Search

Your search keyword '"Marc Fischlin"' showing total 151 results

Search Constraints

Start Over You searched for: Author "Marc Fischlin" Remove constraint Author: "Marc Fischlin" Database OpenAIRE Remove constraint Database: OpenAIRE
151 results on '"Marc Fischlin"'

Search Results

5. Towards Post-Quantum Security for Signal's X3DH Handshake

6. BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures

7. Constructing Random Oracles—UCEs

8. The Full Power of Random Oracles

10. The Random Oracle Model

11. Constructions of Keyed Hash Functions

12. Foundations

13. A Cryptographic Analysis of the TLS 1.3 Handshake Protocol

14. Limitations of Random Oracles

15. Constructing Compression Functions

17. Iterated Hash Functions

18. Multipath TLS 1.3

19. Pseudorandomness and Computational Indistinguishability

22. Constructing Random Oracles—Indifferentiability

23. Cryptographic Analysis of the Bluetooth Secure Connection Protocol Suite

25. Random Oracle Schemes in Practice

26. Single-to-Multi-theorem Transformations for Non-interactive Statistical Zero-Knowledge

27. Non-cryptographic Hashing

28. Iterated Hash Functions in Practice

29. The Random Oracle Controversy

30. Information-Theoretic Security of Cryptographic Channels

31. On the Memory Fault Resilience of TLS 1.3

32. Signatures from Sequential-OR Proofs

33. Modeling Memory Faults in Signature and Authenticated Encryption Schemes

34. Security Reductions for White-Box Key-Storage in Mobile Payments

35. Intercept-Resend Emulation Attacks against a Continuous-Variable Quantum Authentication Protocol with Physical Unclonable Keys

36. Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids

37. How to Sign with White-Boxed AES

38. Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange

39. Information-Theoretically Secure Data Origin Authentication with Quantum and Classical Resources

40. Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol

41. Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks

42. Simulatable Channels: Extended Security that is Universally Composable and Easier to Prove

43. Invisible Sanitizable Signatures and Public-Key Encryption are Equivalent

44. Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates

45. Zero Round-Trip Time for the Extended Access Control Protocol

46. PRF-ODH: Relations, Instantiations, and Impossibility Results

47. Abstreitbarkeit bei eID-Lösungen

48. Robust Multi-Property Combiners for Hash Functions

49. Less is more: relaxed yet composable security notions for key exchange

50. Key Confirmation in Key Exchange: A Formal Treatment and Implications for TLS 1.3

Catalog

Books, media, physical & digital resources