Forschung

Aktuelle Publikationen

Disclaimer

Simulatable Channels: Extended Security that is Universally Composable and Easier to Prove
Jean Paul Degabriele and Marc Fischlin
Asiacrypt 2018, Part ?, Lecture Notes in Computer Science, Volume ?????, pp. ???-???, Springer-Verlag, 2018.

Please check again later for an online version.

Combiners for Backdoored Random Oracles
Balthazar Bauer, Pooya Farshim, and Sogol Mazaheri
CRYPTO 2018, Lecture Notes in Computer Science, Volume 10992, pp. 272-302, Springer-Verlag, 2018.

This is a link to the IACR ePrint version, Report 2018/770.

Invisible Sanitizable Signatures and Public-Key Encryption are Equivalent
Marc Fischlin and Patrick Harasser
ACNS 2018, Lecture Notes in Computer Science, Volume 10892, pp. 202-220, Springer Verlag, 2018.

This is a link to the IACR ePrint version, Report 2018/337.

Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks
Marc Fischlin and Sogol Mazaheri
31st IEEE Computer Security Foundations Symposium (CSF 2018), pp. 76-90, IEEE, 2018.

This is a link to the IACR ePrint version, Report 2017/984.

Backdoored Hash Functions: Immunizing HMAC and HKDF
Marc Fischlin, Christian Janson, and Sogol Mazaheri
31st IEEE Computer Security Foundations Symposium (CSF 2018), pp. 105-118, IEEE, 2018.

This is a link to the IACR ePrint version, report 2018/362.

Untagging Tor: A Formal Treatment of Onion Encryption
Jean Paul Degabriele and Martijn Stam
Eurocrypt 2018, Part III, Lecture Notes in Computer Science, Volume 10822, pp. 259-293, Springer-Verlag, 2018.

This is a link to the IACR ePrint version, Report 2018/162.

CogniCrypt: Supporting Developers in using Cryptography
Stefan Krüger, Sarah Nadi, Michael Reif, Karim Ali, Mira Mezini, Eric Bodden, Florian Göpfert, Felix Günther, Christian Weinert, Daniel Demmler, and Ram Kamath
32nd IEEE/ACM International Conference on Automated Software Engineering (ASE 2017), pp. 931-936, ACM, 2017.

Zero Round-Trip Time for the Extended Access Control Protocol
Jacqueline Brendel and Marc Fischlin
ESORICS 2017, Part I, Lecture Notes in Computer Science, Volume 10492, pp. 297-314, Springer-Verlag, 2017.

This is a link to the IACR ePrint version, Report 2017/060.

PRF-ODH: Relations, Instantiations, and Impossibility Results
Jacqueline Brendel, Marc Fischlin, Felix Günther, and Christian Janson
CRYPTO 2017, Part III, Lecture Notes in Computer Science, Volume 10403, pp. 651-681, Springer-Verlag, 2017.

This is a link to the IACR ePrint version, Report 2017/517.

A Formal Treatment of Multi-key Channels
Felix Günther and Sogol Mazaheri
CRYPTO 2017, Part III, Lecture Notes in Computer Science, Volume 10403, pp. 587-618, Springer-Verlag, 2017.

This is a link to the IACR ePrint version, Report 2017/501.

Redactable Graph Hashing, Revisited (short paper)
Andreas Erwig, Marc Fischlin, Martin Hald, Dominik Helm, Robert Kiel, Florian Kübler, Michael Kümmerlin, Jakob Laenge, Felix Rohrbach
ACISP 2017 (Part II), Lecture Notes in Computer Science, Volume 10343, pp. 398–405, Springer-Verlag, 2017

This is the full version; copyright of the proceedings version: Springer.

0-RTT Key Exchange with Full Forward Secrecy
Felix Günther, Britta Hale, Tibor Jager, and Sebastian Lauer
Eurocrypt 2017, Lecture Notes in Computer Science, Volume 10212, pp. 519-548, Springer-Verlag, 2017.

This is a link to the IACR ePrint version, Report 2017/223.

Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates
Marc Fischlin, Felix Günther
EuroS&P 2017, pp. 60-75, IEEE, 2017.

This is a link to the IACR ePrint version, Report 2017/082.

Cloud Storage File Recoverability
Christian A. Gorke, Christian Janson, Frederik Armknecht, and Carlos Cid
AsiaCCS-SCC 2017, pp. 19-26, ACM, 2017.

This is a link to the IACR ePrint version, Report 2017/167.