Badertscher, Christian
223  results:
Search for persons X
?
1

Updatable Policy-Compliant Signatures:

, In: Lecture Notes in Computer Science; Public-Key Cryptography – PKC 2024,
 
?
3

Agile Cryptography: A Universally Composable Approach:

, In: Theory of Cryptography; Lecture Notes in Computer Science,
 
?
4

A Composable Security Treatment of ECVRF and Batch Verifica..:

, In: Computer Security – ESORICS 2022; Lecture Notes in Computer Science,
 
?
5

Consistency for Functional Encryption:

, In: 2021 IEEE 34th Computer Security Foundations Symposium (CSF),
 
?
6

On the (Ir)Replaceability of Global Setups, or How (Not) to..:

, In: Theory of Cryptography; Lecture Notes in Computer Science,
 
?
7

Policy-Compliant Signatures:

, In: Theory of Cryptography; Lecture Notes in Computer Science,
 
?
8

Revisiting (R)CCA Security and Replay Protection:

, In: Public-Key Cryptography – PKC 2021; Lecture Notes in Computer Science,
 
?
9

Dynamic Ad Hoc Clock Synchronization:

, In: Lecture Notes in Computer Science; Advances in Cryptology – EUROCRYPT 2021,
 
?
10

A Rational Protocol Treatment of 51% Attacks:

, In: Advances in Cryptology – CRYPTO 2021; Lecture Notes in Computer Science,
 
?
11

Generalized Proofs of Knowledge with Fully Dynamic Setup:

, In: Theory of Cryptography; Lecture Notes in Computer Science,
 
?
12

Security Limitations of Classical-Client Delegated Quantum ..:

, In: Advances in Cryptology – ASIACRYPT 2020; Lecture Notes in Computer Science,
 
?
13

Universal Composition with Global Subroutines: Capturing Gl..:

, In: Theory of Cryptography; Lecture Notes in Computer Science,
 
?
14

A Constructive Perspective on Signcryption Security:

, In: Lecture Notes in Computer Science; Security and Cryptography for Networks,
 
?
15

Ouroboros Genesis : Composable Proof-of-Stake Blockchain..:

, In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security,
 
1-15