Einträge mit Organisationseinheit "20 Fachbereich Informatik > Angewandte Kryptographie"
- TU Darmstadt (106899)
- 20 Fachbereich Informatik (16079)
- Angewandte Kryptographie (125)
- 20 Fachbereich Informatik (16079)
Artikel
Arnold, Paula ; Berndt, Sebastian ; Eisenbarth, Thomas ; Orlt, Maximilian (2024)
Polynomial sharings on two secrets: Buy one, get one free.
In: Transactions on Cryptographic Hardware and Embedded System, 2024 (3)
doi: 10.46586/tches.v2024.i3.671-706
Artikel, Bibliographie
Faust, Sebastian ; Hazay, Carmit ; Venturi, Daniele (2018)
Outsourced pattern matching.
In: Int. J. Inf. Sec., 17 (3)
doi: 10.1007/s10207-017-0374-0
Artikel, Bibliographie
Balasch, Josep ; Faust, Sebastian ; Gierlichs, Benedikt ; Paglialonga, Clara ; Standaert, Francois-Xavier (2017)
Consolidating Inner Product Masking.
In: Cryptology ePrint Archive, 2017 (1047)
Artikel, Bibliographie
Damgard, Ivan ; Faust, Sebastian ; Mukherjee, Pratyay ; Venturi, Daniele (2017)
Bounded Tamper Resilience: How to Go Beyond the Algebraic Barrier.
In: J. Cryptology, 30 (1)
doi: 10.1007/s00145-015-9218-0
Artikel, Bibliographie
Faust, Sebastian ; Hostakova, Kristina ; Mukherjee, Pratyay ; Venturi, Daniele (2017)
Non-Malleable Codes for Space-Bounded Tampering.
In: IACR Cryptology ePrint Archive, 2017
Artikel, Bibliographie
Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian ; Malinowski, Daniel (2017)
PERUN: Virtual Payment Channels over Cryptographic Currencies.
In: IACR Cryptology ePrint Archive, 2017
Artikel, Bibliographie
Faust, Sebastian ; Grosso, Vincent ; Pozo, Santos Merino Del ; Paglialonga, Clara ; Standaert, Francois-Xavier (2017)
Composable Masking Schemes in the Presence of Physical Defaults and the Robust Probing Model.
In: IACR Cryptology ePrint Archive, 2017
Artikel, Bibliographie
Faust, Sebastian ; Paglialonga, Clara ; Schneider, Tobias (2017)
Amortizing Randomness Complexity in Private Circuits.
In: IACR Cryptology ePrint Archive, 2017
Artikel, Bibliographie
Eckey, Lisa ; Faust, Sebastian ; Loss, Julian (2017)
Efficient Algorithms for Broadcast and Consensus Based on Proofs of Work.
In: IACR Cryptology ePrint Archive, 2017
Artikel, Bibliographie
Faust, Sebastian ; Hazay, Carmit ; Nielsen, Jesper Buus ; Nordholt, Peter Sebastian ; Zottarel, Angela (2016)
Signature Schemes Secure Against Hard-to-Invert Leakage.
In: J. Cryptology, 29 (2)
doi: 10.1007/s00145-015-9197-1
Artikel, Bibliographie
Faust, Sebastian ; Mukherjee, Pratyay ; Venturi, Daniele ; Wichs, Daniel (2016)
Efficient Non-Malleable Codes and Key Derivation for Poly-Size Tampering Circuits.
In: IEEE Trans. Information Theory, 62 (12)
doi: 10.1109/TIT.2016.2613919
Artikel, Bibliographie
Andrychowicz, Marcin ; Dziembowski, Stefan ; Faust, Sebastian (2016)
Circuit Compilers with O(1/ log(n)) Leakage Rate.
In: IACR Cryptology ePrint Archive, 2016
Artikel, Bibliographie
Brody, Joshua ; Dziembowski, Stefan ; Faust, Sebastian ; Pietrzak, Krzysztof (2016)
Position-Based Cryptography and Multiparty Communication Complexity.
In: IACR Cryptology ePrint Archive, 2016
Artikel, Bibliographie
Dziembowski, Stefan ; Faust, Sebastian ; Herold, Gottfried ; Journault, Anthony ; Masny, Daniel ; Standaert, Francois-Xavier (2016)
Towards Sound Fresh Re-Keying with Hard (Physical) Learning Problems.
In: IACR Cryptology ePrint Archive, 2016
Artikel, Bibliographie
Barthe, Gilles ; Dupressoir, Francois ; Faust, Sebastian ; Gregoire, Benjamin ; Standaert, Francois-Xavier ; Strub, Pierre-Yves (2016)
Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model.
In: IACR Cryptology ePrint Archive, 2016
Artikel, Bibliographie
Dziembowski, Stefan ; Faust, Sebastian ; Standaert, Francois-Xavier (2016)
Private Circuits III: Hardware Trojan-Resilience via Testing Amplification.
In: IACR Cryptology ePrint Archive, 2016
Artikel, Bibliographie
Balasch, Josep ; Faust, Sebastian ; Gierlichs, Benedikt (2015)
Inner Product Masking Revisited.
In: IACR Cryptology ePrint Archive, 2015
Artikel, Bibliographie
Duc, Alexandre ; Faust, Sebastian ; Standaert, Francois-Xavier (2015)
Making Masking Security Proofs Concrete Or How to Evaluate the Security of any Leaking Device.
In: IACR Cryptology ePrint Archive, 2015
Artikel, Bibliographie
Grosso, Vincent ; Standaert, Francois-Xavier ; Faust, Sebastian (2015)
Masking vs. Multiparty Computation: How Large is the Gap for AES?
In: IACR Cryptology ePrint Archive, 2015
Artikel, Bibliographie
Faust, Sebastian ; Masny, Daniel ; Venturi, Daniele (2015)
Chosen-Ciphertext Security from Subset Sum.
In: IACR Cryptology ePrint Archive, 2015
Artikel, Bibliographie
Grosso, Vincent ; Standaert, Francois-Xavier ; Faust, Sebastian (2014)
Masking vs. multiparty computation: how large is the gap for AES?
In: J. Cryptographic Engineering, 4 (1)
doi: 10.1007/s13389-014-0073-y
Artikel, Bibliographie
Faust, Sebastian ; Rabin, Tal ; Reyzin, Leonid ; Tromer, Eran ; Vaikuntanathan, Vinod (2014)
Protecting Circuits from Computationally Bounded and Noisy Leakage.
In: SIAM J. Comput., 43 (5)
doi: 10.1137/120880343
Artikel, Bibliographie
Duc, Alexandre ; Dziembowski, Stefan ; Faust, Sebastian (2014)
Unifying Leakage Models: from Probing Attacks to Noisy Leakage.
In: IACR Cryptology ePrint Archive, 2014
Artikel, Bibliographie
Faust, Sebastian ; Mukherjee, Pratyay ; Nielsen, Jesper Buus ; Venturi, Daniele (2014)
Continuous Non-malleable Codes.
In: IACR Cryptology ePrint Archive, 2014
Artikel, Bibliographie
Faust, Sebastian ; Mukherjee, Pratyay ; Nielsen, Jesper Buus ; Venturi, Daniele (2014)
A Tamper and Leakage Resilient Random Access Machine.
In: IACR Cryptology ePrint Archive, 2014
Artikel, Bibliographie
Faust, Sebastian ; Hazay, Carmit ; Venturi, Daniele (2014)
Outsourced Pattern Matching.
In: IACR Cryptology ePrint Archive, 2014
Artikel, Bibliographie
Damgard, Ivan ; Faust, Sebastian ; Mukherjee, Pratyay ; Venturi, Daniele (2014)
The Chaining Lemma and its application.
In: IACR Cryptology ePrint Archive, 2014
Artikel, Bibliographie
Damgard, Ivan ; Faust, Sebastian ; Mukherjee, Pratyay ; Venturi, Daniele (2013)
Bounded Tamper Resilience: How to go beyond the Algebraic Barrier.
In: IACR Cryptology ePrint Archive, 2013
Artikel, Bibliographie
Faust, Sebastian ; Mukherjee, Pratyay ; Venturi, Daniele ; Wichs, Daniel (2013)
Efficient Non-Malleable Codes and Key-Derivation for Poly-Size Tampering Circuits.
In: IACR Cryptology ePrint Archive, 2013
Artikel, Bibliographie
Dziembowski, Stefan ; Faust, Sebastian ; Kolmogorov, Vladimir ; Pietrzak, Krzysztof (2013)
Proofs of Space.
In: IACR Cryptology ePrint Archive, 2013
Artikel, Bibliographie
Faust, Sebastian ; Hazay, Carmit ; Nielsen, Jesper Buus ; Nordholt, Peter Sebastian ; Zottarel, Angela (2012)
Signature Schemes Secure against Hard-to-Invert Leakage.
In: IACR Cryptology ePrint Archive, 2012
Artikel, Bibliographie
Faust, Sebastian ; Kohlweiss, Markulf ; Marson, Giorgia Azzurra ; Venturi, Daniele (2012)
On the Non-malleability of the Fiat-Shamir Transform.
In: IACR Cryptology ePrint Archive, 2012
Artikel, Bibliographie
Faust, Sebastian ; Pietrzak, Krzysztof ; Venturi, Daniele (2011)
Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience.
In: IACR Cryptology ePrint Archive, 2011
Artikel, Bibliographie
Damgard, Ivan ; Faust, Sebastian ; Hazay, Carmit (2011)
Secure Two-Party Computation with Low Communication.
In: IACR Cryptology ePrint Archive, 2011
Artikel, Bibliographie
Dziembowski, Stefan ; Faust, Sebastian (2011)
Leakage-Resilient Cryptography From the Inner-Product Extractor.
In: IACR Cryptology ePrint Archive, 2011
Artikel, Bibliographie
Faust, Sebastian ; Kiltz, Eike ; Pietrzak, Krzysztof ; Rothblum, Guy N. (2009)
Leakage-Resilient Signatures.
In: IACR Cryptology ePrint Archive, 2009
Artikel, Bibliographie
Faust, Sebastian ; Reyzin, Leonid ; Tromer, Eran (2009)
Protecting Circuits from Computationally-Bounded Leakage.
In: IACR Cryptology ePrint Archive, 2009
Artikel, Bibliographie
Konferenzveröffentlichung
Das, Poulami ; Erwig, Andreas ; Faust, Sebastian (2024)
Shared-Custodial Password-Authenticated Deterministic Wallets.
14th International Conference on Security and Cryptography for Networks (SCN 2024). Amalfi, Italy (11.09.2024 - 13.09.2024)
doi: 10.1007/978-3-031-71073-5_16
Konferenzveröffentlichung, Bibliographie
Berti, Francesco (2023)
Reconsidering Generic Composition: the modes A10, A11 and A12 are insecure.
28th Australasian Conference on Information Security and Privacy. Brisbane, Australia (05.07.2023-07.07.2023)
doi: 10.1007/978-3-031-35486-1
Konferenzveröffentlichung, Bibliographie
Frassetto, Tommaso ; Jauernig, Patrick ; Koisser, David ; Kretzler, David ; Schlosser, Benjamin ; Faust, Sebastian ; Sadeghi, Ahmad-Reza (2023)
POSE: Practical Off-chain Smart Contract Execution.
Network and Distributed System Security Symposium 2023. San Diego, USA (27.02.2023-03.03.2023)
Konferenzveröffentlichung, Bibliographie
Faust, Sebastian ; Hazay, Carmit ; Kretzler, David ; Schlosser, Benjamin (2023)
Putting the Online Phase on a Diet: Covert Security from Short MACs.
CT-RSA 2023: The Cryptographers' Track at RSA Conference. San Francisco, USA (24.04.2023-27.04.2023)
Konferenzveröffentlichung, Bibliographie
Erwig, Andreas ; Riahi, Siavash (2022)
Deterministic Wallets for Adaptor Signatures.
27th European Symposium on Research in Computer Security (ESORICS 2022). Copenhagen, Denmark (26.09.2022-30.09.2022)
doi: 10.1007/978-3-031-17146-8_24
Konferenzveröffentlichung, Bibliographie
Faust, Sebastian ; Krämer, Juliane ; Orlt, Maximilian ; Struck, Patrick (2022)
On the Related-Key Attack Security of Authenticated Encryption Schemes.
13th Conference on Security and Cryptography for Networks. Amalfi, Italy (12.09.2022-14.09.2022)
doi: 10.1007/978-3-031-14791-3_16
Konferenzveröffentlichung, Bibliographie
Das, Poulami ; Hesse, Julia ; Lehmann, Anja (2022)
DPaSE: Distributed Password-Authenticated Symmetric-Key Encryption, or How to Get Many Keys from One Password.
2022 ACM on Asia Conference on Computer and Communications Security. Nagasaki, Japan (30.05.2022-02.06.2022)
doi: 10.1145/3488932.3517389
Konferenzveröffentlichung, Bibliographie
Brian, Gianluca ; Faust, Sebastian ; Micheli, Elena ; Venturi, Daniele (2022)
Continuously Non-malleable Codes Against Bounded-Depth Tampering.
28th International Conference on the Theory and Application of Cryptology and Information Security. Taipei, Taiwan (05.12.2022-09.12.2022)
doi: 10.1007/978-3-031-22972-5_14
Konferenzveröffentlichung, Bibliographie
Faust, Sebastian ; Hazay, Carmit ; Kretzler, David ; Schlosser, Benjamin (2022)
Financially Backed Covert Security.
International Conference on Practice and Theory of Public-Key Cryptography 2022. virtual Conference (08.03.2022-11.03.2022)
doi: 10.1007/978-3-030-97131-1_4
Konferenzveröffentlichung, Bibliographie
Berti, Francesco ; Bhasin, Shivam ; Breier, Jakob ; Hou, Xiaolu ; Poussier, Romain ; Standaert, François-Xavier ; Udvarhelyi, Balasz (2022)
A Finer-Grain Analysis of the Leakage (Non) Resilience of OCB.
Conference on Cryptographic Hardware and Embedded Systems (CHES 2022). Leuven, Belgium (18.09.2022-21.09.2022)
doi: 10.46586/tches.v2022.i1.461-481
Konferenzveröffentlichung, Bibliographie
Avarikioti, Zeta ; Litos, Orfeas Stefanos Thyfronitis (2022)
Suborn Channels: Incentives Against Timelock Bribes.
26th International Conference of Financial Cryptography. Grenada (02.05.2022-06.05.2022)
doi: 10.1007/978-3-031-18283-9_24
Konferenzveröffentlichung, Bibliographie
Das, Poulami ; Erwig, Andreas ; Faust, Sebastian ; Loss, Julian ; Riahi, Siavash (2021)
The Exact Security of BIP32 Wallets.
27th ACM Conference on Computer and Communications Security. virtual Conference (15.11.2021-19.11.2021)
doi: 10.1145/3460120.3484807
Konferenzveröffentlichung, Bibliographie
Agrawal, Shweta ; Maitra, Monosij ; Vempati, Narasimha Sai ; Yamada, Shota
Hrsg.: Malkin, Tal ; Peikert, Chris (2021)
Functional Encryption for Turing Machines with Dynamic Bounded Collusion from LWE.
41st Annual International Cryptology Conference (CRYPTO 2021). virtual Conference (16.08.2021-20.08.2021)
doi: 10.1007/978-3-030-84259-8_9
Konferenzveröffentlichung, Bibliographie
Dziembowski, Stefan ; Fabiański, Grzegorz ; Faust, Sebastian ; Riahi, Siavash
Hrsg.: Lee, James R. (2021)
Lower Bounds for Off-Chain Protocols: Exploring the Limits of Plasma.
virtual Conference (06.01.2021-08.01.2021)
doi: 10.4230/LIPIcs.ITCS.2021.72
Konferenzveröffentlichung, Bibliographie
Faust, Sebastian ; Hazay, Carmit ; Kretzler, David ; Schlosser, Benjamin (2021)
Generic Compiler for Publicly Verifiable Covert Multi-Party Computation.
40th Annual International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt 2021). Zagreb, Croatia (17.10.2021-21.10.2021)
Konferenzveröffentlichung, Bibliographie
Erwig, Andreas ; Faust, Sebastian ; Hostáková, Kristina ; Maitra, Monosij ; Riahi, Siavash (2021)
Two-Party Adaptor Signatures From Identification Schemes.
24th International Conference on Practice and Theory of Public-Key Cryptography. virtual Conference (09.05.2021-13.05.2021)
Konferenzveröffentlichung, Bibliographie
Aumayr, Lukas ; Ersoy, Oguzhan ; Erwig, Andreas ; Faust, Sebastian ; Hostáková, Kristina ; Maffei, Matteo ; Moreno-Sanchez, Pedro ; Riahi, Siavash (2021)
Bitcoin-Compatible Virtual Channels.
42nd IEEE Symposium on Security and Privacy. virtual Conference (23.05.2021-27.05.2021)
Konferenzveröffentlichung, Bibliographie
Kiayias, Aggelos ; Thyfronitis Litos, Orfeas Stefanos (2020)
A Composable Security Treatment of the Lightning Network.
33rd IEEE Computer Security Foundations Symposium (CSF 2020). virtual Conference (22.06.2020-26.06.2020)
doi: 10.1109/CSF49147.2020.00031
Konferenzveröffentlichung, Bibliographie
Avarikioti, Zeta ; Thyfronitis Litos, Orfeas Stefanos ; Wattenhofer, Roger (2020)
Cerberus Channels: Incentivizing Watchtowers for Bitcoin.
24th International Conference on Financial Cryptography and Data Security. Kota Kinabalu, Malaysia (10.02.2020-14.02.2020)
doi: 10.1007/978-3-030-51280-4_19
Konferenzveröffentlichung, Bibliographie
Agrawal, Shweta ; Libert, Benoit ; Maitra, Monosij ; Titiu, Radu (2020)
Adaptive simulation security for inner product functional encryption.
23rd IACR International Conference on Practice and Theory of Public-Key Cryptography(PKC 2020). virtual Conference (01.06.2020-04.06.2020)
doi: 10.1007/978-3-030-45374-9_2
Konferenzveröffentlichung, Bibliographie
Alkeilani Alkadri, Nabil ; Das, Poulami ; Erwig, Andreas ; Faust, Sebastian ; Krämer, Juliane ; Riahi, Siavash ; Struck, Patrick (2020)
Deterministic Wallets in a Quantum World.
The 27th ACM Conference on Computer and Communications Security (CCS 2020). virtual Conference (09.11.2020-13.11.2020)
Konferenzveröffentlichung, Bibliographie
Erwig, Andreas ; Hesse, Julia ; Orlt, Maximilian ; Riahi, Siavash (2020)
Fuzzy Asymmetric Password-Authenticated Key Exchange.
26th Annual International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt 2020). virtual Conference (07.12.2020-11.12.2020)
Konferenzveröffentlichung, Bibliographie
Eckey, Lisa ; Faust, Sebastian ; Schlosser, Benjamin (2020)
OptiSwap: Fast Optimistic Fair Exchange.
15th ACM Asia Conference on Computer and Communications Security (ASIA CCS '20). virtual Conference (05.10.2020-09.10.2020)
doi: 10.1145/3320269.3384749
Konferenzveröffentlichung, Bibliographie
Lohr, Matthias ; Schlosser, Benjamin ; Jürjens, Jan ; Staab, Matthias (2020)
Cost Fairness for Blockchain-Based Two-Party Exchang Protocols.
3rd IEEE International Conference on Blockchain. virtual Conference (02.11.2020-06.11.2020)
Konferenzveröffentlichung, Bibliographie
Das, Poulami ; Faust, Sebastian ; Loss, Julian (2019)
A Formal Treatment of Deterministic Wallets.
ACM CCS 2019 - Symposium on Computer and Communications Security. London, UK (11.11.2019-11.11.2019)
Konferenzveröffentlichung, Bibliographie
Agrawal, Shweta ; Maitra, Monosij ; Yamada, Shota (2019)
Attribute Based Encryption for Deterministic Finite Automata from DLIN.
17th International Confernce on Theory of Cryptography Conference (TCC 2019). Nuremberg, Germany (01.12.2019-05.12.2019)
doi: 10.1007/978-3-030-36033-7_4
Konferenzveröffentlichung, Bibliographie
Agrawal, Shweta ; Maitra, Monosij ; Yamada, Shota (2019)
Attribute based encryption (and more) for nondeterministic finite automata from LWE.
39th Annual International Cryptology Conference (CRYPTO 2019). Santa Barbara, USA (18.08.2019-22.08.2019)
doi: 10.1007/978-3-030-26951-7_26
Konferenzveröffentlichung, Bibliographie
Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian ; Hesse, Julia ; Hostakova, Kristina (2019)
Multiparty Virtual State Channels.
38th Annual International Conference on the Theory and Applications of Cryptographic Techniques.
Konferenzveröffentlichung, Bibliographie
Kiayias, Aggelos ; Livshits, Benjamin ; Monteoliva Mosteiro, Andrés ; Thyfronitis Litos, Orfeas Stefanos (2019)
A Puff of Steem: Security Analysis of Decentralized Content Curation.
International Conference on Blockchain Economics, Security and Protocols (Tokenomics 2019). Paris, France (06.05.2019-07.05.2019)
doi: 10.4230/OASIcs.Tokenomics.2019.3
Konferenzveröffentlichung, Bibliographie
Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian ; Malinowski, Daniel (2019)
Perun: Virtual Payment Hubs over Cryptocurrencies.
39th IEEE Symposium on Security and Privacy. THE HYATT REGENCY, SAN FRANCISCO, CA (21.05.2018-23.05.2018)
Konferenzveröffentlichung, Bibliographie
Dziembowski, Stefan ; Faust, Sebastian ; Zebrowski, Karol (2019)
Simple Refreshing in the Noisy Leakage Model.
The 25th Annual International Conference on the Theory and Application of Cryptology and Information Security. Kobe, Japan (08.12.2019-12.12.2019)
Konferenzveröffentlichung, Bibliographie
Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian (2018)
FairSwap: How to fairly exchange digital goods.
25th ACM Conference on Computer and Communications Security (CCS). Toronto, Canada (15.10.2018-19.10.2018)
Konferenzveröffentlichung, Bibliographie
Dziembowski, Stefan ; Faust, Sebastian ; Hostakova, Kristina (2018)
General State Channel Networks.
25th ACM Conference on Computer and Communications Security (CCS). Toronto, Canada (15.10.2018-19.10.2018)
doi: 10.1145/3243734.3243856
Konferenzveröffentlichung, Bibliographie
Agrawal, Shweta ; Maitra, Monosij (2018)
FE and iO for turing machines from minimal assumptions.
16th International Confernce on Theory of Cryptography Conference (TCC 2018). Panaji, India (11.11.2018-14.11.2018)
doi: 10.1007/978-3-030-03810-6_18
Konferenzveröffentlichung, Bibliographie
Thyfronitis Litos, Orfeas Stefanos ; Zindros, Dionysis (2017)
Trust Is Risk: A Decentralized Financial Trust Platform.
21st International Conference on Financial Cryptography and Data Security. Sliema, Malta (03.04.2017-07.04.2017)
doi: 10.1007/978-3-319-70972-7_19
Konferenzveröffentlichung, Bibliographie
Escudeiro, Nuno ; Escudeiro, Paula ; Soares, Fernando ; Thyfronitis Litos, Orfeas Stefanos ; Norberto, Marcelo ; Lopes, Jorge (2017)
Recognition of hand configuration: A critical factor in automatic sign language translation.
12th Iberian Conference on Information Systems and Technologies (CISTI). Lisbon, Portugal (21.06.2017-24.06.2017)
doi: 10.23919/CISTI.2017.7975724
Konferenzveröffentlichung, Bibliographie
Balasch, Josep ; Faust, Sebastian ; Gierlichs, Benedikt ; Paglialonga, Clara ; Standaert, Francois-Xavier (2017)
Consolidating Inner Product Masking.
Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I.
doi: 10.1007/978-3-319-70694-8_25
Konferenzveröffentlichung, Bibliographie
Faust, Sebastian ; Paglialonga, Clara ; Schneider, Tobias (2017)
Amortizing Randomness Complexity in Private Circuits.
Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I.
doi: 10.1007/978-3-319-70694-8_27
Konferenzveröffentlichung, Bibliographie
Faust, Sebastian ; Hostakova, Kristina ; Mukherjee, Pratyay ; Venturi, Daniele (2017)
Non-Malleable Codes for Space-Bounded Tampering.
Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part II.
doi: 10.1007/978-3-319-63715-0_4
Konferenzveröffentlichung, Bibliographie
Barthe, Gilles ; Dupressoir, Francois ; Faust, Sebastian ; Gregoire, Benjamin ; Standaert, Francois-Xavier ; Strub, Pierre-Yves (2017)
Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model.
Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part I.
doi: 10.1007/978-3-319-56620-7_19
Konferenzveröffentlichung, Bibliographie
Brody, Joshua ; Dziembowski, Stefan ; Faust, Sebastian ; Pietrzak, Krzysztof (2017)
Position-Based Cryptography and Multiparty Communication Complexity.
Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I.
doi: 10.1007/978-3-319-70500-2_3
Konferenzveröffentlichung, Bibliographie
Dziembowski, Stefan ; Faust, Sebastian ; Standaert, Francois-Xavier (2016)
Private Circuits III: Hardware Trojan-Resilience via Testing Amplification.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016.
doi: 10.1145/2976749.2978419
Konferenzveröffentlichung, Bibliographie
Dziembowski, Stefan ; Faust, Sebastian ; Herold, Gottfried ; Journault, Anthony ; Masny, Daniel ; Standaert, Francois-Xavier (2016)
Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems.
Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part II.
doi: 10.1007/978-3-662-53008-5_10
Konferenzveröffentlichung, Bibliographie
Andrychowicz, Marcin ; Dziembowski, Stefan ; Faust, Sebastian (2016)
Circuit Compilers with O(1/log (n)) Leakage Rate.
Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II.
doi: 10.1007/978-3-662-49896-5_21
Konferenzveröffentlichung, Bibliographie
Faust, Sebastian ; Masny, Daniel ; Venturi, Daniele (2016)
Chosen-Ciphertext Security from Subset Sum.
Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I.
doi: 10.1007/978-3-662-49384-7_2
Konferenzveröffentlichung, Bibliographie
Dziembowski, Stefan ; Faust, Sebastian ; Skorski, Maciej (2016)
Optimal Amplification of Noisy Leakages.
Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part II.
doi: 10.1007/978-3-662-49099-0_11
Konferenzveröffentlichung, Bibliographie
Dziembowski, Stefan ; Faust, Sebastian ; Kolmogorov, Vladimir ; Pietrzak, Krzysztof (2015)
Proofs of Space.
Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II.
doi: 10.1007/978-3-662-48000-7_29
Konferenzveröffentlichung, Bibliographie
Andrychowicz, Marcin ; Damgard, Ivan ; Dziembowski, Stefan ; Faust, Sebastian ; Polychroniadou, Antigoni (2015)
Efficient Leakage Resilient Circuit Compilers.
Topics in Cryptology - CT-RSA 2015, The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings.
doi: 10.1007/978-3-319-16715-2_17
Konferenzveröffentlichung, Bibliographie
Dziembowski, Stefan ; Faust, Sebastian ; Skorski, Maciej (2015)
Noisy Leakage Revisited.
Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II.
doi: 10.1007/978-3-662-46803-6_6
Konferenzveröffentlichung, Bibliographie
Duc, Alexandre ; Faust, Sebastian ; Standaert, Francois-Xavier (2015)
Making Masking Security Proofs Concrete - Or How to Evaluate the Security of Any Leaking Device.
Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I.
doi: 10.1007/978-3-662-46800-5_16
Konferenzveröffentlichung, Bibliographie
Balasch, Josep ; Faust, Sebastian ; Gierlichs, Benedikt (2015)
Inner Product Masking Revisited.
Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I.
doi: 10.1007/978-3-662-46800-5_19
Konferenzveröffentlichung, Bibliographie
Damgard, Ivan ; Faust, Sebastian ; Mukherjee, Pratyay ; Venturi, Daniele (2015)
The Chaining Lemma and Its Application.
Information Theoretic Security - 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings.
doi: 10.1007/978-3-319-17470-9_11
Konferenzveröffentlichung, Bibliographie
Faust, Sebastian ; Mukherjee, Pratyay ; Nielsen, Jesper Buus ; Venturi, Daniele (2015)
A Tamper and Leakage Resilient von Neumann Architecture.
Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings.
doi: 10.1007/978-3-662-46447-2_26
Konferenzveröffentlichung, Bibliographie
Maitra, M. ; Mukherjee, A. (2014)
Convergence of the Min-Sum Decoding Scheme for LDPC Codes from a Dynamical Systems Perspective.
4th International Conference of Emerging Applications of Information Technology. Kolkata, India (19.12.2014-21.12.2014)
doi: 10.1109/EAIT.2014.40
Konferenzveröffentlichung, Bibliographie
Faust, Sebastian ; Mukherjee, Pratyay ; Venturi, Daniele ; Wichs, Daniel (2014)
Efficient Non-malleable Codes and Key-Derivation for Poly-size Tampering Circuits.
Advances in Cryptology - EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings.
doi: 10.1007/978-3-642-55220-5_7
Konferenzveröffentlichung, Bibliographie
Duc, Alexandre ; Dziembowski, Stefan ; Faust, Sebastian (2014)
Unifying Leakage Models: From Probing Attacks to Noisy Leakage.
Advances in Cryptology - EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings.
doi: 10.1007/978-3-642-55220-5_24
Konferenzveröffentlichung, Bibliographie
Faust, Sebastian ; Mukherjee, Pratyay ; Nielsen, Jesper Buus ; Venturi, Daniele (2014)
Continuous Non-malleable Codes.
Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings.
doi: 10.1007/978-3-642-54242-8_20
Konferenzveröffentlichung, Bibliographie
Damgard, Ivan ; Faust, Sebastian ; Mukherjee, Pratyay ; Venturi, Daniele (2013)
Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier.
Advances in Cryptology - ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II.
doi: 10.1007/978-3-642-42045-0_8
Konferenzveröffentlichung, Bibliographie
Grosso, Vincent ; Standaert, Francois-Xavier ; Faust, Sebastian (2013)
Masking vs. Multiparty Computation: How Large Is the Gap for AES?
Cryptographic Hardware and Embedded Systems - CHES 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings.
doi: 10.1007/978-3-642-40349-1_23
Konferenzveröffentlichung, Bibliographie
Faust, Sebastian ; Hazay, Carmit ; Venturi, Daniele (2013)
Outsourced Pattern Matching.
Automata, Languages, and Programming - 40th International Colloquium, ICALP 2013, Riga, Latvia, July 8-12, 2013, Proceedings, Part II.
doi: 10.1007/978-3-642-39212-2_48
Konferenzveröffentlichung, Bibliographie
Faust, Sebastian ; Hazay, Carmit ; Nielsen, Jesper Buus ; Nordholt, Peter Sebastian ; Zottarel, Angela (2012)
Signature Schemes Secure against Hard-to-Invert Leakage.
Advances in Cryptology - ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings.
doi: 10.1007/978-3-642-34961-4_8
Konferenzveröffentlichung, Bibliographie
Balasch, Josep ; Faust, Sebastian ; Gierlichs, Benedikt ; Verbauwhede, Ingrid (2012)
Theory and Practice of a Leakage Resilient Masking Scheme.
Advances in Cryptology - ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings.
doi: 10.1007/978-3-642-34961-4_45
Konferenzveröffentlichung, Bibliographie
Faust, Sebastian ; Pietrzak, Krzysztof ; Schipper, Joachim (2012)
Practical Leakage-Resilient Symmetric Cryptography.
Cryptographic Hardware and Embedded Systems - CHES 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings.
doi: 10.1007/978-3-642-33027-8_13
Konferenzveröffentlichung, Bibliographie
Faust, Sebastian ; Kohlweiss, Markulf ; Marson, Giorgia Azzurra ; Venturi, Daniele (2012)
On the Non-malleability of the Fiat-Shamir Transform.
Progress in Cryptology - INDOCRYPT 2012, 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings.
doi: 10.1007/978-3-642-34931-7_5
Konferenzveröffentlichung, Bibliographie
Damgard, Ivan ; Faust, Sebastian ; Hazay, Carmit (2012)
Secure Two-Party Computation with Low Communication.
Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings.
doi: 10.1007/978-3-642-28914-9_4
Konferenzveröffentlichung, Bibliographie
Dziembowski, Stefan ; Faust, Sebastian (2012)
Leakage-Resilient Circuits without Computational Assumptions.
Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings.
doi: 10.1007/978-3-642-28914-9_13
Konferenzveröffentlichung, Bibliographie
Dziembowski, Stefan ; Faust, Sebastian (2011)
Leakage-Resilient Cryptography from the Inner-Product Extractor.
Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings.
doi: 10.1007/978-3-642-25385-0_38
Konferenzveröffentlichung, Bibliographie
Faust, Sebastian ; Pietrzak, Krzysztof ; Venturi, Daniele (2011)
Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience.
Automata, Languages and Programming - 38th International Colloquium, ICALP 2011, Zurich, Switzerland, July 4-8, 2011, Proceedings, Part I.
doi: 10.1007/978-3-642-22006-7_33
Konferenzveröffentlichung, Bibliographie
Faust, Sebastian ; Rabin, Tal ; Reyzin, Leonid ; Tromer, Eran ; Vaikuntanathan, Vinod (2010)
Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases.
Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 - June 3, 2010. Proceedings.
doi: 10.1007/978-3-642-13190-5_7
Konferenzveröffentlichung, Bibliographie
Faust, Sebastian ; Kiltz, Eike ; Pietrzak, Krzysztof ; Rothblum, Guy N. (2010)
Leakage-Resilient Signatures.
Theory of Cryptography, 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings.
doi: 10.1007/978-3-642-11799-2_21
Konferenzveröffentlichung, Bibliographie
Faust, Sebastian ; Käsper, Emilia ; Lucks, Stefan (2008)
Efficient Simultaneous Broadcast.
Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings.
doi: 10.1007/978-3-540-78440-1_11
Konferenzveröffentlichung, Bibliographie
Danezis, George ; Diaz, Claudia ; Faust, Sebastian ; Käsper, Emilia ; Troncoso, Carmela ; Preneel, Bart (2007)
Efficient Negative Databases from Cryptographic Hash Functions.
Information Security, 10th International Conference, ISC 2007, Valparaiso, Chile, October 9-12, 2007, Proceedings.
doi: 10.1007/978-3-540-75496-1_28
Konferenzveröffentlichung, Bibliographie
Kohlweiss, Markulf ; Faust, Sebastian ; Fritsch, Lothar ; Gedrojc, Bartek ; Preneel, Bart (2007)
Efficient Oblivious Augmented Maps: Location-Based Services with a Payment Broker.
Privacy Enhancing Technologies, 7th International Symposium, PET 2007 Ottawa, Canada, June 20-22, 2007, Revised Selected Papers.
doi: 10.1007/978-3-540-75551-7_6
Konferenzveröffentlichung, Bibliographie
Report
Erwig, Andreas ; Faust, Sebastian ; Hostáková, Kristina ; Maitra, Monosij ; Riahi, Siavash (2021)
Two-Party Adaptor Signatures From Identification Schemes.
Report, Bibliographie
Dissertation
Orlt, Maximilian (2024)
Leakage and Fault Resilience of Cryptographic Implementations.
Technische Universität Darmstadt
doi: 10.26083/tuprints-00027794
Dissertation, Erstveröffentlichung, Verlagsversion
Das, Poulami (2023)
Secure Infrastructures in the Realm of Decentralization.
Technische Universität Darmstadt
doi: 10.26083/tuprints-00024422
Dissertation, Erstveröffentlichung, Verlagsversion
Erwig, Andreas (2023)
Provably Secure Advanced Cryptographic Wallets.
Technische Universität Darmstadt
doi: 10.26083/tuprints-00024454
Dissertation, Erstveröffentlichung, Verlagsversion
Riahi, Siavash (2023)
On the (im)possibility of building off-chain protocols from minimal assumptions.
Technische Universität Darmstadt
doi: 10.26083/tuprints-00024399
Dissertation, Erstveröffentlichung, Verlagsversion
Alkeilani Alkadri, Nabil (2022)
On Lattice-Based Signatures with Advanced Functionalities.
Technische Universität Darmstadt
doi: 10.26083/tuprints-00020793
Dissertation, Erstveröffentlichung, Verlagsversion
Hostáková, Kristina (2021)
Foundations of Generalized State Channel Networks.
Technische Universität Darmstadt
doi: 10.26083/tuprints-00017476
Dissertation, Erstveröffentlichung, Verlagsversion
Paglialonga, Clara (2021)
Provable Secure Countermeasures Against Side-Channel Attacks.
Technische Universität Darmstadt
doi: 10.26083/tuprints-00018597
Dissertation, Erstveröffentlichung, Verlagsversion
Berti, Francesco (2020)
Authentication in the presence of side-channel leakage.
Université Catholique de Louvain
Dissertation, Bibliographie
Maitra, Monosij (2020)
Fine-Grained Encryption for Uniform Models of Computation.
Indian Institute of Technology of Madras
Dissertation, Bibliographie
Eckey, Lisa (2020)
Blockchain Scalability through Secure Optimistic Protocols.
Technische Universität Darmstadt
doi: 10.25534/tuprints-00014041
Dissertation, Erstveröffentlichung, Verlagsversion
Masterarbeit
Villeneuve, Come du Crest de (2018)
Evaluation of the Efficiency of different Architectures and Pathfinding Algorithms.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Wijden, Marius van der (2018)
Payment and State Channels in practice.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Amler, Hendrik (2018)
Evaluation of payment channel networks for micropayments.
Technische Universität Darmstadt
Masterarbeit, Bibliographie
Varky, Jacek (2018)
TeePay – Using Trusted Execution Environments for Off-chain Payment.
Technische Universität Darmstadt
Masterarbeit, Bibliographie