## 2021

**On Derandomizing Yao's Weak-to-Strong OWF Construction **

Chris Brzuska, Geoffroy Couteau, Pihla Karanko, Felix Rohrbach

TCC 2021, Lecture Notes in Computer Science, Volume ???, pp. ??-??, Springer-Verlag, 2021.

^{Please check again later for the online version.}

(opens in new tab) **Provable Security Analysis of FIDO2**

Manuel Barbosa, Alexandra Boldyreva, Shan Chen, Bogdan Warinschi

Crypto 2021, Lecture Notes in Computer Science, Volume 12827, Part III, pp. 125-156, Springer-Verlag, 2021.

^{This is a link to the IACR ePrint version, Report 2020/756.}

**Multipath TLS 1.3 **

Marc Fischlin, Sven-Andre Müller, Jean-Pierre Münch, Lars Porth

ESORICS 2021, Lecture Notes in Computer Science, Volume 12973, Part II, pp. 86-105, Springer-Verlag, 2021.

^{Please check again later for the online version.}

(opens in new tab) **BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures**

Cas Cremers, Samed Düzlü, Rune Fiedler, Marc Fischlin, and Christian Janson

IEEE Symposium on Security and Privacy (S&P 2021), IEEE, 2021

^{This is a link to the IACR ePrint version, Report 2020/1525.}

(opens in new tab) **Single-to-Multi-Theorem Transformations for Non-Interactive Statistical Zero-Knowledge **

Marc Fischlin, Felix Rohrbach

PKC 2021, Lecture Notes in Computer Science, Volume ???, pp. ??-??, Springer-Verlag, 2021.

^{This is a link to the IACR ePrint version, Report 2020/1204.}

## 2020

**On the Memory Fault Resilience of TLS 1.3 **

Lukas Brandstetter, Marc Fischlin, Robin Leander Schröder, and Michael Yonli

Security Standardisation Research (SSR) Conference 2020, Lecture Notes in Computer Science, Volume ???, pp. ??-??, Springer-Verlag, 2020.

^{Please check later for the online version.}

(opens in new tab) **Towards Post-Quantum Security for Signal's X3DH Handshake **

Jacqueline Brendel, Marc Fischlin, Felix Günther, Christian Janson, and Douglas Stebila

Selected Areas in Cryptography, 27th International Conference, SAC 2020, Lecture Notes in Computer Science, Volume ???, pp. ??-??, Springer-Verlag, 2020.

^{This is a link to the IACR ePrint version, Report 2019/1356.}

**Towards Defeating Backdoored Random Oracles: Indifferentiability with Bounded Adaptivity **

Yevgeniy Dodis, Pooya Farshim, Sogol Mazaheri, and Stefano Tessaro

TCC 2020, Part ?, Lecture Notes in Computer Science, Volume ???, pp. ???-???, Springer-Verlag, 2020.

^{Please check again later for on nolin version.}

(opens in new tab) **Security Reductions for White-Box Key-Storage in Mobile Payments **

Estuardo Alpirez Bock, Chris Brzuska, Marc Fischlin, Christian Janson and Wil Michiels

Asiacrypt 2020, Part ?, Lecture Notes in Computer Science, Volume ???, pp. ???-???, Springer-Verlag, 2020.

^{This is a link to the IACR ePrint version, Report 2019/1014.}

**Client-oblivious OPRAM**

Gareth T. Davies, Christian Janson, and Daniel P. Martin

ICICS 2020, Lecture Notes in Computer Science, Volume ???, pp. ???, Springer-Verlag, 2020.

^{Please check again later for an online version.}

**Information-Theoretic Security of Cryptographic Channels**

Marc Fischlin, Felix Günther, Phillip Muth

ICICS 2020, Lecture Notes in Computer Science, Volume ???, pp. ???-???, Springer-Verlag, 2020.

^{Please check again later for an online version.}

(opens in new tab) **Signatures from Sequential-OR Proofs**

Marc Fischlin, Patrick Harasser, and Christian Janson

Eurocrypt 2020, Part III, Lecture Notes in Computer Science, Volume 12107, pp. 212-244, Springer-Verlag, 2020.

^{This is a link to the IACR ePrint version, Report 2020/271.}

(opens in new tab) **Authentication in Key-Exchange: Definitions, Relations and Compositions**

Cyprien Delpech de Saint Guilhem,Marc Fischlin and Bogdan Warinschi

CSF 2020, pp. 288-303, IEEE, 2020.

^{This is a link to the IACR ePrint version, Report 2019/1203.}

(opens in new tab) **Modeling Memory Faults in Signature and Authenticated Encryption Schemes**

Marc Fischlin, Felix Günther

CT-RSA 2020, Lecture Notes in Computer Science, Volume 12006, pp. 56-84, Springer-Verlag, 2020.

^{This is a link to the IACR ePrint version, Report 2019/1053.}

## 2019

(opens in new tab) **Sponges Resist Leakage: The Case of Authenticated Encryption**

Jean Paul Degabriele, Christian Janson, and Patrick Struck

Asiacrypt 2019, Part II, Lecture Notes in Computer Science, Volume 11922, pp. 209-240, Springer-Verlag, 2019.

^{This is a link to the IACR ePrint version, Report 20197/1034.}

(opens in new tab) **Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids**

Jacqueline Brendel, Marc Fischlin, Felix Günther

ESORICS 2019, Part II, Lecture Notes in Computer Science, Volume 11736, pp. 521-541, Springer-Verlag, 2019.

^{This is a link to the IACR ePrint version, Report 2017/1252.}

**How to Sign with White-Boxed AES**

Marc Fischlin and Helene Haagh

Latincrypt 2019, Lecture Notes in Computer Science, Volume 11774, pp. 259-279, Springer-Verlag, 2019.

^{Please check again later for an online version.}

(opens in new tab) **Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange**

Nina Bindel, Jacqueline Brendel, Marc Fischlin, Brian Goncalves, Douglas Stebila

PQCrypto 2019, Lecture Notes in Computer Science, Volume 11505, pp. 206-226, Springer-Verlag, 2019.

^{This is a link to the IACR ePrint version, Report 2018/903.}

## 2018

(opens in new tab) **Simulatable Channels: Extended Security that is Universally Composable and Easier to Prove**

Jean Paul Degabriele and Marc Fischlin

Asiacrypt 2018, Part 3, Lecture Notes in Computer Science, Volume 11274, pp. 519-550, Springer-Verlag, 2018.

^{This is a link to the IACR ePrint version, Report 2018/844.}

(opens in new tab) **Combiners for Backdoored Random Oracles**

Balthazar Bauer, Pooya Farshim, and Sogol Mazaheri

CRYPTO 2018, Lecture Notes in Computer Science, Volume 10992, pp. 272-302, Springer-Verlag, 2018.

^{This is a link to the IACR ePrint version, Report 2018/770.}

(opens in new tab) **Invisible Sanitizable Signatures and Public-Key Encryption are Equivalent**

Marc Fischlin and Patrick Harasser

ACNS 2018, Lecture Notes in Computer Science, Volume 10892, pp. 202-220, Springer Verlag, 2018.

^{This is a link to the IACR ePrint version, Report 2018/337.}

(opens in new tab) **Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks**

Marc Fischlin and Sogol Mazaheri

31st IEEE Computer Security Foundations Symposium (CSF 2018), pp. 76-90, IEEE, 2018.

^{This is a link to the IACR ePrint version, Report 2017/984.}

(opens in new tab) **Backdoored Hash Functions: Immunizing HMAC and HKDF**

Marc Fischlin, Christian Janson, and Sogol Mazaheri

31st IEEE Computer Security Foundations Symposium (CSF 2018), pp. 105-118, IEEE, 2018.

^{This is a link to the IACR ePrint version, report 2018/362.}

(opens in new tab) **Untagging Tor: A Formal Treatment of Onion Encryption**

Jean Paul Degabriele and Martijn Stam

Eurocrypt 2018, Part III, Lecture Notes in Computer Science, Volume 10822, pp. 259-293, Springer-Verlag, 2018.

^{This is a link to the IACR ePrint version, Report 2018/162.}

## 2017

(opens in new tab) **Zero Round-Trip Time for the Extended Access Control Protocol**

Jacqueline Brendel, Marc Fischlin

ESORICS 2017, Lecture Notes in Computer Science, Volume ????, pp. ???-???, Springer-Verlag, 2017.

^{This is a link to the IACR ePrint version, Report 2017/060.}

(opens in new tab) **PRF-ODH: Relations, Instantiations, and Impossibility Results**

Jacqueline Brendel, Marc Fischlin, Felix Günther, and Christian Janson

CRYPTO 2017, Part III, Lecture Notes in Computer Science, Volume 10403, pp. 651-681, Springer-Verlag, 2017.

^{This is a link to the IACR ePrint version, Report 2017/517.}

(opens in new tab) **A Formal Treatment of Multi-key Channels**

Felix Günther and Sogol Mazaheri

CRYPTO 2017, Part III, Lecture Notes in Computer Science, Volume 10403, pp. 587-618, Springer-Verlag, 2017.

^{This is a link to the IACR ePrint version, Report 2017/501.}

(opens in new tab) **Redactable Graph Hashing, Revisited (short paper)**

Andreas Erwig, Marc Fischlin, Martin Hald, Dominik Helm, Robert Kiel, Florian Kübler, Michael Kümmerlin, Jakob Laenge, Felix Rohrbach

ACISP 2017 (Part II), Lecture Notes in Computer Science, Volume 10343, pp. 398–405, Springer-Verlag, 2017

^{This is the full version; copyright of the proceedings version: Springer.}

(opens in new tab) **0-RTT Key Exchange with Full Forward Secrecy**

Felix Günther, Britta Hale, Tibor Jager, and Sebastian Lauer

Eurocrypt 2017, Lecture Notes in Computer Science, Volume 10212, pp. 519-548, Springer-Verlag, 2017.

^{This is a link to the IACR ePrint version, Report 2017/223.}

(opens in new tab) **Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates**

Marc Fischlin, Felix Günther

EuroS&P 2017, pp. 60-75, IEEE, 2017.

^{This is a link to the IACR ePrint version, Report 2017/082.}

(opens in new tab) **Cloud Storage File Recoverability**

Christian A. Gorke, Christian Janson, Frederik Armknecht, and Carlos Cid

AsiaCCS-SCC 2017, pp. 19-26, ACM, 2017.

^{This is a link to the IACR ePrint version, Report 2017/167.}

## 2016

**Efficient Proactive Secret Sharing**

Jacqueline Brendel, Denise Demirel

2016 Privacy, Security and Trust Conference, IEEE, 2016.

^{Please check again later for the online version.}

(opens in new tab) **Attribute-based Access Control Architectures with the eIDAS Protocols**

Frank Morgner, Paul Bastian, Marc Fischlin

SSR 2016, Lecture Notes in Computer Science, Volume 10074, pp. 205-226, Springer-Verlag, 2016.

^{This is the full version. Copyright of the proceedings version: Springer-Verlag.}

(opens in new tab) **Secure Logging Schemes and Certificate Transparency**

Benjamin Dowling, Felix Günther, Udyani Herath, and Douglas Stebila

ESORICS 2016, Part II, Lecture Notes in Computer Science, Volume 9879, pp. 140-158, Springer-Verlag, 2016.

^{This is a link to the eprint version 2016/452.}

(opens in new tab) **Securing Transactions with the eIDAS Protocols**

Frank Morgner, Paul Bastian, Marc Fischlin

WISTP 2016, Lecture Notes in Computer Science, Volume 9895, pp. 3-18, Springer-Verlag, 2016.

^{This is the full version. Copyright of the proceedings version: Springer-Verlag.}

(opens in new tab) **Obfuscation Combiners**

Marc Fischlin, Amir Herzberg, Hod Bin Noon, Haya Shulman

Crypto 2016, Part II, Lecture Notes in Computer Science, Volume 9815, pp. 521-550, Springer-Verlag, 2016.

^{This is a link to the eprint version 2016/289.}

(opens in new tab) **Semantic Security and Indistinguishability in the Quantum World**

Tommaso Gagliardoni, Andreas Hülsing, Christian Schaffner

Crypto 2016, Part III,, Lecture Notes in Computer Science, Volume 9816, pp. 60-89, Springer-Verlag, 2016.

^{This is a link to the eprint version 2015/355.}

**Key Confirmation in Key Exchange: A Formal Treatment and Implications for TLS 1.3**

Marc Fischlin, Felix Günther, Benedikt Schmidt, and Bogdan Warinschi

37th IEEE Symposium on Security and Privacy (S&P 2016), IEEE, May 2016.

^{Please check later for an online version.}

(opens in new tab) **An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation**

Sedat Akleylek, Nina Bindel, Johannes Buchmann, Juliane Krämer and Giorgia Azzurra Marson

Africacrypt 2016, Lecture Notes in Computer Science, Volume 9646, pp. 44–60, Springer-Verlag, 2016

^{This is a link to the eprint version 2016/030.}

(opens in new tab) **On the Hardness of Proving CCA-security of Signed ElGamal**

David Bernhard, Marc Fischlin, Bogdan Warinschi

PKC 2016, Lecture Notes in Computer Science, Volume 9614, pp. 47–69, Springer-Verlag, 2016

^{This is a link to the ePrint version 2015/649.}

## 2015

(opens in new tab) **A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates**

Benjamin Dowling, Marc Fischlin, Felix Günther, and Douglas Stebila

ACM Computer and Communication Security (CCS 2015), pp. 1197–1210, ACM, 2015

^{This is a link to the eprint version 2015/914.}

**Notions of Deniable Message Authentication**

Marc Fischlin and Sogol Mazaheri

ACM Workshop on Privacy in the Electronic Society (WPES 2015), pp. 55–64, ACM, 2015

^{Please check later for an online version.}

**Data Is a Stream: Security of Stream-Based Channels**

Marc Fischlin, Felix Günther, Giorgia Azzurra Marson, and Kenneth G. Paterson

CRYPTO 2015, Lecture Notes in Computer Science, Volume 9216, pp. 545–564, Springer-Verlag, 2015

^{Please check later for an online version.}

(opens in new tab) **Linkable Message Tagging: Solving the key distribution problem of signature schemes**

Felix Günther and Bertram Poettering

ACISP 2015, Lecture Notes in Computer Science, Volume 9144, pp. 195–212, Springer-Verlag, 2015

^{This is a link to the eprint version 2014/014.}

(opens in new tab)**Privately Computing Set-Union and Set-Intersection Cardinality via Bloom Filters**

Rolf Egert, Marc Fischlin, David Gens, Sven Jacob, Matthias Senker and Jörn Tillmanns

ACISP 2015, Lecture Notes in Computer Science, Volume 9144, pp. 413–430, Springer-Verlag, 2015

^{This is the full version; copyright of the proceedings version: Springer.}

(opens in new tab) **Adaptive Proofs of Knowledge in the Random Oracle Model**

David Bernhard, Marc Fischlin, Bogdan Warinschi

PKC 2015, Lecture Notes in Computer Science, Volume 9020, pp. 629–649, Springer-Verlag, 2015

^{This is a link to the ePrint version 2015/648.}

(opens in new tab) **Random-Oracle Uninstantiability from Indistinguishability Obfuscation**

Christina Brzuska, Pooya Farshim, Arno Mittelbach

Theory of Cryptography Conference – TCC, Part II, Lecture Notes in Computer Science, Volume 9015, pp. 428–455, Springer-Verlag, 2015

^{This is a link to the ePrint version 2014/867.}

## 2014

(opens in new tab) **Unpicking PLAID – A Cryptographic Analysis of an ISO-standards-track Authentication Protocol**

Jean Paul Degabriele, Victoria Fehr, Marc Fischlin, Tommaso Gagliardoni, Felix Günther, Giorgia Azzurra Marson, Arno Mittelbach, Kenneth G. Paterson

SSR 2014, Lecture Notes in Computer Science, Volume 8893, pp. 1–25, Springer-Verlag, 2014

^{This is a link to the ePrint version 2014/728. See also the journal version from 2016.}

(opens in new tab) **Indistinguishability Obfuscation versus Multi-Bit Point Obfuscation with Auxiliary Input**

Christina Brzuska, Arno Mittelbach

Asiacrypt 2014, Lecture Notes in Computer Science, Volume 8874, pp. 142-161, Springer-Verlag, 2014

^{This is a link to the ePrint version 2014/405.}

(opens in new tab) **Using Indistinguishability Obfuscation via UCEs**

Christina Brzuska, Arno Mittelbach

Asiacrypt 2014, Lecture Notes in Computer Science, Volume 8874, pp. 122-141, Springer-Verlag, 2014

^{This is a link to the ePrint version 2014/381.}

(opens in new tab)**Multi-Stage Key Exchange and the Case of Google's QUIC Protocol**

Marc Fischlin, Felix Günther

ACM Computer and Communication Security (CCS 2014), pp. 1193–1204, ACM, 2014.

^{This is the full version. A preliminary version appears at CCS 2014 (DOI: 10.1145/2660267.2660308); copyright of proceedings version: ACM.}

(opens in new tab) **Privacy-Enhanced Participatory Sensing with Collusion-Resistance and Data Aggregation**

Felix Günther, Mark Manulis, Andreas Peter

CANS 2014, Lecture Notes in Computer Science, Volume 8813, pp. 321–336, Springer-Verlag, 2014.

^{This is a link to the ePrint version 2014/382.}

(opens in new tab) **Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources**

Christina Brzuska, Pooya Farshim, Arno Mittelbach

Crypto 2014, Lecture Notes in Computer Science, Volume 8616, pp. 188-215, Springer-Verlag, 2014.

^{This is a link to the eprint version 2014/099.}

(opens in new tab) **Intercepting Tokens in Cryptographic Protocols: The Empire Strikes Back in the Clone Wars**

Özgür Dagdelen, Marc Fischlin

ISIT 2014 – IEEE International Symposium on Information Theory, IEEE, 2014.

^{This is a link to the eprint version 2012/537.}

(opens in new tab) **Salvaging Indifferentiability in a Multi-stage Setting**

Arno Mittelbach

Eurocrypt 2014, Lecture Notes in Computer Science, Volume 8441, pp. 603-621, Springer-Verlag, 2014

^{This is a link to the eprint version 2013/286.}

(opens in new tab) **General Impossibility of Group Homomorphic Encryption in the Quantum World**

Frederik Armknecht, Tommaso Gagliardoni, Stefan Katzenbeisser, Andreas Peter

PKC 2014, Lecture Notes in Computer Science, Volume 8383, pp. 556-573, Springer-Verlag, 2014

^{This is a link to the eprint version 2014/029.}

## 2013

**The PACE|CA Protocol for Machine Readable Travel Documents**

Jens Bender, Marc Fischlin, Dennis Kügler

INTRUST 2013, Lecture Notes in Computer Science, Volume 8292, pp. 17-35, Springer-Verlag, 2013

(opens in new tab) **The Fiat-Shamir Transformation in a Quantum World**

Özgür Dagdelen, Marc Fischlin, Tommaso Gagliardoni

Asiacrypt 2013, Lecture Notes in Computer Science, Volume 8270, pp. 62-81, Springer-Verlag, 2013

^{This is a link to the eprint version 2013/245.}

(opens in new tab) **Notions of Black-Box Reductions, Revisited**

Paul Baecher, Christina Brzuska, Marc Fischlin

Asiacrypt 2013, Lecture Notes in Computer Science, Volume 8269, pp. 1296-315, Springer-Verlag, 2013

^{This is a link to the eprint version 2013/101.}

(opens in new tab) **Reset Indifferentiability and its Consequences**

Paul Baecher, Christina Brzuska, Arno Mittelbach

Asiacrypt 2013, Lecture Notes in Computer Science, Volume 8269, pp. 154-173, Springer-Verlag, 2013

^{This is a link to the eprint version 2013/459.}

(opens in new tab) **A Cryptographic Analysis of OPACITY**

Özgür Dagdelen, Marc Fischlin, Tommaso Gagliardoni, Giorgia Azzurra Marson, Arno Mittelbach, Cristina Onete

ESORICS 2013, Lecture Notes in Computer Science, Volume 8134, pp. 345-362, Springer-Verlag, 2013

^{This is a link to the eprint version 2013/234.}

(opens in new tab) **Practical Secure Logging: Seekable Sequential Key Generators**

Giorgia Azzurra Marson, Bertram Poettering

ESORICS 2013, Lecture Notes in Computer Science, Volume 8134, pp. 111-128, Springer-Verlag, 2013

^{This is a link to the eprint version 2013/397.}

(opens in new tab) **Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions**

Paul Baecher, Pooya Farshim, Marc Fischlin, Martijn Stam

Eurocrypt 2013, Lecture Notes in Computer Science, Volume 7881, pp. 426-443, Springer-Verlag, 2013

^{This is a link to the eprint version 2013/350.}

(opens in new tab) **Limitations of the Meta-Reduction Technique: The Case of Schnorr Signatures**

Marc Fischlin, Nils Fleischhacker

Eurocrypt 2013, Lecture Notes in Computer Science, Volume 7881, pp. 444-460, Springer-Verlag, 2013

^{This is a link to the eprint version 2013/140.}

(opens in new tab) **Cryptophia's Short Combiner for Collision-Resistant Hash Functions**

Arno Mittelbach

ACNS 2013, Lecture Notes in Computer Science, Volume 7954, pp. 136-153, Springer-Verlag, 2013

^{This is a link to the eprint version 2013/210.}

(opens in new tab) **Computing on Authenticated Data for Adjustable Predicates**

Björn Deiseroth, Victoria Fehr, Marc Fischlin, Manuel Maasz, Nils Fabian Reimers, Richard Stein

ACNS 2013, Lecture Notes in Computer Science, Volume 7954, pp. 53-68, Springer-Verlag, 2013

^{This is a link to the eprint version 2013/217.}

(opens in new tab) **Robust Encryption, Revisited**

Pooya Farshim, Benoit Libert, Kenneth G. Paterson, Elizabeth A. Quaglia

PKC 2013, Lecture Notes in Computer Science, Volume 7778, pp. 352-368, Springer-Verlag, 2013

^{This is a link to the eprint version 2012/673.}

(opens in new tab) **On the Semantic Security of Functional Encryption Schemes**

Manuel Barbosa, Pooya Farshim

PKC 2013, Lecture Notes in Computer Science, Volume 7778, pp. 143-161, Springer-Verlag, 2013

^{This is a link to the eprint version 2012/474.}

(opens in new tab) **Rate-Limited Secure Function Evaluation**

Özgür Dagdelen, Payman Mohassel, Daniele Venturi

PKC 2013, Lecture Notes in Computer Science, Volume 7778, pp. 461-478, Springer-Verlag, 2013

^{This is the link to the eprint version 2013/021.}

**Subtle Kinks in Distance-Bounding: an Analysis of Prominent Protocols**

Marc Fischlin, Cristina Onete

Security and Privacy in Wireless and Mobile Networks (WiSec) 2013, ACM, 2013

**Efficient, Secure, Private Distance Bounding without Key Updates**

Jens Hermans, Cristina Onete, Roel Peeters

Security and Privacy in Wireless and Mobile Networks (WiSec) 2013, ACM, 2013

## 2012

(opens in new tab) **Domain-Specific Pseudonymous Signatures for the German Identity Card**

Jens Bender, Özgür Dagdelen, Marc Fischlin, Dennis Kügler

Information Security Conference (ISC) 2012, Lecture Notes in Computer Science, Volume 7483, pp. 104-119, Springer-Verlag, 2012.

^{This is a link to the eprint version 2012/558.}

(opens in new tab) **On the Joint Security of Signature and Encryption Schemes under Randomness Reuse: Efficiency and Security Amplification**

Afonso Arriaga, Manuel Barbosa, Pooya Farshim

Applied Cryptography and Network Security (ACNS) 2012, Lecture Notes in Computer Science, Volume 7341, pp. 206-223, Springer-Verlag, 2012.

^{This is a link to the eprint version 2012/382.}

(opens in new tab)**Black-Box Reductions and Separations in Cryptography**

Marc Fischlin

Africacrypt 2012, Lecture Notes in Computer Science, Volume 7374, pp. 413-427, Springer-Verlag, 2012

^{Invited Talk. Besides minor changes this is the version as it appears in the proceedings (but reformated from LNCS style).}

(opens in new tab)**History-Free Sequential Aggregate Signatures**

Marc Fischlin, Anja Lehmann, Dominique Schröder

Security and Cryptography for Networks

(SCN) 2012, Lecture Notes in Computer Science, Volume 7485, pp. 113-130, Springer-Verlag, 2012

^{This is the full version. A preliminary version appears at SCN 2012; copyright of proceedings version: Springer.}

(opens in new tab) **Hash Combiners for Second Pre-Image Resistance, Target Collision Resistance and Pre-Image Resistance have Long Output**

Arno Mittelbach

(SCN) 2012, Lecture Notes in Computer Science, Volume 7485, pp. 522-539, Springer-Verlag, 2013

^{This is a link to the eprint version 2013/210.}

(opens in new tab)**TLS, PACE, and EAC: A Cryptographic View at Modern Key Exchange Protocols**

Christina Brzuska, Özgür Dagdelen, Marc Fischlin

Sicherheit 2012, Lecture Notes in Informatics, Volume P-195, pp. 71-82, Gesellschaft für Informatik (GI), 2012.

(opens in new tab)**Merging the Cryptographic Security Analysis and the Algebraic-Logic Security Proof for PACE**

Lassaad Cheikhrouhou, Werner Stephan, Özgür Dagdelen, Marc Fischlin, Markus Ullmann

Sicherheit 2012, Lecture Notes in Informatics, Volume P-195, pp. 83-94, Gesellschaft für Informatik (GI), 2012.

**The PACE|AA Protocol for Machine Readable Travel Documents, and its Security**

Jens Bender, Özgür Dagdelen, Marc Fischlin and Dennis Kügler

Financial Cryptography, Lecture Notes in Computer Science, Volume 7397, pp. 344-358, Springer-Verlag, 2012.

^{Please check again later for an online version.}

**Homomorphic Encryption with Applications to Secure Outsourcing of Computation**

Manuel Barbosa and Pooya Farshim

RSA Security Cryptographer's Track 2012, Lecture Notes in Computer Science, Volume ???, pp. ???, Springer-Verlag, 2012.

^{Please check again later for an online version.}

## 2011

(opens in new tab)**Learning Whom to Trust in a Privacy-Friendly Way**

Sebastian Ries, Marc Fischlin, Leonardo A. Martucci, Max Mühlhäuser

IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-11), 2011

^{This is the version as it appears at TrustCom.}

(opens in new tab) **Polly Cracker, Revisited**

Martin R. Albrecht, Pooya Farshim, Jean-Charles Faugère, Ludovic Perret

Asiacrypt 2011, Lecture Notes in Computer Science, Volume 7073, pp. 179-196, Springer-Verlag, 2011.

^{This is the preliminary full version. A preliminary short version appears at Asiacrypt 2011; copyright of proceedings version: IACR.}

**Non-Interactive and Re-Usable Universally Composable String Commitments with Adaptive Security**

Marc Fischlin, Benoit Libert, Mark Manulis

Asiacrypt 2011, Lecture Notes in Computer Science, Volume 7073, pp. 468-485, Springer-Verlag, 2011.

^{Please check again later for an online version.}

(opens in new tab)**Random Oracles in a Quantum World**

Dan Boneh, Özgür Dagdelen, Marc Fischlin, Anja Lehmann, Christina Schaffner, Mark Zhandry

Asiacrypt 2011, Lecture Notes in Computer Science, Volume 7073, pp. 41-69, Springer-Verlag, 2011.

^{This is the preliminary full version. A preliminary short version appears at Asiacrypt 2011; copyright of proceedings version: IACR.}

(opens in new tab)**Composability of Bellare-Rogaway Key Exchange Protocols**

Christina Brzuska, Marc Fischlin, Bogdan Warinschi, Stephen Williams

ACM Conference on Computer and Communications Security (CCS) 2011.

^{This is the CCS version of the paper.}

(opens in new tab)**A Formal Approach to Distance-Bounding RFID Protocols**

Ulrich Dürholz, Marc Fischlin, Michael Kasper, Cristina Onete

Information Security Conference (ISC) 2011, Lecture Notes in Computer Science, Volume 7001, pp. 47--62, Springer-Verlag, 2011

^{This is the full version. A preliminary version appears at ISC 2011; copyright of proceedings version: Springer.}

(opens in new tab)**Physically Uncloneable Functions in the Universal Composition Framework**

Christina Brzuska, Marc Fischlin, Heike Schröder, Stefan Katzenbeisser

Crypto 2011, Lecture Notes in Computer Science, Volume 6841, pp. 46-64, Springer-Verlag, 2011

^{This is the full version. A preliminary version appears at Crypto 2011; copyright of proceedings version: IACR.}

(opens in new tab)**Random Oracle Reducibility**

Paul Baecher, Marc Fischlin

Crypto 2011, Lecture Notes in Computer Science, Volume 6841, pp. 21-38, Springer-Verlag, 2011.

^{This is the full version. A preliminary version appears at Crypto 2011; copyright of proceedings version: IACR.}

(opens in new tab)**Breaking reCAPTCHA: A Holistic Approach via Shape Recognition**

Paul Baecher, Niklas Büscher, Marc Fischlin, Benjamin Milde

Future Challenges in Security and Privacy for Academia and Industry, IFIP Information Security Conference, IFIP Advances in Information and Communication Technology, Volume 354, pp. 56-67, Springer-Verlag, 2011.

^{This is the full version as it also appears at IFIP Sec 2011; copyright of proceedings version: Springer.}

(opens in new tab)**Relaxed Security Notions for Signatures of Knowledge**

Marc Fischlin, Cristina Onete

Applied Cryptography and Network Security (ACNS), Lecture Notes in Computer Science, Volume 6750, pp. 309-326, Springer-Verlag, 2011.

^{This is the proceedings version; copyright of proceedings version: Springer.}

(opens in new tab)**Expedient Non-Malleability Notions for Hash Functions**

Paul Baecher, Marc Fischlin, Dominique Schröder

RSA Security Cryptographer's Track 2011, Lecture Notes in Computer Science, Volume 6558, pp. 268-283, Springer-Verlag, 2011.

^{This is the full version. A preliminary version appears at CT-RSA 2011; copyright of proceedings version: Springer.}

(opens in new tab)**Secure Set Intersection with Untrusted Hardware Tokens**

Marc Fischlin, Benny Pinkas, Ahmad-Reza Sadeghi, Thomas Schneider, Ivan Visconti

RSA Security Cryptographer's Track 2011, Lecture Notes in Computer Science, Volume 6558, pp. 1-16, Springer-Verlag, 2011.

^{This is the full version. A preliminary version appears at CT-RSA 2011; copyright of proceedings version: Springer.}

## 2010

(opens in new tab)**Random Oracles With(out) Programmability**

Marc Fischlin, Anja Lehmann, Thomas Ristenpart, Thomas Shrimpton, Martijn Stam, Stefano Tessaro

Asiacrypt 2010, Lecture Notes in Computer Science, Volume 6477, pp. 303-320, Springer-Verlag, 2010.

^{This is the proceedings version; copyright of proceedings version: IACR.}

(opens in new tab)**Security Analysis of the Extended Access Control Protocol for Machine Readable Travel Documents**

Özgür Dagdelen, Marc Fischlin

Information Security Conference (ISC) 2010, Lecture Notes in Computer Science, Volume 6531, pp. 54-68, Springer-Verlag, 2010.

^{Best Student Paper Award. This is the proceedings version; copyright of proceedings version: Springer.}

(opens in new tab)**CAPTCHAs: The Good, the Bad, and the Ugly**

Paul Baecher, Marc Fischlin, Lior Gordon, Robert Langenberg, Michael Lützow, Dominique Schröder

Sicherheit 2010, Lecture Notes in Informatics, Volume P-170, pp. 353-365, Gesellschaft für Informatik (GI), 2010.

(opens in new tab)**History-Free Aggregate Message Authentication Codes**

Oliver Eikemeier, Marc Fischlin, Jens-Fabian Götzmann, Anja Lehmann, Peter Schröder, Dominique Schröder, Daniel Wagner

Security and Cryptography for Networks (SCN) 2010, Lecture Notes in Computer Science, Volume 6280, pp. 309-328, Springer-Verlag, 2010

^{This is the full version. A preliminary version appears at SCN 2010; copyright of proceedings version: Springer.}

**Parallel Enumeration of Shortest Lattice Vectors**

Özgür Dagdelen, Michael Schneider

Euro-Par 2010, Lecture Notes in Computer Science, Volume 6272, pp. 211-222, Springer-Verlag, 2010.

**Group-Based Attestation: Enhancing Privacy and Management in Remote Attestation **

Sami Alsouri, Özgür Dagdelen, Stefan Katzenbeisser

Trust and Trustworthy Computing (TRUST) 2010, Lecture Notes in Computer Science, Volume 6101, pp. 63-77, Springer-Verlag, 2010.

(opens in new tab)**Redactable Signatures for Tree-Structured Data: Definitions and Constructions**

Christina Brzuska, Heike Busch, Özgür Dagdelen, Marc Fischlin, Martin Franz, Stefan Katzenbeisser, Mark Manulis, Cristina Onete, Andreas Peter, Bertram Poettering, Dominique Schröder

Applied Cryptography and Network Security (ACNS) 2010, Lecture Notes in Computer Science, Volume 6123, pp. 87-104, Springer-Verlag, 2010.

^{This is the full version as it also appears at ACNS 2010; copyright of proceedings version: Springer.}

**Generic Constructions for Verifiably Encrypted Signatures Without Random Oracles or NIZKs **

Markus Rückert, Michael Schneider, Dominique Schröder

Applied Cryptography and Network Security (ACNS) 2010, Lecture Notes in Computer Science, Volume 6123, Springer-Verlag, 2010.

(opens in new tab)**On the Impossbility of Three-Move Blind Signature Schemes **

Marc Fischlin, Dominique Schröder

Advances in Cryptology – Eurocrypt 2010, Lecture Notes in Computer Science, Volume 6110, pp. 197-215, Springer-Verlag, 2010.

^{This is the full version. A preliminary version appears at Eurocrypt 2010; copyright of proceedings version: IACR.}

**Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions**

David Galindo, Benoit Libert, Marc Fischlin, Georg Fuchsbauer, Anja Lehmann, Mark Manulis, Dominique Schröder

Africacrypt 2010, Lecture Notes in Computer Science, Volume 6055, pp. 333-350, Springer-Verlag, 2010.

**Fair Partially Blind Signatures **

Markus Rückert, Dominique Schröder

Africacrypt 2010, Lecture Notes in Computer Science, Volume 6055, pp. 34-51, Springer-Verlag, 2010.

(opens in new tab)**Unlinkability of Sanitizable Signatures **

Christina Brzuska, Marc Fischlin, Anja Lehmann, Dominique Schröder

Public-Key Cryptography (PKC) 2010, Lecture Notes in Computer Science, Volume 6056, pp. 444-461, Springer-Verlag, 2010.

^{This is the full version. A preliminary version appears at PKC 2010; copyright of proceedings version: IACR.}

(opens in new tab)**Confidential Signatures and Deterministic Signcryption**

Alexander Dent, Marc Fischlin, Mark Manulis, Dominique Schroöder, Martijn Stam

Public-Key Cryptography (PKC) 2010, Lecture Notes in Computer Science, Volume 6056, pp. 462-479, Springer-Verlag, 2010.

^{This is the preliminary full version. A preliminary version appears at PKC 2010; copyright of proceedings version: IACR.}

(opens in new tab)**Hash Function Combiners in SSL and TLS**

Marc Fischlin, Anja Lehmann, Daniel Wagner

RSA Security Cryptographer's Track 2010, Lecture Notes in Computer Science, Volume 5985, pp. 268-283, Springer-Verlag, 2010.

^{This is the full version. A preliminary version appears at CT-RSA 2010; copyright of proceedings version: Springer.}

(opens in new tab)**Delayed-Key Message Authentication for Streams**

Marc Fischlin, Anja Lehmann

Theory of Cryptography Conference – TCC, Lecture Notes in Computer Science, Volume 5978, pp. 290-307, Springer-Verlag, 2010.

^{This is the full version. A preliminary version appears at TCC 2010; copyright of proceedings version: IACR.}

## 2009

**A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical**

Anja Lehmann, Stefano Tessaro

Asiacrypt 2009, Lecture Notes in Computer Science, Volume 5912, pp. 364-381, Springer-Verlag, 2009.

**Foundations of Non-Malleable Hash and One-Way Functions **

Alexandra Boldyreva, David Cash, Marc Fischlin, Bogdan Warinschi

Asiacrypt 2009, Lecture Notes in Computer Science, Volume 5912, pp. 524-541, Springer-Verlag, 2009.

(opens in new tab)**Sanitizable Signatures: How to Partially Delegate Control for Authenticated Data**

Christina Brzuska, Marc Fischlin, Anja Lehmann, Dominique Schröder

Biometrics and Electronic Signatures – Research and Applications (BIOSIG) 2009, Lecture Notes in Informatics, Volume 155, pp. 117-128, Gesellschaft fuer Informatik (GI), 2009

^{This is the full version. A preliminary version appears at BIOSIG 2009; copyright of proceedings version: GI.}

(opens in new tab)**Security Analysis of the PACE Key-Agreement Protocol **

Jens Bender, Marc Fischlin, Dennis Kügler

Information Security Conference (ISC) 2009, Lecture Notes in Computer Science, Volume 5735, pp. 33-48, Springer-Verlag, 2009.

^{This is the full version. A preliminary version appears at ISC 2009; copyright of proceedings version: Springer.}

**Security of Verifiably Encrypted Signatures and a Construction Without Random Oracles **

Markus Rückert, Dominique Schröder

Pairings 2009, Lecture Notes in Computer Science, Volume 5671, pp. 17-34, Springer-Verlag, 2009.

(opens in new tab)**Security of Sanitizable Signatures Revisited **

Christina Brzuska, Marc Fischlin, Tobias Freudenreich, Anja Lehmann, Marcus Page, Jakob Schelbert, Dominique Schröder, Florian Volk

Public-Key Cryptography (PKC) 2009, Lecture Notes in Computer Science, Volume 5443, pp. 317-336, Springer-Verlag, 2009

^{This is the full version. A preliminary version appears at PKC 2009; copyright of proceedings version: Springer.}

(opens in new tab)**Security of Blind Signatures under Aborts **

Marc Fischlin, Dominique Schröder

Public-Key Cryptography (PKC) 2009, Lecture Notes in Computer Science, Volume 5443, pp. 297-316, Springer-Verlag, 2009.

^{This is a preliminary version. The journal version with the renamed title “Security of Blind Signatures under Aborts and Applications to Adaptive Oblivious Transfer” is not available for copyright reasons. Another preliminary version appears at PKC 2009; copyright of proceedings version: Springer.}

## 2008

(opens in new tab)**Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles **

Mihir Bellare, Marc Fischlin, Adam O'Neill, Thomas Ristenpart

Crypto 2008, Lecture Notes in Computer Science, Volume 5157, pp. 360-378, Springer-Verlag, 2008.

^{This is the full version. A preliminary version appears at Crypto; copyright of proceedings version: IACR.}

(opens in new tab)**Robust Multi-Property Combiners for Hash Functions Revisited **

Marc Fischlin, Anja Lehmann, Krzysztof Pietrzak

ICALP 2008, Lecture Notes in Computer Science, Volume 5125, pp. 655-667, Springer-Verlag, 2008.

^{This is the full version. A preliminary version appears at ICALP; copyright of proceedings version: Springer.}

(opens in new tab)**Security of NMAC and HMAC Based on Non-Malleability **

Marc Fischlin

RSA Security Cryptographer's Track 2008, Lecture Notes in Computer Science, Volume 4964, pp. 138-154, Springer-Verlag, 2008.

^{This is the full version. A preliminary version appears at CT-RSA 2008; copyright of proceedings version: Springer.}

(opens in new tab)**Robust Multi-Property Combiners for Hash Functions **

Marc Fischlin, Anja Lehmann

Theory of Cryptography Conference – TCC, Lecture Notes in Computer Science, Volume 4948, pp. 375-392, Springer-Verlag, 2008.

^{This is the full version. The original title of the conference version was: Multi-Property Preserving Combiners for Hash Functions. The extended abstract appears in TCC 2008; copyright of proceedings version: IACR.}

## 2007

(opens in new tab)**Security-Amplifying Combiners for Hash Functions**

Marc Fischlin, Anja Lehmann

Advances in Cryptology – Crypto 2007, Lecture Notes in Computer Science, Volume 4622, pp. 224-243, Springer-Verlag, 2007.

^{This is the Crypto 2007 version; copyright of proceedings version: IACR.}

(opens in new tab)**Anonymous Signatures Made Easy**

Marc Fischlin

Public-Key Cryptography – PKC 2007, Lecture Notes in Computer Science, Volume 4450, pp. 31-42, Springer-Verlag, 2007.

^{This is the full version; copyright of proceedings version: IACR.}

(opens in new tab)**A Closer Look at PKI: Security and Efficiency**

Alexandra Boldyreva, Marc Fischlin, Adriana Palacio, Bogdan Warinschi

Public-Key Cryptography – PKC 2007, Lecture Notes in Computer Science, Volume 4450, pp. 458-475, Springer-Verlag, 2007.

^{This is the PKC version; copyright of proceedings version: IACR.}

(opens in new tab)**Is Your Bank Using Secure Transaction Numbers? (in German) **

Marc Fischlin

D-A-CH Security 2007, IT Security and IT Mangement, pp. 14-23, syssec, 2007.

^{This is the full version. A preliminary version appears at D-A-CH.}

(opens in new tab)**Security of Invertible Media Authentication Schemes Revisited **

Daniel Doenigus, Stefan Endler, Marc Fischlin, Andreas Huelsing, Patrick Jaeger, Anja Lehmann, Sergey Podrazhansky, Sebastian Schipp, Erik Tews, Sven Vowe, Matthias Walthart, Frederik Weidemann

Information Hiding 2007, Lecture Notes in Computer Science, Volume 4567, pp. 189-203, Springer-Verlag, 2008.

^{This is the full version. A preliminary version appears at Information Hiding 2007; copyright of proceedings version: Springer.}

## 2006

(opens in new tab)**On the Security of OAEP **

Alexandra Boldyreva, Marc Fischlin

Asiacrypt 2006, Lecture Notes in Computer Science, Volume 4284, pp. 210-225, Springer-Verlag, 2006.

^{This is the full version; copyright of proceedings version: IACR.}

(opens in new tab)**Round-Optimal Composable Blind Signatures in the Common Reference String Model**

Marc Fischlin

Advances in Cryptology – Crypto 2006, Lecture Notes in Computer Science, Volume 4117, pp. 60-77, Springer-Verlag, 2006.

^{This is the full version; copyright of proceedings version: IACR.}

(opens in new tab)**Universally Composable Oblivious Transfer in the Multi-Party Setting**

Marc Fischlin

RSA Security Cryptographer's Track 2006, Lecture Notes in Computer Science, Volume 3860, pp. 332-349, Springer-Verlag, 2006.

^{This is the full version; copyright of proceedings version: Springer.}

## 2005

(opens in new tab)**Communication-Efficient Non-interactive Proofs of Knowledge with Online Extractors **

Marc Fischlin

Crypto 2005, Lecture Notes in Computer Science, Volume 3621, pp. 152-168, Springer-Verlag, 20065.

^{This is the full version; copyright of proceedings version: IACR.}

(opens in new tab)**Analysis of Random Oracle Instantiation Scenarios for OAEP and Other Practical Schemes**

Alexandra Boldyreva, Marc Fischlin

Crypto 2005, Lecture Notes in Computer Science, Volume 3621, pp. 412-429, Springer-Verlag, 20065.

^{This is the full version; copyright of proceedings version: IACR.}

(opens in new tab)**Completely Non-malleable Schemes**

Marc Fischlin

ICALP 2005, Lecture Notes in Computer Science, Volume 3580, pp. 779-790, Springer-Verlag, 2005.

^{This is the full version; copyright of proceedings version: IACR.}

## 2004

(opens in new tab)**Fast Verification of Hash Chains **

Marc Fischlin

CT-RSA 2004, Lecture Notes in Computer Science, Volume 2964, pp. 339-352, Springer-Verlag, 2004.

^{This is the full version; copyright of proceedings version: Springer.}

(opens in new tab)**A Privacy-Friendly Loyalty System Based on Discrete Logarithms over Elliptic Curves**

Matthias Enzmann, Marc Fischlin, Markus Schneider

Financial Cryptography 2004, Lecture Notes in Computer Science, Volume 3110, pp. 24-38, Springer-Verlag, 2004.

^{This is the full version; copyright of proceedings version: Springer.}

## 2003

(opens in new tab)**Progressive Verification: The Case of Message Authentication**

Marc Fischlin

Indocrypt 2003, Lecture Notes in Computer Science, Volume 2904, pp. 416-429, Springer-Verlag, 2003.

^{This is the full version; copyright of proceedings version: Springer.}

(opens in new tab)**The Cramer-Shoup Strong-RSASignature Scheme Revisited**

Marc Fischlin

PKC'03, Lecture Notes in Computer Science, Volume 2567, pp. 116-129, Springer-Verlag, 2003.

^{This is the full version; copyright of proceedings version: Springer.}

## 2002

(opens in new tab)**On the Impossibility of Constructing Non-interactive Statistically-Secret Protocols from Any Trapdoor One-Way Function **

Marc Fischlin

CT-RSA 2002, Lecture Notes in Computer Science, Volume 2271, pp. 79-95, Springer-Verlag, 2002.

^{This is the full version; copyright of proceedings version: Springer.}

(opens in new tab)**The Representation Problem Based on Factoring**

Marc Fischlin, Roger Fischlin

CT-RSA 2002, Lecture Notes in Computer Science, Volume 2271, pp. 96-113, Springer-Verlag, 2002.

^{This is the full version; copyright of proceedings version: Springer.}

## 2001

(opens in new tab)**Universally Composable Commitments **

Ran Canetti, Marc Fischlin

Crypto 2001, Lecture Notes in Computer Science, Volume 2139, pp. 19-40, Springer-Verlag, 2001.

^{This is the full version; copyright of proceedings version: Springer.}

(opens in new tab)**Identification Protocols Secure against Reset Attacks **

Mihir Bellare, Marc Fischlin, Shafi Goldwasser, Silvio Micali

Eurocrypt 2001, Lecture Notes in Computer Science, Volume 2045, pp. 495-511, Springer-Verlag, 2001.

^{This is the full version; copyright of proceedings version: Springer.}

(opens in new tab)**A Cost-Effective Pay-Per-Multiplication Comparison Method for Millionaires **

Marc Fischlin

CT-RSA 2001, Lecture Notes in Computer Science, Volume 2020, pp. 457-472, Springer-Verlag, 2001.

^{This is the full version; copyright of proceedings version: Springer.}

## 2000

(opens in new tab)**A Note on Security Proofs in the Generic Model **

Marc Fischlin

Asiacrypt 2000, Lecture Notes in Computer Science, Volume 1976, pp. 458-469, Springer-Verlag, 2000.

^{This is the full version; copyright of proceedings version: Springer.}

(opens in new tab)**Efficient Non-malleable Commitment Schemes. **

Marc Fischlin, Roger Fischlin

Crypto 2000, Lecture Notes in Computer Science, Volume 1880, pp. 413-431, Springer-Verlag, 2000.

^{This is the journal version of 2009; copyright of proceedings version: Springer.}

## 1999 or earlier

(opens in new tab)**Pseudorandom Function Tribe Ensembles Based on One-Way Permutations: Improvements and Applications **

Marc Fischlin

Eurocrypt 1999, Lecture Notes in Computer Science, Volume 1592, pp. 432-445 Springer-Verlag, 1999.

^{This is the full version; copyright of proceedings version: Springer.}

(opens in new tab)**Cryptographic Limitations on Parallelizing Membership and Equivalence Queries with Applications to Random Self-Reductions. **

Marc Fischlin

ALT'98, Lecture Notes in Computer Science, Volume 1501, pp. 72-86, Springer-Verlag, 1998.

^{This is the journal version of 2001; copyright of proceedings version: Springer.}

(opens in new tab)**Lower Bounds for the Signature Size of Incremental Schemes **

Marc Fischlin

FOCS 1997, pp. 438-447, IEEE Computer Society, 1997.

^{This is the full version.}

(opens in new tab)**Practical Memory Checkers for Stacks, Queues and Deques **

Marc Fischlin

ACISP'97, Lecture Notes in Computer Science, Volume 1270, pp. 114-125, Springer-Verlag, 1997.

^{This is the full version; copyright of proceedings version: Springer.}

(opens in new tab)**Incremental Cryptography and Memory Checkers **

Marc Fischlin

Eurocrypt 1997, Lecture Notes in Computer Science, Volume 1233, pp. 293-408, Springer-Verlag, 1997.

^{This is the full version; copyright of proceedings version: Springer.}

## Disclaimer

The documents contained in these directories are included by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.