Följ
Chris Brzuska
Chris Brzuska
Verifierad e-postadress på aalto.fi - Startsida
Titel
Citeras av
Citeras av
År
Physically uncloneable functions in the universal composition framework
C Brzuska, M Fischlin, H Schröder, S Katzenbeisser
Advances in Cryptology–CRYPTO 2011: 31st Annual Cryptology Conference, Santa …, 2011
1882011
Security of sanitizable signatures revisited
C Brzuska, M Fischlin, T Freudenreich, A Lehmann, M Page, J Schelbert, ...
Public Key Cryptography–PKC 2009: 12th International Conference on Practice …, 2009
1832009
Redactable signatures for tree-structured data: Definitions and constructions
C Brzuska, H Busch, O Dagdelen, M Fischlin, M Franz, S Katzenbeisser, ...
Applied Cryptography and Network Security: 8th International Conference …, 2010
1482010
Unlinkability of sanitizable signatures
C Brzuska, M Fischlin, A Lehmann, D Schröder
Public Key Cryptography–PKC 2010: 13th International Conference on Practice …, 2010
1222010
Composability of Bellare-Rogaway key exchange protocols
C Brzuska, M Fischlin, B Warinschi, SC Williams
Proceedings of the 18th ACM conference on Computer and communications …, 2011
982011
Downgrade resilience in key-exchange protocols
K Bhargavan, C Brzuska, C Fournet, M Green, M Kohlweiss, ...
2016 IEEE Symposium on Security and Privacy (SP), 506-525, 2016
712016
Less is more: Relaxed yet composable security notions for key exchange
C Brzuska, M Fischlin, NP Smart, B Warinschi, SC Williams
International Journal of Information Security 12, 267-297, 2013
702013
Indistinguishability obfuscation and UCEs: The case of computationally unpredictable sources
C Brzuska, P Farshim, A Mittelbach
Advances in Cryptology–CRYPTO 2014: 34th Annual Cryptology Conference, Santa …, 2014
692014
Notions of black-box reductions, revisited
P Baecher, C Brzuska, M Fischlin
Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the …, 2013
632013
Non-interactive public accountability for sanitizable signatures
C Brzuska, HC Pöhls, K Samelin
Public Key Infrastructures, Services and Applications: 9th European Workshop …, 2013
592013
Efficient and perfectly unlinkable sanitizable signatures without group signatures
C Brzuska, HC Pöhls, K Samelin
Public Key Infrastructures, Services and Applications: 10th European …, 2014
502014
An analysis of the EMV channel establishment protocol
C Brzuska, NP Smart, B Warinschi, GJ Watson
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
492013
White-box cryptography: don’t forget about grey-box attacks
E Alpirez Bock, JW Bos, C Brzuska, C Hubain, W Michiels, C Mune, ...
Journal of Cryptology 32, 1095-1143, 2019
482019
State separation for code-based game-playing proofs
C Brzuska, A Delignat-Lavaud, C Fournet, K Kohbrok, M Kohlweiss
Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the …, 2018
462018
Using indistinguishability obfuscation via UCEs
C Brzuska, A Mittelbach
Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014
422014
Security analysis of the MLS key derivation
C Brzuska, E Cornelissen, K Kohbrok
2022 IEEE Symposium on Security and Privacy (SP), 2535-2553, 2022
41*2022
On basing size-verifiable one-way functions on NP-hardness
A Bogdanov, C Brzuska
Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015 …, 2015
412015
Indistinguishability obfuscation versus multi-bit point obfuscation with auxiliary input
C Brzuska, A Mittelbach
Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014
392014
On the security goals of white-box cryptography
EA Bock, A Amadori, C Brzuska, W Michiels
IACR transactions on cryptographic hardware and embedded systems, 327-357, 2020
382020
On the ineffectiveness of internal encodings-revisiting the DCA attack on white-box cryptography
E Alpirez Bock, C Brzuska, W Michiels, A Treff
Applied Cryptography and Network Security: 16th International Conference …, 2018
382018
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20