Conference Publications

2021

On Derandomizing Yao's Weak-to-Strong OWF Construction
Chris Brzuska, Geoffroy Couteau, Pihla Karanko, Felix Rohrbach
TCC 2021, Lecture Notes in Computer Science, Volume ???, pp. ??-??, Springer-Verlag, 2021.

Please check again later for the online version.

(opens in new tab)Provable Security Analysis of FIDO2
Manuel Barbosa, Alexandra Boldyreva, Shan Chen, Bogdan Warinschi
Crypto 2021, Lecture Notes in Computer Science, Volume 12827, Part III, pp. 125-156, Springer-Verlag, 2021.

This is a link to the IACR ePrint version, Report 2020/756.

Multipath TLS 1.3
Marc Fischlin, Sven-Andre Müller, Jean-Pierre Münch, Lars Porth
ESORICS 2021, Lecture Notes in Computer Science, Volume 12973, Part II, pp. 86-105, Springer-Verlag, 2021.

Please check again later for the online version.

(opens in new tab)BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures
Cas Cremers, Samed Düzlü, Rune Fiedler, Marc Fischlin, and Christian Janson
IEEE Symposium on Security and Privacy (S&P 2021), IEEE, 2021

This is a link to the IACR ePrint version, Report 2020/1525.

(opens in new tab)Single-to-Multi-Theorem Transformations for Non-Interactive Statistical Zero-Knowledge
Marc Fischlin, Felix Rohrbach
PKC 2021, Lecture Notes in Computer Science, Volume ???, pp. ??-??, Springer-Verlag, 2021.

This is a link to the IACR ePrint version, Report 2020/1204.

2020

On the Memory Fault Resilience of TLS 1.3
Lukas Brandstetter, Marc Fischlin, Robin Leander Schröder, and Michael Yonli
Security Standardisation Research (SSR) Conference 2020, Lecture Notes in Computer Science, Volume ???, pp. ??-??, Springer-Verlag, 2020.

Please check later for the online version.

(opens in new tab)Towards Post-Quantum Security for Signal's X3DH Handshake
Jacqueline Brendel, Marc Fischlin, Felix Günther, Christian Janson, and Douglas Stebila
Selected Areas in Cryptography, 27th International Conference, SAC 2020, Lecture Notes in Computer Science, Volume ???, pp. ??-??, Springer-Verlag, 2020.

This is a link to the IACR ePrint version, Report 2019/1356.

Towards Defeating Backdoored Random Oracles: Indifferentiability with Bounded Adaptivity
Yevgeniy Dodis, Pooya Farshim, Sogol Mazaheri, and Stefano Tessaro
TCC 2020, Part ?, Lecture Notes in Computer Science, Volume ???, pp. ???-???, Springer-Verlag, 2020.

Please check again later for on nolin version.

(opens in new tab)Security Reductions for White-Box Key-Storage in Mobile Payments
Estuardo Alpirez Bock, Chris Brzuska, Marc Fischlin, Christian Janson and Wil Michiels
Asiacrypt 2020, Part ?, Lecture Notes in Computer Science, Volume ???, pp. ???-???, Springer-Verlag, 2020.

This is a link to the IACR ePrint version, Report 2019/1014.

Client-oblivious OPRAM
Gareth T. Davies, Christian Janson, and Daniel P. Martin
ICICS 2020, Lecture Notes in Computer Science, Volume ???, pp. ???, Springer-Verlag, 2020.

Please check again later for an online version.

Information-Theoretic Security of Cryptographic Channels
Marc Fischlin, Felix Günther, Phillip Muth
ICICS 2020, Lecture Notes in Computer Science, Volume ???, pp. ???-???, Springer-Verlag, 2020.

Please check again later for an online version.

(opens in new tab)Signatures from Sequential-OR Proofs
Marc Fischlin, Patrick Harasser, and Christian Janson
Eurocrypt 2020, Part III, Lecture Notes in Computer Science, Volume 12107, pp. 212-244, Springer-Verlag, 2020.

This is a link to the IACR ePrint version, Report 2020/271.

(opens in new tab)Authentication in Key-Exchange: Definitions, Relations and Compositions
Cyprien Delpech de Saint Guilhem,Marc Fischlin and Bogdan Warinschi
CSF 2020, pp. 288-303, IEEE, 2020.

This is a link to the IACR ePrint version, Report 2019/1203.

(opens in new tab)Modeling Memory Faults in Signature and Authenticated Encryption Schemes
Marc Fischlin, Felix Günther
CT-RSA 2020, Lecture Notes in Computer Science, Volume 12006, pp. 56-84, Springer-Verlag, 2020.

This is a link to the IACR ePrint version, Report 2019/1053.

2019

(opens in new tab)Sponges Resist Leakage: The Case of Authenticated Encryption
Jean Paul Degabriele, Christian Janson, and Patrick Struck
Asiacrypt 2019, Part II, Lecture Notes in Computer Science, Volume 11922, pp. 209-240, Springer-Verlag, 2019.

This is a link to the IACR ePrint version, Report 20197/1034.

(opens in new tab)Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids
Jacqueline Brendel, Marc Fischlin, Felix Günther
ESORICS 2019, Part II, Lecture Notes in Computer Science, Volume 11736, pp. 521-541, Springer-Verlag, 2019.

This is a link to the IACR ePrint version, Report 2017/1252.


How to Sign with White-Boxed AES
Marc Fischlin and Helene Haagh
Latincrypt 2019, Lecture Notes in Computer Science, Volume 11774, pp. 259-279, Springer-Verlag, 2019.

Please check again later for an online version.


(opens in new tab)Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange
Nina Bindel, Jacqueline Brendel, Marc Fischlin, Brian Goncalves, Douglas Stebila
PQCrypto 2019, Lecture Notes in Computer Science, Volume 11505, pp. 206-226, Springer-Verlag, 2019.

This is a link to the IACR ePrint version, Report 2018/903.

2018

(opens in new tab)Simulatable Channels: Extended Security that is Universally Composable and Easier to Prove
Jean Paul Degabriele and Marc Fischlin
Asiacrypt 2018, Part 3, Lecture Notes in Computer Science, Volume 11274, pp. 519-550, Springer-Verlag, 2018.

This is a link to the IACR ePrint version, Report 2018/844.

(opens in new tab)Combiners for Backdoored Random Oracles
Balthazar Bauer, Pooya Farshim, and Sogol Mazaheri
CRYPTO 2018, Lecture Notes in Computer Science, Volume 10992, pp. 272-302, Springer-Verlag, 2018.

This is a link to the IACR ePrint version, Report 2018/770.


(opens in new tab)Invisible Sanitizable Signatures and Public-Key Encryption are Equivalent
Marc Fischlin and Patrick Harasser
ACNS 2018, Lecture Notes in Computer Science, Volume 10892, pp. 202-220, Springer Verlag, 2018.

This is a link to the IACR ePrint version, Report 2018/337.


(opens in new tab)Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks
Marc Fischlin and Sogol Mazaheri
31st IEEE Computer Security Foundations Symposium (CSF 2018), pp. 76-90, IEEE, 2018.

This is a link to the IACR ePrint version, Report 2017/984.


(opens in new tab)Backdoored Hash Functions: Immunizing HMAC and HKDF

Marc Fischlin, Christian Janson, and Sogol Mazaheri
31st IEEE Computer Security Foundations Symposium (CSF 2018), pp. 105-118, IEEE, 2018.

This is a link to the IACR ePrint version, report 2018/362.


(opens in new tab)Untagging Tor: A Formal Treatment of Onion Encryption
Jean Paul Degabriele and Martijn Stam
Eurocrypt 2018, Part III, Lecture Notes in Computer Science, Volume 10822, pp. 259-293, Springer-Verlag, 2018.

This is a link to the IACR ePrint version, Report 2018/162.

2017


(opens in new tab)Zero Round-Trip Time for the Extended Access Control Protocol
Jacqueline Brendel, Marc Fischlin
ESORICS 2017, Lecture Notes in Computer Science, Volume ????, pp. ???-???, Springer-Verlag, 2017.

This is a link to the IACR ePrint version, Report 2017/060.


(opens in new tab)PRF-ODH: Relations, Instantiations, and Impossibility Results
Jacqueline Brendel, Marc Fischlin, Felix Günther, and Christian Janson
CRYPTO 2017, Part III, Lecture Notes in Computer Science, Volume 10403, pp. 651-681, Springer-Verlag, 2017.

This is a link to the IACR ePrint version, Report 2017/517.


(opens in new tab)A Formal Treatment of Multi-key Channels
Felix Günther and Sogol Mazaheri
CRYPTO 2017, Part III, Lecture Notes in Computer Science, Volume 10403, pp. 587-618, Springer-Verlag, 2017.

This is a link to the IACR ePrint version, Report 2017/501.


(opens in new tab)Redactable Graph Hashing, Revisited (short paper)
Andreas Erwig, Marc Fischlin, Martin Hald, Dominik Helm, Robert Kiel, Florian Kübler, Michael Kümmerlin, Jakob Laenge, Felix Rohrbach
ACISP 2017 (Part II), Lecture Notes in Computer Science, Volume 10343, pp. 398–405, Springer-Verlag, 2017

This is the full version; copyright of the proceedings version: Springer.


(opens in new tab)0-RTT Key Exchange with Full Forward Secrecy
Felix Günther, Britta Hale, Tibor Jager, and Sebastian Lauer
Eurocrypt 2017, Lecture Notes in Computer Science, Volume 10212, pp. 519-548, Springer-Verlag, 2017.

This is a link to the IACR ePrint version, Report 2017/223.


(opens in new tab)Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates
Marc Fischlin, Felix Günther
EuroS&P 2017, pp. 60-75, IEEE, 2017.

This is a link to the IACR ePrint version, Report 2017/082.


(opens in new tab)Cloud Storage File Recoverability
Christian A. Gorke, Christian Janson, Frederik Armknecht, and Carlos Cid
AsiaCCS-SCC 2017, pp. 19-26, ACM, 2017.

This is a link to the IACR ePrint version, Report 2017/167.

2016


Efficient Proactive Secret Sharing
Jacqueline Brendel, Denise Demirel
2016 Privacy, Security and Trust Conference, IEEE, 2016.

Please check again later for the online version.


(opens in new tab)Attribute-based Access Control Architectures with the eIDAS Protocols
Frank Morgner, Paul Bastian, Marc Fischlin
SSR 2016, Lecture Notes in Computer Science, Volume 10074, pp. 205-226, Springer-Verlag, 2016.

This is the full version. Copyright of the proceedings version: Springer-Verlag.


(opens in new tab)Secure Logging Schemes and Certificate Transparency
Benjamin Dowling, Felix Günther, Udyani Herath, and Douglas Stebila
ESORICS 2016, Part II, Lecture Notes in Computer Science, Volume 9879, pp. 140-158, Springer-Verlag, 2016.

This is a link to the eprint version 2016/452.


(opens in new tab)Securing Transactions with the eIDAS Protocols
Frank Morgner, Paul Bastian, Marc Fischlin
WISTP 2016, Lecture Notes in Computer Science, Volume 9895, pp. 3-18, Springer-Verlag, 2016.

This is the full version. Copyright of the proceedings version: Springer-Verlag.


(opens in new tab)Obfuscation Combiners
Marc Fischlin, Amir Herzberg, Hod Bin Noon, Haya Shulman
Crypto 2016, Part II, Lecture Notes in Computer Science, Volume 9815, pp. 521-550, Springer-Verlag, 2016.

This is a link to the eprint version 2016/289.


(opens in new tab)Semantic Security and Indistinguishability in the Quantum World
Tommaso Gagliardoni, Andreas Hülsing, Christian Schaffner
Crypto 2016, Part III,, Lecture Notes in Computer Science, Volume 9816, pp. 60-89, Springer-Verlag, 2016.

This is a link to the eprint version 2015/355.


Key Confirmation in Key Exchange: A Formal Treatment and Implications for TLS 1.3
Marc Fischlin, Felix Günther, Benedikt Schmidt, and Bogdan Warinschi
37th IEEE Symposium on Security and Privacy (S&P 2016), IEEE, May 2016.

Please check later for an online version.


(opens in new tab)An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation
Sedat Akleylek, Nina Bindel, Johannes Buchmann, Juliane Krämer and Giorgia Azzurra Marson
Africacrypt 2016, Lecture Notes in Computer Science, Volume 9646, pp. 44–60, Springer-Verlag, 2016

This is a link to the eprint version 2016/030.


(opens in new tab)On the Hardness of Proving CCA-security of Signed ElGamal
David Bernhard, Marc Fischlin, Bogdan Warinschi
PKC 2016, Lecture Notes in Computer Science, Volume 9614, pp. 47–69, Springer-Verlag, 2016

This is a link to the ePrint version 2015/649.

2015


(opens in new tab)A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates
Benjamin Dowling, Marc Fischlin, Felix Günther, and Douglas Stebila
ACM Computer and Communication Security (CCS 2015), pp. 1197–1210, ACM, 2015

This is a link to the eprint version 2015/914.


Notions of Deniable Message Authentication
Marc Fischlin and Sogol Mazaheri
ACM Workshop on Privacy in the Electronic Society (WPES 2015), pp. 55–64, ACM, 2015

Please check later for an online version.


Data Is a Stream: Security of Stream-Based Channels
Marc Fischlin, Felix Günther, Giorgia Azzurra Marson, and Kenneth G. Paterson
CRYPTO 2015, Lecture Notes in Computer Science, Volume 9216, pp. 545–564, Springer-Verlag, 2015

Please check later for an online version.


(opens in new tab)Linkable Message Tagging: Solving the key distribution problem of signature schemes
Felix Günther and Bertram Poettering
ACISP 2015, Lecture Notes in Computer Science, Volume 9144, pp. 195–212, Springer-Verlag, 2015

This is a link to the eprint version 2014/014.


(opens in new tab)Privately Computing Set-Union and Set-Intersection Cardinality via Bloom Filters
Rolf Egert, Marc Fischlin, David Gens, Sven Jacob, Matthias Senker and Jörn Tillmanns
ACISP 2015, Lecture Notes in Computer Science, Volume 9144, pp. 413–430, Springer-Verlag, 2015

This is the full version; copyright of the proceedings version: Springer.


(opens in new tab)Adaptive Proofs of Knowledge in the Random Oracle Model
David Bernhard, Marc Fischlin, Bogdan Warinschi
PKC 2015, Lecture Notes in Computer Science, Volume 9020, pp. 629–649, Springer-Verlag, 2015

This is a link to the ePrint version 2015/648.


(opens in new tab)Random-Oracle Uninstantiability from Indistinguishability Obfuscation
Christina Brzuska, Pooya Farshim, Arno Mittelbach
Theory of Cryptography Conference – TCC, Part II, Lecture Notes in Computer Science, Volume 9015, pp. 428–455, Springer-Verlag, 2015

This is a link to the ePrint version 2014/867.

2014


(opens in new tab)Unpicking PLAID – A Cryptographic Analysis of an ISO-standards-track Authentication Protocol
Jean Paul Degabriele, Victoria Fehr, Marc Fischlin, Tommaso Gagliardoni, Felix Günther, Giorgia Azzurra Marson, Arno Mittelbach, Kenneth G. Paterson
SSR 2014, Lecture Notes in Computer Science, Volume 8893, pp. 1–25, Springer-Verlag, 2014

This is a link to the ePrint version 2014/728. See also the journal version from 2016.


(opens in new tab)Indistinguishability Obfuscation versus Multi-Bit Point Obfuscation with Auxiliary Input
Christina Brzuska, Arno Mittelbach
Asiacrypt 2014, Lecture Notes in Computer Science, Volume 8874, pp. 142-161, Springer-Verlag, 2014

This is a link to the ePrint version 2014/405.


(opens in new tab)Using Indistinguishability Obfuscation via UCEs
Christina Brzuska, Arno Mittelbach
Asiacrypt 2014, Lecture Notes in Computer Science, Volume 8874, pp. 122-141, Springer-Verlag, 2014

This is a link to the ePrint version 2014/381.


(opens in new tab)Multi-Stage Key Exchange and the Case of Google's QUIC Protocol
Marc Fischlin, Felix Günther
ACM Computer and Communication Security (CCS 2014), pp. 1193–1204, ACM, 2014.

This is the full version. A preliminary version appears at CCS 2014 (DOI: 10.1145/2660267.2660308); copyright of proceedings version: ACM.


(opens in new tab)Privacy-Enhanced Participatory Sensing with Collusion-Resistance and Data Aggregation
Felix Günther, Mark Manulis, Andreas Peter
CANS 2014, Lecture Notes in Computer Science, Volume 8813, pp. 321–336, Springer-Verlag, 2014.

This is a link to the ePrint version 2014/382.


(opens in new tab)Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources
Christina Brzuska, Pooya Farshim, Arno Mittelbach
Crypto 2014, Lecture Notes in Computer Science, Volume 8616, pp. 188-215, Springer-Verlag, 2014.

This is a link to the eprint version 2014/099.


(opens in new tab)Intercepting Tokens in Cryptographic Protocols: The Empire Strikes Back in the Clone Wars
Özgür Dagdelen, Marc Fischlin
ISIT 2014 – IEEE International Symposium on Information Theory, IEEE, 2014.

This is a link to the eprint version 2012/537.


(opens in new tab)Salvaging Indifferentiability in a Multi-stage Setting
Arno Mittelbach
Eurocrypt 2014, Lecture Notes in Computer Science, Volume 8441, pp. 603-621, Springer-Verlag, 2014

This is a link to the eprint version 2013/286.


(opens in new tab)General Impossibility of Group Homomorphic Encryption in the Quantum World
Frederik Armknecht, Tommaso Gagliardoni, Stefan Katzenbeisser, Andreas Peter
PKC 2014, Lecture Notes in Computer Science, Volume 8383, pp. 556-573, Springer-Verlag, 2014

This is a link to the eprint version 2014/029.

2013


The PACE|CA Protocol for Machine Readable Travel Documents
Jens Bender, Marc Fischlin, Dennis Kügler
INTRUST 2013, Lecture Notes in Computer Science, Volume 8292, pp. 17-35, Springer-Verlag, 2013


(opens in new tab)The Fiat-Shamir Transformation in a Quantum World
Özgür Dagdelen, Marc Fischlin, Tommaso Gagliardoni
Asiacrypt 2013, Lecture Notes in Computer Science, Volume 8270, pp. 62-81, Springer-Verlag, 2013

This is a link to the eprint version 2013/245.


(opens in new tab)Notions of Black-Box Reductions, Revisited
Paul Baecher, Christina Brzuska, Marc Fischlin
Asiacrypt 2013, Lecture Notes in Computer Science, Volume 8269, pp. 1296-315, Springer-Verlag, 2013

This is a link to the eprint version 2013/101.


(opens in new tab)Reset Indifferentiability and its Consequences
Paul Baecher, Christina Brzuska, Arno Mittelbach
Asiacrypt 2013, Lecture Notes in Computer Science, Volume 8269, pp. 154-173, Springer-Verlag, 2013

This is a link to the eprint version 2013/459.


(opens in new tab)A Cryptographic Analysis of OPACITY
Özgür Dagdelen, Marc Fischlin, Tommaso Gagliardoni, Giorgia Azzurra Marson, Arno Mittelbach, Cristina Onete
ESORICS 2013, Lecture Notes in Computer Science, Volume 8134, pp. 345-362, Springer-Verlag, 2013

This is a link to the eprint version 2013/234.


(opens in new tab)Practical Secure Logging: Seekable Sequential Key Generators
Giorgia Azzurra Marson, Bertram Poettering
ESORICS 2013, Lecture Notes in Computer Science, Volume 8134, pp. 111-128, Springer-Verlag, 2013

This is a link to the eprint version 2013/397.


(opens in new tab)Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions
Paul Baecher, Pooya Farshim, Marc Fischlin, Martijn Stam
Eurocrypt 2013, Lecture Notes in Computer Science, Volume 7881, pp. 426-443, Springer-Verlag, 2013

This is a link to the eprint version 2013/350.


(opens in new tab)Limitations of the Meta-Reduction Technique: The Case of Schnorr Signatures
Marc Fischlin, Nils Fleischhacker
Eurocrypt 2013, Lecture Notes in Computer Science, Volume 7881, pp. 444-460, Springer-Verlag, 2013

This is a link to the eprint version 2013/140.


(opens in new tab)Cryptophia's Short Combiner for Collision-Resistant Hash Functions
Arno Mittelbach
ACNS 2013, Lecture Notes in Computer Science, Volume 7954, pp. 136-153, Springer-Verlag, 2013

This is a link to the eprint version 2013/210.


(opens in new tab)Computing on Authenticated Data for Adjustable Predicates
Björn Deiseroth, Victoria Fehr, Marc Fischlin, Manuel Maasz, Nils Fabian Reimers, Richard Stein
ACNS 2013, Lecture Notes in Computer Science, Volume 7954, pp. 53-68, Springer-Verlag, 2013

This is a link to the eprint version 2013/217.


(opens in new tab)Robust Encryption, Revisited
Pooya Farshim, Benoit Libert, Kenneth G. Paterson, Elizabeth A. Quaglia
PKC 2013, Lecture Notes in Computer Science, Volume 7778, pp. 352-368, Springer-Verlag, 2013

This is a link to the eprint version 2012/673.


(opens in new tab)On the Semantic Security of Functional Encryption Schemes
Manuel Barbosa, Pooya Farshim
PKC 2013, Lecture Notes in Computer Science, Volume 7778, pp. 143-161, Springer-Verlag, 2013

This is a link to the eprint version 2012/474.


(opens in new tab)Rate-Limited Secure Function Evaluation
Özgür Dagdelen, Payman Mohassel, Daniele Venturi
PKC 2013, Lecture Notes in Computer Science, Volume 7778, pp. 461-478, Springer-Verlag, 2013

This is the link to the eprint version 2013/021.


Subtle Kinks in Distance-Bounding: an Analysis of Prominent Protocols
Marc Fischlin, Cristina Onete
Security and Privacy in Wireless and Mobile Networks (WiSec) 2013, ACM, 2013


Efficient, Secure, Private Distance Bounding without Key Updates
Jens Hermans, Cristina Onete, Roel Peeters
Security and Privacy in Wireless and Mobile Networks (WiSec) 2013, ACM, 2013

2012


(opens in new tab)Domain-Specific Pseudonymous Signatures for the German Identity Card
Jens Bender, Özgür Dagdelen, Marc Fischlin, Dennis Kügler
Information Security Conference (ISC) 2012, Lecture Notes in Computer Science, Volume 7483, pp. 104-119, Springer-Verlag, 2012.

This is a link to the eprint version 2012/558.


(opens in new tab)On the Joint Security of Signature and Encryption Schemes under Randomness Reuse: Efficiency and Security Amplification
Afonso Arriaga, Manuel Barbosa, Pooya Farshim
Applied Cryptography and Network Security (ACNS) 2012, Lecture Notes in Computer Science, Volume 7341, pp. 206-223, Springer-Verlag, 2012.

This is a link to the eprint version 2012/382.


(opens in new tab)Black-Box Reductions and Separations in Cryptography
Marc Fischlin
Africacrypt 2012, Lecture Notes in Computer Science, Volume 7374, pp. 413-427, Springer-Verlag, 2012

Invited Talk. Besides minor changes this is the version as it appears in the proceedings (but reformated from LNCS style).


(opens in new tab)History-Free Sequential Aggregate Signatures
Marc Fischlin, Anja Lehmann, Dominique Schröder
Security and Cryptography for Networks
(SCN) 2012, Lecture Notes in Computer Science, Volume 7485, pp. 113-130, Springer-Verlag, 2012

This is the full version. A preliminary version appears at SCN 2012; copyright of proceedings version: Springer.


(opens in new tab)Hash Combiners for Second Pre-Image Resistance, Target Collision Resistance and Pre-Image Resistance have Long Output
Arno Mittelbach
(SCN) 2012, Lecture Notes in Computer Science, Volume 7485, pp. 522-539, Springer-Verlag, 2013

This is a link to the eprint version 2013/210.


(opens in new tab)TLS, PACE, and EAC: A Cryptographic View at Modern Key Exchange Protocols
Christina Brzuska, Özgür Dagdelen, Marc Fischlin
Sicherheit 2012, Lecture Notes in Informatics, Volume P-195, pp. 71-82, Gesellschaft für Informatik (GI), 2012.


(opens in new tab)Merging the Cryptographic Security Analysis and the Algebraic-Logic Security Proof for PACE
Lassaad Cheikhrouhou, Werner Stephan, Özgür Dagdelen, Marc Fischlin, Markus Ullmann
Sicherheit 2012, Lecture Notes in Informatics, Volume P-195, pp. 83-94, Gesellschaft für Informatik (GI), 2012.


The PACE|AA Protocol for Machine Readable Travel Documents, and its Security
Jens Bender, Özgür Dagdelen, Marc Fischlin and Dennis Kügler
Financial Cryptography, Lecture Notes in Computer Science, Volume 7397, pp. 344-358, Springer-Verlag, 2012.

Please check again later for an online version.


Homomorphic Encryption with Applications to Secure Outsourcing of Computation
Manuel Barbosa and Pooya Farshim
RSA Security Cryptographer's Track 2012, Lecture Notes in Computer Science, Volume ???, pp. ???, Springer-Verlag, 2012.

Please check again later for an online version.

2011


(opens in new tab)Learning Whom to Trust in a Privacy-Friendly Way
Sebastian Ries, Marc Fischlin, Leonardo A. Martucci, Max Mühlhäuser
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-11), 2011

This is the version as it appears at TrustCom.


(opens in new tab)Polly Cracker, Revisited
Martin R. Albrecht, Pooya Farshim, Jean-Charles Faugère, Ludovic Perret
Asiacrypt 2011, Lecture Notes in Computer Science, Volume 7073, pp. 179-196, Springer-Verlag, 2011.

This is the preliminary full version. A preliminary short version appears at Asiacrypt 2011; copyright of proceedings version: IACR.


Non-Interactive and Re-Usable Universally Composable String Commitments with Adaptive Security
Marc Fischlin, Benoit Libert, Mark Manulis
Asiacrypt 2011, Lecture Notes in Computer Science, Volume 7073, pp. 468-485, Springer-Verlag, 2011.

Please check again later for an online version.


(opens in new tab)Random Oracles in a Quantum World
Dan Boneh, Özgür Dagdelen, Marc Fischlin, Anja Lehmann, Christina Schaffner, Mark Zhandry
Asiacrypt 2011, Lecture Notes in Computer Science, Volume 7073, pp. 41-69, Springer-Verlag, 2011.

This is the preliminary full version. A preliminary short version appears at Asiacrypt 2011; copyright of proceedings version: IACR.


(opens in new tab)Composability of Bellare-Rogaway Key Exchange Protocols
Christina Brzuska, Marc Fischlin, Bogdan Warinschi, Stephen Williams
ACM Conference on Computer and Communications Security (CCS) 2011.

This is the CCS version of the paper.


(opens in new tab)A Formal Approach to Distance-Bounding RFID Protocols
Ulrich Dürholz, Marc Fischlin, Michael Kasper, Cristina Onete
Information Security Conference (ISC) 2011, Lecture Notes in Computer Science, Volume 7001, pp. 47--62, Springer-Verlag, 2011

This is the full version. A preliminary version appears at ISC 2011; copyright of proceedings version: Springer.


(opens in new tab)Physically Uncloneable Functions in the Universal Composition Framework
Christina Brzuska, Marc Fischlin, Heike Schröder, Stefan Katzenbeisser
Crypto 2011, Lecture Notes in Computer Science, Volume 6841, pp. 46-64, Springer-Verlag, 2011

This is the full version. A preliminary version appears at Crypto 2011; copyright of proceedings version: IACR.


(opens in new tab)Random Oracle Reducibility
Paul Baecher, Marc Fischlin
Crypto 2011, Lecture Notes in Computer Science, Volume 6841, pp. 21-38, Springer-Verlag, 2011.

This is the full version. A preliminary version appears at Crypto 2011; copyright of proceedings version: IACR.


(opens in new tab)Breaking reCAPTCHA: A Holistic Approach via Shape Recognition
Paul Baecher, Niklas Büscher, Marc Fischlin, Benjamin Milde
Future Challenges in Security and Privacy for Academia and Industry, IFIP Information Security Conference, IFIP Advances in Information and Communication Technology, Volume 354, pp. 56-67, Springer-Verlag, 2011.

This is the full version as it also appears at IFIP Sec 2011; copyright of proceedings version: Springer.


(opens in new tab)Relaxed Security Notions for Signatures of Knowledge
Marc Fischlin, Cristina Onete
Applied Cryptography and Network Security (ACNS), Lecture Notes in Computer Science, Volume 6750, pp. 309-326, Springer-Verlag, 2011.

This is the proceedings version; copyright of proceedings version: Springer.


(opens in new tab)Expedient Non-Malleability Notions for Hash Functions
Paul Baecher, Marc Fischlin, Dominique Schröder
RSA Security Cryptographer's Track 2011, Lecture Notes in Computer Science, Volume 6558, pp. 268-283, Springer-Verlag, 2011.

This is the full version. A preliminary version appears at CT-RSA 2011; copyright of proceedings version: Springer.


(opens in new tab)Secure Set Intersection with Untrusted Hardware Tokens
Marc Fischlin, Benny Pinkas, Ahmad-Reza Sadeghi, Thomas Schneider, Ivan Visconti
RSA Security Cryptographer's Track 2011, Lecture Notes in Computer Science, Volume 6558, pp. 1-16, Springer-Verlag, 2011.

This is the full version. A preliminary version appears at CT-RSA 2011; copyright of proceedings version: Springer.

2010


(opens in new tab)Random Oracles With(out) Programmability
Marc Fischlin, Anja Lehmann, Thomas Ristenpart, Thomas Shrimpton, Martijn Stam, Stefano Tessaro
Asiacrypt 2010, Lecture Notes in Computer Science, Volume 6477, pp. 303-320, Springer-Verlag, 2010.

This is the proceedings version; copyright of proceedings version: IACR.


(opens in new tab)Security Analysis of the Extended Access Control Protocol for Machine Readable Travel Documents
Özgür Dagdelen, Marc Fischlin
Information Security Conference (ISC) 2010, Lecture Notes in Computer Science, Volume 6531, pp. 54-68, Springer-Verlag, 2010.

Best Student Paper Award. This is the proceedings version; copyright of proceedings version: Springer.


(opens in new tab)CAPTCHAs: The Good, the Bad, and the Ugly
Paul Baecher, Marc Fischlin, Lior Gordon, Robert Langenberg, Michael Lützow, Dominique Schröder
Sicherheit 2010, Lecture Notes in Informatics, Volume P-170, pp. 353-365, Gesellschaft für Informatik (GI), 2010.


(opens in new tab)History-Free Aggregate Message Authentication Codes
Oliver Eikemeier, Marc Fischlin, Jens-Fabian Götzmann, Anja Lehmann, Peter Schröder, Dominique Schröder, Daniel Wagner
Security and Cryptography for Networks (SCN) 2010, Lecture Notes in Computer Science, Volume 6280, pp. 309-328, Springer-Verlag, 2010

This is the full version. A preliminary version appears at SCN 2010; copyright of proceedings version: Springer.


Parallel Enumeration of Shortest Lattice Vectors
Özgür Dagdelen, Michael Schneider
Euro-Par 2010, Lecture Notes in Computer Science, Volume 6272, pp. 211-222, Springer-Verlag, 2010.


Group-Based Attestation: Enhancing Privacy and Management in Remote Attestation
Sami Alsouri, Özgür Dagdelen, Stefan Katzenbeisser
Trust and Trustworthy Computing (TRUST) 2010, Lecture Notes in Computer Science, Volume 6101, pp. 63-77, Springer-Verlag, 2010.


(opens in new tab)Redactable Signatures for Tree-Structured Data: Definitions and Constructions
Christina Brzuska, Heike Busch, Özgür Dagdelen, Marc Fischlin, Martin Franz, Stefan Katzenbeisser, Mark Manulis, Cristina Onete, Andreas Peter, Bertram Poettering, Dominique Schröder
Applied Cryptography and Network Security (ACNS) 2010, Lecture Notes in Computer Science, Volume 6123, pp. 87-104, Springer-Verlag, 2010.

This is the full version as it also appears at ACNS 2010; copyright of proceedings version: Springer.


Generic Constructions for Verifiably Encrypted Signatures Without Random Oracles or NIZKs
Markus Rückert, Michael Schneider, Dominique Schröder
Applied Cryptography and Network Security (ACNS) 2010, Lecture Notes in Computer Science, Volume 6123, Springer-Verlag, 2010.


(opens in new tab)On the Impossbility of Three-Move Blind Signature Schemes
Marc Fischlin, Dominique Schröder
Advances in Cryptology – Eurocrypt 2010, Lecture Notes in Computer Science, Volume 6110, pp. 197-215, Springer-Verlag, 2010.

This is the full version. A preliminary version appears at Eurocrypt 2010; copyright of proceedings version: IACR.


Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions
David Galindo, Benoit Libert, Marc Fischlin, Georg Fuchsbauer, Anja Lehmann, Mark Manulis, Dominique Schröder
Africacrypt 2010, Lecture Notes in Computer Science, Volume 6055, pp. 333-350, Springer-Verlag, 2010.


Fair Partially Blind Signatures
Markus Rückert, Dominique Schröder
Africacrypt 2010, Lecture Notes in Computer Science, Volume 6055, pp. 34-51, Springer-Verlag, 2010.


(opens in new tab)Unlinkability of Sanitizable Signatures
Christina Brzuska, Marc Fischlin, Anja Lehmann, Dominique Schröder
Public-Key Cryptography (PKC) 2010, Lecture Notes in Computer Science, Volume 6056, pp. 444-461, Springer-Verlag, 2010.

This is the full version. A preliminary version appears at PKC 2010; copyright of proceedings version: IACR.


(opens in new tab)Confidential Signatures and Deterministic Signcryption
Alexander Dent, Marc Fischlin, Mark Manulis, Dominique Schroöder, Martijn Stam
Public-Key Cryptography (PKC) 2010, Lecture Notes in Computer Science, Volume 6056, pp. 462-479, Springer-Verlag, 2010.

This is the preliminary full version. A preliminary version appears at PKC 2010; copyright of proceedings version: IACR.


(opens in new tab)Hash Function Combiners in SSL and TLS
Marc Fischlin, Anja Lehmann, Daniel Wagner
RSA Security Cryptographer's Track 2010, Lecture Notes in Computer Science, Volume 5985, pp. 268-283, Springer-Verlag, 2010.

This is the full version. A preliminary version appears at CT-RSA 2010; copyright of proceedings version: Springer.


(opens in new tab)Delayed-Key Message Authentication for Streams
Marc Fischlin, Anja Lehmann
Theory of Cryptography Conference – TCC, Lecture Notes in Computer Science, Volume 5978, pp. 290-307, Springer-Verlag, 2010.

This is the full version. A preliminary version appears at TCC 2010; copyright of proceedings version: IACR.

2009


A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical
Anja Lehmann, Stefano Tessaro
Asiacrypt 2009, Lecture Notes in Computer Science, Volume 5912, pp. 364-381, Springer-Verlag, 2009.


Foundations of Non-Malleable Hash and One-Way Functions
Alexandra Boldyreva, David Cash, Marc Fischlin, Bogdan Warinschi
Asiacrypt 2009, Lecture Notes in Computer Science, Volume 5912, pp. 524-541, Springer-Verlag, 2009.


(opens in new tab)Sanitizable Signatures: How to Partially Delegate Control for Authenticated Data
Christina Brzuska, Marc Fischlin, Anja Lehmann, Dominique Schröder
Biometrics and Electronic Signatures – Research and Applications (BIOSIG) 2009, Lecture Notes in Informatics, Volume 155, pp. 117-128, Gesellschaft fuer Informatik (GI), 2009

This is the full version. A preliminary version appears at BIOSIG 2009; copyright of proceedings version: GI.


(opens in new tab)Security Analysis of the PACE Key-Agreement Protocol
Jens Bender, Marc Fischlin, Dennis Kügler
Information Security Conference (ISC) 2009, Lecture Notes in Computer Science, Volume 5735, pp. 33-48, Springer-Verlag, 2009.

This is the full version. A preliminary version appears at ISC 2009; copyright of proceedings version: Springer.


Security of Verifiably Encrypted Signatures and a Construction Without Random Oracles
Markus Rückert, Dominique Schröder
Pairings 2009, Lecture Notes in Computer Science, Volume 5671, pp. 17-34, Springer-Verlag, 2009.


(opens in new tab)Security of Sanitizable Signatures Revisited
Christina Brzuska, Marc Fischlin, Tobias Freudenreich, Anja Lehmann, Marcus Page, Jakob Schelbert, Dominique Schröder, Florian Volk
Public-Key Cryptography (PKC) 2009, Lecture Notes in Computer Science, Volume 5443, pp. 317-336, Springer-Verlag, 2009

This is the full version. A preliminary version appears at PKC 2009; copyright of proceedings version: Springer.


(opens in new tab)Security of Blind Signatures under Aborts
Marc Fischlin, Dominique Schröder
Public-Key Cryptography (PKC) 2009, Lecture Notes in Computer Science, Volume 5443, pp. 297-316, Springer-Verlag, 2009.

This is a preliminary version. The journal version with the renamed title “Security of Blind Signatures under Aborts and Applications to Adaptive Oblivious Transfer” is not available for copyright reasons. Another preliminary version appears at PKC 2009; copyright of proceedings version: Springer.

2008


(opens in new tab)Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles
Mihir Bellare, Marc Fischlin, Adam O'Neill, Thomas Ristenpart
Crypto 2008, Lecture Notes in Computer Science, Volume 5157, pp. 360-378, Springer-Verlag, 2008.

This is the full version. A preliminary version appears at Crypto; copyright of proceedings version: IACR.


(opens in new tab)Robust Multi-Property Combiners for Hash Functions Revisited
Marc Fischlin, Anja Lehmann, Krzysztof Pietrzak
ICALP 2008, Lecture Notes in Computer Science, Volume 5125, pp. 655-667, Springer-Verlag, 2008.

This is the full version. A preliminary version appears at ICALP; copyright of proceedings version: Springer.


(opens in new tab)Security of NMAC and HMAC Based on Non-Malleability
Marc Fischlin
RSA Security Cryptographer's Track 2008, Lecture Notes in Computer Science, Volume 4964, pp. 138-154, Springer-Verlag, 2008.

This is the full version. A preliminary version appears at CT-RSA 2008; copyright of proceedings version: Springer.


(opens in new tab)Robust Multi-Property Combiners for Hash Functions
Marc Fischlin, Anja Lehmann
Theory of Cryptography Conference – TCC, Lecture Notes in Computer Science, Volume 4948, pp. 375-392, Springer-Verlag, 2008.

This is the full version. The original title of the conference version was: Multi-Property Preserving Combiners for Hash Functions. The extended abstract appears in TCC 2008; copyright of proceedings version: IACR.

2007


(opens in new tab)Security-Amplifying Combiners for Hash Functions
Marc Fischlin, Anja Lehmann
Advances in Cryptology – Crypto 2007, Lecture Notes in Computer Science, Volume 4622, pp. 224-243, Springer-Verlag, 2007.

This is the Crypto 2007 version; copyright of proceedings version: IACR.


(opens in new tab)Anonymous Signatures Made Easy
Marc Fischlin
Public-Key Cryptography – PKC 2007, Lecture Notes in Computer Science, Volume 4450, pp. 31-42, Springer-Verlag, 2007.

This is the full version; copyright of proceedings version: IACR.


(opens in new tab)A Closer Look at PKI: Security and Efficiency
Alexandra Boldyreva, Marc Fischlin, Adriana Palacio, Bogdan Warinschi
Public-Key Cryptography – PKC 2007, Lecture Notes in Computer Science, Volume 4450, pp. 458-475, Springer-Verlag, 2007.

This is the PKC version; copyright of proceedings version: IACR.


(opens in new tab)Is Your Bank Using Secure Transaction Numbers? (in German)
Marc Fischlin
D-A-CH Security 2007, IT Security and IT Mangement, pp. 14-23, syssec, 2007.

This is the full version. A preliminary version appears at D-A-CH.


(opens in new tab)Security of Invertible Media Authentication Schemes Revisited
Daniel Doenigus, Stefan Endler, Marc Fischlin, Andreas Huelsing, Patrick Jaeger, Anja Lehmann, Sergey Podrazhansky, Sebastian Schipp, Erik Tews, Sven Vowe, Matthias Walthart, Frederik Weidemann
Information Hiding 2007, Lecture Notes in Computer Science, Volume 4567, pp. 189-203, Springer-Verlag, 2008.

This is the full version. A preliminary version appears at Information Hiding 2007; copyright of proceedings version: Springer.

2006


(opens in new tab)On the Security of OAEP
Alexandra Boldyreva, Marc Fischlin
Asiacrypt 2006, Lecture Notes in Computer Science, Volume 4284, pp. 210-225, Springer-Verlag, 2006.

This is the full version; copyright of proceedings version: IACR.


(opens in new tab)Round-Optimal Composable Blind Signatures in the Common Reference String Model
Marc Fischlin
Advances in Cryptology – Crypto 2006, Lecture Notes in Computer Science, Volume 4117, pp. 60-77, Springer-Verlag, 2006.

This is the full version; copyright of proceedings version: IACR.


(opens in new tab)Universally Composable Oblivious Transfer in the Multi-Party Setting
Marc Fischlin
RSA Security Cryptographer's Track 2006, Lecture Notes in Computer Science, Volume 3860, pp. 332-349, Springer-Verlag, 2006.

This is the full version; copyright of proceedings version: Springer.

2005


(opens in new tab)Communication-Efficient Non-interactive Proofs of Knowledge with Online Extractors
Marc Fischlin
Crypto 2005, Lecture Notes in Computer Science, Volume 3621, pp. 152-168, Springer-Verlag, 20065.

This is the full version; copyright of proceedings version: IACR.


(opens in new tab)Analysis of Random Oracle Instantiation Scenarios for OAEP and Other Practical Schemes
Alexandra Boldyreva, Marc Fischlin
Crypto 2005, Lecture Notes in Computer Science, Volume 3621, pp. 412-429, Springer-Verlag, 20065.

This is the full version; copyright of proceedings version: IACR.


(opens in new tab)Completely Non-malleable Schemes
Marc Fischlin
ICALP 2005, Lecture Notes in Computer Science, Volume 3580, pp. 779-790, Springer-Verlag, 2005.

This is the full version; copyright of proceedings version: IACR.

2004


(opens in new tab)Fast Verification of Hash Chains
Marc Fischlin
CT-RSA 2004, Lecture Notes in Computer Science, Volume 2964, pp. 339-352, Springer-Verlag, 2004.

This is the full version; copyright of proceedings version: Springer.


(opens in new tab)A Privacy-Friendly Loyalty System Based on Discrete Logarithms over Elliptic Curves
Matthias Enzmann, Marc Fischlin, Markus Schneider
Financial Cryptography 2004, Lecture Notes in Computer Science, Volume 3110, pp. 24-38, Springer-Verlag, 2004.

This is the full version; copyright of proceedings version: Springer.

2003


(opens in new tab)Progressive Verification: The Case of Message Authentication
Marc Fischlin
Indocrypt 2003, Lecture Notes in Computer Science, Volume 2904, pp. 416-429, Springer-Verlag, 2003.

This is the full version; copyright of proceedings version: Springer.


(opens in new tab)The Cramer-Shoup Strong-RSASignature Scheme Revisited
Marc Fischlin
PKC'03, Lecture Notes in Computer Science, Volume 2567, pp. 116-129, Springer-Verlag, 2003.

This is the full version; copyright of proceedings version: Springer.

2002


(opens in new tab)On the Impossibility of Constructing Non-interactive Statistically-Secret Protocols from Any Trapdoor One-Way Function
Marc Fischlin
CT-RSA 2002, Lecture Notes in Computer Science, Volume 2271, pp. 79-95, Springer-Verlag, 2002.

This is the full version; copyright of proceedings version: Springer.


(opens in new tab)The Representation Problem Based on Factoring
Marc Fischlin, Roger Fischlin
CT-RSA 2002, Lecture Notes in Computer Science, Volume 2271, pp. 96-113, Springer-Verlag, 2002.

This is the full version; copyright of proceedings version: Springer.

2001


(opens in new tab)Universally Composable Commitments
Ran Canetti, Marc Fischlin
Crypto 2001, Lecture Notes in Computer Science, Volume 2139, pp. 19-40, Springer-Verlag, 2001.

This is the full version; copyright of proceedings version: Springer.


(opens in new tab)Identification Protocols Secure against Reset Attacks
Mihir Bellare, Marc Fischlin, Shafi Goldwasser, Silvio Micali
Eurocrypt 2001, Lecture Notes in Computer Science, Volume 2045, pp. 495-511, Springer-Verlag, 2001.

This is the full version; copyright of proceedings version: Springer.


(opens in new tab)A Cost-Effective Pay-Per-Multiplication Comparison Method for Millionaires
Marc Fischlin
CT-RSA 2001, Lecture Notes in Computer Science, Volume 2020, pp. 457-472, Springer-Verlag, 2001.

This is the full version; copyright of proceedings version: Springer.

2000


(opens in new tab)A Note on Security Proofs in the Generic Model
Marc Fischlin
Asiacrypt 2000, Lecture Notes in Computer Science, Volume 1976, pp. 458-469, Springer-Verlag, 2000.

This is the full version; copyright of proceedings version: Springer.


(opens in new tab)Efficient Non-malleable Commitment Schemes.
Marc Fischlin, Roger Fischlin
Crypto 2000, Lecture Notes in Computer Science, Volume 1880, pp. 413-431, Springer-Verlag, 2000.

This is the journal version of 2009; copyright of proceedings version: Springer.

1999 or earlier


(opens in new tab)Pseudorandom Function Tribe Ensembles Based on One-Way Permutations: Improvements and Applications
Marc Fischlin
Eurocrypt 1999, Lecture Notes in Computer Science, Volume 1592, pp. 432-445 Springer-Verlag, 1999.

This is the full version; copyright of proceedings version: Springer.


(opens in new tab)Cryptographic Limitations on Parallelizing Membership and Equivalence Queries with Applications to Random Self-Reductions.
Marc Fischlin
ALT'98, Lecture Notes in Computer Science, Volume 1501, pp. 72-86, Springer-Verlag, 1998.

This is the journal version of 2001; copyright of proceedings version: Springer.


(opens in new tab)Lower Bounds for the Signature Size of Incremental Schemes
Marc Fischlin
FOCS 1997, pp. 438-447, IEEE Computer Society, 1997.

This is the full version.


(opens in new tab)Practical Memory Checkers for Stacks, Queues and Deques
Marc Fischlin
ACISP'97, Lecture Notes in Computer Science, Volume 1270, pp. 114-125, Springer-Verlag, 1997.

This is the full version; copyright of proceedings version: Springer.


(opens in new tab)Incremental Cryptography and Memory Checkers
Marc Fischlin
Eurocrypt 1997, Lecture Notes in Computer Science, Volume 1233, pp. 293-408, Springer-Verlag, 1997.

This is the full version; copyright of proceedings version: Springer.

Disclaimer

The documents contained in these directories are included by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.