default search action
Christian Cachin
Person information
- affiliation: University of Bern, Switzerland
- affiliation (former): IBM Research Zurich, Switzerland
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2011
- [b2]Christian Cachin, Rachid Guerraoui, Luís E. T. Rodrigues:
Introduction to Reliable and Secure Distributed Programming (2. ed.). Springer 2011, ISBN 978-3-642-15259-7, pp. I-XIX, 1-367 - 1997
- [b1]Christian Cachin:
Entropy measures and unconditional security in cryptography. ETH Zurich, Hartung-Gorre 1997, ISBN 3-89649-185-7, pp. 1-143
Journal Articles
- 2025
- [j17]Christian Cachin, David Lehnherr, Thomas Studer:
Synergistic knowledge. Theor. Comput. Sci. 1023: 114902 (2025) - 2024
- [j16]Orestis Alpos, Christian Cachin, Björn Tackmann, Luca Zanolini:
Asymmetric distributed trust. Distributed Comput. 37(3): 247-277 (2024) - 2018
- [j15]Christian Cachin, Olga Ohrimenko:
Verifying the consistency of remote untrusted services with conflict-free operations. Inf. Comput. 260: 72-88 (2018) - 2017
- [j14]Marcus Brandenburger, Christian Cachin, Nikola Knezevic:
Don't Trust the Cloud, Verify: Integrity and Consistency for Cloud Object Stores. ACM Trans. Priv. Secur. 20(3): 8:1-8:30 (2017) - 2016
- [j13]Tobias Distler, Christian Cachin, Rüdiger Kapitza:
Resource-Efficient Byzantine Fault Tolerance. IEEE Trans. Computers 65(9): 2807-2819 (2016) - 2015
- [j12]Christian Cachin, Claude Crépeau, Julien Marcil, George Savvides:
Information-Theoretic Interactive Hashing and Oblivious Transfer to a Storage-Bounded Receiver. IEEE Trans. Inf. Theory 61(10): 5623-5635 (2015) - 2014
- [j11]Christian Cachin, Robbert van Renesse:
Workshop Report: HotDep 2013 - The 9th workshop on hot topics in dependable systems. ACM SIGOPS Oper. Syst. Rev. 48(1): 19-20 (2014) - 2011
- [j10]Christian Cachin, Idit Keidar, Alexander Shraer:
Fail-Aware Untrusted Storage. SIAM J. Comput. 40(2): 493-533 (2011) - 2010
- [j9]Christian Cachin, Jan Camenisch:
Encrypting Keys Securely. IEEE Secur. Priv. 8(4): 66-69 (2010) - 2009
- [j8]Christian Cachin, Idit Keidar, Alexander Shraer:
Fork sequential consistency is blocking. Inf. Process. Lett. 109(7): 360-364 (2009) - [j7]Christian Cachin, Idit Keidar, Alexander Shraer:
Trusting the cloud. SIGACT News 40(2): 81-86 (2009) - [j6]Lars Arge, Christian Cachin, Andrzej Tarlecki:
Preface. Theor. Comput. Sci. 410(18): 1617 (2009) - 2006
- [j5]Paulo Veríssimo, Nuno Ferreira Neves, Christian Cachin, Jonathan A. Poritz, David Powell, Yves Deswarte, Robert J. Stroud, Ian Welch:
Intrusion-tolerant middleware: the road to automatic security. IEEE Secur. Priv. 4(4): 54-62 (2006) - 2005
- [j4]Christian Cachin, Klaus Kursawe, Victor Shoup:
Random Oracles in Constantinople: Practical Asynchronous Byzantine Agreement Using Cryptography. J. Cryptol. 18(3): 219-246 (2005) - 2004
- [j3]Christian Cachin:
An information-theoretic model for steganography. Inf. Comput. 192(1): 41-56 (2004) - 1997
- [j2]Christian Cachin, Ueli M. Maurer:
Linking Information Reconciliation and Privacy Amplification. J. Cryptol. 10(2): 97-110 (1997) - 1994
- [j1]Christian Cachin:
Pedagogical pattern selection strategies. Neural Networks 7(1): 175-181 (1994)
Conference and Workshop Papers
- 2024
- [c97]Christian Cachin:
Keynote Talk: Consensus in Blockchains: Theory and Practice. ApPLIED@PODC 2024: 1 - [c96]Christian Cachin, Jovana Micic:
Quick Order Fairness: Implementation and Evaluation. ICBC 2024: 230-234 - [c95]Ignacio Amores-Sesar, Christian Cachin, Philipp Schneider:
An Analysis of Avalanche Consensus. SIROCCO 2024: 27-44 - 2023
- [c94]Zhipeng Wang, Marko Cirkovic, Duc Viet Le, William J. Knottenbelt, Christian Cachin:
Pay Less for Your Privacy: Towards Cost-Effective On-Chain Mixers. AFT 2023: 16:1-16:25 - [c93]Orestis Alpos, Christian Cachin, Simon Holmgaard Kamp, Jesper Buus Nielsen:
Practical Large-Scale Proof-Of-Stake Asynchronous Total-Order Broadcast. AFT 2023: 31:1-31:22 - [c92]Christian Cachin, David Lehnherr, Thomas Studer:
Modal and Justification Logics for Multi-agent Systems (Invited Talk). CLAR 2023: 3-8 - [c91]Orestis Alpos, Mariarosaria Barbaraci, Christian Cachin, Noah Schmid, Michael Senn:
Thetacrypt: A Distributed Service for Threshold Cryptography On-Demand: Demo Abstract. Middleware Demos/Posters/Doctoral Symposium 2023: 33-34 - [c90]Orestis Alpos, Ignacio Amores-Sesar, Christian Cachin, Michelle Yeo:
Eating Sandwiches: Modular and Lightweight Elimination of Transaction Reordering Attacks. OPODIS 2023: 12:1-12:22 - [c89]Orestis Alpos, Christian Cachin:
Do Not Trust in Numbers: Practical Distributed Cryptography with General Trust. SSS 2023: 536-551 - [c88]Christian Cachin, David Lehnherr, Thomas Studer:
Synergistic Knowledge. SSS 2023: 552-567 - 2022
- [c87]Christian Cachin, Jovana Micic, Nathalie Steinhauer, Luca Zanolini:
Quick Order Fairness. Financial Cryptography 2022: 316-333 - [c86]Ignacio Amores-Sesar, Christian Cachin, Enrico Tedeschi:
When Is Spring Coming? A Security Analysis of Avalanche Consensus. OPODIS 2022: 10:1-10:22 - [c85]Christian Cachin, Giuliano Losa, Luca Zanolini:
Quorum Systems in Permissionless Networks. OPODIS 2022: 17:1-17:22 - [c84]Sarah Azouvi, Christian Cachin, Duc V. Le, Marko Vukolic, Luca Zanolini:
Modeling Resources in Permissionless Longest-Chain Total-Order Broadcast. OPODIS 2022: 19:1-19:23 - 2021
- [c83]Ignacio Amores-Sesar, Christian Cachin, Anna Parker:
Generalizing weighted trees: a bridge from Bitcoin to GHOST. AFT 2021: 156-169 - [c82]Christian Cachin, Luca Zanolini:
Asymmetric Asynchronous Byzantine Consensus. DPM/CBT@ESORICS 2021: 192-207 - [c81]Christian Cachin:
Asymmetric Distributed Trust. ICDCN 2021: 3 - [c80]Orestis Alpos, Christian Cachin, Giorgia Azzurra Marson, Luca Zanolini:
On the Synchronization Power of Token Smart Contracts. ICDCS 2021: 640-651 - [c79]Marcos K. Aguilera, Hagit Attiya, Christian Cachin, Alessandro Panconesi:
2021 Principles of Distributed Computing Doctoral Dissertation Award. PODC 2021: 3 - [c78]Orestis Alpos, Christian Cachin, Luca Zanolini:
How to Trust Strangers: Composition of Byzantine Quorum Systems. SRDS 2021: 120-131 - [c77]Orestis Alpos, Christian Cachin, Luca Zanolini:
Brief Announcement: How to Trust Strangers - Composition of Byzantine Quorum Systems. DISC 2021: 44:1-44:4 - [c76]Christian Cachin, Luca Zanolini:
Brief Announcement: Revisiting Signature-Free Asynchronous Byzantine Consensus. DISC 2021: 51:1-51:4 - 2020
- [c75]Christian Cachin, Daniel Collins, Tyler Crain, Vincent Gramoli:
Anonymity Preserving Byzantine Vector Consensus. ESORICS (1) 2020: 133-152 - [c74]Ignacio Amores-Sesar, Christian Cachin, Jovana Micic:
Security Analysis of Ripple Consensus. OPODIS 2020: 10:1-10:16 - [c73]Orestis Alpos, Christian Cachin:
Consensus Beyond Thresholds: Generalized Byzantine Quorums Made Live. SRDS 2020: 21-30 - [c72]Christina Müller, Marcus Brandenburger, Christian Cachin, Pascal Felber, Christian Göttel, Valerio Schiavoni:
TZ4Fabric: Executing Smart Contracts with ARM TrustZone : (Practical Experience Report). SRDS 2020: 31-40 - 2019
- [c71]Christian Cachin, Björn Tackmann:
Asymmetric Distributed Trust. OPODIS 2019: 7:1-7:16 - [c70]Marcus Brandenburger, Christian Cachin, Rüdiger Kapitza, Alessandro Sorniotti:
Trusted Computing Meets Blockchain: Rollback Attacks and a Solution for Hyperledger Fabric. SRDS 2019: 324-333 - [c69]Christian Cachin, Björn Tackmann:
Brief Announcement: Asymmetric Distributed Trust. DISC 2019: 39:1-39:3 - 2018
- [c68]Christian Cachin, Esha Ghosh, Dimitrios Papadopoulos, Björn Tackmann:
Stateful Multi-client Verifiable Computation. ACNS 2018: 637-656 - [c67]Elli Androulaki, Christian Cachin, Angelo De Caro, Eleftherios Kokoris-Kogias:
Channels: Horizontal Scaling and Confidentiality on Permissioned Blockchains. ESORICS (1) 2018: 111-131 - [c66]Elli Androulaki, Artem Barger, Vita Bortnikov, Christian Cachin, Konstantinos Christidis, Angelo De Caro, David Enyeart, Christopher Ferris, Gennady Laventman, Yacov Manevich, Srinivasan Muralidharan, Chet Murthy, Binh Nguyen, Manish Sethi, Gari Singh, Keith Smith, Alessandro Sorniotti, Chrysoula Stathakopoulou, Marko Vukolic, Sharon Weed Cocco, Jason Yellick:
Hyperledger fabric: a distributed operating system for permissioned blockchains. EuroSys 2018: 30:1-30:15 - [c65]Mathias Björkqvist, Christian Cachin, Felix Engelmann, Alessandro Sorniotti:
Scalable Key Management for Distributed Cloud Storage. IC2E 2018: 250-256 - 2017
- [c64]Marcus Brandenburger, Christian Cachin, Matthias Lorenz, Rüdiger Kapitza:
Rollback and Forking Detection for Trusted Execution Environments Using Lightweight Collective Memory. DSN 2017: 157-168 - [c63]Christian Cachin:
Blockchains and Consensus Protocols: Snake Oil Warning. EDCC 2017: 1-2 - [c62]Christian Cachin, Jan Camenisch, Eduarda Freire-Stögbuchner, Anja Lehmann:
Updatable Tokenization: Formal Definitions and Provably Secure Constructions. Financial Cryptography 2017: 59-75 - [c61]Christian Cachin, Marko Vukolic:
Blockchain Consensus Protocols in the Wild (Keynote Talk). DISC 2017: 1:1-1:16 - 2016
- [c60]Christian Cachin:
Blockchain - From the Anarchy of Cryptocurrencies to the Enterprise (Keynote Abstract). OPODIS 2016: 2:1-2:1 - [c59]Christian Cachin, Simon Schubert, Marko Vukolic:
Non-Determinism in Byzantine Fault-Tolerant Replication. OPODIS 2016: 24:1-24:16 - [c58]Shengyun Liu, Paolo Viotti, Christian Cachin, Vivien Quéma, Marko Vukolic:
XFT: Practical Fault Tolerance beyond Crashes. OSDI 2016: 485-500 - 2015
- [c57]Marcus Brandenburger, Christian Cachin, Nikola Knezevic:
Don't trust the cloud, verify: integrity and consistency for cloud object stores. SYSTOR 2015: 16:1-16:11 - 2014
- [c56]Christian Cachin:
Integrity, Consistency, and Verification of Remote Computation. CCS 2014: 1538-1539 - [c55]Christian Cachin, Olga Ohrimenko:
Verifying the Consistency of Remote Untrusted Services with Commutative Operations. OPODIS 2014: 1-16 - [c54]Elli Androulaki, Christian Cachin, Dan Dobre, Marko Vukolic:
Erasure-Coded Byzantine Storage with Separate Metadata. OPODIS 2014: 76-90 - [c53]Christian Cachin, Dan Dobre, Marko Vukolic:
Separating Data and Control: Asynchronous BFT Storage with 2t + 1 Data Replicas. SSS 2014: 1-17 - 2013
- [c52]Christian Cachin, Kristiyan Haralambiev, Hsu-Chun Hsiao, Alessandro Sorniotti:
Policy-based secure deletion. CCS 2013: 259-270 - 2012
- [c51]Cristina Basescu, Christian Cachin, Ittay Eyal, Robert Haas, Alessandro Sorniotti, Marko Vukolic, Ido Zachevsky:
Robust data sharing with key-value stores. DSN 2012: 1-12 - [c50]Christian Cachin, Birgit Junker, Alessandro Sorniotti:
On limitations of using cloud storage for data replication. DSN Workshops 2012: 1-6 - [c49]Rüdiger Kapitza, Johannes Behl, Christian Cachin, Tobias Distler, Simon Kuhnle, Seyed Vahid Mohammadi, Wolfgang Schröder-Preikschat, Klaus Stengel:
CheapBFT: resource-efficient byzantine fault tolerance. EuroSys 2012: 295-308 - [c48]Christian Cachin:
Sicherheits-Forschung für die Cloud - Heisse Luft oder Wolke Sieben? Sicherheit 2012: 1 - 2011
- [c47]Anil Kurmus, Moitrayee Gupta, Roman A. Pletka, Christian Cachin, Robert Haas:
A Comparison of Secure Multi-Tenancy Architectures for Filesystem Storage Clouds. Middleware 2011: 471-490 - [c46]Matthias Majuntke, Dan Dobre, Christian Cachin, Neeraj Suri:
Fork-Consistent Constructions from Registers. OPODIS 2011: 283-298 - [c45]Cristina Basescu, Christian Cachin, Ittay Eyal, Robert Haas, Marko Vukolic:
Robust data sharing with key-value stores. PODC 2011: 221-222 - [c44]Christian Cachin:
Integrity and Consistency for Untrusted Services - (Extended Abstract). SOFSEM 2011: 1-14 - 2010
- [c43]Alexander Shraer, Christian Cachin, Asaf Cidon, Idit Keidar, Yan Michalevsky, Dani Shaket:
Venus: verification for untrusted cloud storage. CCSW 2010: 19-30 - [c42]Mathias Björkqvist, Christian Cachin, Robert Haas, Xiao-Yu Hu, Anil Kurmus, René Pawlitzek, Marko Vukolic:
Design and Implementation of a Key-Lifecycle Management System. Financial Cryptography 2010: 160-174 - [c41]Rüdiger Kapitza, Matthias Schunter, Christian Cachin, Klaus Stengel, Tobias Distler:
Storyboard: Optimistic Deterministic Multithreading. HotDep 2010 - [c40]Christian Cachin:
State Machine Replication with Byzantine Faults. Replication 2010: 169-184 - 2009
- [c39]Christian Cachin, Martin Geisler:
Integrity Protection for Revision Control. ACNS 2009: 382-399 - [c38]Christian Cachin, Nishanth Chandran:
A Secure Cryptographic Token Interface. CSF 2009: 141-153 - [c37]Christian Cachin, Idit Keidar, Alexander Shraer:
Fail-Aware Untrusted Storage. DSN 2009: 494-503 - [c36]Christian Cachin:
Rational Protocols. iNetSeC 2009: 93-94 - 2008
- [c35]Christian Cachin, Idit Keidar, Alexander Shraer:
Principles of untrusted storage: a new look at consistency conditions. PODC 2008: 426 - 2007
- [c34]Roman A. Pletka, Christian Cachin:
Cryptographic Security for a High-Performance Distributed File System. MSST 2007: 227-232 - [c33]Christian Cachin, Abhi Shelat, Alexander Shraer:
Efficient fork-linearizable access to untrusted shared memory. PODC 2007: 129-138 - 2006
- [c32]Christian Cachin, Stefano Tessaro:
Optimal Resilience for Erasure-Coded Byzantine Distributed Storage. DSN 2006: 115-124 - [c31]Michael Backes, Christian Cachin, Alina Oprea:
Secure Key-Updating for Lazy Revocation. ESORICS 2006: 327-346 - 2005
- [c30]HariGovind V. Ramasamy, Christian Cachin:
Parsimonious Asynchronous Byzantine-Fault-Tolerant Atomic Broadcast. OPODIS 2005: 88-102 - [c29]Michael Backes, Christian Cachin, Alina Oprea:
Lazy Revocation in Cryptographic File Systems. IEEE Security in Storage Workshop 2005: 1-11 - [c28]Christian Cachin, Stefano Tessaro:
Asynchronous Veri.able Information Dispersal. SRDS 2005: 191-202 - [c27]Michael Backes, Christian Cachin:
Public-Key Steganography with Active Attacks. TCC 2005: 210-226 - [c26]Christian Cachin, Stefano Tessaro:
Optimal Resilience for Erasure-Coded Byzantine Distributed Storage. DISC 2005: 497-498 - [c25]Christian Cachin, Stefano Tessaro:
Asynchronous Verifiable Information Dispersal. DISC 2005: 503-504 - 2004
- [c24]Christian Cachin, Asad Samar:
Secure Distributed DNS. DSN 2004: 423-432 - [c23]Christian Cachin, Reto Strobl:
Asynchronous group key exchange with failures. PODC 2004: 357-366 - 2003
- [c22]Christian Cachin:
Modeling Complexity in Secure Distributed Computing. Future Directions in Distributed Computing 2003: 57-61 - [c21]Michael Backes, Christian Cachin:
Reliable Broadcast in a Computational Hybrid Model with Byzantine Faults, Crashes, and Recoveries. DSN 2003: 37-46 - [c20]Christian Cachin:
An asynchronous protocol for distributed computation of RSA inverses and its applications. PODC 2003: 153-162 - [c19]Michael Backes, Christian Cachin, Reto Strobl:
Proactive secure message transmission in asynchronous networks. PODC 2003: 223-232 - 2002
- [c18]Christian Cachin, Klaus Kursawe, Anna Lysyanskaya, Reto Strobl:
Asynchronous verifiable secret sharing and proactive cryptosystems. CCS 2002: 88-97 - [c17]Christian Cachin, Jonathan A. Poritz:
Secure Intrusion-tolerant Replication on the Internet. DSN 2002: 167-176 - 2001
- [c16]Christian Cachin, Klaus Kursawe, Frank Petzold, Victor Shoup:
Secure and Efficient Asynchronous Broadcast Protocols. CRYPTO 2001: 524-541 - [c15]Christian Cachin:
Distributing Trust on the Internet . DSN 2001: 183-192 - [c14]Joy Algesheimer, Christian Cachin, Jan Camenisch, Günter Karjoth:
Cryptographic Security for Mobile Code. S&P 2001: 2-11 - 2000
- [c13]Christian Cachin, Jan Camenisch:
Optimistic Fair Secure Computation. CRYPTO 2000: 93-111 - [c12]Christian Cachin, Jan Camenisch, Joe Kilian, Joy Müller:
One-Round Secure Computation and Secure Autonomous Mobile Agents. ICALP 2000: 512-523 - [c11]Christian Cachin, Klaus Kursawe, Victor Shoup:
Random oracles in constantipole: practical asynchronous Byzantine agreement using cryptography (extended abstract). PODC 2000: 123-132 - 1999
- [c10]Christian Cachin:
Efficient Private Bidding and Auctions with an Oblivious Third Party. CCS 1999: 120-127 - [c9]Christian Cachin, Silvio Micali, Markus Stadler:
Computationally Private Information Retrieval with Polylogarithmic Communication. EUROCRYPT 1999: 402-414 - 1998
- [c8]Christian Cachin:
On the Foundations of Oblivious Transfer. EUROCRYPT 1998: 361-374 - [c7]Christian Cachin, Claude Crépeau, Julien Marcil:
Oblivious Transfer with a Memory-Bounded Receiver. FOCS 1998: 493-502 - [c6]Christian Cachin:
An Information-Theoretic Model for Steganography. Information Hiding 1998: 306-318 - 1997
- [c5]Christian Cachin, Ueli M. Maurer:
Unconditional Security Against Memory-Bounded Adversaries. CRYPTO 1997: 292-306 - [c4]Christian Cachin:
Smooth Entropy and Rényi Entropy. EUROCRYPT 1997: 193-208 - 1995
- [c3]Christian Cachin:
On-Line Secret Sharing. IMACC 1995: 190-198 - 1994
- [c2]Christian Cachin, Ueli M. Maurer:
Linking Information Reconciliation and Privacy Amplification (Extended Abstract). EUROCRYPT 1994: 266-274 - 1993
- [c1]Matthias Rauterberg, Christian Cachin:
Locating the Primary Attention Focus of the User. VCHCI 1993: 129-140
Parts in Books or Collections
- 2019
- [p1]Christian Cachin:
Byzantine faults. Concurrency: the Works of Leslie Lamport 2019: 67-81
Editorship
- 2024
- [e9]Foteini Baldimtsi, Christian Cachin:
Financial Cryptography and Data Security - 27th International Conference, FC 2023, Bol, Brač, Croatia, May 1-5, 2023, Revised Selected Papers, Part I. Lecture Notes in Computer Science 13950, Springer 2024, ISBN 978-3-031-47753-9 [contents] - [e8]Foteini Baldimtsi, Christian Cachin:
Financial Cryptography and Data Security - 27th International Conference, FC 2023, Bol, Brač, Croatia, May 1-5, 2023, Revised Selected Papers, Part II. Lecture Notes in Computer Science 13951, Springer 2024, ISBN 978-3-031-47750-8 [contents] - 2020
- [e7]Yuval Emek, Christian Cachin:
PODC '20: ACM Symposium on Principles of Distributed Computing, Virtual Event, Italy, August 3-7, 2020. ACM 2020, ISBN 978-1-4503-7582-5 [contents] - 2016
- [e6]Emmanuelle Anceaume, Christian Cachin, Maria Gradinariu Potop-Butucaru:
19th International Conference on Principles of Distributed Systems, OPODIS 2015, December 14-17, 2015, Rennes, France. LIPIcs 46, Schloss Dagstuhl - Leibniz-Zentrum für Informatik 2016, ISBN 978-3-939897-98-9 [contents] - 2013
- [e5]Christian Cachin, Robbert van Renesse:
Proceedings of the 9th Workshop on Hot Topics in Dependable Systems, HotDep 2013, Farmington, Pennsylvania, USA, November 3, 2013. ACM 2013, ISBN 978-1-4503-2457-1 [contents] - 2011
- [e4]Christian Cachin, Thomas Ristenpart:
Proceedings of the 3rd ACM Cloud Computing Security Workshop, CCSW 2011, Chicago, IL, USA, October 21, 2011. ACM 2011, ISBN 978-1-4503-1004-8 [contents] - 2007
- [e3]Christian Cachin, Felix C. Freiling, Jaap-Henk Hoepman:
From Security to Dependability, 10.09. - 15.09.2006. Dagstuhl Seminar Proceedings 06371, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2007 [contents] - [e2]Lars Arge, Christian Cachin, Tomasz Jurdzinski, Andrzej Tarlecki:
Automata, Languages and Programming, 34th International Colloquium, ICALP 2007, Wroclaw, Poland, July 9-13, 2007, Proceedings. Lecture Notes in Computer Science 4596, Springer 2007, ISBN 978-3-540-73419-2 [contents] - 2004
- [e1]Christian Cachin, Jan Camenisch:
Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings. Lecture Notes in Computer Science 3027, Springer 2004, ISBN 3-540-21935-8 [contents]
Reference Works
- 2011
- [r2]Christian Cachin:
Digital Steganography. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 348-352 - 2005
- [r1]Christian Cachin:
Digital Steganography. Encyclopedia of Cryptography and Security 2005
Informal and Other Publications
- 2024
- [i49]Ignacio Amores-Sesar, Christian Cachin, Philipp Schneider:
An Analysis of Avalanche Consensus. CoRR abs/2401.02811 (2024) - [i48]Christian Cachin, David Lehnherr, Thomas Studer:
Synergistic Knowledge. CoRR abs/2403.18646 (2024) - [i47]Jayamine Alupotha, Mathieu Gestin, Christian Cachin:
Nopenena Untraceable Payments: Defeating Graph Analysis with Small Decoy Sets. IACR Cryptol. ePrint Arch. 2024: 903 (2024) - 2023
- [i46]Orestis Alpos, Ignacio Amores-Sesar, Christian Cachin, Michelle Yeo:
Eating sandwiches: Modular and lightweight elimination of transaction reordering attacks. CoRR abs/2307.02954 (2023) - [i45]Ignacio Amores-Sesar, Christian Cachin:
We will DAG you. CoRR abs/2311.03092 (2023) - [i44]Christian Cachin, Jovana Micic:
Quick Order Fairness: Implementation and Evaluation. CoRR abs/2312.13107 (2023) - [i43]Orestis Alpos, Christian Cachin, Simon Holmgaard Kamp, Jesper Buus Nielsen:
Practical Large-Scale Proof-of-Stake Asynchronous Total-Order Broadcast. IACR Cryptol. ePrint Arch. 2023: 1103 (2023) - [i42]Zhipeng Wang, Marko Cirkovic, Duc Viet Le, William J. Knottenbelt, Christian Cachin:
Pay Less for Your Privacy: Towards Cost-Effective On-Chain Mixers. IACR Cryptol. ePrint Arch. 2023: 1222 (2023) - [i41]François-Xavier Wicht, Zhipeng Wang, Duc Viet Le, Christian Cachin:
A Transaction-Level Model for Blockchain Privacy. IACR Cryptol. ePrint Arch. 2023: 1902 (2023) - 2022
- [i40]Ignacio Amores-Sesar, Christian Cachin, Enrico Tedeschi:
When is Spring coming? A Security Analysis of Avalanche Consensus. CoRR abs/2210.03423 (2022) - [i39]Christian Cachin, Giuliano Losa, Luca Zanolini:
Quorum Systems in Permissionless Network. CoRR abs/2211.05630 (2022) - [i38]Sarah Azouvi, Christian Cachin, Duc V. Le, Marko Vukolic, Luca Zanolini:
Modeling Resources in Permissionless Longest-chain Total-order Broadcast. CoRR abs/2211.12050 (2022) - [i37]Orestis Alpos, Zhipeng Wang, Alireza Kavousi, Sze Yiu Chau, Duc Viet Le, Christian Cachin:
DSKE: Digital Signature with Key Extraction. IACR Cryptol. ePrint Arch. 2022: 1753 (2022) - [i36]Orestis Alpos, Christian Cachin:
Do Not Trust in Numbers: Practical Distributed Cryptography With General Trust. IACR Cryptol. ePrint Arch. 2022: 1767 (2022) - 2021
- [i35]Orestis Alpos, Christian Cachin, Giorgia Azzurra Marson, Luca Zanolini:
On the Synchronization Power of Token Smart Contracts. CoRR abs/2101.05543 (2021) - [i34]Orestis Alpos, Christian Cachin, Luca Zanolini:
How to Trust Strangers: Composition of Byzantine Quorum Systems. CoRR abs/2107.11331 (2021) - [i33]Ignacio Amores-Sesar, Christian Cachin, Anna Parker:
Generalizing Weighted Trees: A Bridge from Bitcoin to GHOST. CoRR abs/2108.13502 (2021) - [i32]Christian Cachin, Jovana Micic, Nathalie Steinhauer:
Quick Order Fairness. CoRR abs/2112.06615 (2021) - 2020
- [i31]Christian Cachin, Luca Zanolini:
Asymmetric Byzantine Consensus. CoRR abs/2005.08795 (2020) - [i30]Orestis Alpos, Christian Cachin:
Consensus Beyond Thresholds: Generalized Byzantine Quorums Made Live. CoRR abs/2006.04616 (2020) - [i29]Christina Müller, Marcus Brandenburger, Christian Cachin, Pascal Felber, Christian Göttel, Valerio Schiavoni:
TZ4Fabric: Executing Smart Contracts with ARM TrustZone. CoRR abs/2008.11601 (2020) - [i28]Ignacio Amores-Sesar, Christian Cachin, Jovana Micic:
Security Analysis of Ripple Consensus. CoRR abs/2011.14816 (2020) - 2019
- [i27]Christian Cachin, Daniel Collins, Tyler Crain, Vincent Gramoli:
Byzantine Fault Tolerant Vector Consensus with Anonymous Proposals. CoRR abs/1902.10010 (2019) - [i26]Christian Cachin, Björn Tackmann:
Asymmetric Distributed Trust. CoRR abs/1906.09314 (2019) - 2018
- [i25]Elli Androulaki, Artem Barger, Vita Bortnikov, Christian Cachin, Konstantinos Christidis, Angelo De Caro, David Enyeart, Christopher Ferris, Gennady Laventman, Yacov Manevich, Srinivasan Muralidharan, Chet Murthy, Binh Nguyen, Manish Sethi, Gari Singh, Keith Smith, Alessandro Sorniotti, Chrysoula Stathakopoulou, Marko Vukolic, Sharon Weed Cocco, Jason Yellick:
Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains. CoRR abs/1801.10228 (2018) - [i24]Marcus Brandenburger, Christian Cachin, Rüdiger Kapitza, Alessandro Sorniotti:
Blockchain and Trusted Computing: Problems, Pitfalls, and a Solution for Hyperledger Fabric. CoRR abs/1805.08541 (2018) - 2017
- [i23]Marcus Brandenburger, Christian Cachin, Matthias Lorenz, Rüdiger Kapitza:
Rollback and Forking Detection for Trusted Execution Environments using Lightweight Collective Memory. CoRR abs/1701.00981 (2017) - [i22]Christian Cachin, Marko Vukolic:
Blockchain Consensus Protocols in the Wild. CoRR abs/1707.01873 (2017) - [i21]Elli Androulaki, Christian Cachin, Angelo De Caro, Alessandro Sorniotti, Marko Vukolic:
Permissioned Blockchains and Hyperledger Fabric. ERCIM News 2017(110) (2017) - [i20]Christian Cachin, Jan Camenisch, Eduarda Freire-Stoegbuchner, Anja Lehmann:
Updatable Tokenization: Formal Definitions and Provably Secure Constructions. IACR Cryptol. ePrint Arch. 2017: 695 (2017) - [i19]Christian Cachin, Esha Ghosh, Dimitrios Papadopoulos, Björn Tackmann:
Stateful Multi-Client Verifiable Computation. IACR Cryptol. ePrint Arch. 2017: 901 (2017) - [i18]Christian Cachin, Angelo De Caro, Pedro Moreno-Sanchez, Björn Tackmann, Marko Vukolic:
The Transaction Graph for Modeling Blockchain Semantics. IACR Cryptol. ePrint Arch. 2017: 1070 (2017) - 2016
- [i17]Christian Cachin, Simon Schubert, Marko Vukolic:
Non-determinism in Byzantine Fault-Tolerant Replication. CoRR abs/1603.07351 (2016) - 2015
- [i16]Marcus Brandenburger, Christian Cachin, Nikola Knezevic:
Don't Trust the Cloud, Verify: Integrity and Consistency for Cloud Object Stores. CoRR abs/1502.04496 (2015) - [i15]Shengyun Liu, Christian Cachin, Vivien Quéma, Marko Vukolic:
XFT: Practical fault tolerance beyond crashes. CoRR abs/1502.05831 (2015) - 2014
- [i14]Elli Androulaki, Christian Cachin, Dan Dobre, Marko Vukolic:
Erasure-Coded Byzantine Storage with Separate Metadata. CoRR abs/1402.4958 (2014) - 2013
- [i13]Christian Cachin, Olga Ohrimenko:
On Verifying the Consistency of Remote Untrusted Services. CoRR abs/1302.4808 (2013) - [i12]Christian Cachin, Dan Dobre, Marko Vukolic:
BFT Storage with 2t+1 Data Replicas. CoRR abs/1305.4868 (2013) - [i11]Christian Cachin, Kristiyan Haralambiev, Hsu-Chun Hsiao, Alessandro Sorniotti:
Policy-based Secure Deletion. IACR Cryptol. ePrint Arch. 2013: 152 (2013) - 2008
- [i10]Christian Cachin, Idit Keidar, Alexander Shraer:
Fork Sequential Consistency is Blocking. CoRR abs/0805.2068 (2008) - 2006
- [i9]Christian Cachin, Felix C. Freiling, Jaap-Henk Hoepman:
06371 Executive Summary -- From Security to Dependability. From Security to Dependability 2006 - [i8]Christian Cachin, Felix C. Freiling, Jaap-Henk Hoepman:
06371 Abstracts Collection -- From Security to Dependability. From Security to Dependability 2006 - [i7]HariGovind V. Ramasamy, Christian Cachin:
Parsimonious Asynchronous Byzantine-Fault-Tolerant Atomic Broadcast. IACR Cryptol. ePrint Arch. 2006: 82 (2006) - 2005
- [i6]Michael Backes, Christian Cachin, Alina Oprea:
Secure Key-Updating for Lazy Revocation. IACR Cryptol. ePrint Arch. 2005: 334 (2005) - 2003
- [i5]Michael Backes, Christian Cachin:
Public-Key Steganography with Active Attacks. IACR Cryptol. ePrint Arch. 2003: 231 (2003) - 2002
- [i4]Christian Cachin, Klaus Kursawe, Anna Lysyanskaya, Reto Strobl:
Asynchronous Verifiable Secret Sharing and Proactive Cryptosystems. IACR Cryptol. ePrint Arch. 2002: 134 (2002) - 2001
- [i3]Christian Cachin, Klaus Kursawe, Frank Petzold, Victor Shoup:
Secure and Efficient Asynchronous Broadcast Protocols. IACR Cryptol. ePrint Arch. 2001: 6 (2001) - 2000
- [i2]Christian Cachin:
An Information-Theoretic Model for Steganography. IACR Cryptol. ePrint Arch. 2000: 28 (2000) - [i1]Christian Cachin, Klaus Kursawe, Victor Shoup:
Random Oracles in Constantinople: Practical Asynchronous Byzantine Agreement using Cryptography. IACR Cryptol. ePrint Arch. 2000: 34 (2000)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint