TU Darmstadt / ULB / TUbiblio

Einträge mit Organisationseinheit "20 Fachbereich Informatik > Angewandte Kryptographie"

Exportieren als [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Gruppiere nach: Autor(en) | Publikationsjahr | Typ des Eintrags | Sprache | Keine Gruppierung
Es werden nur Einträge angezeigt, bei denen keine untergeordnete Organisationseinheit ausgewählt wurde. Anzahl: 125.

Artikel

Arnold, Paula ; Berndt, Sebastian ; Eisenbarth, Thomas ; Orlt, Maximilian (2024)
Polynomial sharings on two secrets: Buy one, get one free.
In: Transactions on Cryptographic Hardware and Embedded System, 2024 (3)
doi: 10.46586/tches.v2024.i3.671-706
Artikel, Bibliographie

Faust, Sebastian ; Hazay, Carmit ; Venturi, Daniele (2018)
Outsourced pattern matching.
In: Int. J. Inf. Sec., 17 (3)
doi: 10.1007/s10207-017-0374-0
Artikel, Bibliographie

Balasch, Josep ; Faust, Sebastian ; Gierlichs, Benedikt ; Paglialonga, Clara ; Standaert, Francois-Xavier (2017)
Consolidating Inner Product Masking.
In: Cryptology ePrint Archive, 2017 (1047)
Artikel, Bibliographie

Damgard, Ivan ; Faust, Sebastian ; Mukherjee, Pratyay ; Venturi, Daniele (2017)
Bounded Tamper Resilience: How to Go Beyond the Algebraic Barrier.
In: J. Cryptology, 30 (1)
doi: 10.1007/s00145-015-9218-0
Artikel, Bibliographie

Faust, Sebastian ; Hostakova, Kristina ; Mukherjee, Pratyay ; Venturi, Daniele (2017)
Non-Malleable Codes for Space-Bounded Tampering.
In: IACR Cryptology ePrint Archive, 2017
Artikel, Bibliographie

Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian ; Malinowski, Daniel (2017)
PERUN: Virtual Payment Channels over Cryptographic Currencies.
In: IACR Cryptology ePrint Archive, 2017
Artikel, Bibliographie

Faust, Sebastian ; Grosso, Vincent ; Pozo, Santos Merino Del ; Paglialonga, Clara ; Standaert, Francois-Xavier (2017)
Composable Masking Schemes in the Presence of Physical Defaults and the Robust Probing Model.
In: IACR Cryptology ePrint Archive, 2017
Artikel, Bibliographie

Faust, Sebastian ; Paglialonga, Clara ; Schneider, Tobias (2017)
Amortizing Randomness Complexity in Private Circuits.
In: IACR Cryptology ePrint Archive, 2017
Artikel, Bibliographie

Eckey, Lisa ; Faust, Sebastian ; Loss, Julian (2017)
Efficient Algorithms for Broadcast and Consensus Based on Proofs of Work.
In: IACR Cryptology ePrint Archive, 2017
Artikel, Bibliographie

Faust, Sebastian ; Hazay, Carmit ; Nielsen, Jesper Buus ; Nordholt, Peter Sebastian ; Zottarel, Angela (2016)
Signature Schemes Secure Against Hard-to-Invert Leakage.
In: J. Cryptology, 29 (2)
doi: 10.1007/s00145-015-9197-1
Artikel, Bibliographie

Faust, Sebastian ; Mukherjee, Pratyay ; Venturi, Daniele ; Wichs, Daniel (2016)
Efficient Non-Malleable Codes and Key Derivation for Poly-Size Tampering Circuits.
In: IEEE Trans. Information Theory, 62 (12)
doi: 10.1109/TIT.2016.2613919
Artikel, Bibliographie

Andrychowicz, Marcin ; Dziembowski, Stefan ; Faust, Sebastian (2016)
Circuit Compilers with O(1/ log(n)) Leakage Rate.
In: IACR Cryptology ePrint Archive, 2016
Artikel, Bibliographie

Brody, Joshua ; Dziembowski, Stefan ; Faust, Sebastian ; Pietrzak, Krzysztof (2016)
Position-Based Cryptography and Multiparty Communication Complexity.
In: IACR Cryptology ePrint Archive, 2016
Artikel, Bibliographie

Dziembowski, Stefan ; Faust, Sebastian ; Herold, Gottfried ; Journault, Anthony ; Masny, Daniel ; Standaert, Francois-Xavier (2016)
Towards Sound Fresh Re-Keying with Hard (Physical) Learning Problems.
In: IACR Cryptology ePrint Archive, 2016
Artikel, Bibliographie

Barthe, Gilles ; Dupressoir, Francois ; Faust, Sebastian ; Gregoire, Benjamin ; Standaert, Francois-Xavier ; Strub, Pierre-Yves (2016)
Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model.
In: IACR Cryptology ePrint Archive, 2016
Artikel, Bibliographie

Dziembowski, Stefan ; Faust, Sebastian ; Standaert, Francois-Xavier (2016)
Private Circuits III: Hardware Trojan-Resilience via Testing Amplification.
In: IACR Cryptology ePrint Archive, 2016
Artikel, Bibliographie

Balasch, Josep ; Faust, Sebastian ; Gierlichs, Benedikt (2015)
Inner Product Masking Revisited.
In: IACR Cryptology ePrint Archive, 2015
Artikel, Bibliographie

Duc, Alexandre ; Faust, Sebastian ; Standaert, Francois-Xavier (2015)
Making Masking Security Proofs Concrete Or How to Evaluate the Security of any Leaking Device.
In: IACR Cryptology ePrint Archive, 2015
Artikel, Bibliographie

Grosso, Vincent ; Standaert, Francois-Xavier ; Faust, Sebastian (2015)
Masking vs. Multiparty Computation: How Large is the Gap for AES?
In: IACR Cryptology ePrint Archive, 2015
Artikel, Bibliographie

Faust, Sebastian ; Masny, Daniel ; Venturi, Daniele (2015)
Chosen-Ciphertext Security from Subset Sum.
In: IACR Cryptology ePrint Archive, 2015
Artikel, Bibliographie

Grosso, Vincent ; Standaert, Francois-Xavier ; Faust, Sebastian (2014)
Masking vs. multiparty computation: how large is the gap for AES?
In: J. Cryptographic Engineering, 4 (1)
doi: 10.1007/s13389-014-0073-y
Artikel, Bibliographie

Faust, Sebastian ; Rabin, Tal ; Reyzin, Leonid ; Tromer, Eran ; Vaikuntanathan, Vinod (2014)
Protecting Circuits from Computationally Bounded and Noisy Leakage.
In: SIAM J. Comput., 43 (5)
doi: 10.1137/120880343
Artikel, Bibliographie

Duc, Alexandre ; Dziembowski, Stefan ; Faust, Sebastian (2014)
Unifying Leakage Models: from Probing Attacks to Noisy Leakage.
In: IACR Cryptology ePrint Archive, 2014
Artikel, Bibliographie

Faust, Sebastian ; Mukherjee, Pratyay ; Nielsen, Jesper Buus ; Venturi, Daniele (2014)
Continuous Non-malleable Codes.
In: IACR Cryptology ePrint Archive, 2014
Artikel, Bibliographie

Faust, Sebastian ; Mukherjee, Pratyay ; Nielsen, Jesper Buus ; Venturi, Daniele (2014)
A Tamper and Leakage Resilient Random Access Machine.
In: IACR Cryptology ePrint Archive, 2014
Artikel, Bibliographie

Faust, Sebastian ; Hazay, Carmit ; Venturi, Daniele (2014)
Outsourced Pattern Matching.
In: IACR Cryptology ePrint Archive, 2014
Artikel, Bibliographie

Damgard, Ivan ; Faust, Sebastian ; Mukherjee, Pratyay ; Venturi, Daniele (2014)
The Chaining Lemma and its application.
In: IACR Cryptology ePrint Archive, 2014
Artikel, Bibliographie

Damgard, Ivan ; Faust, Sebastian ; Mukherjee, Pratyay ; Venturi, Daniele (2013)
Bounded Tamper Resilience: How to go beyond the Algebraic Barrier.
In: IACR Cryptology ePrint Archive, 2013
Artikel, Bibliographie

Faust, Sebastian ; Mukherjee, Pratyay ; Venturi, Daniele ; Wichs, Daniel (2013)
Efficient Non-Malleable Codes and Key-Derivation for Poly-Size Tampering Circuits.
In: IACR Cryptology ePrint Archive, 2013
Artikel, Bibliographie

Dziembowski, Stefan ; Faust, Sebastian ; Kolmogorov, Vladimir ; Pietrzak, Krzysztof (2013)
Proofs of Space.
In: IACR Cryptology ePrint Archive, 2013
Artikel, Bibliographie

Faust, Sebastian ; Hazay, Carmit ; Nielsen, Jesper Buus ; Nordholt, Peter Sebastian ; Zottarel, Angela (2012)
Signature Schemes Secure against Hard-to-Invert Leakage.
In: IACR Cryptology ePrint Archive, 2012
Artikel, Bibliographie

Faust, Sebastian ; Kohlweiss, Markulf ; Marson, Giorgia Azzurra ; Venturi, Daniele (2012)
On the Non-malleability of the Fiat-Shamir Transform.
In: IACR Cryptology ePrint Archive, 2012
Artikel, Bibliographie

Faust, Sebastian ; Pietrzak, Krzysztof ; Venturi, Daniele (2011)
Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience.
In: IACR Cryptology ePrint Archive, 2011
Artikel, Bibliographie

Damgard, Ivan ; Faust, Sebastian ; Hazay, Carmit (2011)
Secure Two-Party Computation with Low Communication.
In: IACR Cryptology ePrint Archive, 2011
Artikel, Bibliographie

Dziembowski, Stefan ; Faust, Sebastian (2011)
Leakage-Resilient Cryptography From the Inner-Product Extractor.
In: IACR Cryptology ePrint Archive, 2011
Artikel, Bibliographie

Faust, Sebastian ; Kiltz, Eike ; Pietrzak, Krzysztof ; Rothblum, Guy N. (2009)
Leakage-Resilient Signatures.
In: IACR Cryptology ePrint Archive, 2009
Artikel, Bibliographie

Faust, Sebastian ; Reyzin, Leonid ; Tromer, Eran (2009)
Protecting Circuits from Computationally-Bounded Leakage.
In: IACR Cryptology ePrint Archive, 2009
Artikel, Bibliographie

Konferenzveröffentlichung

Das, Poulami ; Erwig, Andreas ; Faust, Sebastian (2024)
Shared-Custodial Password-Authenticated Deterministic Wallets.
14th International Conference on Security and Cryptography for Networks (SCN 2024). Amalfi, Italy (11.09.2024 - 13.09.2024)
doi: 10.1007/978-3-031-71073-5_16
Konferenzveröffentlichung, Bibliographie

Berti, Francesco (2023)
Reconsidering Generic Composition: the modes A10, A11 and A12 are insecure.
28th Australasian Conference on Information Security and Privacy. Brisbane, Australia (05.07.2023-07.07.2023)
doi: 10.1007/978-3-031-35486-1
Konferenzveröffentlichung, Bibliographie

Frassetto, Tommaso ; Jauernig, Patrick ; Koisser, David ; Kretzler, David ; Schlosser, Benjamin ; Faust, Sebastian ; Sadeghi, Ahmad-Reza (2023)
POSE: Practical Off-chain Smart Contract Execution.
Network and Distributed System Security Symposium 2023. San Diego, USA (27.02.2023-03.03.2023)
Konferenzveröffentlichung, Bibliographie

Faust, Sebastian ; Hazay, Carmit ; Kretzler, David ; Schlosser, Benjamin (2023)
Putting the Online Phase on a Diet: Covert Security from Short MACs.
CT-RSA 2023: The Cryptographers' Track at RSA Conference. San Francisco, USA (24.04.2023-27.04.2023)
Konferenzveröffentlichung, Bibliographie

Erwig, Andreas ; Riahi, Siavash (2022)
Deterministic Wallets for Adaptor Signatures.
27th European Symposium on Research in Computer Security (ESORICS 2022). Copenhagen, Denmark (26.09.2022-30.09.2022)
doi: 10.1007/978-3-031-17146-8_24
Konferenzveröffentlichung, Bibliographie

Faust, Sebastian ; Krämer, Juliane ; Orlt, Maximilian ; Struck, Patrick (2022)
On the Related-Key Attack Security of Authenticated Encryption Schemes.
13th Conference on Security and Cryptography for Networks. Amalfi, Italy (12.09.2022-14.09.2022)
doi: 10.1007/978-3-031-14791-3_16
Konferenzveröffentlichung, Bibliographie

Das, Poulami ; Hesse, Julia ; Lehmann, Anja (2022)
DPaSE: Distributed Password-Authenticated Symmetric-Key Encryption, or How to Get Many Keys from One Password.
2022 ACM on Asia Conference on Computer and Communications Security. Nagasaki, Japan (30.05.2022-02.06.2022)
doi: 10.1145/3488932.3517389
Konferenzveröffentlichung, Bibliographie

Brian, Gianluca ; Faust, Sebastian ; Micheli, Elena ; Venturi, Daniele (2022)
Continuously Non-malleable Codes Against Bounded-Depth Tampering.
28th International Conference on the Theory and Application of Cryptology and Information Security. Taipei, Taiwan (05.12.2022-09.12.2022)
doi: 10.1007/978-3-031-22972-5_14
Konferenzveröffentlichung, Bibliographie

Faust, Sebastian ; Hazay, Carmit ; Kretzler, David ; Schlosser, Benjamin (2022)
Financially Backed Covert Security.
International Conference on Practice and Theory of Public-Key Cryptography 2022. virtual Conference (08.03.2022-11.03.2022)
doi: 10.1007/978-3-030-97131-1_4
Konferenzveröffentlichung, Bibliographie

Berti, Francesco ; Bhasin, Shivam ; Breier, Jakob ; Hou, Xiaolu ; Poussier, Romain ; Standaert, François-Xavier ; Udvarhelyi, Balasz (2022)
A Finer-Grain Analysis of the Leakage (Non) Resilience of OCB.
Conference on Cryptographic Hardware and Embedded Systems (CHES 2022). Leuven, Belgium (18.09.2022-21.09.2022)
doi: 10.46586/tches.v2022.i1.461-481
Konferenzveröffentlichung, Bibliographie

Avarikioti, Zeta ; Litos, Orfeas Stefanos Thyfronitis (2022)
Suborn Channels: Incentives Against Timelock Bribes.
26th International Conference of Financial Cryptography. Grenada (02.05.2022-06.05.2022)
doi: 10.1007/978-3-031-18283-9_24
Konferenzveröffentlichung, Bibliographie

Das, Poulami ; Erwig, Andreas ; Faust, Sebastian ; Loss, Julian ; Riahi, Siavash (2021)
The Exact Security of BIP32 Wallets.
27th ACM Conference on Computer and Communications Security. virtual Conference (15.11.2021-19.11.2021)
doi: 10.1145/3460120.3484807
Konferenzveröffentlichung, Bibliographie

Agrawal, Shweta ; Maitra, Monosij ; Vempati, Narasimha Sai ; Yamada, Shota
Hrsg.: Malkin, Tal ; Peikert, Chris (2021)
Functional Encryption for Turing Machines with Dynamic Bounded Collusion from LWE.
41st Annual International Cryptology Conference (CRYPTO 2021). virtual Conference (16.08.2021-20.08.2021)
doi: 10.1007/978-3-030-84259-8_9
Konferenzveröffentlichung, Bibliographie

Dziembowski, Stefan ; Fabiański, Grzegorz ; Faust, Sebastian ; Riahi, Siavash
Hrsg.: Lee, James R. (2021)
Lower Bounds for Off-Chain Protocols: Exploring the Limits of Plasma.
virtual Conference (06.01.2021-08.01.2021)
doi: 10.4230/LIPIcs.ITCS.2021.72
Konferenzveröffentlichung, Bibliographie

Faust, Sebastian ; Hazay, Carmit ; Kretzler, David ; Schlosser, Benjamin (2021)
Generic Compiler for Publicly Verifiable Covert Multi-Party Computation.
40th Annual International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt 2021). Zagreb, Croatia (17.10.2021-21.10.2021)
Konferenzveröffentlichung, Bibliographie

Erwig, Andreas ; Faust, Sebastian ; Hostáková, Kristina ; Maitra, Monosij ; Riahi, Siavash (2021)
Two-Party Adaptor Signatures From Identification Schemes.
24th International Conference on Practice and Theory of Public-Key Cryptography. virtual Conference (09.05.2021-13.05.2021)
Konferenzveröffentlichung, Bibliographie

Aumayr, Lukas ; Ersoy, Oguzhan ; Erwig, Andreas ; Faust, Sebastian ; Hostáková, Kristina ; Maffei, Matteo ; Moreno-Sanchez, Pedro ; Riahi, Siavash (2021)
Bitcoin-Compatible Virtual Channels.
42nd IEEE Symposium on Security and Privacy. virtual Conference (23.05.2021-27.05.2021)
Konferenzveröffentlichung, Bibliographie

Kiayias, Aggelos ; Thyfronitis Litos, Orfeas Stefanos (2020)
A Composable Security Treatment of the Lightning Network.
33rd IEEE Computer Security Foundations Symposium (CSF 2020). virtual Conference (22.06.2020-26.06.2020)
doi: 10.1109/CSF49147.2020.00031
Konferenzveröffentlichung, Bibliographie

Avarikioti, Zeta ; Thyfronitis Litos, Orfeas Stefanos ; Wattenhofer, Roger (2020)
Cerberus Channels: Incentivizing Watchtowers for Bitcoin.
24th International Conference on Financial Cryptography and Data Security. Kota Kinabalu, Malaysia (10.02.2020-14.02.2020)
doi: 10.1007/978-3-030-51280-4_19
Konferenzveröffentlichung, Bibliographie

Agrawal, Shweta ; Libert, Benoit ; Maitra, Monosij ; Titiu, Radu (2020)
Adaptive simulation security for inner product functional encryption.
23rd IACR International Conference on Practice and Theory of Public-Key Cryptography(PKC 2020). virtual Conference (01.06.2020-04.06.2020)
doi: 10.1007/978-3-030-45374-9_2
Konferenzveröffentlichung, Bibliographie

Alkeilani Alkadri, Nabil ; Das, Poulami ; Erwig, Andreas ; Faust, Sebastian ; Krämer, Juliane ; Riahi, Siavash ; Struck, Patrick (2020)
Deterministic Wallets in a Quantum World.
The 27th ACM Conference on Computer and Communications Security (CCS 2020). virtual Conference (09.11.2020-13.11.2020)
Konferenzveröffentlichung, Bibliographie

Erwig, Andreas ; Hesse, Julia ; Orlt, Maximilian ; Riahi, Siavash (2020)
Fuzzy Asymmetric Password-Authenticated Key Exchange.
26th Annual International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt 2020). virtual Conference (07.12.2020-11.12.2020)
Konferenzveröffentlichung, Bibliographie

Eckey, Lisa ; Faust, Sebastian ; Schlosser, Benjamin (2020)
OptiSwap: Fast Optimistic Fair Exchange.
15th ACM Asia Conference on Computer and Communications Security (ASIA CCS '20). virtual Conference (05.10.2020-09.10.2020)
doi: 10.1145/3320269.3384749
Konferenzveröffentlichung, Bibliographie

Lohr, Matthias ; Schlosser, Benjamin ; Jürjens, Jan ; Staab, Matthias (2020)
Cost Fairness for Blockchain-Based Two-Party Exchang Protocols.
3rd IEEE International Conference on Blockchain. virtual Conference (02.11.2020-06.11.2020)
Konferenzveröffentlichung, Bibliographie

Das, Poulami ; Faust, Sebastian ; Loss, Julian (2019)
A Formal Treatment of Deterministic Wallets.
ACM CCS 2019 - Symposium on Computer and Communications Security. London, UK (11.11.2019-11.11.2019)
Konferenzveröffentlichung, Bibliographie

Agrawal, Shweta ; Maitra, Monosij ; Yamada, Shota (2019)
Attribute Based Encryption for Deterministic Finite Automata from DLIN.
17th International Confernce on Theory of Cryptography Conference (TCC 2019). Nuremberg, Germany (01.12.2019-05.12.2019)
doi: 10.1007/978-3-030-36033-7_4
Konferenzveröffentlichung, Bibliographie

Agrawal, Shweta ; Maitra, Monosij ; Yamada, Shota (2019)
Attribute based encryption (and more) for nondeterministic finite automata from LWE.
39th Annual International Cryptology Conference (CRYPTO 2019). Santa Barbara, USA (18.08.2019-22.08.2019)
doi: 10.1007/978-3-030-26951-7_26
Konferenzveröffentlichung, Bibliographie

Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian ; Hesse, Julia ; Hostakova, Kristina (2019)
Multiparty Virtual State Channels.
38th Annual International Conference on the Theory and Applications of Cryptographic Techniques.
Konferenzveröffentlichung, Bibliographie

Kiayias, Aggelos ; Livshits, Benjamin ; Monteoliva Mosteiro, Andrés ; Thyfronitis Litos, Orfeas Stefanos (2019)
A Puff of Steem: Security Analysis of Decentralized Content Curation.
International Conference on Blockchain Economics, Security and Protocols (Tokenomics 2019). Paris, France (06.05.2019-07.05.2019)
doi: 10.4230/OASIcs.Tokenomics.2019.3
Konferenzveröffentlichung, Bibliographie

Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian ; Malinowski, Daniel (2019)
Perun: Virtual Payment Hubs over Cryptocurrencies.
39th IEEE Symposium on Security and Privacy. THE HYATT REGENCY, SAN FRANCISCO, CA (21.05.2018-23.05.2018)
Konferenzveröffentlichung, Bibliographie

Dziembowski, Stefan ; Faust, Sebastian ; Zebrowski, Karol (2019)
Simple Refreshing in the Noisy Leakage Model.
The 25th Annual International Conference on the Theory and Application of Cryptology and Information Security. Kobe, Japan (08.12.2019-12.12.2019)
Konferenzveröffentlichung, Bibliographie

Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian (2018)
FairSwap: How to fairly exchange digital goods.
25th ACM Conference on Computer and Communications Security (CCS). Toronto, Canada (15.10.2018-19.10.2018)
Konferenzveröffentlichung, Bibliographie

Dziembowski, Stefan ; Faust, Sebastian ; Hostakova, Kristina (2018)
General State Channel Networks.
25th ACM Conference on Computer and Communications Security (CCS). Toronto, Canada (15.10.2018-19.10.2018)
doi: 10.1145/3243734.3243856
Konferenzveröffentlichung, Bibliographie

Agrawal, Shweta ; Maitra, Monosij (2018)
FE and iO for turing machines from minimal assumptions.
16th International Confernce on Theory of Cryptography Conference (TCC 2018). Panaji, India (11.11.2018-14.11.2018)
doi: 10.1007/978-3-030-03810-6_18
Konferenzveröffentlichung, Bibliographie

Thyfronitis Litos, Orfeas Stefanos ; Zindros, Dionysis (2017)
Trust Is Risk: A Decentralized Financial Trust Platform.
21st International Conference on Financial Cryptography and Data Security. Sliema, Malta (03.04.2017-07.04.2017)
doi: 10.1007/978-3-319-70972-7_19
Konferenzveröffentlichung, Bibliographie

Escudeiro, Nuno ; Escudeiro, Paula ; Soares, Fernando ; Thyfronitis Litos, Orfeas Stefanos ; Norberto, Marcelo ; Lopes, Jorge (2017)
Recognition of hand configuration: A critical factor in automatic sign language translation.
12th Iberian Conference on Information Systems and Technologies (CISTI). Lisbon, Portugal (21.06.2017-24.06.2017)
doi: 10.23919/CISTI.2017.7975724
Konferenzveröffentlichung, Bibliographie

Balasch, Josep ; Faust, Sebastian ; Gierlichs, Benedikt ; Paglialonga, Clara ; Standaert, Francois-Xavier (2017)
Consolidating Inner Product Masking.
Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I.
doi: 10.1007/978-3-319-70694-8_25
Konferenzveröffentlichung, Bibliographie

Faust, Sebastian ; Paglialonga, Clara ; Schneider, Tobias (2017)
Amortizing Randomness Complexity in Private Circuits.
Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I.
doi: 10.1007/978-3-319-70694-8_27
Konferenzveröffentlichung, Bibliographie

Faust, Sebastian ; Hostakova, Kristina ; Mukherjee, Pratyay ; Venturi, Daniele (2017)
Non-Malleable Codes for Space-Bounded Tampering.
Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part II.
doi: 10.1007/978-3-319-63715-0_4
Konferenzveröffentlichung, Bibliographie

Barthe, Gilles ; Dupressoir, Francois ; Faust, Sebastian ; Gregoire, Benjamin ; Standaert, Francois-Xavier ; Strub, Pierre-Yves (2017)
Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model.
Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part I.
doi: 10.1007/978-3-319-56620-7_19
Konferenzveröffentlichung, Bibliographie

Brody, Joshua ; Dziembowski, Stefan ; Faust, Sebastian ; Pietrzak, Krzysztof (2017)
Position-Based Cryptography and Multiparty Communication Complexity.
Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I.
doi: 10.1007/978-3-319-70500-2_3
Konferenzveröffentlichung, Bibliographie

Dziembowski, Stefan ; Faust, Sebastian ; Standaert, Francois-Xavier (2016)
Private Circuits III: Hardware Trojan-Resilience via Testing Amplification.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016.
doi: 10.1145/2976749.2978419
Konferenzveröffentlichung, Bibliographie

Dziembowski, Stefan ; Faust, Sebastian ; Herold, Gottfried ; Journault, Anthony ; Masny, Daniel ; Standaert, Francois-Xavier (2016)
Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems.
Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part II.
doi: 10.1007/978-3-662-53008-5_10
Konferenzveröffentlichung, Bibliographie

Andrychowicz, Marcin ; Dziembowski, Stefan ; Faust, Sebastian (2016)
Circuit Compilers with O(1/log (n)) Leakage Rate.
Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II.
doi: 10.1007/978-3-662-49896-5_21
Konferenzveröffentlichung, Bibliographie

Faust, Sebastian ; Masny, Daniel ; Venturi, Daniele (2016)
Chosen-Ciphertext Security from Subset Sum.
Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I.
doi: 10.1007/978-3-662-49384-7_2
Konferenzveröffentlichung, Bibliographie

Dziembowski, Stefan ; Faust, Sebastian ; Skorski, Maciej (2016)
Optimal Amplification of Noisy Leakages.
Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part II.
doi: 10.1007/978-3-662-49099-0_11
Konferenzveröffentlichung, Bibliographie

Dziembowski, Stefan ; Faust, Sebastian ; Kolmogorov, Vladimir ; Pietrzak, Krzysztof (2015)
Proofs of Space.
Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II.
doi: 10.1007/978-3-662-48000-7_29
Konferenzveröffentlichung, Bibliographie

Andrychowicz, Marcin ; Damgard, Ivan ; Dziembowski, Stefan ; Faust, Sebastian ; Polychroniadou, Antigoni (2015)
Efficient Leakage Resilient Circuit Compilers.
Topics in Cryptology - CT-RSA 2015, The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings.
doi: 10.1007/978-3-319-16715-2_17
Konferenzveröffentlichung, Bibliographie

Dziembowski, Stefan ; Faust, Sebastian ; Skorski, Maciej (2015)
Noisy Leakage Revisited.
Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II.
doi: 10.1007/978-3-662-46803-6_6
Konferenzveröffentlichung, Bibliographie

Duc, Alexandre ; Faust, Sebastian ; Standaert, Francois-Xavier (2015)
Making Masking Security Proofs Concrete - Or How to Evaluate the Security of Any Leaking Device.
Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I.
doi: 10.1007/978-3-662-46800-5_16
Konferenzveröffentlichung, Bibliographie

Balasch, Josep ; Faust, Sebastian ; Gierlichs, Benedikt (2015)
Inner Product Masking Revisited.
Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I.
doi: 10.1007/978-3-662-46800-5_19
Konferenzveröffentlichung, Bibliographie

Damgard, Ivan ; Faust, Sebastian ; Mukherjee, Pratyay ; Venturi, Daniele (2015)
The Chaining Lemma and Its Application.
Information Theoretic Security - 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings.
doi: 10.1007/978-3-319-17470-9_11
Konferenzveröffentlichung, Bibliographie

Faust, Sebastian ; Mukherjee, Pratyay ; Nielsen, Jesper Buus ; Venturi, Daniele (2015)
A Tamper and Leakage Resilient von Neumann Architecture.
Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings.
doi: 10.1007/978-3-662-46447-2_26
Konferenzveröffentlichung, Bibliographie

Maitra, M. ; Mukherjee, A. (2014)
Convergence of the Min-Sum Decoding Scheme for LDPC Codes from a Dynamical Systems Perspective.
4th International Conference of Emerging Applications of Information Technology. Kolkata, India (19.12.2014-21.12.2014)
doi: 10.1109/EAIT.2014.40
Konferenzveröffentlichung, Bibliographie

Faust, Sebastian ; Mukherjee, Pratyay ; Venturi, Daniele ; Wichs, Daniel (2014)
Efficient Non-malleable Codes and Key-Derivation for Poly-size Tampering Circuits.
Advances in Cryptology - EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings.
doi: 10.1007/978-3-642-55220-5_7
Konferenzveröffentlichung, Bibliographie

Duc, Alexandre ; Dziembowski, Stefan ; Faust, Sebastian (2014)
Unifying Leakage Models: From Probing Attacks to Noisy Leakage.
Advances in Cryptology - EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings.
doi: 10.1007/978-3-642-55220-5_24
Konferenzveröffentlichung, Bibliographie

Faust, Sebastian ; Mukherjee, Pratyay ; Nielsen, Jesper Buus ; Venturi, Daniele (2014)
Continuous Non-malleable Codes.
Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings.
doi: 10.1007/978-3-642-54242-8_20
Konferenzveröffentlichung, Bibliographie

Damgard, Ivan ; Faust, Sebastian ; Mukherjee, Pratyay ; Venturi, Daniele (2013)
Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier.
Advances in Cryptology - ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II.
doi: 10.1007/978-3-642-42045-0_8
Konferenzveröffentlichung, Bibliographie

Grosso, Vincent ; Standaert, Francois-Xavier ; Faust, Sebastian (2013)
Masking vs. Multiparty Computation: How Large Is the Gap for AES?
Cryptographic Hardware and Embedded Systems - CHES 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings.
doi: 10.1007/978-3-642-40349-1_23
Konferenzveröffentlichung, Bibliographie

Faust, Sebastian ; Hazay, Carmit ; Venturi, Daniele (2013)
Outsourced Pattern Matching.
Automata, Languages, and Programming - 40th International Colloquium, ICALP 2013, Riga, Latvia, July 8-12, 2013, Proceedings, Part II.
doi: 10.1007/978-3-642-39212-2_48
Konferenzveröffentlichung, Bibliographie

Faust, Sebastian ; Hazay, Carmit ; Nielsen, Jesper Buus ; Nordholt, Peter Sebastian ; Zottarel, Angela (2012)
Signature Schemes Secure against Hard-to-Invert Leakage.
Advances in Cryptology - ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings.
doi: 10.1007/978-3-642-34961-4_8
Konferenzveröffentlichung, Bibliographie

Balasch, Josep ; Faust, Sebastian ; Gierlichs, Benedikt ; Verbauwhede, Ingrid (2012)
Theory and Practice of a Leakage Resilient Masking Scheme.
Advances in Cryptology - ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings.
doi: 10.1007/978-3-642-34961-4_45
Konferenzveröffentlichung, Bibliographie

Faust, Sebastian ; Pietrzak, Krzysztof ; Schipper, Joachim (2012)
Practical Leakage-Resilient Symmetric Cryptography.
Cryptographic Hardware and Embedded Systems - CHES 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings.
doi: 10.1007/978-3-642-33027-8_13
Konferenzveröffentlichung, Bibliographie

Faust, Sebastian ; Kohlweiss, Markulf ; Marson, Giorgia Azzurra ; Venturi, Daniele (2012)
On the Non-malleability of the Fiat-Shamir Transform.
Progress in Cryptology - INDOCRYPT 2012, 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings.
doi: 10.1007/978-3-642-34931-7_5
Konferenzveröffentlichung, Bibliographie

Damgard, Ivan ; Faust, Sebastian ; Hazay, Carmit (2012)
Secure Two-Party Computation with Low Communication.
Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings.
doi: 10.1007/978-3-642-28914-9_4
Konferenzveröffentlichung, Bibliographie

Dziembowski, Stefan ; Faust, Sebastian (2012)
Leakage-Resilient Circuits without Computational Assumptions.
Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings.
doi: 10.1007/978-3-642-28914-9_13
Konferenzveröffentlichung, Bibliographie

Dziembowski, Stefan ; Faust, Sebastian (2011)
Leakage-Resilient Cryptography from the Inner-Product Extractor.
Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings.
doi: 10.1007/978-3-642-25385-0_38
Konferenzveröffentlichung, Bibliographie

Faust, Sebastian ; Pietrzak, Krzysztof ; Venturi, Daniele (2011)
Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience.
Automata, Languages and Programming - 38th International Colloquium, ICALP 2011, Zurich, Switzerland, July 4-8, 2011, Proceedings, Part I.
doi: 10.1007/978-3-642-22006-7_33
Konferenzveröffentlichung, Bibliographie

Faust, Sebastian ; Rabin, Tal ; Reyzin, Leonid ; Tromer, Eran ; Vaikuntanathan, Vinod (2010)
Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases.
Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 - June 3, 2010. Proceedings.
doi: 10.1007/978-3-642-13190-5_7
Konferenzveröffentlichung, Bibliographie

Faust, Sebastian ; Kiltz, Eike ; Pietrzak, Krzysztof ; Rothblum, Guy N. (2010)
Leakage-Resilient Signatures.
Theory of Cryptography, 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings.
doi: 10.1007/978-3-642-11799-2_21
Konferenzveröffentlichung, Bibliographie

Faust, Sebastian ; Käsper, Emilia ; Lucks, Stefan (2008)
Efficient Simultaneous Broadcast.
Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings.
doi: 10.1007/978-3-540-78440-1_11
Konferenzveröffentlichung, Bibliographie

Danezis, George ; Diaz, Claudia ; Faust, Sebastian ; Käsper, Emilia ; Troncoso, Carmela ; Preneel, Bart (2007)
Efficient Negative Databases from Cryptographic Hash Functions.
Information Security, 10th International Conference, ISC 2007, Valparaiso, Chile, October 9-12, 2007, Proceedings.
doi: 10.1007/978-3-540-75496-1_28
Konferenzveröffentlichung, Bibliographie

Kohlweiss, Markulf ; Faust, Sebastian ; Fritsch, Lothar ; Gedrojc, Bartek ; Preneel, Bart (2007)
Efficient Oblivious Augmented Maps: Location-Based Services with a Payment Broker.
Privacy Enhancing Technologies, 7th International Symposium, PET 2007 Ottawa, Canada, June 20-22, 2007, Revised Selected Papers.
doi: 10.1007/978-3-540-75551-7_6
Konferenzveröffentlichung, Bibliographie

Report

Erwig, Andreas ; Faust, Sebastian ; Hostáková, Kristina ; Maitra, Monosij ; Riahi, Siavash (2021)
Two-Party Adaptor Signatures From Identification Schemes.
Report, Bibliographie

Dissertation

Orlt, Maximilian (2024)
Leakage and Fault Resilience of Cryptographic Implementations.
Technische Universität Darmstadt
doi: 10.26083/tuprints-00027794
Dissertation, Erstveröffentlichung, Verlagsversion

Das, Poulami (2023)
Secure Infrastructures in the Realm of Decentralization.
Technische Universität Darmstadt
doi: 10.26083/tuprints-00024422
Dissertation, Erstveröffentlichung, Verlagsversion

Erwig, Andreas (2023)
Provably Secure Advanced Cryptographic Wallets.
Technische Universität Darmstadt
doi: 10.26083/tuprints-00024454
Dissertation, Erstveröffentlichung, Verlagsversion

Riahi, Siavash (2023)
On the (im)possibility of building off-chain protocols from minimal assumptions.
Technische Universität Darmstadt
doi: 10.26083/tuprints-00024399
Dissertation, Erstveröffentlichung, Verlagsversion

Alkeilani Alkadri, Nabil (2022)
On Lattice-Based Signatures with Advanced Functionalities.
Technische Universität Darmstadt
doi: 10.26083/tuprints-00020793
Dissertation, Erstveröffentlichung, Verlagsversion

Hostáková, Kristina (2021)
Foundations of Generalized State Channel Networks.
Technische Universität Darmstadt
doi: 10.26083/tuprints-00017476
Dissertation, Erstveröffentlichung, Verlagsversion

Paglialonga, Clara (2021)
Provable Secure Countermeasures Against Side-Channel Attacks.
Technische Universität Darmstadt
doi: 10.26083/tuprints-00018597
Dissertation, Erstveröffentlichung, Verlagsversion

Berti, Francesco (2020)
Authentication in the presence of side-channel leakage.
Université Catholique de Louvain
Dissertation, Bibliographie

Maitra, Monosij (2020)
Fine-Grained Encryption for Uniform Models of Computation.
Indian Institute of Technology of Madras
Dissertation, Bibliographie

Eckey, Lisa (2020)
Blockchain Scalability through Secure Optimistic Protocols.
Technische Universität Darmstadt
doi: 10.25534/tuprints-00014041
Dissertation, Erstveröffentlichung, Verlagsversion

Masterarbeit

Villeneuve, Come du Crest de (2018)
Evaluation of the Efficiency of different Architectures and Pathfinding Algorithms.
Technische Universität Darmstadt
Masterarbeit, Bibliographie

Wijden, Marius van der (2018)
Payment and State Channels in practice.
Technische Universität Darmstadt
Masterarbeit, Bibliographie

Amler, Hendrik (2018)
Evaluation of payment channel networks for micropayments.
Technische Universität Darmstadt
Masterarbeit, Bibliographie

Varky, Jacek (2018)
TeePay – Using Trusted Execution Environments for Off-chain Payment.
Technische Universität Darmstadt
Masterarbeit, Bibliographie

Diese Liste wurde am Thu Nov 21 01:44:30 2024 CET generiert.