Konferenzpublikationen

2024

Integrating Causality in Messaging Channels
Shan Chen, Marc Fischlin
Eurocrypt 2024, Lecture Notes in Computer Science, Volume ???, pp. ??-??, Springer, 2024.

Please check again later for an online version.

2023

(wird in neuem Tab geöffnet)Searching for ELFs in the Cryptographic Forest
Marc Fischlin, Felix Rohrbach
TCC 2023, Lecture Notes in Computer Science, Volume 14371, pp. 207-236, Springer-Verlag, 2023.

This is a link to the IACR ePrint version, Report 2023/1403.

The Indifferentiability of the Duplex and its Practical Applications
Jean Paul Degabriele, Marc Fischlin, Jerome Govinden
Asiacrypt 2023, Lecture Notes in Computer Science, Volume 14445, pp. 237-269, Springer, 2023.

Please check again later for an online version.

(wird in neuem Tab geöffnet)Verifiable Verification in Cryptographic Protocols
Marc Fischlin, Felix Günther
CCS 2023, pp. 3239-3253, ACM, 2023.

This is a link to the IACR ePrint version, Report 2023/1214.

(wird in neuem Tab geöffnet)Stealth Key Exchange and Confined Access to the Record Protocol Data in TLS 1.3
Marc Fischlin
CCS 2023, pp. 2901-2914, ACM, 2023.

This is a link to the IACR ePrint version, Report 2023/651.

(wird in neuem Tab geöffnet)Post-Quantum Security for the Extended Access Control Protocol
Marc Fischlin, Jonas von der Heyden, Marian Margraf, Frank Morgner, Andreas Wallner, Holger Bock
SSR 2023, Lecture Notes in Computer Science, Volume 13895, pp. 22-52, Springer-Verlag, 2023.

This is a link to the IACR ePrint version, Report 2023/352.

2022

Beyond Uber: Instantiating Generic Groups via PGGs
Balthazar Bauer, Pooya Farshim, Patrick Harasser, Adam O'Neill
TCC 2022, Lecture Notes in Computer Science, Volume 13749, pp. 212-242, Springer-Verlag, 2022.

Please check again later for the online version.

(wird in neuem Tab geöffnet)Nostradamus goes Quantum
Barbara Jiabao Benedikt, Marc Fischlin, Moritz Huppert
Asiacrypt 2022, Lecture Notes in Computer Science, Volume 13793, pp. 583-613, Springer-Verlag, 2022.

This is a link to the IACR ePrint version, Report 2022/1213.

(wird in neuem Tab geöffnet)A Random Oracle for All of Us
Marc Fischlin, Felix Rohrbach, Tobias Schmalz
Africacrypt 2022, Lecture Notes in Computer Science, Volume 13503, pp. 469-489, Springer-Verlag, 2022.

This is a link to the IACR ePrint version, Report 2022/906.

(wird in neuem Tab geöffnet)Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake
Jacqueline Brendel, Rune Fiedler, Felix Günther, Christian Janson, Douglas Stebila
PKC 2022, Lecture Notes in Computer Science, Volume 13178, Part II, pp. 3-34, Springer-Verlag, 2022.

This is a link to the IACR ePrint version, Report 2021/769.

2021

(wird in neuem Tab geöffnet)BlindOR: an Efficient Lattice-Based Blind Signature Scheme from OR-Proofs
Nabil Alkeilani Alkadri, Patrick Harasser, Christian Janson
CANS 2021, Lecture Notes in Computer Science, Volume 13099, pp. 95-115, Springer-Verlag, 2021.

This is a link to the IACR ePrint version, Report 2021/1385.

On Derandomizing Yao's Weak-to-Strong OWF Construction
Chris Brzuska, Geoffroy Couteau, Pihla Karanko, Felix Rohrbach
TCC 2021, Lecture Notes in Computer Science, Volume 13043, Part II, pp. 429-456, Springer-Verlag, 2021.

Please check again later for the online version.

(wird in neuem Tab geöffnet)Provable Security Analysis of FIDO2
Manuel Barbosa, Alexandra Boldyreva, Shan Chen, Bogdan Warinschi
Crypto 2021, Lecture Notes in Computer Science, Volume 12827, Part III, pp. 125-156, Springer-Verlag, 2021.

This is a link to the IACR ePrint version, Report 2020/756.

Multipath TLS 1.3
Marc Fischlin, Sven-Andre Müller, Jean-Pierre Münch, Lars Porth
ESORICS 2021, Lecture Notes in Computer Science, Volume 12973, Part II, pp. 86-105, Springer-Verlag, 2021.

Please check again later for the online version.

(wird in neuem Tab geöffnet)BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures
Cas Cremers, Samed Düzlü, Rune Fiedler, Marc Fischlin, and Christian Janson
IEEE Symposium on Security and Privacy (S&P 2021), IEEE, 2021

This is a link to the IACR ePrint version, Report 2020/1525.

(wird in neuem Tab geöffnet)Single-to-Multi-Theorem Transformations for Non-Interactive Statistical Zero-Knowledge
Marc Fischlin, Felix Rohrbach
PKC 2021, Lecture Notes in Computer Science, Volume 12711, pp. 205-234, Springer-Verlag, 2021.

This is a link to the IACR ePrint version, Report 2020/1204.

2020

On the Memory Fault Resilience of TLS 1.3
Lukas Brandstetter, Marc Fischlin, Robin Leander Schröder, and Michael Yonli
Security Standardisation Research (SSR) Conference 2020, Lecture Notes in Computer Science, Volume ???, pp. ??-??, Springer-Verlag, 2020.

Please check later for the online version.

(wird in neuem Tab geöffnet)Towards Post-Quantum Security for Signal's X3DH Handshake
Jacqueline Brendel, Marc Fischlin, Felix Günther, Christian Janson, and Douglas Stebila
Selected Areas in Cryptography, 27th International Conference, SAC 2020, Lecture Notes in Computer Science, Volume ???, pp. ??-??, Springer-Verlag, 2020.

This is a link to the IACR ePrint version, Report 2019/1356.

Towards Defeating Backdoored Random Oracles: Indifferentiability with Bounded Adaptivity
Yevgeniy Dodis, Pooya Farshim, Sogol Mazaheri, and Stefano Tessaro
TCC 2020, Part ?, Lecture Notes in Computer Science, Volume ???, pp. ???-???, Springer-Verlag, 2020.

Please check again later for an online version.

(wird in neuem Tab geöffnet)Security Reductions for White-Box Key-Storage in Mobile Payments
Estuardo Alpirez Bock, Chris Brzuska, Marc Fischlin, Christian Janson and Wil Michiels
Asiacrypt 2020, Part ?, Lecture Notes in Computer Science, Volume ???, pp. ???-???, Springer-Verlag, 2020.

This is a link to the IACR ePrint version, Report 2019/1014.

(wird in neuem Tab geöffnet)Client-oblivious OPRAM
Gareth T. Davies, Christian Janson, and Daniel P. Martin
ICICS 2020, Lecture Notes in Computer Science, Volume ???, pp. ???, Springer-Verlag, 2020.

This is a link to the IACR ePrint version, Report 2020/858..

Information-Theoretic Security of Cryptographic Channels
Marc Fischlin, Felix Günther, Phillip Muth
ICICS 2020, Lecture Notes in Computer Science, Volume ???, pp. ???-???, Springer-Verlag, 2020.

Please check again later for an online version.

(wird in neuem Tab geöffnet)Firmware Insider: Bluetooth Randomness is Mostly Random
Jörn Tillmanns, Jiska Classen, Felix Rohrbach and Matthias Hollick
14th USENIX Workshop on Offensive Technologies, WOOT 2020, USENIX Association, 2020.

This is a link to the arXiv version, Report 2006.16921.

(wird in neuem Tab geöffnet)MagicPairing: Apple's take on securing bluetooth peripherals
Dennis Heinze, Jiska Classen and Felix Rohrbach
WiSec '20: Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 111-121, ACM, 2020.

This is a link to the arXiv version, Report 2005.07255.

(wird in neuem Tab geöffnet)Signatures from Sequential-OR Proofs
Marc Fischlin, Patrick Harasser, and Christian Janson
Eurocrypt 2020, Part III, Lecture Notes in Computer Science, Volume 12107, pp. 212-244, Springer-Verlag, 2020.

This is a link to the IACR ePrint version, Report 2020/271.

(wird in neuem Tab geöffnet)Authentication in Key-Exchange: Definitions, Relations and Compositions
Cyprien Delpech de Saint Guilhem,Marc Fischlin and Bogdan Warinschi
CSF 2020, pp. 288-303, IEEE, 2020.

This is a link to the IACR ePrint version, Report 2019/1203.

(wird in neuem Tab geöffnet)Modeling Memory Faults in Signature and Authenticated Encryption Schemes
Marc Fischlin, Felix Günther
CT-RSA 2020, Lecture Notes in Computer Science, Volume 12006, pp. 56-84, Springer-Verlag, 2020.

This is a link to the IACR ePrint version, Report 2019/1053.

2019

(wird in neuem Tab geöffnet)Sponges Resist Leakage: The Case of Authenticated Encryption
Jean Paul Degabriele, Christian Janson, and Patrick Struck
Asiacrypt 2019, Part II, Lecture Notes in Computer Science, Volume 11922, pp. 209-240, Springer-Verlag, 2019.

This is a link to the IACR ePrint version, Report 20197/1034.

(wird in neuem Tab geöffnet)Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids
Jacqueline Brendel, Marc Fischlin, Felix Günther
ESORICS 2019, Part II, Lecture Notes in Computer Science, Volume 11736, pp. 521-541, Springer-Verlag, 2019.

This is a link to the IACR ePrint version, Report 2017/1252.


How to Sign with White-Boxed AES
Marc Fischlin and Helene Haagh
Latincrypt 2019, Lecture Notes in Computer Science, Volume 11774, pp. 259-279, Springer-Verlag, 2019.

Please check again later for an online version.


(wird in neuem Tab geöffnet)Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange
Nina Bindel, Jacqueline Brendel, Marc Fischlin, Brian Goncalves, Douglas Stebila
PQCrypto 2019, Lecture Notes in Computer Science, Volume 11505, pp. 206-226, Springer-Verlag, 2019.

This is a link to the IACR ePrint version, Report 2018/903.

2018

(wird in neuem Tab geöffnet)Simulatable Channels: Extended Security that is Universally Composable and Easier to Prove
Jean Paul Degabriele and Marc Fischlin
Asiacrypt 2018, Part 3, Lecture Notes in Computer Science, Volume 11274, pp. 519-550, Springer-Verlag, 2018.

This is a link to the IACR ePrint version, Report 2018/844.

(wird in neuem Tab geöffnet)Combiners for Backdoored Random Oracles
Balthazar Bauer, Pooya Farshim, and Sogol Mazaheri
CRYPTO 2018, Lecture Notes in Computer Science, Volume 10992, pp. 272-302, Springer-Verlag, 2018.

This is a link to the IACR ePrint version, Report 2018/770.

(wird in neuem Tab geöffnet)Invisible Sanitizable Signatures and Public-Key Encryption are Equivalent
Marc Fischlin and Patrick Harasser
ACNS 2018, Lecture Notes in Computer Science, Volume 10892, pp. 202-220, Springer Verlag, 2018.

This is a link to the IACR ePrint version, Report 2018/337.


(wird in neuem Tab geöffnet)Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks
Marc Fischlin and Sogol Mazaheri
31st IEEE Computer Security Foundations Symposium (CSF 2018), pp. 76-90, IEEE, 2018.

This is a link to the IACR ePrint version, Report 2017/984.


(wird in neuem Tab geöffnet)Backdoored Hash Functions: Immunizing HMAC and HKDF
Marc Fischlin, Christian Janson, and Sogol Mazaheri
31st IEEE Computer Security Foundations Symposium (CSF 2018), pp. 105-118, IEEE, 2018.

This is a link to the IACR ePrint version, report 2018/362.


(wird in neuem Tab geöffnet)Untagging Tor: A Formal Treatment of Onion Encryption
Jean Paul Degabriele and Martijn Stam
Eurocrypt 2018, Part III, Lecture Notes in Computer Science, Volume 10822, pp. 259-293, Springer-Verlag, 2018.

This is a link to the IACR ePrint version, Report 2018/162.

2017


CogniCrypt: Supporting Developers in using Cryptography
Stefan Krüger, Sarah Nadi, Michael Reif, Karim Ali, Mira Mezini, Eric Bodden, Florian Göpfert, Felix Günther, Christian Weinert, Daniel Demmler, and Ram Kamath
32nd IEEE/ACM International Conference on Automated Software Engineering (ASE 2017), pp. 931-936, ACM, 2017.


(wird in neuem Tab geöffnet)Zero Round-Trip Time for the Extended Access Control Protocol
Jacqueline Brendel, Marc Fischlin
ESORICS 2017, Lecture Notes in Computer Science, Volume ????, pp. ???-???, Springer-Verlag, 2017.

This is a link to the IACR ePrint version, Report 2017/060.


(wird in neuem Tab geöffnet)PRF-ODH: Relations, Instantiations, and Impossibility Results
Jacqueline Brendel, Marc Fischlin, Felix Günther, and Christian Janson
CRYPTO 2017, Part III, Lecture Notes in Computer Science, Volume 10403, pp. 651-681, Springer-Verlag, 2017.

This is a link to the IACR ePrint version, Report 2017/517.


(wird in neuem Tab geöffnet)A Formal Treatment of Multi-key Channels
Felix Günther and Sogol Mazaheri
CRYPTO 2017, Part III, Lecture Notes in Computer Science, Volume 10403, pp. 587-618, Springer-Verlag, 2017.

This is a link to the IACR ePrint version, Report 2017/501.


(wird in neuem Tab geöffnet) Redactable Graph Hashing, Revisited (short paper)
Andreas Erwig, Marc Fischlin, Martin Hald, Dominik Helm, Robert Kiel, Florian Kübler, Michael Kümmerlin, Jakob Laenge, Felix Rohrbach
ACISP 2017 (Part II), Lecture Notes in Computer Science, Volume 10343, pp. 398–405, Springer-Verlag, 2017

This is the full version; copyright of the proceedings version: Springer.


(wird in neuem Tab geöffnet)0-RTT Key Exchange with Full Forward Secrecy
Felix Günther, Britta Hale, Tibor Jager, and Sebastian Lauer
Eurocrypt 2017, Lecture Notes in Computer Science, Volume 10212, pp. 519-548, Springer-Verlag, 2017.

This is a link to the IACR ePrint version, Report 2017/223.


(wird in neuem Tab geöffnet)Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates
Marc Fischlin, Felix Günther
EuroS&P 2017, pp. 60-75, IEEE, 2017.

This is a link to the IACR ePrint version, Report 2017/082.


(wird in neuem Tab geöffnet)Cloud Storage File Recoverability
Christian A. Gorke, Christian Janson, Frederik Armknecht, and Carlos Cid
AsiaCCS-SCC 2017, pp. 19-26, ACM, 2017.

This is a link to the IACR ePrint version, Report 2017/167.

2016


Efficient Proactive Secret Sharing
Jacqueline Brendel, Denise Demirel
2016 Privacy, Security and Trust Conference, IEEE, 2016.

Please check again later for the online version.


(wird in neuem Tab geöffnet) Attribute-based Access Control Architectures with the eIDAS Protocols
Frank Morgner, Paul Bastian, Marc Fischlin
SSR 2016, Lecture Notes in Computer Science, Volume 10074, pp. 205-226, Springer-Verlag, 2016.

This is the full version. Copyright of the proceedings version: Springer-Verlag.


(wird in neuem Tab geöffnet)Secure Logging Schemes and Certificate Transparency
Benjamin Dowling, Felix Günther, Udyani Herath, and Douglas Stebila
ESORICS 2016, Part II, Lecture Notes in Computer Science, Volume 9879, pp. 140-158, Springer-Verlag, 2016.

This is a link to the eprint version 2016/452.


(wird in neuem Tab geöffnet) Securing Transactions with the eIDAS Protocols
Frank Morgner, Paul Bastian, Marc Fischlin
WISTP 2016, Lecture Notes in Computer Science, Volume 9895, pp. 3-18, Springer-Verlag, 2016.

This is the full version. Copyright of the proceedings version: Springer-Verlag.


(wird in neuem Tab geöffnet)Obfuscation Combiners
Marc Fischlin, Amir Herzberg, Hod Bin Noon, Haya Shulman
Crypto 2016, Part II, Lecture Notes in Computer Science, Volume 9815, pp. 521-550, Springer-Verlag, 2016.

This is a link to the eprint version 2016/289.


(wird in neuem Tab geöffnet)Semantic Security and Indistinguishability in the Quantum World
Tommaso Gagliardoni, Andreas Hülsing, Christian Schaffner
Crypto 2016, Part III,, Lecture Notes in Computer Science, Volume 9816, pp. 60-89, Springer-Verlag, 2016.

This is a link to the eprint version 2015/355.


Key Confirmation in Key Exchange: A Formal Treatment and Implications for TLS 1.3
Marc Fischlin, Felix Günther, Benedikt Schmidt, and Bogdan Warinschi
37th IEEE Symposium on Security and Privacy (S&P 2016), IEEE, May 2016.

Please check later for an online version.


(wird in neuem Tab geöffnet)An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation
Sedat Akleylek, Nina Bindel, Johannes Buchmann, Juliane Krämer and Giorgia Azzurra Marson
Africacrypt 2016, Lecture Notes in Computer Science, Volume 9646, pp. 44–60, Springer-Verlag, 2016

This is a link to the eprint version 2016/030.


(wird in neuem Tab geöffnet)On the Hardness of Proving CCA-security of Signed ElGamal
David Bernhard, Marc Fischlin, Bogdan Warinschi
PKC 2016, Lecture Notes in Computer Science, Volume 9614, pp. 47–69, Springer-Verlag, 2016

This is a link to the ePrint version 2015/649.

2015


(wird in neuem Tab geöffnet)A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates
Benjamin Dowling, Marc Fischlin, Felix Günther, and Douglas Stebila
ACM Computer and Communication Security (CCS 2015), pp. 1197–1210, ACM, 2015

This is a link to the eprint version 2015/914.


Notions of Deniable Message Authentication
Marc Fischlin and Sogol Mazaheri
ACM Workshop on Privacy in the Electronic Society (WPES 2015), pp. 55–64, ACM, 2015

Please check later for an online version.


Data Is a Stream: Security of Stream-Based Channels
Marc Fischlin, Felix Günther, Giorgia Azzurra Marson, and Kenneth G. Paterson
CRYPTO 2015, Lecture Notes in Computer Science, Volume 9216, pp. 545–564, Springer-Verlag, 2015

Please check later for an online version.


(wird in neuem Tab geöffnet)Linkable Message Tagging: Solving the key distribution problem of signature schemes
Felix Günther and Bertram Poettering
ACISP 2015, Lecture Notes in Computer Science, Volume 9144, pp. 195–212, Springer-Verlag, 2015

This is a link to the eprint version 2014/014.


(wird in neuem Tab geöffnet) Privately Computing Set-Union and Set-Intersection Cardinality via Bloom Filters
Rolf Egert, Marc Fischlin, David Gens, Sven Jacob, Matthias Senker and Jörn Tillmanns
ACISP 2015, Lecture Notes in Computer Science, Volume 9144, pp. 413–430, Springer-Verlag, 2015

This is the full version; copyright of the proceedings version: Springer.


(wird in neuem Tab geöffnet)Adaptive Proofs of Knowledge in the Random Oracle Model
David Bernhard, Marc Fischlin, Bogdan Warinschi
PKC 2015, Lecture Notes in Computer Science, Volume 9020, pp. 629–649, Springer-Verlag, 2015

This is a link to the ePrint version 2015/648.


(wird in neuem Tab geöffnet)Random-Oracle Uninstantiability from Indistinguishability Obfuscation
Christina Brzuska, Pooya Farshim, Arno Mittelbach
Theory of Cryptography Conference – TCC, Part II, Lecture Notes in Computer Science, Volume 9015, pp. 428–455, Springer-Verlag, 2015

This is a link to the ePrint version 2014/867.

2014


(wird in neuem Tab geöffnet)Unpicking PLAID – A Cryptographic Analysis of an ISO-standards-track Authentication Protocol
Jean Paul Degabriele, Victoria Fehr, Marc Fischlin, Tommaso Gagliardoni, Felix Günther, Giorgia Azzurra Marson, Arno Mittelbach, Kenneth G. Paterson
SSR 2014, Lecture Notes in Computer Science, Volume 8893, pp. 1–25, Springer-Verlag, 2014

This is a link to the ePrint version 2014/728. See also the journal version from 2016.


(wird in neuem Tab geöffnet)Indistinguishability Obfuscation versus Multi-Bit Point Obfuscation with Auxiliary Input
Christina Brzuska, Arno Mittelbach
Asiacrypt 2014, Lecture Notes in Computer Science, Volume 8874, pp. 142-161, Springer-Verlag, 2014

This is a link to the ePrint version 2014/405.


(wird in neuem Tab geöffnet)Using Indistinguishability Obfuscation via UCEs
Christina Brzuska, Arno Mittelbach
Asiacrypt 2014, Lecture Notes in Computer Science, Volume 8874, pp. 122-141, Springer-Verlag, 2014

This is a link to the ePrint version 2014/381.


(wird in neuem Tab geöffnet) Multi-Stage Key Exchange and the Case of Google's QUIC Protocol
Marc Fischlin, Felix Günther
ACM Computer and Communication Security (CCS 2014), pp. 1193–1204, ACM, 2014.

This is the full version. A preliminary version appears at CCS 2014 (DOI: 10.1145/2660267.2660308); copyright of proceedings version: ACM.


(wird in neuem Tab geöffnet)Privacy-Enhanced Participatory Sensing with Collusion-Resistance and Data Aggregation
Felix Günther, Mark Manulis, Andreas Peter
CANS 2014, Lecture Notes in Computer Science, Volume 8813, pp. 321–336, Springer-Verlag, 2014.

This is a link to the ePrint version 2014/382.


(wird in neuem Tab geöffnet)Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources
Christina Brzuska, Pooya Farshim, Arno Mittelbach
Crypto 2014, Lecture Notes in Computer Science, Volume 8616, pp. 188-215, Springer-Verlag, 2014.

This is a link to the eprint version 2014/099.


(wird in neuem Tab geöffnet)Intercepting Tokens in Cryptographic Protocols: The Empire Strikes Back in the Clone Wars
Özgür Dagdelen, Marc Fischlin
ISIT 2014 – IEEE International Symposium on Information Theory, IEEE, 2014.

This is a link to the eprint version 2012/537.


(wird in neuem Tab geöffnet)Salvaging Indifferentiability in a Multi-stage Setting
Arno Mittelbach
Eurocrypt 2014, Lecture Notes in Computer Science, Volume 8441, pp. 603-621, Springer-Verlag, 2014

This is a link to the eprint version 2013/286.


(wird in neuem Tab geöffnet)General Impossibility of Group Homomorphic Encryption in the Quantum World
Frederik Armknecht, Tommaso Gagliardoni, Stefan Katzenbeisser, Andreas Peter
PKC 2014, Lecture Notes in Computer Science, Volume 8383, pp. 556-573, Springer-Verlag, 2014

This is a link to the eprint version 2014/029.

2013


The PACE|CA Protocol for Machine Readable Travel Documents
Jens Bender, Marc Fischlin, Dennis Kügler
INTRUST 2013, Lecture Notes in Computer Science, Volume 8292, pp. 17-35, Springer-Verlag, 2013


(wird in neuem Tab geöffnet)The Fiat-Shamir Transformation in a Quantum World
Özgür Dagdelen, Marc Fischlin, Tommaso Gagliardoni
Asiacrypt 2013, Lecture Notes in Computer Science, Volume 8270, pp. 62-81, Springer-Verlag, 2013

This is a link to the eprint version 2013/245.


(wird in neuem Tab geöffnet)Notions of Black-Box Reductions, Revisited
Paul Baecher, Christina Brzuska, Marc Fischlin
Asiacrypt 2013, Lecture Notes in Computer Science, Volume 8269, pp. 1296-315, Springer-Verlag, 2013

This is a link to the eprint version 2013/101.


(wird in neuem Tab geöffnet)Reset Indifferentiability and its Consequences
Paul Baecher, Christina Brzuska, Arno Mittelbach
Asiacrypt 2013, Lecture Notes in Computer Science, Volume 8269, pp. 154-173, Springer-Verlag, 2013

This is a link to the eprint version 2013/459.


(wird in neuem Tab geöffnet)A Cryptographic Analysis of OPACITY
Özgür Dagdelen, Marc Fischlin, Tommaso Gagliardoni, Giorgia Azzurra Marson, Arno Mittelbach, Cristina Onete
ESORICS 2013, Lecture Notes in Computer Science, Volume 8134, pp. 345-362, Springer-Verlag, 2013

This is a link to the eprint version 2013/234.


(wird in neuem Tab geöffnet)Practical Secure Logging: Seekable Sequential Key Generators
Giorgia Azzurra Marson, Bertram Poettering
ESORICS 2013, Lecture Notes in Computer Science, Volume 8134, pp. 111-128, Springer-Verlag, 2013

This is a link to the eprint version 2013/397.


(wird in neuem Tab geöffnet)Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions
Paul Baecher, Pooya Farshim, Marc Fischlin, Martijn Stam
Eurocrypt 2013, Lecture Notes in Computer Science, Volume 7881, pp. 426-443, Springer-Verlag, 2013

This is a link to the eprint version 2013/350.


(wird in neuem Tab geöffnet)Limitations of the Meta-Reduction Technique: The Case of Schnorr Signatures
Marc Fischlin, Nils Fleischhacker
Eurocrypt 2013, Lecture Notes in Computer Science, Volume 7881, pp. 444-460, Springer-Verlag, 2013

This is a link to the eprint version 2013/140.


(wird in neuem Tab geöffnet)Cryptophia's Short Combiner for Collision-Resistant Hash Functions
Arno Mittelbach
ACNS 2013, Lecture Notes in Computer Science, Volume 7954, pp. 136-153, Springer-Verlag, 2013

This is a link to the eprint version 2013/210.


(wird in neuem Tab geöffnet)Computing on Authenticated Data for Adjustable Predicates
Björn Deiseroth, Victoria Fehr, Marc Fischlin, Manuel Maasz, Nils Fabian Reimers, Richard Stein
ACNS 2013, Lecture Notes in Computer Science, Volume 7954, pp. 53-68, Springer-Verlag, 2013

This is a link to the eprint version 2013/217.


(wird in neuem Tab geöffnet)Robust Encryption, Revisited
Pooya Farshim, Benoit Libert, Kenneth G. Paterson, Elizabeth A. Quaglia
PKC 2013, Lecture Notes in Computer Science, Volume 7778, pp. 352-368, Springer-Verlag, 2013

This is a link to the eprint version 2012/673.


(wird in neuem Tab geöffnet)On the Semantic Security of Functional Encryption Schemes
Manuel Barbosa, Pooya Farshim
PKC 2013, Lecture Notes in Computer Science, Volume 7778, pp. 143-161, Springer-Verlag, 2013

This is a link to the eprint version 2012/474.


(wird in neuem Tab geöffnet)Rate-Limited Secure Function Evaluation
Özgür Dagdelen, Payman Mohassel, Daniele Venturi
PKC 2013, Lecture Notes in Computer Science, Volume 7778, pp. 461-478, Springer-Verlag, 2013

This is the link to the eprint version 2013/021.


Subtle Kinks in Distance-Bounding: an Analysis of Prominent Protocols
Marc Fischlin, Cristina Onete
Security and Privacy in Wireless and Mobile Networks (WiSec) 2013, ACM, 2013


Efficient, Secure, Private Distance Bounding without Key Updates
Jens Hermans, Cristina Onete, Roel Peeters
Security and Privacy in Wireless and Mobile Networks (WiSec) 2013, ACM, 2013

2012


(wird in neuem Tab geöffnet)Domain-Specific Pseudonymous Signatures for the German Identity Card
Jens Bender, Özgür Dagdelen, Marc Fischlin, Dennis Kügler
Information Security Conference (ISC) 2012, Lecture Notes in Computer Science, Volume 7483, pp. 104-119, Springer-Verlag, 2012.

This is a link to the eprint version 2012/558.


(wird in neuem Tab geöffnet)On the Joint Security of Signature and Encryption Schemes under Randomness Reuse: Efficiency and Security Amplification
Afonso Arriaga, Manuel Barbosa, Pooya Farshim
Applied Cryptography and Network Security (ACNS) 2012, Lecture Notes in Computer Science, Volume 7341, pp. 206-223, Springer-Verlag, 2012.

This is a link to the eprint version 2012/382.


(wird in neuem Tab geöffnet) Black-Box Reductions and Separations in Cryptography
Marc Fischlin
Africacrypt 2012, Lecture Notes in Computer Science, Volume 7374, pp. 413-427, Springer-Verlag, 2012

Invited Talk. Besides minor changes this is the version as it appears in the proceedings (but reformated from LNCS style).


(wird in neuem Tab geöffnet) History-Free Sequential Aggregate Signatures
Marc Fischlin, Anja Lehmann, Dominique Schröder
Security and Cryptography for Networks
(SCN) 2012, Lecture Notes in Computer Science, Volume 7485, pp. 113-130, Springer-Verlag, 2012

This is the full version. A preliminary version appears at SCN 2012; copyright of proceedings version: Springer.


(wird in neuem Tab geöffnet)Hash Combiners for Second Pre-Image Resistance, Target Collision Resistance and Pre-Image Resistance have Long Output
Arno Mittelbach
(SCN) 2012, Lecture Notes in Computer Science, Volume 7485, pp. 522-539, Springer-Verlag, 2013

This is a link to the eprint version 2013/210.


(wird in neuem Tab geöffnet) TLS, PACE, and EAC: A Cryptographic View at Modern Key Exchange Protocols
Christina Brzuska, Özgür Dagdelen, Marc Fischlin
Sicherheit 2012, Lecture Notes in Informatics, Volume P-195, pp. 71-82, Gesellschaft für Informatik (GI), 2012.


(wird in neuem Tab geöffnet) Merging the Cryptographic Security Analysis and the Algebraic-Logic Security Proof for PACE
Lassaad Cheikhrouhou, Werner Stephan, Özgür Dagdelen, Marc Fischlin, Markus Ullmann
Sicherheit 2012, Lecture Notes in Informatics, Volume P-195, pp. 83-94, Gesellschaft für Informatik (GI), 2012.


The PACE|AA Protocol for Machine Readable Travel Documents, and its Security
Jens Bender, Özgür Dagdelen, Marc Fischlin and Dennis Kügler
Financial Cryptography, Lecture Notes in Computer Science, Volume 7397, pp. 344-358, Springer-Verlag, 2012.

Please check again later for an online version.


Homomorphic Encryption with Applications to Secure Outsourcing of Computation
Manuel Barbosa and Pooya Farshim
RSA Security Cryptographer's Track 2012, Lecture Notes in Computer Science, Volume ???, pp. ???, Springer-Verlag, 2012.

Please check again later for an online version.

2011


(wird in neuem Tab geöffnet) Learning Whom to Trust in a Privacy-Friendly Way
Sebastian Ries, Marc Fischlin, Leonardo A. Martucci, Max Mühlhäuser
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-11), 2011

This is the version as it appears at TrustCom.


(wird in neuem Tab geöffnet)Polly Cracker, Revisited
Martin R. Albrecht, Pooya Farshim, Jean-Charles Faugère, Ludovic Perret
Asiacrypt 2011, Lecture Notes in Computer Science, Volume 7073, pp. 179-196, Springer-Verlag, 2011.

This is the preliminary full version. A preliminary short version appears at Asiacrypt 2011; copyright of proceedings version: IACR.


Non-Interactive and Re-Usable Universally Composable String Commitments with Adaptive Security
Marc Fischlin, Benoit Libert, Mark Manulis
Asiacrypt 2011, Lecture Notes in Computer Science, Volume 7073, pp. 468-485, Springer-Verlag, 2011.

Please check again later for an online version.


(wird in neuem Tab geöffnet) Random Oracles in a Quantum World
Dan Boneh, Özgür Dagdelen, Marc Fischlin, Anja Lehmann, Christina Schaffner, Mark Zhandry
Asiacrypt 2011, Lecture Notes in Computer Science, Volume 7073, pp. 41-69, Springer-Verlag, 2011.

This is the preliminary full version. A preliminary short version appears at Asiacrypt 2011; copyright of proceedings version: IACR.


(wird in neuem Tab geöffnet) Composability of Bellare-Rogaway Key Exchange Protocols
Christina Brzuska, Marc Fischlin, Bogdan Warinschi, Stephen Williams
ACM Conference on Computer and Communications Security (CCS) 2011.

This is the CCS version of the paper.


(wird in neuem Tab geöffnet) A Formal Approach to Distance-Bounding RFID Protocols
Ulrich Dürholz, Marc Fischlin, Michael Kasper, Cristina Onete
Information Security Conference (ISC) 2011, Lecture Notes in Computer Science, Volume 7001, pp. 47--62, Springer-Verlag, 2011

This is the full version. A preliminary version appears at ISC 2011; copyright of proceedings version: Springer.


(wird in neuem Tab geöffnet) Physically Uncloneable Functions in the Universal Composition Framework
Christina Brzuska, Marc Fischlin, Heike Schröder, Stefan Katzenbeisser
Crypto 2011, Lecture Notes in Computer Science, Volume 6841, pp. 46-64, Springer-Verlag, 2011

This is the full version. A preliminary version appears at Crypto 2011; copyright of proceedings version: IACR.


(wird in neuem Tab geöffnet) Random Oracle Reducibility
Paul Baecher, Marc Fischlin
Crypto 2011, Lecture Notes in Computer Science, Volume 6841, pp. 21-38, Springer-Verlag, 2011.

This is the full version. A preliminary version appears at Crypto 2011; copyright of proceedings version: IACR.


(wird in neuem Tab geöffnet) Breaking reCAPTCHA: A Holistic Approach via Shape Recognition
Paul Baecher, Niklas Büscher, Marc Fischlin, Benjamin Milde
Future Challenges in Security and Privacy for Academia and Industry, IFIP Information Security Conference, IFIP Advances in Information and Communication Technology, Volume 354, pp. 56-67, Springer-Verlag, 2011.

This is the full version as it also appears at IFIP Sec 2011; copyright of proceedings version: Springer.


(wird in neuem Tab geöffnet) Relaxed Security Notions for Signatures of Knowledge
Marc Fischlin, Cristina Onete
Applied Cryptography and Network Security (ACNS), Lecture Notes in Computer Science, Volume 6750, pp. 309-326, Springer-Verlag, 2011.

This is the proceedings version; copyright of proceedings version: Springer.


(wird in neuem Tab geöffnet) Expedient Non-Malleability Notions for Hash Functions
Paul Baecher, Marc Fischlin, Dominique Schröder
RSA Security Cryptographer's Track 2011, Lecture Notes in Computer Science, Volume 6558, pp. 268-283, Springer-Verlag, 2011.

This is the full version. A preliminary version appears at CT-RSA 2011; copyright of proceedings version: Springer.


(wird in neuem Tab geöffnet) Secure Set Intersection with Untrusted Hardware Tokens
Marc Fischlin, Benny Pinkas, Ahmad-Reza Sadeghi, Thomas Schneider, Ivan Visconti
RSA Security Cryptographer's Track 2011, Lecture Notes in Computer Science, Volume 6558, pp. 1-16, Springer-Verlag, 2011.

This is the full version. A preliminary version appears at CT-RSA 2011; copyright of proceedings version: Springer.

2010


(wird in neuem Tab geöffnet) Random Oracles With(out) Programmability
Marc Fischlin, Anja Lehmann, Thomas Ristenpart, Thomas Shrimpton, Martijn Stam, Stefano Tessaro
Asiacrypt 2010, Lecture Notes in Computer Science, Volume 6477, pp. 303-320, Springer-Verlag, 2010.

This is the proceedings version; copyright of proceedings version: IACR.


(wird in neuem Tab geöffnet) Security Analysis of the Extended Access Control Protocol for Machine Readable Travel Documents
Özgür Dagdelen, Marc Fischlin
Information Security Conference (ISC) 2010, Lecture Notes in Computer Science, Volume 6531, pp. 54-68, Springer-Verlag, 2010.

Best Student Paper Award. This is the proceedings version; copyright of proceedings version: Springer.


(wird in neuem Tab geöffnet) CAPTCHAs: The Good, the Bad, and the Ugly
Paul Baecher, Marc Fischlin, Lior Gordon, Robert Langenberg, Michael Lützow, Dominique Schröder
Sicherheit 2010, Lecture Notes in Informatics, Volume P-170, pp. 353-365, Gesellschaft für Informatik (GI), 2010.


(wird in neuem Tab geöffnet) History-Free Aggregate Message Authentication Codes
Oliver Eikemeier, Marc Fischlin, Jens-Fabian Götzmann, Anja Lehmann, Peter Schröder, Dominique Schröder, Daniel Wagner
Security and Cryptography for Networks (SCN) 2010, Lecture Notes in Computer Science, Volume 6280, pp. 309-328, Springer-Verlag, 2010

This is the full version. A preliminary version appears at SCN 2010; copyright of proceedings version: Springer.


Parallel Enumeration of Shortest Lattice Vectors
Özgür Dagdelen, Michael Schneider
Euro-Par 2010, Lecture Notes in Computer Science, Volume 6272, pp. 211-222, Springer-Verlag, 2010.


Group-Based Attestation: Enhancing Privacy and Management in Remote Attestation
Sami Alsouri, Özgür Dagdelen, Stefan Katzenbeisser
Trust and Trustworthy Computing (TRUST) 2010, Lecture Notes in Computer Science, Volume 6101, pp. 63-77, Springer-Verlag, 2010.


(wird in neuem Tab geöffnet) Redactable Signatures for Tree-Structured Data: Definitions and Constructions
Christina Brzuska, Heike Busch, Özgür Dagdelen, Marc Fischlin, Martin Franz, Stefan Katzenbeisser, Mark Manulis, Cristina Onete, Andreas Peter, Bertram Poettering, Dominique Schröder
Applied Cryptography and Network Security (ACNS) 2010, Lecture Notes in Computer Science, Volume 6123, pp. 87-104, Springer-Verlag, 2010.

This is the full version as it also appears at ACNS 2010; copyright of proceedings version: Springer.


Generic Constructions for Verifiably Encrypted Signatures Without Random Oracles or NIZKs
Markus Rückert, Michael Schneider, Dominique Schröder
Applied Cryptography and Network Security (ACNS) 2010, Lecture Notes in Computer Science, Volume 6123, Springer-Verlag, 2010.


(wird in neuem Tab geöffnet) On the Impossbility of Three-Move Blind Signature Schemes
Marc Fischlin, Dominique Schröder
Advances in Cryptology – Eurocrypt 2010, Lecture Notes in Computer Science, Volume 6110, pp. 197-215, Springer-Verlag, 2010.

This is the full version. A preliminary version appears at Eurocrypt 2010; copyright of proceedings version: IACR.


Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions
David Galindo, Benoit Libert, Marc Fischlin, Georg Fuchsbauer, Anja Lehmann, Mark Manulis, Dominique Schröder
Africacrypt 2010, Lecture Notes in Computer Science, Volume 6055, pp. 333-350, Springer-Verlag, 2010.


Fair Partially Blind Signatures
Markus Rückert, Dominique Schröder
Africacrypt 2010, Lecture Notes in Computer Science, Volume 6055, pp. 34-51, Springer-Verlag, 2010.


(wird in neuem Tab geöffnet) Unlinkability of Sanitizable Signatures
Christina Brzuska, Marc Fischlin, Anja Lehmann, Dominique Schröder
Public-Key Cryptography (PKC) 2010, Lecture Notes in Computer Science, Volume 6056, pp. 444-461, Springer-Verlag, 2010.

This is the full version. A preliminary version appears at PKC 2010; copyright of proceedings version: IACR.


(wird in neuem Tab geöffnet) Confidential Signatures and Deterministic Signcryption
Alexander Dent, Marc Fischlin, Mark Manulis, Dominique Schroöder, Martijn Stam
Public-Key Cryptography (PKC) 2010, Lecture Notes in Computer Science, Volume 6056, pp. 462-479, Springer-Verlag, 2010.

This is the preliminary full version. A preliminary version appears at PKC 2010; copyright of proceedings version: IACR.


(wird in neuem Tab geöffnet) Hash Function Combiners in SSL and TLS
Marc Fischlin, Anja Lehmann, Daniel Wagner
RSA Security Cryptographer's Track 2010, Lecture Notes in Computer Science, Volume 5985, pp. 268-283, Springer-Verlag, 2010.

This is the full version. A preliminary version appears at CT-RSA 2010; copyright of proceedings version: Springer.


(wird in neuem Tab geöffnet) Delayed-Key Message Authentication for Streams
Marc Fischlin, Anja Lehmann
Theory of Cryptography Conference – TCC, Lecture Notes in Computer Science, Volume 5978, pp. 290-307, Springer-Verlag, 2010.

This is the full version. A preliminary version appears at TCC 2010; copyright of proceedings version: IACR.

2009


A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical
Anja Lehmann, Stefano Tessaro
Asiacrypt 2009, Lecture Notes in Computer Science, Volume 5912, pp. 364-381, Springer-Verlag, 2009.


Foundations of Non-Malleable Hash and One-Way Functions
Alexandra Boldyreva, David Cash, Marc Fischlin, Bogdan Warinschi
Asiacrypt 2009, Lecture Notes in Computer Science, Volume 5912, pp. 524-541, Springer-Verlag, 2009.


(wird in neuem Tab geöffnet) Sanitizable Signatures: How to Partially Delegate Control for Authenticated Data
Christina Brzuska, Marc Fischlin, Anja Lehmann, Dominique Schröder
Biometrics and Electronic Signatures – Research and Applications (BIOSIG) 2009, Lecture Notes in Informatics, Volume 155, pp. 117-128, Gesellschaft fuer Informatik (GI), 2009

This is the full version. A preliminary version appears at BIOSIG 2009; copyright of proceedings version: GI.


(wird in neuem Tab geöffnet) Security Analysis of the PACE Key-Agreement Protocol
Jens Bender, Marc Fischlin, Dennis Kügler
Information Security Conference (ISC) 2009, Lecture Notes in Computer Science, Volume 5735, pp. 33-48, Springer-Verlag, 2009.

This is the full version. A preliminary version appears at ISC 2009; copyright of proceedings version: Springer.


Security of Verifiably Encrypted Signatures and a Construction Without Random Oracles
Markus Rückert, Dominique Schröder
Pairings 2009, Lecture Notes in Computer Science, Volume 5671, pp. 17-34, Springer-Verlag, 2009.


(wird in neuem Tab geöffnet) Security of Sanitizable Signatures Revisited
Christina Brzuska, Marc Fischlin, Tobias Freudenreich, Anja Lehmann, Marcus Page, Jakob Schelbert, Dominique Schröder, Florian Volk
Public-Key Cryptography (PKC) 2009, Lecture Notes in Computer Science, Volume 5443, pp. 317-336, Springer-Verlag, 2009

This is the full version. A preliminary version appears at PKC 2009; copyright of proceedings version: Springer.


(wird in neuem Tab geöffnet) Security of Blind Signatures under Aborts
Marc Fischlin, Dominique Schröder
Public-Key Cryptography (PKC) 2009, Lecture Notes in Computer Science, Volume 5443, pp. 297-316, Springer-Verlag, 2009.

This is a preliminary version. The journal version with the renamed title „Security of Blind Signatures under Aborts and Applications to Adaptive Oblivious Transfer“ is not available for copyright reasons. Another preliminary version appears at PKC 2009; copyright of proceedings version: Springer.

2008


(wird in neuem Tab geöffnet) Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles
Mihir Bellare, Marc Fischlin, Adam O'Neill, Thomas Ristenpart
Crypto 2008, Lecture Notes in Computer Science, Volume 5157, pp. 360-378, Springer-Verlag, 2008.

This is the full version. A preliminary version appears at Crypto; copyright of proceedings version: IACR.


(wird in neuem Tab geöffnet) Robust Multi-Property Combiners for Hash Functions Revisited
Marc Fischlin, Anja Lehmann, Krzysztof Pietrzak
ICALP 2008, Lecture Notes in Computer Science, Volume 5125, pp. 655-667, Springer-Verlag, 2008.

This is the full version. A preliminary version appears at ICALP; copyright of proceedings version: Springer.


(wird in neuem Tab geöffnet) Security of NMAC and HMAC Based on Non-Malleability
Marc Fischlin
RSA Security Cryptographer's Track 2008, Lecture Notes in Computer Science, Volume 4964, pp. 138-154, Springer-Verlag, 2008.

This is the full version. A preliminary version appears at CT-RSA 2008; copyright of proceedings version: Springer.


(wird in neuem Tab geöffnet) Robust Multi-Property Combiners for Hash Functions
Marc Fischlin, Anja Lehmann
Theory of Cryptography Conference – TCC, Lecture Notes in Computer Science, Volume 4948, pp. 375-392, Springer-Verlag, 2008.

This is the full version. The original title of the conference version was: Multi-Property Preserving Combiners for Hash Functions. The extended abstract appears in TCC 2008; copyright of proceedings version: IACR.

2007


(wird in neuem Tab geöffnet) Security-Amplifying Combiners for Hash Functions
Marc Fischlin, Anja Lehmann
Advances in Cryptology – Crypto 2007, Lecture Notes in Computer Science, Volume 4622, pp. 224-243, Springer-Verlag, 2007.

This is the Crypto 2007 version; copyright of proceedings version: IACR.


(wird in neuem Tab geöffnet) Anonymous Signatures Made Easy
Marc Fischlin
Public-Key Cryptography – PKC 2007, Lecture Notes in Computer Science, Volume 4450, pp. 31-42, Springer-Verlag, 2007.

This is the full version; copyright of proceedings version: IACR.


(wird in neuem Tab geöffnet) A Closer Look at PKI: Security and Efficiency
Alexandra Boldyreva, Marc Fischlin, Adriana Palacio, Bogdan Warinschi
Public-Key Cryptography – PKC 2007, Lecture Notes in Computer Science, Volume 4450, pp. 458-475, Springer-Verlag, 2007.

This is the PKC version; copyright of proceedings version: IACR.


(wird in neuem Tab geöffnet) Is Your Bank Using Secure Transaction Numbers? (in German)
Marc Fischlin
D-A-CH Security 2007, IT Security and IT Mangement, pp. 14-23, syssec, 2007.

This is the full version. A preliminary version appears at D-A-CH.


(wird in neuem Tab geöffnet) Security of Invertible Media Authentication Schemes Revisited
Daniel Doenigus, Stefan Endler, Marc Fischlin, Andreas Huelsing, Patrick Jaeger, Anja Lehmann, Sergey Podrazhansky, Sebastian Schipp, Erik Tews, Sven Vowe, Matthias Walthart, Frederik Weidemann
Information Hiding 2007, Lecture Notes in Computer Science, Volume 4567, pp. 189-203, Springer-Verlag, 2008.

This is the full version. A preliminary version appears at Information Hiding 2007; copyright of proceedings version: Springer.

2006


(wird in neuem Tab geöffnet) On the Security of OAEP
Alexandra Boldyreva, Marc Fischlin
Asiacrypt 2006, Lecture Notes in Computer Science, Volume 4284, pp. 210-225, Springer-Verlag, 2006.

This is the full version; copyright of proceedings version: IACR.


(wird in neuem Tab geöffnet) Round-Optimal Composable Blind Signatures in the Common Reference String Model
Marc Fischlin
Advances in Cryptology – Crypto 2006, Lecture Notes in Computer Science, Volume 4117, pp. 60-77, Springer-Verlag, 2006.

This is the full version; copyright of proceedings version: IACR.


(wird in neuem Tab geöffnet) Universally Composable Oblivious Transfer in the Multi-Party Setting
Marc Fischlin
RSA Security Cryptographer's Track 2006, Lecture Notes in Computer Science, Volume 3860, pp. 332-349, Springer-Verlag, 2006.

This is the full version; copyright of proceedings version: Springer.

2005


(wird in neuem Tab geöffnet) Communication-Efficient Non-interactive Proofs of Knowledge with Online Extractors
Marc Fischlin
Crypto 2005, Lecture Notes in Computer Science, Volume 3621, pp. 152-168, Springer-Verlag, 20065.

This is the full version; copyright of proceedings version: IACR.


(wird in neuem Tab geöffnet) Analysis of Random Oracle Instantiation Scenarios for OAEP and Other Practical Schemes
Alexandra Boldyreva, Marc Fischlin
Crypto 2005, Lecture Notes in Computer Science, Volume 3621, pp. 412-429, Springer-Verlag, 20065.

This is the full version; copyright of proceedings version: IACR.


(wird in neuem Tab geöffnet) Completely Non-malleable Schemes
Marc Fischlin
ICALP 2005, Lecture Notes in Computer Science, Volume 3580, pp. 779-790, Springer-Verlag, 2005.

This is the full version; copyright of proceedings version: IACR.

2004


(wird in neuem Tab geöffnet) Fast Verification of Hash Chains
Marc Fischlin
CT-RSA 2004, Lecture Notes in Computer Science, Volume 2964, pp. 339-352, Springer-Verlag, 2004.

This is the full version; copyright of proceedings version: Springer.


(wird in neuem Tab geöffnet) A Privacy-Friendly Loyalty System Based on Discrete Logarithms over Elliptic Curves
Matthias Enzmann, Marc Fischlin, Markus Schneider
Financial Cryptography 2004, Lecture Notes in Computer Science, Volume 3110, pp. 24-38, Springer-Verlag, 2004.

This is the full version; copyright of proceedings version: Springer.

2003


(wird in neuem Tab geöffnet) Progressive Verification: The Case of Message Authentication
Marc Fischlin
Indocrypt 2003, Lecture Notes in Computer Science, Volume 2904, pp. 416-429, Springer-Verlag, 2003.

This is the full version; copyright of proceedings version: Springer.


(wird in neuem Tab geöffnet) The Cramer-Shoup Strong-RSASignature Scheme Revisited
Marc Fischlin
PKC'03, Lecture Notes in Computer Science, Volume 2567, pp. 116-129, Springer-Verlag, 2003.

This is the full version; copyright of proceedings version: Springer.

2002


(wird in neuem Tab geöffnet) On the Impossibility of Constructing Non-interactive Statistically-Secret Protocols from Any Trapdoor One-Way Function
Marc Fischlin
CT-RSA 2002, Lecture Notes in Computer Science, Volume 2271, pp. 79-95, Springer-Verlag, 2002.

This is the full version; copyright of proceedings version: Springer.


(wird in neuem Tab geöffnet) The Representation Problem Based on Factoring
Marc Fischlin, Roger Fischlin
CT-RSA 2002, Lecture Notes in Computer Science, Volume 2271, pp. 96-113, Springer-Verlag, 2002.

This is the full version; copyright of proceedings version: Springer.

2001


(wird in neuem Tab geöffnet) Universally Composable Commitments
Ran Canetti, Marc Fischlin
Crypto 2001, Lecture Notes in Computer Science, Volume 2139, pp. 19-40, Springer-Verlag, 2001.

This is the full version; copyright of proceedings version: Springer.


(wird in neuem Tab geöffnet) Identification Protocols Secure against Reset Attacks
Mihir Bellare, Marc Fischlin, Shafi Goldwasser, Silvio Micali
Eurocrypt 2001, Lecture Notes in Computer Science, Volume 2045, pp. 495-511, Springer-Verlag, 2001.

This is the full version; copyright of proceedings version: Springer.


(wird in neuem Tab geöffnet) A Cost-Effective Pay-Per-Multiplication Comparison Method for Millionaires
Marc Fischlin
CT-RSA 2001, Lecture Notes in Computer Science, Volume 2020, pp. 457-472, Springer-Verlag, 2001.

This is the full version; copyright of proceedings version: Springer.

2000


(wird in neuem Tab geöffnet) A Note on Security Proofs in the Generic Model
Marc Fischlin
Asiacrypt 2000, Lecture Notes in Computer Science, Volume 1976, pp. 458-469, Springer-Verlag, 2000.

This is the full version; copyright of proceedings version: Springer.


(wird in neuem Tab geöffnet) Efficient Non-malleable Commitment Schemes.
Marc Fischlin, Roger Fischlin
Crypto 2000, Lecture Notes in Computer Science, Volume 1880, pp. 413-431, Springer-Verlag, 2000.

This is the journal version of 2009; copyright of proceedings version: Springer.

1999 oder früher


(wird in neuem Tab geöffnet) Pseudorandom Function Tribe Ensembles Based on One-Way Permutations: Improvements and Applications
Marc Fischlin
Eurocrypt 1999, Lecture Notes in Computer Science, Volume 1592, pp. 432-445 Springer-Verlag, 1999.

This is the full version; copyright of proceedings version: Springer.


(wird in neuem Tab geöffnet) Cryptographic Limitations on Parallelizing Membership and Equivalence Queries with Applications to Random Self-Reductions.
Marc Fischlin
ALT'98, Lecture Notes in Computer Science, Volume 1501, pp. 72-86, Springer-Verlag, 1998.

This is the journal version of 2001; copyright of proceedings version: Springer.


(wird in neuem Tab geöffnet) Lower Bounds for the Signature Size of Incremental Schemes
Marc Fischlin
FOCS 1997, pp. 438-447, IEEE Computer Society, 1997.

This is the full version.


(wird in neuem Tab geöffnet) Practical Memory Checkers for Stacks, Queues and Deques
Marc Fischlin
ACISP'97, Lecture Notes in Computer Science, Volume 1270, pp. 114-125, Springer-Verlag, 1997.

This is the full version; copyright of proceedings version: Springer.


(wird in neuem Tab geöffnet) Incremental Cryptography and Memory Checkers
Marc Fischlin
Eurocrypt 1997, Lecture Notes in Computer Science, Volume 1233, pp. 293-408, Springer-Verlag, 1997.

This is the full version; copyright of proceedings version: Springer.

Disclaimer

The documents contained in these directories are included by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.