Chris Brzuska
Christina Brzuska
Person information
- affiliation: Hamburg University of Technology, Institute for IT Security Analysis, Germany
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2010 – today
- 2018
- [c24]Estuardo Alpirez Bock, Chris Brzuska, Wil Michiels, Alexander Treff:
On the Ineffectiveness of Internal Encodings - Revisiting the DCA Attack on White-Box Cryptography. ACNS 2018: 103-120 - [c23]Chris Brzuska, Antoine Delignat-Lavaud, Cédric Fournet, Konrad Kohbrok, Markulf Kohlweiss:
State Separation for Code-Based Game-Playing Proofs. ASIACRYPT (3) 2018: 222-249 - [i19]Estuardo Alpirez Bock, Chris Brzuska, Wil Michiels, Alexander Treff:
On the Ineffectiveness of Internal Encodings - Revisiting the DCA Attack on White-Box Cryptography. IACR Cryptology ePrint Archive 2018: 301 (2018) - [i18]Chris Brzuska, Antoine Delignat-Lavaud, Konrad Kohbrok, Markulf Kohlweiss:
State-Separating Proofs: A Reduction Methodology for Real-World Protocols. IACR Cryptology ePrint Archive 2018: 306 (2018) - 2017
- [j2]Benny Applebaum, Jonathan Avron, Chris Brzuska:
Arithmetic Cryptography. J. ACM 64(2): 10:1-10:74 (2017) - [c22]Chris Brzuska, Håkon Jacobsen:
A Modular Security Analysis of EAP and IEEE 802.11. Public Key Cryptography (2) 2017: 335-365 - [i17]Chris Brzuska, Håkon Jacobsen:
A Modular Security Analysis of EAP and IEEE 802.11. IACR Cryptology ePrint Archive 2017: 253 (2017) - 2016
- [c21]Zvika Brakerski, Christina Brzuska, Nils Fleischhacker:
On Statistically Secure Obfuscation with Approximate Correctness. CRYPTO (2) 2016: 551-578 - [c20]Christina Brzuska, Håkon Jacobsen, Douglas Stebila:
Safely Exporting Keys from Secure Channels - On the Security of EAP-TLS and TLS Key Exporters. EUROCRYPT (1) 2016: 670-698 - [c19]Karthikeyan Bhargavan, Christina Brzuska, Cédric Fournet, Matthew Green, Markulf Kohlweiss, Santiago Zanella Béguelin:
Downgrade Resilience in Key-Exchange Protocols. IEEE Symposium on Security and Privacy 2016: 506-525 - [i16]Karthikeyan Bhargavan, Christina Brzuska, Cédric Fournet, Matthew Green, Markulf Kohlweiss, Santiago Zanella Béguelin:
Downgrade Resilience in Key-Exchange Protocols. IACR Cryptology ePrint Archive 2016: 72 (2016) - [i15]Christina Brzuska, Håkon Jacobsen, Douglas Stebila:
Safely Exporting Keys from Secure Channels: On the security of EAP-TLS and TLS Key Exporters. IACR Cryptology ePrint Archive 2016: 87 (2016) - [i14]Zvika Brakerski, Christina Brzuska, Nils Fleischhacker:
On Statistically Secure Obfuscation with Approximate Correctness. IACR Cryptology ePrint Archive 2016: 226 (2016) - 2015
- [c18]Benny Applebaum, Jonathan Avron, Christina Brzuska:
Arithmetic Cryptography: Extended Abstract. ITCS 2015: 143-151 - [c17]Andrej Bogdanov, Christina Brzuska:
On Basing Size-Verifiable One-Way Functions on NP-Hardness. TCC (1) 2015: 1-6 - [c16]Christina Brzuska, Pooya Farshim, Arno Mittelbach:
Random-Oracle Uninstantiability from Indistinguishability Obfuscation. TCC (2) 2015: 428-455 - [i13]Benny Applebaum, Jonathan Avron, Christina Brzuska:
Arithmetic Cryptography. Electronic Colloquium on Computational Complexity (ECCC) 22: 61 (2015) - [i12]Benny Applebaum, Jonathan Avron, Christina Brzuska:
Arithmetic Cryptography. IACR Cryptology ePrint Archive 2015: 336 (2015) - [i11]Christina Brzuska, Arno Mittelbach:
Universal Computational Extractors and the Superfluous Padding Assumption for Indistinguishability Obfuscation. IACR Cryptology ePrint Archive 2015: 581 (2015) - 2014
- [c15]Christina Brzuska, Arno Mittelbach:
Using Indistinguishability Obfuscation via UCEs. ASIACRYPT (2) 2014: 122-141 - [c14]Christina Brzuska, Arno Mittelbach:
Indistinguishability Obfuscation versus Multi-bit Point Obfuscation with Auxiliary Input. ASIACRYPT (2) 2014: 142-161 - [c13]Christina Brzuska, Pooya Farshim, Arno Mittelbach:
Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources. CRYPTO (1) 2014: 188-205 - [i10]Andrej Bogdanov, Christina Brzuska:
On Basing Size-Verifiable One-Way Functions on NP-Hardness. Electronic Colloquium on Computational Complexity (ECCC) 21: 108 (2014) - [i9]Christina Brzuska, Pooya Farshim, Arno Mittelbach:
Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources. IACR Cryptology ePrint Archive 2014: 99 (2014) - [i8]Christina Brzuska, Arno Mittelbach:
Using Indistinguishability Obfuscation via UCEs. IACR Cryptology ePrint Archive 2014: 381 (2014) - [i7]Christina Brzuska, Arno Mittelbach:
Indistinguishability Obfuscation versus Point Obfuscation with Auxiliary Input. IACR Cryptology ePrint Archive 2014: 405 (2014) - [i6]Christina Brzuska, Pooya Farshim, Arno Mittelbach:
Random Oracle Uninstantiability from Indistinguishability Obfuscation. IACR Cryptology ePrint Archive 2014: 867 (2014) - 2013
- [b1]Christina Brzuska:
On the foundations of key exchange. Darmstadt University of Technology, Germany 2013, pp. 1-140 - [j1]Christina Brzuska, Marc Fischlin, Nigel P. Smart, Bogdan Warinschi, Stephen C. Williams:
Less is more: relaxed yet composable security notions for key exchange. Int. J. Inf. Sec. 12(4): 267-297 (2013) - [c12]Paul Baecher, Christina Brzuska, Arno Mittelbach:
Reset Indifferentiability and Its Consequences. ASIACRYPT (1) 2013: 154-173 - [c11]Paul Baecher, Christina Brzuska, Marc Fischlin:
Notions of Black-Box Reductions, Revisited. ASIACRYPT (1) 2013: 296-315 - [c10]Christina Brzuska, Nigel P. Smart, Bogdan Warinschi, Gaven J. Watson:
An analysis of the EMV channel establishment protocol. ACM Conference on Computer and Communications Security 2013: 373-386 - [c9]Christina Brzuska, Henrich Christopher Pöhls, Kai Samelin:
Efficient and Perfectly Unlinkable Sanitizable Signatures without Group Signatures. EuroPKI 2013: 12-30 - [i5]Christina Brzuska, Nigel P. Smart, Bogdan Warinschi, Gaven J. Watson:
An Analysis of the EMV Channel Establishment Protocol. IACR Cryptology ePrint Archive 2013: 31 (2013) - [i4]Paul Baecher, Christina Brzuska, Marc Fischlin:
Notions of Black-Box Reductions, Revisited. IACR Cryptology ePrint Archive 2013: 101 (2013) - [i3]Paul Baecher, Christina Brzuska, Arno Mittelbach:
Reset Indifferentiability and its Consequences. IACR Cryptology ePrint Archive 2013: 459 (2013) - 2012
- [c8]Christina Brzuska, Henrich Christopher Pöhls, Kai Samelin:
Non-interactive Public Accountability for Sanitizable Signatures. EuroPKI 2012: 178-193 - [c7]Christina Brzuska, Özgür Dagdelen, Marc Fischlin:
TLS, PACE, and EAC: ACryptographic View at Modern Key Exchange Protocols. Sicherheit 2012: 71-82 - [i2]Christina Brzuska, Marc Fischlin, Nigel P. Smart, Bogdan Warinschi, Stephen C. Williams:
Less is More: Relaxed yet Composable Security Notions for Key Exchange. IACR Cryptology ePrint Archive 2012: 242 (2012) - 2011
- [c6]Christina Brzuska, Marc Fischlin, Bogdan Warinschi, Stephen C. Williams:
Composability of bellare-rogaway key exchange protocols. ACM Conference on Computer and Communications Security 2011: 51-62 - [c5]Christina Brzuska, Marc Fischlin, Heike Schröder, Stefan Katzenbeisser:
Physically Uncloneable Functions in the Universal Composition Framework. CRYPTO 2011: 51-70 - [i1]Christina Brzuska, Marc Fischlin, Heike Schröder, Stefan Katzenbeisser:
Physically Uncloneable Functions in the Universal Composition Framework. IACR Cryptology ePrint Archive 2011: 681 (2011) - 2010
- [c4]Christina Brzuska, Heike Busch, Özgür Dagdelen, Marc Fischlin, Martin Franz, Stefan Katzenbeisser, Mark Manulis, Cristina Onete, Andreas Peter, Bertram Poettering, Dominique Schröder:
Redactable Signatures for Tree-Structured Data: Definitions and Constructions. ACNS 2010: 87-104 - [c3]Christina Brzuska, Marc Fischlin, Anja Lehmann, Dominique Schröder:
Unlinkability of Sanitizable Signatures. Public Key Cryptography 2010: 444-461
2000 – 2009
- 2009
- [c2]Christina Brzuska, Marc Fischlin, Anja Lehmann, Dominique Schröder:
Santizable Signatures: How to Partially Delegate Control for Authenticated Data. BIOSIG 2009: 117-128 - [c1]Christina Brzuska, Marc Fischlin, Tobias Freudenreich, Anja Lehmann, Marcus Page, Jakob Schelbert, Dominique Schröder, Florian Volk:
Security of Sanitizable Signatures Revisited. Public Key Cryptography 2009: 317-336
Coauthor Index
last updated on 2019-01-09 00:52 CET by the dblp team
data released under the ODC-BY 1.0 license
see also: Terms of Use | Privacy Policy | Imprint