Adaptive Proofs of Knowledge in the Random Oracle Model
David Bernhard, Marc Fischlin, Bogdan Warinschi
IET Information Security, Volume 10, Number 6, pp. 319–331, The Institution of Engineering and Technology, 2016
This is a link to the ePrint version 2015/648. A preliminary version appears in PKC 2015, Lecture Notes in Computer Science, Volume 9020, pp. 629–649, Springer-Verlag, 2015.
Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes
Felix Günther, Bertram Poettering
International Journal of Information Security (IJIS), ????:??–??. Springer Verlag, 2016.
This is a link to the ePrint version 2014/014. A preliminary version appeared at: ACISP 2015, Lecture Notes in Computer Science, Volume 9144, pp. 195–212, Springer-Verlag, 2015.
Unpicking PLAID – A Cryptographic Analysis of an ISO-standards-track Authentication Protocol
Jean Paul Degabriele, Victoria Fehr, Marc Fischlin, Tommaso Gagliardoni, Felix Günther, Giorgia Azzurra Marson, Arno Mittelbach, Kenneth G. Paterson
International Journal of Information Security (IJIS), Volume 15, Number 6, pp. 637–657. Springer Verlag, 2016.
This is a link to the ePrint version 2014/728. A preliminary version appears at: SSR 2014, Lecture Notes in Computer Science, Volume 8893, pp. 1–25, Springer-Verlag, 2014.
Robust Multi-Property Combiners for Hash Functions
Marc Fischlin, Anja Lehmann, Krzysztof Pietrzak
Journal of Cryptology, Volume 27, No. 3, pp. 397-428, Springer-Verlag, 2014.
This is the full version of the TCC'08 and ICALP'08 papers.
Less is more: relaxed yet composable security notions for key exchange
Christina Brzuska, Marc Fischlin, Nigel P. Smart, Bogdan Warinschi, Stephen C. Williams
International Journal on Information Security, Volume 12, No. 4, pp. 267-297, Springer-Verlag, 2013
This is the link to the eprint version 2012/242.
Security of Blind Signatures Under Aborts and Applications to Adaptive Oblivious Transfer
Marc Fischlin, Dominique Schröder
Journal of Mathematical Cryptology, Issue 2, pp. 169-203, Elsevier, October 2011.
This is the full version of the PKC'09 paper. Please check again later for an online version.
This is the (semantically equivalent to the) journal version of the Crypto 2000 paper. For some reason which escapes us, Journal of Cryptology re-published this paper again in Volume 24(1), pp. 203-244, 2011.
Cryptographic Limitations on Parallelizing Membership and Equivalence Queries with Applications to Random-Self-Reductions
Theoretical Computer Scienc, Volume 268, Number 2, pp. 199-219, Elsevier, 2001.
This is the full version of the ALT'98 paper.
The documents contained in these directories are included by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.