Search

Your search keyword '"Marc Fischlin"' showing total 76 results

Search Constraints

Start Over You searched for: Author "Marc Fischlin" Remove constraint Author: "Marc Fischlin" Topic business Remove constraint Topic: business
76 results on '"Marc Fischlin"'

Search Results

1. The Full Power of Random Oracles

2. A Cryptographic Analysis of the TLS 1.3 Handshake Protocol

3. Limitations of Random Oracles

4. Iterated Hash Functions

5. Multipath TLS 1.3

6. Pseudorandomness and Computational Indistinguishability

7. Cryptographic Analysis of the Bluetooth Secure Connection Protocol Suite

8. Random Oracle Schemes in Practice

9. Non-cryptographic Hashing

10. Information-Theoretic Security of Cryptographic Channels

11. Modeling Memory Faults in Signature and Authenticated Encryption Schemes

12. Security Reductions for White-Box Key-Storage in Mobile Payments

13. Intercept-Resend Emulation Attacks against a Continuous-Variable Quantum Authentication Protocol with Physical Unclonable Keys

14. Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids

15. How to Sign with White-Boxed AES

16. Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange

17. Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol

18. Information-Theoretically Secure Data Origin Authentication with Quantum and Classical Resources

19. Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks

20. Simulatable Channels: Extended Security that is Universally Composable and Easier to Prove

21. Invisible Sanitizable Signatures and Public-Key Encryption are Equivalent

22. Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates

23. Zero Round-Trip Time for the Extended Access Control Protocol

24. PRF-ODH: Relations, Instantiations, and Impossibility Results

25. Less is more: relaxed yet composable security notions for key exchange

26. Obfuscation Combiners

27. Attribute-Based Access Control Architectures with the eIDAS Protocols

28. A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates

29. Privately Computing Set-Union and Set-Intersection Cardinality via Bloom Filters

30. Data Is a Stream: Security of Stream-Based Channels

31. Adaptive Proofs of Knowledge in the Random Oracle Model

32. Subtle kinks in distance-bounding

33. Notions of Black-Box Reductions, Revisited

34. A Cryptographic Analysis of OPACITY

35. Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions

36. Limitations of the Meta-reduction Technique: The Case of Schnorr Signatures

37. Black-Box Reductions and Separations in Cryptography

38. Domain-Specific Pseudonymous Signatures for the German Identity Card

39. Public Key Cryptography – PKC 2012

40. Security of blind signatures under aborts and applications to adaptive oblivious transfer

41. History-Free Sequential Aggregate Signatures

42. Learning Whom to Trust in a Privacy-Friendly Way

43. Random Oracle Reducibility

44. Relaxed Security Notions for Signatures of Knowledge

45. Secure Set Intersection with Untrusted Hardware Tokens

46. Redactable signatures for tree-structured data: definitions and constructions

47. Random Oracles with(out) Programmability

48. On the Impossibility of Three-Move Blind Signature Schemes

49. Delayed-Key Message Authentication for Streams

50. Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions

Catalog

Books, media, physical & digital resources