Conference Publications

Conference Publications

2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 2004 2003 2002 2001 2000 1999 or earlier Disclaimer

2018

Simulatable Channels: Extended Security that is Universally Composable and Easier to Prove
Jean Paul Degabriele and Marc Fischlin
Asiacrypt 2018, Part ?, Lecture Notes in Computer Science, Volume ?????, pp. ???-???, Springer-Verlag, 2018.

Please check again later for an online version.

Combiners for Backdoored Random Oracles
Balthazar Bauer, Pooya Farshim, and Sogol Mazaheri
CRYPTO 2018, Lecture Notes in Computer Science, Volume 10992, pp. 272-302, Springer-Verlag, 2018.

This is a link to the IACR ePrint version, Report 2018/770.

Invisible Sanitizable Signatures and Public-Key Encryption are Equivalent
Marc Fischlin and Patrick Harasser
ACNS 2018, Lecture Notes in Computer Science, Volume 10892, pp. 202-220, Springer Verlag, 2018.

This is a link to the IACR ePrint version, Report 2018/337.

Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks
Marc Fischlin and Sogol Mazaheri
31st IEEE Computer Security Foundations Symposium (CSF 2018), pp. 76-90, IEEE, 2018.

This is a link to the IACR ePrint version, Report 2017/984.

Backdoored Hash Functions: Immunizing HMAC and HKDF
Marc Fischlin, Christian Janson, and Sogol Mazaheri
31st IEEE Computer Security Foundations Symposium (CSF 2018), pp. 105-118, IEEE, 2018.

This is a link to the IACR ePrint version, report 2018/362.

Untagging Tor: A Formal Treatment of Onion Encryption
Jean Paul Degabriele and Martijn Stam
Eurocrypt 2018, Part III, Lecture Notes in Computer Science, Volume 10822, pp. 259-293, Springer-Verlag, 2018.

This is a link to the IACR ePrint version, Report 2018/162.

2017

CogniCrypt: Supporting Developers in using Cryptography
Stefan Krüger, Sarah Nadi, Michael Reif, Karim Ali, Mira Mezini, Eric Bodden, Florian Göpfert, Felix Günther, Christian Weinert, Daniel Demmler, and Ram Kamath
32nd IEEE/ACM International Conference on Automated Software Engineering (ASE 2017), pp. 931-936, ACM, 2017.

Zero Round-Trip Time for the Extended Access Control Protocol
Jacqueline Brendel, Marc Fischlin
ESORICS 2017, Lecture Notes in Computer Science, Volume ????, pp. ???-???, Springer-Verlag, 2017.

This is a link to the IACR ePrint version, Report 2017/060.

PRF-ODH: Relations, Instantiations, and Impossibility Results
Jacqueline Brendel, Marc Fischlin, Felix Günther, and Christian Janson
CRYPTO 2017, Part III, Lecture Notes in Computer Science, Volume 10403, pp. 651-681, Springer-Verlag, 2017.

This is a link to the IACR ePrint version, Report 2017/517.

A Formal Treatment of Multi-key Channels
Felix Günther and Sogol Mazaheri
CRYPTO 2017, Part III, Lecture Notes in Computer Science, Volume 10403, pp. 587-618, Springer-Verlag, 2017.

This is a link to the IACR ePrint version, Report 2017/501.

Redactable Graph Hashing, Revisited (short paper)
Andreas Erwig, Marc Fischlin, Martin Hald, Dominik Helm, Robert Kiel, Florian Kübler, Michael Kümmerlin, Jakob Laenge, Felix Rohrbach
ACISP 2017 (Part II), Lecture Notes in Computer Science, Volume 10343, pp. 398–405, Springer-Verlag, 2017

This is the full version; copyright of the proceedings version: Springer.

0-RTT Key Exchange with Full Forward Secrecy
Felix Günther, Britta Hale, Tibor Jager, and Sebastian Lauer
Eurocrypt 2017, Lecture Notes in Computer Science, Volume 10212, pp. 519-548, Springer-Verlag, 2017.

This is a link to the IACR ePrint version, Report 2017/223.

Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates
Marc Fischlin, Felix Günther
EuroS&P 2017, pp. 60-75, IEEE, 2017.

This is a link to the IACR ePrint version, Report 2017/082.

Cloud Storage File Recoverability
Christian A. Gorke, Christian Janson, Frederik Armknecht, and Carlos Cid
AsiaCCS-SCC 2017, pp. 19-26, ACM, 2017.

This is a link to the IACR ePrint version, Report 2017/167.

2016

Efficient Proactive Secret Sharing
Jacqueline Brendel, Denise Demirel
2016 Privacy, Security and Trust Conference, IEEE, 2016.

Please check again later for the online version.

Attribute-based Access Control Architectures with the eIDAS Protocols
Frank Morgner, Paul Bastian, Marc Fischlin
SSR 2016, Lecture Notes in Computer Science, Volume 10074, pp. 205-226, Springer-Verlag, 2016.

This is the full version. Copyright of the proceedings version: Springer-Verlag.

Secure Logging Schemes and Certificate Transparency
Benjamin Dowling, Felix Günther, Udyani Herath, and Douglas Stebila
ESORICS 2016, Part II, Lecture Notes in Computer Science, Volume 9879, pp. 140-158, Springer-Verlag, 2016.

This is a link to the eprint version 2016/452.

Securing Transactions with the eIDAS Protocols
Frank Morgner, Paul Bastian, Marc Fischlin
WISTP 2016, Lecture Notes in Computer Science, Volume 9895, pp. 3-18, Springer-Verlag, 2016.

This is the full version. Copyright of the proceedings version: Springer-Verlag.

Obfuscation Combiners
Marc Fischlin, Amir Herzberg, Hod Bin Noon, Haya Shulman
Crypto 2016, Part II, Lecture Notes in Computer Science, Volume 9815, pp. 521-550, Springer-Verlag, 2016.

This is a link to the eprint version 2016/289.

Semantic Security and Indistinguishability in the Quantum World
Tommaso Gagliardoni, Andreas Hülsing, Christian Schaffner
Crypto 2016, Part III,, Lecture Notes in Computer Science, Volume 9816, pp. 60-89, Springer-Verlag, 2016.

This is a link to the eprint version 2015/355.

Key Confirmation in Key Exchange: A Formal Treatment and Implications for TLS 1.3
Marc Fischlin, Felix Günther, Benedikt Schmidt, and Bogdan Warinschi
37th IEEE Symposium on Security and Privacy (S&P 2016), IEEE, May 2016.

Please check later for an online version.

An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation
Sedat Akleylek, Nina Bindel, Johannes Buchmann, Juliane Krämer and Giorgia Azzurra Marson
Africacrypt 2016, Lecture Notes in Computer Science, Volume 9646, pp. 44–60, Springer-Verlag, 2016

This is a link to the eprint version 2016/030.

On the Hardness of Proving CCA-security of Signed ElGamal
David Bernhard, Marc Fischlin, Bogdan Warinschi
PKC 2016, Lecture Notes in Computer Science, Volume 9614, pp. 47–69, Springer-Verlag, 2016

This is a link to the ePrint version 2015/649.

2015

A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates
Benjamin Dowling, Marc Fischlin, Felix Günther, and Douglas Stebila
ACM Computer and Communication Security (CCS 2015), pp. 1197–1210, ACM, 2015

This is a link to the eprint version 2015/914.

Notions of Deniable Message Authentication
Marc Fischlin and Sogol Mazaheri
ACM Workshop on Privacy in the Electronic Society (WPES 2015), pp. 55–64, ACM, 2015

Please check later for an online version.

Data Is a Stream: Security of Stream-Based Channels
Marc Fischlin, Felix Günther, Giorgia Azzurra Marson, and Kenneth G. Paterson
CRYPTO 2015, Lecture Notes in Computer Science, Volume 9216, pp. 545–564, Springer-Verlag, 2015

Please check later for an online version.

Linkable Message Tagging: Solving the key distribution problem of signature schemes
Felix Günther and Bertram Poettering
ACISP 2015, Lecture Notes in Computer Science, Volume 9144, pp. 195–212, Springer-Verlag, 2015

This is a link to the eprint version 2014/014.

Privately Computing Set-Union and Set-Intersection Cardinality via Bloom Filters
Rolf Egert, Marc Fischlin, David Gens, Sven Jacob, Matthias Senker and Jörn Tillmanns
ACISP 2015, Lecture Notes in Computer Science, Volume 9144, pp. 413–430, Springer-Verlag, 2015

This is the full version; copyright of the proceedings version: Springer.

Adaptive Proofs of Knowledge in the Random Oracle Model
David Bernhard, Marc Fischlin, Bogdan Warinschi
PKC 2015, Lecture Notes in Computer Science, Volume 9020, pp. 629–649, Springer-Verlag, 2015

This is a link to the ePrint version 2015/648.

Random-Oracle Uninstantiability from Indistinguishability Obfuscation
Christina Brzuska, Pooya Farshim, Arno Mittelbach
Theory of Cryptography Conference – TCC, Part II, Lecture Notes in Computer Science, Volume 9015, pp. 428–455, Springer-Verlag, 2015

This is a link to the ePrint version 2014/867.

2014

Unpicking PLAID – A Cryptographic Analysis of an ISO-standards-track Authentication Protocol
Jean Paul Degabriele, Victoria Fehr, Marc Fischlin, Tommaso Gagliardoni, Felix Günther, Giorgia Azzurra Marson, Arno Mittelbach, Kenneth G. Paterson
SSR 2014, Lecture Notes in Computer Science, Volume 8893, pp. 1–25, Springer-Verlag, 2014

This is a link to the ePrint version 2014/728. See also the journal version from 2016.

Indistinguishability Obfuscation versus Multi-Bit Point Obfuscation with Auxiliary Input
Christina Brzuska, Arno Mittelbach
Asiacrypt 2014, Lecture Notes in Computer Science, Volume 8874, pp. 142-161, Springer-Verlag, 2014

This is a link to the ePrint version 2014/405.

Using Indistinguishability Obfuscation via UCEs
Christina Brzuska, Arno Mittelbach
Asiacrypt 2014, Lecture Notes in Computer Science, Volume 8874, pp. 122-141, Springer-Verlag, 2014

This is a link to the ePrint version 2014/381.

Multi-Stage Key Exchange and the Case of Google's QUIC Protocol
Marc Fischlin, Felix Günther
ACM Computer and Communication Security (CCS 2014), pp. 1193–1204, ACM, 2014.

This is the full version. A preliminary version appears at CCS 2014 (DOI: 10.1145/2660267.2660308); copyright of proceedings version: ACM.

Privacy-Enhanced Participatory Sensing with Collusion-Resistance and Data Aggregation
Felix Günther, Mark Manulis, Andreas Peter
CANS 2014, Lecture Notes in Computer Science, Volume 8813, pp. 321–336, Springer-Verlag, 2014.

This is a link to the ePrint version 2014/382.

Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources
Christina Brzuska, Pooya Farshim, Arno Mittelbach
Crypto 2014, Lecture Notes in Computer Science, Volume 8616, pp. 188-215, Springer-Verlag, 2014.

This is a link to the eprint version 2014/099.

Intercepting Tokens in Cryptographic Protocols: The Empire Strikes Back in the Clone Wars
Özgür Dagdelen, Marc Fischlin
ISIT 2014 – IEEE International Symposium on Information Theory, IEEE, 2014.

This is a link to the eprint version 2012/537.

Salvaging Indifferentiability in a Multi-stage Setting
Arno Mittelbach
Eurocrypt 2014, Lecture Notes in Computer Science, Volume 8441, pp. 603-621, Springer-Verlag, 2014

This is a link to the eprint version 2013/286.

General Impossibility of Group Homomorphic Encryption in the Quantum World
Frederik Armknecht, Tommaso Gagliardoni, Stefan Katzenbeisser, Andreas Peter
PKC 2014, Lecture Notes in Computer Science, Volume 8383, pp. 556-573, Springer-Verlag, 2014

This is a link to the eprint version 2014/029.

2013

The PACE|CA Protocol for Machine Readable Travel Documents
Jens Bender, Marc Fischlin, Dennis Kügler
INTRUST 2013, Lecture Notes in Computer Science, Volume 8292, pp. 17-35, Springer-Verlag, 2013

The Fiat-Shamir Transformation in a Quantum World
Özgür Dagdelen, Marc Fischlin, Tommaso Gagliardoni
Asiacrypt 2013, Lecture Notes in Computer Science, Volume 8270, pp. 62-81, Springer-Verlag, 2013

This is a link to the eprint version 2013/245.

Notions of Black-Box Reductions, Revisited
Paul Baecher, Christina Brzuska, Marc Fischlin
Asiacrypt 2013, Lecture Notes in Computer Science, Volume 8269, pp. 296-315, Springer-Verlag, 2013

This is a link to the eprint version 2013/101.

Reset Indifferentiability and its Consequences
Paul Baecher, Christina Brzuska, Arno Mittelbach
Asiacrypt 2013, Lecture Notes in Computer Science, Volume 8269, pp. 154-173, Springer-Verlag, 2013

This is a link to the eprint version 2013/459.

A Cryptographic Analysis of OPACITY
Özgür Dagdelen, Marc Fischlin, Tommaso Gagliardoni, Giorgia Azzurra Marson, Arno Mittelbach, Cristina Onete
ESORICS 2013, Lecture Notes in Computer Science, Volume 8134, pp. 345-362, Springer-Verlag, 2013

This is a link to the eprint version 2013/234.

Practical Secure Logging: Seekable Sequential Key Generators
Giorgia Azzurra Marson, Bertram Poettering
ESORICS 2013, Lecture Notes in Computer Science, Volume 8134, pp. 111-128, Springer-Verlag, 2013

This is a link to the eprint version 2013/397.

Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions
Paul Baecher, Pooya Farshim, Marc Fischlin, Martijn Stam
Eurocrypt 2013, Lecture Notes in Computer Science, Volume 7881, pp. 426-443, Springer-Verlag, 2013

This is a link to the eprint version 2013/350.

Limitations of the Meta-Reduction Technique: The Case of Schnorr Signatures
Marc Fischlin, Nils Fleischhacker
Eurocrypt 2013, Lecture Notes in Computer Science, Volume 7881, pp. 444-460, Springer-Verlag, 2013

This is a link to the eprint version 2013/140.

Cryptophia's Short Combiner for Collision-Resistant Hash Functions
Arno Mittelbach
ACNS 2013, Lecture Notes in Computer Science, Volume 7954, pp. 136-153, Springer-Verlag, 2013

This is a link to the eprint version 2013/210.

Computing on Authenticated Data for Adjustable Predicates
Björn Deiseroth, Victoria Fehr, Marc Fischlin, Manuel Maasz, Nils Fabian Reimers, Richard Stein
ACNS 2013, Lecture Notes in Computer Science, Volume 7954, pp. 53-68, Springer-Verlag, 2013

This is a link to the eprint version 2013/217.

Robust Encryption, Revisited
Pooya Farshim, Benoit Libert, Kenneth G. Paterson, Elizabeth A. Quaglia
PKC 2013, Lecture Notes in Computer Science, Volume 7778, pp. 352-368, Springer-Verlag, 2013

This is a link to the eprint version 2012/673.

On the Semantic Security of Functional Encryption Schemes
Manuel Barbosa, Pooya Farshim
PKC 2013, Lecture Notes in Computer Science, Volume 7778, pp. 143-161, Springer-Verlag, 2013

This is a link to the eprint version 2012/474.

Rate-Limited Secure Function Evaluation
Özgür Dagdelen, Payman Mohassel, Daniele Venturi
PKC 2013, Lecture Notes in Computer Science, Volume 7778, pp. 461-478, Springer-Verlag, 2013

This is the link to the eprint version 2013/021.

Subtle Kinks in Distance-Bounding: an Analysis of Prominent Protocols
Marc Fischlin, Cristina Onete
Security and Privacy in Wireless and Mobile Networks (WiSec) 2013, ACM, 2013

Efficient, Secure, Private Distance Bounding without Key Updates
Jens Hermans, Cristina Onete, Roel Peeters
Security and Privacy in Wireless and Mobile Networks (WiSec) 2013, ACM, 2013

2012

Domain-Specific Pseudonymous Signatures for the German Identity Card
Jens Bender, Özgür Dagdelen, Marc Fischlin, Dennis Kügler
Information Security Conference (ISC) 2012, Lecture Notes in Computer Science, Volume 7483, pp. 104-119, Springer-Verlag, 2012.

This is a link to the eprint version 2012/558.

On the Joint Security of Signature and Encryption Schemes under Randomness Reuse: Efficiency and Security Amplification
Afonso Arriaga, Manuel Barbosa, Pooya Farshim
Applied Cryptography and Network Security (ACNS) 2012, Lecture Notes in Computer Science, Volume 7341, pp. 206-223, Springer-Verlag, 2012.

This is a link to the eprint version 2012/382.

Black-Box Reductions and Separations in Cryptography
Marc Fischlin
Africacrypt 2012, Lecture Notes in Computer Science, Volume 7374, pp. 413-427, Springer-Verlag, 2012

Invited Talk. Besides minor changes this is the version as it appears in the proceedings (but reformated from LNCS style).

History-Free Sequential Aggregate Signatures
Marc Fischlin, Anja Lehmann, Dominique Schröder
Security and Cryptography for Networks
(SCN) 2012, Lecture Notes in Computer Science, Volume 7485, pp. 113-130, Springer-Verlag, 2012

This is the full version. A preliminary version appears at SCN 2012; copyright of proceedings version: Springer.

Hash Combiners for Second Pre-Image Resistance, Target Collision Resistance and Pre-Image Resistance have Long Output
Arno Mittelbach
(SCN) 2012, Lecture Notes in Computer Science, Volume 7485, pp. 522-539, Springer-Verlag, 2013

This is a link to the eprint version 2013/210.

TLS, PACE, and EAC: A Cryptographic View at Modern Key Exchange Protocols
Christina Brzuska, Özgür Dagdelen, Marc Fischlin
Sicherheit 2012, Lecture Notes in Informatics, Volume P-195, pp. 71-82, Gesellschaft für Informatik (GI), 2012.

Merging the Cryptographic Security Analysis and the Algebraic-Logic Security Proof for PACE
Lassaad Cheikhrouhou, Werner Stephan, Özgür Dagdelen, Marc Fischlin, Markus Ullmann
Sicherheit 2012, Lecture Notes in Informatics, Volume P-195, pp. 83-94, Gesellschaft für Informatik (GI), 2012.

The PACE|AA Protocol for Machine Readable Travel Documents, and its Security
Jens Bender, Özgür Dagdelen, Marc Fischlin and Dennis Kügler
Financial Cryptography, Lecture Notes in Computer Science, Volume 7397, pp. 344-358, Springer-Verlag, 2012.

Please check again later for an online version.

Homomorphic Encryption with Applications to Secure Outsourcing of Computation
Manuel Barbosa and Pooya Farshim
RSA Security Cryptographer's Track 2012, Lecture Notes in Computer Science, Volume ???, pp. ???, Springer-Verlag, 2012.

Please check again later for an online version.

2011

Learning Whom to Trust in a Privacy-Friendly Way
Sebastian Ries, Marc Fischlin, Leonardo A. Martucci, Max Mühlhäuser
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-11), 2011

This is the version as it appears at TrustCom.

Polly Cracker, Revisited
Martin R. Albrecht, Pooya Farshim, Jean-Charles Faugère, Ludovic Perret
Asiacrypt 2011, Lecture Notes in Computer Science, Volume 7073, pp. 179-196, Springer-Verlag, 2011.

This is the preliminary full version. A preliminary short version appears at Asiacrypt 2011; copyright of proceedings version: IACR.

Non-Interactive and Re-Usable Universally Composable String Commitments with Adaptive Security
Marc Fischlin, Benoit Libert, Mark Manulis
Asiacrypt 2011, Lecture Notes in Computer Science, Volume 7073, pp. 468-485, Springer-Verlag, 2011.

Please check again later for an online version.

Random Oracles in a Quantum World
Dan Boneh, Özgür Dagdelen, Marc Fischlin, Anja Lehmann, Christina Schaffner, Mark Zhandry
Asiacrypt 2011, Lecture Notes in Computer Science, Volume 7073, pp. 41-69, Springer-Verlag, 2011.

This is the preliminary full version. A preliminary short version appears at Asiacrypt 2011; copyright of proceedings version: IACR.

Composability of Bellare-Rogaway Key Exchange Protocols
Christina Brzuska, Marc Fischlin, Bogdan Warinschi, Stephen Williams
ACM Conference on Computer and Communications Security (CCS) 2011.

This is the CCS version of the paper.

A Formal Approach to Distance-Bounding RFID Protocols
Ulrich Dürholz, Marc Fischlin, Michael Kasper, Cristina Onete
Information Security Conference (ISC) 2011, Lecture Notes in Computer Science, Volume 7001, pp. 47--62, Springer-Verlag, 2011

This is the full version. A preliminary version appears at ISC 2011; copyright of proceedings version: Springer.

Physically Uncloneable Functions in the Universal Composition Framework
Christina Brzuska, Marc Fischlin, Heike Schröder, Stefan Katzenbeisser
Crypto 2011, Lecture Notes in Computer Science, Volume 6841, pp. 46-64, Springer-Verlag, 2011

This is the full version. A preliminary version appears at Crypto 2011; copyright of proceedings version: IACR.

Random Oracle Reducibility
Paul Baecher, Marc Fischlin
Crypto 2011, Lecture Notes in Computer Science, Volume 6841, pp. 21-38, Springer-Verlag, 2011.

This is the full version. A preliminary version appears at Crypto 2011; copyright of proceedings version: IACR.

Breaking reCAPTCHA: A Holistic Approach via Shape Recognition
Paul Baecher, Niklas Büscher, Marc Fischlin, Benjamin Milde
Future Challenges in Security and Privacy for Academia and Industry, IFIP Information Security Conference, IFIP Advances in Information and Communication Technology, Volume 354, pp. 56-67, Springer-Verlag, 2011.

This is the full version as it also appears at IFIP Sec 2011; copyright of proceedings version: Springer.

Relaxed Security Notions for Signatures of Knowledge
Marc Fischlin, Cristina Onete
Applied Cryptography and Network Security (ACNS), Lecture Notes in Computer Science, Volume 6750, pp. 309-326, Springer-Verlag, 2011.

This is the proceedings version; copyright of proceedings version: Springer.

Expedient Non-Malleability Notions for Hash Functions
Paul Baecher, Marc Fischlin, Dominique Schröder
RSA Security Cryptographer's Track 2011, Lecture Notes in Computer Science, Volume 6558, pp. 268-283, Springer-Verlag, 2011.

This is the full version. A preliminary version appears at CT-RSA 2011; copyright of proceedings version: Springer.

Secure Set Intersection with Untrusted Hardware Tokens
Marc Fischlin, Benny Pinkas, Ahmad-Reza Sadeghi, Thomas Schneider, Ivan Visconti
RSA Security Cryptographer's Track 2011, Lecture Notes in Computer Science, Volume 6558, pp. 1-16, Springer-Verlag, 2011.

This is the full version. A preliminary version appears at CT-RSA 2011; copyright of proceedings version: Springer.

2010

Random Oracles With(out) Programmability
Marc Fischlin, Anja Lehmann, Thomas Ristenpart, Thomas Shrimpton, Martijn Stam, Stefano Tessaro
Asiacrypt 2010, Lecture Notes in Computer Science, Volume 6477, pp. 303-320, Springer-Verlag, 2010.

This is the proceedings version; copyright of proceedings version: IACR.

Security Analysis of the Extended Access Control Protocol for Machine Readable Travel Documents
Özgür Dagdelen, Marc Fischlin
Information Security Conference (ISC) 2010, Lecture Notes in Computer Science, Volume 6531, pp. 54-68, Springer-Verlag, 2010.

Best Student Paper Award. This is the proceedings version; copyright of proceedings version: Springer.

CAPTCHAs: The Good, the Bad, and the Ugly
Paul Baecher, Marc Fischlin, Lior Gordon, Robert Langenberg, Michael Lützow, Dominique Schröder
Sicherheit 2010, Lecture Notes in Informatics, Volume P-170, pp. 353-365, Gesellschaft für Informatik (GI), 2010.

History-Free Aggregate Message Authentication Codes
Oliver Eikemeier, Marc Fischlin, Jens-Fabian Götzmann, Anja Lehmann, Peter Schröder, Dominique Schröder, Daniel Wagner
Security and Cryptography for Networks (SCN) 2010, Lecture Notes in Computer Science, Volume 6280, pp. 309-328, Springer-Verlag, 2010

This is the full version. A preliminary version appears at SCN 2010; copyright of proceedings version: Springer.

Parallel Enumeration of Shortest Lattice Vectors
Özgür Dagdelen, Michael Schneider
Euro-Par 2010, Lecture Notes in Computer Science, Volume 6272, pp. 211-222, Springer-Verlag, 2010.

Group-Based Attestation: Enhancing Privacy and Management in Remote Attestation
Sami Alsouri, Özgür Dagdelen, Stefan Katzenbeisser
Trust and Trustworthy Computing (TRUST) 2010, Lecture Notes in Computer Science, Volume 6101, pp. 63-77, Springer-Verlag, 2010.

Redactable Signatures for Tree-Structured Data: Definitions and Constructions
Christina Brzuska, Heike Busch, Özgür Dagdelen, Marc Fischlin, Martin Franz, Stefan Katzenbeisser, Mark Manulis, Cristina Onete, Andreas Peter, Bertram Poettering, Dominique Schröder
Applied Cryptography and Network Security (ACNS) 2010, Lecture Notes in Computer Science, Volume 6123, pp. 87-104, Springer-Verlag, 2010.

This is the full version as it also appears at ACNS 2010; copyright of proceedings version: Springer.

Generic Constructions for Verifiably Encrypted Signatures Without Random Oracles or NIZKs
Markus Rückert, Michael Schneider, Dominique Schröder
Applied Cryptography and Network Security (ACNS) 2010, Lecture Notes in Computer Science, Volume 6123, Springer-Verlag, 2010.

On the Impossbility of Three-Move Blind Signature Schemes
Marc Fischlin, Dominique Schröder
Advances in Cryptology – Eurocrypt 2010, Lecture Notes in Computer Science, Volume 6110, pp. 197-215, Springer-Verlag, 2010.

This is the full version. A preliminary version appears at Eurocrypt 2010; copyright of proceedings version: IACR.

Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions
David Galindo, Benoit Libert, Marc Fischlin, Georg Fuchsbauer, Anja Lehmann, Mark Manulis, Dominique Schröder
Africacrypt 2010, Lecture Notes in Computer Science, Volume 6055, pp. 333-350, Springer-Verlag, 2010.

Fair Partially Blind Signatures
Markus Rückert, Dominique Schröder
Africacrypt 2010, Lecture Notes in Computer Science, Volume 6055, pp. 34-51, Springer-Verlag, 2010.

Unlinkability of Sanitizable Signatures
Christina Brzuska, Marc Fischlin, Anja Lehmann, Dominique Schröder
Public-Key Cryptography (PKC) 2010, Lecture Notes in Computer Science, Volume 6056, pp. 444-461, Springer-Verlag, 2010.

This is the full version. A preliminary version appears at PKC 2010; copyright of proceedings version: IACR.

Confidential Signatures and Deterministic Signcryption
Alexander Dent, Marc Fischlin, Mark Manulis, Dominique Schroöder, Martijn Stam
Public-Key Cryptography (PKC) 2010, Lecture Notes in Computer Science, Volume 6056, pp. 462-479, Springer-Verlag, 2010.

This is the preliminary full version. A preliminary version appears at PKC 2010; copyright of proceedings version: IACR.

Hash Function Combiners in SSL and TLS
Marc Fischlin, Anja Lehmann, Daniel Wagner
RSA Security Cryptographer's Track 2010, Lecture Notes in Computer Science, Volume 5985, pp. 268-283, Springer-Verlag, 2010.

This is the full version. A preliminary version appears at CT-RSA 2010; copyright of proceedings version: Springer.

Delayed-Key Message Authentication for Streams
Marc Fischlin, Anja Lehmann
Theory of Cryptography Conference – TCC, Lecture Notes in Computer Science, Volume 5978, pp. 290-307, Springer-Verlag, 2010.

This is the full version. A preliminary version appears at TCC 2010; copyright of proceedings version: IACR.

2009

A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical
Anja Lehmann, Stefano Tessaro
Asiacrypt 2009, Lecture Notes in Computer Science, Volume 5912, pp. 364-381, Springer-Verlag, 2009.

Foundations of Non-Malleable Hash and One-Way Functions
Alexandra Boldyreva, David Cash, Marc Fischlin, Bogdan Warinschi
Asiacrypt 2009, Lecture Notes in Computer Science, Volume 5912, pp. 524-541, Springer-Verlag, 2009.

Sanitizable Signatures: How to Partially Delegate Control for Authenticated Data
Christina Brzuska, Marc Fischlin, Anja Lehmann, Dominique Schröder
Biometrics and Electronic Signatures – Research and Applications (BIOSIG) 2009, Lecture Notes in Informatics, Volume 155, pp. 117-128, Gesellschaft fuer Informatik (GI), 2009

This is the full version. A preliminary version appears at BIOSIG 2009; copyright of proceedings version: GI.

Security Analysis of the PACE Key-Agreement Protocol
Jens Bender, Marc Fischlin, Dennis Kügler
Information Security Conference (ISC) 2009, Lecture Notes in Computer Science, Volume 5735, pp. 33-48, Springer-Verlag, 2009.

This is the full version. A preliminary version appears at ISC 2009; copyright of proceedings version: Springer.

Security of Verifiably Encrypted Signatures and a Construction Without Random Oracles
Markus Rückert, Dominique Schröder
Pairings 2009, Lecture Notes in Computer Science, Volume 5671, pp. 17-34, Springer-Verlag, 2009.

Security of Sanitizable Signatures Revisited
Christina Brzuska, Marc Fischlin, Tobias Freudenreich, Anja Lehmann, Marcus Page, Jakob Schelbert, Dominique Schröder, Florian Volk
Public-Key Cryptography (PKC) 2009, Lecture Notes in Computer Science, Volume 5443, pp. 317-336, Springer-Verlag, 2009

This is the full version. A preliminary version appears at PKC 2009; copyright of proceedings version: Springer.

Security of Blind Signatures under Aborts
Marc Fischlin, Dominique Schröder
Public-Key Cryptography (PKC) 2009, Lecture Notes in Computer Science, Volume 5443, pp. 297-316, Springer-Verlag, 2009.

This is a preliminary version. The journal version with the renamed title “Security of Blind Signatures under Aborts and Applications to Adaptive Oblivious Transfer” is not available for copyright reasons. Another preliminary version appears at PKC 2009; copyright of proceedings version: Springer.

2008

Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles
Mihir Bellare, Marc Fischlin, Adam O'Neill, Thomas Ristenpart
Crypto 2008, Lecture Notes in Computer Science, Volume 5157, pp. 360-378, Springer-Verlag, 2008.

This is the full version. A preliminary version appears at Crypto; copyright of proceedings version: IACR.

Robust Multi-Property Combiners for Hash Functions Revisited
Marc Fischlin, Anja Lehmann, Krzysztof Pietrzak
ICALP 2008, Lecture Notes in Computer Science, Volume 5125, pp. 655-667, Springer-Verlag, 2008.

This is the full version. A preliminary version appears at ICALP; copyright of proceedings version: Springer.

Security of NMAC and HMAC Based on Non-Malleability
Marc Fischlin
RSA Security Cryptographer's Track 2008, Lecture Notes in Computer Science, Volume 4964, pp. 138-154, Springer-Verlag, 2008.

This is the full version. A preliminary version appears at CT-RSA 2008; copyright of proceedings version: Springer.

Robust Multi-Property Combiners for Hash Functions
Marc Fischlin, Anja Lehmann
Theory of Cryptography Conference – TCC, Lecture Notes in Computer Science, Volume 4948, pp. 375-392, Springer-Verlag, 2008.

This is the full version. The original title of the conference version was: Multi-Property Preserving Combiners for Hash Functions. The extended abstract appears in TCC 2008; copyright of proceedings version: IACR.

2007

Security-Amplifying Combiners for Hash Functions
Marc Fischlin, Anja Lehmann
Advances in Cryptology – Crypto 2007, Lecture Notes in Computer Science, Volume 4622, pp. 224-243, Springer-Verlag, 2007.

This is the Crypto 2007 version; copyright of proceedings version: IACR.

Anonymous Signatures Made Easy
Marc Fischlin
Public-Key Cryptography – PKC 2007, Lecture Notes in Computer Science, Volume 4450, pp. 31-42, Springer-Verlag, 2007.

This is the full version; copyright of proceedings version: IACR.

A Closer Look at PKI: Security and Efficiency
Alexandra Boldyreva, Marc Fischlin, Adriana Palacio, Bogdan Warinschi
Public-Key Cryptography – PKC 2007, Lecture Notes in Computer Science, Volume 4450, pp. 458-475, Springer-Verlag, 2007.

This is the PKC version; copyright of proceedings version: IACR.

Is Your Bank Using Secure Transaction Numbers? (in German)
Marc Fischlin
D-A-CH Security 2007, IT Security and IT Mangement, pp. 14-23, syssec, 2007.

This is the full version. A preliminary version appears at D-A-CH.

Security of Invertible Media Authentication Schemes Revisited
Daniel Doenigus, Stefan Endler, Marc Fischlin, Andreas Huelsing, Patrick Jaeger, Anja Lehmann, Sergey Podrazhansky, Sebastian Schipp, Erik Tews, Sven Vowe, Matthias Walthart, Frederik Weidemann
Information Hiding 2007, Lecture Notes in Computer Science, Volume 4567, pp. 189-203, Springer-Verlag, 2008.

This is the full version. A preliminary version appears at Information Hiding 2007; copyright of proceedings version: Springer.

2006

On the Security of OAEP
Alexandra Boldyreva, Marc Fischlin
Asiacrypt 2006, Lecture Notes in Computer Science, Volume 4284, pp. 210-225, Springer-Verlag, 2006.

This is the full version; copyright of proceedings version: IACR.

Round-Optimal Composable Blind Signatures in the Common Reference String Model
Marc Fischlin
Advances in Cryptology – Crypto 2006, Lecture Notes in Computer Science, Volume 4117, pp. 60-77, Springer-Verlag, 2006.

This is the full version; copyright of proceedings version: IACR.

Universally Composable Oblivious Transfer in the Multi-Party Setting
Marc Fischlin
RSA Security Cryptographer's Track 2006, Lecture Notes in Computer Science, Volume 3860, pp. 332-349, Springer-Verlag, 2006.

This is the full version; copyright of proceedings version: Springer.

2005

Communication-Efficient Non-interactive Proofs of Knowledge with Online Extractors
Marc Fischlin
Crypto 2005, Lecture Notes in Computer Science, Volume 3621, pp. 152-168, Springer-Verlag, 2005.

This is the full version; copyright of proceedings version: IACR.

Analysis of Random Oracle Instantiation Scenarios for OAEP and Other Practical Schemes
Alexandra Boldyreva, Marc Fischlin
Crypto 2005, Lecture Notes in Computer Science, Volume 3621, pp. 412-429, Springer-Verlag, 20065.

This is the full version; copyright of proceedings version: IACR.

Completely Non-malleable Schemes
Marc Fischlin
ICALP 2005, Lecture Notes in Computer Science, Volume 3580, pp. 779-790, Springer-Verlag, 2005.

This is the full version; copyright of proceedings version: IACR.

2004

Fast Verification of Hash Chains
Marc Fischlin
CT-RSA 2004, Lecture Notes in Computer Science, Volume 2964, pp. 339-352, Springer-Verlag, 2004.

This is the full version; copyright of proceedings version: Springer.

A Privacy-Friendly Loyalty System Based on Discrete Logarithms over Elliptic Curves
Matthias Enzmann, Marc Fischlin, Markus Schneider
Financial Cryptography 2004, Lecture Notes in Computer Science, Volume 3110, pp. 24-38, Springer-Verlag, 2004.

This is the full version; copyright of proceedings version: Springer.

2003

Progressive Verification: The Case of Message Authentication
Marc Fischlin
Indocrypt 2003, Lecture Notes in Computer Science, Volume 2904, pp. 416-429, Springer-Verlag, 2003.

This is the full version; copyright of proceedings version: Springer.

The Cramer-Shoup Strong-RSASignature Scheme Revisited
Marc Fischlin
PKC'03, Lecture Notes in Computer Science, Volume 2567, pp. 116-129, Springer-Verlag, 2003.

This is the full version; copyright of proceedings version: Springer.

2002

On the Impossibility of Constructing Non-interactive Statistically-Secret Protocols from Any Trapdoor One-Way Function
Marc Fischlin
CT-RSA 2002, Lecture Notes in Computer Science, Volume 2271, pp. 79-95, Springer-Verlag, 2002.

This is the full version; copyright of proceedings version: Springer.

The Representation Problem Based on Factoring
Marc Fischlin, Roger Fischlin
CT-RSA 2002, Lecture Notes in Computer Science, Volume 2271, pp. 96-113, Springer-Verlag, 2002.

This is the full version; copyright of proceedings version: Springer.

2001

Universally Composable Commitments
Ran Canetti, Marc Fischlin
Crypto 2001, Lecture Notes in Computer Science, Volume 2139, pp. 19-40, Springer-Verlag, 2001.

This is the full version; copyright of proceedings version: Springer.

Identification Protocols Secure against Reset Attacks
Mihir Bellare, Marc Fischlin, Shafi Goldwasser, Silvio Micali
Eurocrypt 2001, Lecture Notes in Computer Science, Volume 2045, pp. 495-511, Springer-Verlag, 2001.

This is the full version; copyright of proceedings version: Springer.

A Cost-Effective Pay-Per-Multiplication Comparison Method for Millionaires
Marc Fischlin
CT-RSA 2001, Lecture Notes in Computer Science, Volume 2020, pp. 457-472, Springer-Verlag, 2001.

This is the full version; copyright of proceedings version: Springer.

2000

A Note on Security Proofs in the Generic Model
Marc Fischlin
Asiacrypt 2000, Lecture Notes in Computer Science, Volume 1976, pp. 458-469, Springer-Verlag, 2000.

This is the full version; copyright of proceedings version: Springer.

Efficient Non-malleable Commitment Schemes.
Marc Fischlin, Roger Fischlin
Crypto 2000, Lecture Notes in Computer Science, Volume 1880, pp. 413-431, Springer-Verlag, 2000.

This is the journal version of 2009; copyright of proceedings version: Springer.

1999 or earlier

Pseudorandom Function Tribe Ensembles Based on One-Way Permutations: Improvements and Applications
Marc Fischlin
Eurocrypt 1999, Lecture Notes in Computer Science, Volume 1592, pp. 432-445 Springer-Verlag, 1999.

This is the full version; copyright of proceedings version: Springer.

Cryptographic Limitations on Parallelizing Membership and Equivalence Queries with Applications to Random Self-Reductions.
Marc Fischlin
ALT'98, Lecture Notes in Computer Science, Volume 1501, pp. 72-86, Springer-Verlag, 1998.

This is the journal version of 2001; copyright of proceedings version: Springer.

Lower Bounds for the Signature Size of Incremental Schemes
Marc Fischlin
FOCS 1997, pp. 438-447, IEEE Computer Society, 1997.

This is the full version.

Practical Memory Checkers for Stacks, Queues and Deques
Marc Fischlin
ACISP'97, Lecture Notes in Computer Science, Volume 1270, pp. 114-125, Springer-Verlag, 1997.

This is the full version; copyright of proceedings version: Springer.

Incremental Cryptography and Memory Checkers
Marc Fischlin
Eurocrypt 1997, Lecture Notes in Computer Science, Volume 1233, pp. 293-408, Springer-Verlag, 1997.

This is the full version; copyright of proceedings version: Springer.

Disclaimer

The documents contained in these directories are included by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.