Marc Fischlin

From MaRDI portal
Revision as of 17:01, 9 December 2023 by AuthorDisambiguator (talk | contribs) (AuthorDisambiguator moved page Marc Fischlin to Marc Fischlin: Duplicate)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Person:744341

Available identifiers

zbMath Open fischlin.marcMaRDI QIDQ744341

List of research outcomes





PublicationDate of PublicationType
Integrating causality in messaging channels2024-11-13Paper
Searching for ELFs in the cryptographic forest2024-08-02Paper
The indifferentiability of the duplex and its practical applications2024-06-26Paper
Robust channels: handling unreliable networks in the record layers of QUIC and DTLS 1.32024-03-11Paper
Nostradamus goes quantum2023-08-25Paper
Signatures and Security Notions2023-08-04Paper
A random oracle for all of us2023-06-02Paper
Cryptographic analysis of the Bluetooth secure connection protocol suite2023-05-12Paper
Security reductions for white-box key-storage in mobile payments2023-03-21Paper
Information-Theoretic Security of Cryptographic Channels2022-12-21Paper
Zero round-trip time for the extended access control protocol2022-08-25Paper
Multipath TLS 1.32022-06-24Paper
Towards post-quantum security for signal's X3DH handshake2022-03-25Paper
The theory of hash functions and random oracles. An approach to modern cryptography2022-03-08Paper
Single-to-multi-theorem transformations for non-interactive statistical zero-knowledge2021-12-21Paper
Signatures from sequential-OR proofs2021-12-01Paper
A cryptographic analysis of the TLS 1.3 handshake protocol2021-09-10Paper
On the memory fault resilience of TLS 1.32021-07-06Paper
Modeling memory faults in signature and authenticated encryption schemes2020-08-05Paper
Hybrid key encapsulation mechanisms and authenticated key exchange2020-02-25Paper
How to sign with white-boxed AES2020-01-14Paper
Simulatable channels: extended security that is universally composable and easier to prove2019-01-23Paper
Invisible sanitizable signatures and public-key encryption are equivalent2018-08-10Paper
PRF-ODH: relations, instantiations, and impossibility results2017-10-27Paper
Redactable graph hashing, revisited (extended abstract)2017-08-25Paper
Obfuscation Combiners2016-10-27Paper
On the Hardness of Proving CCA-Security of Signed ElGamal2016-04-13Paper
Data Is a Stream: Security of Stream-Based Channels2015-12-10Paper
Privately Computing Set-Union and Set-Intersection Cardinality via Bloom Filters2015-10-20Paper
Adaptive Proofs of Knowledge in the Random Oracle Model2015-08-27Paper
Robust multi-property combiners for hash functions2014-09-25Paper
Trapdoors and weaknesses in the cryptographic standard SP 800-90A2014-07-04Paper
The Fiat–Shamir Transformation in a Quantum World2013-12-10Paper
Notions of Black-Box Reductions, Revisited2013-12-10Paper
Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions2013-05-31Paper
Limitations of the Meta-reduction Technique: The Case of Schnorr Signatures2013-05-31Paper
History-Free Sequential Aggregate Signatures2012-09-25Paper
Black-Box Reductions and Separations in Cryptography2012-07-23Paper
https://portal.mardi4nfdi.de/entity/Q32243332012-03-30Paper
Random Oracles in a Quantum World2011-12-02Paper
Non-interactive and Re-usable Universally Composable String Commitments with Adaptive Security2011-12-02Paper
Security of blind signatures under aborts and applications to adaptive oblivious transfer2011-11-15Paper
Random Oracle Reducibility2011-08-12Paper
Physically Uncloneable Functions in the Universal Composition Framework2011-08-12Paper
Efficient non-malleable commitment schemes2011-04-01Paper
Secure Set Intersection with Untrusted Hardware Tokens2011-02-11Paper
Expedient Non-malleability Notions for Hash Functions2011-02-11Paper
Random Oracles with(out) Programmability2010-12-07Paper
History-Free Aggregate Message Authentication Codes2010-09-10Paper
Redactable Signatures for Tree-Structured Data: Definitions and Constructions2010-07-06Paper
On the Impossibility of Three-Move Blind Signature Schemes2010-06-01Paper
Unlinkability of Sanitizable Signatures2010-05-28Paper
Confidential Signatures and Deterministic Signcryption2010-05-28Paper
Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions2010-05-04Paper
Hash Function Combiners in TLS and SSL2010-03-16Paper
Delayed-Key Message Authentication for Streams2010-02-24Paper
Foundations of Non-malleable Hash and One-Way Functions2009-12-15Paper
Efficient non-malleable commitment schemes2009-11-13Paper
Security Analysis of the PACE Key-Agreement Protocol2009-09-29Paper
Topics in Cryptology – CT-RSA 20042009-05-07Paper
Security of Sanitizable Signatures Revisited2009-03-24Paper
Security of Blind Signatures under Aborts2009-03-24Paper
Security-Amplifying Combiners for Collision-Resistant Hash Functions2009-03-10Paper
Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles2009-02-10Paper
Robust Multi-property Combiners for Hash Functions Revisited2008-08-19Paper
Security of NMAC and HMAC Based on Non-malleability2008-04-24Paper
On the Security of OAEP2008-04-24Paper
Communication-Efficient Non-interactive Proofs of Knowledge with Online Extractors2008-03-17Paper
Analysis of Random Oracle Instantiation Scenarios for OAEP and Other Practical Schemes2008-03-17Paper
Multi-property Preserving Combiners for Hash Functions2008-03-05Paper
Progress in Cryptology - INDOCRYPT 20032007-11-29Paper
Anonymous Signatures Made Easy2007-09-04Paper
A Closer Look at PKI: Security and Efficiency2007-09-04Paper
Round-Optimal Composable Blind Signatures in the Common Reference String Model2007-09-04Paper
Topics in Cryptology – CT-RSA 20062007-02-12Paper
Automata, Languages and Programming2006-01-10Paper
https://portal.mardi4nfdi.de/entity/Q44720672004-08-03Paper
https://portal.mardi4nfdi.de/entity/Q44720682004-08-03Paper
The Cramer-Shoup Strong-RSA Signature Scheme Revisited2003-07-27Paper
https://portal.mardi4nfdi.de/entity/Q47837172002-12-08Paper
https://portal.mardi4nfdi.de/entity/Q45368162002-10-07Paper
https://portal.mardi4nfdi.de/entity/Q31496762002-09-30Paper
https://portal.mardi4nfdi.de/entity/Q27074402002-03-06Paper
Cryptographic limitations on parallelizing membership and equivalence queries with applications to random-self-reductions2002-03-03Paper
https://portal.mardi4nfdi.de/entity/Q27244632001-09-10Paper
https://portal.mardi4nfdi.de/entity/Q45014912000-09-04Paper
https://portal.mardi4nfdi.de/entity/Q42507792000-03-07Paper
https://portal.mardi4nfdi.de/entity/Q42470031999-06-16Paper

Research outcomes over time

This page was built for person: Marc Fischlin