TU Darmstadt / ULB / TUbiblio

Items in division

Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Date | Item Type | Language | No Grouping
Jump to: A | B | D | E | F | G | H | K | L | M | P | V
Number of items at this level (without sub-levels): 101.

A

Aumayr, Lukas ; Ersoy, Oguzhan ; Erwig, Andreas ; Faust, Sebastian ; Maffei, Matteo ; Moreno-Sanchez, Pedro (2021):
Bitcoin-Compatible Virtual Channels.
42nd IEEE Symposium on Security and Privacy, virtual Conference, 23.-27.05.2021, [Conference or Workshop Item]

Agrawal, Shweta ; Libert, Benoit ; Maitra, Monosij ; Titiu, Radu (2020):
Adaptive simulation security for inner product functional encryption.
In: Public-Key Cryptography - PKC 2020, pp. 34-64,
Springer, 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography(PKC 2020), virtual Conference, 01.-04.06.2020, ISBN 978-3-030-45373-2,
DOI: 10.1007/978-3-030-45374-9_2,
[Conference or Workshop Item]

Alkeilani Alkadri, Nabil ; Das, Poulami ; Erwig, Andreas ; Faust, Sebastian ; Krämer, Juliane ; Riahi, Siavash ; Struck, Patrick (2020):
Deterministic Wallets in a Quantum World.
ACM, The 27th ACM Conference on Computer and Communications Security (CCS 2020), virtual Conference, 09.-13.11., [Conference or Workshop Item]

Agrawal, Shweta ; Maitra, Monosij ; Yamada, Shota (2019):
Attribute Based Encryption for Deterministic Finite Automata from DLIN.
In: Theory of Cryptography, pp. 91-117,
Springer, 17th International Confernce on Theory of Cryptography Conference (TCC 2019), Nuremberg, Germany, 01.-05.12.2019, ISBN 978-3-030-36032-0,
DOI: 10.1007/978-3-030-36033-7_4,
[Conference or Workshop Item]

Agrawal, Shweta ; Maitra, Monosij ; Yamada, Shota (2019):
Attribute based encryption (and more) for nondeterministic finite automata from LWE.
In: Advances in Cryptology - CRYPTO 2019, pp. 765-797,
Springer, 39th Annual International Cryptology Conference (CRYPTO 2019), Santa Barbara, USA, 18.-22.08.2019, ISBN 978-3-030-26950-0,
DOI: 10.1007/978-3-030-26951-7_26,
[Conference or Workshop Item]

Amler, Hendrik (2018):
Evaluation of payment channel networks for micropayments.
TU Darmstadt, [Master Thesis]

Agrawal, Shweta ; Maitra, Monosij (2018):
FE and iO for turing machines from minimal assumptions.
In: Theory of Cryptography, pp. 473-512,
Springer, 16th International Confernce on Theory of Cryptography Conference (TCC 2018), Panaji, India, 11.-14.11.2018, ISBN 978-3-030-03806-9,
DOI: 10.1007/978-3-030-03810-6_18,
[Conference or Workshop Item]

Andrychowicz, Marcin ; Dziembowski, Stefan ; Faust, Sebastian (2016):
Circuit Compilers with O(1/ log(n)) Leakage Rate.
In: IACR Cryptology ePrint Archive, 2016, p. 173. [Article]

Andrychowicz, Marcin ; Dziembowski, Stefan ; Faust, Sebastian (2016):
Circuit Compilers with O(1/log (n)) Leakage Rate.
pp. 586-615, Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II, DOI: 10.1007/978-3-662-49896-5₂₁,
[Conference or Workshop Item]

Andrychowicz, Marcin ; Damgard, Ivan ; Dziembowski, Stefan ; Faust, Sebastian ; Polychroniadou, Antigoni (2015):
Efficient Leakage Resilient Circuit Compilers.
pp. 311-329, Topics in Cryptology - CT-RSA 2015, The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings, DOI: 10.1007/978-3-319-16715-2₁₇,
[Conference or Workshop Item]

B

Berti, Francesco (2020):
Authentication in the presence of side-channel leakage.
Louvain-la-Neuve, Université Catholique de Louvain,
[Ph.D. Thesis]

Buchmann, Johannes ; Geihs, Matthias ; Hamacher, Kay ; Katzenbeisser, Stefan ; Stammler, Sebastian (2019):
Long-term integrity protection of genomic data.
In: EURASIP Journal on Information Security, 2019 (1), Springer Open, ISSN 2510-523X,
DOI: 10.25534/tuprints-00011399,
[Article]

Balasch, Josep ; Faust, Sebastian ; Gierlichs, Benedikt ; Paglialonga, Clara ; Standaert, Francois-Xavier (2017):
Consolidating Inner Product Masking.
In: Cryptology ePrint Archive, 2017 (1047), pp. 1-30. [Article]

Brody, Joshua ; Dziembowski, Stefan ; Faust, Sebastian ; Pietrzak, Krzysztof (2017):
Position-Based Cryptography and Multiparty Communication Complexity.
pp. 56-81, Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I, DOI: 10.1007/978-3-319-70500-2₃,
[Conference or Workshop Item]

Barthe, Gilles ; Dupressoir, Francois ; Faust, Sebastian ; Gregoire, Benjamin ; Standaert, Francois-Xavier ; Strub, Pierre-Yves (2017):
Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model.
pp. 535-566, Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part I, DOI: 10.1007/978-3-319-56620-7₁₉,
[Conference or Workshop Item]

Balasch, Josep ; Faust, Sebastian ; Gierlichs, Benedikt ; Paglialonga, Clara ; Standaert, Francois-Xavier (2017):
Consolidating Inner Product Masking.
pp. 724-754, Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I, DOI: 10.1007/978-3-319-70694-8₂₅,
[Conference or Workshop Item]

Barthe, Gilles ; Dupressoir, Francois ; Faust, Sebastian ; Gregoire, Benjamin ; Standaert, Francois-Xavier ; Strub, Pierre-Yves (2016):
Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model.
In: IACR Cryptology ePrint Archive, 2016, p. 912. [Article]

Brody, Joshua ; Dziembowski, Stefan ; Faust, Sebastian ; Pietrzak, Krzysztof (2016):
Position-Based Cryptography and Multiparty Communication Complexity.
In: IACR Cryptology ePrint Archive, 2016, p. 536. [Article]

Balasch, Josep ; Faust, Sebastian ; Gierlichs, Benedikt (2015):
Inner Product Masking Revisited.
In: IACR Cryptology ePrint Archive, 2015, p. 105. [Article]

Balasch, Josep ; Faust, Sebastian ; Gierlichs, Benedikt (2015):
Inner Product Masking Revisited.
pp. 486-510, Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I, DOI: 10.1007/978-3-662-46800-5₁₉,
[Conference or Workshop Item]

Balasch, Josep ; Faust, Sebastian ; Gierlichs, Benedikt ; Verbauwhede, Ingrid (2012):
Theory and Practice of a Leakage Resilient Masking Scheme.
pp. 758-775, Advances in Cryptology - ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings, DOI: 10.1007/978-3-642-34961-4₄₅,
[Conference or Workshop Item]

D

Das, Poulami ; Faust, Sebastian ; Loss, Julian (2019):
A Formal Treatment of Deterministic Wallets.
ACM CCS 2019 - Symposium on Computer and Communications Security, London, UK, November, 11th -15th, [Conference or Workshop Item]

Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian ; Hesse, Julia ; Hostakova, Kristina (2019):
Multiparty Virtual State Channels.
In: Eurocrypt 2019,
Darmstadt, IACR, 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, [Conference or Workshop Item]

Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian ; Malinowski, Daniel (2019):
Perun: Virtual Payment Hubs over Cryptocurrencies.
pp. 327-340, IEEE Computer Society, 39th IEEE Symposium on Security and Privacy, THE HYATT REGENCY, SAN FRANCISCO, CA, MAY 21-23, 2018, [Conference or Workshop Item]

Dziembowski, Stefan ; Faust, Sebastian ; Zebrowski, Karol (2019):
Simple Refreshing in the Noisy Leakage Model.
IACR, The 25th Annual International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, 8.12.-12.12. 2019, [Conference or Workshop Item]

Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian (2018):
FairSwap: How to fairly exchange digital goods.
In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security,
ACM, 25th ACM Conference on Computer and Communications Security (CCS), Toronto, Canada, 15-19 October 2018, [Conference or Workshop Item]

Dziembowski, Stefan ; Faust, Sebastian ; Hostakova, Kristina (2018):
General State Channel Networks.
2018, In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security,
ACM, 25th ACM Conference on Computer and Communications Security (CCS), Toronto, Canada, 15-19 October 2018, [Conference or Workshop Item]

du Crest de Villeneuve, Come (2018):
Evaluation of the Efficiency of different Architectures and Pathfinding Algorithms.
TU Darmstadt, [Master Thesis]

Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian ; Malinowski, Daniel (2017):
PERUN: Virtual Payment Channels over Cryptographic Currencies.
In: IACR Cryptology ePrint Archive, 2017, p. 635. [Article]

Damgard, Ivan ; Faust, Sebastian ; Mukherjee, Pratyay ; Venturi, Daniele (2017):
Bounded Tamper Resilience: How to Go Beyond the Algebraic Barrier.
In: J. Cryptology, 30 (1), pp. 152-190. DOI: 10.1007/s00145-015-9218-0,
[Article]

Dziembowski, Stefan ; Faust, Sebastian ; Standaert, Francois-Xavier (2016):
Private Circuits III: Hardware Trojan-Resilience via Testing Amplification.
In: IACR Cryptology ePrint Archive, 2016, p. 1004. [Article]

Dziembowski, Stefan ; Faust, Sebastian ; Herold, Gottfried ; Journault, Anthony ; Masny, Daniel ; Standaert, Francois-Xavier (2016):
Towards Sound Fresh Re-Keying with Hard (Physical) Learning Problems.
In: IACR Cryptology ePrint Archive, 2016, p. 573. [Article]

Dziembowski, Stefan ; Faust, Sebastian ; Skorski, Maciej (2016):
Optimal Amplification of Noisy Leakages.
pp. 291-318, Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part II, DOI: 10.1007/978-3-662-49099-0₁₁,
[Conference or Workshop Item]

Dziembowski, Stefan ; Faust, Sebastian ; Herold, Gottfried ; Journault, Anthony ; Masny, Daniel ; Standaert, Francois-Xavier (2016):
Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems.
pp. 272-301, Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part II, DOI: 10.1007/978-3-662-53008-5₁₀,
[Conference or Workshop Item]

Dziembowski, Stefan ; Faust, Sebastian ; Standaert, Francois-Xavier (2016):
Private Circuits III: Hardware Trojan-Resilience via Testing Amplification.
pp. 142-153, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016, DOI: 10.1145/2976749.2978419,
[Conference or Workshop Item]

Dziembowski, Stefan ; Faust, Sebastian ; Kolmogorov, Vladimir ; Pietrzak, Krzysztof (2015):
Proofs of Space.
pp. 585-605, Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II, DOI: 10.1007/978-3-662-48000-7₂₉,
[Conference or Workshop Item]

Duc, Alexandre ; Faust, Sebastian ; Standaert, Francois-Xavier (2015):
Making Masking Security Proofs Concrete Or How to Evaluate the Security of any Leaking Device.
In: IACR Cryptology ePrint Archive, 2015, p. 119. [Article]

Damgard, Ivan ; Faust, Sebastian ; Mukherjee, Pratyay ; Venturi, Daniele (2015):
The Chaining Lemma and Its Application.
pp. 181-196, Information Theoretic Security - 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings, DOI: 10.1007/978-3-319-17470-9₁₁,
[Conference or Workshop Item]

Duc, Alexandre ; Faust, Sebastian ; Standaert, Francois-Xavier (2015):
Making Masking Security Proofs Concrete - Or How to Evaluate the Security of Any Leaking Device.
pp. 401-429, Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I, DOI: 10.1007/978-3-662-46800-5₁₆,
[Conference or Workshop Item]

Dziembowski, Stefan ; Faust, Sebastian ; Skorski, Maciej (2015):
Noisy Leakage Revisited.
pp. 159-188, Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II, DOI: 10.1007/978-3-662-46803-6₆,
[Conference or Workshop Item]

Damgard, Ivan ; Faust, Sebastian ; Mukherjee, Pratyay ; Venturi, Daniele (2014):
The Chaining Lemma and its application.
In: IACR Cryptology ePrint Archive, 2014, p. 979. [Article]

Duc, Alexandre ; Dziembowski, Stefan ; Faust, Sebastian (2014):
Unifying Leakage Models: from Probing Attacks to Noisy Leakage.
In: IACR Cryptology ePrint Archive, 2014, p. 79. [Article]

Duc, Alexandre ; Dziembowski, Stefan ; Faust, Sebastian (2014):
Unifying Leakage Models: From Probing Attacks to Noisy Leakage.
pp. 423-440, Advances in Cryptology - EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings, DOI: 10.1007/978-3-642-55220-5₂₄,
[Conference or Workshop Item]

Dziembowski, Stefan ; Faust, Sebastian ; Kolmogorov, Vladimir ; Pietrzak, Krzysztof (2013):
Proofs of Space.
In: IACR Cryptology ePrint Archive, 2013, p. 796. [Article]

Damgard, Ivan ; Faust, Sebastian ; Mukherjee, Pratyay ; Venturi, Daniele (2013):
Bounded Tamper Resilience: How to go beyond the Algebraic Barrier.
In: IACR Cryptology ePrint Archive, 2013, p. 677. [Article]

Damgard, Ivan ; Faust, Sebastian ; Mukherjee, Pratyay ; Venturi, Daniele (2013):
Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier.
pp. 140-160, Advances in Cryptology - ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II, DOI: 10.1007/978-3-642-42045-0₈,
[Conference or Workshop Item]

Dziembowski, Stefan ; Faust, Sebastian (2012):
Leakage-Resilient Circuits without Computational Assumptions.
pp. 230-247, Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings, DOI: 10.1007/978-3-642-28914-9₁₃,
[Conference or Workshop Item]

Damgard, Ivan ; Faust, Sebastian ; Hazay, Carmit (2012):
Secure Two-Party Computation with Low Communication.
pp. 54-74, Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings, DOI: 10.1007/978-3-642-28914-9₄,
[Conference or Workshop Item]

Dziembowski, Stefan ; Faust, Sebastian (2011):
Leakage-Resilient Cryptography From the Inner-Product Extractor.
In: IACR Cryptology ePrint Archive, 2011, p. 519. [Article]

Damgard, Ivan ; Faust, Sebastian ; Hazay, Carmit (2011):
Secure Two-Party Computation with Low Communication.
In: IACR Cryptology ePrint Archive, 2011, p. 508. [Article]

Dziembowski, Stefan ; Faust, Sebastian (2011):
Leakage-Resilient Cryptography from the Inner-Product Extractor.
pp. 702-721, Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings, DOI: 10.1007/978-3-642-25385-0₃₈,
[Conference or Workshop Item]

Danezis, George ; Diaz, Claudia ; Faust, Sebastian ; Käsper, Emilia ; Troncoso, Carmela ; Preneel, Bart (2007):
Efficient Negative Databases from Cryptographic Hash Functions.
pp. 423-436, Information Security, 10th International Conference, ISC 2007, Valparaiso, Chile, October 9-12, 2007, Proceedings, DOI: 10.1007/978-3-540-75496-1₂₈,
[Conference or Workshop Item]

E

Erwig, Andreas ; Faust, Sebastian ; Hostáková, Kristina ; Maitra, Monosij ; Riahi, Siavash (2021):
Two-Party Adaptor Signatures From Identification Schemes.
In: Cryptology ePrint Archive, (Preprint), [Article]

Erwig, Andreas ; Faust, Sebastian ; Hostáková, Kristina ; Maitra, Monosij ; Riahi, Siavash (2021):
Two-Party Adaptor Signatures From Identification Schemes.
24th International Conference on Practice and Theory of Public-Key Cryptography, virtual Conference, 09.-13.05.2021, [Conference or Workshop Item]

Erwig, Andreas ; Hesse, Julia ; Orlt, Maximilian ; Riahi, Siavash (2020):
Fuzzy Asymmetric Password-Authenticated Key Exchange.
26th Annual International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt 2020), virtual Conference, 07.-11.12., [Conference or Workshop Item]

Eckey, Lisa ; Faust, Sebastian ; Schlosser, Benjamin (2020):
OptiSwap: Fast Optimistic Fair Exchange.
pp. 543-557, ACM, 15th ACM Asia Conference on Computer and Communications Security (ASIA CCS '20), virtual Conference, 05.-09.10., ISBN 978-1-4503-6750-9,
DOI: 10.1145/3320269.3384749,
[Conference or Workshop Item]

Eckey, Lisa (2020):
Blockchain Scalability through Secure Optimistic Protocols. (Publisher's Version)
Darmstadt, Technische Universität,
DOI: 10.25534/tuprints-00014041,
[Ph.D. Thesis]

Eckey, Lisa ; Faust, Sebastian ; Loss, Julian (2017):
Efficient Algorithms for Broadcast and Consensus Based on Proofs of Work.
In: IACR Cryptology ePrint Archive, 2017, p. 915. [Article]

F

Faust, Sebastian ; Hazay, Carmit ; Kretzler, David ; Schlosser, Benjamin (2021):
Generic Compiler for Publicly Verifiable Covert Multi-Party Computation.
40th Annual International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt 2021), Zagreb, Croatia, 17.-21.10.2021, [Conference or Workshop Item]

Faust, Sebastian ; Hazay, Carmit ; Venturi, Daniele (2018):
Outsourced pattern matching.
In: Int. J. Inf. Sec., 17 (3), pp. 327-346. DOI: 10.1007/s10207-017-0374-0,
[Article]

Faust, Sebastian ; Paglialonga, Clara ; Schneider, Tobias (2017):
Amortizing Randomness Complexity in Private Circuits.
In: IACR Cryptology ePrint Archive, 2017, p. 869. [Article]

Faust, Sebastian ; Grosso, Vincent ; Pozo, Santos Merino Del ; Paglialonga, Clara ; Standaert, Francois-Xavier (2017):
Composable Masking Schemes in the Presence of Physical Defaults and the Robust Probing Model.
In: IACR Cryptology ePrint Archive, 2017, p. 711. [Article]

Faust, Sebastian ; Hostakova, Kristina ; Mukherjee, Pratyay ; Venturi, Daniele (2017):
Non-Malleable Codes for Space-Bounded Tampering.
In: IACR Cryptology ePrint Archive, 2017, p. 530. [Article]

Faust, Sebastian ; Hostakova, Kristina ; Mukherjee, Pratyay ; Venturi, Daniele (2017):
Non-Malleable Codes for Space-Bounded Tampering.
pp. 95-126, Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part II, DOI: 10.1007/978-3-319-63715-0₄,
[Conference or Workshop Item]

Faust, Sebastian ; Paglialonga, Clara ; Schneider, Tobias (2017):
Amortizing Randomness Complexity in Private Circuits.
pp. 781-810, Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I, DOI: 10.1007/978-3-319-70694-8₂₇,
[Conference or Workshop Item]

Faust, Sebastian ; Hazay, Carmit ; Nielsen, Jesper Buus ; Nordholt, Peter Sebastian ; Zottarel, Angela (2016):
Signature Schemes Secure Against Hard-to-Invert Leakage.
In: J. Cryptology, 29 (2), pp. 422-455. DOI: 10.1007/s00145-015-9197-1,
[Article]

Faust, Sebastian ; Masny, Daniel ; Venturi, Daniele (2016):
Chosen-Ciphertext Security from Subset Sum.
pp. 35-46, Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I, DOI: 10.1007/978-3-662-49384-7₂,
[Conference or Workshop Item]

Faust, Sebastian ; Mukherjee, Pratyay ; Venturi, Daniele ; Wichs, Daniel (2016):
Efficient Non-Malleable Codes and Key Derivation for Poly-Size Tampering Circuits.
In: IEEE Trans. Information Theory, 62 (12), pp. 7179-7194. DOI: 10.1109/TIT.2016.2613919,
[Article]

Faust, Sebastian ; Mukherjee, Pratyay ; Nielsen, Jesper Buus ; Venturi, Daniele (2015):
A Tamper and Leakage Resilient von Neumann Architecture.
pp. 579-603, Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, DOI: 10.1007/978-3-662-46447-2₂₆,
[Conference or Workshop Item]

Faust, Sebastian ; Masny, Daniel ; Venturi, Daniele (2015):
Chosen-Ciphertext Security from Subset Sum.
In: IACR Cryptology ePrint Archive, 2015, p. 1223. [Article]

Faust, Sebastian ; Mukherjee, Pratyay ; Nielsen, Jesper Buus ; Venturi, Daniele (2014):
Continuous Non-malleable Codes.
pp. 465-488, Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings, DOI: 10.1007/978-3-642-54242-8₂₀,
[Conference or Workshop Item]

Faust, Sebastian ; Mukherjee, Pratyay ; Venturi, Daniele ; Wichs, Daniel (2014):
Efficient Non-malleable Codes and Key-Derivation for Poly-size Tampering Circuits.
pp. 111-128, Advances in Cryptology - EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings, DOI: 10.1007/978-3-642-55220-5₇,
[Conference or Workshop Item]

Faust, Sebastian ; Rabin, Tal ; Reyzin, Leonid ; Tromer, Eran ; Vaikuntanathan, Vinod (2014):
Protecting Circuits from Computationally Bounded and Noisy Leakage.
In: SIAM J. Comput., 43 (5), pp. 1564-1614. DOI: 10.1137/120880343,
[Article]

Faust, Sebastian ; Hazay, Carmit ; Venturi, Daniele (2014):
Outsourced Pattern Matching.
In: IACR Cryptology ePrint Archive, 2014, p. 662. [Article]

Faust, Sebastian ; Mukherjee, Pratyay ; Nielsen, Jesper Buus ; Venturi, Daniele (2014):
A Tamper and Leakage Resilient Random Access Machine.
In: IACR Cryptology ePrint Archive, 2014, p. 338. [Article]

Faust, Sebastian ; Mukherjee, Pratyay ; Nielsen, Jesper Buus ; Venturi, Daniele (2014):
Continuous Non-malleable Codes.
In: IACR Cryptology ePrint Archive, 2014, p. 173. [Article]

Faust, Sebastian ; Mukherjee, Pratyay ; Venturi, Daniele ; Wichs, Daniel (2013):
Efficient Non-Malleable Codes and Key-Derivation for Poly-Size Tampering Circuits.
In: IACR Cryptology ePrint Archive, 2013, p. 702. [Article]

Faust, Sebastian ; Hazay, Carmit ; Venturi, Daniele (2013):
Outsourced Pattern Matching.
pp. 545-556, Automata, Languages, and Programming - 40th International Colloquium, ICALP 2013, Riga, Latvia, July 8-12, 2013, Proceedings, Part II, DOI: 10.1007/978-3-642-39212-2₄₈,
[Conference or Workshop Item]

Faust, Sebastian ; Hazay, Carmit ; Nielsen, Jesper Buus ; Nordholt, Peter Sebastian ; Zottarel, Angela (2012):
Signature Schemes Secure against Hard-to-Invert Leakage.
pp. 98-115, Advances in Cryptology - ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings, DOI: 10.1007/978-3-642-34961-4₈,
[Conference or Workshop Item]

Faust, Sebastian ; Kohlweiss, Markulf ; Marson, Giorgia Azzurra ; Venturi, Daniele (2012):
On the Non-malleability of the Fiat-Shamir Transform.
In: IACR Cryptology ePrint Archive, 2012, p. 704. [Article]

Faust, Sebastian ; Hazay, Carmit ; Nielsen, Jesper Buus ; Nordholt, Peter Sebastian ; Zottarel, Angela (2012):
Signature Schemes Secure against Hard-to-Invert Leakage.
In: IACR Cryptology ePrint Archive, 2012, p. 45. [Article]

Faust, Sebastian ; Kohlweiss, Markulf ; Marson, Giorgia Azzurra ; Venturi, Daniele (2012):
On the Non-malleability of the Fiat-Shamir Transform.
pp. 60-79, Progress in Cryptology - INDOCRYPT 2012, 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings, DOI: 10.1007/978-3-642-34931-7₅,
[Conference or Workshop Item]

Faust, Sebastian ; Pietrzak, Krzysztof ; Schipper, Joachim (2012):
Practical Leakage-Resilient Symmetric Cryptography.
pp. 213-232, Cryptographic Hardware and Embedded Systems - CHES 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings, DOI: 10.1007/978-3-642-33027-8₁₃,
[Conference or Workshop Item]

Faust, Sebastian ; Pietrzak, Krzysztof ; Venturi, Daniele (2011):
Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience.
In: IACR Cryptology ePrint Archive, 2011, p. 314. [Article]

Faust, Sebastian ; Pietrzak, Krzysztof ; Venturi, Daniele (2011):
Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience.
pp. 391-402, Automata, Languages and Programming - 38th International Colloquium, ICALP 2011, Zurich, Switzerland, July 4-8, 2011, Proceedings, Part I, DOI: 10.1007/978-3-642-22006-7₃₃,
[Conference or Workshop Item]

Faust, Sebastian ; Rabin, Tal ; Reyzin, Leonid ; Tromer, Eran ; Vaikuntanathan, Vinod (2010):
Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases.
pp. 135-156, Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 - June 3, 2010. Proceedings, DOI: 10.1007/978-3-642-13190-5₇,
[Conference or Workshop Item]

Faust, Sebastian ; Kiltz, Eike ; Pietrzak, Krzysztof ; Rothblum, Guy N. (2010):
Leakage-Resilient Signatures.
pp. 343-360, Theory of Cryptography, 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings, DOI: 10.1007/978-3-642-11799-2₂₁,
[Conference or Workshop Item]

Faust, Sebastian ; Kiltz, Eike ; Pietrzak, Krzysztof ; Rothblum, Guy N. (2009):
Leakage-Resilient Signatures.
In: IACR Cryptology ePrint Archive, 2009, p. 282. [Article]

Faust, Sebastian ; Reyzin, Leonid ; Tromer, Eran (2009):
Protecting Circuits from Computationally-Bounded Leakage.
In: IACR Cryptology ePrint Archive, 2009, p. 379. [Article]

Faust, Sebastian ; Käsper, Emilia ; Lucks, Stefan (2008):
Efficient Simultaneous Broadcast.
pp. 180-196, Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings, DOI: 10.1007/978-3-540-78440-1₁₁,
[Conference or Workshop Item]

G

Grosso, Vincent ; Standaert, Francois-Xavier ; Faust, Sebastian (2015):
Masking vs. Multiparty Computation: How Large is the Gap for AES?
In: IACR Cryptology ePrint Archive, 2015, p. 492. [Article]

Grosso, Vincent ; Standaert, Francois-Xavier ; Faust, Sebastian (2014):
Masking vs. multiparty computation: how large is the gap for AES?
In: J. Cryptographic Engineering, 4 (1), pp. 47-57. DOI: 10.1007/s13389-014-0073-y,
[Article]

Grosso, Vincent ; Standaert, Francois-Xavier ; Faust, Sebastian (2013):
Masking vs. Multiparty Computation: How Large Is the Gap for AES?
pp. 400-416, Cryptographic Hardware and Embedded Systems - CHES 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings, DOI: 10.1007/978-3-642-40349-1₂₃,
[Conference or Workshop Item]

H

Hostáková, Kristina (2021):
Foundations of Generalized State Channel Networks. (Publisher's Version)
Darmstadt, Technische Universität,
DOI: 10.26083/tuprints-00017476,
[Ph.D. Thesis]

K

Kohlweiss, Markulf ; Faust, Sebastian ; Fritsch, Lothar ; Gedrojc, Bartek ; Preneel, Bart (2007):
Efficient Oblivious Augmented Maps: Location-Based Services with a Payment Broker.
pp. 77-94, Privacy Enhancing Technologies, 7th International Symposium, PET 2007 Ottawa, Canada, June 20-22, 2007, Revised Selected Papers, DOI: 10.1007/978-3-540-75551-7₆,
[Conference or Workshop Item]

L

Lohr, Matthias ; Schlosser, Benjamin ; Jürjens, Jan ; Staab, Matthias (2020):
Cost Fairness for Blockchain-Based Two-Party Exchang Protocols.
3rd IEEE International Conference on Blockchain, virtual Conference, 02.-06.11.2020, [Conference or Workshop Item]

M

Maitra, Monosij (2020):
Fine-Grained Encryption for Uniform Models of Computation.
Madras, India, Indian Institute of Technology,
[Ph.D. Thesis]

Maitra, M. ; Mukherjee, A. (2014):
Convergence of the Min-Sum Decoding Scheme for LDPC Codes from a Dynamical Systems Perspective.
In: Proceedings : Fourth International Conference on Emerging Applications of Information Technology, pp. 107-112,
IEEE, 4th International Conference of Emerging Applications of Information Technology, Kolkata, India, 19.-21.12.2014, ISBN 978-1-4799-4272-5,
DOI: 10.1109/EAIT.2014.40,
[Conference or Workshop Item]

P

Paglialonga, Clara (2021):
Provable Secure Countermeasures Against Side-Channel Attacks. (Publisher's Version)
Darmstadt, Technische Universität,
DOI: 10.26083/tuprints-00018597,
[Ph.D. Thesis]

V

van der Wijden, Marius (2018):
Payment and State Channels in practice.
TU Darmstadt, [Master Thesis]

Varky, Jacek (2018):
TeePay – Using Trusted Execution Environments for Off-chain Payment.
TU Darmstadt, [Master Thesis]

This list was generated on Sun Jun 20 02:06:23 2021 CEST.