Search dblp for Publications

export results for "Björn Tackmann"

 download as .bib file

@article{DBLP:journals/dc/AlposCTZ24,
  author       = {Orestis Alpos and
                  Christian Cachin and
                  Bj{\"{o}}rn Tackmann and
                  Luca Zanolini},
  title        = {Asymmetric distributed trust},
  journal      = {Distributed Comput.},
  volume       = {37},
  number       = {3},
  pages        = {247--277},
  year         = {2024},
  url          = {https://doi.org/10.1007/s00446-024-00469-1},
  doi          = {10.1007/S00446-024-00469-1},
  timestamp    = {Mon, 12 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dc/AlposCTZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/BogatovCET21,
  author       = {Dmytro Bogatov and
                  Angelo De Caro and
                  Kaoutar Elkhiyaoui and
                  Bj{\"{o}}rn Tackmann},
  editor       = {Mauro Conti and
                  Marc Stevens and
                  Stephan Krenn},
  title        = {Anonymous Transactions with Revocation and Auditing in Hyperledger
                  Fabric},
  booktitle    = {Cryptology and Network Security - 20th International Conference, {CANS}
                  2021, Vienna, Austria, December 13-15, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13099},
  pages        = {435--459},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92548-2\_23},
  doi          = {10.1007/978-3-030-92548-2\_23},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/BogatovCET21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/CorettiDMTV20,
  author       = {Sandro Coretti and
                  Yevgeniy Dodis and
                  Ueli Maurer and
                  Bj{\"{o}}rn Tackmann and
                  Daniele Venturi},
  title        = {Non-malleable Encryption: Simpler, Shorter, Stronger},
  journal      = {J. Cryptol.},
  volume       = {33},
  number       = {4},
  pages        = {1984--2033},
  year         = {2020},
  url          = {https://doi.org/10.1007/s00145-020-09361-0},
  doi          = {10.1007/S00145-020-09361-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/CorettiDMTV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aft/AndroulakiCCDET20,
  author       = {Elli Androulaki and
                  Jan Camenisch and
                  Angelo De Caro and
                  Maria Dubovitskaya and
                  Kaoutar Elkhiyaoui and
                  Bj{\"{o}}rn Tackmann},
  title        = {Privacy-preserving auditable token payments in a permissioned blockchain
                  system},
  booktitle    = {{AFT} '20: 2nd {ACM} Conference on Advances in Financial Technologies,
                  New York, NY, USA, October 21-23, 2020},
  pages        = {255--267},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3419614.3423259},
  doi          = {10.1145/3419614.3423259},
  timestamp    = {Thu, 29 Oct 2020 14:40:13 +0100},
  biburl       = {https://dblp.org/rec/conf/aft/AndroulakiCCDET20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BadertscherCHTZ20,
  author       = {Christian Badertscher and
                  Ran Canetti and
                  Julia Hesse and
                  Bj{\"{o}}rn Tackmann and
                  Vassilis Zikas},
  editor       = {Rafael Pass and
                  Krzysztof Pietrzak},
  title        = {Universal Composition with Global Subroutines: Capturing Global Setup
                  Within Plain {UC}},
  booktitle    = {Theory of Cryptography - 18th International Conference, {TCC} 2020,
                  Durham, NC, USA, November 16-19, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12552},
  pages        = {1--30},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64381-2\_1},
  doi          = {10.1007/978-3-030-64381-2\_1},
  timestamp    = {Thu, 17 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/BadertscherCHTZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BadertscherCHTZ20,
  author       = {Christian Badertscher and
                  Ran Canetti and
                  Julia Hesse and
                  Bj{\"{o}}rn Tackmann and
                  Vassilis Zikas},
  title        = {Universal Composition with Global Subroutines: Capturing Global Setup
                  within plain {UC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1209},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1209},
  timestamp    = {Fri, 30 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BadertscherCHTZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/DemayGMT19,
  author       = {Gr{\'{e}}gory Demay and
                  Peter Gazi and
                  Ueli Maurer and
                  Bj{\"{o}}rn Tackmann},
  title        = {Per-session security: Password-based cryptography revisited},
  journal      = {J. Comput. Secur.},
  volume       = {27},
  number       = {1},
  pages        = {75--111},
  year         = {2019},
  url          = {https://doi.org/10.3233/JCS-181131},
  doi          = {10.3233/JCS-181131},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/DemayGMT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BellareNT19,
  author       = {Mihir Bellare and
                  Ruth Ng and
                  Bj{\"{o}}rn Tackmann},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Nonces Are Noticed: {AEAD} Revisited},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11692},
  pages        = {235--265},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26948-7\_9},
  doi          = {10.1007/978-3-030-26948-7\_9},
  timestamp    = {Fri, 09 Aug 2019 14:20:22 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BellareNT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/opodis/CachinT19,
  author       = {Christian Cachin and
                  Bj{\"{o}}rn Tackmann},
  editor       = {Pascal Felber and
                  Roy Friedman and
                  Seth Gilbert and
                  Avery Miller},
  title        = {Asymmetric Distributed Trust},
  booktitle    = {23rd International Conference on Principles of Distributed Systems,
                  {OPODIS} 2019, December 17-19, 2019, Neuch{\^{a}}tel, Switzerland},
  series       = {LIPIcs},
  volume       = {153},
  pages        = {7:1--7:16},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2019},
  url          = {https://doi.org/10.4230/LIPIcs.OPODIS.2019.7},
  doi          = {10.4230/LIPICS.OPODIS.2019.7},
  timestamp    = {Wed, 21 Aug 2024 22:46:00 +0200},
  biburl       = {https://dblp.org/rec/conf/opodis/CachinT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wdag/CachinT19,
  author       = {Christian Cachin and
                  Bj{\"{o}}rn Tackmann},
  editor       = {Jukka Suomela},
  title        = {Brief Announcement: Asymmetric Distributed Trust},
  booktitle    = {33rd International Symposium on Distributed Computing, {DISC} 2019,
                  October 14-18, 2019, Budapest, Hungary},
  series       = {LIPIcs},
  volume       = {146},
  pages        = {39:1--39:3},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2019},
  url          = {https://doi.org/10.4230/LIPIcs.DISC.2019.39},
  doi          = {10.4230/LIPICS.DISC.2019.39},
  timestamp    = {Wed, 21 Aug 2024 22:46:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wdag/CachinT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1906-09314,
  author       = {Christian Cachin and
                  Bj{\"{o}}rn Tackmann},
  title        = {Asymmetric Distributed Trust},
  journal      = {CoRR},
  volume       = {abs/1906.09314},
  year         = {2019},
  url          = {http://arxiv.org/abs/1906.09314},
  eprinttype    = {arXiv},
  eprint       = {1906.09314},
  timestamp    = {Thu, 27 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1906-09314.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AndroulakiCCDET19,
  author       = {Elli Androulaki and
                  Jan Camenisch and
                  Angelo De Caro and
                  Maria Dubovitskaya and
                  Kaoutar Elkhiyaoui and
                  Bj{\"{o}}rn Tackmann},
  title        = {Privacy-preserving auditable token payments in a permissioned blockchain
                  system},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1058},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1058},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AndroulakiCCDET19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareNT19,
  author       = {Mihir Bellare and
                  Ruth Ng and
                  Bj{\"{o}}rn Tackmann},
  title        = {Nonces are Noticed: {AEAD} Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {624},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/624},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareNT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BogatovCET19,
  author       = {Dmytro Bogatov and
                  Angelo De Caro and
                  Kaoutar Elkhiyaoui and
                  Bj{\"{o}}rn Tackmann},
  title        = {Anonymous Transactions with Revocation and Auditing in Hyperledger
                  Fabric},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1097},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1097},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BogatovCET19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischDT19,
  author       = {Jan Camenisch and
                  Manu Drijvers and
                  Bj{\"{o}}rn Tackmann},
  title        = {Multi-Protocol {UC} and its Use for Building Modular and Efficient
                  Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {65},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/065},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CamenischDT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/MattMPRT18,
  author       = {Christian Matt and
                  Ueli Maurer and
                  Christopher Portmann and
                  Renato Renner and
                  Bj{\"{o}}rn Tackmann},
  title        = {Toward an algebraic theory of systems},
  journal      = {Theor. Comput. Sci.},
  volume       = {747},
  pages        = {1--25},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.tcs.2018.06.001},
  doi          = {10.1016/J.TCS.2018.06.001},
  timestamp    = {Wed, 03 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/MattMPRT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/CachinGPT18,
  author       = {Christian Cachin and
                  Esha Ghosh and
                  Dimitrios Papadopoulos and
                  Bj{\"{o}}rn Tackmann},
  editor       = {Bart Preneel and
                  Frederik Vercauteren},
  title        = {Stateful Multi-client Verifiable Computation},
  booktitle    = {Applied Cryptography and Network Security - 16th International Conference,
                  {ACNS} 2018, Leuven, Belgium, July 2-4, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10892},
  pages        = {637--656},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93387-0\_33},
  doi          = {10.1007/978-3-319-93387-0\_33},
  timestamp    = {Mon, 07 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/CachinGPT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CosteaCGTR18,
  author       = {Sergiu Costea and
                  Marios O. Choudary and
                  Doru Gucea and
                  Bj{\"{o}}rn Tackmann and
                  Costin Raiciu},
  editor       = {David Lie and
                  Mohammad Mannan and
                  Michael Backes and
                  XiaoFeng Wang},
  title        = {Secure Opportunistic Multipath Key Exchange},
  booktitle    = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2018, Toronto, ON, Canada, October
                  15-19, 2018},
  pages        = {2077--2094},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3243734.3243791},
  doi          = {10.1145/3243734.3243791},
  timestamp    = {Tue, 10 Nov 2020 20:00:51 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CosteaCGTR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/LehmannT18,
  author       = {Anja Lehmann and
                  Bj{\"{o}}rn Tackmann},
  editor       = {Jesper Buus Nielsen and
                  Vincent Rijmen},
  title        = {Updatable Encryption with Post-Compromise Security},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10822},
  pages        = {685--716},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-78372-7\_22},
  doi          = {10.1007/978-3-319-78372-7\_22},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/LehmannT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BadertscherMT18,
  author       = {Christian Badertscher and
                  Ueli Maurer and
                  Bj{\"{o}}rn Tackmann},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {On Composable Security for Digital Signatures},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10769},
  pages        = {494--523},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76578-5\_17},
  doi          = {10.1007/978-3-319-76578-5\_17},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BadertscherMT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BadertscherMT18,
  author       = {Christian Badertscher and
                  Ueli Maurer and
                  Bj{\"{o}}rn Tackmann},
  title        = {On Composable Security for Digital Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {15},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/015},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BadertscherMT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CosteaCGTR18,
  author       = {Sergiu Costea and
                  Marios O. Choudary and
                  Doru Gucea and
                  Bj{\"{o}}rn Tackmann and
                  Costin Raiciu},
  title        = {Secure Opportunistic Multipath Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1124},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1124},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CosteaCGTR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LehmannT18,
  author       = {Anja Lehmann and
                  Bj{\"{o}}rn Tackmann},
  title        = {Updatable Encryption with Post-Compromise Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {118},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/118},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LehmannT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/PortmannMMRT17,
  author       = {Christopher Portmann and
                  Christian Matt and
                  Ueli Maurer and
                  Renato Renner and
                  Bj{\"{o}}rn Tackmann},
  title        = {Causal Boxes: Quantum Information-Processing Systems Closed Under
                  Composition},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {63},
  number       = {5},
  pages        = {3277--3305},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIT.2017.2676805},
  doi          = {10.1109/TIT.2017.2676805},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/PortmannMMRT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/DemayGMT17,
  author       = {Gr{\'{e}}gory Demay and
                  Peter Gazi and
                  Ueli Maurer and
                  Bj{\"{o}}rn Tackmann},
  editor       = {Simon N. Foley and
                  Dieter Gollmann and
                  Einar Snekkenes},
  title        = {Per-Session Security: Password-Based Cryptography Revisited},
  booktitle    = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research
                  in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10492},
  pages        = {408--426},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66402-6\_24},
  doi          = {10.1007/978-3-319-66402-6\_24},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/DemayGMT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Tackmann17,
  author       = {Bj{\"{o}}rn Tackmann},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Guillermo Navarro{-}Arribas and
                  Hannes Hartenstein and
                  Jordi Herrera{-}Joancomart{\'{\i}}},
  title        = {Secure Event Tickets on a Blockchain},
  booktitle    = {Data Privacy Management, Cryptocurrencies and Blockchain Technology
                  - {ESORICS} 2017 International Workshops, {DPM} 2017 and {CBT} 2017,
                  Oslo, Norway, September 14-15, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10436},
  pages        = {437--444},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-67816-0\_26},
  doi          = {10.1007/978-3-319-67816-0\_26},
  timestamp    = {Fri, 27 Dec 2019 21:19:57 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/Tackmann17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/AlwenT17,
  author       = {Jo{\"{e}}l Alwen and
                  Bj{\"{o}}rn Tackmann},
  editor       = {Yael Kalai and
                  Leonid Reyzin},
  title        = {Moderately Hard Functions: Definition, Instantiations, and Applications},
  booktitle    = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
                  Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10677},
  pages        = {493--526},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70500-2\_17},
  doi          = {10.1007/978-3-319-70500-2\_17},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/AlwenT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlwenT17,
  author       = {Jo{\"{e}}l Alwen and
                  Bj{\"{o}}rn Tackmann},
  title        = {Moderately Hard Functions: Definition, Instantiations, and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {945},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/945},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlwenT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CachinCMTV17,
  author       = {Christian Cachin and
                  Angelo De Caro and
                  Pedro Moreno{-}Sanchez and
                  Bj{\"{o}}rn Tackmann and
                  Marko Vukolic},
  title        = {The Transaction Graph for Modeling Blockchain Semantics},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1070},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1070},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CachinCMTV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CachinGPT17,
  author       = {Christian Cachin and
                  Esha Ghosh and
                  Dimitrios Papadopoulos and
                  Bj{\"{o}}rn Tackmann},
  title        = {Stateful Multi-Client Verifiable Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {901},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/901},
  timestamp    = {Mon, 07 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/CachinGPT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BellareT16,
  author       = {Mihir Bellare and
                  Bj{\"{o}}rn Tackmann},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {The Multi-user Security of Authenticated Encryption: {AES-GCM} in
                  {TLS} 1.3},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9814},
  pages        = {247--276},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53018-4\_10},
  doi          = {10.1007/978-3-662-53018-4\_10},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BellareT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BellareT16,
  author       = {Mihir Bellare and
                  Bj{\"{o}}rn Tackmann},
  editor       = {Marc Fischlin and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Nonce-Based Cryptography: Retaining Security When Randomness Fails},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9665},
  pages        = {729--757},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49890-3\_28},
  doi          = {10.1007/978-3-662-49890-3\_28},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BellareT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/CorettiDTV16,
  author       = {Sandro Coretti and
                  Yevgeniy Dodis and
                  Bj{\"{o}}rn Tackmann and
                  Daniele Venturi},
  editor       = {Eyal Kushilevitz and
                  Tal Malkin},
  title        = {Non-Malleable Encryption: Simpler, Shorter, Stronger},
  booktitle    = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A,
                  Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9562},
  pages        = {306--335},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49096-9\_13},
  doi          = {10.1007/978-3-662-49096-9\_13},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/CorettiDTV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/0002MPRT16,
  author       = {Christian Matt and
                  Ueli Maurer and
                  Christopher Portmann and
                  Renato Renner and
                  Bj{\"{o}}rn Tackmann},
  title        = {Toward an Algebraic Theory of Systems},
  journal      = {CoRR},
  volume       = {abs/1609.04293},
  year         = {2016},
  url          = {http://arxiv.org/abs/1609.04293},
  eprinttype    = {arXiv},
  eprint       = {1609.04293},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/0002MPRT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareT16,
  author       = {Mihir Bellare and
                  Bj{\"{o}}rn Tackmann},
  title        = {Nonce-Based Cryptography: Retaining Security when Randomness Fails},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {290},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/290},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareT16a,
  author       = {Mihir Bellare and
                  Bj{\"{o}}rn Tackmann},
  title        = {The Multi-User Security of Authenticated Encryption: {AES-GCM} in
                  {TLS} 1.3},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {564},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/564},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareT16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DemayGMT16,
  author       = {Gr{\'{e}}gory Demay and
                  Peter Gazi and
                  Ueli Maurer and
                  Bj{\"{o}}rn Tackmann},
  title        = {Per-Session Security: Password-Based Cryptography Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {166},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/166},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DemayGMT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/DemayGMT15,
  author       = {Gr{\'{e}}gory Demay and
                  Peter Gazi and
                  Ueli Maurer and
                  Bj{\"{o}}rn Tackmann},
  editor       = {Anja Lehmann and
                  Stefan Wolf},
  title        = {Query-Complexity Amplification for Random Oracles},
  booktitle    = {Information Theoretic Security - 8th International Conference, {ICITS}
                  2015, Lugano, Switzerland, May 2-5, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9063},
  pages        = {159--180},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-17470-9\_10},
  doi          = {10.1007/978-3-319-17470-9\_10},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/DemayGMT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/Badertscher0MRT15,
  author       = {Christian Badertscher and
                  Christian Matt and
                  Ueli Maurer and
                  Phillip Rogaway and
                  Bj{\"{o}}rn Tackmann},
  editor       = {Jens Groth},
  title        = {Robust Authenticated Encryption and the Limits of Symmetric Cryptography},
  booktitle    = {Cryptography and Coding - 15th {IMA} International Conference, {IMACC}
                  2015, Oxford, UK, December 15-17, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9496},
  pages        = {112--129},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27239-9\_7},
  doi          = {10.1007/978-3-319-27239-9\_7},
  timestamp    = {Wed, 18 Mar 2020 16:00:58 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/Badertscher0MRT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/KohlweissMOTV15,
  author       = {Markulf Kohlweiss and
                  Ueli Maurer and
                  Cristina Onete and
                  Bj{\"{o}}rn Tackmann and
                  Daniele Venturi},
  editor       = {Alex Biryukov and
                  Vipul Goyal},
  title        = {(De-)Constructing {TLS} 1.3},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2015 - 16th International Conference
                  on Cryptology in India, Bangalore, India, December 6-9, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9462},
  pages        = {85--102},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26617-6\_5},
  doi          = {10.1007/978-3-319-26617-6\_5},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/KohlweissMOTV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/GarayKTZ15,
  author       = {Juan A. Garay and
                  Jonathan Katz and
                  Bj{\"{o}}rn Tackmann and
                  Vassilis Zikas},
  editor       = {Chryssis Georgiou and
                  Paul G. Spirakis},
  title        = {How Fair is Your Protocol?: {A} Utility-based Approach to Protocol
                  Optimality},
  booktitle    = {Proceedings of the 2015 {ACM} Symposium on Principles of Distributed
                  Computing, {PODC} 2015, Donostia-San Sebasti{\'{a}}n, Spain,
                  July 21 - 23, 2015},
  pages        = {281--290},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2767386.2767431},
  doi          = {10.1145/2767386.2767431},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/GarayKTZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/Badertscher0MRT15,
  author       = {Christian Badertscher and
                  Christian Matt and
                  Ueli Maurer and
                  Phillip Rogaway and
                  Bj{\"{o}}rn Tackmann},
  editor       = {Man Ho Au and
                  Atsuko Miyaji},
  title        = {Augmented Secure Channels and the Goal of the {TLS} 1.3 Record Layer},
  booktitle    = {Provable Security - 9th International Conference, ProvSec 2015, Kanazawa,
                  Japan, November 24-26, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9451},
  pages        = {85--104},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26059-4\_5},
  doi          = {10.1007/978-3-319-26059-4\_5},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/Badertscher0MRT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/CorettiMTV15,
  author       = {Sandro Coretti and
                  Ueli Maurer and
                  Bj{\"{o}}rn Tackmann and
                  Daniele Venturi},
  editor       = {Yevgeniy Dodis and
                  Jesper Buus Nielsen},
  title        = {From Single-Bit to Multi-bit Public-Key Encryption via Non-malleable
                  Codes},
  booktitle    = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
                  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9014},
  pages        = {532--560},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46494-6\_22},
  doi          = {10.1007/978-3-662-46494-6\_22},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/CorettiMTV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wdag/GarayTZ15,
  author       = {Juan A. Garay and
                  Bj{\"{o}}rn Tackmann and
                  Vassilis Zikas},
  editor       = {Yoram Moses},
  title        = {Fair Distributed Computation of Reactive Functions},
  booktitle    = {Distributed Computing - 29th International Symposium, {DISC} 2015,
                  Tokyo, Japan, October 7-9, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9363},
  pages        = {497--512},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48653-5\_33},
  doi          = {10.1007/978-3-662-48653-5\_33},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/wdag/GarayTZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Portmann0MRT15,
  author       = {Christopher Portmann and
                  Christian Matt and
                  Ueli Maurer and
                  Renato Renner and
                  Bj{\"{o}}rn Tackmann},
  title        = {Causal Boxes: Quantum Information-Processing Systems Closed under
                  Composition},
  journal      = {CoRR},
  volume       = {abs/1512.02240},
  year         = {2015},
  url          = {http://arxiv.org/abs/1512.02240},
  eprinttype    = {arXiv},
  eprint       = {1512.02240},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Portmann0MRT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Badertscher0MRT15,
  author       = {Christian Badertscher and
                  Christian Matt and
                  Ueli Maurer and
                  Phillip Rogaway and
                  Bj{\"{o}}rn Tackmann},
  title        = {Augmented Secure Channels and the Goal of the {TLS} 1.3 Record Layer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {394},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/394},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Badertscher0MRT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Badertscher0MRT15a,
  author       = {Christian Badertscher and
                  Christian Matt and
                  Ueli Maurer and
                  Phillip Rogaway and
                  Bj{\"{o}}rn Tackmann},
  title        = {Robust Authenticated Encryption and the Limits of Symmetric Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {893},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/893},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Badertscher0MRT15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CorettiDTV15,
  author       = {Sandro Coretti and
                  Yevgeniy Dodis and
                  Bj{\"{o}}rn Tackmann and
                  Daniele Venturi},
  title        = {Non-Malleable Encryption: Simpler, Shorter, Stronger},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {772},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/772},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CorettiDTV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DemayGMT15,
  author       = {Gr{\'{e}}gory Demay and
                  Peter Gazi and
                  Ueli Maurer and
                  Bj{\"{o}}rn Tackmann},
  title        = {Query-Complexity Amplification for Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {315},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/315},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DemayGMT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GarayKTZ15,
  author       = {Juan A. Garay and
                  Jonathan Katz and
                  Bj{\"{o}}rn Tackmann and
                  Vassilis Zikas},
  title        = {How Fair is Your Protocol? {A} Utility-based Approach to Protocol
                  Optimality},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {187},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/187},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GarayKTZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GarayTZ15,
  author       = {Juan A. Garay and
                  Bj{\"{o}}rn Tackmann and
                  Vassilis Zikas},
  title        = {Fair Distributed Computation of Reactive Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {807},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/807},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GarayTZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/DemayGMT14,
  author       = {Gr{\'{e}}gory Demay and
                  Peter Gazi and
                  Ueli Maurer and
                  Bj{\"{o}}rn Tackmann},
  title        = {Optimality of non-adaptive strategies: The case of parallel games},
  booktitle    = {2014 {IEEE} International Symposium on Information Theory, Honolulu,
                  HI, USA, June 29 - July 4, 2014},
  pages        = {1707--1711},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISIT.2014.6875125},
  doi          = {10.1109/ISIT.2014.6875125},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/DemayGMT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CorettiMTV14,
  author       = {Sandro Coretti and
                  Ueli Maurer and
                  Bj{\"{o}}rn Tackmann and
                  Daniele Venturi},
  title        = {From Single-Bit to Multi-Bit Public-Key Encryption via Non-Malleable
                  Codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {324},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/324},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CorettiMTV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DemayGMT14,
  author       = {Gr{\'{e}}gory Demay and
                  Peter Gazi and
                  Ueli Maurer and
                  Bj{\"{o}}rn Tackmann},
  title        = {Optimality of Non-Adaptive Strategies: The Case of Parallel Games},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {299},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/299},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DemayGMT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KohlweissMOTV14,
  author       = {Markulf Kohlweiss and
                  Ueli Maurer and
                  Cristina Onete and
                  Bj{\"{o}}rn Tackmann and
                  Daniele Venturi},
  title        = {(De-)Constructing {TLS}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {20},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/020},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KohlweissMOTV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/CorettiMT13,
  author       = {Sandro Coretti and
                  Ueli Maurer and
                  Bj{\"{o}}rn Tackmann},
  editor       = {Kazue Sako and
                  Palash Sarkar},
  title        = {Constructing Confidential Channels from Authenticated Channels - Public-Key
                  Encryption Revisited},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Bengaluru, India, December 1-5, 2013, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8269},
  pages        = {134--153},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-42033-7\_8},
  doi          = {10.1007/978-3-642-42033-7\_8},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/CorettiMT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/CorettiMT13,
  author       = {Sandro Coretti and
                  Ueli Maurer and
                  Bj{\"{o}}rn Tackmann},
  editor       = {Marc Fischlin and
                  Stefan Katzenbeisser},
  title        = {A Constructive Perspective on Key Encapsulation},
  booktitle    = {Number Theory and Cryptography - Papers in Honor of Johannes Buchmann
                  on the Occasion of His 60th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {8260},
  pages        = {226--239},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-42001-6\_16},
  doi          = {10.1007/978-3-642-42001-6\_16},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/CorettiMT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/GarayKMTZ13,
  author       = {Juan A. Garay and
                  Jonathan Katz and
                  Ueli Maurer and
                  Bj{\"{o}}rn Tackmann and
                  Vassilis Zikas},
  title        = {Rational Protocol Design: Cryptography against Incentive-Driven Adversaries},
  booktitle    = {54th Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS}
                  2013, 26-29 October, 2013, Berkeley, CA, {USA}},
  pages        = {648--657},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/FOCS.2013.75},
  doi          = {10.1109/FOCS.2013.75},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/GarayKMTZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/KohlweissMOTV13,
  author       = {Markulf Kohlweiss and
                  Ueli Maurer and
                  Cristina Onete and
                  Bj{\"{o}}rn Tackmann and
                  Daniele Venturi},
  editor       = {Emiliano De Cristofaro and
                  Matthew K. Wright},
  title        = {Anonymity-Preserving Public-Key Encryption: {A} Constructive Approach},
  booktitle    = {Privacy Enhancing Technologies - 13th International Symposium, {PETS}
                  2013, Bloomington, IN, USA, July 10-12, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7981},
  pages        = {19--39},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39077-7\_2},
  doi          = {10.1007/978-3-642-39077-7\_2},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/KohlweissMOTV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/KatzMTZ13,
  author       = {Jonathan Katz and
                  Ueli Maurer and
                  Bj{\"{o}}rn Tackmann and
                  Vassilis Zikas},
  editor       = {Amit Sahai},
  title        = {Universally Composable Synchronous Computation},
  booktitle    = {Theory of Cryptography - 10th Theory of Cryptography Conference, {TCC}
                  2013, Tokyo, Japan, March 3-6, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7785},
  pages        = {477--498},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36594-2\_27},
  doi          = {10.1007/978-3-642-36594-2\_27},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/KatzMTZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CorettiMT13,
  author       = {Sandro Coretti and
                  Ueli Maurer and
                  Bj{\"{o}}rn Tackmann},
  title        = {Constructing Confidential Channels from Authenticated Channels - Public-Key
                  Encryption Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {719},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/719},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CorettiMT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GarayKMTZ13,
  author       = {Juan A. Garay and
                  Jonathan Katz and
                  Ueli Maurer and
                  Bj{\"{o}}rn Tackmann and
                  Vassilis Zikas},
  title        = {Rational Protocol Design: Cryptography Against Incentive-driven Adversaries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {496},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/496},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GarayKMTZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KohlweissMOTV13,
  author       = {Markulf Kohlweiss and
                  Ueli Maurer and
                  Cristina Onete and
                  Bj{\"{o}}rn Tackmann and
                  Daniele Venturi},
  title        = {Anonymity-preserving Public-Key Encryption: {A} Constructive Approach},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {238},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/238},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KohlweissMOTV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaurerTC13,
  author       = {Ueli Maurer and
                  Bj{\"{o}}rn Tackmann and
                  Sandro Coretti},
  title        = {Key Exchange with Unilateral Authentication: Composable Security Definition
                  and Modular Protocol Design},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {555},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/555},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaurerTC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/MaurerT12,
  author       = {Ueli Maurer and
                  Bj{\"{o}}rn Tackmann},
  title        = {Synchrony amplification},
  booktitle    = {Proceedings of the 2012 {IEEE} International Symposium on Information
                  Theory, {ISIT} 2012, Cambridge, MA, USA, July 1-6, 2012},
  pages        = {1583--1587},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ISIT.2012.6283540},
  doi          = {10.1109/ISIT.2012.6283540},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/MaurerT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/MaurerRT12,
  author       = {Ueli Maurer and
                  Andreas R{\"{u}}edlinger and
                  Bj{\"{o}}rn Tackmann},
  editor       = {Ronald Cramer},
  title        = {Confidentiality and Integrity: {A} Constructive Perspective},
  booktitle    = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC}
                  2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7194},
  pages        = {209--229},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28914-9\_12},
  doi          = {10.1007/978-3-642-28914-9\_12},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/MaurerRT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KatzMTZ11,
  author       = {Jonathan Katz and
                  Ueli Maurer and
                  Bj{\"{o}}rn Tackmann and
                  Vassilis Zikas},
  title        = {Universally Composable Synchronous Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {310},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/310},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KatzMTZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MaurerT10,
  author       = {Ueli Maurer and
                  Bj{\"{o}}rn Tackmann},
  editor       = {Ehab Al{-}Shaer and
                  Angelos D. Keromytis and
                  Vitaly Shmatikov},
  title        = {On the soundness of authenticate-then-encrypt: formalizing the malleability
                  of symmetric encryption},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010},
  pages        = {505--515},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866307.1866364},
  doi          = {10.1145/1866307.1866364},
  timestamp    = {Tue, 10 Nov 2020 20:00:21 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MaurerT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}