Zobrazeno 1 - 10
of 26
pro vyhledávání: '"Christoph Striecks"'
Publikováno v:
Advances in Cryptology – EUROCRYPT 2023 ISBN: 9783031305887
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::44bb063e89bbb005952636ea17891b21
https://doi.org/10.1007/978-3-031-30589-4_1
https://doi.org/10.1007/978-3-031-30589-4_1
Publikováno v:
Public-Key Cryptography – PKC 2022 ISBN: 9783030971304
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a0f8cea22354a6c11647b4a72de736f8
https://doi.org/10.1007/978-3-030-97131-1_15
https://doi.org/10.1007/978-3-030-97131-1_15
Publikováno v:
Sygma
ORCID
Journal of Cryptology
ORCID
Journal of Cryptology
Forward secrecy is considered an essential design goal of modern key establishment (KE) protocols, such as TLS 1.3, for example. Furthermore, efficiency considerations such as zero round-trip time (0-RTT), where a client is able to send cryptographic
Publikováno v:
Financial Cryptography and Data Security ISBN: 9783662643303
Financial Cryptography (2)
Financial Cryptography (2)
Forward secrecy is an important feature for modern cryptographic systems and is widely used in secure messaging such as Signal and WhatsApp as well as in common Internet protocols such as TLS, IPSec, or SSH. The benefit of forward secrecy is that the
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e1d3a1972cac5c2ef3915aade150ce62
https://doi.org/10.1007/978-3-662-64331-0_26
https://doi.org/10.1007/978-3-662-64331-0_26
Publikováno v:
Public-Key Cryptography – PKC 2021 ISBN: 9783030752446
Public Key Cryptography (1)
Public-Key Cryptography – PKC 2021-24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10–13, 2021, Proceedings, Part I
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Public-Key Cryptography – PKC 2021
Public Key Cryptography (1)
Public-Key Cryptography – PKC 2021-24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10–13, 2021, Proceedings, Part I
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Public-Key Cryptography – PKC 2021
Cryptographic objects with updating capabilities have been proposed by Bellare, Goldreich and Goldwasser (CRYPTO’94) under the umbrella of incremental cryptography. They have recently seen increased interest, motivated by theoretical questions (Ana
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::09d704d532e9365b30d063f30ffb6680
https://doi.org/10.1007/978-3-030-75245-3_25
https://doi.org/10.1007/978-3-030-75245-3_25
Publikováno v:
Proceedings of the 15th ACM Asia Conference on Computer and Communications Security
AsiaCCS
AsiaCCS
Incentive systems (such as customer loyalty systems) are omnipresent nowadays and deployed in several areas such as retail, travel, and financial services. Despite the benefits for customers and companies, this involves large amounts of sensitive dat
Publikováno v:
Computer Safety, Reliability, and Security. SAFECOMP 2020 Workshops ISBN: 9783030555825
SAFECOMP Workshops
Computer Safety, Reliability, and Security. SAFECOMP 2020 Workshops-DECSoS 2020, DepDevOps 2020, USDAI 2020, and WAISE 2020, Lisbon, Portugal, September 15, 2020, Proceedings
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Computer Safety, Reliability, and Security. SAFECOMP 2020 Workshops
SAFECOMP Workshops
Computer Safety, Reliability, and Security. SAFECOMP 2020 Workshops-DECSoS 2020, DepDevOps 2020, USDAI 2020, and WAISE 2020, Lisbon, Portugal, September 15, 2020, Proceedings
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Computer Safety, Reliability, and Security. SAFECOMP 2020 Workshops
In the past several years, autonomous driving turned out to be a target for many technical players. Automated driving requires new and advanced mechanisms to provide safe functionality and the increased communication makes automated vehicles more vul
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::be168f30ced925075d0de4e9fc9e6489
https://doi.org/10.1007/978-3-030-55583-2_3
https://doi.org/10.1007/978-3-030-55583-2_3
Publikováno v:
ARES
Proceedings of the 14th International Conference on Availability, Reliability and Security
Proceedings of the 14th International Conference on Availability, Reliability and Security -ARES '19
Proceedings of the 14th International Conference on Availability, Reliability and Security-ARES 19
Proceedings of the 14th International Conference on Availability, Reliability and Security
Proceedings of the 14th International Conference on Availability, Reliability and Security -ARES '19
Proceedings of the 14th International Conference on Availability, Reliability and Security-ARES 19
Group signatures allow creating signatures on behalf of a group, while remaining anonymous. To prevent misuse, there exists a designated entity, named the opener, which can revoke anonymity by generating a proof which links a signature to its creator
Publikováno v:
Advances in Cryptology – EUROCRYPT 2018 ISBN: 9783319783710
EUROCRYPT (3)
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – EUROCRYPT 2018
EUROCRYPT (3)
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – EUROCRYPT 2018
Forward secrecy is considered an essential design goal of modern key establishment (KE) protocols, such as TLS 1.3, for example. Furthermore, efficiency considerations such as zero round-trip time (0-RTT), where a client is able to send cryptographic
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c5200c04eebcbeced089eccbb963480b
https://doi.org/10.1007/978-3-319-78372-7_14
https://doi.org/10.1007/978-3-319-78372-7_14
Autor:
Stephan Krenn, Thomas Lorünser, Christoph Striecks, Sebastian Ramacher, David Derler, Daniel Slamanig
Publikováno v:
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Public-Key Cryptography – PKC 2018
Public-Key Cryptography – PKC 2018 ISBN: 9783319765778
Public Key Cryptography (1)
Lecture Notes in Computer Science-Public-Key Cryptography – PKC 2018
Public-Key Cryptography – PKC 2018 ISBN: 9783319765778
Public Key Cryptography (1)
We revisit the notion of proxy re-encryption (\(\mathsf {PRE}\)), an enhanced public-key encryption primitive envisioned by Blaze et al. (Eurocrypt’98) and formalized by Ateniese et al. (NDSS’05) for delegating decryption rights from a delegator
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::29c22d145b16f66671ca5e57aa6dd09f