default search action
Mario Strefler
Person information
- affiliation: Karlsruhe Institute of Technology (KIT), Institute of Theoretical Informatics, Germany
- affiliation (PhD 2013): École Normale Supérieure, Paris, France
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2015
- [c8]Kenneth G. Paterson, Mario Strefler:
A Practical Attack Against the Use of RC4 in the HIVE Hidden Volume Encryption System. AsiaCCS 2015: 475-482 - 2014
- [i5]Jesper Buus Nielsen, Mario Strefler:
Invisible Adaptive Attacks. IACR Cryptol. ePrint Arch. 2014: 597 (2014) - [i4]Kenneth G. Paterson, Mario Strefler:
A Practical Attack Against the HIVE Hidden Volume Encryption System. IACR Cryptol. ePrint Arch. 2014: 901 (2014) - 2013
- [b1]Mario Strefler:
Broadcast Encryption with Traitor Tracing. (Diffusion chiffrée avec traçage de traîtres). École Normale Supérieure, Paris, France, 2013 - [j1]Duong Hieu Phan, David Pointcheval, Siamak Fayyaz Shahandashti, Mario Strefler:
Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts. Int. J. Inf. Sec. 12(4): 251-265 (2013) - 2012
- [c7]Duong Hieu Phan, David Pointcheval, Siamak Fayyaz Shahandashti, Mario Strefler:
Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts. ACISP 2012: 308-321 - [c6]Jean Paul Degabriele, Anja Lehmann, Kenneth G. Paterson, Nigel P. Smart, Mario Strefler:
On the Joint Security of Encryption and Signature in EMV. CT-RSA 2012: 116-135 - [c5]Duong Hieu Phan, David Pointcheval, Mario Strefler:
Message-Based Traitor Tracing with Optimal Ciphertext Rate. LATINCRYPT 2012: 56-77 - [c4]Duong Hieu Phan, David Pointcheval, Mario Strefler:
Decentralized Dynamic Broadcast Encryption. SCN 2012: 166-183 - [i3]Duong Hieu Phan, David Pointcheval, Siamak Fayyaz Shahandashti, Mario Strefler:
Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts. IACR Cryptol. ePrint Arch. 2012: 216 (2012) - 2011
- [c3]Duong Hieu Phan, David Pointcheval, Mario Strefler:
Security Notions for Broadcast Encryption. ACNS 2011: 377-394 - [i2]Duong Hieu Phan, David Pointcheval, Mario Strefler:
Adaptively Secure Broadcast Encryption with Forward Secrecy. IACR Cryptol. ePrint Arch. 2011: 463 (2011) - [i1]Jean Paul Degabriele, Anja Lehmann, Kenneth G. Paterson, Nigel P. Smart, Mario Strefler:
On the Joint Security of Encryption and Signature in EMV. IACR Cryptol. ePrint Arch. 2011: 615 (2011)
2000 – 2009
- 2009
- [c2]Kazukuni Kobara, SeongHan Shin, Mario Strefler:
Partnership in key exchange protocols. AsiaCCS 2009: 161-170 - [c1]Christian Henrich, Matthias Huber, Carmen Kempka, Jörn Müller-Quade, Mario Strefler:
Brief Announcement: Towards Secure Cloud Computing. SSS 2009: 785-786
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint