default search action
Björn Tackmann
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j5]Orestis Alpos, Christian Cachin, Björn Tackmann, Luca Zanolini:
Asymmetric distributed trust. Distributed Comput. 37(3): 247-277 (2024) - 2021
- [c32]Dmytro Bogatov, Angelo De Caro, Kaoutar Elkhiyaoui, Björn Tackmann:
Anonymous Transactions with Revocation and Auditing in Hyperledger Fabric. CANS 2021: 435-459 - 2020
- [j4]Sandro Coretti, Yevgeniy Dodis, Ueli Maurer, Björn Tackmann, Daniele Venturi:
Non-malleable Encryption: Simpler, Shorter, Stronger. J. Cryptol. 33(4): 1984-2033 (2020) - [c31]Elli Androulaki, Jan Camenisch, Angelo De Caro, Maria Dubovitskaya, Kaoutar Elkhiyaoui, Björn Tackmann:
Privacy-preserving auditable token payments in a permissioned blockchain system. AFT 2020: 255-267 - [c30]Christian Badertscher, Ran Canetti, Julia Hesse, Björn Tackmann, Vassilis Zikas:
Universal Composition with Global Subroutines: Capturing Global Setup Within Plain UC. TCC (3) 2020: 1-30 - [i31]Christian Badertscher, Ran Canetti, Julia Hesse, Björn Tackmann, Vassilis Zikas:
Universal Composition with Global Subroutines: Capturing Global Setup within plain UC. IACR Cryptol. ePrint Arch. 2020: 1209 (2020)
2010 – 2019
- 2019
- [j3]Grégory Demay, Peter Gazi, Ueli Maurer, Björn Tackmann:
Per-session security: Password-based cryptography revisited. J. Comput. Secur. 27(1): 75-111 (2019) - [c29]Mihir Bellare, Ruth Ng, Björn Tackmann:
Nonces Are Noticed: AEAD Revisited. CRYPTO (1) 2019: 235-265 - [c28]Christian Cachin, Björn Tackmann:
Asymmetric Distributed Trust. OPODIS 2019: 7:1-7:16 - [c27]Christian Cachin, Björn Tackmann:
Brief Announcement: Asymmetric Distributed Trust. DISC 2019: 39:1-39:3 - [i30]Christian Cachin, Björn Tackmann:
Asymmetric Distributed Trust. CoRR abs/1906.09314 (2019) - [i29]Jan Camenisch, Manu Drijvers, Björn Tackmann:
Multi-Protocol UC and its Use for Building Modular and Efficient Protocols. IACR Cryptol. ePrint Arch. 2019: 65 (2019) - [i28]Mihir Bellare, Ruth Ng, Björn Tackmann:
Nonces are Noticed: AEAD Revisited. IACR Cryptol. ePrint Arch. 2019: 624 (2019) - [i27]Elli Androulaki, Jan Camenisch, Angelo De Caro, Maria Dubovitskaya, Kaoutar Elkhiyaoui, Björn Tackmann:
Privacy-preserving auditable token payments in a permissioned blockchain system. IACR Cryptol. ePrint Arch. 2019: 1058 (2019) - [i26]Dmytro Bogatov, Angelo De Caro, Kaoutar Elkhiyaoui, Björn Tackmann:
Anonymous Transactions with Revocation and Auditing in Hyperledger Fabric. IACR Cryptol. ePrint Arch. 2019: 1097 (2019) - 2018
- [j2]Christian Matt, Ueli Maurer, Christopher Portmann, Renato Renner, Björn Tackmann:
Toward an algebraic theory of systems. Theor. Comput. Sci. 747: 1-25 (2018) - [c26]Christian Cachin, Esha Ghosh, Dimitrios Papadopoulos, Björn Tackmann:
Stateful Multi-client Verifiable Computation. ACNS 2018: 637-656 - [c25]Sergiu Costea, Marios O. Choudary, Doru Gucea, Björn Tackmann, Costin Raiciu:
Secure Opportunistic Multipath Key Exchange. CCS 2018: 2077-2094 - [c24]Anja Lehmann, Björn Tackmann:
Updatable Encryption with Post-Compromise Security. EUROCRYPT (3) 2018: 685-716 - [c23]Christian Badertscher, Ueli Maurer, Björn Tackmann:
On Composable Security for Digital Signatures. Public Key Cryptography (1) 2018: 494-523 - [i25]Christian Badertscher, Ueli Maurer, Björn Tackmann:
On Composable Security for Digital Signatures. IACR Cryptol. ePrint Arch. 2018: 15 (2018) - [i24]Anja Lehmann, Björn Tackmann:
Updatable Encryption with Post-Compromise Security. IACR Cryptol. ePrint Arch. 2018: 118 (2018) - [i23]Sergiu Costea, Marios O. Choudary, Doru Gucea, Björn Tackmann, Costin Raiciu:
Secure Opportunistic Multipath Key Exchange. IACR Cryptol. ePrint Arch. 2018: 1124 (2018) - 2017
- [j1]Christopher Portmann, Christian Matt, Ueli Maurer, Renato Renner, Björn Tackmann:
Causal Boxes: Quantum Information-Processing Systems Closed Under Composition. IEEE Trans. Inf. Theory 63(5): 3277-3305 (2017) - [c22]Grégory Demay, Peter Gazi, Ueli Maurer, Björn Tackmann:
Per-Session Security: Password-Based Cryptography Revisited. ESORICS (1) 2017: 408-426 - [c21]Björn Tackmann:
Secure Event Tickets on a Blockchain. DPM/CBT@ESORICS 2017: 437-444 - [c20]Joël Alwen, Björn Tackmann:
Moderately Hard Functions: Definition, Instantiations, and Applications. TCC (1) 2017: 493-526 - [i22]Christian Cachin, Esha Ghosh, Dimitrios Papadopoulos, Björn Tackmann:
Stateful Multi-Client Verifiable Computation. IACR Cryptol. ePrint Arch. 2017: 901 (2017) - [i21]Joël Alwen, Björn Tackmann:
Moderately Hard Functions: Definition, Instantiations, and Applications. IACR Cryptol. ePrint Arch. 2017: 945 (2017) - [i20]Christian Cachin, Angelo De Caro, Pedro Moreno-Sanchez, Björn Tackmann, Marko Vukolic:
The Transaction Graph for Modeling Blockchain Semantics. IACR Cryptol. ePrint Arch. 2017: 1070 (2017) - 2016
- [c19]Mihir Bellare, Björn Tackmann:
The Multi-user Security of Authenticated Encryption: AES-GCM in TLS 1.3. CRYPTO (1) 2016: 247-276 - [c18]Mihir Bellare, Björn Tackmann:
Nonce-Based Cryptography: Retaining Security When Randomness Fails. EUROCRYPT (1) 2016: 729-757 - [c17]Sandro Coretti, Yevgeniy Dodis, Björn Tackmann, Daniele Venturi:
Non-Malleable Encryption: Simpler, Shorter, Stronger. TCC (A1) 2016: 306-335 - [i19]Christian Matt, Ueli Maurer, Christopher Portmann, Renato Renner, Björn Tackmann:
Toward an Algebraic Theory of Systems. CoRR abs/1609.04293 (2016) - [i18]Grégory Demay, Peter Gazi, Ueli Maurer, Björn Tackmann:
Per-Session Security: Password-Based Cryptography Revisited. IACR Cryptol. ePrint Arch. 2016: 166 (2016) - [i17]Mihir Bellare, Björn Tackmann:
Nonce-Based Cryptography: Retaining Security when Randomness Fails. IACR Cryptol. ePrint Arch. 2016: 290 (2016) - [i16]Mihir Bellare, Björn Tackmann:
The Multi-User Security of Authenticated Encryption: AES-GCM in TLS 1.3. IACR Cryptol. ePrint Arch. 2016: 564 (2016) - 2015
- [c16]Grégory Demay, Peter Gazi, Ueli Maurer, Björn Tackmann:
Query-Complexity Amplification for Random Oracles. ICITS 2015: 159-180 - [c15]Christian Badertscher, Christian Matt, Ueli Maurer, Phillip Rogaway, Björn Tackmann:
Robust Authenticated Encryption and the Limits of Symmetric Cryptography. IMACC 2015: 112-129 - [c14]Markulf Kohlweiss, Ueli Maurer, Cristina Onete, Björn Tackmann, Daniele Venturi:
(De-)Constructing TLS 1.3. INDOCRYPT 2015: 85-102 - [c13]Juan A. Garay, Jonathan Katz, Björn Tackmann, Vassilis Zikas:
How Fair is Your Protocol?: A Utility-based Approach to Protocol Optimality. PODC 2015: 281-290 - [c12]Christian Badertscher, Christian Matt, Ueli Maurer, Phillip Rogaway, Björn Tackmann:
Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer. ProvSec 2015: 85-104 - [c11]Sandro Coretti, Ueli Maurer, Björn Tackmann, Daniele Venturi:
From Single-Bit to Multi-bit Public-Key Encryption via Non-malleable Codes. TCC (1) 2015: 532-560 - [c10]Juan A. Garay, Björn Tackmann, Vassilis Zikas:
Fair Distributed Computation of Reactive Functions. DISC 2015: 497-512 - [i15]Christopher Portmann, Christian Matt, Ueli Maurer, Renato Renner, Björn Tackmann:
Causal Boxes: Quantum Information-Processing Systems Closed under Composition. CoRR abs/1512.02240 (2015) - [i14]Juan A. Garay, Jonathan Katz, Björn Tackmann, Vassilis Zikas:
How Fair is Your Protocol? A Utility-based Approach to Protocol Optimality. IACR Cryptol. ePrint Arch. 2015: 187 (2015) - [i13]Grégory Demay, Peter Gazi, Ueli Maurer, Björn Tackmann:
Query-Complexity Amplification for Random Oracles. IACR Cryptol. ePrint Arch. 2015: 315 (2015) - [i12]Christian Badertscher, Christian Matt, Ueli Maurer, Phillip Rogaway, Björn Tackmann:
Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer. IACR Cryptol. ePrint Arch. 2015: 394 (2015) - [i11]Sandro Coretti, Yevgeniy Dodis, Björn Tackmann, Daniele Venturi:
Non-Malleable Encryption: Simpler, Shorter, Stronger. IACR Cryptol. ePrint Arch. 2015: 772 (2015) - [i10]Juan A. Garay, Björn Tackmann, Vassilis Zikas:
Fair Distributed Computation of Reactive Functions. IACR Cryptol. ePrint Arch. 2015: 807 (2015) - [i9]Christian Badertscher, Christian Matt, Ueli Maurer, Phillip Rogaway, Björn Tackmann:
Robust Authenticated Encryption and the Limits of Symmetric Cryptography. IACR Cryptol. ePrint Arch. 2015: 893 (2015) - 2014
- [c9]Grégory Demay, Peter Gazi, Ueli Maurer, Björn Tackmann:
Optimality of non-adaptive strategies: The case of parallel games. ISIT 2014: 1707-1711 - [i8]Markulf Kohlweiss, Ueli Maurer, Cristina Onete, Björn Tackmann, Daniele Venturi:
(De-)Constructing TLS. IACR Cryptol. ePrint Arch. 2014: 20 (2014) - [i7]Grégory Demay, Peter Gazi, Ueli Maurer, Björn Tackmann:
Optimality of Non-Adaptive Strategies: The Case of Parallel Games. IACR Cryptol. ePrint Arch. 2014: 299 (2014) - [i6]Sandro Coretti, Ueli Maurer, Björn Tackmann, Daniele Venturi:
From Single-Bit to Multi-Bit Public-Key Encryption via Non-Malleable Codes. IACR Cryptol. ePrint Arch. 2014: 324 (2014) - 2013
- [c8]Sandro Coretti, Ueli Maurer, Björn Tackmann:
Constructing Confidential Channels from Authenticated Channels - Public-Key Encryption Revisited. ASIACRYPT (1) 2013: 134-153 - [c7]Sandro Coretti, Ueli Maurer, Björn Tackmann:
A Constructive Perspective on Key Encapsulation. Number Theory and Cryptography 2013: 226-239 - [c6]Juan A. Garay, Jonathan Katz, Ueli Maurer, Björn Tackmann, Vassilis Zikas:
Rational Protocol Design: Cryptography against Incentive-Driven Adversaries. FOCS 2013: 648-657 - [c5]Markulf Kohlweiss, Ueli Maurer, Cristina Onete, Björn Tackmann, Daniele Venturi:
Anonymity-Preserving Public-Key Encryption: A Constructive Approach. Privacy Enhancing Technologies 2013: 19-39 - [c4]Jonathan Katz, Ueli Maurer, Björn Tackmann, Vassilis Zikas:
Universally Composable Synchronous Computation. TCC 2013: 477-498 - [i5]Markulf Kohlweiss, Ueli Maurer, Cristina Onete, Björn Tackmann, Daniele Venturi:
Anonymity-preserving Public-Key Encryption: A Constructive Approach. IACR Cryptol. ePrint Arch. 2013: 238 (2013) - [i4]Juan A. Garay, Jonathan Katz, Ueli Maurer, Björn Tackmann, Vassilis Zikas:
Rational Protocol Design: Cryptography Against Incentive-driven Adversaries. IACR Cryptol. ePrint Arch. 2013: 496 (2013) - [i3]Ueli Maurer, Björn Tackmann, Sandro Coretti:
Key Exchange with Unilateral Authentication: Composable Security Definition and Modular Protocol Design. IACR Cryptol. ePrint Arch. 2013: 555 (2013) - [i2]Sandro Coretti, Ueli Maurer, Björn Tackmann:
Constructing Confidential Channels from Authenticated Channels - Public-Key Encryption Revisited. IACR Cryptol. ePrint Arch. 2013: 719 (2013) - 2012
- [c3]Ueli Maurer, Björn Tackmann:
Synchrony amplification. ISIT 2012: 1583-1587 - [c2]Ueli Maurer, Andreas Rüedlinger, Björn Tackmann:
Confidentiality and Integrity: A Constructive Perspective. TCC 2012: 209-229 - 2011
- [i1]Jonathan Katz, Ueli Maurer, Björn Tackmann, Vassilis Zikas:
Universally Composable Synchronous Computation. IACR Cryptol. ePrint Arch. 2011: 310 (2011) - 2010
- [c1]Ueli Maurer, Björn Tackmann:
On the soundness of authenticate-then-encrypt: formalizing the malleability of symmetric encryption. CCS 2010: 505-515
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint