Research

Recent Publications

Disclaimer

Redactable Graph Hashing, Revisited (short paper)
Andreas Erwig, Marc Fischlin, Martin Hald, Dominik Helm, Robert Kiel, Florian K\übler, Michael K\ümmerlin, Jakob Laenge, Felix Rohrbach
ACISP 2017, Lecture Notes in Computer Science, Volume ????, pp. ???–???, Springer-Verlag, 2017

This is the full version; copyright of the proceedings version: Springer.

0-RTT Key Exchange with Full Forward Secrecy
Felix Günther, Britta Hale, Tibor Jager, and Sebastian Lauer
Eurocrypt 2017, Lecture Notes in Computer Science, Volume ????, pp. ???-???, Springer-Verlag, 2017.

Please check again later for the online version.

Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates
Marc Fischlin, Felix Günther
EuroS&P 2017, pp. ???-???, IEEE, 2017.

This is a link to the IACR ePrint version, Report 2017/082.

Efficient Proactive Secret Sharing
Jacqueline Brendel, Denise Demirel
2016 Privacy, Security and Trust Conference, IEEE, 2016.

Please check again later for the online version.

Attribute-based Access Control Architectures with the eIDAS Protocols
Frank Morgner, Paul Bastian, Marc Fischlin
SSR 2016, Lecture Notes in Computer Science, Volume Volume 10074, pp. 205-226, Springer-Verlag, 2016.

This is the full version. Copyright of the proceedings version: Springer-Verlag.

Secure Logging Schemes and Certificate Transparency
Benjamin Dowling, Felix Günther, Udyani Herath, and Douglas Stebila
ESORICS 2016, Part II, Lecture Notes in Computer Science, Volume 9879, pp. 140-158, Springer-Verlag, 2016.

This is a link to the eprint version 2016/452.

Securing Transactions with the eIDAS Protocols
Frank Morgner, Paul Bastian, Marc Fischlin
WISTP 2016, Lecture Notes in Computer Science, Volume 9895, pp. 3-18, Springer-Verlag, 2016.

This is the full version. Copyright of the proceedings version: Springer-Verlag.

Obfuscation Combiners
Marc Fischlin, Amir Herzberg, Hod Bin Noon, Haya Shulman
Crypto 2016, Part II, Lecture Notes in Computer Science, Volume 9815, pp. 521-550, Springer-Verlag, 2016.

This is a link to the eprint version 2016/289.

Semantic Security and Indistinguishability in the Quantum World
Tommaso Gagliardoni, Andreas Hülsing, Christian Schaffner
Crypto 2016, Part III,, Lecture Notes in Computer Science, Volume 9816, pp. 60-89, Springer-Verlag, 2016.

This is a link to the eprint version 2015/355.

Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes
Felix Günther, Bertram Poettering
International Journal of Information Security (IJIS), ????:??–??. Springer Verlag, 2016.

This is a link to the ePrint version 2014/014. A preliminary version appeared at: ACISP 2015, Lecture Notes in Computer Science, Volume 9144, pp. 195–212, Springer-Verlag, 2015.

Key Confirmation in Key Exchange: A Formal Treatment and Implications for TLS 1.3
Marc Fischlin, Felix Günther, Benedikt Schmidt, and Bogdan Warinschi
37th IEEE Symposium on Security and Privacy (S&P 2016), IEEE, May 2016.

Please check later for an online version.

Disclaimer

The documents contained in these directories are included by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.