Sebastian Faust

From MaRDI portal
Person:290393

Available identifiers

zbMath Open faust.sebastianMaRDI QIDQ290393

List of research outcomes





PublicationDate of PublicationType
Round efficient Byzantine agreement from VDFs2025-01-10Paper
Shared-custodial password-authenticated deterministic wallets2025-01-10Paper
Connecting leakage-resilient secret sharing to practice: scaling trends and physical dependencies of prime field masking2024-11-13Paper
From random probing to noisy leakages without field-size dependence2024-11-13Paper
Individual cryptography2024-02-02Paper
Combined fault and leakage resilience: composability, constructions and compiler2024-02-02Paper
Putting the online phase on a diet: covert security from short MACs2023-10-04Paper
Continuously non-malleable codes against bounded-depth tampering2023-08-21Paper
Financially backed covert security2023-08-10Paper
On the related-key attack security of authenticated encryption schemes2023-07-25Paper
Generalized channels from limited blockchain scripts and adaptor signatures2023-05-12Paper
Towards tight random probing security2022-04-22Paper
Two-party adaptor signatures from identification schemes2021-12-21Paper
Generic compiler for publicly verifiable covert multi-party computation2021-12-08Paper
Continuously non-malleable codes in the split-state model2020-11-06Paper
Simple refreshing in the noisy leakage model2020-05-11Paper
Multi-party virtual state channels2020-02-04Paper
Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version2019-11-27Paper
Unifying leakage models: from probing attacks to noisy leakage2019-01-29Paper
Amortizing randomness complexity in private circuits2018-04-06Paper
Consolidating inner product masking2018-04-06Paper
Position-based cryptography and multiparty communication complexity2018-01-19Paper
Non-malleable codes for space-bounded tampering2017-11-15Paper
Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model2017-06-13Paper
Efficient Non-Malleable Codes and Key Derivation for Poly-Size Tampering Circuits2017-04-28Paper
Bounded tamper resilience: how to go beyond the algebraic barrier2017-03-02Paper
Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems2016-10-27Paper
Circuit Compilers with $$O(1/\log (n))$$ O ( 1 / log ( n ) ) Leakage Rate2016-07-15Paper
Signature schemes secure against hard-to-invert leakage2016-06-01Paper
Chosen-Ciphertext Security from Subset Sum2016-04-13Paper
Optimal Amplification of Noisy Leakages2016-04-08Paper
Efficient Leakage Resilient Circuit Compilers2016-03-02Paper
Proofs of Space2015-12-10Paper
Making Masking Security Proofs Concrete2015-09-30Paper
Noisy Leakage Revisited2015-09-30Paper
Inner Product Masking Revisited2015-09-30Paper
The Chaining Lemma and Its Application2015-09-24Paper
A Tamper and Leakage Resilient von Neumann Architecture2015-08-27Paper
Protecting Circuits from Computationally Bounded and Noisy Leakage2015-02-09Paper
On the Non-malleability of the Fiat-Shamir Transform2014-08-20Paper
Efficient Non-malleable Codes and Key-Derivation for Poly-size Tampering Circuits2014-05-27Paper
Unifying Leakage Models: From Probing Attacks to Noisy Leakage.2014-05-27Paper
Continuous Non-malleable Codes2014-02-18Paper
Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier2013-12-10Paper
Outsourced Pattern Matching2013-08-07Paper
Theory and Practice of a Leakage Resilient Masking Scheme2013-03-19Paper
Signature Schemes Secure against Hard-to-Invert Leakage2013-03-19Paper
Practical Leakage-Resilient Symmetric Cryptography2012-11-13Paper
Leakage-Resilient Circuits without Computational Assumptions2012-06-15Paper
Secure Two-Party Computation with Low Communication2012-06-15Paper
Leakage-Resilient Cryptography from the Inner-Product Extractor2011-12-02Paper
Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience2011-07-06Paper
Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases2010-06-01Paper
Leakage-Resilient Signatures2010-02-24Paper
Efficient Negative Databases from Cryptographic Hash Functions2008-06-24Paper
Efficient Simultaneous Broadcast2008-03-05Paper

Research outcomes over time

This page was built for person: Sebastian Faust