Berndt, Sebastian
297  Ergebnisse:
Personensuche X
?
2

Subversion-Resilient Signatures Without Random Oracles:

, In: Applied Cryptography and Network Security; Lecture Notes in Computer Science,
 
?
3

New Support Size Bounds and Proximity Bounds for Integer Li..:

, In: Lecture Notes in Computer Science; SOFSEM 2024: Theory and Practice of Computer Science,
 
?
5

"Act natural!": Exchanging Private Messages on Public Block..:

, In: 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P),
 
?
6

Online bin covering with limited migration:

Berndt, Sebastian ; Epstein, Leah ; Jansen, Klaus...
Journal of Computer and System Sciences.  134 (2023)  - p. 42-72 , 2023
 
?
7

Subversion-Resilient Authenticated Encryption Without Rando..:

, In: Applied Cryptography and Network Security; Lecture Notes in Computer Science,
 
?
8

Combined Fault and Leakage Resilience: Composability, Const..:

, In: Advances in Cryptology – CRYPTO 2023; Lecture Notes in Computer Science,
 
?
9

TeeJam: Sub-Cache-Line Leakages Strike Back:

Sieck, Florian ; Zhang, Zhiyuan ; Berndt, Sebastian...
IACR Transactions on Cryptographic Hardware and Embedded Systems.  2024 (2023)  1 - p. 457-500 , 2023
 
?
10

Collaborative VR: Conveying a Complex Disease and Its Treat..:

, In: 2023 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW),
 
?
11

Learning residual alternating automata:

Berndt, Sebastian ; Liśkiewicz, Maciej ; Lutter, Matthias.
Information and Computation.  289 (2022)  - p. 104981 , 2022
 
?
12

ASAP : Algorithm Substitution Attacks on Cryptographic P..:

, In: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security,
 
?
 
?
 
1-15