default search action
Marc Fischlin
Person information
- affiliation: Darmstadt University of Technology, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j14]Marc Fischlin, Felix Günther, Christian Janson:
Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3. J. Cryptol. 37(2): 9 (2024) - [j13]Sebastian Linsner, Kilian Demuth, Marc Fischlin, Christian Reuter:
Decision-based Data Distribution (D³): Enabling Users to Minimize Data Propagation in Privacy-sensitive Scenarios. Proc. Priv. Enhancing Technol. 2024(4): 185-208 (2024) - [c115]Shan Chen, Marc Fischlin:
Integrating Causality in Messaging Channels. EUROCRYPT (3) 2024: 251-282 - [i70]Shan Chen, Marc Fischlin:
Integrating Causality in Messaging Channels. IACR Cryptol. ePrint Arch. 2024: 362 (2024) - [i69]Samed Düzlü, Rune Fiedler, Marc Fischlin:
BUFFing FALCON without Increasing the Signature Size. IACR Cryptol. ePrint Arch. 2024: 710 (2024) - [i68]Marc Fischlin, Olga Sanina:
Fake It till You Make It: Enhancing Security of Bluetooth Secure Connections via Deferrable Authentication. IACR Cryptol. ePrint Arch. 2024: 874 (2024) - 2023
- [c114]Jean Paul Degabriele, Marc Fischlin, Jérôme Govinden:
The Indifferentiability of the Duplex and Its Practical Applications. ASIACRYPT (8) 2023: 237-269 - [c113]Marc Fischlin:
Stealth Key Exchange and Confined Access to the Record Protocol Data in TLS 1.3. CCS 2023: 2901-2914 - [c112]Marc Fischlin, Felix Günther:
Verifiable Verification in Cryptographic Protocols. CCS 2023: 3239-3253 - [c111]Marc Fischlin, Jonas von der Heyden, Marian Margraf, Frank Morgner, Andreas Wallner, Holger Bock:
Post-quantum Security for the Extended Access Control Protocol. SSR 2023: 22-52 - [c110]Marc Fischlin, Felix Rohrbach:
Searching for ELFs in the Cryptographic Forest. TCC (3) 2023: 207-236 - [i67]Georgios M. Nikolopoulos, Marc Fischlin:
Quantum key distribution with post-processing driven by physical unclonable functions. CoRR abs/2302.07623 (2023) - [i66]Marc Fischlin, Jonas von der Heyden, Marian Margraf, Frank Morgner, Andreas Wallner, Holger Bock:
Post-Quantum Security for the Extended Access Control Protocol. IACR Cryptol. ePrint Arch. 2023: 352 (2023) - [i65]Marc Fischlin:
Stealth Key Exchange and Confined Access to the Record Protocol Data in TLS 1.3. IACR Cryptol. ePrint Arch. 2023: 651 (2023) - [i64]Marc Fischlin, Felix Günther:
Verifiable Verification in Cryptographic Protocols. IACR Cryptol. ePrint Arch. 2023: 1214 (2023) - [i63]Jacqueline Brendel, Sebastian Clermont, Marc Fischlin:
Post-Quantum Asynchronous Remote Key Generation for FIDO2 Account Recovery. IACR Cryptol. ePrint Arch. 2023: 1275 (2023) - [i62]Marc Fischlin, Felix Rohrbach:
Searching for ELFs in the Cryptographic Forest. IACR Cryptol. ePrint Arch. 2023: 1403 (2023) - 2022
- [c109]Marc Fischlin, Felix Rohrbach, Tobias Schmalz:
A Random Oracle for All of Us. AFRICACRYPT 2022: 469-489 - [c108]Barbara Jiabao Benedikt, Marc Fischlin, Moritz Huppert:
Nostradamus Goes Quantum. ASIACRYPT (3) 2022: 583-613 - [i61]Marc Fischlin, Felix Rohrbach, Tobias Schmalz:
A Random Oracle for All of Us. IACR Cryptol. ePrint Arch. 2022: 906 (2022) - [i60]Barbara Jiabao Benedikt, Marc Fischlin, Moritz Huppert:
Nostradamus goes Quantum. IACR Cryptol. ePrint Arch. 2022: 1213 (2022) - 2021
- [b2]Arno Mittelbach, Marc Fischlin:
The Theory of Hash Functions and Random Oracles - An Approach to Modern Cryptography. Information Security and Cryptography, Springer 2021, ISBN 978-3-030-63286-1, pp. 1-778 - [j12]Benjamin Dowling, Marc Fischlin, Felix Günther, Douglas Stebila:
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol. J. Cryptol. 34(4): 37 (2021) - [c107]Marc Fischlin, Olga Sanina:
Cryptographic Analysis of the Bluetooth Secure Connection Protocol Suite. ASIACRYPT (2) 2021: 696-725 - [c106]Marc Fischlin, Sven-André Müller, Jean-Pierre Münch, Lars Porth:
Multipath TLS 1.3. ESORICS (2) 2021: 86-105 - [c105]Marc Fischlin, Felix Rohrbach:
Single-to-Multi-theorem Transformations for Non-interactive Statistical Zero-Knowledge. Public Key Cryptography (2) 2021: 205-234 - [c104]Cas Cremers, Samed Düzlü, Rune Fiedler, Marc Fischlin, Christian Janson:
BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures. SP 2021: 1696-1714 - [i59]Marc Fischlin, Arno Mittelbach:
An Overview of the Hybrid Argument. IACR Cryptol. ePrint Arch. 2021: 88 (2021) - [i58]Marc Fischlin, Olga Sanina:
Cryptographic Analysis of the Bluetooth Secure Connection Protocol Suite. IACR Cryptol. ePrint Arch. 2021: 1597 (2021) - 2020
- [j11]Georgios M. Nikolopoulos, Marc Fischlin:
Information-Theoretically Secure Data Origin Authentication with Quantum and Classical Resources. Cryptogr. 4(4): 31 (2020) - [c103]Estuardo Alpirez Bock, Chris Brzuska, Marc Fischlin, Christian Janson, Wil Michiels:
Security Reductions for White-Box Key-Storage in Mobile Payments. ASIACRYPT (1) 2020: 221-252 - [c102]Cyprien Delpech de Saint Guilhem, Marc Fischlin, Bogdan Warinschi:
Authentication in Key-Exchange: Definitions, Relations and Composition. CSF 2020: 288-303 - [c101]Marc Fischlin, Felix Günther:
Modeling Memory Faults in Signature and Authenticated Encryption Schemes. CT-RSA 2020: 56-84 - [c100]Marc Fischlin, Patrick Harasser, Christian Janson:
Signatures from Sequential-OR Proofs. EUROCRYPT (3) 2020: 212-244 - [c99]Marc Fischlin, Felix Günther, Philipp Muth:
Information-Theoretic Security of Cryptographic Channels. ICICS 2020: 295-311 - [c98]Jacqueline Brendel, Marc Fischlin, Felix Günther, Christian Janson, Douglas Stebila:
Towards Post-Quantum Security for Signal's X3DH Handshake. SAC 2020: 404-430 - [c97]Lukas Brandstetter, Marc Fischlin, Robin Leander Schröder, Michael Yonli:
On the Memory Fault Resilience of TLS 1.3. SSR 2020: 1-22 - [i57]Georgios M. Nikolopoulos, Marc Fischlin:
Information-theoretically secure data origin authentication with quantum and classical resources. CoRR abs/2011.06849 (2020) - [i56]Marc Fischlin, Patrick Harasser, Christian Janson:
Signatures from Sequential-OR Proofs. IACR Cryptol. ePrint Arch. 2020: 271 (2020) - [i55]Marc Fischlin, Felix Günther, Christian Janson:
Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3. IACR Cryptol. ePrint Arch. 2020: 718 (2020) - [i54]Benjamin Dowling, Marc Fischlin, Felix Günther, Douglas Stebila:
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol. IACR Cryptol. ePrint Arch. 2020: 1044 (2020) - [i53]Marc Fischlin, Felix Rohrbach:
Single-to-Multi-Theorem Transformations for Non-Interactive Statistical Zero-Knowledge. IACR Cryptol. ePrint Arch. 2020: 1204 (2020) - [i52]Cas Cremers, Samed Düzlü, Rune Fiedler, Marc Fischlin, Christian Janson:
BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures. IACR Cryptol. ePrint Arch. 2020: 1525 (2020) - [i51]Marc Fischlin, Felix Günther, Philipp Muth:
Information-Theoretic Security of Cryptographic Channels. IACR Cryptol. ePrint Arch. 2020: 1539 (2020)
2010 – 2019
- 2019
- [j10]Lukas Fladung, Georgios M. Nikolopoulos, Gernot Alber, Marc Fischlin:
Intercept-Resend Emulation Attacks against a Continuous-Variable Quantum Authentication Protocol with Physical Unclonable Keys. Cryptogr. 3(4): 25 (2019) - [c96]Jacqueline Brendel, Marc Fischlin, Felix Günther:
Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids. ESORICS (2) 2019: 521-541 - [c95]Marc Fischlin, Helene Haagh:
How to Sign with White-Boxed AES. LATINCRYPT 2019: 259-279 - [c94]Nina Bindel, Jacqueline Brendel, Marc Fischlin, Brian Goncalves, Douglas Stebila:
Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange. PQCrypto 2019: 206-226 - [i50]Lukas Fladung, Georgios M. Nikolopoulos, Gernot Alber, Marc Fischlin:
Intercept-Resend Emulation Attacks Against a Continuous-Variable Quantum Authentication Protocol with Physical Unclonable Keys. CoRR abs/1910.11579 (2019) - [i49]Estuardo Alpirez Bock, Chris Brzuska, Marc Fischlin, Christian Janson, Wil Michiels:
Security Reductions for White-Box Key-Storage in Mobile Payments. IACR Cryptol. ePrint Arch. 2019: 1014 (2019) - [i48]Marc Fischlin, Felix Günther:
Modeling Memory Faults in Signature and Encryption Schemes. IACR Cryptol. ePrint Arch. 2019: 1053 (2019) - [i47]Cyprien Delpech de Saint Guilhem, Marc Fischlin, Bogdan Warinschi:
Authentication in Key-Exchange: Definitions, Relations and Composition. IACR Cryptol. ePrint Arch. 2019: 1203 (2019) - [i46]Jacqueline Brendel, Marc Fischlin, Felix Günther, Christian Janson, Douglas Stebila:
Challenges in Proving Post-Quantum Key Exchanges Based on Key Encapsulation Mechanisms. IACR Cryptol. ePrint Arch. 2019: 1356 (2019) - 2018
- [c93]Marc Fischlin, Patrick Harasser:
Invisible Sanitizable Signatures and Public-Key Encryption are Equivalent. ACNS 2018: 202-220 - [c92]Jean Paul Degabriele, Marc Fischlin:
Simulatable Channels: Extended Security that is Universally Composable and Easier to Prove. ASIACRYPT (3) 2018: 519-550 - [c91]Marc Fischlin, Sogol Mazaheri:
Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks. CSF 2018: 76-90 - [c90]Marc Fischlin, Christian Janson, Sogol Mazaheri:
Backdoored Hash Functions: Immunizing HMAC and HKDF. CSF 2018: 105-118 - [i45]Marc Fischlin, Patrick Harasser:
Invisible Sanitizable Signatures and Public-Key Encryption are Equivalent. IACR Cryptol. ePrint Arch. 2018: 337 (2018) - [i44]Marc Fischlin, Christian Janson, Sogol Mazaheri:
Backdoored Hash Functions: Immunizing HMAC and HKDF. IACR Cryptol. ePrint Arch. 2018: 362 (2018) - [i43]Jean Paul Degabriele, Marc Fischlin:
Simulatable Channels: Extended Security that is Universally Composable and Easier to Prove. IACR Cryptol. ePrint Arch. 2018: 844 (2018) - [i42]Nina Bindel, Jacqueline Brendel, Marc Fischlin, Brian Goncalves, Douglas Stebila:
Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange. IACR Cryptol. ePrint Arch. 2018: 903 (2018) - 2017
- [c89]Andreas Erwig, Marc Fischlin, Martin Hald, Dominik Helm, Robert Kiel, Florian Kübler, Michael Kümmerlin, Jakob Laenge, Felix Rohrbach:
Redactable Graph Hashing, Revisited - (Extended Abstract). ACISP (2) 2017: 398-405 - [c88]Jacqueline Brendel, Marc Fischlin, Felix Günther, Christian Janson:
PRF-ODH: Relations, Instantiations, and Impossibility Results. CRYPTO (3) 2017: 651-681 - [c87]Jacqueline Brendel, Marc Fischlin:
Zero Round-Trip Time for the Extended Access Control Protocol. ESORICS (1) 2017: 297-314 - [c86]Marc Fischlin, Felix Günther:
Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates. EuroS&P 2017: 60-75 - [i41]Jacqueline Brendel, Marc Fischlin:
Zero Round-Trip Time for the Extended Access Control Protocol. IACR Cryptol. ePrint Arch. 2017: 60 (2017) - [i40]Marc Fischlin, Felix Günther:
Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates. IACR Cryptol. ePrint Arch. 2017: 82 (2017) - [i39]Jacqueline Brendel, Marc Fischlin, Felix Günther, Christian Janson:
PRF-ODH: Relations, Instantiations, and Impossibility Results. IACR Cryptol. ePrint Arch. 2017: 517 (2017) - [i38]Marc Fischlin, Sogol Mazaheri:
Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks. IACR Cryptol. ePrint Arch. 2017: 984 (2017) - [i37]Marc Fischlin, Felix Günther, Giorgia Azzurra Marson, Kenneth G. Paterson:
Data Is a Stream: Security of Stream-Based Channels. IACR Cryptol. ePrint Arch. 2017: 1191 (2017) - [i36]Jacqueline Brendel, Marc Fischlin, Felix Günther:
Breakdown Resilience of Key Exchange Protocols and the Cases of NewHope and TLS 1.3. IACR Cryptol. ePrint Arch. 2017: 1252 (2017) - 2016
- [j9]David Bernhard, Marc Fischlin, Bogdan Warinschi:
Adaptive proofs of knowledge in the random oracle model. IET Inf. Secur. 10(6): 319-331 (2016) - [j8]Jean Paul Degabriele, Victoria Fehr, Marc Fischlin, Tommaso Gagliardoni, Felix Günther, Giorgia Azzurra Marson, Arno Mittelbach, Kenneth G. Paterson:
Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol. Int. J. Inf. Sec. 15(6): 637-657 (2016) - [c85]Marc Fischlin, Amir Herzberg, Hod Bin Noon, Haya Schulmann:
Obfuscation Combiners. CRYPTO (2) 2016: 521-550 - [c84]David Bernhard, Marc Fischlin, Bogdan Warinschi:
On the Hardness of Proving CCA-Security of Signed ElGamal. Public Key Cryptography (1) 2016: 47-69 - [c83]Frank Morgner, Paul Bastian, Marc Fischlin:
Attribute-Based Access Control Architectures with the eIDAS Protocols. SSR 2016: 205-226 - [c82]Marc Fischlin, Felix Günther, Benedikt Schmidt, Bogdan Warinschi:
Key Confirmation in Key Exchange: A Formal Treatment and Implications for TLS 1.3. IEEE Symposium on Security and Privacy 2016: 452-469 - [c81]Frank Morgner, Paul Bastian, Marc Fischlin:
Securing Transactions with the eIDAS Protocols. WISTP 2016: 3-18 - [e7]Marc Fischlin, Jean-Sébastien Coron:
Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I. Lecture Notes in Computer Science 9665, Springer 2016, ISBN 978-3-662-49889-7 [contents] - [e6]Marc Fischlin, Jean-Sébastien Coron:
Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II. Lecture Notes in Computer Science 9666, Springer 2016, ISBN 978-3-662-49895-8 [contents] - [i35]Marc Fischlin, Alexander May, David Pointcheval, Tal Rabin:
Public-Key Cryptography (Dagstuhl Seminar 16371). Dagstuhl Reports 6(9): 46-58 (2016) - [i34]Benjamin Dowling, Marc Fischlin, Felix Günther, Douglas Stebila:
A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol. IACR Cryptol. ePrint Arch. 2016: 81 (2016) - [i33]Marc Fischlin, Amir Herzberg, Hod Bin Noon, Haya Schulmann:
Obfuscation Combiners. IACR Cryptol. ePrint Arch. 2016: 289 (2016) - [i32]Marc Fischlin, Anja Lehmann, Krzysztof Pietrzak:
Robust Multi-Property Combiners for Hash Functions. IACR Cryptol. ePrint Arch. 2016: 723 (2016) - 2015
- [c80]Rolf Egert, Marc Fischlin, David Gens, Sven Jacob, Matthias Senker, Jörn Tillmanns:
Privately Computing Set-Union and Set-Intersection Cardinality via Bloom Filters. ACISP 2015: 413-430 - [c79]Benjamin Dowling, Marc Fischlin, Felix Günther, Douglas Stebila:
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates. CCS 2015: 1197-1210 - [c78]Marc Fischlin, Felix Günther, Giorgia Azzurra Marson, Kenneth G. Paterson:
Data Is a Stream: Security of Stream-Based Channels. CRYPTO (2) 2015: 545-564 - [c77]David Bernhard, Marc Fischlin, Bogdan Warinschi:
Adaptive Proofs of Knowledge in the Random Oracle Model. Public Key Cryptography 2015: 629-649 - [c76]Marc Fischlin, Sogol Mazaheri:
Notions of Deniable Message Authentication. WPES@CCS 2015: 55-64 - [e5]Elisabeth Oswald, Marc Fischlin:
Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I. Lecture Notes in Computer Science 9056, Springer 2015, ISBN 978-3-662-46799-2 [contents] - [e4]Elisabeth Oswald, Marc Fischlin:
Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II. Lecture Notes in Computer Science 9057, Springer 2015, ISBN 978-3-662-46802-9 [contents] - [i31]David Bernhard, Marc Fischlin, Bogdan Warinschi:
Adaptive Proofs of Knowledge in the Random Oracle Model. IACR Cryptol. ePrint Arch. 2015: 648 (2015) - [i30]David Bernhard, Marc Fischlin, Bogdan Warinschi:
On the Hardness of Proving CCA-security of Signed ElGamal. IACR Cryptol. ePrint Arch. 2015: 649 (2015) - [i29]Victoria Fehr, Marc Fischlin:
Sanitizable Signcryption: Sanitization over Encrypted Data (Full Version). IACR Cryptol. ePrint Arch. 2015: 765 (2015) - [i28]Benjamin Dowling, Marc Fischlin, Felix Günther, Douglas Stebila:
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates. IACR Cryptol. ePrint Arch. 2015: 914 (2015) - 2014
- [j7]Marc Fischlin:
Abstreitbarkeit bei eID-Lösungen. Datenschutz und Datensicherheit 38(7): 462-466 (2014) - [j6]Marc Fischlin, Anja Lehmann, Krzysztof Pietrzak:
Robust Multi-Property Combiners for Hash Functions. J. Cryptol. 27(3): 397-428 (2014) - [c75]Marc Fischlin, Felix Günther:
Multi-Stage Key Exchange and the Case of Google's QUIC Protocol. CCS 2014: 1193-1204 - [c74]Özgür Dagdelen, Marc Fischlin:
Intercepting tokens in cryptographic protocols: The empire strikes back in the clone wars. ISIT 2014: 1529-1533 - [c73]Jean Paul Degabriele, Victoria Fehr, Marc Fischlin, Tommaso Gagliardoni, Felix Günther, Giorgia Azzurra Marson, Arno Mittelbach, Kenneth G. Paterson:
Unpicking PLAID - A Cryptographic Analysis of an ISO-Standards-Track Authentication Protocol. SSR 2014: 1-25 - [i27]Jean Paul Degabriele, Victoria Fehr, Marc Fischlin, Tommaso Gagliardoni, Felix Günther, Giorgia Azzurra Marson, Arno Mittelbach, Kenneth G. Paterson:
Unpicking PLAID - A Cryptographic Analysis of an ISO-standards-track Authentication Protocol. IACR Cryptol. ePrint Arch. 2014: 728 (2014) - [i26]Michael Backes, Özgür Dagdelen, Marc Fischlin, Sebastian Gajek, Sebastian Meiser, Dominique Schröder:
Operational Signature Schemes. IACR Cryptol. ePrint Arch. 2014: 820 (2014) - 2013
- [j5]Christina Brzuska, Marc Fischlin, Nigel P. Smart, Bogdan Warinschi, Stephen C. Williams:
Less is more: relaxed yet composable security notions for key exchange. Int. J. Inf. Sec. 12(4): 267-297 (2013) - [c72]Björn Deiseroth, Victoria Fehr, Marc Fischlin, Manuel Maasz, Nils Fabian Reimers, Richard Stein:
Computing on Authenticated Data for Adjustable Predicates. ACNS 2013: 53-68 - [c71]Marc Fischlin, Cristina Onete:
Terrorism in Distance Bounding: Modeling Terrorist-Fraud Resistance. ACNS 2013: 414-431 - [c70]Özgür Dagdelen, Marc Fischlin, Tommaso Gagliardoni:
The Fiat-Shamir Transformation in a Quantum World. ASIACRYPT (2) 2013: 62-81 - [c69]Paul Baecher, Christina Brzuska, Marc Fischlin:
Notions of Black-Box Reductions, Revisited. ASIACRYPT (1) 2013: 296-315 - [c68]Özgür Dagdelen, Marc Fischlin, Tommaso Gagliardoni, Giorgia Azzurra Marson, Arno Mittelbach, Cristina Onete:
A Cryptographic Analysis of OPACITY - (Extended Abstract). ESORICS 2013: 345-362 - [c67]Paul Baecher, Pooya Farshim, Marc Fischlin, Martijn Stam:
Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions. EUROCRYPT 2013: 426-443 - [c66]Marc Fischlin, Nils Fleischhacker:
Limitations of the Meta-reduction Technique: The Case of Schnorr Signatures. EUROCRYPT 2013: 444-460 - [c65]Jens Bender, Marc Fischlin, Dennis Kügler:
The PACE|CA Protocol for Machine Readable Travel Documents. INTRUST 2013: 17-35 - [c64]Marc Fischlin, Cristina Onete:
Subtle kinks in distance-bounding: an analysis of prominent protocols. WISEC 2013: 195-206 - [e3]Marc Fischlin, Stefan Katzenbeisser:
Number Theory and Cryptography - Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday. Lecture Notes in Computer Science 8260, Springer 2013, ISBN 978-3-642-42000-9 [contents] - [i25]Özgür Dagdelen, Marc Fischlin, Tommaso Gagliardoni:
The Fiat-Shamir Transformation in a Quantum World. CoRR abs/1306.0315 (2013) - [i24]Paul Baecher, Christina Brzuska, Marc Fischlin:
Notions of Black-Box Reductions, Revisited. IACR Cryptol. ePrint Arch. 2013: 101 (2013) - [i23]Marc Fischlin, Nils Fleischhacker:
Limitations of the Meta-Reduction Technique: The Case of Schnorr Signatures. IACR Cryptol. ePrint Arch. 2013: 140 (2013) - [i22]Björn Deiseroth, Victoria Fehr, Marc Fischlin, Manuel Maasz, Nils Fabian Reimers, Richard Stein:
Computing on Authenticated Data for Adjustable Predicates. IACR Cryptol. ePrint Arch. 2013: 217 (2013) - [i21]Jens Bender, Özgür Dagdelen, Marc Fischlin, Dennis Kügler:
The PACE|AA Protocol for Machine Readable Travel Documents, and its Security. IACR Cryptol. ePrint Arch. 2013: 223 (2013) - [i20]Özgür Dagdelen, Marc Fischlin, Tommaso Gagliardoni, Giorgia Azzurra Marson, Arno Mittelbach, Cristina Onete:
A Cryptographic Analysis of OPACITY. IACR Cryptol. ePrint Arch. 2013: 234 (2013) - [i19]Özgür Dagdelen, Marc Fischlin, Tommaso Gagliardoni:
The Fiat-Shamir Transformation in a Quantum World. IACR Cryptol. ePrint Arch. 2013: 245 (2013) - [i18]Paul Baecher, Pooya Farshim, Marc Fischlin, Martijn Stam:
Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions. IACR Cryptol. ePrint Arch. 2013: 350 (2013) - 2012
- [j4]Marc Fischlin, Dominique Schröder:
Security of blind signatures under aborts and applications to adaptive oblivious transfer. J. Math. Cryptol. 5(2): 169-204 (2012) - [c63]Marc Fischlin:
Black-Box Reductions and Separations in Cryptography. AFRICACRYPT 2012: 413-422 - [c62]Jens Bender, Özgür Dagdelen, Marc Fischlin, Dennis Kügler:
The PACE|AA Protocol for Machine Readable Travel Documents, and Its Security. Financial Cryptography 2012: 344-358 - [c61]Jens Bender, Özgür Dagdelen, Marc Fischlin, Dennis Kügler:
Domain-Specific Pseudonymous Signatures for the German Identity Card. ISC 2012: 104-119 - [c60]