BibTeX records: Marc Fischlin

download as .bib file

@article{DBLP:journals/joc/FischlinGJ24,
  author       = {Marc Fischlin and
                  Felix G{\"{u}}nther and
                  Christian Janson},
  title        = {Robust Channels: Handling Unreliable Networks in the Record Layers
                  of {QUIC} and {DTLS} 1.3},
  journal      = {J. Cryptol.},
  volume       = {37},
  number       = {2},
  pages        = {9},
  year         = {2024},
  url          = {https://doi.org/10.1007/s00145-023-09489-9},
  doi          = {10.1007/S00145-023-09489-9},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joc/FischlinGJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/LinsnerDFR24,
  author       = {Sebastian Linsner and
                  Kilian Demuth and
                  Marc Fischlin and
                  Christian Reuter},
  title        = {Decision-based Data Distribution (D{\({^3}\)}): Enabling Users to
                  Minimize Data Propagation in Privacy-sensitive Scenarios},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2024},
  number       = {4},
  pages        = {185--208},
  year         = {2024},
  url          = {https://doi.org/10.56553/popets-2024-0113},
  doi          = {10.56553/POPETS-2024-0113},
  timestamp    = {Thu, 18 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/LinsnerDFR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/ChenF24,
  author       = {Shan Chen and
                  Marc Fischlin},
  editor       = {Marc Joye and
                  Gregor Leander},
  title        = {Integrating Causality in Messaging Channels},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14653},
  pages        = {251--282},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-58734-4\_9},
  doi          = {10.1007/978-3-031-58734-4\_9},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/ChenF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenF24,
  author       = {Shan Chen and
                  Marc Fischlin},
  title        = {Integrating Causality in Messaging Channels},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {362},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/362},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DuzluFF24,
  author       = {Samed D{\"{u}}zl{\"{u}} and
                  Rune Fiedler and
                  Marc Fischlin},
  title        = {BUFFing {FALCON} without Increasing the Signature Size},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {710},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/710},
  timestamp    = {Wed, 29 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DuzluFF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FischlinS24,
  author       = {Marc Fischlin and
                  Olga Sanina},
  title        = {Fake It till You Make It: Enhancing Security of Bluetooth Secure Connections
                  via Deferrable Authentication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {874},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/874},
  timestamp    = {Mon, 01 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FischlinS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DegabrieleFG23,
  author       = {Jean Paul Degabriele and
                  Marc Fischlin and
                  J{\'{e}}r{\^{o}}me Govinden},
  editor       = {Jian Guo and
                  Ron Steinfeld},
  title        = {The Indifferentiability of the Duplex and Its Practical Applications},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Guangzhou, China, December 4-8, 2023, Proceedings, Part {VIII}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14445},
  pages        = {237--269},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8742-9\_8},
  doi          = {10.1007/978-981-99-8742-9\_8},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/DegabrieleFG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Fischlin23,
  author       = {Marc Fischlin},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {Stealth Key Exchange and Confined Access to the Record Protocol Data
                  in {TLS} 1.3},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {2901--2914},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3623099},
  doi          = {10.1145/3576915.3623099},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Fischlin23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Fischlin023,
  author       = {Marc Fischlin and
                  Felix G{\"{u}}nther},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {Verifiable Verification in Cryptographic Protocols},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {3239--3253},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3623151},
  doi          = {10.1145/3576915.3623151},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Fischlin023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/FischlinHMMWB23,
  author       = {Marc Fischlin and
                  Jonas von der Heyden and
                  Marian Margraf and
                  Frank Morgner and
                  Andreas Wallner and
                  Holger Bock},
  editor       = {Felix G{\"{u}}nther and
                  Julia Hesse},
  title        = {Post-quantum Security for the Extended Access Control Protocol},
  booktitle    = {Security Standardisation Research - 8th International Conference,
                  {SSR} 2023, Lyon, France, April 22-23, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13895},
  pages        = {22--52},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30731-7\_2},
  doi          = {10.1007/978-3-031-30731-7\_2},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/FischlinHMMWB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/FischlinR23,
  author       = {Marc Fischlin and
                  Felix Rohrbach},
  editor       = {Guy N. Rothblum and
                  Hoeteck Wee},
  title        = {Searching for ELFs in the Cryptographic Forest},
  booktitle    = {Theory of Cryptography - 21st International Conference, {TCC} 2023,
                  Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part
                  {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14371},
  pages        = {207--236},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-48621-0\_8},
  doi          = {10.1007/978-3-031-48621-0\_8},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/FischlinR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-07623,
  author       = {Georgios M. Nikolopoulos and
                  Marc Fischlin},
  title        = {Quantum key distribution with post-processing driven by physical unclonable
                  functions},
  journal      = {CoRR},
  volume       = {abs/2302.07623},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.07623},
  doi          = {10.48550/ARXIV.2302.07623},
  eprinttype    = {arXiv},
  eprint       = {2302.07623},
  timestamp    = {Mon, 20 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-07623.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FischlinHMMWB23,
  author       = {Marc Fischlin and
                  Jonas von der Heyden and
                  Marian Margraf and
                  Frank Morgner and
                  Andreas Wallner and
                  Holger Bock},
  title        = {Post-Quantum Security for the Extended Access Control Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {352},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/352},
  timestamp    = {Fri, 31 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FischlinHMMWB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Fischlin23,
  author       = {Marc Fischlin},
  title        = {Stealth Key Exchange and Confined Access to the Record Protocol Data
                  in {TLS} 1.3},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {651},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/651},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Fischlin23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FischlinG23,
  author       = {Marc Fischlin and
                  Felix G{\"{u}}nther},
  title        = {Verifiable Verification in Cryptographic Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1214},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1214},
  timestamp    = {Fri, 08 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FischlinG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrendelCF23,
  author       = {Jacqueline Brendel and
                  Sebastian Clermont and
                  Marc Fischlin},
  title        = {Post-Quantum Asynchronous Remote Key Generation for {FIDO2} Account
                  Recovery},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1275},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1275},
  timestamp    = {Fri, 08 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrendelCF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FischlinR23,
  author       = {Marc Fischlin and
                  Felix Rohrbach},
  title        = {Searching for ELFs in the Cryptographic Forest},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1403},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1403},
  timestamp    = {Sat, 07 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FischlinR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/FischlinRS22,
  author       = {Marc Fischlin and
                  Felix Rohrbach and
                  Tobias Schmalz},
  editor       = {Lejla Batina and
                  Joan Daemen},
  title        = {A Random Oracle for All of Us},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2022: 13th International Conference
                  on Cryptology in Africa, {AFRICACRYPT} 2022, Fes, Morocco, July 18-20,
                  2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13503},
  pages        = {469--489},
  publisher    = {Springer Nature Switzerland},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17433-9\_20},
  doi          = {10.1007/978-3-031-17433-9\_20},
  timestamp    = {Sun, 10 Dec 2023 00:28:26 +0100},
  biburl       = {https://dblp.org/rec/conf/africacrypt/FischlinRS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BenediktFH22,
  author       = {Barbara Jiabao Benedikt and
                  Marc Fischlin and
                  Moritz Huppert},
  editor       = {Shweta Agrawal and
                  Dongdai Lin},
  title        = {Nostradamus Goes Quantum},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13793},
  pages        = {583--613},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22969-5\_20},
  doi          = {10.1007/978-3-031-22969-5\_20},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BenediktFH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FischlinRS22,
  author       = {Marc Fischlin and
                  Felix Rohrbach and
                  Tobias Schmalz},
  title        = {A Random Oracle for All of Us},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {906},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/906},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FischlinRS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BenediktFH22,
  author       = {Barbara Jiabao Benedikt and
                  Marc Fischlin and
                  Moritz Huppert},
  title        = {Nostradamus goes Quantum},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1213},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1213},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BenediktFH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/isc/MittelbachF21,
  author       = {Arno Mittelbach and
                  Marc Fischlin},
  title        = {The Theory of Hash Functions and Random Oracles - An Approach to Modern
                  Cryptography},
  series       = {Information Security and Cryptography},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-63287-8},
  doi          = {10.1007/978-3-030-63287-8},
  isbn         = {978-3-030-63286-1},
  timestamp    = {Fri, 29 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/isc/MittelbachF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/DowlingFGS21,
  author       = {Benjamin Dowling and
                  Marc Fischlin and
                  Felix G{\"{u}}nther and
                  Douglas Stebila},
  title        = {A Cryptographic Analysis of the {TLS} 1.3 Handshake Protocol},
  journal      = {J. Cryptol.},
  volume       = {34},
  number       = {4},
  pages        = {37},
  year         = {2021},
  url          = {https://doi.org/10.1007/s00145-021-09384-1},
  doi          = {10.1007/S00145-021-09384-1},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/DowlingFGS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/FischlinS21,
  author       = {Marc Fischlin and
                  Olga Sanina},
  editor       = {Mehdi Tibouchi and
                  Huaxiong Wang},
  title        = {Cryptographic Analysis of the Bluetooth Secure Connection Protocol
                  Suite},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 6-10, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13091},
  pages        = {696--725},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92075-3\_24},
  doi          = {10.1007/978-3-030-92075-3\_24},
  timestamp    = {Fri, 03 Dec 2021 17:36:49 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/FischlinS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/FischlinMMP21,
  author       = {Marc Fischlin and
                  Sven{-}Andr{\'{e}} M{\"{u}}ller and
                  Jean{-}Pierre M{\"{u}}nch and
                  Lars Porth},
  editor       = {Elisa Bertino and
                  Haya Schulmann and
                  Michael Waidner},
  title        = {Multipath {TLS} 1.3},
  booktitle    = {Computer Security - {ESORICS} 2021 - 26th European Symposium on Research
                  in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12973},
  pages        = {86--105},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-88428-4\_5},
  doi          = {10.1007/978-3-030-88428-4\_5},
  timestamp    = {Tue, 17 Oct 2023 10:41:56 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/FischlinMMP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FischlinR21,
  author       = {Marc Fischlin and
                  Felix Rohrbach},
  editor       = {Juan A. Garay},
  title        = {Single-to-Multi-theorem Transformations for Non-interactive Statistical
                  Zero-Knowledge},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12711},
  pages        = {205--234},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75248-4\_8},
  doi          = {10.1007/978-3-030-75248-4\_8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/FischlinR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/CremersDFFJ21,
  author       = {Cas Cremers and
                  Samed D{\"{u}}zl{\"{u}} and
                  Rune Fiedler and
                  Marc Fischlin and
                  Christian Janson},
  title        = {BUFFing signature schemes beyond unforgeability and the case of post-quantum
                  signatures},
  booktitle    = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco,
                  CA, USA, 24-27 May 2021},
  pages        = {1696--1714},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SP40001.2021.00093},
  doi          = {10.1109/SP40001.2021.00093},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/CremersDFFJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FischlinM21,
  author       = {Marc Fischlin and
                  Arno Mittelbach},
  title        = {An Overview of the Hybrid Argument},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {88},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/088},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FischlinM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FischlinS21,
  author       = {Marc Fischlin and
                  Olga Sanina},
  title        = {Cryptographic Analysis of the Bluetooth Secure Connection Protocol
                  Suite},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1597},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1597},
  timestamp    = {Thu, 13 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FischlinS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/NikolopoulosF20,
  author       = {Georgios M. Nikolopoulos and
                  Marc Fischlin},
  title        = {Information-Theoretically Secure Data Origin Authentication with Quantum
                  and Classical Resources},
  journal      = {Cryptogr.},
  volume       = {4},
  number       = {4},
  pages        = {31},
  year         = {2020},
  url          = {https://doi.org/10.3390/cryptography4040031},
  doi          = {10.3390/CRYPTOGRAPHY4040031},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/NikolopoulosF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BockBFJM20,
  author       = {Estuardo Alpirez Bock and
                  Chris Brzuska and
                  Marc Fischlin and
                  Christian Janson and
                  Wil Michiels},
  editor       = {Shiho Moriai and
                  Huaxiong Wang},
  title        = {Security Reductions for White-Box Key-Storage in Mobile Payments},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12491},
  pages        = {221--252},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64837-4\_8},
  doi          = {10.1007/978-3-030-64837-4\_8},
  timestamp    = {Thu, 10 Dec 2020 09:57:08 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BockBFJM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/GuilhemFW20,
  author       = {Cyprien Delpech de Saint Guilhem and
                  Marc Fischlin and
                  Bogdan Warinschi},
  title        = {Authentication in Key-Exchange: Definitions, Relations and Composition},
  booktitle    = {33rd {IEEE} Computer Security Foundations Symposium, {CSF} 2020, Boston,
                  MA, USA, June 22-26, 2020},
  pages        = {288--303},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CSF49147.2020.00028},
  doi          = {10.1109/CSF49147.2020.00028},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/GuilhemFW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/Fischlin020,
  author       = {Marc Fischlin and
                  Felix G{\"{u}}nther},
  editor       = {Stanislaw Jarecki},
  title        = {Modeling Memory Faults in Signature and Authenticated Encryption Schemes},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2020 - The Cryptographers' Track at
                  the {RSA} Conference 2020, San Francisco, CA, USA, February 24-28,
                  2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12006},
  pages        = {56--84},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-40186-3\_4},
  doi          = {10.1007/978-3-030-40186-3\_4},
  timestamp    = {Fri, 14 Feb 2020 13:00:36 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/Fischlin020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/FischlinHJ20,
  author       = {Marc Fischlin and
                  Patrick Harasser and
                  Christian Janson},
  editor       = {Anne Canteaut and
                  Yuval Ishai},
  title        = {Signatures from Sequential-OR Proofs},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12107},
  pages        = {212--244},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45727-3\_8},
  doi          = {10.1007/978-3-030-45727-3\_8},
  timestamp    = {Mon, 04 May 2020 14:40:23 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/FischlinHJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/FischlinGM20,
  author       = {Marc Fischlin and
                  Felix G{\"{u}}nther and
                  Philipp Muth},
  editor       = {Weizhi Meng and
                  Dieter Gollmann and
                  Christian Damsgaard Jensen and
                  Jianying Zhou},
  title        = {Information-Theoretic Security of Cryptographic Channels},
  booktitle    = {Information and Communications Security - 22nd International Conference,
                  {ICICS} 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12282},
  pages        = {295--311},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61078-4\_17},
  doi          = {10.1007/978-3-030-61078-4\_17},
  timestamp    = {Thu, 18 Feb 2021 13:46:45 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/FischlinGM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/BrendelFGJS20,
  author       = {Jacqueline Brendel and
                  Marc Fischlin and
                  Felix G{\"{u}}nther and
                  Christian Janson and
                  Douglas Stebila},
  editor       = {Orr Dunkelman and
                  Michael J. Jacobson Jr. and
                  Colin O'Flynn},
  title        = {Towards Post-Quantum Security for Signal's {X3DH} Handshake},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2020 - 27th International Conference,
                  Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12804},
  pages        = {404--430},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-81652-0\_16},
  doi          = {10.1007/978-3-030-81652-0\_16},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/BrendelFGJS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/BrandstetterFSY20,
  author       = {Lukas Brandstetter and
                  Marc Fischlin and
                  Robin Leander Schr{\"{o}}der and
                  Michael Yonli},
  editor       = {Thyla van der Merwe and
                  Chris J. Mitchell and
                  Maryam Mehrnezhad},
  title        = {On the Memory Fault Resilience of {TLS} 1.3},
  booktitle    = {Security Standardisation Research - 6th International Conference,
                  {SSR} 2020, London, UK, November 30 - December 1, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12529},
  pages        = {1--22},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64357-7\_1},
  doi          = {10.1007/978-3-030-64357-7\_1},
  timestamp    = {Wed, 25 Nov 2020 16:55:27 +0100},
  biburl       = {https://dblp.org/rec/conf/secsr/BrandstetterFSY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2011-06849,
  author       = {Georgios M. Nikolopoulos and
                  Marc Fischlin},
  title        = {Information-theoretically secure data origin authentication with quantum
                  and classical resources},
  journal      = {CoRR},
  volume       = {abs/2011.06849},
  year         = {2020},
  url          = {https://arxiv.org/abs/2011.06849},
  eprinttype    = {arXiv},
  eprint       = {2011.06849},
  timestamp    = {Thu, 19 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2011-06849.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FischlinHJ20,
  author       = {Marc Fischlin and
                  Patrick Harasser and
                  Christian Janson},
  title        = {Signatures from Sequential-OR Proofs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {271},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/271},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FischlinHJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FischlinGJ20,
  author       = {Marc Fischlin and
                  Felix G{\"{u}}nther and
                  Christian Janson},
  title        = {Robust Channels: Handling Unreliable Networks in the Record Layers
                  of {QUIC} and {DTLS} 1.3},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {718},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/718},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FischlinGJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DowlingFGS20,
  author       = {Benjamin Dowling and
                  Marc Fischlin and
                  Felix G{\"{u}}nther and
                  Douglas Stebila},
  title        = {A Cryptographic Analysis of the {TLS} 1.3 Handshake Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1044},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1044},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DowlingFGS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FischlinR20,
  author       = {Marc Fischlin and
                  Felix Rohrbach},
  title        = {Single-to-Multi-Theorem Transformations for Non-Interactive Statistical
                  Zero-Knowledge},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1204},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1204},
  timestamp    = {Fri, 30 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FischlinR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CremersDFFJ20,
  author       = {Cas Cremers and
                  Samed D{\"{u}}zl{\"{u}} and
                  Rune Fiedler and
                  Marc Fischlin and
                  Christian Janson},
  title        = {BUFFing signature schemes beyond unforgeability and the case of post-quantum
                  signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1525},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1525},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/CremersDFFJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FischlinGM20,
  author       = {Marc Fischlin and
                  Felix G{\"{u}}nther and
                  Philipp Muth},
  title        = {Information-Theoretic Security of Cryptographic Channels},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1539},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1539},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FischlinGM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/FladungNAF19,
  author       = {Lukas Fladung and
                  Georgios M. Nikolopoulos and
                  Gernot Alber and
                  Marc Fischlin},
  title        = {Intercept-Resend Emulation Attacks against a Continuous-Variable Quantum
                  Authentication Protocol with Physical Unclonable Keys},
  journal      = {Cryptogr.},
  volume       = {3},
  number       = {4},
  pages        = {25},
  year         = {2019},
  url          = {https://doi.org/10.3390/cryptography3040025},
  doi          = {10.3390/CRYPTOGRAPHY3040025},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/FladungNAF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BrendelF019,
  author       = {Jacqueline Brendel and
                  Marc Fischlin and
                  Felix G{\"{u}}nther},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {Breakdown Resilience of Key Exchange Protocols: NewHope, {TLS} 1.3,
                  and Hybrids},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11736},
  pages        = {521--541},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29962-0\_25},
  doi          = {10.1007/978-3-030-29962-0\_25},
  timestamp    = {Mon, 05 Feb 2024 20:29:41 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/BrendelF019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latincrypt/FischlinH19,
  author       = {Marc Fischlin and
                  Helene Haagh},
  editor       = {Peter Schwabe and
                  Nicolas Th{\'{e}}riault},
  title        = {How to Sign with White-Boxed {AES}},
  booktitle    = {Progress in Cryptology - {LATINCRYPT} 2019 - 6th International Conference
                  on Cryptology and Information Security in Latin America, Santiago
                  de Chile, Chile, October 2-4, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11774},
  pages        = {259--279},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30530-7\_13},
  doi          = {10.1007/978-3-030-30530-7\_13},
  timestamp    = {Thu, 12 Sep 2019 15:27:46 +0200},
  biburl       = {https://dblp.org/rec/conf/latincrypt/FischlinH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/BindelBFGS19,
  author       = {Nina Bindel and
                  Jacqueline Brendel and
                  Marc Fischlin and
                  Brian Goncalves and
                  Douglas Stebila},
  editor       = {Jintai Ding and
                  Rainer Steinwandt},
  title        = {Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange},
  booktitle    = {Post-Quantum Cryptography - 10th International Conference, PQCrypto
                  2019, Chongqing, China, May 8-10, 2019 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11505},
  pages        = {206--226},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-25510-7\_12},
  doi          = {10.1007/978-3-030-25510-7\_12},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/BindelBFGS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1910-11579,
  author       = {Lukas Fladung and
                  Georgios M. Nikolopoulos and
                  Gernot Alber and
                  Marc Fischlin},
  title        = {Intercept-Resend Emulation Attacks Against a Continuous-Variable Quantum
                  Authentication Protocol with Physical Unclonable Keys},
  journal      = {CoRR},
  volume       = {abs/1910.11579},
  year         = {2019},
  url          = {http://arxiv.org/abs/1910.11579},
  eprinttype    = {arXiv},
  eprint       = {1910.11579},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1910-11579.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BockBFJM19,
  author       = {Estuardo Alpirez Bock and
                  Chris Brzuska and
                  Marc Fischlin and
                  Christian Janson and
                  Wil Michiels},
  title        = {Security Reductions for White-Box Key-Storage in Mobile Payments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1014},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1014},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BockBFJM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FischlinG19,
  author       = {Marc Fischlin and
                  Felix G{\"{u}}nther},
  title        = {Modeling Memory Faults in Signature and Encryption Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1053},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1053},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FischlinG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuilhemFW19,
  author       = {Cyprien Delpech de Saint Guilhem and
                  Marc Fischlin and
                  Bogdan Warinschi},
  title        = {Authentication in Key-Exchange: Definitions, Relations and Composition},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1203},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1203},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuilhemFW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrendelF0JS19,
  author       = {Jacqueline Brendel and
                  Marc Fischlin and
                  Felix G{\"{u}}nther and
                  Christian Janson and
                  Douglas Stebila},
  title        = {Challenges in Proving Post-Quantum Key Exchanges Based on Key Encapsulation
                  Mechanisms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1356},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1356},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrendelF0JS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/FischlinH18,
  author       = {Marc Fischlin and
                  Patrick Harasser},
  editor       = {Bart Preneel and
                  Frederik Vercauteren},
  title        = {Invisible Sanitizable Signatures and Public-Key Encryption are Equivalent},
  booktitle    = {Applied Cryptography and Network Security - 16th International Conference,
                  {ACNS} 2018, Leuven, Belgium, July 2-4, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10892},
  pages        = {202--220},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93387-0\_11},
  doi          = {10.1007/978-3-319-93387-0\_11},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/FischlinH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DegabrieleF18,
  author       = {Jean Paul Degabriele and
                  Marc Fischlin},
  editor       = {Thomas Peyrin and
                  Steven D. Galbraith},
  title        = {Simulatable Channels: Extended Security that is Universally Composable
                  and Easier to Prove},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11274},
  pages        = {519--550},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03332-3\_19},
  doi          = {10.1007/978-3-030-03332-3\_19},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/DegabrieleF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/FischlinM18,
  author       = {Marc Fischlin and
                  Sogol Mazaheri},
  title        = {Self-Guarding Cryptographic Protocols against Algorithm Substitution
                  Attacks},
  booktitle    = {31st {IEEE} Computer Security Foundations Symposium, {CSF} 2018, Oxford,
                  United Kingdom, July 9-12, 2018},
  pages        = {76--90},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/CSF.2018.00013},
  doi          = {10.1109/CSF.2018.00013},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/FischlinM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/FischlinJM18,
  author       = {Marc Fischlin and
                  Christian Janson and
                  Sogol Mazaheri},
  title        = {Backdoored Hash Functions: Immunizing {HMAC} and {HKDF}},
  booktitle    = {31st {IEEE} Computer Security Foundations Symposium, {CSF} 2018, Oxford,
                  United Kingdom, July 9-12, 2018},
  pages        = {105--118},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/CSF.2018.00015},
  doi          = {10.1109/CSF.2018.00015},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/FischlinJM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FischlinH18,
  author       = {Marc Fischlin and
                  Patrick Harasser},
  title        = {Invisible Sanitizable Signatures and Public-Key Encryption are Equivalent},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {337},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/337},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FischlinH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FischlinJM18,
  author       = {Marc Fischlin and
                  Christian Janson and
                  Sogol Mazaheri},
  title        = {Backdoored Hash Functions: Immunizing {HMAC} and {HKDF}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {362},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/362},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FischlinJM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DegabrieleF18,
  author       = {Jean Paul Degabriele and
                  Marc Fischlin},
  title        = {Simulatable Channels: Extended Security that is Universally Composable
                  and Easier to Prove},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {844},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/844},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DegabrieleF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BindelBFGS18,
  author       = {Nina Bindel and
                  Jacqueline Brendel and
                  Marc Fischlin and
                  Brian Goncalves and
                  Douglas Stebila},
  title        = {Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {903},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/903},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BindelBFGS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ErwigFHHKKKLR17,
  author       = {Andreas Erwig and
                  Marc Fischlin and
                  Martin Hald and
                  Dominik Helm and
                  Robert Kiel and
                  Florian K{\"{u}}bler and
                  Michael K{\"{u}}mmerlin and
                  Jakob Laenge and
                  Felix Rohrbach},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Redactable Graph Hashing, Revisited - (Extended Abstract)},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {398--405},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_24},
  doi          = {10.1007/978-3-319-59870-3\_24},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ErwigFHHKKKLR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BrendelF0J17,
  author       = {Jacqueline Brendel and
                  Marc Fischlin and
                  Felix G{\"{u}}nther and
                  Christian Janson},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {{PRF-ODH:} Relations, Instantiations, and Impossibility Results},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10403},
  pages        = {651--681},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63697-9\_22},
  doi          = {10.1007/978-3-319-63697-9\_22},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BrendelF0J17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BrendelF17,
  author       = {Jacqueline Brendel and
                  Marc Fischlin},
  editor       = {Simon N. Foley and
                  Dieter Gollmann and
                  Einar Snekkenes},
  title        = {Zero Round-Trip Time for the Extended Access Control Protocol},
  booktitle    = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research
                  in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10492},
  pages        = {297--314},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66402-6\_18},
  doi          = {10.1007/978-3-319-66402-6\_18},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BrendelF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/FischlinG17,
  author       = {Marc Fischlin and
                  Felix G{\"{u}}nther},
  title        = {Replay Attacks on Zero Round-Trip Time: The Case of the {TLS} 1.3
                  Handshake Candidates},
  booktitle    = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2017, Paris, France, April 26-28, 2017},
  pages        = {60--75},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/EuroSP.2017.18},
  doi          = {10.1109/EUROSP.2017.18},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/FischlinG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrendelF17,
  author       = {Jacqueline Brendel and
                  Marc Fischlin},
  title        = {Zero Round-Trip Time for the Extended Access Control Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {60},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/060},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrendelF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FischlinG17,
  author       = {Marc Fischlin and
                  Felix G{\"{u}}nther},
  title        = {Replay Attacks on Zero Round-Trip Time: The Case of the {TLS} 1.3
                  Handshake Candidates},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {82},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/082},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FischlinG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrendelF0J17,
  author       = {Jacqueline Brendel and
                  Marc Fischlin and
                  Felix G{\"{u}}nther and
                  Christian Janson},
  title        = {{PRF-ODH:} Relations, Instantiations, and Impossibility Results},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {517},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/517},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrendelF0J17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FischlinM17,
  author       = {Marc Fischlin and
                  Sogol Mazaheri},
  title        = {Self-Guarding Cryptographic Protocols against Algorithm Substitution
                  Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {984},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/984},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FischlinM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FischlinGMP17,
  author       = {Marc Fischlin and
                  Felix G{\"{u}}nther and
                  Giorgia Azzurra Marson and
                  Kenneth G. Paterson},
  title        = {Data Is a Stream: Security of Stream-Based Channels},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1191},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1191},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FischlinGMP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrendelFG17,
  author       = {Jacqueline Brendel and
                  Marc Fischlin and
                  Felix G{\"{u}}nther},
  title        = {Breakdown Resilience of Key Exchange Protocols and the Cases of NewHope
                  and {TLS} 1.3},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1252},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1252},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrendelFG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/BernhardFW16,
  author       = {David Bernhard and
                  Marc Fischlin and
                  Bogdan Warinschi},
  title        = {Adaptive proofs of knowledge in the random oracle model},
  journal      = {{IET} Inf. Secur.},
  volume       = {10},
  number       = {6},
  pages        = {319--331},
  year         = {2016},
  url          = {https://doi.org/10.1049/iet-ifs.2015.0506},
  doi          = {10.1049/IET-IFS.2015.0506},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/BernhardFW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/DegabrieleFFGGM16,
  author       = {Jean Paul Degabriele and
                  Victoria Fehr and
                  Marc Fischlin and
                  Tommaso Gagliardoni and
                  Felix G{\"{u}}nther and
                  Giorgia Azzurra Marson and
                  Arno Mittelbach and
                  Kenneth G. Paterson},
  title        = {Unpicking {PLAID:} a cryptographic analysis of an ISO-standards-track
                  authentication protocol},
  journal      = {Int. J. Inf. Sec.},
  volume       = {15},
  number       = {6},
  pages        = {637--657},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10207-015-0309-6},
  doi          = {10.1007/S10207-015-0309-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/DegabrieleFFGGM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FischlinHNS16,
  author       = {Marc Fischlin and
                  Amir Herzberg and
                  Hod Bin Noon and
                  Haya Schulmann},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Obfuscation Combiners},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9815},
  pages        = {521--550},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53008-5\_18},
  doi          = {10.1007/978-3-662-53008-5\_18},
  timestamp    = {Tue, 17 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/FischlinHNS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BernhardFW16,
  author       = {David Bernhard and
                  Marc Fischlin and
                  Bogdan Warinschi},
  editor       = {Chen{-}Mou Cheng and
                  Kai{-}Min Chung and
                  Giuseppe Persiano and
                  Bo{-}Yin Yang},
  title        = {On the Hardness of Proving CCA-Security of Signed ElGamal},
  booktitle    = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
                  March 6-9, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9614},
  pages        = {47--69},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49384-7\_3},
  doi          = {10.1007/978-3-662-49384-7\_3},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BernhardFW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/MorgnerBF16,
  author       = {Frank Morgner and
                  Paul Bastian and
                  Marc Fischlin},
  editor       = {Lidong Chen and
                  David A. McGrew and
                  Chris J. Mitchell},
  title        = {Attribute-Based Access Control Architectures with the eIDAS Protocols},
  booktitle    = {Security Standardisation Research - Third International Conference,
                  {SSR} 2016, Gaithersburg, MD, USA, December 5-6, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10074},
  pages        = {205--226},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49100-4\_9},
  doi          = {10.1007/978-3-319-49100-4\_9},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/MorgnerBF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/FischlinGSW16,
  author       = {Marc Fischlin and
                  Felix G{\"{u}}nther and
                  Benedikt Schmidt and
                  Bogdan Warinschi},
  title        = {Key Confirmation in Key Exchange: {A} Formal Treatment and Implications
                  for {TLS} 1.3},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA,
                  USA, May 22-26, 2016},
  pages        = {452--469},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SP.2016.34},
  doi          = {10.1109/SP.2016.34},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/FischlinGSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/MorgnerBF16,
  author       = {Frank Morgner and
                  Paul Bastian and
                  Marc Fischlin},
  editor       = {Sara Foresti and
                  Javier L{\'{o}}pez},
  title        = {Securing Transactions with the eIDAS Protocols},
  booktitle    = {Information Security Theory and Practice - 10th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2016, Heraklion, Crete, Greece, September 26-27,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9895},
  pages        = {3--18},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45931-8\_1},
  doi          = {10.1007/978-3-319-45931-8\_1},
  timestamp    = {Thu, 29 Aug 2019 08:10:02 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/MorgnerBF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2016-1,
  editor       = {Marc Fischlin and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9665},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49890-3},
  doi          = {10.1007/978-3-662-49890-3},
  isbn         = {978-3-662-49889-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/2016-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2016-2,
  editor       = {Marc Fischlin and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9666},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49896-5},
  doi          = {10.1007/978-3-662-49896-5},
  isbn         = {978-3-662-49895-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/2016-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/Fischlin0PR16,
  author       = {Marc Fischlin and
                  Alexander May and
                  David Pointcheval and
                  Tal Rabin},
  title        = {Public-Key Cryptography (Dagstuhl Seminar 16371)},
  journal      = {Dagstuhl Reports},
  volume       = {6},
  number       = {9},
  pages        = {46--58},
  year         = {2016},
  url          = {https://doi.org/10.4230/DagRep.6.9.46},
  doi          = {10.4230/DAGREP.6.9.46},
  timestamp    = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-reports/Fischlin0PR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DowlingFGS16,
  author       = {Benjamin Dowling and
                  Marc Fischlin and
                  Felix G{\"{u}}nther and
                  Douglas Stebila},
  title        = {A Cryptographic Analysis of the {TLS} 1.3 draft-10 Full and Pre-shared
                  Key Handshake Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {81},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/081},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DowlingFGS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FischlinHNS16,
  author       = {Marc Fischlin and
                  Amir Herzberg and
                  Hod Bin Noon and
                  Haya Schulmann},
  title        = {Obfuscation Combiners},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {289},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/289},
  timestamp    = {Tue, 17 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FischlinHNS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FischlinLP16,
  author       = {Marc Fischlin and
                  Anja Lehmann and
                  Krzysztof Pietrzak},
  title        = {Robust Multi-Property Combiners for Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {723},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/723},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FischlinLP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/EgertFGJST15,
  author       = {Rolf Egert and
                  Marc Fischlin and
                  David Gens and
                  Sven Jacob and
                  Matthias Senker and
                  J{\"{o}}rn Tillmanns},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {Privately Computing Set-Union and Set-Intersection Cardinality via
                  Bloom Filters},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {413--430},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_24},
  doi          = {10.1007/978-3-319-19962-7\_24},
  timestamp    = {Tue, 07 May 2024 20:09:57 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/EgertFGJST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DowlingFGS15,
  author       = {Benjamin Dowling and
                  Marc Fischlin and
                  Felix G{\"{u}}nther and
                  Douglas Stebila},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {A Cryptographic Analysis of the {TLS} 1.3 Handshake Protocol Candidates},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {1197--1210},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2813653},
  doi          = {10.1145/2810103.2813653},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/DowlingFGS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FischlinGMP15,
  author       = {Marc Fischlin and
                  Felix G{\"{u}}nther and
                  Giorgia Azzurra Marson and
                  Kenneth G. Paterson},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Data Is a Stream: Security of Stream-Based Channels},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {545--564},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_27},
  doi          = {10.1007/978-3-662-48000-7\_27},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/FischlinGMP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BernhardFW15,
  author       = {David Bernhard and
                  Marc Fischlin and
                  Bogdan Warinschi},
  editor       = {Jonathan Katz},
  title        = {Adaptive Proofs of Knowledge in the Random Oracle Model},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {629--649},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_28},
  doi          = {10.1007/978-3-662-46447-2\_28},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BernhardFW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/FischlinM15,
  author       = {Marc Fischlin and
                  Sogol Mazaheri},
  editor       = {Indrajit Ray and
                  Nicholas Hopper and
                  Rob Jansen},
  title        = {Notions of Deniable Message Authentication},
  booktitle    = {Proceedings of the 14th {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2015, Denver, Colorado, USA, October 12, 2015},
  pages        = {55--64},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808138.2808143},
  doi          = {10.1145/2808138.2808143},
  timestamp    = {Tue, 06 Nov 2018 16:59:07 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/FischlinM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2015-1,
  editor       = {Elisabeth Oswald and
                  Marc Fischlin},
  title        = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9056},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46800-5},
  doi          = {10.1007/978-3-662-46800-5},
  isbn         = {978-3-662-46799-2},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/2015-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2015-2,
  editor       = {Elisabeth Oswald and
                  Marc Fischlin},
  title        = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9057},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46803-6},
  doi          = {10.1007/978-3-662-46803-6},
  isbn         = {978-3-662-46802-9},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/2015-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernhardFW15,
  author       = {David Bernhard and
                  Marc Fischlin and
                  Bogdan Warinschi},
  title        = {Adaptive Proofs of Knowledge in the Random Oracle Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {648},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/648},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernhardFW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernhardFW15a,
  author       = {David Bernhard and
                  Marc Fischlin and
                  Bogdan Warinschi},
  title        = {On the Hardness of Proving CCA-security of Signed ElGamal},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {649},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/649},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernhardFW15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FehrF15a,
  author       = {Victoria Fehr and
                  Marc Fischlin},
  title        = {Sanitizable Signcryption: Sanitization over Encrypted Data (Full Version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {765},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/765},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FehrF15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DowlingFGS15,
  author       = {Benjamin Dowling and
                  Marc Fischlin and
                  Felix G{\"{u}}nther and
                  Douglas Stebila},
  title        = {A Cryptographic Analysis of the {TLS} 1.3 Handshake Protocol Candidates},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {914},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/914},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DowlingFGS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fischlin14,
  author       = {Marc Fischlin},
  title        = {Abstreitbarkeit bei eID-L{\"{o}}sungen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {38},
  number       = {7},
  pages        = {462--466},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11623-014-0207-5},
  doi          = {10.1007/S11623-014-0207-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Fischlin14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/FischlinLP14,
  author       = {Marc Fischlin and
                  Anja Lehmann and
                  Krzysztof Pietrzak},
  title        = {Robust Multi-Property Combiners for Hash Functions},
  journal      = {J. Cryptol.},
  volume       = {27},
  number       = {3},
  pages        = {397--428},
  year         = {2014},
  url          = {https://doi.org/10.1007/s00145-013-9148-7},
  doi          = {10.1007/S00145-013-9148-7},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/FischlinLP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FischlinG14,
  author       = {Marc Fischlin and
                  Felix G{\"{u}}nther},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {Multi-Stage Key Exchange and the Case of Google's {QUIC} Protocol},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {1193--1204},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660308},
  doi          = {10.1145/2660267.2660308},
  timestamp    = {Tue, 10 Nov 2020 20:00:23 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/FischlinG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/DagdelenF14,
  author       = {{\"{O}}zg{\"{u}}r Dagdelen and
                  Marc Fischlin},
  title        = {Intercepting tokens in cryptographic protocols: The empire strikes
                  back in the clone wars},
  booktitle    = {2014 {IEEE} International Symposium on Information Theory, Honolulu,
                  HI, USA, June 29 - July 4, 2014},
  pages        = {1529--1533},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISIT.2014.6875089},
  doi          = {10.1109/ISIT.2014.6875089},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/DagdelenF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/DegabrieleFFGGM14,
  author       = {Jean Paul Degabriele and
                  Victoria Fehr and
                  Marc Fischlin and
                  Tommaso Gagliardoni and
                  Felix G{\"{u}}nther and
                  Giorgia Azzurra Marson and
                  Arno Mittelbach and
                  Kenneth G. Paterson},
  editor       = {Liqun Chen and
                  Chris J. Mitchell},
  title        = {Unpicking {PLAID} - {A} Cryptographic Analysis of an ISO-Standards-Track
                  Authentication Protocol},
  booktitle    = {Security Standardisation Research - First International Conference,
                  {SSR} 2014, London, UK, December 16-17, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8893},
  pages        = {1--25},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-14054-4\_1},
  doi          = {10.1007/978-3-319-14054-4\_1},
  timestamp    = {Sat, 09 Apr 2022 12:41:37 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/DegabrieleFFGGM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DegabrieleFFGGMMP14,
  author       = {Jean Paul Degabriele and
                  Victoria Fehr and
                  Marc Fischlin and
                  Tommaso Gagliardoni and
                  Felix G{\"{u}}nther and
                  Giorgia Azzurra Marson and
                  Arno Mittelbach and
                  Kenneth G. Paterson},
  title        = {Unpicking {PLAID} - {A} Cryptographic Analysis of an ISO-standards-track
                  Authentication Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {728},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/728},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DegabrieleFFGGMMP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesDFGMS14,
  author       = {Michael Backes and
                  {\"{O}}zg{\"{u}}r Dagdelen and
                  Marc Fischlin and
                  Sebastian Gajek and
                  Sebastian Meiser and
                  Dominique Schr{\"{o}}der},
  title        = {Operational Signature Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {820},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/820},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesDFGMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BrzuskaFSWW13,
  author       = {Christina Brzuska and
                  Marc Fischlin and
                  Nigel P. Smart and
                  Bogdan Warinschi and
                  Stephen C. Williams},
  title        = {Less is more: relaxed yet composable security notions for key exchange},
  journal      = {Int. J. Inf. Sec.},
  volume       = {12},
  number       = {4},
  pages        = {267--297},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10207-013-0192-y},
  doi          = {10.1007/S10207-013-0192-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/BrzuskaFSWW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/DeiserothFFMRS13,
  author       = {Bj{\"{o}}rn Deiseroth and
                  Victoria Fehr and
                  Marc Fischlin and
                  Manuel Maasz and
                  Nils Fabian Reimers and
                  Richard Stein},
  editor       = {Michael J. Jacobson Jr. and
                  Michael E. Locasto and
                  Payman Mohassel and
                  Reihaneh Safavi{-}Naini},
  title        = {Computing on Authenticated Data for Adjustable Predicates},
  booktitle    = {Applied Cryptography and Network Security - 11th International Conference,
                  {ACNS} 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7954},
  pages        = {53--68},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38980-1\_4},
  doi          = {10.1007/978-3-642-38980-1\_4},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/DeiserothFFMRS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/FischlinO13,
  author       = {Marc Fischlin and
                  Cristina Onete},
  editor       = {Michael J. Jacobson Jr. and
                  Michael E. Locasto and
                  Payman Mohassel and
                  Reihaneh Safavi{-}Naini},
  title        = {Terrorism in Distance Bounding: Modeling Terrorist-Fraud Resistance},
  booktitle    = {Applied Cryptography and Network Security - 11th International Conference,
                  {ACNS} 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7954},
  pages        = {414--431},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38980-1\_26},
  doi          = {10.1007/978-3-642-38980-1\_26},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/FischlinO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DagdelenFG13,
  author       = {{\"{O}}zg{\"{u}}r Dagdelen and
                  Marc Fischlin and
                  Tommaso Gagliardoni},
  editor       = {Kazue Sako and
                  Palash Sarkar},
  title        = {The Fiat-Shamir Transformation in a Quantum World},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Bengaluru, India, December 1-5, 2013, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8270},
  pages        = {62--81},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-42045-0\_4},
  doi          = {10.1007/978-3-642-42045-0\_4},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/DagdelenFG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BaecherBF13,
  author       = {Paul Baecher and
                  Christina Brzuska and
                  Marc Fischlin},
  editor       = {Kazue Sako and
                  Palash Sarkar},
  title        = {Notions of Black-Box Reductions, Revisited},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Bengaluru, India, December 1-5, 2013, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8269},
  pages        = {296--315},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-42033-7\_16},
  doi          = {10.1007/978-3-642-42033-7\_16},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BaecherBF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/DagdelenFGMMO13,
  author       = {{\"{O}}zg{\"{u}}r Dagdelen and
                  Marc Fischlin and
                  Tommaso Gagliardoni and
                  Giorgia Azzurra Marson and
                  Arno Mittelbach and
                  Cristina Onete},
  editor       = {Jason Crampton and
                  Sushil Jajodia and
                  Keith Mayes},
  title        = {A Cryptographic Analysis of {OPACITY} - (Extended Abstract)},
  booktitle    = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research
                  in Computer Security, Egham, UK, September 9-13, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8134},
  pages        = {345--362},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40203-6\_20},
  doi          = {10.1007/978-3-642-40203-6\_20},
  timestamp    = {Wed, 25 Sep 2019 18:03:15 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/DagdelenFGMMO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BaecherFFS13,
  author       = {Paul Baecher and
                  Pooya Farshim and
                  Marc Fischlin and
                  Martijn Stam},
  editor       = {Thomas Johansson and
                  Phong Q. Nguyen},
  title        = {Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Athens, Greece, May 26-30, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7881},
  pages        = {426--443},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38348-9\_26},
  doi          = {10.1007/978-3-642-38348-9\_26},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BaecherFFS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/FischlinF13,
  author       = {Marc Fischlin and
                  Nils Fleischhacker},
  editor       = {Thomas Johansson and
                  Phong Q. Nguyen},
  title        = {Limitations of the Meta-reduction Technique: The Case of Schnorr Signatures},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Athens, Greece, May 26-30, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7881},
  pages        = {444--460},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38348-9\_27},
  doi          = {10.1007/978-3-642-38348-9\_27},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/FischlinF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/BenderFK13,
  author       = {Jens Bender and
                  Marc Fischlin and
                  Dennis K{\"{u}}gler},
  editor       = {Roderick Bloem and
                  Peter Lipp},
  title        = {The PACE{\(\vert\)}CA Protocol for Machine Readable Travel Documents},
  booktitle    = {Trusted Systems - 5th International Conference, {INTRUST} 2013, Graz,
                  Austria, December 4-5, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8292},
  pages        = {17--35},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-03491-1\_2},
  doi          = {10.1007/978-3-319-03491-1\_2},
  timestamp    = {Mon, 03 Jan 2022 22:38:23 +0100},
  biburl       = {https://dblp.org/rec/conf/intrust/BenderFK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/FischlinO13,
  author       = {Marc Fischlin and
                  Cristina Onete},
  editor       = {Levente Butty{\'{a}}n and
                  Ahmad{-}Reza Sadeghi and
                  Marco Gruteser},
  title        = {Subtle kinks in distance-bounding: an analysis of prominent protocols},
  booktitle    = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile
                  Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013},
  pages        = {195--206},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2462096.2462128},
  doi          = {10.1145/2462096.2462128},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/FischlinO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/birthday/2013buchmann,
  editor       = {Marc Fischlin and
                  Stefan Katzenbeisser},
  title        = {Number Theory and Cryptography - Papers in Honor of Johannes Buchmann
                  on the Occasion of His 60th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {8260},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-42001-6},
  doi          = {10.1007/978-3-642-42001-6},
  isbn         = {978-3-642-42000-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/2013buchmann.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/DagdelenFG13,
  author       = {{\"{O}}zg{\"{u}}r Dagdelen and
                  Marc Fischlin and
                  Tommaso Gagliardoni},
  title        = {The Fiat-Shamir Transformation in a Quantum World},
  journal      = {CoRR},
  volume       = {abs/1306.0315},
  year         = {2013},
  url          = {http://arxiv.org/abs/1306.0315},
  eprinttype    = {arXiv},
  eprint       = {1306.0315},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/DagdelenFG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaecherBF13,
  author       = {Paul Baecher and
                  Christina Brzuska and
                  Marc Fischlin},
  title        = {Notions of Black-Box Reductions, Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {101},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/101},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaecherBF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FischlinF13,
  author       = {Marc Fischlin and
                  Nils Fleischhacker},
  title        = {Limitations of the Meta-Reduction Technique: The Case of Schnorr Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {140},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/140},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FischlinF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DeiserothFFMRS13,
  author       = {Bj{\"{o}}rn Deiseroth and
                  Victoria Fehr and
                  Marc Fischlin and
                  Manuel Maasz and
                  Nils Fabian Reimers and
                  Richard Stein},
  title        = {Computing on Authenticated Data for Adjustable Predicates},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {217},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/217},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DeiserothFFMRS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BenderDFK13,
  author       = {Jens Bender and
                  {\"{O}}zg{\"{u}}r Dagdelen and
                  Marc Fischlin and
                  Dennis K{\"{u}}gler},
  title        = {The PACE{\(\vert\)}AA Protocol for Machine Readable Travel Documents,
                  and its Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {223},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/223},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BenderDFK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DagdelenFGMMO13,
  author       = {{\"{O}}zg{\"{u}}r Dagdelen and
                  Marc Fischlin and
                  Tommaso Gagliardoni and
                  Giorgia Azzurra Marson and
                  Arno Mittelbach and
                  Cristina Onete},
  title        = {A Cryptographic Analysis of {OPACITY}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {234},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/234},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DagdelenFGMMO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DagdelenFG13,
  author       = {{\"{O}}zg{\"{u}}r Dagdelen and
                  Marc Fischlin and
                  Tommaso Gagliardoni},
  title        = {The Fiat-Shamir Transformation in a Quantum World},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {245},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/245},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DagdelenFG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaecherFFS13,
  author       = {Paul Baecher and
                  Pooya Farshim and
                  Marc Fischlin and
                  Martijn Stam},
  title        = {Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {350},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/350},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaecherFFS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/FischlinS12,
  author       = {Marc Fischlin and
                  Dominique Schr{\"{o}}der},
  title        = {Security of blind signatures under aborts and applications to adaptive
                  oblivious transfer},
  journal      = {J. Math. Cryptol.},
  volume       = {5},
  number       = {2},
  pages        = {169--204},
  year         = {2012},
  url          = {https://doi.org/10.1515/jmc.2011.011},
  doi          = {10.1515/JMC.2011.011},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/FischlinS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/Fischlin12,
  author       = {Marc Fischlin},
  editor       = {Aikaterini Mitrokotsa and
                  Serge Vaudenay},
  title        = {Black-Box Reductions and Separations in Cryptography},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2012 - 5th International Conference
                  on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7374},
  pages        = {413--422},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31410-0\_26},
  doi          = {10.1007/978-3-642-31410-0\_26},
  timestamp    = {Sun, 02 Jun 2019 21:14:37 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/Fischlin12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/BenderDFK12,
  author       = {Jens Bender and
                  {\"{O}}zg{\"{u}}r Dagdelen and
                  Marc Fischlin and
                  Dennis K{\"{u}}gler},
  editor       = {Angelos D. Keromytis},
  title        = {The PACE{\(\vert\)}AA Protocol for Machine Readable Travel Documents,
                  and Its Security},
  booktitle    = {Financial Cryptography and Data Security - 16th International Conference,
                  {FC} 2012, Kralendijk, Bonaire, February 27 - March 2, 2012, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7397},
  pages        = {344--358},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32946-3\_25},
  doi          = {10.1007/978-3-642-32946-3\_25},
  timestamp    = {Tue, 30 Jul 2024 10:38:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/BenderDFK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/BenderDFK12,
  author       = {Jens Bender and
                  {\"{O}}zg{\"{u}}r Dagdelen and
                  Marc Fischlin and
                  Dennis K{\"{u}}gler},
  editor       = {Dieter Gollmann and
                  Felix C. Freiling},
  title        = {Domain-Specific Pseudonymous Signatures for the German Identity Card},
  booktitle    = {Information Security - 15th International Conference, {ISC} 2012,
                  Passau, Germany, September 19-21, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7483},
  pages        = {104--119},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33383-5\_7},
  doi          = {10.1007/978-3-642-33383-5\_7},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/BenderDFK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/FischlinLS12,
  author       = {Marc Fischlin and
                  Anja Lehmann and
                  Dominique Schr{\"{o}}der},
  editor       = {Ivan Visconti and
                  Roberto De Prisco},
  title        = {History-Free Sequential Aggregate Signatures},
  booktitle    = {Security and Cryptography for Networks - 8th International Conference,
                  {SCN} 2012, Amalfi, Italy, September 5-7, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7485},
  pages        = {113--130},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32928-9\_7},
  doi          = {10.1007/978-3-642-32928-9\_7},
  timestamp    = {Thu, 23 Jun 2022 19:58:57 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/FischlinLS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/BrzuskaDF12,
  author       = {Christina Brzuska and
                  {\"{O}}zg{\"{u}}r Dagdelen and
                  Marc Fischlin},
  editor       = {Neeraj Suri and
                  Michael Waidner},
  title        = {TLS, PACE, and {EAC:} ACryptographic View at Modern Key Exchange Protocols},
  booktitle    = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz
                  2012 in Darmstadt},
  series       = {{LNI}},
  volume       = {{P-195}},
  pages        = {71--82},
  publisher    = {{GI}},
  year         = {2012},
  url          = {https://dl.gi.de/handle/20.500.12116/18264},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/BrzuskaDF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/CheikhrouhouSDFU12,
  author       = {Lassaad Cheikhrouhou and
                  Werner Stephan and
                  {\"{O}}zg{\"{u}}r Dagdelen and
                  Marc Fischlin and
                  Markus Ullmann},
  editor       = {Neeraj Suri and
                  Michael Waidner},
  title        = {Merging the Cryptographic Security Analysis and the Algebraic-Logic
                  Security Proof of {PACE}},
  booktitle    = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz
                  2012 in Darmstadt},
  series       = {{LNI}},
  volume       = {{P-195}},
  pages        = {83--94},
  publisher    = {{GI}},
  year         = {2012},
  url          = {https://dl.gi.de/handle/20.500.12116/18265},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/CheikhrouhouSDFU12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2012,
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8},
  doi          = {10.1007/978-3-642-30057-8},
  isbn         = {978-3-642-30056-1},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FischlinO12,
  author       = {Marc Fischlin and
                  Cristina Onete},
  title        = {Provably Secure Distance-Bounding: an Analysis of Prominent Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {128},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/128},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FischlinO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrzuskaFSWW12,
  author       = {Christina Brzuska and
                  Marc Fischlin and
                  Nigel P. Smart and
                  Bogdan Warinschi and
                  Stephen C. Williams},
  title        = {Less is More: Relaxed yet Composable Security Notions for Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {242},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/242},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrzuskaFSWW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DagdelenF12,
  author       = {{\"{O}}zg{\"{u}}r Dagdelen and
                  Marc Fischlin},
  title        = {Unconditionally-Secure Universally Composable Password-Based Key-Exchange
                  based on One-Time Memory Tokens},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {537},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/537},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DagdelenF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BenderDFK12,
  author       = {Jens Bender and
                  {\"{O}}zg{\"{u}}r Dagdelen and
                  Marc Fischlin and
                  Dennis K{\"{u}}gler},
  title        = {Domain-Specifi c Pseudonymous Signatures for the German Identity Card},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {558},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/558},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BenderDFK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/FischlinF11,
  author       = {Marc Fischlin and
                  Roger Fischlin},
  title        = {Efficient Non-Malleable Commitment Schemes},
  journal      = {J. Cryptol.},
  volume       = {24},
  number       = {1},
  pages        = {203--244},
  year         = {2011},
  url          = {https://doi.org/10.1007/s00145-009-9043-4},
  doi          = {10.1007/S00145-009-9043-4},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/FischlinF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/FischlinO11,
  author       = {Marc Fischlin and
                  Cristina Onete},
  editor       = {Javier L{\'{o}}pez and
                  Gene Tsudik},
  title        = {Relaxed Security Notions for Signatures of Knowledge},
  booktitle    = {Applied Cryptography and Network Security - 9th International Conference,
                  {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6715},
  pages        = {309--326},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21554-4\_18},
  doi          = {10.1007/978-3-642-21554-4\_18},
  timestamp    = {Thu, 29 Aug 2019 08:10:02 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/FischlinO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BonehDFLSZ11,
  author       = {Dan Boneh and
                  {\"{O}}zg{\"{u}}r Dagdelen and
                  Marc Fischlin and
                  Anja Lehmann and
                  Christian Schaffner and
                  Mark Zhandry},
  editor       = {Dong Hoon Lee and
                  Xiaoyun Wang},
  title        = {Random Oracles in a Quantum World},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Seoul, South Korea, December 4-8, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7073},
  pages        = {41--69},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25385-0\_3},
  doi          = {10.1007/978-3-642-25385-0\_3},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BonehDFLSZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/FischlinLM11,
  author       = {Marc Fischlin and
                  Beno{\^{\i}}t Libert and
                  Mark Manulis},
  editor       = {Dong Hoon Lee and
                  Xiaoyun Wang},
  title        = {Non-interactive and Re-usable Universally Composable String Commitments
                  with Adaptive Security},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Seoul, South Korea, December 4-8, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7073},
  pages        = {468--485},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25385-0\_25},
  doi          = {10.1007/978-3-642-25385-0\_25},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/FischlinLM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BrzuskaFWW11,
  author       = {Christina Brzuska and
                  Marc Fischlin and
                  Bogdan Warinschi and
                  Stephen C. Williams},
  editor       = {Yan Chen and
                  George Danezis and
                  Vitaly Shmatikov},
  title        = {Composability of bellare-rogaway key exchange protocols},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages        = {51--62},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046707.2046716},
  doi          = {10.1145/2046707.2046716},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BrzuskaFWW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BaecherF11,
  author       = {Paul Baecher and
                  Marc Fischlin},
  editor       = {Phillip Rogaway},
  title        = {Random Oracle Reducibility},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 14-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6841},
  pages        = {21--38},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22792-9\_2},
  doi          = {10.1007/978-3-642-22792-9\_2},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BaecherF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BrzuskaFSK11,
  author       = {Christina Brzuska and
                  Marc Fischlin and
                  Heike Schr{\"{o}}der and
                  Stefan Katzenbeisser},
  editor       = {Phillip Rogaway},
  title        = {Physically Uncloneable Functions in the Universal Composition Framework},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 14-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6841},
  pages        = {51--70},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22792-9\_4},
  doi          = {10.1007/978-3-642-22792-9\_4},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BrzuskaFSK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/FischlinPSSV11,
  author       = {Marc Fischlin and
                  Benny Pinkas and
                  Ahmad{-}Reza Sadeghi and
                  Thomas Schneider and
                  Ivan Visconti},
  editor       = {Aggelos Kiayias},
  title        = {Secure Set Intersection with Untrusted Hardware Tokens},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2011 - The Cryptographers' Track at
                  the {RSA} Conference 2011, San Francisco, CA, USA, February 14-18,
                  2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6558},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19074-2\_1},
  doi          = {10.1007/978-3-642-19074-2\_1},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/FischlinPSSV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/BaecherFS11,
  author       = {Paul Baecher and
                  Marc Fischlin and
                  Dominique Schr{\"{o}}der},
  editor       = {Aggelos Kiayias},
  title        = {Expedient Non-malleability Notions for Hash Functions},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2011 - The Cryptographers' Track at
                  the {RSA} Conference 2011, San Francisco, CA, USA, February 14-18,
                  2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6558},
  pages        = {268--283},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19074-2\_18},
  doi          = {10.1007/978-3-642-19074-2\_18},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/BaecherFS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/DurholzFKO11,
  author       = {Ulrich D{\"{u}}rholz and
                  Marc Fischlin and
                  Michael Kasper and
                  Cristina Onete},
  editor       = {Xuejia Lai and
                  Jianying Zhou and
                  Hui Li},
  title        = {A Formal Approach to Distance-Bounding {RFID} Protocols},
  booktitle    = {Information Security, 14th International Conference, {ISC} 2011, Xi'an,
                  China, October 26-29, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7001},
  pages        = {47--62},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24861-0\_4},
  doi          = {10.1007/978-3-642-24861-0\_4},
  timestamp    = {Tue, 20 Aug 2024 07:54:44 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/DurholzFKO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/BaecherBFM11,
  author       = {Paul Baecher and
                  Niklas B{\"{u}}scher and
                  Marc Fischlin and
                  Benjamin Milde},
  editor       = {Jan Camenisch and
                  Simone Fischer{-}H{\"{u}}bner and
                  Yuko Murayama and
                  Armand Portmann and
                  Carlos Rieder},
  title        = {Breaking reCAPTCHA: {A} Holistic Approach via Shape Recognition},
  booktitle    = {Future Challenges in Security and Privacy for Academia and Industry
                  - 26th {IFIP} {TC} 11 International Information Security Conference,
                  {SEC} 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {354},
  pages        = {56--67},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21424-0\_5},
  doi          = {10.1007/978-3-642-21424-0\_5},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/BaecherBFM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/RiesFMM11,
  author       = {Sebastian Ries and
                  Marc Fischlin and
                  Leonardo A. Martucci and
                  Max M{\"{u}}hlh{\"{a}}user},
  title        = {Learning Whom to Trust in a Privacy-Friendly Way},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {214--225},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.30},
  doi          = {10.1109/TRUSTCOM.2011.30},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/RiesFMM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/FischlinLMM11,
  author       = {Marc Fischlin and
                  Anna Lysyanskaya and
                  Ueli Maurer and
                  Alexander May},
  title        = {Public-Key Cryptography (Dagstuhl Seminar 11391)},
  journal      = {Dagstuhl Reports},
  volume       = {1},
  number       = {9},
  pages        = {76--94},
  year         = {2011},
  url          = {https://doi.org/10.4230/DagRep.1.9.76},
  doi          = {10.4230/DAGREP.1.9.76},
  timestamp    = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-reports/FischlinLMM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FischlinLS11,
  author       = {Marc Fischlin and
                  Anja Lehmann and
                  Dominique Schr{\"{o}}der},
  title        = {History-Free Sequential Aggregate Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {231},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/231},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FischlinLS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DurholzFKO11,
  author       = {Ulrich D{\"{u}}rholz and
                  Marc Fischlin and
                  Michael Kasper and
                  Cristina Onete},
  title        = {A Formal Approach to Distance-Bounding {RFID} Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {321},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/321},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DurholzFKO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrzuskaFSK11,
  author       = {Christina Brzuska and
                  Marc Fischlin and
                  Heike Schr{\"{o}}der and
                  Stefan Katzenbeisser},
  title        = {Physically Uncloneable Functions in the Universal Composition Framework},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {681},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/681},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrzuskaFSK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BrzuskaBDFFKMOPPS10,
  author       = {Christina Brzuska and
                  Heike Busch and
                  {\"{O}}zg{\"{u}}r Dagdelen and
                  Marc Fischlin and
                  Martin Franz and
                  Stefan Katzenbeisser and
                  Mark Manulis and
                  Cristina Onete and
                  Andreas Peter and
                  Bertram Poettering and
                  Dominique Schr{\"{o}}der},
  editor       = {Jianying Zhou and
                  Moti Yung},
  title        = {Redactable Signatures for Tree-Structured Data: Definitions and Constructions},
  booktitle    = {Applied Cryptography and Network Security, 8th International Conference,
                  {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6123},
  pages        = {87--104},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13708-2\_6},
  doi          = {10.1007/978-3-642-13708-2\_6},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/BrzuskaBDFFKMOPPS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/GalindoLFFLMS10,
  author       = {David Galindo and
                  Beno{\^{\i}}t Libert and
                  Marc Fischlin and
                  Georg Fuchsbauer and
                  Anja Lehmann and
                  Mark Manulis and
                  Dominique Schr{\"{o}}der},
  editor       = {Daniel J. Bernstein and
                  Tanja Lange},
  title        = {Public-Key Encryption with Non-Interactive Opening: New Constructions
                  and Stronger Definitions},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference
                  on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6055},
  pages        = {333--350},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12678-9\_20},
  doi          = {10.1007/978-3-642-12678-9\_20},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/GalindoLFFLMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/FischlinLRSST10,
  author       = {Marc Fischlin and
                  Anja Lehmann and
                  Thomas Ristenpart and
                  Thomas Shrimpton and
                  Martijn Stam and
                  Stefano Tessaro},
  editor       = {Masayuki Abe},
  title        = {Random Oracles with(out) Programmability},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2010 - 16th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 5-9, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6477},
  pages        = {303--320},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17373-8\_18},
  doi          = {10.1007/978-3-642-17373-8\_18},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/FischlinLRSST10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/FischlinLW10,
  author       = {Marc Fischlin and
                  Anja Lehmann and
                  Daniel Wagner},
  editor       = {Josef Pieprzyk},
  title        = {Hash Function Combiners in {TLS} and {SSL}},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2010, The Cryptographers' Track at
                  the {RSA} Conference 2010, San Francisco, CA, USA, March 1-5, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5985},
  pages        = {268--283},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11925-5\_19},
  doi          = {10.1007/978-3-642-11925-5\_19},
  timestamp    = {Sun, 02 Jun 2019 21:22:43 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/FischlinLW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/FischlinS10,
  author       = {Marc Fischlin and
                  Dominique Schr{\"{o}}der},
  editor       = {Henri Gilbert},
  title        = {On the Impossibility of Three-Move Blind Signature Schemes},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Monaco / French Riviera, May 30 - June 3, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6110},
  pages        = {197--215},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13190-5\_10},
  doi          = {10.1007/978-3-642-13190-5\_10},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/FischlinS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/DagdelenF10,
  author       = {{\"{O}}zg{\"{u}}r Dagdelen and
                  Marc Fischlin},
  editor       = {Mike Burmester and
                  Gene Tsudik and
                  Spyros S. Magliveras and
                  Ivana Ilic},
  title        = {Security Analysis of the Extended Access Control Protocol for Machine
                  Readable Travel Documents},
  booktitle    = {Information Security - 13th International Conference, {ISC} 2010,
                  Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6531},
  pages        = {54--68},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-18178-8\_6},
  doi          = {10.1007/978-3-642-18178-8\_6},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/DagdelenF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BrzuskaFLS10,
  author       = {Christina Brzuska and
                  Marc Fischlin and
                  Anja Lehmann and
                  Dominique Schr{\"{o}}der},
  editor       = {Phong Q. Nguyen and
                  David Pointcheval},
  title        = {Unlinkability of Sanitizable Signatures},
  booktitle    = {Public Key Cryptography - {PKC} 2010, 13th International Conference
                  on Practice and Theory in Public Key Cryptography, Paris, France,
                  May 26-28, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6056},
  pages        = {444--461},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13013-7\_26},
  doi          = {10.1007/978-3-642-13013-7\_26},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BrzuskaFLS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DentFMSS10,
  author       = {Alexander W. Dent and
                  Marc Fischlin and
                  Mark Manulis and
                  Martijn Stam and
                  Dominique Schr{\"{o}}der},
  editor       = {Phong Q. Nguyen and
                  David Pointcheval},
  title        = {Confidential Signatures and Deterministic Signcryption},
  booktitle    = {Public Key Cryptography - {PKC} 2010, 13th International Conference
                  on Practice and Theory in Public Key Cryptography, Paris, France,
                  May 26-28, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6056},
  pages        = {462--479},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13013-7\_27},
  doi          = {10.1007/978-3-642-13013-7\_27},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/DentFMSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/EikemeierFGLSSW10,
  author       = {Oliver Eikemeier and
                  Marc Fischlin and
                  Jens{-}Fabian G{\"{o}}tzmann and
                  Anja Lehmann and
                  Dominique Schr{\"{o}}der and
                  Peter Schr{\"{o}}der and
                  Daniel Wagner},
  editor       = {Juan A. Garay and
                  Roberto De Prisco},
  title        = {History-Free Aggregate Message Authentication Codes},
  booktitle    = {Security and Cryptography for Networks, 7th International Conference,
                  {SCN} 2010, Amalfi, Italy, September 13-15, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6280},
  pages        = {309--328},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15317-4\_20},
  doi          = {10.1007/978-3-642-15317-4\_20},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/EikemeierFGLSSW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/BaecherFGLLS10,
  author       = {Paul Baecher and
                  Marc Fischlin and
                  Lior Gordon and
                  Robert Langenberg and
                  Michael L{\"{u}}tzow and
                  Dominique Schr{\"{o}}der},
  editor       = {Felix C. Freiling},
  title        = {CAPTCHAs: The Good, the Bad, and the Ugly},
  booktitle    = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober
                  2010 in Berlin},
  series       = {{LNI}},
  volume       = {{P-170}},
  pages        = {353--365},
  publisher    = {{GI}},
  year         = {2010},
  url          = {https://dl.gi.de/handle/20.500.12116/19796},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/BaecherFGLLS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/FischlinL10,
  author       = {Marc Fischlin and
                  Anja Lehmann},
  editor       = {Daniele Micciancio},
  title        = {Delayed-Key Message Authentication for Streams},
  booktitle    = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  pages        = {290--307},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2\_18},
  doi          = {10.1007/978-3-642-11799-2\_18},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/FischlinL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1008-0931,
  author       = {{\"{O}}zg{\"{u}}r Dagdelen and
                  Marc Fischlin and
                  Anja Lehmann and
                  Christian Schaffner},
  title        = {Random Oracles in a Quantum World},
  journal      = {CoRR},
  volume       = {abs/1008.0931},
  year         = {2010},
  url          = {http://arxiv.org/abs/1008.0931},
  eprinttype    = {arXiv},
  eprint       = {1008.0931},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1008-0931.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehDFLSZ10,
  author       = {Dan Boneh and
                  {\"{O}}zg{\"{u}}r Dagdelen and
                  Marc Fischlin and
                  Anja Lehmann and
                  Christian Schaffner and
                  Mark Zhandry},
  title        = {Random Oracles in a Quantum World},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {428},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/428},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehDFLSZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/FischlinF09,
  author       = {Marc Fischlin and
                  Roger Fischlin},
  title        = {Efficient Non-malleable Commitment Schemes},
  journal      = {J. Cryptol.},
  volume       = {22},
  number       = {4},
  pages        = {530--571},
  year         = {2009},
  url          = {https://doi.org/10.1007/s00145-009-9045-2},
  doi          = {10.1007/S00145-009-9045-2},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/FischlinF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BoldyrevaCFW09,
  author       = {Alexandra Boldyreva and
                  David Cash and
                  Marc Fischlin and
                  Bogdan Warinschi},
  editor       = {Mitsuru Matsui},
  title        = {Foundations of Non-malleable Hash and One-Way Functions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {524--541},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_31},
  doi          = {10.1007/978-3-642-10366-7\_31},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BoldyrevaCFW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/biosig/BrzuskaFLS09,
  author       = {Christina Brzuska and
                  Marc Fischlin and
                  Anja Lehmann and
                  Dominique Schr{\"{o}}der},
  editor       = {Arslan Br{\"{o}}mme and
                  Christoph Busch and
                  Detlef H{\"{u}}hnlein},
  title        = {Santizable Signatures: How to Partially Delegate Control for Authenticated
                  Data},
  booktitle    = {{BIOSIG} 2009 - Proceedings of the Special Interest Group on Biometrics
                  and Electronic Signatures, 17.-18. September 2009 in Darmstadt, Germany},
  series       = {{LNI}},
  volume       = {{P-155}},
  pages        = {117--128},
  publisher    = {{GI}},
  year         = {2009},
  url          = {https://dl.gi.de/handle/20.500.12116/23196},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/biosig/BrzuskaFLS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/BenderFK09,
  author       = {Jens Bender and
                  Marc Fischlin and
                  Dennis K{\"{u}}gler},
  editor       = {Pierangela Samarati and
                  Moti Yung and
                  Fabio Martinelli and
                  Claudio A. Ardagna},
  title        = {Security Analysis of the {PACE} Key-Agreement Protocol},
  booktitle    = {Information Security, 12th International Conference, {ISC} 2009, Pisa,
                  Italy, September 7-9, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5735},
  pages        = {33--48},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04474-8\_3},
  doi          = {10.1007/978-3-642-04474-8\_3},
  timestamp    = {Mon, 21 Mar 2022 18:09:53 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/BenderFK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FischlinS09,
  author       = {Marc Fischlin and
                  Dominique Schr{\"{o}}der},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {Security of Blind Signatures under Aborts},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {297--316},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_17},
  doi          = {10.1007/978-3-642-00468-1\_17},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/FischlinS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BrzuskaFFLPSSV09,
  author       = {Christina Brzuska and
                  Marc Fischlin and
                  Tobias Freudenreich and
                  Anja Lehmann and
                  Marcus Page and
                  Jakob Schelbert and
                  Dominique Schr{\"{o}}der and
                  Florian Volk},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {Security of Sanitizable Signatures Revisited},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {317--336},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_18},
  doi          = {10.1007/978-3-642-00468-1\_18},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/BrzuskaFFLPSSV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ctrsa/2009,
  editor       = {Marc Fischlin},
  title        = {Topics in Cryptology - {CT-RSA} 2009, The Cryptographers' Track at
                  the {RSA} Conference 2009, San Francisco, CA, USA, April 20-24, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5473},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00862-7},
  doi          = {10.1007/978-3-642-00862-7},
  isbn         = {978-3-642-00861-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoldyrevaCFW09,
  author       = {Alexandra Boldyreva and
                  David Cash and
                  Marc Fischlin and
                  Bogdan Warinschi},
  title        = {Foundations of Non-Malleable Hash and One-Way Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {65},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/065},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoldyrevaCFW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DentFMSS09,
  author       = {Alexander W. Dent and
                  Marc Fischlin and
                  Mark Manulis and
                  Martijn Stam and
                  Dominique Schr{\"{o}}der},
  title        = {Confidential Signatures and Deterministic Signcryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {588},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/588},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DentFMSS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BenderFK09,
  author       = {Jens Bender and
                  Marc Fischlin and
                  Dennis K{\"{u}}gler},
  title        = {Security Analysis of the {PACE} Key-Agreement Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {624},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/624},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BenderFK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BellareFOR08,
  author       = {Mihir Bellare and
                  Marc Fischlin and
                  Adam O'Neill and
                  Thomas Ristenpart},
  editor       = {David A. Wagner},
  title        = {Deterministic Encryption: Definitional Equivalences and Constructions
                  without Random Oracles},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2008, 28th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5157},
  pages        = {360--378},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85174-5\_20},
  doi          = {10.1007/978-3-540-85174-5\_20},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BellareFOR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/Fischlin08,
  author       = {Marc Fischlin},
  editor       = {Tal Malkin},
  title        = {Security of NMACand HMACBased on Non-malleability},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2008, The Cryptographers' Track at
                  the {RSA} Conference 2008, San Francisco, CA, USA, April 8-11, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4964},
  pages        = {138--154},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79263-5\_9},
  doi          = {10.1007/978-3-540-79263-5\_9},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/Fischlin08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/FischlinLP08,
  author       = {Marc Fischlin and
                  Anja Lehmann and
                  Krzysztof Pietrzak},
  editor       = {Luca Aceto and
                  Ivan Damg{\aa}rd and
                  Leslie Ann Goldberg and
                  Magn{\'{u}}s M. Halld{\'{o}}rsson and
                  Anna Ing{\'{o}}lfsd{\'{o}}ttir and
                  Igor Walukiewicz},
  title        = {Robust Multi-property Combiners for Hash Functions Revisited},
  booktitle    = {Automata, Languages and Programming, 35th International Colloquium,
                  {ICALP} 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part
                  {II} - Track {B:} Logic, Semantics, and Theory of Programming {\&}
                  Track {C:} Security and Cryptography Foundations},
  series       = {Lecture Notes in Computer Science},
  volume       = {5126},
  pages        = {655--666},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70583-3\_53},
  doi          = {10.1007/978-3-540-70583-3\_53},
  timestamp    = {Fri, 27 Mar 2020 09:02:59 +0100},
  biburl       = {https://dblp.org/rec/conf/icalp/FischlinLP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/FischlinL08,
  author       = {Marc Fischlin and
                  Anja Lehmann},
  editor       = {Ran Canetti},
  title        = {Multi-property Preserving Combiners for Hash Functions},
  booktitle    = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC}
                  2008, New York, USA, March 19-21, 2008},
  series       = {Lecture Notes in Computer Science},
  volume       = {4948},
  pages        = {375--392},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78524-8\_21},
  doi          = {10.1007/978-3-540-78524-8\_21},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/FischlinL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareFOR08,
  author       = {Mihir Bellare and
                  Marc Fischlin and
                  Adam O'Neill and
                  Thomas Ristenpart},
  title        = {Deterministic Encryption: Definitional Equivalences and Constructions
                  without Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {267},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/267},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareFOR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FischlinL07,
  author       = {Marc Fischlin and
                  Anja Lehmann},
  editor       = {Alfred Menezes},
  title        = {Security-Amplifying Combiners for Collision-Resistant Hash Functions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2007, 27th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4622},
  pages        = {224--243},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74143-5\_13},
  doi          = {10.1007/978-3-540-74143-5\_13},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/FischlinL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/DonigusEFHJLPSTVWW07,
  author       = {Daniel D{\"{o}}nigus and
                  Stefan Endler and
                  Marc Fischlin and
                  Andreas H{\"{u}}lsing and
                  Patrick J{\"{a}}ger and
                  Anja Lehmann and
                  Sergey Podrazhansky and
                  Sebastian Schipp and
                  Erik Tews and
                  Sven Vowe and
                  Matthias Walthart and
                  Frederik Weidemann},
  editor       = {Teddy Furon and
                  Fran{\c{c}}ois Cayre and
                  Gwena{\"{e}}l J. Do{\"{e}}rr and
                  Patrick Bas},
  title        = {Security of Invertible Media Authentication Schemes Revisited},
  booktitle    = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo,
                  France, June 11-13, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4567},
  pages        = {189--203},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77370-2\_13},
  doi          = {10.1007/978-3-540-77370-2\_13},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/DonigusEFHJLPSTVWW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Fischlin07,
  author       = {Marc Fischlin},
  editor       = {Tatsuaki Okamoto and
                  Xiaoyun Wang},
  title        = {Anonymous Signatures Made Easy},
  booktitle    = {Public Key Cryptography - {PKC} 2007, 10th International Conference
                  on Practice and Theory in Public-Key Cryptography, Beijing, China,
                  April 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4450},
  pages        = {31--42},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71677-8\_3},
  doi          = {10.1007/978-3-540-71677-8\_3},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Fischlin07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BoldyrevaFPW07,
  author       = {Alexandra Boldyreva and
                  Marc Fischlin and
                  Adriana Palacio and
                  Bogdan Warinschi},
  editor       = {Tatsuaki Okamoto and
                  Xiaoyun Wang},
  title        = {A Closer Look at {PKI:} Security and Efficiency},
  booktitle    = {Public Key Cryptography - {PKC} 2007, 10th International Conference
                  on Practice and Theory in Public-Key Cryptography, Beijing, China,
                  April 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4450},
  pages        = {458--475},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71677-8\_30},
  doi          = {10.1007/978-3-540-71677-8\_30},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BoldyrevaFPW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BoldyrevaF06,
  author       = {Alexandra Boldyreva and
                  Marc Fischlin},
  editor       = {Xuejia Lai and
                  Kefei Chen},
  title        = {On the Security of {OAEP}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2006, 12th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Shanghai, China, December 3-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4284},
  pages        = {210--225},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935230\_14},
  doi          = {10.1007/11935230\_14},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BoldyrevaF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Fischlin06,
  author       = {Marc Fischlin},
  editor       = {Cynthia Dwork},
  title        = {Round-Optimal Composable Blind Signatures in the Common Reference
                  String Model},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 20-24,
                  2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4117},
  pages        = {60--77},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11818175\_4},
  doi          = {10.1007/11818175\_4},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Fischlin06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/Fischlin06,
  author       = {Marc Fischlin},
  editor       = {David Pointcheval},
  title        = {Universally Composable Oblivious Transfer in the Multi-party Setting},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2006, The Cryptographers' Track at
                  the {RSA} Conference 2006, San Jose, CA, USA, February 13-17, 2006,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3860},
  pages        = {332--349},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11605805\_21},
  doi          = {10.1007/11605805\_21},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/Fischlin06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Fischlin05,
  author       = {Marc Fischlin},
  editor       = {Victor Shoup},
  title        = {Communication-Efficient Non-interactive Proofs of Knowledge with Online
                  Extractors},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 14-18,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3621},
  pages        = {152--168},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11535218\_10},
  doi          = {10.1007/11535218\_10},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Fischlin05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BoldyrevaF05,
  author       = {Alexandra Boldyreva and
                  Marc Fischlin},
  editor       = {Victor Shoup},
  title        = {Analysis of Random Oracle Instantiation Scenarios for {OAEP} and Other
                  Practical Schemes},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 14-18,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3621},
  pages        = {412--429},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11535218\_25},
  doi          = {10.1007/11535218\_25},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BoldyrevaF05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/Fischlin05,
  author       = {Marc Fischlin},
  editor       = {Lu{\'{\i}}s Caires and
                  Giuseppe F. Italiano and
                  Lu{\'{\i}}s Monteiro and
                  Catuscia Palamidessi and
                  Moti Yung},
  title        = {Completely Non-malleable Schemes},
  booktitle    = {Automata, Languages and Programming, 32nd International Colloquium,
                  {ICALP} 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3580},
  pages        = {779--790},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11523468\_63},
  doi          = {10.1007/11523468\_63},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/Fischlin05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/Fischlin04,
  author       = {Marc Fischlin},
  editor       = {Tatsuaki Okamoto},
  title        = {Fast Verification of Hash Chains},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2004, The Cryptographers' Track at
                  the {RSA} Conference 2004, San Francisco, CA, USA, February 23-27,
                  2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2964},
  pages        = {339--352},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24660-2\_26},
  doi          = {10.1007/978-3-540-24660-2\_26},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/Fischlin04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/EnzmannFS04,
  author       = {Matthias Enzmann and
                  Marc Fischlin and
                  Markus Schneider},
  editor       = {Ari Juels},
  title        = {A Privacy-Friendly Loyalty System Based on Discrete Logarithms over
                  Elliptic Curves},
  booktitle    = {Financial Cryptography, 8th International Conference, {FC} 2004, Key
                  West, FL, USA, February 9-12, 2004. Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3110},
  pages        = {24--38},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27809-2\_4},
  doi          = {10.1007/978-3-540-27809-2\_4},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/EnzmannFS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/Fischlin03,
  author       = {Marc Fischlin},
  editor       = {Thomas Johansson and
                  Subhamoy Maitra},
  title        = {Progressive Verification: The Case of Message Authentication: (Extended
                  Abstract)},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2003, 4th International Conference
                  on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2904},
  pages        = {416--429},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24582-7\_31},
  doi          = {10.1007/978-3-540-24582-7\_31},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/Fischlin03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Fischlin03,
  author       = {Marc Fischlin},
  editor       = {Yvo Desmedt},
  title        = {The Cramer-Shoup Strong-RSASignature Scheme Revisited},
  booktitle    = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on
                  Theory and Practice in Public Key Cryptography, Miami, FL, USA, January
                  6-8, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2567},
  pages        = {116--129},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36288-6\_9},
  doi          = {10.1007/3-540-36288-6\_9},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Fischlin03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/Fischlin02,
  author       = {Marc Fischlin},
  editor       = {Bart Preneel},
  title        = {On the Impossibility of Constructing Non-interactive Statistically-Secret
                  Protocols from Any Trapdoor One-Way Function},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2002, The Cryptographer's Track at
                  the {RSA} Conference, 2002, San Jose, CA, USA, February 18-22, 2002,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2271},
  pages        = {79--95},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45760-7\_7},
  doi          = {10.1007/3-540-45760-7\_7},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/Fischlin02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/FischlinF02,
  author       = {Marc Fischlin and
                  Roger Fischlin},
  editor       = {Bart Preneel},
  title        = {The Representation Problem Based on Factoring},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2002, The Cryptographer's Track at
                  the {RSA} Conference, 2002, San Jose, CA, USA, February 18-22, 2002,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2271},
  pages        = {96--113},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45760-7\_8},
  doi          = {10.1007/3-540-45760-7\_8},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/FischlinF02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Fischlin02,
  author       = {Marc Fischlin},
  title        = {The Cramer-Shoup Strong-RSA Signature Scheme Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {17},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/017},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Fischlin02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/dnb/Fischlin01,
  author       = {Marc Fischlin},
  title        = {Trapdoor commitment schemes and their applications},
  school       = {Goethe University Frankfurt, Frankfurt am Main, Germany},
  year         = {2001},
  url          = {http://zaurak.tm.informatik.uni-frankfurt.de/diss/data/src/00000229/00000229.pdf.gz},
  urn          = {urn:nbn:de:hebis:30-0000000471},
  timestamp    = {Sat, 17 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/dnb/Fischlin01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/Fischlin01,
  author       = {Marc Fischlin},
  title        = {Cryptographic limitations on parallelizing membership and equivalence
                  queries with applications to random-self-reductions},
  journal      = {Theor. Comput. Sci.},
  volume       = {268},
  number       = {2},
  pages        = {199--219},
  year         = {2001},
  url          = {https://doi.org/10.1016/S0304-3975(00)00271-1},
  doi          = {10.1016/S0304-3975(00)00271-1},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/Fischlin01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CanettiF01,
  author       = {Ran Canetti and
                  Marc Fischlin},
  editor       = {Joe Kilian},
  title        = {Universally Composable Commitments},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2001, 21st Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 19-23,
                  2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2139},
  pages        = {19--40},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44647-8\_2},
  doi          = {10.1007/3-540-44647-8\_2},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CanettiF01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/Fischlin01,
  author       = {Marc Fischlin},
  editor       = {David Naccache},
  title        = {A Cost-Effective Pay-Per-Multiplication Comparison Method for Millionaires},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2001, The Cryptographer's Track at
                  {RSA} Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2020},
  pages        = {457--472},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45353-9\_33},
  doi          = {10.1007/3-540-45353-9\_33},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/Fischlin01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BellareFGM01,
  author       = {Mihir Bellare and
                  Marc Fischlin and
                  Shafi Goldwasser and
                  Silvio Micali},
  editor       = {Birgit Pfitzmann},
  title        = {Identification Protocols Secure against Reset Attacks},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2001, International Conference
                  on the Theory and Application of Cryptographic Techniques, Innsbruck,
                  Austria, May 6-10, 2001, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {2045},
  pages        = {495--511},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44987-6\_30},
  doi          = {10.1007/3-540-44987-6\_30},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BellareFGM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiF01,
  author       = {Ran Canetti and
                  Marc Fischlin},
  title        = {Universally Composable Commitments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {55},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/055},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiF01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Fischlin00,
  author       = {Marc Fischlin},
  editor       = {Tatsuaki Okamoto},
  title        = {A Note on Security Proofs in the Generic Model},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kyoto, Japan, December 3-7, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1976},
  pages        = {458--469},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44448-3\_35},
  doi          = {10.1007/3-540-44448-3\_35},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Fischlin00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FischlinF00,
  author       = {Marc Fischlin and
                  Roger Fischlin},
  editor       = {Mihir Bellare},
  title        = {Efficient Non-malleable Commitment Schemes},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 20-24,
                  2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1880},
  pages        = {413--431},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44598-6\_26},
  doi          = {10.1007/3-540-44598-6\_26},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/FischlinF00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareFGM00,
  author       = {Mihir Bellare and
                  Marc Fischlin and
                  Shafi Goldwasser and
                  Silvio Micali},
  title        = {Identification Protocols Secure Against Reset Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {15},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/015},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareFGM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Fischlin99,
  author       = {Marc Fischlin},
  editor       = {Jacques Stern},
  title        = {Pseudorandom Function Tribe Ensembles Based on One-Way Permutations:
                  Improvements and Applications},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '99, International Conference
                  on the Theory and Application of Cryptographic Techniques, Prague,
                  Czech Republic, May 2-6, 1999, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1592},
  pages        = {432--445},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48910-X\_30},
  doi          = {10.1007/3-540-48910-X\_30},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Fischlin99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/alt/Fischlin98,
  author       = {Marc Fischlin},
  editor       = {Michael M. Richter and
                  Carl H. Smith and
                  Rolf Wiehagen and
                  Thomas Zeugmann},
  title        = {Cryptographic Limitations on Parallelizing Membership and Equivalence
                  Queries with Applications to Random Self-Reductions},
  booktitle    = {Algorithmic Learning Theory, 9th International Conference, {ALT} '98,
                  Otzenhausen, Germany, October 8-10, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1501},
  pages        = {72--86},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49730-7\_6},
  doi          = {10.1007/3-540-49730-7\_6},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/alt/Fischlin98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Fischlin97,
  author       = {Marc Fischlin},
  editor       = {Vijay Varadharajan and
                  Josef Pieprzyk and
                  Yi Mu},
  title        = {Practical Memory Checkers for Stacks, Queues and Deques},
  booktitle    = {Information Security and Privacy, Second Australasian Conference,
                  ACISP'97, Sydney, NSW, Australia, July 7-9, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1270},
  pages        = {114--125},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0027919},
  doi          = {10.1007/BFB0027919},
  timestamp    = {Sun, 02 Jun 2019 21:26:44 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Fischlin97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Fischlin97,
  author       = {Marc Fischlin},
  editor       = {Walter Fumy},
  title        = {Incremental Cryptography and Memory Checkers},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '97, International Conference
                  on the Theory and Application of Cryptographic Techniques, Konstanz,
                  Germany, May 11-15, 1997, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1233},
  pages        = {293--408},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/3-540-69053-0\_27},
  doi          = {10.1007/3-540-69053-0\_27},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Fischlin97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/Fischlin97,
  author       = {Marc Fischlin},
  title        = {Lower Bounds for the Signature Size of Incremental Schemes},
  booktitle    = {38th Annual Symposium on Foundations of Computer Science, {FOCS} '97,
                  Miami Beach, Florida, USA, October 19-22, 1997},
  pages        = {438--447},
  publisher    = {{IEEE} Computer Society},
  year         = {1997},
  url          = {https://doi.org/10.1109/SFCS.1997.646132},
  doi          = {10.1109/SFCS.1997.646132},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/Fischlin97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}