Thomas Ristenpart

From MaRDI portal
Person:1673387

Available identifiers

zbMath Open ristenpart.thomasMaRDI QIDQ1673387

List of research outcomes





PublicationDate of PublicationType
Is ML-based cryptanalysis inherently limited? Simulating cryptographic adversaries via gradient-based methods2024-12-13Paper
Context discovery and commitment attacks. How to break CCM, EAX, SIV, and more2023-12-08Paper
Authenticated encryption with key identification2023-08-25Paper
A fast and simple partially oblivious PRF, with applications2022-08-30Paper
Asymmetric message franking: content moderation for metadata-private end-to-end encryption2020-03-09Paper
Fast message franking: from invisible salamanders to encryptment2018-09-12Paper
A new distribution-sensitive secure sketch and popularity-proportional hashing2017-10-27Paper
Message franking via committing authenticated encryption2017-10-27Paper
Key rotation for authenticated encryption2017-10-27Paper
Modifying an enciphering scheme after deployment2017-06-13Paper
Honey Encryption Beyond Message Recovery Security2016-09-09Paper
A formal treatment of backdoored pseudorandom generators2015-09-30Paper
Honey encryption: security beyond the brute-force bound2014-05-27Paper
The mix-and-cut shuffle: small-domain encryption secure against \(N\) queries2013-09-02Paper
Message-locked encryption and secure deduplication2013-05-31Paper
Multi-instance security and its application to password-based cryptography2012-09-25Paper
To hash or not to hash again? (In)differentiability results for \(H^2\) and HMAC2012-09-25Paper
Randomness condensers for efficiently samplable, seed-dependent sources2012-06-15Paper
Tag size does matter: attacks and proofs for the TLS record protocol2011-12-02Paper
Careful with composition: limitations of the indifferentiability framework2011-05-27Paper
Random oracles with(out) programmability2010-12-07Paper
Hedged public-key encryption: how to protect against bad randomness2009-12-15Paper
Format-preserving encryption2009-12-09Paper
Salvaging Merkle-Damgård for Practical Applications2009-05-12Paper
Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE Scheme2009-05-12Paper
Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles2009-02-10Paper
How to Enrich the Message Space of a Cipher2008-09-16Paper
How to Build a Hash Function from Any Collision-Resistant Function2008-05-15Paper
Multi-Property-Preserving Hash Domain Extension and the EMD Transform2008-04-24Paper
The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks2007-11-29Paper
Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms2007-11-28Paper

Research outcomes over time

This page was built for person: Thomas Ristenpart