Obserwuj
Chris Brzuska
Chris Brzuska
Zweryfikowany adres z aalto.fi - Strona główna
Tytuł
Cytowane przez
Cytowane przez
Rok
Physically uncloneable functions in the universal composition framework
C Brzuska, M Fischlin, H Schröder, S Katzenbeisser
Advances in Cryptology–CRYPTO 2011: 31st Annual Cryptology Conference, Santa …, 2011
1692011
Security of sanitizable signatures revisited
C Brzuska, M Fischlin, T Freudenreich, A Lehmann, M Page, J Schelbert, ...
Public Key Cryptography–PKC 2009: 12th International Conference on Practice …, 2009
1622009
Redactable signatures for tree-structured data: Definitions and constructions
C Brzuska, H Busch, O Dagdelen, M Fischlin, M Franz, S Katzenbeisser, ...
Applied Cryptography and Network Security: 8th International Conference …, 2010
1392010
Unlinkability of sanitizable signatures
C Brzuska, M Fischlin, A Lehmann, D Schröder
Public Key Cryptography–PKC 2010: 13th International Conference on Practice …, 2010
1032010
Composability of Bellare-Rogaway key exchange protocols
C Brzuska, M Fischlin, B Warinschi, SC Williams
Proceedings of the 18th ACM conference on Computer and communications …, 2011
852011
Less is more: Relaxed yet composable security notions for key exchange
C Brzuska, M Fischlin, NP Smart, B Warinschi, SC Williams
International Journal of Information Security 12, 267-297, 2013
712013
Indistinguishability obfuscation and UCEs: The case of computationally unpredictable sources
C Brzuska, P Farshim, A Mittelbach
Advances in Cryptology–CRYPTO 2014: 34th Annual Cryptology Conference, Santa …, 2014
592014
Downgrade resilience in key-exchange protocols
K Bhargavan, C Brzuska, C Fournet, M Green, M Kohlweiss, ...
2016 IEEE Symposium on Security and Privacy (SP), 506-525, 2016
562016
Non-interactive public accountability for sanitizable signatures
C Brzuska, HC Pöhls, K Samelin
Public Key Infrastructures, Services and Applications: 9th European Workshop …, 2013
532013
Notions of black-box reductions, revisited
P Baecher, C Brzuska, M Fischlin
Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the …, 2013
502013
An analysis of the EMV channel establishment protocol
C Brzuska, NP Smart, B Warinschi, GJ Watson
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
472013
Efficient and perfectly unlinkable sanitizable signatures without group signatures
C Brzuska, HC Pöhls, K Samelin
Public Key Infrastructures, Services and Applications: 10th European …, 2014
422014
Indistinguishability obfuscation versus multi-bit point obfuscation with auxiliary input
C Brzuska, A Mittelbach
Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014
392014
Using indistinguishability obfuscation via UCEs
C Brzuska, A Mittelbach
Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014
392014
On basing size-verifiable one-way functions on NP-hardness
A Bogdanov, C Brzuska
Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015 …, 2015
322015
Sanitizable signatures: How to partially delegate control for authenticated data
C Brzuska, M Fischlin, A Lehmann, D Schröder
BIOSIG 2009: biometrics and electronic signatures, 2009
322009
White-box cryptography: don’t forget about grey-box attacks
E Alpirez Bock, JW Bos, C Brzuska, C Hubain, W Michiels, C Mune, ...
Journal of Cryptology 32, 1095-1143, 2019
302019
Random-oracle uninstantiability from indistinguishability obfuscation
C Brzuska, P Farshim, A Mittelbach
Cryptology ePrint Archive, 2014
302014
Safely exporting keys from secure channels: on the security of EAP-TLS and TLS key exporters
C Brzuska, H Jacobsen, D Stebila
Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016
272016
On the foundations of key exchange
C Brzuska
Technische Universität, 2013
262013
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20