Striecks, Christoph
32  Ergebnisse:
Personensuche X
?
2

$$\text {Muckle}+$$: End-to-End Hybrid Authenticated Key Ex..:

, In: Post-Quantum Cryptography; Lecture Notes in Computer Science,
 
?
4

Revisiting Updatable Encryption: Controlled Forward Securit..:

, In: Theory of Cryptography; Lecture Notes in Computer Science,
Slamanig, Daniel ; Striecks, Christoph - p. 220-250 , 2023
 
?
5

Unique-Path Identity Based Encryption with Applications to ..:

, In: Advances in Cryptology – EUROCRYPT 2023; Lecture Notes in Computer Science,
 
?
6

Optimizing 0-RTT Key Exchange with Full Forward Security:

, In: Proceedings of the 2023 on Cloud Computing Security Workshop,
 
?
7

Logarithmic-Size (Linkable) Threshold Ring Signatures in th..:

, In: Public-Key Cryptography – PKC 2022; Lecture Notes in Computer Science,
Haque, Abida ; Krenn, Stephan ; Slamanig, Daniel. - p. 437-467 , 2022
 
?
8

Guideline for Architectural Safety, Security and Privacy Im..:

, In: Lecture Notes in Computer Science; Computer Safety, Reliability, and Security. SAFECOMP 2021 Workshops,
 
?
10

Versatile and Sustainable Timed-Release Encryption and Sequ..:

, In: Computer Security – ESORICS 2021; Lecture Notes in Computer Science,
 
?
11

Fine-Grained Forward Secrecy: Allow-List/Deny-List Encrypti..:

, In: Financial Cryptography and Data Security; Lecture Notes in Computer Science,
 
?
12

Updatable Signatures and Message Authentication Codes:

, In: Public-Key Cryptography – PKC 2021; Lecture Notes in Computer Science,
 
?
13

CCA-Secure (Puncturable) KEMs from Encryption with Non-Negl..:

, In: Advances in Cryptology – ASIACRYPT 2020; Lecture Notes in Computer Science,
 
?
14

Privacy-Preserving Incentive Systems with Highly Efficient ..:

, In: Proceedings of the 15th ACM Asia Conference on Computer and Communications Security,
Bobolz, Jan ; Eidens, Fabian ; Krenn, Stephan.. - p. 319-333 , 2020
 
?
15

Collecting and Classifying Security and Privacy Design Patt..:

, In: Computer Safety, Reliability, and Security. SAFECOMP 2020 Workshops; Lecture Notes in Computer Science,
 
1-15