Items in division
- TU Darmstadt (106989)
- 20 Department of Computer Science (16098)
- Angewandte Kryptographie (126)
- 20 Department of Computer Science (16098)
A
Arnold, Paula ; Berndt, Sebastian ; Eisenbarth, Thomas ; Orlt, Maximilian (2024)
Polynomial sharings on two secrets: Buy one, get one free.
In: Transactions on Cryptographic Hardware and Embedded System, 2024 (3)
doi: 10.46586/tches.v2024.i3.671-706
Article, Bibliographie
Alkeilani Alkadri, Nabil (2022)
On Lattice-Based Signatures with Advanced Functionalities.
Technische Universität Darmstadt
doi: 10.26083/tuprints-00020793
Ph.D. Thesis, Primary publication, Publisher's Version
Avarikioti, Zeta ; Litos, Orfeas Stefanos Thyfronitis (2022)
Suborn Channels: Incentives Against Timelock Bribes.
26th International Conference of Financial Cryptography. Grenada (02.05.2022-06.05.2022)
doi: 10.1007/978-3-031-18283-9_24
Conference or Workshop Item, Bibliographie
Agrawal, Shweta ; Maitra, Monosij ; Vempati, Narasimha Sai ; Yamada, Shota
eds.: Malkin, Tal ; Peikert, Chris (2021)
Functional Encryption for Turing Machines with Dynamic Bounded Collusion from LWE.
41st Annual International Cryptology Conference (CRYPTO 2021). virtual Conference (16.08.2021-20.08.2021)
doi: 10.1007/978-3-030-84259-8_9
Conference or Workshop Item, Bibliographie
Aumayr, Lukas ; Ersoy, Oguzhan ; Erwig, Andreas ; Faust, Sebastian ; Hostáková, Kristina ; Maffei, Matteo ; Moreno-Sanchez, Pedro ; Riahi, Siavash (2021)
Bitcoin-Compatible Virtual Channels.
42nd IEEE Symposium on Security and Privacy. virtual Conference (23.05.2021-27.05.2021)
Conference or Workshop Item, Bibliographie
Avarikioti, Zeta ; Thyfronitis Litos, Orfeas Stefanos ; Wattenhofer, Roger (2020)
Cerberus Channels: Incentivizing Watchtowers for Bitcoin.
24th International Conference on Financial Cryptography and Data Security. Kota Kinabalu, Malaysia (10.02.2020-14.02.2020)
doi: 10.1007/978-3-030-51280-4_19
Conference or Workshop Item, Bibliographie
Agrawal, Shweta ; Libert, Benoit ; Maitra, Monosij ; Titiu, Radu (2020)
Adaptive simulation security for inner product functional encryption.
23rd IACR International Conference on Practice and Theory of Public-Key Cryptography(PKC 2020). virtual Conference (01.06.2020-04.06.2020)
doi: 10.1007/978-3-030-45374-9_2
Conference or Workshop Item, Bibliographie
Alkeilani Alkadri, Nabil ; Das, Poulami ; Erwig, Andreas ; Faust, Sebastian ; Krämer, Juliane ; Riahi, Siavash ; Struck, Patrick (2020)
Deterministic Wallets in a Quantum World.
The 27th ACM Conference on Computer and Communications Security (CCS 2020). virtual Conference (09.11.2020-13.11.2020)
Conference or Workshop Item, Bibliographie
Agrawal, Shweta ; Maitra, Monosij ; Yamada, Shota (2019)
Attribute Based Encryption for Deterministic Finite Automata from DLIN.
17th International Confernce on Theory of Cryptography Conference (TCC 2019). Nuremberg, Germany (01.12.2019-05.12.2019)
doi: 10.1007/978-3-030-36033-7_4
Conference or Workshop Item, Bibliographie
Agrawal, Shweta ; Maitra, Monosij ; Yamada, Shota (2019)
Attribute based encryption (and more) for nondeterministic finite automata from LWE.
39th Annual International Cryptology Conference (CRYPTO 2019). Santa Barbara, USA (18.08.2019-22.08.2019)
doi: 10.1007/978-3-030-26951-7_26
Conference or Workshop Item, Bibliographie
Amler, Hendrik (2018)
Evaluation of payment channel networks for micropayments.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Agrawal, Shweta ; Maitra, Monosij (2018)
FE and iO for turing machines from minimal assumptions.
16th International Confernce on Theory of Cryptography Conference (TCC 2018). Panaji, India (11.11.2018-14.11.2018)
doi: 10.1007/978-3-030-03810-6_18
Conference or Workshop Item, Bibliographie
Andrychowicz, Marcin ; Dziembowski, Stefan ; Faust, Sebastian (2016)
Circuit Compilers with O(1/log (n)) Leakage Rate.
Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II.
doi: 10.1007/978-3-662-49896-5_21
Conference or Workshop Item, Bibliographie
Andrychowicz, Marcin ; Dziembowski, Stefan ; Faust, Sebastian (2016)
Circuit Compilers with O(1/ log(n)) Leakage Rate.
In: IACR Cryptology ePrint Archive, 2016
Article, Bibliographie
Andrychowicz, Marcin ; Damgard, Ivan ; Dziembowski, Stefan ; Faust, Sebastian ; Polychroniadou, Antigoni (2015)
Efficient Leakage Resilient Circuit Compilers.
Topics in Cryptology - CT-RSA 2015, The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings.
doi: 10.1007/978-3-319-16715-2_17
Conference or Workshop Item, Bibliographie
B
Berti, Francesco (2023)
Reconsidering Generic Composition: the modes A10, A11 and A12 are insecure.
28th Australasian Conference on Information Security and Privacy. Brisbane, Australia (05.07.2023-07.07.2023)
doi: 10.1007/978-3-031-35486-1
Conference or Workshop Item, Bibliographie
Brian, Gianluca ; Faust, Sebastian ; Micheli, Elena ; Venturi, Daniele (2022)
Continuously Non-malleable Codes Against Bounded-Depth Tampering.
28th International Conference on the Theory and Application of Cryptology and Information Security. Taipei, Taiwan (05.12.2022-09.12.2022)
doi: 10.1007/978-3-031-22972-5_14
Conference or Workshop Item, Bibliographie
Berti, Francesco ; Bhasin, Shivam ; Breier, Jakob ; Hou, Xiaolu ; Poussier, Romain ; Standaert, François-Xavier ; Udvarhelyi, Balasz (2022)
A Finer-Grain Analysis of the Leakage (Non) Resilience of OCB.
Conference on Cryptographic Hardware and Embedded Systems (CHES 2022). Leuven, Belgium (18.09.2022-21.09.2022)
doi: 10.46586/tches.v2022.i1.461-481
Conference or Workshop Item, Bibliographie
Berti, Francesco (2020)
Authentication in the presence of side-channel leakage.
Université Catholique de Louvain
Ph.D. Thesis, Bibliographie
Balasch, Josep ; Faust, Sebastian ; Gierlichs, Benedikt ; Paglialonga, Clara ; Standaert, Francois-Xavier (2017)
Consolidating Inner Product Masking.
In: Cryptology ePrint Archive, 2017 (1047)
Article, Bibliographie
Balasch, Josep ; Faust, Sebastian ; Gierlichs, Benedikt ; Paglialonga, Clara ; Standaert, Francois-Xavier (2017)
Consolidating Inner Product Masking.
Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I.
doi: 10.1007/978-3-319-70694-8_25
Conference or Workshop Item, Bibliographie
Barthe, Gilles ; Dupressoir, Francois ; Faust, Sebastian ; Gregoire, Benjamin ; Standaert, Francois-Xavier ; Strub, Pierre-Yves (2017)
Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model.
Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part I.
doi: 10.1007/978-3-319-56620-7_19
Conference or Workshop Item, Bibliographie
Brody, Joshua ; Dziembowski, Stefan ; Faust, Sebastian ; Pietrzak, Krzysztof (2017)
Position-Based Cryptography and Multiparty Communication Complexity.
Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I.
doi: 10.1007/978-3-319-70500-2_3
Conference or Workshop Item, Bibliographie
Brody, Joshua ; Dziembowski, Stefan ; Faust, Sebastian ; Pietrzak, Krzysztof (2016)
Position-Based Cryptography and Multiparty Communication Complexity.
In: IACR Cryptology ePrint Archive, 2016
Article, Bibliographie
Barthe, Gilles ; Dupressoir, Francois ; Faust, Sebastian ; Gregoire, Benjamin ; Standaert, Francois-Xavier ; Strub, Pierre-Yves (2016)
Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model.
In: IACR Cryptology ePrint Archive, 2016
Article, Bibliographie
Balasch, Josep ; Faust, Sebastian ; Gierlichs, Benedikt (2015)
Inner Product Masking Revisited.
Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I.
doi: 10.1007/978-3-662-46800-5_19
Conference or Workshop Item, Bibliographie
Balasch, Josep ; Faust, Sebastian ; Gierlichs, Benedikt (2015)
Inner Product Masking Revisited.
In: IACR Cryptology ePrint Archive, 2015
Article, Bibliographie
Balasch, Josep ; Faust, Sebastian ; Gierlichs, Benedikt ; Verbauwhede, Ingrid (2012)
Theory and Practice of a Leakage Resilient Masking Scheme.
Advances in Cryptology - ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings.
doi: 10.1007/978-3-642-34961-4_45
Conference or Workshop Item, Bibliographie
D
Das, Poulami ; Erwig, Andreas ; Faust, Sebastian (2024)
Shared-Custodial Password-Authenticated Deterministic Wallets.
14th International Conference on Security and Cryptography for Networks (SCN 2024). Amalfi, Italy (11.09.2024 - 13.09.2024)
doi: 10.1007/978-3-031-71073-5_16
Conference or Workshop Item, Bibliographie
Das, Poulami (2023)
Secure Infrastructures in the Realm of Decentralization.
Technische Universität Darmstadt
doi: 10.26083/tuprints-00024422
Ph.D. Thesis, Primary publication, Publisher's Version
Das, Poulami ; Hesse, Julia ; Lehmann, Anja (2022)
DPaSE: Distributed Password-Authenticated Symmetric-Key Encryption, or How to Get Many Keys from One Password.
2022 ACM on Asia Conference on Computer and Communications Security. Nagasaki, Japan (30.05.2022-02.06.2022)
doi: 10.1145/3488932.3517389
Conference or Workshop Item, Bibliographie
Das, Poulami ; Erwig, Andreas ; Faust, Sebastian ; Loss, Julian ; Riahi, Siavash (2021)
The Exact Security of BIP32 Wallets.
27th ACM Conference on Computer and Communications Security. virtual Conference (15.11.2021-19.11.2021)
doi: 10.1145/3460120.3484807
Conference or Workshop Item, Bibliographie
Dziembowski, Stefan ; Fabiański, Grzegorz ; Faust, Sebastian ; Riahi, Siavash
ed.: Lee, James R. (2021)
Lower Bounds for Off-Chain Protocols: Exploring the Limits of Plasma.
virtual Conference (06.01.2021-08.01.2021)
doi: 10.4230/LIPIcs.ITCS.2021.72
Conference or Workshop Item, Bibliographie
Das, Poulami ; Faust, Sebastian ; Loss, Julian (2019)
A Formal Treatment of Deterministic Wallets.
ACM CCS 2019 - Symposium on Computer and Communications Security. London, UK (11.11.2019-11.11.2019)
Conference or Workshop Item, Bibliographie
Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian ; Hesse, Julia ; Hostakova, Kristina (2019)
Multiparty Virtual State Channels.
38th Annual International Conference on the Theory and Applications of Cryptographic Techniques.
Conference or Workshop Item, Bibliographie
Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian ; Malinowski, Daniel (2019)
Perun: Virtual Payment Hubs over Cryptocurrencies.
39th IEEE Symposium on Security and Privacy. THE HYATT REGENCY, SAN FRANCISCO, CA (21.05.2018-23.05.2018)
Conference or Workshop Item, Bibliographie
Dziembowski, Stefan ; Faust, Sebastian ; Zebrowski, Karol (2019)
Simple Refreshing in the Noisy Leakage Model.
The 25th Annual International Conference on the Theory and Application of Cryptology and Information Security. Kobe, Japan (08.12.2019-12.12.2019)
Conference or Workshop Item, Bibliographie
Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian (2018)
FairSwap: How to fairly exchange digital goods.
25th ACM Conference on Computer and Communications Security (CCS). Toronto, Canada (15.10.2018-19.10.2018)
Conference or Workshop Item, Bibliographie
Dziembowski, Stefan ; Faust, Sebastian ; Hostakova, Kristina (2018)
General State Channel Networks.
25th ACM Conference on Computer and Communications Security (CCS). Toronto, Canada (15.10.2018-19.10.2018)
doi: 10.1145/3243734.3243856
Conference or Workshop Item, Bibliographie
Damgard, Ivan ; Faust, Sebastian ; Mukherjee, Pratyay ; Venturi, Daniele (2017)
Bounded Tamper Resilience: How to Go Beyond the Algebraic Barrier.
In: J. Cryptology, 30 (1)
doi: 10.1007/s00145-015-9218-0
Article, Bibliographie
Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian ; Malinowski, Daniel (2017)
PERUN: Virtual Payment Channels over Cryptographic Currencies.
In: IACR Cryptology ePrint Archive, 2017
Article, Bibliographie
Dziembowski, Stefan ; Faust, Sebastian ; Standaert, Francois-Xavier (2016)
Private Circuits III: Hardware Trojan-Resilience via Testing Amplification.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016.
doi: 10.1145/2976749.2978419
Conference or Workshop Item, Bibliographie
Dziembowski, Stefan ; Faust, Sebastian ; Herold, Gottfried ; Journault, Anthony ; Masny, Daniel ; Standaert, Francois-Xavier (2016)
Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems.
Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part II.
doi: 10.1007/978-3-662-53008-5_10
Conference or Workshop Item, Bibliographie
Dziembowski, Stefan ; Faust, Sebastian ; Skorski, Maciej (2016)
Optimal Amplification of Noisy Leakages.
Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part II.
doi: 10.1007/978-3-662-49099-0_11
Conference or Workshop Item, Bibliographie
Dziembowski, Stefan ; Faust, Sebastian ; Herold, Gottfried ; Journault, Anthony ; Masny, Daniel ; Standaert, Francois-Xavier (2016)
Towards Sound Fresh Re-Keying with Hard (Physical) Learning Problems.
In: IACR Cryptology ePrint Archive, 2016
Article, Bibliographie
Dziembowski, Stefan ; Faust, Sebastian ; Standaert, Francois-Xavier (2016)
Private Circuits III: Hardware Trojan-Resilience via Testing Amplification.
In: IACR Cryptology ePrint Archive, 2016
Article, Bibliographie
Dziembowski, Stefan ; Faust, Sebastian ; Kolmogorov, Vladimir ; Pietrzak, Krzysztof (2015)
Proofs of Space.
Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II.
doi: 10.1007/978-3-662-48000-7_29
Conference or Workshop Item, Bibliographie
Dziembowski, Stefan ; Faust, Sebastian ; Skorski, Maciej (2015)
Noisy Leakage Revisited.
Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II.
doi: 10.1007/978-3-662-46803-6_6
Conference or Workshop Item, Bibliographie
Duc, Alexandre ; Faust, Sebastian ; Standaert, Francois-Xavier (2015)
Making Masking Security Proofs Concrete - Or How to Evaluate the Security of Any Leaking Device.
Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I.
doi: 10.1007/978-3-662-46800-5_16
Conference or Workshop Item, Bibliographie
Damgard, Ivan ; Faust, Sebastian ; Mukherjee, Pratyay ; Venturi, Daniele (2015)
The Chaining Lemma and Its Application.
Information Theoretic Security - 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings.
doi: 10.1007/978-3-319-17470-9_11
Conference or Workshop Item, Bibliographie
Duc, Alexandre ; Faust, Sebastian ; Standaert, Francois-Xavier (2015)
Making Masking Security Proofs Concrete Or How to Evaluate the Security of any Leaking Device.
In: IACR Cryptology ePrint Archive, 2015
Article, Bibliographie
Duc, Alexandre ; Dziembowski, Stefan ; Faust, Sebastian (2014)
Unifying Leakage Models: From Probing Attacks to Noisy Leakage.
Advances in Cryptology - EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings.
doi: 10.1007/978-3-642-55220-5_24
Conference or Workshop Item, Bibliographie
Duc, Alexandre ; Dziembowski, Stefan ; Faust, Sebastian (2014)
Unifying Leakage Models: from Probing Attacks to Noisy Leakage.
In: IACR Cryptology ePrint Archive, 2014
Article, Bibliographie
Damgard, Ivan ; Faust, Sebastian ; Mukherjee, Pratyay ; Venturi, Daniele (2014)
The Chaining Lemma and its application.
In: IACR Cryptology ePrint Archive, 2014
Article, Bibliographie
Damgard, Ivan ; Faust, Sebastian ; Mukherjee, Pratyay ; Venturi, Daniele (2013)
Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier.
Advances in Cryptology - ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II.
doi: 10.1007/978-3-642-42045-0_8
Conference or Workshop Item, Bibliographie
Damgard, Ivan ; Faust, Sebastian ; Mukherjee, Pratyay ; Venturi, Daniele (2013)
Bounded Tamper Resilience: How to go beyond the Algebraic Barrier.
In: IACR Cryptology ePrint Archive, 2013
Article, Bibliographie
Dziembowski, Stefan ; Faust, Sebastian ; Kolmogorov, Vladimir ; Pietrzak, Krzysztof (2013)
Proofs of Space.
In: IACR Cryptology ePrint Archive, 2013
Article, Bibliographie
Damgard, Ivan ; Faust, Sebastian ; Hazay, Carmit (2012)
Secure Two-Party Computation with Low Communication.
Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings.
doi: 10.1007/978-3-642-28914-9_4
Conference or Workshop Item, Bibliographie
Dziembowski, Stefan ; Faust, Sebastian (2012)
Leakage-Resilient Circuits without Computational Assumptions.
Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings.
doi: 10.1007/978-3-642-28914-9_13
Conference or Workshop Item, Bibliographie
Dziembowski, Stefan ; Faust, Sebastian (2011)
Leakage-Resilient Cryptography from the Inner-Product Extractor.
Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings.
doi: 10.1007/978-3-642-25385-0_38
Conference or Workshop Item, Bibliographie
Damgard, Ivan ; Faust, Sebastian ; Hazay, Carmit (2011)
Secure Two-Party Computation with Low Communication.
In: IACR Cryptology ePrint Archive, 2011
Article, Bibliographie
Dziembowski, Stefan ; Faust, Sebastian (2011)
Leakage-Resilient Cryptography From the Inner-Product Extractor.
In: IACR Cryptology ePrint Archive, 2011
Article, Bibliographie
Danezis, George ; Diaz, Claudia ; Faust, Sebastian ; Käsper, Emilia ; Troncoso, Carmela ; Preneel, Bart (2007)
Efficient Negative Databases from Cryptographic Hash Functions.
Information Security, 10th International Conference, ISC 2007, Valparaiso, Chile, October 9-12, 2007, Proceedings.
doi: 10.1007/978-3-540-75496-1_28
Conference or Workshop Item, Bibliographie
E
Erwig, Andreas (2023)
Provably Secure Advanced Cryptographic Wallets.
Technische Universität Darmstadt
doi: 10.26083/tuprints-00024454
Ph.D. Thesis, Primary publication, Publisher's Version
Erwig, Andreas ; Riahi, Siavash (2022)
Deterministic Wallets for Adaptor Signatures.
27th European Symposium on Research in Computer Security (ESORICS 2022). Copenhagen, Denmark (26.09.2022-30.09.2022)
doi: 10.1007/978-3-031-17146-8_24
Conference or Workshop Item, Bibliographie
Erwig, Andreas ; Faust, Sebastian ; Hostáková, Kristina ; Maitra, Monosij ; Riahi, Siavash (2021)
Two-Party Adaptor Signatures From Identification Schemes.
Report, Bibliographie
Erwig, Andreas ; Faust, Sebastian ; Hostáková, Kristina ; Maitra, Monosij ; Riahi, Siavash (2021)
Two-Party Adaptor Signatures From Identification Schemes.
24th International Conference on Practice and Theory of Public-Key Cryptography. virtual Conference (09.05.2021-13.05.2021)
Conference or Workshop Item, Bibliographie
Erwig, Andreas ; Hesse, Julia ; Orlt, Maximilian ; Riahi, Siavash (2020)
Fuzzy Asymmetric Password-Authenticated Key Exchange.
26th Annual International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt 2020). virtual Conference (07.12.2020-11.12.2020)
Conference or Workshop Item, Bibliographie
Eckey, Lisa ; Faust, Sebastian ; Schlosser, Benjamin (2020)
OptiSwap: Fast Optimistic Fair Exchange.
15th ACM Asia Conference on Computer and Communications Security (ASIA CCS '20). virtual Conference (05.10.2020-09.10.2020)
doi: 10.1145/3320269.3384749
Conference or Workshop Item, Bibliographie
Eckey, Lisa (2020)
Blockchain Scalability through Secure Optimistic Protocols.
Technische Universität Darmstadt
doi: 10.25534/tuprints-00014041
Ph.D. Thesis, Primary publication, Publisher's Version
Escudeiro, Nuno ; Escudeiro, Paula ; Soares, Fernando ; Thyfronitis Litos, Orfeas Stefanos ; Norberto, Marcelo ; Lopes, Jorge (2017)
Recognition of hand configuration: A critical factor in automatic sign language translation.
12th Iberian Conference on Information Systems and Technologies (CISTI). Lisbon, Portugal (21.06.2017-24.06.2017)
doi: 10.23919/CISTI.2017.7975724
Conference or Workshop Item, Bibliographie
Eckey, Lisa ; Faust, Sebastian ; Loss, Julian (2017)
Efficient Algorithms for Broadcast and Consensus Based on Proofs of Work.
In: IACR Cryptology ePrint Archive, 2017
Article, Bibliographie
F
Frassetto, Tommaso ; Jauernig, Patrick ; Koisser, David ; Kretzler, David ; Schlosser, Benjamin ; Faust, Sebastian ; Sadeghi, Ahmad-Reza (2023)
POSE: Practical Off-chain Smart Contract Execution.
Network and Distributed System Security Symposium 2023. San Diego, USA (27.02.2023-03.03.2023)
Conference or Workshop Item, Bibliographie
Faust, Sebastian ; Hazay, Carmit ; Kretzler, David ; Schlosser, Benjamin (2023)
Putting the Online Phase on a Diet: Covert Security from Short MACs.
CT-RSA 2023: The Cryptographers' Track at RSA Conference. San Francisco, USA (24.04.2023-27.04.2023)
Conference or Workshop Item, Bibliographie
Faust, Sebastian ; Krämer, Juliane ; Orlt, Maximilian ; Struck, Patrick (2022)
On the Related-Key Attack Security of Authenticated Encryption Schemes.
13th Conference on Security and Cryptography for Networks. Amalfi, Italy (12.09.2022-14.09.2022)
doi: 10.1007/978-3-031-14791-3_16
Conference or Workshop Item, Bibliographie
Faust, Sebastian ; Hazay, Carmit ; Kretzler, David ; Schlosser, Benjamin (2022)
Financially Backed Covert Security.
International Conference on Practice and Theory of Public-Key Cryptography 2022. virtual Conference (08.03.2022-11.03.2022)
doi: 10.1007/978-3-030-97131-1_4
Conference or Workshop Item, Bibliographie
Faust, Sebastian ; Hazay, Carmit ; Kretzler, David ; Schlosser, Benjamin (2021)
Generic Compiler for Publicly Verifiable Covert Multi-Party Computation.
40th Annual International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt 2021). Zagreb, Croatia (17.10.2021-21.10.2021)
Conference or Workshop Item, Bibliographie
Faust, Sebastian ; Hazay, Carmit ; Venturi, Daniele (2018)
Outsourced pattern matching.
In: Int. J. Inf. Sec., 17 (3)
doi: 10.1007/s10207-017-0374-0
Article, Bibliographie
Faust, Sebastian ; Paglialonga, Clara ; Schneider, Tobias (2017)
Amortizing Randomness Complexity in Private Circuits.
Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I.
doi: 10.1007/978-3-319-70694-8_27
Conference or Workshop Item, Bibliographie
Faust, Sebastian ; Hostakova, Kristina ; Mukherjee, Pratyay ; Venturi, Daniele (2017)
Non-Malleable Codes for Space-Bounded Tampering.
Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part II.
doi: 10.1007/978-3-319-63715-0_4
Conference or Workshop Item, Bibliographie
Faust, Sebastian ; Hostakova, Kristina ; Mukherjee, Pratyay ; Venturi, Daniele (2017)
Non-Malleable Codes for Space-Bounded Tampering.
In: IACR Cryptology ePrint Archive, 2017
Article, Bibliographie
Faust, Sebastian ; Grosso, Vincent ; Pozo, Santos Merino Del ; Paglialonga, Clara ; Standaert, Francois-Xavier (2017)
Composable Masking Schemes in the Presence of Physical Defaults and the Robust Probing Model.
In: IACR Cryptology ePrint Archive, 2017
Article, Bibliographie
Faust, Sebastian ; Paglialonga, Clara ; Schneider, Tobias (2017)
Amortizing Randomness Complexity in Private Circuits.
In: IACR Cryptology ePrint Archive, 2017
Article, Bibliographie
Faust, Sebastian ; Hazay, Carmit ; Nielsen, Jesper Buus ; Nordholt, Peter Sebastian ; Zottarel, Angela (2016)
Signature Schemes Secure Against Hard-to-Invert Leakage.
In: J. Cryptology, 29 (2)
doi: 10.1007/s00145-015-9197-1
Article, Bibliographie
Faust, Sebastian ; Mukherjee, Pratyay ; Venturi, Daniele ; Wichs, Daniel (2016)
Efficient Non-Malleable Codes and Key Derivation for Poly-Size Tampering Circuits.
In: IEEE Trans. Information Theory, 62 (12)
doi: 10.1109/TIT.2016.2613919
Article, Bibliographie
Faust, Sebastian ; Masny, Daniel ; Venturi, Daniele (2016)
Chosen-Ciphertext Security from Subset Sum.
Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I.
doi: 10.1007/978-3-662-49384-7_2
Conference or Workshop Item, Bibliographie
Faust, Sebastian ; Mukherjee, Pratyay ; Nielsen, Jesper Buus ; Venturi, Daniele (2015)
A Tamper and Leakage Resilient von Neumann Architecture.
Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings.
doi: 10.1007/978-3-662-46447-2_26
Conference or Workshop Item, Bibliographie
Faust, Sebastian ; Masny, Daniel ; Venturi, Daniele (2015)
Chosen-Ciphertext Security from Subset Sum.
In: IACR Cryptology ePrint Archive, 2015
Article, Bibliographie
Faust, Sebastian ; Rabin, Tal ; Reyzin, Leonid ; Tromer, Eran ; Vaikuntanathan, Vinod (2014)
Protecting Circuits from Computationally Bounded and Noisy Leakage.
In: SIAM J. Comput., 43 (5)
doi: 10.1137/120880343
Article, Bibliographie
Faust, Sebastian ; Mukherjee, Pratyay ; Venturi, Daniele ; Wichs, Daniel (2014)
Efficient Non-malleable Codes and Key-Derivation for Poly-size Tampering Circuits.
Advances in Cryptology - EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings.
doi: 10.1007/978-3-642-55220-5_7
Conference or Workshop Item, Bibliographie
Faust, Sebastian ; Mukherjee, Pratyay ; Nielsen, Jesper Buus ; Venturi, Daniele (2014)
Continuous Non-malleable Codes.
Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings.
doi: 10.1007/978-3-642-54242-8_20
Conference or Workshop Item, Bibliographie
Faust, Sebastian ; Mukherjee, Pratyay ; Nielsen, Jesper Buus ; Venturi, Daniele (2014)
Continuous Non-malleable Codes.
In: IACR Cryptology ePrint Archive, 2014
Article, Bibliographie
Faust, Sebastian ; Mukherjee, Pratyay ; Nielsen, Jesper Buus ; Venturi, Daniele (2014)
A Tamper and Leakage Resilient Random Access Machine.
In: IACR Cryptology ePrint Archive, 2014
Article, Bibliographie
Faust, Sebastian ; Hazay, Carmit ; Venturi, Daniele (2014)
Outsourced Pattern Matching.
In: IACR Cryptology ePrint Archive, 2014
Article, Bibliographie
Faust, Sebastian ; Hazay, Carmit ; Venturi, Daniele (2013)
Outsourced Pattern Matching.
Automata, Languages, and Programming - 40th International Colloquium, ICALP 2013, Riga, Latvia, July 8-12, 2013, Proceedings, Part II.
doi: 10.1007/978-3-642-39212-2_48
Conference or Workshop Item, Bibliographie
Faust, Sebastian ; Mukherjee, Pratyay ; Venturi, Daniele ; Wichs, Daniel (2013)
Efficient Non-Malleable Codes and Key-Derivation for Poly-Size Tampering Circuits.
In: IACR Cryptology ePrint Archive, 2013
Article, Bibliographie
Faust, Sebastian ; Hazay, Carmit ; Nielsen, Jesper Buus ; Nordholt, Peter Sebastian ; Zottarel, Angela (2012)
Signature Schemes Secure against Hard-to-Invert Leakage.
Advances in Cryptology - ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings.
doi: 10.1007/978-3-642-34961-4_8
Conference or Workshop Item, Bibliographie
Faust, Sebastian ; Pietrzak, Krzysztof ; Schipper, Joachim (2012)
Practical Leakage-Resilient Symmetric Cryptography.
Cryptographic Hardware and Embedded Systems - CHES 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings.
doi: 10.1007/978-3-642-33027-8_13
Conference or Workshop Item, Bibliographie
Faust, Sebastian ; Kohlweiss, Markulf ; Marson, Giorgia Azzurra ; Venturi, Daniele (2012)
On the Non-malleability of the Fiat-Shamir Transform.
Progress in Cryptology - INDOCRYPT 2012, 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings.
doi: 10.1007/978-3-642-34931-7_5
Conference or Workshop Item, Bibliographie
Faust, Sebastian ; Hazay, Carmit ; Nielsen, Jesper Buus ; Nordholt, Peter Sebastian ; Zottarel, Angela (2012)
Signature Schemes Secure against Hard-to-Invert Leakage.
In: IACR Cryptology ePrint Archive, 2012
Article, Bibliographie
Faust, Sebastian ; Kohlweiss, Markulf ; Marson, Giorgia Azzurra ; Venturi, Daniele (2012)
On the Non-malleability of the Fiat-Shamir Transform.
In: IACR Cryptology ePrint Archive, 2012
Article, Bibliographie
Faust, Sebastian ; Pietrzak, Krzysztof ; Venturi, Daniele (2011)
Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience.
Automata, Languages and Programming - 38th International Colloquium, ICALP 2011, Zurich, Switzerland, July 4-8, 2011, Proceedings, Part I.
doi: 10.1007/978-3-642-22006-7_33
Conference or Workshop Item, Bibliographie
Faust, Sebastian ; Pietrzak, Krzysztof ; Venturi, Daniele (2011)
Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience.
In: IACR Cryptology ePrint Archive, 2011
Article, Bibliographie
Faust, Sebastian ; Rabin, Tal ; Reyzin, Leonid ; Tromer, Eran ; Vaikuntanathan, Vinod (2010)
Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases.
Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 - June 3, 2010. Proceedings.
doi: 10.1007/978-3-642-13190-5_7
Conference or Workshop Item, Bibliographie
Faust, Sebastian ; Kiltz, Eike ; Pietrzak, Krzysztof ; Rothblum, Guy N. (2010)
Leakage-Resilient Signatures.
Theory of Cryptography, 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings.
doi: 10.1007/978-3-642-11799-2_21
Conference or Workshop Item, Bibliographie
Faust, Sebastian ; Kiltz, Eike ; Pietrzak, Krzysztof ; Rothblum, Guy N. (2009)
Leakage-Resilient Signatures.
In: IACR Cryptology ePrint Archive, 2009
Article, Bibliographie
Faust, Sebastian ; Reyzin, Leonid ; Tromer, Eran (2009)
Protecting Circuits from Computationally-Bounded Leakage.
In: IACR Cryptology ePrint Archive, 2009
Article, Bibliographie
Faust, Sebastian ; Käsper, Emilia ; Lucks, Stefan (2008)
Efficient Simultaneous Broadcast.
Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings.
doi: 10.1007/978-3-540-78440-1_11
Conference or Workshop Item, Bibliographie
G
Grosso, Vincent ; Standaert, Francois-Xavier ; Faust, Sebastian (2015)
Masking vs. Multiparty Computation: How Large is the Gap for AES?
In: IACR Cryptology ePrint Archive, 2015
Article, Bibliographie
Grosso, Vincent ; Standaert, Francois-Xavier ; Faust, Sebastian (2014)
Masking vs. multiparty computation: how large is the gap for AES?
In: J. Cryptographic Engineering, 4 (1)
doi: 10.1007/s13389-014-0073-y
Article, Bibliographie
Grosso, Vincent ; Standaert, Francois-Xavier ; Faust, Sebastian (2013)
Masking vs. Multiparty Computation: How Large Is the Gap for AES?
Cryptographic Hardware and Embedded Systems - CHES 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings.
doi: 10.1007/978-3-642-40349-1_23
Conference or Workshop Item, Bibliographie
H
Hostáková, Kristina (2021)
Foundations of Generalized State Channel Networks.
Technische Universität Darmstadt
doi: 10.26083/tuprints-00017476
Ph.D. Thesis, Primary publication, Publisher's Version
K
Kretzler, David (2024)
Distributed Computation Meets Blockchain: Advanced Cryptographic Services from Blockchain Features.
Technische Universität Darmstadt
doi: 10.26083/tuprints-00028661
Ph.D. Thesis, Primary publication, Publisher's Version
Kiayias, Aggelos ; Thyfronitis Litos, Orfeas Stefanos (2020)
A Composable Security Treatment of the Lightning Network.
33rd IEEE Computer Security Foundations Symposium (CSF 2020). virtual Conference (22.06.2020-26.06.2020)
doi: 10.1109/CSF49147.2020.00031
Conference or Workshop Item, Bibliographie
Kiayias, Aggelos ; Livshits, Benjamin ; Monteoliva Mosteiro, Andrés ; Thyfronitis Litos, Orfeas Stefanos (2019)
A Puff of Steem: Security Analysis of Decentralized Content Curation.
International Conference on Blockchain Economics, Security and Protocols (Tokenomics 2019). Paris, France (06.05.2019-07.05.2019)
doi: 10.4230/OASIcs.Tokenomics.2019.3
Conference or Workshop Item, Bibliographie
Kohlweiss, Markulf ; Faust, Sebastian ; Fritsch, Lothar ; Gedrojc, Bartek ; Preneel, Bart (2007)
Efficient Oblivious Augmented Maps: Location-Based Services with a Payment Broker.
Privacy Enhancing Technologies, 7th International Symposium, PET 2007 Ottawa, Canada, June 20-22, 2007, Revised Selected Papers.
doi: 10.1007/978-3-540-75551-7_6
Conference or Workshop Item, Bibliographie
L
Lohr, Matthias ; Schlosser, Benjamin ; Jürjens, Jan ; Staab, Matthias (2020)
Cost Fairness for Blockchain-Based Two-Party Exchang Protocols.
3rd IEEE International Conference on Blockchain. virtual Conference (02.11.2020-06.11.2020)
Conference or Workshop Item, Bibliographie
M
Maitra, Monosij (2020)
Fine-Grained Encryption for Uniform Models of Computation.
Indian Institute of Technology of Madras
Ph.D. Thesis, Bibliographie
Maitra, M. ; Mukherjee, A. (2014)
Convergence of the Min-Sum Decoding Scheme for LDPC Codes from a Dynamical Systems Perspective.
4th International Conference of Emerging Applications of Information Technology. Kolkata, India (19.12.2014-21.12.2014)
doi: 10.1109/EAIT.2014.40
Conference or Workshop Item, Bibliographie
O
Orlt, Maximilian (2024)
Leakage and Fault Resilience of Cryptographic Implementations.
Technische Universität Darmstadt
doi: 10.26083/tuprints-00027794
Ph.D. Thesis, Primary publication, Publisher's Version
P
Paglialonga, Clara (2021)
Provable Secure Countermeasures Against Side-Channel Attacks.
Technische Universität Darmstadt
doi: 10.26083/tuprints-00018597
Ph.D. Thesis, Primary publication, Publisher's Version
R
Riahi, Siavash (2023)
On the (im)possibility of building off-chain protocols from minimal assumptions.
Technische Universität Darmstadt
doi: 10.26083/tuprints-00024399
Ph.D. Thesis, Primary publication, Publisher's Version
T
Thyfronitis Litos, Orfeas Stefanos ; Zindros, Dionysis (2017)
Trust Is Risk: A Decentralized Financial Trust Platform.
21st International Conference on Financial Cryptography and Data Security. Sliema, Malta (03.04.2017-07.04.2017)
doi: 10.1007/978-3-319-70972-7_19
Conference or Workshop Item, Bibliographie
V
Villeneuve, Come du Crest de (2018)
Evaluation of the Efficiency of different Architectures and Pathfinding Algorithms.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Varky, Jacek (2018)
TeePay – Using Trusted Execution Environments for Off-chain Payment.
Technische Universität Darmstadt
Master Thesis, Bibliographie
W
Wijden, Marius van der (2018)
Payment and State Channels in practice.
Technische Universität Darmstadt
Master Thesis, Bibliographie