default search action
BibTeX records: Marc Fischlin
@article{DBLP:journals/joc/FischlinGJ24, author = {Marc Fischlin and Felix G{\"{u}}nther and Christian Janson}, title = {Robust Channels: Handling Unreliable Networks in the Record Layers of {QUIC} and {DTLS} 1.3}, journal = {J. Cryptol.}, volume = {37}, number = {2}, pages = {9}, year = {2024}, url = {https://doi.org/10.1007/s00145-023-09489-9}, doi = {10.1007/S00145-023-09489-9}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joc/FischlinGJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/LinsnerDFR24, author = {Sebastian Linsner and Kilian Demuth and Marc Fischlin and Christian Reuter}, title = {Decision-based Data Distribution (D{\({^3}\)}): Enabling Users to Minimize Data Propagation in Privacy-sensitive Scenarios}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2024}, number = {4}, pages = {185--208}, year = {2024}, url = {https://doi.org/10.56553/popets-2024-0113}, doi = {10.56553/POPETS-2024-0113}, timestamp = {Thu, 18 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/LinsnerDFR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ChenF24, author = {Shan Chen and Marc Fischlin}, editor = {Marc Joye and Gregor Leander}, title = {Integrating Causality in Messaging Channels}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14653}, pages = {251--282}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58734-4\_9}, doi = {10.1007/978-3-031-58734-4\_9}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ChenF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenF24, author = {Shan Chen and Marc Fischlin}, title = {Integrating Causality in Messaging Channels}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {362}, year = {2024}, url = {https://eprint.iacr.org/2024/362}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChenF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DuzluFF24, author = {Samed D{\"{u}}zl{\"{u}} and Rune Fiedler and Marc Fischlin}, title = {BUFFing {FALCON} without Increasing the Signature Size}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {710}, year = {2024}, url = {https://eprint.iacr.org/2024/710}, timestamp = {Wed, 29 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DuzluFF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FischlinS24, author = {Marc Fischlin and Olga Sanina}, title = {Fake It till You Make It: Enhancing Security of Bluetooth Secure Connections via Deferrable Authentication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {874}, year = {2024}, url = {https://eprint.iacr.org/2024/874}, timestamp = {Mon, 01 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FischlinS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DegabrieleFG23, author = {Jean Paul Degabriele and Marc Fischlin and J{\'{e}}r{\^{o}}me Govinden}, editor = {Jian Guo and Ron Steinfeld}, title = {The Indifferentiability of the Duplex and Its Practical Applications}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part {VIII}}, series = {Lecture Notes in Computer Science}, volume = {14445}, pages = {237--269}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8742-9\_8}, doi = {10.1007/978-981-99-8742-9\_8}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/DegabrieleFG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Fischlin23, author = {Marc Fischlin}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {Stealth Key Exchange and Confined Access to the Record Protocol Data in {TLS} 1.3}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {2901--2914}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3623099}, doi = {10.1145/3576915.3623099}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Fischlin23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Fischlin023, author = {Marc Fischlin and Felix G{\"{u}}nther}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {Verifiable Verification in Cryptographic Protocols}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {3239--3253}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3623151}, doi = {10.1145/3576915.3623151}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Fischlin023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secsr/FischlinHMMWB23, author = {Marc Fischlin and Jonas von der Heyden and Marian Margraf and Frank Morgner and Andreas Wallner and Holger Bock}, editor = {Felix G{\"{u}}nther and Julia Hesse}, title = {Post-quantum Security for the Extended Access Control Protocol}, booktitle = {Security Standardisation Research - 8th International Conference, {SSR} 2023, Lyon, France, April 22-23, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13895}, pages = {22--52}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30731-7\_2}, doi = {10.1007/978-3-031-30731-7\_2}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secsr/FischlinHMMWB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/FischlinR23, author = {Marc Fischlin and Felix Rohrbach}, editor = {Guy N. Rothblum and Hoeteck Wee}, title = {Searching for ELFs in the Cryptographic Forest}, booktitle = {Theory of Cryptography - 21st International Conference, {TCC} 2023, Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14371}, pages = {207--236}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-48621-0\_8}, doi = {10.1007/978-3-031-48621-0\_8}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/FischlinR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-07623, author = {Georgios M. Nikolopoulos and Marc Fischlin}, title = {Quantum key distribution with post-processing driven by physical unclonable functions}, journal = {CoRR}, volume = {abs/2302.07623}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.07623}, doi = {10.48550/ARXIV.2302.07623}, eprinttype = {arXiv}, eprint = {2302.07623}, timestamp = {Mon, 20 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-07623.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FischlinHMMWB23, author = {Marc Fischlin and Jonas von der Heyden and Marian Margraf and Frank Morgner and Andreas Wallner and Holger Bock}, title = {Post-Quantum Security for the Extended Access Control Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {352}, year = {2023}, url = {https://eprint.iacr.org/2023/352}, timestamp = {Fri, 31 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FischlinHMMWB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Fischlin23, author = {Marc Fischlin}, title = {Stealth Key Exchange and Confined Access to the Record Protocol Data in {TLS} 1.3}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {651}, year = {2023}, url = {https://eprint.iacr.org/2023/651}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Fischlin23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FischlinG23, author = {Marc Fischlin and Felix G{\"{u}}nther}, title = {Verifiable Verification in Cryptographic Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1214}, year = {2023}, url = {https://eprint.iacr.org/2023/1214}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FischlinG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrendelCF23, author = {Jacqueline Brendel and Sebastian Clermont and Marc Fischlin}, title = {Post-Quantum Asynchronous Remote Key Generation for {FIDO2} Account Recovery}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1275}, year = {2023}, url = {https://eprint.iacr.org/2023/1275}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrendelCF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FischlinR23, author = {Marc Fischlin and Felix Rohrbach}, title = {Searching for ELFs in the Cryptographic Forest}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1403}, year = {2023}, url = {https://eprint.iacr.org/2023/1403}, timestamp = {Sat, 07 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FischlinR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/FischlinRS22, author = {Marc Fischlin and Felix Rohrbach and Tobias Schmalz}, editor = {Lejla Batina and Joan Daemen}, title = {A Random Oracle for All of Us}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2022: 13th International Conference on Cryptology in Africa, {AFRICACRYPT} 2022, Fes, Morocco, July 18-20, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13503}, pages = {469--489}, publisher = {Springer Nature Switzerland}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17433-9\_20}, doi = {10.1007/978-3-031-17433-9\_20}, timestamp = {Sun, 10 Dec 2023 00:28:26 +0100}, biburl = {https://dblp.org/rec/conf/africacrypt/FischlinRS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BenediktFH22, author = {Barbara Jiabao Benedikt and Marc Fischlin and Moritz Huppert}, editor = {Shweta Agrawal and Dongdai Lin}, title = {Nostradamus Goes Quantum}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13793}, pages = {583--613}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22969-5\_20}, doi = {10.1007/978-3-031-22969-5\_20}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/BenediktFH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FischlinRS22, author = {Marc Fischlin and Felix Rohrbach and Tobias Schmalz}, title = {A Random Oracle for All of Us}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {906}, year = {2022}, url = {https://eprint.iacr.org/2022/906}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FischlinRS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BenediktFH22, author = {Barbara Jiabao Benedikt and Marc Fischlin and Moritz Huppert}, title = {Nostradamus goes Quantum}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1213}, year = {2022}, url = {https://eprint.iacr.org/2022/1213}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BenediktFH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/isc/MittelbachF21, author = {Arno Mittelbach and Marc Fischlin}, title = {The Theory of Hash Functions and Random Oracles - An Approach to Modern Cryptography}, series = {Information Security and Cryptography}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-63287-8}, doi = {10.1007/978-3-030-63287-8}, isbn = {978-3-030-63286-1}, timestamp = {Fri, 29 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/isc/MittelbachF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/DowlingFGS21, author = {Benjamin Dowling and Marc Fischlin and Felix G{\"{u}}nther and Douglas Stebila}, title = {A Cryptographic Analysis of the {TLS} 1.3 Handshake Protocol}, journal = {J. Cryptol.}, volume = {34}, number = {4}, pages = {37}, year = {2021}, url = {https://doi.org/10.1007/s00145-021-09384-1}, doi = {10.1007/S00145-021-09384-1}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/DowlingFGS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/FischlinS21, author = {Marc Fischlin and Olga Sanina}, editor = {Mehdi Tibouchi and Huaxiong Wang}, title = {Cryptographic Analysis of the Bluetooth Secure Connection Protocol Suite}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13091}, pages = {696--725}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92075-3\_24}, doi = {10.1007/978-3-030-92075-3\_24}, timestamp = {Fri, 03 Dec 2021 17:36:49 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/FischlinS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/FischlinMMP21, author = {Marc Fischlin and Sven{-}Andr{\'{e}} M{\"{u}}ller and Jean{-}Pierre M{\"{u}}nch and Lars Porth}, editor = {Elisa Bertino and Haya Schulmann and Michael Waidner}, title = {Multipath {TLS} 1.3}, booktitle = {Computer Security - {ESORICS} 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12973}, pages = {86--105}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88428-4\_5}, doi = {10.1007/978-3-030-88428-4\_5}, timestamp = {Tue, 17 Oct 2023 10:41:56 +0200}, biburl = {https://dblp.org/rec/conf/esorics/FischlinMMP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FischlinR21, author = {Marc Fischlin and Felix Rohrbach}, editor = {Juan A. Garay}, title = {Single-to-Multi-theorem Transformations for Non-interactive Statistical Zero-Knowledge}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12711}, pages = {205--234}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75248-4\_8}, doi = {10.1007/978-3-030-75248-4\_8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/FischlinR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/CremersDFFJ21, author = {Cas Cremers and Samed D{\"{u}}zl{\"{u}} and Rune Fiedler and Marc Fischlin and Christian Janson}, title = {BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures}, booktitle = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco, CA, USA, 24-27 May 2021}, pages = {1696--1714}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SP40001.2021.00093}, doi = {10.1109/SP40001.2021.00093}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/CremersDFFJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FischlinM21, author = {Marc Fischlin and Arno Mittelbach}, title = {An Overview of the Hybrid Argument}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {88}, year = {2021}, url = {https://eprint.iacr.org/2021/088}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FischlinM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FischlinS21, author = {Marc Fischlin and Olga Sanina}, title = {Cryptographic Analysis of the Bluetooth Secure Connection Protocol Suite}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1597}, year = {2021}, url = {https://eprint.iacr.org/2021/1597}, timestamp = {Thu, 13 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FischlinS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/NikolopoulosF20, author = {Georgios M. Nikolopoulos and Marc Fischlin}, title = {Information-Theoretically Secure Data Origin Authentication with Quantum and Classical Resources}, journal = {Cryptogr.}, volume = {4}, number = {4}, pages = {31}, year = {2020}, url = {https://doi.org/10.3390/cryptography4040031}, doi = {10.3390/CRYPTOGRAPHY4040031}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/NikolopoulosF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BockBFJM20, author = {Estuardo Alpirez Bock and Chris Brzuska and Marc Fischlin and Christian Janson and Wil Michiels}, editor = {Shiho Moriai and Huaxiong Wang}, title = {Security Reductions for White-Box Key-Storage in Mobile Payments}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12491}, pages = {221--252}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64837-4\_8}, doi = {10.1007/978-3-030-64837-4\_8}, timestamp = {Thu, 10 Dec 2020 09:57:08 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/BockBFJM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/GuilhemFW20, author = {Cyprien Delpech de Saint Guilhem and Marc Fischlin and Bogdan Warinschi}, title = {Authentication in Key-Exchange: Definitions, Relations and Composition}, booktitle = {33rd {IEEE} Computer Security Foundations Symposium, {CSF} 2020, Boston, MA, USA, June 22-26, 2020}, pages = {288--303}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CSF49147.2020.00028}, doi = {10.1109/CSF49147.2020.00028}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/GuilhemFW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/Fischlin020, author = {Marc Fischlin and Felix G{\"{u}}nther}, editor = {Stanislaw Jarecki}, title = {Modeling Memory Faults in Signature and Authenticated Encryption Schemes}, booktitle = {Topics in Cryptology - {CT-RSA} 2020 - The Cryptographers' Track at the {RSA} Conference 2020, San Francisco, CA, USA, February 24-28, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12006}, pages = {56--84}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-40186-3\_4}, doi = {10.1007/978-3-030-40186-3\_4}, timestamp = {Fri, 14 Feb 2020 13:00:36 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/Fischlin020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FischlinHJ20, author = {Marc Fischlin and Patrick Harasser and Christian Janson}, editor = {Anne Canteaut and Yuval Ishai}, title = {Signatures from Sequential-OR Proofs}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12107}, pages = {212--244}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45727-3\_8}, doi = {10.1007/978-3-030-45727-3\_8}, timestamp = {Mon, 04 May 2020 14:40:23 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/FischlinHJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/FischlinGM20, author = {Marc Fischlin and Felix G{\"{u}}nther and Philipp Muth}, editor = {Weizhi Meng and Dieter Gollmann and Christian Damsgaard Jensen and Jianying Zhou}, title = {Information-Theoretic Security of Cryptographic Channels}, booktitle = {Information and Communications Security - 22nd International Conference, {ICICS} 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12282}, pages = {295--311}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-61078-4\_17}, doi = {10.1007/978-3-030-61078-4\_17}, timestamp = {Thu, 18 Feb 2021 13:46:45 +0100}, biburl = {https://dblp.org/rec/conf/icics/FischlinGM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/BrendelFGJS20, author = {Jacqueline Brendel and Marc Fischlin and Felix G{\"{u}}nther and Christian Janson and Douglas Stebila}, editor = {Orr Dunkelman and Michael J. Jacobson Jr. and Colin O'Flynn}, title = {Towards Post-Quantum Security for Signal's {X3DH} Handshake}, booktitle = {Selected Areas in Cryptography - {SAC} 2020 - 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12804}, pages = {404--430}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-81652-0\_16}, doi = {10.1007/978-3-030-81652-0\_16}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/BrendelFGJS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secsr/BrandstetterFSY20, author = {Lukas Brandstetter and Marc Fischlin and Robin Leander Schr{\"{o}}der and Michael Yonli}, editor = {Thyla van der Merwe and Chris J. Mitchell and Maryam Mehrnezhad}, title = {On the Memory Fault Resilience of {TLS} 1.3}, booktitle = {Security Standardisation Research - 6th International Conference, {SSR} 2020, London, UK, November 30 - December 1, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12529}, pages = {1--22}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64357-7\_1}, doi = {10.1007/978-3-030-64357-7\_1}, timestamp = {Wed, 25 Nov 2020 16:55:27 +0100}, biburl = {https://dblp.org/rec/conf/secsr/BrandstetterFSY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2011-06849, author = {Georgios M. Nikolopoulos and Marc Fischlin}, title = {Information-theoretically secure data origin authentication with quantum and classical resources}, journal = {CoRR}, volume = {abs/2011.06849}, year = {2020}, url = {https://arxiv.org/abs/2011.06849}, eprinttype = {arXiv}, eprint = {2011.06849}, timestamp = {Thu, 19 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2011-06849.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FischlinHJ20, author = {Marc Fischlin and Patrick Harasser and Christian Janson}, title = {Signatures from Sequential-OR Proofs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {271}, year = {2020}, url = {https://eprint.iacr.org/2020/271}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FischlinHJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FischlinGJ20, author = {Marc Fischlin and Felix G{\"{u}}nther and Christian Janson}, title = {Robust Channels: Handling Unreliable Networks in the Record Layers of {QUIC} and {DTLS} 1.3}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {718}, year = {2020}, url = {https://eprint.iacr.org/2020/718}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FischlinGJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DowlingFGS20, author = {Benjamin Dowling and Marc Fischlin and Felix G{\"{u}}nther and Douglas Stebila}, title = {A Cryptographic Analysis of the {TLS} 1.3 Handshake Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1044}, year = {2020}, url = {https://eprint.iacr.org/2020/1044}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DowlingFGS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FischlinR20, author = {Marc Fischlin and Felix Rohrbach}, title = {Single-to-Multi-Theorem Transformations for Non-Interactive Statistical Zero-Knowledge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1204}, year = {2020}, url = {https://eprint.iacr.org/2020/1204}, timestamp = {Fri, 30 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FischlinR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CremersDFFJ20, author = {Cas Cremers and Samed D{\"{u}}zl{\"{u}} and Rune Fiedler and Marc Fischlin and Christian Janson}, title = {BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1525}, year = {2020}, url = {https://eprint.iacr.org/2020/1525}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/CremersDFFJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FischlinGM20, author = {Marc Fischlin and Felix G{\"{u}}nther and Philipp Muth}, title = {Information-Theoretic Security of Cryptographic Channels}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1539}, year = {2020}, url = {https://eprint.iacr.org/2020/1539}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FischlinGM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/FladungNAF19, author = {Lukas Fladung and Georgios M. Nikolopoulos and Gernot Alber and Marc Fischlin}, title = {Intercept-Resend Emulation Attacks against a Continuous-Variable Quantum Authentication Protocol with Physical Unclonable Keys}, journal = {Cryptogr.}, volume = {3}, number = {4}, pages = {25}, year = {2019}, url = {https://doi.org/10.3390/cryptography3040025}, doi = {10.3390/CRYPTOGRAPHY3040025}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/FladungNAF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BrendelF019, author = {Jacqueline Brendel and Marc Fischlin and Felix G{\"{u}}nther}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {Breakdown Resilience of Key Exchange Protocols: NewHope, {TLS} 1.3, and Hybrids}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11736}, pages = {521--541}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29962-0\_25}, doi = {10.1007/978-3-030-29962-0\_25}, timestamp = {Mon, 05 Feb 2024 20:29:41 +0100}, biburl = {https://dblp.org/rec/conf/esorics/BrendelF019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latincrypt/FischlinH19, author = {Marc Fischlin and Helene Haagh}, editor = {Peter Schwabe and Nicolas Th{\'{e}}riault}, title = {How to Sign with White-Boxed {AES}}, booktitle = {Progress in Cryptology - {LATINCRYPT} 2019 - 6th International Conference on Cryptology and Information Security in Latin America, Santiago de Chile, Chile, October 2-4, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11774}, pages = {259--279}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30530-7\_13}, doi = {10.1007/978-3-030-30530-7\_13}, timestamp = {Thu, 12 Sep 2019 15:27:46 +0200}, biburl = {https://dblp.org/rec/conf/latincrypt/FischlinH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pqcrypto/BindelBFGS19, author = {Nina Bindel and Jacqueline Brendel and Marc Fischlin and Brian Goncalves and Douglas Stebila}, editor = {Jintai Ding and Rainer Steinwandt}, title = {Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange}, booktitle = {Post-Quantum Cryptography - 10th International Conference, PQCrypto 2019, Chongqing, China, May 8-10, 2019 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11505}, pages = {206--226}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-25510-7\_12}, doi = {10.1007/978-3-030-25510-7\_12}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pqcrypto/BindelBFGS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1910-11579, author = {Lukas Fladung and Georgios M. Nikolopoulos and Gernot Alber and Marc Fischlin}, title = {Intercept-Resend Emulation Attacks Against a Continuous-Variable Quantum Authentication Protocol with Physical Unclonable Keys}, journal = {CoRR}, volume = {abs/1910.11579}, year = {2019}, url = {http://arxiv.org/abs/1910.11579}, eprinttype = {arXiv}, eprint = {1910.11579}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1910-11579.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BockBFJM19, author = {Estuardo Alpirez Bock and Chris Brzuska and Marc Fischlin and Christian Janson and Wil Michiels}, title = {Security Reductions for White-Box Key-Storage in Mobile Payments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1014}, year = {2019}, url = {https://eprint.iacr.org/2019/1014}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BockBFJM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FischlinG19, author = {Marc Fischlin and Felix G{\"{u}}nther}, title = {Modeling Memory Faults in Signature and Encryption Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1053}, year = {2019}, url = {https://eprint.iacr.org/2019/1053}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FischlinG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuilhemFW19, author = {Cyprien Delpech de Saint Guilhem and Marc Fischlin and Bogdan Warinschi}, title = {Authentication in Key-Exchange: Definitions, Relations and Composition}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1203}, year = {2019}, url = {https://eprint.iacr.org/2019/1203}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuilhemFW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrendelF0JS19, author = {Jacqueline Brendel and Marc Fischlin and Felix G{\"{u}}nther and Christian Janson and Douglas Stebila}, title = {Challenges in Proving Post-Quantum Key Exchanges Based on Key Encapsulation Mechanisms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1356}, year = {2019}, url = {https://eprint.iacr.org/2019/1356}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrendelF0JS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/FischlinH18, author = {Marc Fischlin and Patrick Harasser}, editor = {Bart Preneel and Frederik Vercauteren}, title = {Invisible Sanitizable Signatures and Public-Key Encryption are Equivalent}, booktitle = {Applied Cryptography and Network Security - 16th International Conference, {ACNS} 2018, Leuven, Belgium, July 2-4, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10892}, pages = {202--220}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93387-0\_11}, doi = {10.1007/978-3-319-93387-0\_11}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/acns/FischlinH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DegabrieleF18, author = {Jean Paul Degabriele and Marc Fischlin}, editor = {Thomas Peyrin and Steven D. Galbraith}, title = {Simulatable Channels: Extended Security that is Universally Composable and Easier to Prove}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11274}, pages = {519--550}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03332-3\_19}, doi = {10.1007/978-3-030-03332-3\_19}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/DegabrieleF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/FischlinM18, author = {Marc Fischlin and Sogol Mazaheri}, title = {Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks}, booktitle = {31st {IEEE} Computer Security Foundations Symposium, {CSF} 2018, Oxford, United Kingdom, July 9-12, 2018}, pages = {76--90}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CSF.2018.00013}, doi = {10.1109/CSF.2018.00013}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/FischlinM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/FischlinJM18, author = {Marc Fischlin and Christian Janson and Sogol Mazaheri}, title = {Backdoored Hash Functions: Immunizing {HMAC} and {HKDF}}, booktitle = {31st {IEEE} Computer Security Foundations Symposium, {CSF} 2018, Oxford, United Kingdom, July 9-12, 2018}, pages = {105--118}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CSF.2018.00015}, doi = {10.1109/CSF.2018.00015}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/FischlinJM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FischlinH18, author = {Marc Fischlin and Patrick Harasser}, title = {Invisible Sanitizable Signatures and Public-Key Encryption are Equivalent}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {337}, year = {2018}, url = {https://eprint.iacr.org/2018/337}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FischlinH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FischlinJM18, author = {Marc Fischlin and Christian Janson and Sogol Mazaheri}, title = {Backdoored Hash Functions: Immunizing {HMAC} and {HKDF}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {362}, year = {2018}, url = {https://eprint.iacr.org/2018/362}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FischlinJM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DegabrieleF18, author = {Jean Paul Degabriele and Marc Fischlin}, title = {Simulatable Channels: Extended Security that is Universally Composable and Easier to Prove}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {844}, year = {2018}, url = {https://eprint.iacr.org/2018/844}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DegabrieleF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BindelBFGS18, author = {Nina Bindel and Jacqueline Brendel and Marc Fischlin and Brian Goncalves and Douglas Stebila}, title = {Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {903}, year = {2018}, url = {https://eprint.iacr.org/2018/903}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BindelBFGS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ErwigFHHKKKLR17, author = {Andreas Erwig and Marc Fischlin and Martin Hald and Dominik Helm and Robert Kiel and Florian K{\"{u}}bler and Michael K{\"{u}}mmerlin and Jakob Laenge and Felix Rohrbach}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Redactable Graph Hashing, Revisited - (Extended Abstract)}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {398--405}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_24}, doi = {10.1007/978-3-319-59870-3\_24}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ErwigFHHKKKLR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BrendelF0J17, author = {Jacqueline Brendel and Marc Fischlin and Felix G{\"{u}}nther and Christian Janson}, editor = {Jonathan Katz and Hovav Shacham}, title = {{PRF-ODH:} Relations, Instantiations, and Impossibility Results}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10403}, pages = {651--681}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63697-9\_22}, doi = {10.1007/978-3-319-63697-9\_22}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BrendelF0J17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BrendelF17, author = {Jacqueline Brendel and Marc Fischlin}, editor = {Simon N. Foley and Dieter Gollmann and Einar Snekkenes}, title = {Zero Round-Trip Time for the Extended Access Control Protocol}, booktitle = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10492}, pages = {297--314}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66402-6\_18}, doi = {10.1007/978-3-319-66402-6\_18}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BrendelF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/FischlinG17, author = {Marc Fischlin and Felix G{\"{u}}nther}, title = {Replay Attacks on Zero Round-Trip Time: The Case of the {TLS} 1.3 Handshake Candidates}, booktitle = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2017, Paris, France, April 26-28, 2017}, pages = {60--75}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/EuroSP.2017.18}, doi = {10.1109/EUROSP.2017.18}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/FischlinG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrendelF17, author = {Jacqueline Brendel and Marc Fischlin}, title = {Zero Round-Trip Time for the Extended Access Control Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {60}, year = {2017}, url = {http://eprint.iacr.org/2017/060}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrendelF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FischlinG17, author = {Marc Fischlin and Felix G{\"{u}}nther}, title = {Replay Attacks on Zero Round-Trip Time: The Case of the {TLS} 1.3 Handshake Candidates}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {82}, year = {2017}, url = {http://eprint.iacr.org/2017/082}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FischlinG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrendelF0J17, author = {Jacqueline Brendel and Marc Fischlin and Felix G{\"{u}}nther and Christian Janson}, title = {{PRF-ODH:} Relations, Instantiations, and Impossibility Results}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {517}, year = {2017}, url = {http://eprint.iacr.org/2017/517}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrendelF0J17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FischlinM17, author = {Marc Fischlin and Sogol Mazaheri}, title = {Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {984}, year = {2017}, url = {http://eprint.iacr.org/2017/984}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FischlinM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FischlinGMP17, author = {Marc Fischlin and Felix G{\"{u}}nther and Giorgia Azzurra Marson and Kenneth G. Paterson}, title = {Data Is a Stream: Security of Stream-Based Channels}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1191}, year = {2017}, url = {http://eprint.iacr.org/2017/1191}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FischlinGMP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrendelFG17, author = {Jacqueline Brendel and Marc Fischlin and Felix G{\"{u}}nther}, title = {Breakdown Resilience of Key Exchange Protocols and the Cases of NewHope and {TLS} 1.3}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1252}, year = {2017}, url = {http://eprint.iacr.org/2017/1252}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrendelFG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/BernhardFW16, author = {David Bernhard and Marc Fischlin and Bogdan Warinschi}, title = {Adaptive proofs of knowledge in the random oracle model}, journal = {{IET} Inf. Secur.}, volume = {10}, number = {6}, pages = {319--331}, year = {2016}, url = {https://doi.org/10.1049/iet-ifs.2015.0506}, doi = {10.1049/IET-IFS.2015.0506}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/BernhardFW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/DegabrieleFFGGM16, author = {Jean Paul Degabriele and Victoria Fehr and Marc Fischlin and Tommaso Gagliardoni and Felix G{\"{u}}nther and Giorgia Azzurra Marson and Arno Mittelbach and Kenneth G. Paterson}, title = {Unpicking {PLAID:} a cryptographic analysis of an ISO-standards-track authentication protocol}, journal = {Int. J. Inf. Sec.}, volume = {15}, number = {6}, pages = {637--657}, year = {2016}, url = {https://doi.org/10.1007/s10207-015-0309-6}, doi = {10.1007/S10207-015-0309-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/DegabrieleFFGGM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FischlinHNS16, author = {Marc Fischlin and Amir Herzberg and Hod Bin Noon and Haya Schulmann}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Obfuscation Combiners}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9815}, pages = {521--550}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53008-5\_18}, doi = {10.1007/978-3-662-53008-5\_18}, timestamp = {Tue, 17 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/FischlinHNS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BernhardFW16, author = {David Bernhard and Marc Fischlin and Bogdan Warinschi}, editor = {Chen{-}Mou Cheng and Kai{-}Min Chung and Giuseppe Persiano and Bo{-}Yin Yang}, title = {On the Hardness of Proving CCA-Security of Signed ElGamal}, booktitle = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9614}, pages = {47--69}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49384-7\_3}, doi = {10.1007/978-3-662-49384-7\_3}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BernhardFW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secsr/MorgnerBF16, author = {Frank Morgner and Paul Bastian and Marc Fischlin}, editor = {Lidong Chen and David A. McGrew and Chris J. Mitchell}, title = {Attribute-Based Access Control Architectures with the eIDAS Protocols}, booktitle = {Security Standardisation Research - Third International Conference, {SSR} 2016, Gaithersburg, MD, USA, December 5-6, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10074}, pages = {205--226}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49100-4\_9}, doi = {10.1007/978-3-319-49100-4\_9}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/secsr/MorgnerBF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/FischlinGSW16, author = {Marc Fischlin and Felix G{\"{u}}nther and Benedikt Schmidt and Bogdan Warinschi}, title = {Key Confirmation in Key Exchange: {A} Formal Treatment and Implications for {TLS} 1.3}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA, USA, May 22-26, 2016}, pages = {452--469}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SP.2016.34}, doi = {10.1109/SP.2016.34}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/FischlinGSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/MorgnerBF16, author = {Frank Morgner and Paul Bastian and Marc Fischlin}, editor = {Sara Foresti and Javier L{\'{o}}pez}, title = {Securing Transactions with the eIDAS Protocols}, booktitle = {Information Security Theory and Practice - 10th {IFIP} {WG} 11.2 International Conference, {WISTP} 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9895}, pages = {3--18}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45931-8\_1}, doi = {10.1007/978-3-319-45931-8\_1}, timestamp = {Thu, 29 Aug 2019 08:10:02 +0200}, biburl = {https://dblp.org/rec/conf/wistp/MorgnerBF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2016-1, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9665}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49890-3}, doi = {10.1007/978-3-662-49890-3}, isbn = {978-3-662-49889-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2016-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2016-2, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9666}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49896-5}, doi = {10.1007/978-3-662-49896-5}, isbn = {978-3-662-49895-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2016-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-reports/Fischlin0PR16, author = {Marc Fischlin and Alexander May and David Pointcheval and Tal Rabin}, title = {Public-Key Cryptography (Dagstuhl Seminar 16371)}, journal = {Dagstuhl Reports}, volume = {6}, number = {9}, pages = {46--58}, year = {2016}, url = {https://doi.org/10.4230/DagRep.6.9.46}, doi = {10.4230/DAGREP.6.9.46}, timestamp = {Wed, 07 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dagstuhl-reports/Fischlin0PR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DowlingFGS16, author = {Benjamin Dowling and Marc Fischlin and Felix G{\"{u}}nther and Douglas Stebila}, title = {A Cryptographic Analysis of the {TLS} 1.3 draft-10 Full and Pre-shared Key Handshake Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {81}, year = {2016}, url = {http://eprint.iacr.org/2016/081}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DowlingFGS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FischlinHNS16, author = {Marc Fischlin and Amir Herzberg and Hod Bin Noon and Haya Schulmann}, title = {Obfuscation Combiners}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {289}, year = {2016}, url = {http://eprint.iacr.org/2016/289}, timestamp = {Tue, 17 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FischlinHNS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FischlinLP16, author = {Marc Fischlin and Anja Lehmann and Krzysztof Pietrzak}, title = {Robust Multi-Property Combiners for Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {723}, year = {2016}, url = {http://eprint.iacr.org/2016/723}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FischlinLP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/EgertFGJST15, author = {Rolf Egert and Marc Fischlin and David Gens and Sven Jacob and Matthias Senker and J{\"{o}}rn Tillmanns}, editor = {Ernest Foo and Douglas Stebila}, title = {Privately Computing Set-Union and Set-Intersection Cardinality via Bloom Filters}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {413--430}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_24}, doi = {10.1007/978-3-319-19962-7\_24}, timestamp = {Tue, 07 May 2024 20:09:57 +0200}, biburl = {https://dblp.org/rec/conf/acisp/EgertFGJST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DowlingFGS15, author = {Benjamin Dowling and Marc Fischlin and Felix G{\"{u}}nther and Douglas Stebila}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {A Cryptographic Analysis of the {TLS} 1.3 Handshake Protocol Candidates}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1197--1210}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813653}, doi = {10.1145/2810103.2813653}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/DowlingFGS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FischlinGMP15, author = {Marc Fischlin and Felix G{\"{u}}nther and Giorgia Azzurra Marson and Kenneth G. Paterson}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Data Is a Stream: Security of Stream-Based Channels}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {545--564}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_27}, doi = {10.1007/978-3-662-48000-7\_27}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/FischlinGMP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BernhardFW15, author = {David Bernhard and Marc Fischlin and Bogdan Warinschi}, editor = {Jonathan Katz}, title = {Adaptive Proofs of Knowledge in the Random Oracle Model}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {629--649}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_28}, doi = {10.1007/978-3-662-46447-2\_28}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BernhardFW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/FischlinM15, author = {Marc Fischlin and Sogol Mazaheri}, editor = {Indrajit Ray and Nicholas Hopper and Rob Jansen}, title = {Notions of Deniable Message Authentication}, booktitle = {Proceedings of the 14th {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2015, Denver, Colorado, USA, October 12, 2015}, pages = {55--64}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808138.2808143}, doi = {10.1145/2808138.2808143}, timestamp = {Tue, 06 Nov 2018 16:59:07 +0100}, biburl = {https://dblp.org/rec/conf/wpes/FischlinM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2015-1, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9056}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46800-5}, doi = {10.1007/978-3-662-46800-5}, isbn = {978-3-662-46799-2}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2015-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2015-2, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9057}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46803-6}, doi = {10.1007/978-3-662-46803-6}, isbn = {978-3-662-46802-9}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2015-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernhardFW15, author = {David Bernhard and Marc Fischlin and Bogdan Warinschi}, title = {Adaptive Proofs of Knowledge in the Random Oracle Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {648}, year = {2015}, url = {http://eprint.iacr.org/2015/648}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernhardFW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernhardFW15a, author = {David Bernhard and Marc Fischlin and Bogdan Warinschi}, title = {On the Hardness of Proving CCA-security of Signed ElGamal}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {649}, year = {2015}, url = {http://eprint.iacr.org/2015/649}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernhardFW15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FehrF15a, author = {Victoria Fehr and Marc Fischlin}, title = {Sanitizable Signcryption: Sanitization over Encrypted Data (Full Version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {765}, year = {2015}, url = {http://eprint.iacr.org/2015/765}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FehrF15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DowlingFGS15, author = {Benjamin Dowling and Marc Fischlin and Felix G{\"{u}}nther and Douglas Stebila}, title = {A Cryptographic Analysis of the {TLS} 1.3 Handshake Protocol Candidates}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {914}, year = {2015}, url = {http://eprint.iacr.org/2015/914}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DowlingFGS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fischlin14, author = {Marc Fischlin}, title = {Abstreitbarkeit bei eID-L{\"{o}}sungen}, journal = {Datenschutz und Datensicherheit}, volume = {38}, number = {7}, pages = {462--466}, year = {2014}, url = {https://doi.org/10.1007/s11623-014-0207-5}, doi = {10.1007/S11623-014-0207-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Fischlin14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/FischlinLP14, author = {Marc Fischlin and Anja Lehmann and Krzysztof Pietrzak}, title = {Robust Multi-Property Combiners for Hash Functions}, journal = {J. Cryptol.}, volume = {27}, number = {3}, pages = {397--428}, year = {2014}, url = {https://doi.org/10.1007/s00145-013-9148-7}, doi = {10.1007/S00145-013-9148-7}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/FischlinLP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FischlinG14, author = {Marc Fischlin and Felix G{\"{u}}nther}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Multi-Stage Key Exchange and the Case of Google's {QUIC} Protocol}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1193--1204}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660308}, doi = {10.1145/2660267.2660308}, timestamp = {Tue, 10 Nov 2020 20:00:23 +0100}, biburl = {https://dblp.org/rec/conf/ccs/FischlinG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/DagdelenF14, author = {{\"{O}}zg{\"{u}}r Dagdelen and Marc Fischlin}, title = {Intercepting tokens in cryptographic protocols: The empire strikes back in the clone wars}, booktitle = {2014 {IEEE} International Symposium on Information Theory, Honolulu, HI, USA, June 29 - July 4, 2014}, pages = {1529--1533}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISIT.2014.6875089}, doi = {10.1109/ISIT.2014.6875089}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/DagdelenF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secsr/DegabrieleFFGGM14, author = {Jean Paul Degabriele and Victoria Fehr and Marc Fischlin and Tommaso Gagliardoni and Felix G{\"{u}}nther and Giorgia Azzurra Marson and Arno Mittelbach and Kenneth G. Paterson}, editor = {Liqun Chen and Chris J. Mitchell}, title = {Unpicking {PLAID} - {A} Cryptographic Analysis of an ISO-Standards-Track Authentication Protocol}, booktitle = {Security Standardisation Research - First International Conference, {SSR} 2014, London, UK, December 16-17, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8893}, pages = {1--25}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-14054-4\_1}, doi = {10.1007/978-3-319-14054-4\_1}, timestamp = {Sat, 09 Apr 2022 12:41:37 +0200}, biburl = {https://dblp.org/rec/conf/secsr/DegabrieleFFGGM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DegabrieleFFGGMMP14, author = {Jean Paul Degabriele and Victoria Fehr and Marc Fischlin and Tommaso Gagliardoni and Felix G{\"{u}}nther and Giorgia Azzurra Marson and Arno Mittelbach and Kenneth G. Paterson}, title = {Unpicking {PLAID} - {A} Cryptographic Analysis of an ISO-standards-track Authentication Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {728}, year = {2014}, url = {http://eprint.iacr.org/2014/728}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DegabrieleFFGGMMP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesDFGMS14, author = {Michael Backes and {\"{O}}zg{\"{u}}r Dagdelen and Marc Fischlin and Sebastian Gajek and Sebastian Meiser and Dominique Schr{\"{o}}der}, title = {Operational Signature Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {820}, year = {2014}, url = {http://eprint.iacr.org/2014/820}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesDFGMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BrzuskaFSWW13, author = {Christina Brzuska and Marc Fischlin and Nigel P. Smart and Bogdan Warinschi and Stephen C. Williams}, title = {Less is more: relaxed yet composable security notions for key exchange}, journal = {Int. J. Inf. Sec.}, volume = {12}, number = {4}, pages = {267--297}, year = {2013}, url = {https://doi.org/10.1007/s10207-013-0192-y}, doi = {10.1007/S10207-013-0192-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/BrzuskaFSWW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/DeiserothFFMRS13, author = {Bj{\"{o}}rn Deiseroth and Victoria Fehr and Marc Fischlin and Manuel Maasz and Nils Fabian Reimers and Richard Stein}, editor = {Michael J. Jacobson Jr. and Michael E. Locasto and Payman Mohassel and Reihaneh Safavi{-}Naini}, title = {Computing on Authenticated Data for Adjustable Predicates}, booktitle = {Applied Cryptography and Network Security - 11th International Conference, {ACNS} 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7954}, pages = {53--68}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38980-1\_4}, doi = {10.1007/978-3-642-38980-1\_4}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/DeiserothFFMRS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/FischlinO13, author = {Marc Fischlin and Cristina Onete}, editor = {Michael J. Jacobson Jr. and Michael E. Locasto and Payman Mohassel and Reihaneh Safavi{-}Naini}, title = {Terrorism in Distance Bounding: Modeling Terrorist-Fraud Resistance}, booktitle = {Applied Cryptography and Network Security - 11th International Conference, {ACNS} 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7954}, pages = {414--431}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38980-1\_26}, doi = {10.1007/978-3-642-38980-1\_26}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/FischlinO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DagdelenFG13, author = {{\"{O}}zg{\"{u}}r Dagdelen and Marc Fischlin and Tommaso Gagliardoni}, editor = {Kazue Sako and Palash Sarkar}, title = {The Fiat-Shamir Transformation in a Quantum World}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8270}, pages = {62--81}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-42045-0\_4}, doi = {10.1007/978-3-642-42045-0\_4}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/DagdelenFG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BaecherBF13, author = {Paul Baecher and Christina Brzuska and Marc Fischlin}, editor = {Kazue Sako and Palash Sarkar}, title = {Notions of Black-Box Reductions, Revisited}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8269}, pages = {296--315}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-42033-7\_16}, doi = {10.1007/978-3-642-42033-7\_16}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BaecherBF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/DagdelenFGMMO13, author = {{\"{O}}zg{\"{u}}r Dagdelen and Marc Fischlin and Tommaso Gagliardoni and Giorgia Azzurra Marson and Arno Mittelbach and Cristina Onete}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {A Cryptographic Analysis of {OPACITY} - (Extended Abstract)}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {345--362}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_20}, doi = {10.1007/978-3-642-40203-6\_20}, timestamp = {Wed, 25 Sep 2019 18:03:15 +0200}, biburl = {https://dblp.org/rec/conf/esorics/DagdelenFGMMO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BaecherFFS13, author = {Paul Baecher and Pooya Farshim and Marc Fischlin and Martijn Stam}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {426--443}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_26}, doi = {10.1007/978-3-642-38348-9\_26}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BaecherFFS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FischlinF13, author = {Marc Fischlin and Nils Fleischhacker}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {Limitations of the Meta-reduction Technique: The Case of Schnorr Signatures}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {444--460}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_27}, doi = {10.1007/978-3-642-38348-9\_27}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/FischlinF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/BenderFK13, author = {Jens Bender and Marc Fischlin and Dennis K{\"{u}}gler}, editor = {Roderick Bloem and Peter Lipp}, title = {The PACE{\(\vert\)}CA Protocol for Machine Readable Travel Documents}, booktitle = {Trusted Systems - 5th International Conference, {INTRUST} 2013, Graz, Austria, December 4-5, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8292}, pages = {17--35}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-03491-1\_2}, doi = {10.1007/978-3-319-03491-1\_2}, timestamp = {Mon, 03 Jan 2022 22:38:23 +0100}, biburl = {https://dblp.org/rec/conf/intrust/BenderFK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/FischlinO13, author = {Marc Fischlin and Cristina Onete}, editor = {Levente Butty{\'{a}}n and Ahmad{-}Reza Sadeghi and Marco Gruteser}, title = {Subtle kinks in distance-bounding: an analysis of prominent protocols}, booktitle = {Sixth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013}, pages = {195--206}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462096.2462128}, doi = {10.1145/2462096.2462128}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/FischlinO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/birthday/2013buchmann, editor = {Marc Fischlin and Stefan Katzenbeisser}, title = {Number Theory and Cryptography - Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday}, series = {Lecture Notes in Computer Science}, volume = {8260}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-42001-6}, doi = {10.1007/978-3-642-42001-6}, isbn = {978-3-642-42000-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/birthday/2013buchmann.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/DagdelenFG13, author = {{\"{O}}zg{\"{u}}r Dagdelen and Marc Fischlin and Tommaso Gagliardoni}, title = {The Fiat-Shamir Transformation in a Quantum World}, journal = {CoRR}, volume = {abs/1306.0315}, year = {2013}, url = {http://arxiv.org/abs/1306.0315}, eprinttype = {arXiv}, eprint = {1306.0315}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/DagdelenFG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaecherBF13, author = {Paul Baecher and Christina Brzuska and Marc Fischlin}, title = {Notions of Black-Box Reductions, Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {101}, year = {2013}, url = {http://eprint.iacr.org/2013/101}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaecherBF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FischlinF13, author = {Marc Fischlin and Nils Fleischhacker}, title = {Limitations of the Meta-Reduction Technique: The Case of Schnorr Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {140}, year = {2013}, url = {http://eprint.iacr.org/2013/140}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FischlinF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DeiserothFFMRS13, author = {Bj{\"{o}}rn Deiseroth and Victoria Fehr and Marc Fischlin and Manuel Maasz and Nils Fabian Reimers and Richard Stein}, title = {Computing on Authenticated Data for Adjustable Predicates}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {217}, year = {2013}, url = {http://eprint.iacr.org/2013/217}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DeiserothFFMRS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BenderDFK13, author = {Jens Bender and {\"{O}}zg{\"{u}}r Dagdelen and Marc Fischlin and Dennis K{\"{u}}gler}, title = {The PACE{\(\vert\)}AA Protocol for Machine Readable Travel Documents, and its Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {223}, year = {2013}, url = {http://eprint.iacr.org/2013/223}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BenderDFK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DagdelenFGMMO13, author = {{\"{O}}zg{\"{u}}r Dagdelen and Marc Fischlin and Tommaso Gagliardoni and Giorgia Azzurra Marson and Arno Mittelbach and Cristina Onete}, title = {A Cryptographic Analysis of {OPACITY}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {234}, year = {2013}, url = {http://eprint.iacr.org/2013/234}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DagdelenFGMMO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DagdelenFG13, author = {{\"{O}}zg{\"{u}}r Dagdelen and Marc Fischlin and Tommaso Gagliardoni}, title = {The Fiat-Shamir Transformation in a Quantum World}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {245}, year = {2013}, url = {http://eprint.iacr.org/2013/245}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DagdelenFG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaecherFFS13, author = {Paul Baecher and Pooya Farshim and Marc Fischlin and Martijn Stam}, title = {Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {350}, year = {2013}, url = {http://eprint.iacr.org/2013/350}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaecherFFS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/FischlinS12, author = {Marc Fischlin and Dominique Schr{\"{o}}der}, title = {Security of blind signatures under aborts and applications to adaptive oblivious transfer}, journal = {J. Math. Cryptol.}, volume = {5}, number = {2}, pages = {169--204}, year = {2012}, url = {https://doi.org/10.1515/jmc.2011.011}, doi = {10.1515/JMC.2011.011}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/FischlinS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/Fischlin12, author = {Marc Fischlin}, editor = {Aikaterini Mitrokotsa and Serge Vaudenay}, title = {Black-Box Reductions and Separations in Cryptography}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2012 - 5th International Conference on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7374}, pages = {413--422}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31410-0\_26}, doi = {10.1007/978-3-642-31410-0\_26}, timestamp = {Sun, 02 Jun 2019 21:14:37 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/Fischlin12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/BenderDFK12, author = {Jens Bender and {\"{O}}zg{\"{u}}r Dagdelen and Marc Fischlin and Dennis K{\"{u}}gler}, editor = {Angelos D. Keromytis}, title = {The PACE{\(\vert\)}AA Protocol for Machine Readable Travel Documents, and Its Security}, booktitle = {Financial Cryptography and Data Security - 16th International Conference, {FC} 2012, Kralendijk, Bonaire, February 27 - March 2, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7397}, pages = {344--358}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32946-3\_25}, doi = {10.1007/978-3-642-32946-3\_25}, timestamp = {Tue, 30 Jul 2024 10:38:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/BenderDFK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/BenderDFK12, author = {Jens Bender and {\"{O}}zg{\"{u}}r Dagdelen and Marc Fischlin and Dennis K{\"{u}}gler}, editor = {Dieter Gollmann and Felix C. Freiling}, title = {Domain-Specific Pseudonymous Signatures for the German Identity Card}, booktitle = {Information Security - 15th International Conference, {ISC} 2012, Passau, Germany, September 19-21, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7483}, pages = {104--119}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33383-5\_7}, doi = {10.1007/978-3-642-33383-5\_7}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/BenderDFK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/FischlinLS12, author = {Marc Fischlin and Anja Lehmann and Dominique Schr{\"{o}}der}, editor = {Ivan Visconti and Roberto De Prisco}, title = {History-Free Sequential Aggregate Signatures}, booktitle = {Security and Cryptography for Networks - 8th International Conference, {SCN} 2012, Amalfi, Italy, September 5-7, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7485}, pages = {113--130}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32928-9\_7}, doi = {10.1007/978-3-642-32928-9\_7}, timestamp = {Thu, 23 Jun 2022 19:58:57 +0200}, biburl = {https://dblp.org/rec/conf/scn/FischlinLS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/BrzuskaDF12, author = {Christina Brzuska and {\"{O}}zg{\"{u}}r Dagdelen and Marc Fischlin}, editor = {Neeraj Suri and Michael Waidner}, title = {TLS, PACE, and {EAC:} ACryptographic View at Modern Key Exchange Protocols}, booktitle = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz 2012 in Darmstadt}, series = {{LNI}}, volume = {{P-195}}, pages = {71--82}, publisher = {{GI}}, year = {2012}, url = {https://dl.gi.de/handle/20.500.12116/18264}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/BrzuskaDF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/CheikhrouhouSDFU12, author = {Lassaad Cheikhrouhou and Werner Stephan and {\"{O}}zg{\"{u}}r Dagdelen and Marc Fischlin and Markus Ullmann}, editor = {Neeraj Suri and Michael Waidner}, title = {Merging the Cryptographic Security Analysis and the Algebraic-Logic Security Proof of {PACE}}, booktitle = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz 2012 in Darmstadt}, series = {{LNI}}, volume = {{P-195}}, pages = {83--94}, publisher = {{GI}}, year = {2012}, url = {https://dl.gi.de/handle/20.500.12116/18265}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/CheikhrouhouSDFU12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2012, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8}, doi = {10.1007/978-3-642-30057-8}, isbn = {978-3-642-30056-1}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FischlinO12, author = {Marc Fischlin and Cristina Onete}, title = {Provably Secure Distance-Bounding: an Analysis of Prominent Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {128}, year = {2012}, url = {http://eprint.iacr.org/2012/128}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FischlinO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrzuskaFSWW12, author = {Christina Brzuska and Marc Fischlin and Nigel P. Smart and Bogdan Warinschi and Stephen C. Williams}, title = {Less is More: Relaxed yet Composable Security Notions for Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {242}, year = {2012}, url = {http://eprint.iacr.org/2012/242}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrzuskaFSWW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DagdelenF12, author = {{\"{O}}zg{\"{u}}r Dagdelen and Marc Fischlin}, title = {Unconditionally-Secure Universally Composable Password-Based Key-Exchange based on One-Time Memory Tokens}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {537}, year = {2012}, url = {http://eprint.iacr.org/2012/537}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DagdelenF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BenderDFK12, author = {Jens Bender and {\"{O}}zg{\"{u}}r Dagdelen and Marc Fischlin and Dennis K{\"{u}}gler}, title = {Domain-Specifi c Pseudonymous Signatures for the German Identity Card}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {558}, year = {2012}, url = {http://eprint.iacr.org/2012/558}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BenderDFK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/FischlinF11, author = {Marc Fischlin and Roger Fischlin}, title = {Efficient Non-Malleable Commitment Schemes}, journal = {J. Cryptol.}, volume = {24}, number = {1}, pages = {203--244}, year = {2011}, url = {https://doi.org/10.1007/s00145-009-9043-4}, doi = {10.1007/S00145-009-9043-4}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/FischlinF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/FischlinO11, author = {Marc Fischlin and Cristina Onete}, editor = {Javier L{\'{o}}pez and Gene Tsudik}, title = {Relaxed Security Notions for Signatures of Knowledge}, booktitle = {Applied Cryptography and Network Security - 9th International Conference, {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6715}, pages = {309--326}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21554-4\_18}, doi = {10.1007/978-3-642-21554-4\_18}, timestamp = {Thu, 29 Aug 2019 08:10:02 +0200}, biburl = {https://dblp.org/rec/conf/acns/FischlinO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BonehDFLSZ11, author = {Dan Boneh and {\"{O}}zg{\"{u}}r Dagdelen and Marc Fischlin and Anja Lehmann and Christian Schaffner and Mark Zhandry}, editor = {Dong Hoon Lee and Xiaoyun Wang}, title = {Random Oracles in a Quantum World}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7073}, pages = {41--69}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25385-0\_3}, doi = {10.1007/978-3-642-25385-0\_3}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BonehDFLSZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/FischlinLM11, author = {Marc Fischlin and Beno{\^{\i}}t Libert and Mark Manulis}, editor = {Dong Hoon Lee and Xiaoyun Wang}, title = {Non-interactive and Re-usable Universally Composable String Commitments with Adaptive Security}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7073}, pages = {468--485}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25385-0\_25}, doi = {10.1007/978-3-642-25385-0\_25}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/FischlinLM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BrzuskaFWW11, author = {Christina Brzuska and Marc Fischlin and Bogdan Warinschi and Stephen C. Williams}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {Composability of bellare-rogaway key exchange protocols}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, pages = {51--62}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046707.2046716}, doi = {10.1145/2046707.2046716}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BrzuskaFWW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BaecherF11, author = {Paul Baecher and Marc Fischlin}, editor = {Phillip Rogaway}, title = {Random Oracle Reducibility}, booktitle = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6841}, pages = {21--38}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22792-9\_2}, doi = {10.1007/978-3-642-22792-9\_2}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BaecherF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BrzuskaFSK11, author = {Christina Brzuska and Marc Fischlin and Heike Schr{\"{o}}der and Stefan Katzenbeisser}, editor = {Phillip Rogaway}, title = {Physically Uncloneable Functions in the Universal Composition Framework}, booktitle = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6841}, pages = {51--70}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22792-9\_4}, doi = {10.1007/978-3-642-22792-9\_4}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BrzuskaFSK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/FischlinPSSV11, author = {Marc Fischlin and Benny Pinkas and Ahmad{-}Reza Sadeghi and Thomas Schneider and Ivan Visconti}, editor = {Aggelos Kiayias}, title = {Secure Set Intersection with Untrusted Hardware Tokens}, booktitle = {Topics in Cryptology - {CT-RSA} 2011 - The Cryptographers' Track at the {RSA} Conference 2011, San Francisco, CA, USA, February 14-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6558}, pages = {1--16}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19074-2\_1}, doi = {10.1007/978-3-642-19074-2\_1}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/FischlinPSSV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/BaecherFS11, author = {Paul Baecher and Marc Fischlin and Dominique Schr{\"{o}}der}, editor = {Aggelos Kiayias}, title = {Expedient Non-malleability Notions for Hash Functions}, booktitle = {Topics in Cryptology - {CT-RSA} 2011 - The Cryptographers' Track at the {RSA} Conference 2011, San Francisco, CA, USA, February 14-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6558}, pages = {268--283}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19074-2\_18}, doi = {10.1007/978-3-642-19074-2\_18}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/BaecherFS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/DurholzFKO11, author = {Ulrich D{\"{u}}rholz and Marc Fischlin and Michael Kasper and Cristina Onete}, editor = {Xuejia Lai and Jianying Zhou and Hui Li}, title = {A Formal Approach to Distance-Bounding {RFID} Protocols}, booktitle = {Information Security, 14th International Conference, {ISC} 2011, Xi'an, China, October 26-29, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7001}, pages = {47--62}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24861-0\_4}, doi = {10.1007/978-3-642-24861-0\_4}, timestamp = {Tue, 20 Aug 2024 07:54:44 +0200}, biburl = {https://dblp.org/rec/conf/isw/DurholzFKO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/BaecherBFM11, author = {Paul Baecher and Niklas B{\"{u}}scher and Marc Fischlin and Benjamin Milde}, editor = {Jan Camenisch and Simone Fischer{-}H{\"{u}}bner and Yuko Murayama and Armand Portmann and Carlos Rieder}, title = {Breaking reCAPTCHA: {A} Holistic Approach via Shape Recognition}, booktitle = {Future Challenges in Security and Privacy for Academia and Industry - 26th {IFIP} {TC} 11 International Information Security Conference, {SEC} 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {354}, pages = {56--67}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21424-0\_5}, doi = {10.1007/978-3-642-21424-0\_5}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/BaecherBFM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RiesFMM11, author = {Sebastian Ries and Marc Fischlin and Leonardo A. Martucci and Max M{\"{u}}hlh{\"{a}}user}, title = {Learning Whom to Trust in a Privacy-Friendly Way}, booktitle = {{IEEE} 10th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, Changsha, China, 16-18 November, 2011}, pages = {214--225}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/TrustCom.2011.30}, doi = {10.1109/TRUSTCOM.2011.30}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/RiesFMM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-reports/FischlinLMM11, author = {Marc Fischlin and Anna Lysyanskaya and Ueli Maurer and Alexander May}, title = {Public-Key Cryptography (Dagstuhl Seminar 11391)}, journal = {Dagstuhl Reports}, volume = {1}, number = {9}, pages = {76--94}, year = {2011}, url = {https://doi.org/10.4230/DagRep.1.9.76}, doi = {10.4230/DAGREP.1.9.76}, timestamp = {Wed, 07 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dagstuhl-reports/FischlinLMM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FischlinLS11, author = {Marc Fischlin and Anja Lehmann and Dominique Schr{\"{o}}der}, title = {History-Free Sequential Aggregate Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {231}, year = {2011}, url = {http://eprint.iacr.org/2011/231}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FischlinLS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DurholzFKO11, author = {Ulrich D{\"{u}}rholz and Marc Fischlin and Michael Kasper and Cristina Onete}, title = {A Formal Approach to Distance-Bounding {RFID} Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {321}, year = {2011}, url = {http://eprint.iacr.org/2011/321}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DurholzFKO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrzuskaFSK11, author = {Christina Brzuska and Marc Fischlin and Heike Schr{\"{o}}der and Stefan Katzenbeisser}, title = {Physically Uncloneable Functions in the Universal Composition Framework}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {681}, year = {2011}, url = {http://eprint.iacr.org/2011/681}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrzuskaFSK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/BrzuskaBDFFKMOPPS10, author = {Christina Brzuska and Heike Busch and {\"{O}}zg{\"{u}}r Dagdelen and Marc Fischlin and Martin Franz and Stefan Katzenbeisser and Mark Manulis and Cristina Onete and Andreas Peter and Bertram Poettering and Dominique Schr{\"{o}}der}, editor = {Jianying Zhou and Moti Yung}, title = {Redactable Signatures for Tree-Structured Data: Definitions and Constructions}, booktitle = {Applied Cryptography and Network Security, 8th International Conference, {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6123}, pages = {87--104}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13708-2\_6}, doi = {10.1007/978-3-642-13708-2\_6}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/BrzuskaBDFFKMOPPS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/GalindoLFFLMS10, author = {David Galindo and Beno{\^{\i}}t Libert and Marc Fischlin and Georg Fuchsbauer and Anja Lehmann and Mark Manulis and Dominique Schr{\"{o}}der}, editor = {Daniel J. Bernstein and Tanja Lange}, title = {Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6055}, pages = {333--350}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12678-9\_20}, doi = {10.1007/978-3-642-12678-9\_20}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/GalindoLFFLMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/FischlinLRSST10, author = {Marc Fischlin and Anja Lehmann and Thomas Ristenpart and Thomas Shrimpton and Martijn Stam and Stefano Tessaro}, editor = {Masayuki Abe}, title = {Random Oracles with(out) Programmability}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6477}, pages = {303--320}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17373-8\_18}, doi = {10.1007/978-3-642-17373-8\_18}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/FischlinLRSST10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/FischlinLW10, author = {Marc Fischlin and Anja Lehmann and Daniel Wagner}, editor = {Josef Pieprzyk}, title = {Hash Function Combiners in {TLS} and {SSL}}, booktitle = {Topics in Cryptology - {CT-RSA} 2010, The Cryptographers' Track at the {RSA} Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5985}, pages = {268--283}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11925-5\_19}, doi = {10.1007/978-3-642-11925-5\_19}, timestamp = {Sun, 02 Jun 2019 21:22:43 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/FischlinLW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FischlinS10, author = {Marc Fischlin and Dominique Schr{\"{o}}der}, editor = {Henri Gilbert}, title = {On the Impossibility of Three-Move Blind Signature Schemes}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30 - June 3, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6110}, pages = {197--215}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13190-5\_10}, doi = {10.1007/978-3-642-13190-5\_10}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/FischlinS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/DagdelenF10, author = {{\"{O}}zg{\"{u}}r Dagdelen and Marc Fischlin}, editor = {Mike Burmester and Gene Tsudik and Spyros S. Magliveras and Ivana Ilic}, title = {Security Analysis of the Extended Access Control Protocol for Machine Readable Travel Documents}, booktitle = {Information Security - 13th International Conference, {ISC} 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6531}, pages = {54--68}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-18178-8\_6}, doi = {10.1007/978-3-642-18178-8\_6}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/DagdelenF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BrzuskaFLS10, author = {Christina Brzuska and Marc Fischlin and Anja Lehmann and Dominique Schr{\"{o}}der}, editor = {Phong Q. Nguyen and David Pointcheval}, title = {Unlinkability of Sanitizable Signatures}, booktitle = {Public Key Cryptography - {PKC} 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6056}, pages = {444--461}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13013-7\_26}, doi = {10.1007/978-3-642-13013-7\_26}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BrzuskaFLS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DentFMSS10, author = {Alexander W. Dent and Marc Fischlin and Mark Manulis and Martijn Stam and Dominique Schr{\"{o}}der}, editor = {Phong Q. Nguyen and David Pointcheval}, title = {Confidential Signatures and Deterministic Signcryption}, booktitle = {Public Key Cryptography - {PKC} 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6056}, pages = {462--479}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13013-7\_27}, doi = {10.1007/978-3-642-13013-7\_27}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/DentFMSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/EikemeierFGLSSW10, author = {Oliver Eikemeier and Marc Fischlin and Jens{-}Fabian G{\"{o}}tzmann and Anja Lehmann and Dominique Schr{\"{o}}der and Peter Schr{\"{o}}der and Daniel Wagner}, editor = {Juan A. Garay and Roberto De Prisco}, title = {History-Free Aggregate Message Authentication Codes}, booktitle = {Security and Cryptography for Networks, 7th International Conference, {SCN} 2010, Amalfi, Italy, September 13-15, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6280}, pages = {309--328}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15317-4\_20}, doi = {10.1007/978-3-642-15317-4\_20}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/scn/EikemeierFGLSSW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/BaecherFGLLS10, author = {Paul Baecher and Marc Fischlin and Lior Gordon and Robert Langenberg and Michael L{\"{u}}tzow and Dominique Schr{\"{o}}der}, editor = {Felix C. Freiling}, title = {CAPTCHAs: The Good, the Bad, and the Ugly}, booktitle = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober 2010 in Berlin}, series = {{LNI}}, volume = {{P-170}}, pages = {353--365}, publisher = {{GI}}, year = {2010}, url = {https://dl.gi.de/handle/20.500.12116/19796}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/BaecherFGLLS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/FischlinL10, author = {Marc Fischlin and Anja Lehmann}, editor = {Daniele Micciancio}, title = {Delayed-Key Message Authentication for Streams}, booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC} 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5978}, pages = {290--307}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11799-2\_18}, doi = {10.1007/978-3-642-11799-2\_18}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/FischlinL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1008-0931, author = {{\"{O}}zg{\"{u}}r Dagdelen and Marc Fischlin and Anja Lehmann and Christian Schaffner}, title = {Random Oracles in a Quantum World}, journal = {CoRR}, volume = {abs/1008.0931}, year = {2010}, url = {http://arxiv.org/abs/1008.0931}, eprinttype = {arXiv}, eprint = {1008.0931}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1008-0931.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehDFLSZ10, author = {Dan Boneh and {\"{O}}zg{\"{u}}r Dagdelen and Marc Fischlin and Anja Lehmann and Christian Schaffner and Mark Zhandry}, title = {Random Oracles in a Quantum World}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {428}, year = {2010}, url = {http://eprint.iacr.org/2010/428}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehDFLSZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/FischlinF09, author = {Marc Fischlin and Roger Fischlin}, title = {Efficient Non-malleable Commitment Schemes}, journal = {J. Cryptol.}, volume = {22}, number = {4}, pages = {530--571}, year = {2009}, url = {https://doi.org/10.1007/s00145-009-9045-2}, doi = {10.1007/S00145-009-9045-2}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/FischlinF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BoldyrevaCFW09, author = {Alexandra Boldyreva and David Cash and Marc Fischlin and Bogdan Warinschi}, editor = {Mitsuru Matsui}, title = {Foundations of Non-malleable Hash and One-Way Functions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5912}, pages = {524--541}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10366-7\_31}, doi = {10.1007/978-3-642-10366-7\_31}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BoldyrevaCFW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/biosig/BrzuskaFLS09, author = {Christina Brzuska and Marc Fischlin and Anja Lehmann and Dominique Schr{\"{o}}der}, editor = {Arslan Br{\"{o}}mme and Christoph Busch and Detlef H{\"{u}}hnlein}, title = {Santizable Signatures: How to Partially Delegate Control for Authenticated Data}, booktitle = {{BIOSIG} 2009 - Proceedings of the Special Interest Group on Biometrics and Electronic Signatures, 17.-18. September 2009 in Darmstadt, Germany}, series = {{LNI}}, volume = {{P-155}}, pages = {117--128}, publisher = {{GI}}, year = {2009}, url = {https://dl.gi.de/handle/20.500.12116/23196}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/biosig/BrzuskaFLS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/BenderFK09, author = {Jens Bender and Marc Fischlin and Dennis K{\"{u}}gler}, editor = {Pierangela Samarati and Moti Yung and Fabio Martinelli and Claudio A. Ardagna}, title = {Security Analysis of the {PACE} Key-Agreement Protocol}, booktitle = {Information Security, 12th International Conference, {ISC} 2009, Pisa, Italy, September 7-9, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5735}, pages = {33--48}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04474-8\_3}, doi = {10.1007/978-3-642-04474-8\_3}, timestamp = {Mon, 21 Mar 2022 18:09:53 +0100}, biburl = {https://dblp.org/rec/conf/isw/BenderFK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FischlinS09, author = {Marc Fischlin and Dominique Schr{\"{o}}der}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {Security of Blind Signatures under Aborts}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {297--316}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_17}, doi = {10.1007/978-3-642-00468-1\_17}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/FischlinS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BrzuskaFFLPSSV09, author = {Christina Brzuska and Marc Fischlin and Tobias Freudenreich and Anja Lehmann and Marcus Page and Jakob Schelbert and Dominique Schr{\"{o}}der and Florian Volk}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {Security of Sanitizable Signatures Revisited}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {317--336}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_18}, doi = {10.1007/978-3-642-00468-1\_18}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/BrzuskaFFLPSSV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ctrsa/2009, editor = {Marc Fischlin}, title = {Topics in Cryptology - {CT-RSA} 2009, The Cryptographers' Track at the {RSA} Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5473}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00862-7}, doi = {10.1007/978-3-642-00862-7}, isbn = {978-3-642-00861-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoldyrevaCFW09, author = {Alexandra Boldyreva and David Cash and Marc Fischlin and Bogdan Warinschi}, title = {Foundations of Non-Malleable Hash and One-Way Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {65}, year = {2009}, url = {http://eprint.iacr.org/2009/065}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoldyrevaCFW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DentFMSS09, author = {Alexander W. Dent and Marc Fischlin and Mark Manulis and Martijn Stam and Dominique Schr{\"{o}}der}, title = {Confidential Signatures and Deterministic Signcryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {588}, year = {2009}, url = {http://eprint.iacr.org/2009/588}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DentFMSS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BenderFK09, author = {Jens Bender and Marc Fischlin and Dennis K{\"{u}}gler}, title = {Security Analysis of the {PACE} Key-Agreement Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {624}, year = {2009}, url = {http://eprint.iacr.org/2009/624}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BenderFK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BellareFOR08, author = {Mihir Bellare and Marc Fischlin and Adam O'Neill and Thomas Ristenpart}, editor = {David A. Wagner}, title = {Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles}, booktitle = {Advances in Cryptology - {CRYPTO} 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5157}, pages = {360--378}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85174-5\_20}, doi = {10.1007/978-3-540-85174-5\_20}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BellareFOR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/Fischlin08, author = {Marc Fischlin}, editor = {Tal Malkin}, title = {Security of NMACand HMACBased on Non-malleability}, booktitle = {Topics in Cryptology - {CT-RSA} 2008, The Cryptographers' Track at the {RSA} Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4964}, pages = {138--154}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79263-5\_9}, doi = {10.1007/978-3-540-79263-5\_9}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/Fischlin08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/FischlinLP08, author = {Marc Fischlin and Anja Lehmann and Krzysztof Pietrzak}, editor = {Luca Aceto and Ivan Damg{\aa}rd and Leslie Ann Goldberg and Magn{\'{u}}s M. Halld{\'{o}}rsson and Anna Ing{\'{o}}lfsd{\'{o}}ttir and Igor Walukiewicz}, title = {Robust Multi-property Combiners for Hash Functions Revisited}, booktitle = {Automata, Languages and Programming, 35th International Colloquium, {ICALP} 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part {II} - Track {B:} Logic, Semantics, and Theory of Programming {\&} Track {C:} Security and Cryptography Foundations}, series = {Lecture Notes in Computer Science}, volume = {5126}, pages = {655--666}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70583-3\_53}, doi = {10.1007/978-3-540-70583-3\_53}, timestamp = {Fri, 27 Mar 2020 09:02:59 +0100}, biburl = {https://dblp.org/rec/conf/icalp/FischlinLP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/FischlinL08, author = {Marc Fischlin and Anja Lehmann}, editor = {Ran Canetti}, title = {Multi-property Preserving Combiners for Hash Functions}, booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC} 2008, New York, USA, March 19-21, 2008}, series = {Lecture Notes in Computer Science}, volume = {4948}, pages = {375--392}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78524-8\_21}, doi = {10.1007/978-3-540-78524-8\_21}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/FischlinL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareFOR08, author = {Mihir Bellare and Marc Fischlin and Adam O'Neill and Thomas Ristenpart}, title = {Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {267}, year = {2008}, url = {http://eprint.iacr.org/2008/267}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareFOR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FischlinL07, author = {Marc Fischlin and Anja Lehmann}, editor = {Alfred Menezes}, title = {Security-Amplifying Combiners for Collision-Resistant Hash Functions}, booktitle = {Advances in Cryptology - {CRYPTO} 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4622}, pages = {224--243}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74143-5\_13}, doi = {10.1007/978-3-540-74143-5\_13}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/FischlinL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/DonigusEFHJLPSTVWW07, author = {Daniel D{\"{o}}nigus and Stefan Endler and Marc Fischlin and Andreas H{\"{u}}lsing and Patrick J{\"{a}}ger and Anja Lehmann and Sergey Podrazhansky and Sebastian Schipp and Erik Tews and Sven Vowe and Matthias Walthart and Frederik Weidemann}, editor = {Teddy Furon and Fran{\c{c}}ois Cayre and Gwena{\"{e}}l J. Do{\"{e}}rr and Patrick Bas}, title = {Security of Invertible Media Authentication Schemes Revisited}, booktitle = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4567}, pages = {189--203}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77370-2\_13}, doi = {10.1007/978-3-540-77370-2\_13}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ih/DonigusEFHJLPSTVWW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Fischlin07, author = {Marc Fischlin}, editor = {Tatsuaki Okamoto and Xiaoyun Wang}, title = {Anonymous Signatures Made Easy}, booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4450}, pages = {31--42}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71677-8\_3}, doi = {10.1007/978-3-540-71677-8\_3}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Fischlin07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BoldyrevaFPW07, author = {Alexandra Boldyreva and Marc Fischlin and Adriana Palacio and Bogdan Warinschi}, editor = {Tatsuaki Okamoto and Xiaoyun Wang}, title = {A Closer Look at {PKI:} Security and Efficiency}, booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4450}, pages = {458--475}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71677-8\_30}, doi = {10.1007/978-3-540-71677-8\_30}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BoldyrevaFPW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BoldyrevaF06, author = {Alexandra Boldyreva and Marc Fischlin}, editor = {Xuejia Lai and Kefei Chen}, title = {On the Security of {OAEP}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4284}, pages = {210--225}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935230\_14}, doi = {10.1007/11935230\_14}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BoldyrevaF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Fischlin06, author = {Marc Fischlin}, editor = {Cynthia Dwork}, title = {Round-Optimal Composable Blind Signatures in the Common Reference String Model}, booktitle = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4117}, pages = {60--77}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11818175\_4}, doi = {10.1007/11818175\_4}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Fischlin06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/Fischlin06, author = {Marc Fischlin}, editor = {David Pointcheval}, title = {Universally Composable Oblivious Transfer in the Multi-party Setting}, booktitle = {Topics in Cryptology - {CT-RSA} 2006, The Cryptographers' Track at the {RSA} Conference 2006, San Jose, CA, USA, February 13-17, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3860}, pages = {332--349}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11605805\_21}, doi = {10.1007/11605805\_21}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/Fischlin06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Fischlin05, author = {Marc Fischlin}, editor = {Victor Shoup}, title = {Communication-Efficient Non-interactive Proofs of Knowledge with Online Extractors}, booktitle = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3621}, pages = {152--168}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11535218\_10}, doi = {10.1007/11535218\_10}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Fischlin05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BoldyrevaF05, author = {Alexandra Boldyreva and Marc Fischlin}, editor = {Victor Shoup}, title = {Analysis of Random Oracle Instantiation Scenarios for {OAEP} and Other Practical Schemes}, booktitle = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3621}, pages = {412--429}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11535218\_25}, doi = {10.1007/11535218\_25}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BoldyrevaF05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/Fischlin05, author = {Marc Fischlin}, editor = {Lu{\'{\i}}s Caires and Giuseppe F. Italiano and Lu{\'{\i}}s Monteiro and Catuscia Palamidessi and Moti Yung}, title = {Completely Non-malleable Schemes}, booktitle = {Automata, Languages and Programming, 32nd International Colloquium, {ICALP} 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3580}, pages = {779--790}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11523468\_63}, doi = {10.1007/11523468\_63}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/Fischlin05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/Fischlin04, author = {Marc Fischlin}, editor = {Tatsuaki Okamoto}, title = {Fast Verification of Hash Chains}, booktitle = {Topics in Cryptology - {CT-RSA} 2004, The Cryptographers' Track at the {RSA} Conference 2004, San Francisco, CA, USA, February 23-27, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2964}, pages = {339--352}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24660-2\_26}, doi = {10.1007/978-3-540-24660-2\_26}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/Fischlin04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/EnzmannFS04, author = {Matthias Enzmann and Marc Fischlin and Markus Schneider}, editor = {Ari Juels}, title = {A Privacy-Friendly Loyalty System Based on Discrete Logarithms over Elliptic Curves}, booktitle = {Financial Cryptography, 8th International Conference, {FC} 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3110}, pages = {24--38}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27809-2\_4}, doi = {10.1007/978-3-540-27809-2\_4}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/EnzmannFS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/Fischlin03, author = {Marc Fischlin}, editor = {Thomas Johansson and Subhamoy Maitra}, title = {Progressive Verification: The Case of Message Authentication: (Extended Abstract)}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2003, 4th International Conference on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2904}, pages = {416--429}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24582-7\_31}, doi = {10.1007/978-3-540-24582-7\_31}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/Fischlin03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Fischlin03, author = {Marc Fischlin}, editor = {Yvo Desmedt}, title = {The Cramer-Shoup Strong-RSASignature Scheme Revisited}, booktitle = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2567}, pages = {116--129}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36288-6\_9}, doi = {10.1007/3-540-36288-6\_9}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Fischlin03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/Fischlin02, author = {Marc Fischlin}, editor = {Bart Preneel}, title = {On the Impossibility of Constructing Non-interactive Statistically-Secret Protocols from Any Trapdoor One-Way Function}, booktitle = {Topics in Cryptology - {CT-RSA} 2002, The Cryptographer's Track at the {RSA} Conference, 2002, San Jose, CA, USA, February 18-22, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2271}, pages = {79--95}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45760-7\_7}, doi = {10.1007/3-540-45760-7\_7}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/Fischlin02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/FischlinF02, author = {Marc Fischlin and Roger Fischlin}, editor = {Bart Preneel}, title = {The Representation Problem Based on Factoring}, booktitle = {Topics in Cryptology - {CT-RSA} 2002, The Cryptographer's Track at the {RSA} Conference, 2002, San Jose, CA, USA, February 18-22, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2271}, pages = {96--113}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45760-7\_8}, doi = {10.1007/3-540-45760-7\_8}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/FischlinF02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Fischlin02, author = {Marc Fischlin}, title = {The Cramer-Shoup Strong-RSA Signature Scheme Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {17}, year = {2002}, url = {http://eprint.iacr.org/2002/017}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Fischlin02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/dnb/Fischlin01, author = {Marc Fischlin}, title = {Trapdoor commitment schemes and their applications}, school = {Goethe University Frankfurt, Frankfurt am Main, Germany}, year = {2001}, url = {http://zaurak.tm.informatik.uni-frankfurt.de/diss/data/src/00000229/00000229.pdf.gz}, urn = {urn:nbn:de:hebis:30-0000000471}, timestamp = {Sat, 17 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/dnb/Fischlin01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/Fischlin01, author = {Marc Fischlin}, title = {Cryptographic limitations on parallelizing membership and equivalence queries with applications to random-self-reductions}, journal = {Theor. Comput. Sci.}, volume = {268}, number = {2}, pages = {199--219}, year = {2001}, url = {https://doi.org/10.1016/S0304-3975(00)00271-1}, doi = {10.1016/S0304-3975(00)00271-1}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/Fischlin01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CanettiF01, author = {Ran Canetti and Marc Fischlin}, editor = {Joe Kilian}, title = {Universally Composable Commitments}, booktitle = {Advances in Cryptology - {CRYPTO} 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2139}, pages = {19--40}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44647-8\_2}, doi = {10.1007/3-540-44647-8\_2}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CanettiF01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/Fischlin01, author = {Marc Fischlin}, editor = {David Naccache}, title = {A Cost-Effective Pay-Per-Multiplication Comparison Method for Millionaires}, booktitle = {Topics in Cryptology - {CT-RSA} 2001, The Cryptographer's Track at {RSA} Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2020}, pages = {457--472}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45353-9\_33}, doi = {10.1007/3-540-45353-9\_33}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/Fischlin01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BellareFGM01, author = {Mihir Bellare and Marc Fischlin and Shafi Goldwasser and Silvio Micali}, editor = {Birgit Pfitzmann}, title = {Identification Protocols Secure against Reset Attacks}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2001, International Conference on the Theory and Application of Cryptographic Techniques, Innsbruck, Austria, May 6-10, 2001, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {2045}, pages = {495--511}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44987-6\_30}, doi = {10.1007/3-540-44987-6\_30}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BellareFGM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiF01, author = {Ran Canetti and Marc Fischlin}, title = {Universally Composable Commitments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {55}, year = {2001}, url = {http://eprint.iacr.org/2001/055}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiF01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Fischlin00, author = {Marc Fischlin}, editor = {Tatsuaki Okamoto}, title = {A Note on Security Proofs in the Generic Model}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1976}, pages = {458--469}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44448-3\_35}, doi = {10.1007/3-540-44448-3\_35}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/Fischlin00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FischlinF00, author = {Marc Fischlin and Roger Fischlin}, editor = {Mihir Bellare}, title = {Efficient Non-malleable Commitment Schemes}, booktitle = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1880}, pages = {413--431}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44598-6\_26}, doi = {10.1007/3-540-44598-6\_26}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/FischlinF00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareFGM00, author = {Mihir Bellare and Marc Fischlin and Shafi Goldwasser and Silvio Micali}, title = {Identification Protocols Secure Against Reset Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {15}, year = {2000}, url = {http://eprint.iacr.org/2000/015}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareFGM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Fischlin99, author = {Marc Fischlin}, editor = {Jacques Stern}, title = {Pseudorandom Function Tribe Ensembles Based on One-Way Permutations: Improvements and Applications}, booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1592}, pages = {432--445}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48910-X\_30}, doi = {10.1007/3-540-48910-X\_30}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Fischlin99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/alt/Fischlin98, author = {Marc Fischlin}, editor = {Michael M. Richter and Carl H. Smith and Rolf Wiehagen and Thomas Zeugmann}, title = {Cryptographic Limitations on Parallelizing Membership and Equivalence Queries with Applications to Random Self-Reductions}, booktitle = {Algorithmic Learning Theory, 9th International Conference, {ALT} '98, Otzenhausen, Germany, October 8-10, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1501}, pages = {72--86}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49730-7\_6}, doi = {10.1007/3-540-49730-7\_6}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/alt/Fischlin98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Fischlin97, author = {Marc Fischlin}, editor = {Vijay Varadharajan and Josef Pieprzyk and Yi Mu}, title = {Practical Memory Checkers for Stacks, Queues and Deques}, booktitle = {Information Security and Privacy, Second Australasian Conference, ACISP'97, Sydney, NSW, Australia, July 7-9, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1270}, pages = {114--125}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0027919}, doi = {10.1007/BFB0027919}, timestamp = {Sun, 02 Jun 2019 21:26:44 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Fischlin97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Fischlin97, author = {Marc Fischlin}, editor = {Walter Fumy}, title = {Incremental Cryptography and Memory Checkers}, booktitle = {Advances in Cryptology - {EUROCRYPT} '97, International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1233}, pages = {293--408}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-69053-0\_27}, doi = {10.1007/3-540-69053-0\_27}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Fischlin97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/Fischlin97, author = {Marc Fischlin}, title = {Lower Bounds for the Signature Size of Incremental Schemes}, booktitle = {38th Annual Symposium on Foundations of Computer Science, {FOCS} '97, Miami Beach, Florida, USA, October 19-22, 1997}, pages = {438--447}, publisher = {{IEEE} Computer Society}, year = {1997}, url = {https://doi.org/10.1109/SFCS.1997.646132}, doi = {10.1109/SFCS.1997.646132}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/Fischlin97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.