Thomas Ristenpart

From MaRDI portal
(Redirected from Person:1673387)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Is ML-based cryptanalysis inherently limited? Simulating cryptographic adversaries via gradient-based methods2024-12-13Paper
Context discovery and commitment attacks. How to break CCM, EAX, SIV, and more
Advances in Cryptology – EUROCRYPT 2023
2023-12-08Paper
Authenticated encryption with key identification
Advances in Cryptology – ASIACRYPT 2022
2023-08-25Paper
A fast and simple partially oblivious PRF, with applications2022-08-30Paper
Asymmetric message franking: content moderation for metadata-private end-to-end encryption2020-03-09Paper
Fast message franking: from invisible salamanders to encryptment2018-09-12Paper
A new distribution-sensitive secure sketch and popularity-proportional hashing2017-10-27Paper
Message franking via committing authenticated encryption2017-10-27Paper
Key rotation for authenticated encryption2017-10-27Paper
Modifying an enciphering scheme after deployment
Lecture Notes in Computer Science
2017-06-13Paper
Honey Encryption Beyond Message Recovery Security
Advances in Cryptology – EUROCRYPT 2016
2016-09-09Paper
A formal treatment of backdoored pseudorandom generators
Advances in Cryptology -- EUROCRYPT 2015
2015-09-30Paper
Honey encryption: security beyond the brute-force bound
Advances in Cryptology – EUROCRYPT 2014
2014-05-27Paper
The mix-and-cut shuffle: small-domain encryption secure against \(N\) queries
Advances in Cryptology – CRYPTO 2013
2013-09-02Paper
Message-locked encryption and secure deduplication
Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
2013-05-31Paper
Multi-instance security and its application to password-based cryptography
Lecture Notes in Computer Science
2012-09-25Paper
To hash or not to hash again? (In)differentiability results for \(H^2\) and HMAC
Lecture Notes in Computer Science
2012-09-25Paper
Randomness condensers for efficiently samplable, seed-dependent sources
Theory of Cryptography
2012-06-15Paper
Tag size does matter: attacks and proofs for the TLS record protocol
Lecture Notes in Computer Science
2011-12-02Paper
Careful with composition: limitations of the indifferentiability framework
Advances in Cryptology – EUROCRYPT 2011
2011-05-27Paper
Random oracles with(out) programmability
Advances in Cryptology - ASIACRYPT 2010
2010-12-07Paper
Hedged public-key encryption: how to protect against bad randomness
Advances in Cryptology – ASIACRYPT 2009
2009-12-15Paper
Format-preserving encryption
Selected Areas in Cryptography
2009-12-09Paper
Salvaging Merkle-Damgård for Practical Applications
Advances in Cryptology - EUROCRYPT 2009
2009-05-12Paper
Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE Scheme
Advances in Cryptology - EUROCRYPT 2009
2009-05-12Paper
Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles
Lecture Notes in Computer Science
2009-02-10Paper
How to Enrich the Message Space of a Cipher
Fast Software Encryption
2008-09-16Paper
How to Build a Hash Function from Any Collision-Resistant Function
Advances in Cryptology – ASIACRYPT 2007
2008-05-15Paper
Multi-Property-Preserving Hash Domain Extension and the EMD Transform
Advances in Cryptology – ASIACRYPT 2006
2008-04-24Paper
The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks
Advances in Cryptology - EUROCRYPT 2007
2007-11-29Paper
Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms
Automata, Languages and Programming
2007-11-28Paper


Research outcomes over time


This page was built for person: Thomas Ristenpart