default search action
Ralf Küsters
Person information
- affiliation: University of Stuttgart, Germany
- affiliation (former): University of Trier, Department of Computer Science, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j20]Mayar Elfares, Pascal Reisert, Zhiming Hu, Wenwu Tang, Ralf Küsters, Andreas Bulling:
PrivatEyes: Appearance-based Gaze Estimation Using Federated Secure Multi-Party Computation. Proc. ACM Hum. Comput. Interact. 8(ETRA): 1-23 (2024) - [j19]Sebastian Hasler, Pascal Reisert, Marc Rivinius, Ralf Küsters:
Multipars: Reduced-Communication MPC over Z2k. Proc. Priv. Enhancing Technol. 2024(2): 5-28 (2024) - [c92]Mike Graf, Ralf Küsters, Daniel Rausch, Simon Egger, Marvin Bechtold, Marcel Flinspach:
Accountable Bulletin Boards: Definition and Provably Secure Implementation. CSF 2024: 201-216 - [c91]Pedram Hosseyni, Ralf Küsters, Tim Würtele:
Formal Security Analysis of the OpenID FAPI 2.0: Accompanying a Standardization Process. CSF 2024: 589-604 - [c90]Nicolas Huber, Ralf Küsters, Julian Liedtke, Daniel Rausch:
ZK-SNARKs for Ballot Validity: A Feasibility Study. E-Vote-ID 2024: 107-123 - [i62]Mayar Elfares, Pascal Reisert, Zhiming Hu, Wenwu Tang, Ralf Küsters, Andreas Bulling:
PrivatEyes: Appearance-based Gaze Estimation Using Federated Secure Multi-Party Computation. CoRR abs/2402.18970 (2024) - [i61]Pedram Hosseyni, Ralf Küsters, Tim Würtele:
Formal Security Analysis of the OpenID FAPI 2.0: Accompanying a Standardization Process. IACR Cryptol. ePrint Arch. 2024: 78 (2024) - [i60]Pascal Reisert, Marc Rivinius, Toomas Krips, Sebastian Hasler, Ralf Küsters:
Actively Secure Polynomial Evaluation from Shared Polynomial Encodings. IACR Cryptol. ePrint Arch. 2024: 1435 (2024) - [i59]Pedram Hosseyni, Ralf Küsters, Tim Würtele:
Formal Security Analysis of the OpenID FAPI 2.0 Family of Protocols: Accompanying a Standardization Process. IACR Cryptol. ePrint Arch. 2024: 1540 (2024) - 2023
- [j18]Marc Rivinius, Pascal Reisert, Sebastian Hasler, Ralf Küsters:
Convolutions in Overdrive: Maliciously Secure Convolutions for MPC. Proc. Priv. Enhancing Technol. 2023(3): 321-353 (2023) - [c89]Pascal Reisert, Marc Rivinius, Toomas Krips, Ralf Küsters:
Overdrive LowGear 2.0: Reduced-Bandwidth MPC without Sacrifice. AsiaCCS 2023: 372-386 - [c88]Karthikeyan Bhargavan, Abhishek Bichhawat, Pedram Hosseyni, Ralf Küsters, Klaas Pruiksma, Guido Schmitz, Clara Waldmann, Tim Würtele:
Layered Symbolic Security Analysis in $\textsf {DY}^\star $. ESORICS (3) 2023: 3-21 - [c87]Carmen Wabartha, Julian Liedtke, Nicolas Huber, Daniel Rausch, Ralf Küsters:
Fully Tally-Hiding Verifiable E-Voting for Real-World Elections with Seat-Allocations. ESORICS (1) 2023: 209-228 - [c86]Florian Helmschmidt, Pedram Hosseyni, Ralf Küsters, Klaas Pruiksma, Clara Waldmann, Tim Würtele:
The Grant Negotiation and Authorization Protocol: Attacking, Fixing, and Verifying an Emerging Standard. ESORICS (3) 2023: 222-242 - [c85]Mike Graf, Ralf Küsters, Daniel Rausch:
AUC: Accountable Universal Composability. SP 2023: 1148-1167 - [i58]Marc Rivinius, Pascal Reisert, Sebastian Hasler, Ralf Küsters:
Convolutions in Overdrive: Maliciously Secure Convolutions for MPC. IACR Cryptol. ePrint Arch. 2023: 359 (2023) - [i57]Sebastian Hasler, Toomas Krips, Ralf Küsters, Pascal Reisert, Marc Rivinius:
Overdrive LowGear 2.0: Reduced-Bandwidth MPC without Sacrifice. IACR Cryptol. ePrint Arch. 2023: 462 (2023) - [i56]Carmen Wabartha, Julian Liedtke, Nicolas Huber, Daniel Rausch, Ralf Küsters:
Fully Tally-Hiding Verifiable E-Voting for Real-World Elections with Seat-Allocations. IACR Cryptol. ePrint Arch. 2023: 1289 (2023) - [i55]Florian Helmschmidt, Pedram Hosseyni, Ralf Küsters, Klaas Pruiksma, Clara Waldmann, Tim Würtele:
The Grant Negotiation and Authorization Protocol: Attacking, Fixing, and Verifying an Emerging Standard. IACR Cryptol. ePrint Arch. 2023: 1325 (2023) - [i54]Karthikeyan Bhargavan, Abhishek Bichhawat, Pedram Hosseyni, Ralf Küsters, Klaas Pruiksma, Guido Schmitz, Clara Waldmann, Tim Würtele:
Layered Symbolic Security Analysis in DY$^\star$. IACR Cryptol. ePrint Arch. 2023: 1329 (2023) - [i53]Mike Graf, Ralf Küsters, Daniel Rausch, Simon Egger, Marvin Bechtold, Marcel Flinspach:
Accountable Bulletin Boards: Definition and Provably Secure Implementation. IACR Cryptol. ePrint Arch. 2023: 1869 (2023) - [i52]Sebastian Hasler, Pascal Reisert, Marc Rivinius, Ralf Küsters:
Multipars: Reduced-Communication MPC over Z2k. IACR Cryptol. ePrint Arch. 2023: 1932 (2023) - 2022
- [c84]Nicolas Huber, Ralf Küsters, Toomas Krips, Julian Liedtke, Johannes Müller, Daniel Rausch, Pascal Reisert, Andreas Vogt:
Kryvos: Publicly Tally-Hiding Verifiable E-Voting. CCS 2022: 1443-1457 - [c83]Hussam Amrouch, Jens Anders, Steffen Becker, Maik Betka, Gerd Bleher, Peter Domanski, Nourhan Elhamawy, Thomas Ertl, Athanasios Gatzastras, Paul R. Genssler, Sebastian Hasler, Martin Heinrich, André van Hoorn, Hanieh Jafarzadeh, Ingmar Kallfass, Florian Klemme, Steffen Koch, Ralf Küsters, Andrés Lalama, Raphaël Latty, Yiwen Liao, Natalia Lylina, Zahra Paria Najafi-Haghi, Dirk Pflüger, Ilia Polian, Jochen Rivoir, Matthias Sauer, Denis Schwachhofer, Steffen Templin, Christian Volmer, Stefan Wagner, Daniel Weiskopf, Hans-Joachim Wunderlich, Bin Yang, Martin Zimmermann:
Intelligent Methods for Test and Reliability. DATE 2022: 969-974 - [c82]Daniel Rausch, Ralf Küsters, Céline Chevalier:
Embedding the UC Model into the IITM Model. EUROCRYPT (2) 2022: 242-272 - [c81]Mayar Elfares, Zhiming Hu, Pascal Reisert, Andreas Bulling, Ralf Küsters:
Federated Learning for Appearance-based Gaze Estimation in the Wild. Gaze Meets ML 2022: 20-36 - [c80]Bernhard Beckert, Jurlind Budurushi, Armin Grunwald, Robert Krimmer, Oksana Kulyk, Ralf Küsters, Andreas Mayer, Jörn Müller-Quade, Stephan Neumann, Melanie Volkamer:
Recent Developments in the Context of Online Elections and Digital Polls in Germany. Sicherheit 2022: 213-217 - [c79]Quoc Huy Do, Pedram Hosseyni, Ralf Küsters, Guido Schmitz, Nils Wenzler, Tim Würtele:
A Formal Security Analysis of the W3C Web Payment APIs: Attacks and Verification. SP 2022: 215-234 - [c78]Marc Rivinius, Pascal Reisert, Daniel Rausch, Ralf Küsters:
Publicly Accountable Robust Multi-Party Computation. SP 2022: 2430-2449 - [i51]Mayar Elfares, Zhiming Hu, Pascal Reisert, Andreas Bulling, Ralf Küsters:
Federated Learning for Appearance-based Gaze Estimation in the Wild. CoRR abs/2211.07330 (2022) - [i50]Daniel Rausch, Ralf Küsters, Céline Chevalier:
Embedding the UC Model into the IITM Model. IACR Cryptol. ePrint Arch. 2022: 224 (2022) - [i49]Marc Rivinius, Pascal Reisert, Daniel Rausch, Ralf Küsters:
Publicly Accountable Robust Multi-Party Computation. IACR Cryptol. ePrint Arch. 2022: 436 (2022) - [i48]Pascal Reisert, Marc Rivinius, Toomas Krips, Ralf Küsters:
Arithmetic Tuples for MPC. IACR Cryptol. ePrint Arch. 2022: 667 (2022) - [i47]Nicolas Huber, Ralf Küsters, Toomas Krips, Julian Liedtke, Johannes Müller, Daniel Rausch, Pascal Reisert, Andreas Vogt:
Kryvos: Publicly Tally-Hiding Verifiable E-Voting. IACR Cryptol. ePrint Arch. 2022: 1132 (2022) - [i46]Mike Graf, Ralf Küsters, Daniel Rausch:
AUC: Accountable Universal Composability. IACR Cryptol. ePrint Arch. 2022: 1606 (2022) - 2021
- [c77]Karthikeyan Bhargavan, Abhishek Bichhawat, Quoc Huy Do, Pedram Hosseyni, Ralf Küsters, Guido Schmitz, Tim Würtele:
A Tutorial-Style Introduction to DY*. Protocols, Strands, and Logic 2021: 77-97 - [c76]Mike Graf, Daniel Rausch, Viktoria Ronge, Christoph Egger, Ralf Küsters, Dominique Schröder:
A Security Framework for Distributed Ledgers. CCS 2021: 1043-1064 - [c75]Karthikeyan Bhargavan, Abhishek Bichhawat, Quoc Huy Do, Pedram Hosseyni, Ralf Küsters, Guido Schmitz, Tim Würtele:
An In-Depth Symbolic Security Analysis of the ACME Standard. CCS 2021: 2601-2617 - [c74]Karthikeyan Bhargavan, Abhishek Bichhawat, Quoc Huy Do, Pedram Hosseyni, Ralf Küsters, Guido Schmitz, Tim Würtele:
DY*: A Modular Symbolic Verification Framework for Executable Cryptographic Protocol Code. EuroS&P 2021: 523-542 - [e5]Avishek Adhikari, Ralf Küsters, Bart Preneel:
Progress in Cryptology - INDOCRYPT 2021 - 22nd International Conference on Cryptology in India, Jaipur, India, December 12-15, 2021, Proceedings. Lecture Notes in Computer Science 13143, Springer 2021, ISBN 978-3-030-92517-8 [contents] - [i45]Christoph Egger, Mike Graf, Ralf Küsters, Daniel Rausch, Viktoria Ronge, Dominique Schröder:
A Security Framework for Distributed Ledgers. IACR Cryptol. ePrint Arch. 2021: 145 (2021) - [i44]Quoc Huy Do, Pedram Hosseyni, Ralf Küsters, Guido Schmitz, Nils Wenzler, Tim Würtele:
A Formal Security Analysis of the W3C Web Payment APIs: Attacks and Verification. IACR Cryptol. ePrint Arch. 2021: 1012 (2021) - [i43]Fabian Hertel, Nicolas Huber, Jonas Kittelberger, Ralf Küsters, Julian Liedtke, Daniel Rausch:
Extending the Tally-Hiding Ordinos System: Implementations for Borda, Hare-Niemeyer, Condorcet, and Instant-Runoff Voting. IACR Cryptol. ePrint Arch. 2021: 1420 (2021) - [i42]Karthikeyan Bhargavan, Abhishek Bichhawat, Quoc Huy Do, Pedram Hosseyni, Ralf Küsters, Guido Schmitz, Tim Würtele:
An In-Depth Symbolic Security Analysis of the ACME Standard. IACR Cryptol. ePrint Arch. 2021: 1457 (2021) - 2020
- [j17]Ralf Küsters, Max Tuengerthal, Daniel Rausch:
The IITM Model: A Simple and Expressive Model for Universal Composability. J. Cryptol. 33(4): 1461-1584 (2020) - [j16]Ralf Küsters, Max Tuengerthal, Daniel Rausch:
Joint State Composition Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation. J. Cryptol. 33(4): 1585-1658 (2020) - [c73]Ralf Küsters, Julian Liedtke, Johannes Müller, Daniel Rausch, Andreas Vogt:
Ordinos: A Verifiable Tally-Hiding E-Voting System. EuroS&P 2020: 216-235 - [c72]Mike Graf, Ralf Küsters, Daniel Rausch:
Accountability in a Permissioned Blockchain: Formal Analysis of Hyperledger Fabric. EuroS&P 2020: 236-255 - [e4]Robert Krimmer, Melanie Volkamer, Bernhard Beckert, Ralf Küsters, Oksana Kulyk, David Duenas-Cid, Mikhel Solvak:
Electronic Voting - 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6-9, 2020, Proceedings. Lecture Notes in Computer Science 12455, Springer 2020, ISBN 978-3-030-60346-5 [contents] - [i41]Ralf Küsters, Daniel Rausch, Mike Simon:
Accountability in a Permissioned Blockchain: Formal Analysis of Hyperledger Fabric. IACR Cryptol. ePrint Arch. 2020: 386 (2020) - [i40]Ralf Küsters, Julian Liedtke, Johannes Müller, Daniel Rausch, Andreas Vogt:
Ordinos: A Verifiable Tally-Hiding E-Voting System. IACR Cryptol. ePrint Arch. 2020: 405 (2020)
2010 – 2019
- 2019
- [c71]Jan Camenisch, Stephan Krenn, Ralf Küsters, Daniel Rausch:
iUC: Flexible Universal Composability Made Simple. ASIACRYPT (3) 2019: 191-221 - [c70]Daniel Fett, Pedram Hosseyni, Ralf Küsters:
An Extensive Formal Security Analysis of the OpenID Financial-Grade API. IEEE Symposium on Security and Privacy 2019: 453-471 - [e3]Robert Krimmer, Melanie Volkamer, Véronique Cortier, Bernhard Beckert, Ralf Küsters, Uwe Serdült, David Duenas-Cid:
Electronic Voting - 4th International Joint Conference, E-Vote-ID 2019, Bregenz, Austria, October 1-4, 2019, Proceedings. Lecture Notes in Computer Science 11759, Springer 2019, ISBN 978-3-030-30624-3 [contents] - [i39]Daniel Fett, Pedram Hosseyni, Ralf Küsters:
An Extensive Formal Security Analysis of the OpenID Financial-grade API. CoRR abs/1901.11520 (2019) - [i38]Jan Camenisch, Ralf Küsters, Anna Lysyanskaya, Alessandra Scafuro:
Practical Yet Composably Secure Cryptographic Protocols (Dagstuhl Seminar 19042). Dagstuhl Reports 9(1): 88-103 (2019) - [i37]Jan Camenisch, Stephan Krenn, Ralf Küsters, Daniel Rausch:
iUC: Flexible Universal Composability Made Simple. IACR Cryptol. ePrint Arch. 2019: 1073 (2019) - 2018
- [e2]Lujo Bauer, Ralf Küsters:
Principles of Security and Trust - 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings. Lecture Notes in Computer Science 10804, Springer 2018, ISBN 978-3-319-89721-9 [contents] - 2017
- [c69]Daniel Fett, Ralf Küsters, Guido Schmitz:
The Web SSO Standard OpenID Connect: In-depth Formal Security Analysis and Security Guidelines. CSF 2017: 189-202 - [c68]Ralf Küsters, Daniel Rausch:
A Framework for Universally Composable Diffie-Hellman Key Exchange. IEEE Symposium on Security and Privacy 2017: 881-900 - [c67]Ralf Küsters, Johannes Müller:
Cryptographic Security Analysis of E-voting Systems: Achievements, Misconceptions, and Limitations. E-VOTE-ID 2017: 21-41 - [i36]Daniel Fett, Ralf Küsters, Guido Schmitz:
The Web SSO Standard OpenID Connect: In-Depth Formal Security Analysis and Security Guidelines. CoRR abs/1704.08539 (2017) - [i35]Ralf Küsters, Daniel Rausch:
A Framework for Universally Composable Diffie-Hellman Key Exchange. IACR Cryptol. ePrint Arch. 2017: 256 (2017) - 2016
- [c66]Jan Camenisch, Robert R. Enderlein, Stephan Krenn, Ralf Küsters, Daniel Rausch:
Universal Composition with Responsive Environments. ASIACRYPT (2) 2016: 807-840 - [c65]Daniel Fett, Ralf Küsters, Guido Schmitz:
A Comprehensive Formal Security Analysis of OAuth 2.0. CCS 2016: 1204-1215 - [c64]Ralf Küsters, Johannes Müller, Enrico Scapin, Tomasz Truderung:
sElect: A Lightweight Verifiable Remote Voting System. CSF 2016: 341-354 - [c63]Ralf Küsters, Tomasz Truderung:
Security Analysis of Re-Encryption RPC Mix Nets. EuroS&P 2016: 227-242 - [c62]Véronique Cortier, David Galindo, Ralf Küsters, Johannes Müller, Tomasz Truderung:
SoK: Verifiability Notions for E-Voting Protocols. IEEE Symposium on Security and Privacy 2016: 779-798 - [i34]Daniel Fett, Ralf Küsters, Guido Schmitz:
A Comprehensive Formal Security Analysis of OAuth 2.0. CoRR abs/1601.01229 (2016) - [i33]Jan Camenisch, Robert R. Enderlein, Stephan Krenn, Ralf Küsters, Daniel Rausch:
Universal Composition with Responsive Environments. IACR Cryptol. ePrint Arch. 2016: 34 (2016) - [i32]Véronique Cortier, David Galindo, Ralf Küsters, Johannes Müller, Tomasz Truderung:
Verifiability Notions for E-Voting Protocols. IACR Cryptol. ePrint Arch. 2016: 287 (2016) - [i31]Ralf Küsters, Johannes Müller, Enrico Scapin, Tomasz Truderung:
sElect: A Lightweight Verifiable Remote Voting System. IACR Cryptol. ePrint Arch. 2016: 438 (2016) - 2015
- [c61]Daniel Fett, Ralf Küsters, Guido Schmitz:
SPRESSO: A Secure, Privacy-Respecting Single Sign-On System for the Web. CCS 2015: 1358-1369 - [c60]Ralf Küsters, Tomasz Truderung, Bernhard Beckert, Daniel Bruns, Michael Kirsten, Martin Mohr:
A Hybrid Approach for Proving Noninterference of Java Programs. CSF 2015: 305-319 - [c59]Daniel Fett, Ralf Küsters, Guido Schmitz:
Analyzing the BrowserID SSO System with Primary Identity Providers Using an Expressive Model of the Web. ESORICS (1) 2015: 43-65 - [i30]Daniel Fett, Ralf Küsters, Guido Schmitz:
SPRESSO: A Secure, Privacy-Respecting Single Sign-On System for the Web. CoRR abs/1508.01719 (2015) - [i29]Ralf Küsters, Tomasz Truderung:
Security Analysis of Re-Encryption RPC Mix Nets. IACR Cryptol. ePrint Arch. 2015: 295 (2015) - [i28]Ralf Küsters, Tomasz Truderung, Bernhard Beckert, Daniel Bruns, Michael Kirsten, Martin Mohr:
A Hybrid Approach for Proving Noninterference of Java Programs. IACR Cryptol. ePrint Arch. 2015: 438 (2015) - 2014
- [j15]Ralf Küsters, Tomasz Truderung:
Security in e-voting. it Inf. Technol. 56(6): 300-306 (2014) - [c58]Ralf Küsters, Enrico Scapin, Tomasz Truderung, Juergen Graf:
Extending and Applying a Framework for the Cryptographic Verification of Java Programs. POST 2014: 220-239 - [c57]Ralf Küsters, Tomasz Truderung, Andreas Vogt:
Formal Analysis of Chaumian Mix Nets with Randomized Partial Checking. IEEE Symposium on Security and Privacy 2014: 343-358 - [c56]Daniel Fett, Ralf Küsters, Guido Schmitz:
An Expressive Model for the Web Infrastructure: Definition and Application to the Browser ID SSO System. IEEE Symposium on Security and Privacy 2014: 673-688 - [p2]Ralf Küsters:
E-Voting Systems. Software Systems Safety 2014: 135-164 - [i27]Daniel Fett, Ralf Küsters, Guido Schmitz:
An Expressive Model for the Web Infrastructure: Definition and Application to the BrowserID SSO System. CoRR abs/1403.1866 (2014) - [i26]Daniel Fett, Ralf Küsters, Guido Schmitz:
Analyzing the BrowserID SSO System with Primary Identity Providers Using an Expressive Model of the Web. CoRR abs/1411.7210 (2014) - [i25]Ralf Küsters, Enrico Scapin, Tomasz Truderung, Juergen Graf:
Extending and Applying a Framework for the Cryptographic Verification of Java Programs. IACR Cryptol. ePrint Arch. 2014: 38 (2014) - [i24]Ralf Küsters, Tomasz Truderung, Andreas Vogt:
Formal Analysis of Chaumian Mix Nets with Randomized Partial Checking. IACR Cryptol. ePrint Arch. 2014: 341 (2014) - 2013
- [i23]Ralf Küsters, Max Tuengerthal:
The IITM Model: a Simple and Expressive Model for Universal Composability. IACR Cryptol. ePrint Arch. 2013: 25 (2013) - 2012
- [j14]Ralf Küsters, Tomasz Truderung, Andreas Vogt:
A game-based definition of coercion resistance and its applications. J. Comput. Secur. 20(6): 709-764 (2012) - [c55]Ralf Küsters, Tomasz Truderung, Juergen Graf:
A Framework for the Cryptographic Verification of Java-Like Programs. CSF 2012: 198-212 - [c54]Ralf Küsters, Tomasz Truderung, Andreas Vogt:
Clash Attacks on the Verifiability of E-Voting Systems. IEEE Symposium on Security and Privacy 2012: 395-409 - [i22]Ralf Küsters, Tomasz Truderung, Andreas Vogt:
Clash Attacks on the Verifiability of E-Voting Systems. IACR Cryptol. ePrint Arch. 2012: 116 (2012) - [i21]Ralf Küsters, Tomasz Truderung, Juergen Graf:
A Framework for the Cryptographic Verification of Java-like Programs. IACR Cryptol. ePrint Arch. 2012: 153 (2012) - 2011
- [b2]Ralf Küsters, Thomas Wilke:
Moderne Kryptographie - Eine Einführung. Vieweg + Teubner 2011, ISBN 978-3-519-00509-4 - [j13]Ralf Küsters, Tomasz Truderung:
Reducing Protocol Analysis with XOR to the XOR-Free Case in the Horn Theory Based Approach. J. Autom. Reason. 46(3-4): 325-352 (2011) - [c53]Ralf Küsters, Max Tuengerthal:
Composition theorems without pre-established session identifiers. CCS 2011: 41-50 - [c52]Ralf Küsters, Max Tuengerthal:
Ideal Key Derivation and Encryption in Simulation-Based Security. CT-RSA 2011: 161-179 - [c51]Ralf Küsters, Tomasz Truderung, Andreas Vogt:
Verifiability, Privacy, and Coercion-Resistance: New Insights from a Case Study. IEEE Symposium on Security and Privacy 2011: 538-553 - [i20]Alexander Borgida, Ralf Küsters:
What's in an Attribute? Consequences for the Least Common Subsumer. CoRR abs/1106.0238 (2011) - [i19]Hubert Comon-Lundh, Ralf Küsters, Catherine Meadows:
Security and Rewriting (Dagstuhl Seminar 11332). Dagstuhl Reports 1(8): 53-66 (2011) - [i18]Ralf Küsters, Max Tuengerthal:
Composition Theorems Without Pre-Established Session Identifiers. IACR Cryptol. ePrint Arch. 2011: 406 (2011) - [i17]Ralf Küsters, Tomasz Truderung, Andreas Vogt:
Verifiability, Privacy, and Coercion-Resistance: New Insights from a Case Study. IACR Cryptol. ePrint Arch. 2011: 517 (2011) - 2010
- [j12]Detlef Kähler, Ralf Küsters, Thomas Wilke:
Deciding strategy properties of contract-signing protocols. ACM Trans. Comput. Log. 11(3): 17:1-17:42 (2010) - [c50]Ralf Küsters, Tomasz Truderung, Andreas Vogt:
Accountability: definition and relationship to verifiability. CCS 2010: 526-535 - [c49]Ralf Küsters, Tomasz Truderung, Andreas Vogt:
A Game-Based Definition of Coercion-Resistance and Its Applications. CSF 2010: 122-136 - [c48]Ralf Küsters, Tomasz Truderung, Andreas Vogt:
Proving Coercion-Resistance of Scantegrity II. ICICS 2010: 281-295 - [c47]Ralf Küsters, Henning Schnoor, Tomasz Truderung:
A Formal Definition of Online Abuse-Freeness. SecureComm 2010: 484-497 - [i16]Ralf Küsters, Tomasz Truderung, Andreas Vogt:
Accountability: Definition and Relationship to Verifiability. IACR Cryptol. ePrint Arch. 2010: 236 (2010) - [i15]Ralf Küsters, Max Tuengerthal:
Ideal Key Derivation and Encryption in Simulation-based Security. IACR Cryptol. ePrint Arch. 2010: 295 (2010) - [i14]Ralf Küsters, Tomasz Truderung, Andreas Vogt:
Proving Coercion-Resistance of Scantegrity II. IACR Cryptol. ePrint Arch. 2010: 502 (2010)
2000 – 2009
- 2009
- [c46]Ralf Küsters, Max Tuengerthal:
Computational soundness for key exchange protocols with symmetric encryption. CCS 2009: 91-100 - [c45]Ralf Küsters, Tomasz Truderung:
Using ProVerif to Analyze Protocols with Diffie-Hellman Exponentiation. CSF 2009: 157-171 - [c44]Ralf Küsters, Max Tuengerthal:
Universally Composable Symmetric Encryption. CSF 2009: 293-307 - [c43]Ralf Küsters, Tomasz Truderung:
An Epistemic Approach to Coercion-Resistance for Electronic Voting Protocols. SP 2009: 251-266 - [c42]Ralf Küsters, Tomasz Truderung, Andreas Vogt:
Improving and Simplifying a Variant of Prêt à Voter. VoteID 2009: 37-53 - [i13]Ralf Küsters, Tomasz Truderung:
An Epistemic Approach to Coercion-Resistance for Electronic Voting Protocols. CoRR abs/0903.0802 (2009) - [i12]Ralf Küsters, Max Tuengerthal:
Universally Composable Symmetric Encryption. IACR Cryptol. ePrint Arch. 2009: 55 (2009) - [i11]Ralf Küsters, Max Tuengerthal:
Computational Soundness for Key Exchange Protocols with Symmetric Encryption. IACR Cryptol. ePrint Arch. 2009: 392 (2009) - [i10]Ralf Küsters, Tomasz Truderung, Andreas Vogt:
A Game-Based Definition of Coercion-Resistance and its Applications. IACR Cryptol. ePrint Arch. 2009: 582 (2009) - 2008
- [j11]Pierpaolo Degano, Ralf Küsters, Luca Viganò, Steve Zdancewic:
Joint workshop on foundations of computer security and automated reasoning for security protocol analysis (FCS-ARSPA '06). Inf. Comput. 206(2-4): 129 (2008) - [j10]Michael Backes, Markus Dürmuth, Dennis Hofheinz, Ralf Küsters:
Conditional reactive simulatability. Int. J. Inf. Sec. 7(2): 155-169 (2008) - [j9]