Sebastian Faust

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
IP masking with generic security guarantees under minimum assumptions, and applications2026-03-31Paper
Round efficient Byzantine agreement from VDFs2025-01-10Paper
Shared-custodial password-authenticated deterministic wallets2025-01-10Paper
Connecting leakage-resilient secret sharing to practice: scaling trends and physical dependencies of prime field masking2024-11-13Paper
From random probing to noisy leakages without field-size dependence2024-11-13Paper
Individual cryptography
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
Combined fault and leakage resilience: composability, constructions and compiler
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
Putting the online phase on a diet: covert security from short MACs
Topics in Cryptology – CT-RSA 2023
2023-10-04Paper
Continuously non-malleable codes against bounded-depth tampering
Advances in Cryptology – ASIACRYPT 2022
2023-08-21Paper
Financially backed covert security
Public-Key Cryptography – PKC 2022
2023-08-10Paper
On the related-key attack security of authenticated encryption schemes
Lecture Notes in Computer Science
2023-07-25Paper
Generalized channels from limited blockchain scripts and adaptor signatures
Lecture Notes in Computer Science
2023-05-12Paper
Towards tight random probing security2022-04-22Paper
Two-party adaptor signatures from identification schemes2021-12-21Paper
Generic compiler for publicly verifiable covert multi-party computation2021-12-08Paper
Continuously non-malleable codes in the split-state model
Journal of Cryptology
2020-11-06Paper
Simple refreshing in the noisy leakage model2020-05-11Paper
Multi-party virtual state channels2020-02-04Paper
Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version
Journal of Cryptology
2019-11-27Paper
Unifying leakage models: from probing attacks to noisy leakage
Journal of Cryptology
2019-01-29Paper
Amortizing randomness complexity in private circuits2018-04-06Paper
Consolidating inner product masking2018-04-06Paper
Position-based cryptography and multiparty communication complexity2018-01-19Paper
Non-malleable codes for space-bounded tampering2017-11-15Paper
Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model
Lecture Notes in Computer Science
2017-06-13Paper
Efficient Non-Malleable Codes and Key Derivation for Poly-Size Tampering Circuits
IEEE Transactions on Information Theory
2017-04-28Paper
Bounded tamper resilience: how to go beyond the algebraic barrier
Journal of Cryptology
2017-03-02Paper
Towards sound fresh re-keying with hard (physical) learning problems
Advances in Cryptology – CRYPTO 2016
2016-10-27Paper
Circuit compilers with \(O(1/\log (n))\) leakage rate
Advances in Cryptology – EUROCRYPT 2016
2016-07-15Paper
Signature schemes secure against hard-to-invert leakage
Journal of Cryptology
2016-06-01Paper
Chosen-ciphertext security from subset sum
Public-Key Cryptography – PKC 2016
2016-04-13Paper
Optimal amplification of noisy leakages
Theory of Cryptography
2016-04-08Paper
Efficient leakage resilient circuit compilers
Lecture Notes in Computer Science
2016-03-02Paper
Proofs of space
Lecture Notes in Computer Science
2015-12-10Paper
Making Masking Security Proofs Concrete
Advances in Cryptology -- EUROCRYPT 2015
2015-09-30Paper
Noisy leakage revisited
Advances in Cryptology - EUROCRYPT 2015
2015-09-30Paper
Inner product masking revisited
Advances in Cryptology -- EUROCRYPT 2015
2015-09-30Paper
The Chaining Lemma and its application
Lecture Notes in Computer Science
2015-09-24Paper
A tamper and leakage resilient von Neumann architecture
Lecture Notes in Computer Science
2015-08-27Paper
Protecting circuits from computationally bounded and noisy leakage
SIAM Journal on Computing
2015-02-09Paper
On the Non-malleability of the Fiat-Shamir Transform
Lecture Notes in Computer Science
2014-08-20Paper
Efficient non-malleable codes and key-derivation for poly-size tampering circuits
Advances in Cryptology – EUROCRYPT 2014
2014-05-27Paper
Unifying leakage models: from probing attacks to noisy leakage.
Advances in Cryptology – EUROCRYPT 2014
2014-05-27Paper
Continuous non-malleable codes
Theory of Cryptography
2014-02-18Paper
Bounded tamper resilience: how to go beyond the algebraic barrier
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
Outsourced pattern matching
Automata, Languages, and Programming
2013-08-07Paper
Theory and practice of a leakage resilient masking scheme
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
Signature schemes secure against hard-to-invert leakage
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
Practical leakage-resilient symmetric cryptography
Cryptographic Hardware and Embedded Systems – CHES 2012
2012-11-13Paper
Leakage-resilient circuits without computational assumptions
Theory of Cryptography
2012-06-15Paper
Secure two-party computation with low communication
Theory of Cryptography
2012-06-15Paper
Leakage-resilient cryptography from the inner-product extractor
Lecture Notes in Computer Science
2011-12-02Paper
Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience
Automata, Languages and Programming
2011-07-06Paper
Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases
Advances in Cryptology – EUROCRYPT 2010
2010-06-01Paper
Leakage-resilient signatures
Theory of Cryptography
2010-02-24Paper
Efficient Negative Databases from Cryptographic Hash Functions
Lecture Notes in Computer Science
2008-06-24Paper
Efficient Simultaneous Broadcast
Public key cryptography -- PKC 2008. 11th international workshop on practice and theory in public-key cryptography, Barcelona, Spain, March 9--12, 2008. Proceedings
2008-03-05Paper


Research outcomes over time


This page was built for person: Sebastian Faust