A Cryptographic Analysis of the TLS 1.3 Handshake Protocol
Benjamin Dowling, Marc Fischlin, Felix Günther, and Douglas Stebila
Journal of Cryptology, Special Edition on TLS 1.3, Volume 34, Number 4, Springer-Verlag, 2021.
This is a revised version of the CCS 2015 paper. The link is to the open access version at the Journal of Cryptology. You can also find a version under eprint 2022/1044.
Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) versus QUIC
Shan Chen, Samuel Jero, Matthew Jagielski, Alexandra Boldyreva, and Cristina Nita-Rotaru
Journal of Cryptology, Special Edition on TLS 1.3, Volume 34, Number 3, Springer-Verlag, 2021.
This is a revised version of the ESORICS 2019 paper. The link is to the open access version at the Journal of Cryptology. You can also find a version under eprint 2019/433.
(opens in new tab)Adaptive Proofs of Knowledge in the Random Oracle Model
David Bernhard, Marc Fischlin, Bogdan Warinschi
IET Information Security, Volume 10, Number 6, pp. 319–331, The Institution of Engineering and Technology, 2016
This is a link to the ePrint version 2015/648. A preliminary version appears in PKC 2015, Lecture Notes in Computer Science, Volume 9020, pp. 629–649, Springer-Verlag, 2015.
(opens in new tab)Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes
Felix Günther, Bertram Poettering
International Journal of Information Security (IJIS), ????:??–??. Springer Verlag, 2016.
This is a link to the ePrint version 2014/014. A preliminary version appeared at: ACISP 2015, Lecture Notes in Computer Science, Volume 9144, pp. 195–212, Springer-Verlag, 2015.
(opens in new tab)Unpicking PLAID – A Cryptographic Analysis of an ISO-standards-track Authentication Protocol
Jean Paul Degabriele, Victoria Fehr, Marc Fischlin, Tommaso Gagliardoni, Felix Günther, Giorgia Azzurra Marson, Arno Mittelbach, Kenneth G. Paterson
International Journal of Information Security (IJIS), Volume 15, Number 6, pp. 637–657. Springer Verlag, 2016.
This is a link to the ePrint version 2014/728. A preliminary version appeared at: SSR 2014, Lecture Notes in Computer Science, Volume 8893, pp. 1–25, Springer-Verlag, 2014.
Robust Multi-Property Combiners for Hash Functions
Marc Fischlin, Anja Lehmann, Krzysztof Pietrzak
Journal of Cryptology, Volume 27, No. 3, pp. 397-428, Springer-Verlag, 2014.
This is the full version of the TCC'08 and ICALP'08 papers.
(opens in new tab)Less is more: relaxed yet composable security notions for key exchange
Christina Brzuska, Marc Fischlin, Nigel P. Smart, Bogdan Warinschi, Stephen C. Williams
International Journal on Information Security, Volume 12, No. 4, pp. 267-297, Springer-Verlag, 2013
This is the link to the eprint version 2012/242.
Security of Blind Signatures Under Aborts and Applications to Adaptive Oblivious Transfer
Marc Fischlin, Dominique Schröder
Journal of Mathematical Cryptology, Issue 2, pp. 169-203, Elsevier, October 2011.
This is the full version of the PKC'09 paper. Please check again later for an online version.
(opens in new tab) Efficient Non-Malleable Commitment Schemes
Marc Fischlin, Roger Fischlin
Journal of Cryptology, Volume 22, pp. 530-571, Springer-Verlag, 2009.
This is the (semantically equivalent to the) journal version of the Crypto 2000 paper. For some reason which escapes us, Journal of Cryptology re-published this paper again in Volume 24(1), pp. 203-244, 2011.
Cryptographic Limitations on Parallelizing Membership and Equivalence Queries with Applications to Random-Self-Reductions
Theoretical Computer Scienc, Volume 268, Number 2, pp. 199-219, Elsevier, 2001.
This is the full version of the ALT'98 paper.
The documents contained in these directories are included by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.