Sebastian Faust

From MaRDI portal
Person:290393

Available identifiers

zbMath Open faust.sebastianMaRDI QIDQ290393

List of research outcomes





PublicationDate of PublicationType
Round efficient Byzantine agreement from VDFs2025-01-10Paper
Shared-custodial password-authenticated deterministic wallets2025-01-10Paper
Connecting leakage-resilient secret sharing to practice: scaling trends and physical dependencies of prime field masking2024-11-13Paper
From random probing to noisy leakages without field-size dependence2024-11-13Paper
Individual cryptography2024-02-02Paper
Combined fault and leakage resilience: composability, constructions and compiler2024-02-02Paper
Putting the online phase on a diet: covert security from short MACs2023-10-04Paper
Continuously non-malleable codes against bounded-depth tampering2023-08-21Paper
Financially backed covert security2023-08-10Paper
On the related-key attack security of authenticated encryption schemes2023-07-25Paper
Generalized channels from limited blockchain scripts and adaptor signatures2023-05-12Paper
Towards tight random probing security2022-04-22Paper
Two-party adaptor signatures from identification schemes2021-12-21Paper
Generic compiler for publicly verifiable covert multi-party computation2021-12-08Paper
Continuously non-malleable codes in the split-state model2020-11-06Paper
Simple refreshing in the noisy leakage model2020-05-11Paper
Multi-party virtual state channels2020-02-04Paper
Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version2019-11-27Paper
Unifying leakage models: from probing attacks to noisy leakage2019-01-29Paper
Amortizing randomness complexity in private circuits2018-04-06Paper
Consolidating inner product masking2018-04-06Paper
Position-based cryptography and multiparty communication complexity2018-01-19Paper
Non-malleable codes for space-bounded tampering2017-11-15Paper
Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model2017-06-13Paper
Efficient Non-Malleable Codes and Key Derivation for Poly-Size Tampering Circuits2017-04-28Paper
Bounded tamper resilience: how to go beyond the algebraic barrier2017-03-02Paper
Towards sound fresh re-keying with hard (physical) learning problems2016-10-27Paper
Circuit compilers with \(O(1/\log (n))\) leakage rate2016-07-15Paper
Signature schemes secure against hard-to-invert leakage2016-06-01Paper
Chosen-ciphertext security from subset sum2016-04-13Paper
Optimal amplification of noisy leakages2016-04-08Paper
Efficient leakage resilient circuit compilers2016-03-02Paper
Proofs of space2015-12-10Paper
Making Masking Security Proofs Concrete2015-09-30Paper
Noisy leakage revisited2015-09-30Paper
Inner product masking revisited2015-09-30Paper
The Chaining Lemma and its application2015-09-24Paper
A tamper and leakage resilient von Neumann architecture2015-08-27Paper
Protecting circuits from computationally bounded and noisy leakage2015-02-09Paper
On the Non-malleability of the Fiat-Shamir Transform2014-08-20Paper
Efficient non-malleable codes and key-derivation for poly-size tampering circuits2014-05-27Paper
Unifying leakage models: from probing attacks to noisy leakage.2014-05-27Paper
Continuous non-malleable codes2014-02-18Paper
Bounded tamper resilience: how to go beyond the algebraic barrier2013-12-10Paper
Outsourced pattern matching2013-08-07Paper
Theory and practice of a leakage resilient masking scheme2013-03-19Paper
Signature schemes secure against hard-to-invert leakage2013-03-19Paper
Practical leakage-resilient symmetric cryptography2012-11-13Paper
Leakage-resilient circuits without computational assumptions2012-06-15Paper
Secure two-party computation with low communication2012-06-15Paper
Leakage-resilient cryptography from the inner-product extractor2011-12-02Paper
Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience2011-07-06Paper
Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases2010-06-01Paper
Leakage-resilient signatures2010-02-24Paper
Efficient Negative Databases from Cryptographic Hash Functions2008-06-24Paper
Efficient Simultaneous Broadcast2008-03-05Paper

Research outcomes over time

This page was built for person: Sebastian Faust