Follow
Chris Brzuska
Chris Brzuska
Verified email at aalto.fi - Homepage
Title
Cited by
Cited by
Year
Physically uncloneable functions in the universal composition framework
C Brzuska, M Fischlin, H Schröder, S Katzenbeisser
Advances in Cryptology–CRYPTO 2011: 31st Annual Cryptology Conference, Santa …, 2011
1842011
Security of sanitizable signatures revisited
C Brzuska, M Fischlin, T Freudenreich, A Lehmann, M Page, J Schelbert, ...
Public Key Cryptography–PKC 2009: 12th International Conference on Practice …, 2009
1722009
Redactable signatures for tree-structured data: Definitions and constructions
C Brzuska, H Busch, O Dagdelen, M Fischlin, M Franz, S Katzenbeisser, ...
Applied Cryptography and Network Security: 8th International Conference …, 2010
1442010
Unlinkability of sanitizable signatures
C Brzuska, M Fischlin, A Lehmann, D Schröder
Public Key Cryptography–PKC 2010: 13th International Conference on Practice …, 2010
1142010
Composability of Bellare-Rogaway key exchange protocols
C Brzuska, M Fischlin, B Warinschi, SC Williams
Proceedings of the 18th ACM conference on Computer and communications …, 2011
942011
Less is more: Relaxed yet composable security notions for key exchange
C Brzuska, M Fischlin, NP Smart, B Warinschi, SC Williams
International Journal of Information Security 12, 267-297, 2013
712013
Indistinguishability obfuscation and UCEs: The case of computationally unpredictable sources
C Brzuska, P Farshim, A Mittelbach
Advances in Cryptology–CRYPTO 2014: 34th Annual Cryptology Conference, Santa …, 2014
662014
Downgrade resilience in key-exchange protocols
K Bhargavan, C Brzuska, C Fournet, M Green, M Kohlweiss, ...
2016 IEEE Symposium on Security and Privacy (SP), 506-525, 2016
622016
Non-interactive public accountability for sanitizable signatures
C Brzuska, HC Pöhls, K Samelin
Public Key Infrastructures, Services and Applications: 9th European Workshop …, 2013
552013
Notions of black-box reductions, revisited
P Baecher, C Brzuska, M Fischlin
Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the …, 2013
552013
Efficient and perfectly unlinkable sanitizable signatures without group signatures
C Brzuska, HC Pöhls, K Samelin
Public Key Infrastructures, Services and Applications: 10th European …, 2014
472014
An analysis of the EMV channel establishment protocol
C Brzuska, NP Smart, B Warinschi, GJ Watson
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
472013
Using indistinguishability obfuscation via UCEs
C Brzuska, A Mittelbach
Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014
412014
White-box cryptography: don’t forget about grey-box attacks
E Alpirez Bock, JW Bos, C Brzuska, C Hubain, W Michiels, C Mune, ...
Journal of Cryptology 32, 1095-1143, 2019
392019
Indistinguishability obfuscation versus multi-bit point obfuscation with auxiliary input
C Brzuska, A Mittelbach
Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014
392014
State separation for code-based game-playing proofs
C Brzuska, A Delignat-Lavaud, C Fournet, K Kohbrok, M Kohlweiss
Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the …, 2018
38*2018
Security analysis of the MLS key derivation
C Brzuska, E Cornelissen, K Kohbrok
2022 IEEE Symposium on Security and Privacy (SP), 2535-2553, 2022
36*2022
On basing size-verifiable one-way functions on NP-hardness
A Bogdanov, C Brzuska
Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015 …, 2015
362015
Sanitizable signatures: How to partially delegate control for authenticated data
C Brzuska, M Fischlin, A Lehmann, D Schröder
Gesellschaft für Informatik eV, 2009
352009
On the security goals of white-box cryptography
EA Bock, A Amadori, C Brzuska, W Michiels
IACR transactions on cryptographic hardware and embedded systems, 327-357, 2020
342020
The system can't perform the operation now. Try again later.
Articles 1–20