sebastian and Kohlweiss, Markulf and Marson, Giorgia Azzurra and Venturi, Daniele (2012):
On the Non-malleability of the Fiat-Shamir Transform.
In: IACR Cryptology ePrint Archive, p. 704, 2012, [Online-Edition: http://eprint.iacr.org/2012/704],
[Article]

Faust, Sebastian and Kohlweiss, Markulf and Marson, Giorgia Azzurra and Venturi, Daniele (2012):
On the Non-malleability of the Fiat-Shamir Transform.
In: Progress in Cryptology - INDOCRYPT 2012, 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings, DOI: 10.1007/978-3-642-34931-7₅,
[Online-Edition: https://doi.org/10.1007/978-3-642-34931-7_5],
[Conference or Workshop Item]

Faust, Sebastian and Pietrzak, Krzysztof and Venturi, Daniele (2011):
Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience.
In: Automata, Languages and Programming - 38th International Colloquium, ICALP 2011, Zurich, Switzerland, July 4-8, 2011, Proceedings, Part I, DOI: 10.1007/978-3-642-22006-7₃₃,
[Online-Edition: https://doi.org/10.1007/978-3-642-22006-7_33],
[Conference or Workshop Item]

Faust, Sebastian and Pietrzak, Krzysztof and Venturi, Daniele (2011):
Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience.
In: IACR Cryptology ePrint Archive, p. 314, 2011, [Online-Edition: http://eprint.iacr.org/2011/314],
[Article]

This list was generated on Tue Jun 25 01:57:07 2019 CEST.