Publications
2025 2024 2023 Bajramovic, E., Fein, C., Frinken, M., Rösler, P., & Freiling, F. (2023). LAVA: Log Authentication and Verification Algorithm . In ACM (Eds.), Proceedings of the 12th International Conference on IT Security Incident Management & IT Forensics (IMF 2023) . Munich, Germany. DOI: 10.1145/3609233 BibTeX: Download Chow, S.S.M., Egger, C., Lai, R.W.F., Woo, I.K.Y., & Ronge, V. (2023). On Sustainable Ring-based Anonymous Systems . In Proceedings of the 36th IEEE Computer Security Foundations Symposium . Dubrovnik, HR. BibTeX: Download Chu, T.T.H., Gerhart, P., Ruffing, T., & Schröder, D. (2023). Practical Schnorr Threshold Signatures Without the Algebraic Group Model . In Helena Handschuh, Anna Lysyanskaya (Eds.), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 743-773). Santa Barbara, CA, USA: Springer Science and Business Media Deutschland GmbH. DOI: 10.1007/978-3-031-38557-5_24 BibTeX: Download Deuber, D., & Keuchen, M. (2023). Anonymisierung von Gerichtsentscheidungen im Lichte der IT-Sicherheit - Nachweis der Unsicherheit eines geheim gehaltenen Anonymisierungsverfahrens und Alternativen . MultiMedia und Recht , 5 , 338 - 344. BibTeX: Download Rösler, P., Slamanig, D., & Striecks, C. (2023). Unique-Path Identity Based Encryption with Applications to Strongly Secure Messaging . In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques
EUROCRYPT 2023: Advances in Cryptology – EUROCRYPT 2023 (pp. 3-34). Lyon, FR. DOI: 10.1007/978-3-031-30589-4_1 BibTeX: Download Rösler, P., Slamanig, D., & Striecks, C. (2023). Unique-Path Identity Based Encryption with Applications to Strongly Secure Messaging . In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques
EUROCRYPT 2023: Advances in Cryptology – EUROCRYPT 2023 (pp. 3-34). DOI: 10.1007/978-3-031-30589-4_1 BibTeX: Download 2022 Chu, T.T.H., Fiore, D., Kolonelos, D., & Schröder, D. (2022). Inner Product Functional Commitments with Constant-Size Public Parameters and Openings . In Clemente Galdi, Stanislaw Jarecki (Eds.), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 639-662). Amalfi, IT: Springer Science and Business Media Deutschland GmbH. DOI: 10.1007/978-3-031-14791-3_28 BibTeX: Download Dahlmann, J., Volz, A., Szabo, T., & Graichen, K. (2022). A Numerical Approach for Solving the Inversion Problem for n-Trailer Systems . In Proceedings of the American Control Conference (pp. 2018-2024). Atlanta, GA, USA: Institute of Electrical and Electronics Engineers Inc.. DOI: 10.23919/ACC53348.2022.9867593 BibTeX: Download Deuber, D., Ronge, V., & Rückert, C. (2022). SoK: Assumptions Underlying Cryptocurrency Deanonymizations . In Kerschbaum, Florian; Mazurek, Michelle (Eds.), Proceedings on Privacy Enhancing Technologies (pp. 670-691). Sydney, AU: Warschau (Polen): Sciendo. DOI: 10.56553/popets-2022-0091 BibTeX: Download Egger, C., Lai, R.W.F., Ronge, V., Woo, I.K.Y., & Yin, H.H. (2022). On Defeating Graph Analysis of Anonymous Transactions . In Kerschbaum, Florian; Mazurek, Michelle (Eds.), Proceedings on Privacy Enhancing Technologies (pp. 538–557). Sydney, AU: Warschau (Polen): Sciendo. DOI: 10.56553/popets-2022-0085 BibTeX: Download Magri, B., Malavolta, G., Schröder, D., & Unruh, D. (2022). Everlasting UC Commitments from Fully Malicious PUFs . Journal of Cryptology , 35 (3). https://doi.org/10.1007/s00145-022-09432-4 DOI: 10.1007/s00145-022-09432-4 BibTeX: Download Ruffing, T., Ronge, V., Jin, E., Schneider-Bensch, J., & Schröder, D. (2022). ROAST: Robust Asynchronous Schnorr Threshold Signatures . In Heng Yin, Angelos Stavrou (Eds.), CCS '22 (pp. 2551–2564). Los Angeles, US: New York, NY, United States: Association for Computing Machinery. DOI: 10.1145/3548606.3560583 BibTeX: Download Thyagarajan, S.A., Malavolta, G., Schmid, F., & Schröder, D. (2022). Verifiable Timed Linkable Ring Signatures for Scalable Payments for Monero . In COMPUTER SECURITY - ESORICS 2022, PT II (pp. 467-486). Copenhagen, DK: CHAM: SPRINGER INTERNATIONAL PUBLISHING AG. DOI: 10.1007/978-3-031-17146-8_23 BibTeX: Download Yin, H.H., Wong, H.W., Tahernia, M., & Lai, R.W.F. (2022). Multichannel Optimal Tree-Decodable Codes are Not Always Optimal Prefix Codes . In IEEE International Symposium on Information Theory - Proceedings (pp. 1-6). Espoo, FIN: Institute of Electrical and Electronics Engineers Inc.. DOI: 10.1109/ISIT50566.2022.9834710 BibTeX: Download 2021 Albrecht, M.R., & Lai, R.W.F. (2021). Subtractive Sets over Cyclotomic Rings: Limits of Schnorr-Like Arguments over Lattices . In Tal Malkin, Chris Peikert (Eds.), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 519-548). Virtual, Online: Springer Science and Business Media Deutschland GmbH. DOI: 10.1007/978-3-030-84245-1_18 BibTeX: Download Amr, A., Hinderer, M., Griebel, L., Deuber, D., Egger, C., Sedaghat-Hamedani, F.,... Meder, B. (2021). Controlling my genome with my smartphone: first clinical experiences of the PROMISE system . Clinical Research in Cardiology . https://doi.org/10.1007/s00392-021-01942-8 DOI: 10.1007/s00392-021-01942-8 BibTeX: Download Deuber, D., & Schröder, D. (2021). CoinJoin in the Wild - An Empirical Analysis in Dash . In Bertino E, Shulman H, Waidner M (Eds.), Computer Security - ESORICS 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part II (pp. 461--480). online: Springer. DOI: 10.1007/978-3-030-88428-4\_23 BibTeX: Download Graf, M., Rausch, D., Ronge, V., Egger, C., Küsters, R., & Schröder, D. (2021). A Security Framework for Distributed Ledgers . In Kim Y, Kim J, Vigna G, Shi E (Eds.), CCS '21 (pp. 1043--1064). Virtual Event, KR: New YorkNYUnited States: Association for Computing Machinery. DOI: 10.1145/3460120.3485362 BibTeX: Download Ishai, Y., Lai, R.W.F., & Malavolta, G. (2021). A Geometric Approach to Homomorphic Secret Sharing . In Juan A. Garay (Eds.), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 92-119). Online: Springer Science and Business Media Deutschland GmbH. DOI: 10.1007/978-3-030-75248-4_4 BibTeX: Download Ronge, V., Egger, C., Lai, R.W.F., Schröder, D., & Yin, H.H. (2021). Foundations of Ring Sampling . Proceedings on Privacy Enhancing Technologies , 2021 (3), 265--288. https://doi.org/10.2478/popets-2021-0047 DOI: 10.2478/popets-2021-0047 BibTeX: Download Rösler, P. (2021). Cryptographic Foundations of Modern Stateful and Continuous Key Exchange Primitives (Dissertation). BibTeX: Download Tao, C., Petzoldt, A., & Ding, J. (2021). Efficient Key Recovery for All HFE Signature Variants . In ADVANCES IN CRYPTOLOGY (CRYPTO 2021), PT I (pp. 70-93). , ELECTR NETWORK: CHAM: SPRINGER INTERNATIONAL PUBLISHING AG. DOI: 10.1007/978-3-030-84242-0_4 BibTeX: Download Thyagarajan, S.A.K., Bhat, A., Magri, B., Tschudi, D., & Kate, A. (2021). Reparo: Publicly Verifiable Layer to Repair Blockchains . In Nikita Borisov, Claudia Diaz (Eds.), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 37-56). Virtual, Online: Springer Science and Business Media Deutschland GmbH. DOI: 10.1007/978-3-662-64331-0_2 BibTeX: Download Thyagarajan, S.A.K., Castagnos, G., Laguillaumie, F., & Malavolta, G. (2021). Efficient CCA Timed Commitments in Class Groups . In Proceedings of the ACM Conference on Computer and Communications Security (pp. 2663-2684). Online, KR: Association for Computing Machinery. DOI: 10.1145/3460120.3484773 BibTeX: Download Thyagarajan, S.A.K., Gong, T., Bhat, A., Kate, A., & Schröder, D. (2021). OpenSquare: Decentralized Repeated Modular Squaring Service . In Proceedings of the ACM Conference on Computer and Communications Security (pp. 3447-3464). Virtual, Online, KOR: Association for Computing Machinery. DOI: 10.1145/3460120.3484809 BibTeX: Download Thyagarajan, S.A.K., & Malavolta, G. (2021). Lockable signatures for blockchains: Scriptless scripts for all signatures . In Proceedings - IEEE Symposium on Security and Privacy (pp. 937-954). Virtual, San Francisco, CA, USA: Institute of Electrical and Electronics Engineers Inc.. DOI: 10.1109/SP40001.2021.00065 BibTeX: Download Yin, H.H.E., Wang, X., Ng, K.H., Lai, R.W.F., Ng, L.K.L., & Ma, J.P.K. (2021). On Multi-Channel Huffman Codes for Asymmetric-Alphabet Channels . In 2021 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT) (pp. 2024-2029). , ELECTR NETWORK: NEW YORK: IEEE. DOI: 10.1109/ISIT45174.2021.9517894 BibTeX: Download Yin, H.H.F., Ng, K.H., Shing, Y.T., Lai, R.W.F., & Wang, X. (2021). Polynomial-Time Construction of Two-Channel Prefix-Free Codes with Given Codeword Lengths . In 2021 IEEE INFORMATION THEORY WORKSHOP (ITW) . NEW YORK: IEEE. DOI: 10.1109/ITW48936.2021.9611502 BibTeX: Download 2020 Brost, J., Egger, C., Lai, R.W.F., Schmid, F., Schröder, D., & Zoppelt, M. (2020). Threshold Password-Hardened Encryption Services . In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (pp. 409–424). Virtual Event, USA: New York, NY, USA: Association for Computing Machinery. DOI: 10.1145/3372297.3417266 BibTeX: Download Chow, S.S.M., Fech, K., Lai, R.W.F., & Malavolta, G. (2020). Multi-Client Oblivious RAM with Poly-Logarithmic Communication . In ASIACRYPT 2020 . DOI: 10.1007/978-3-030-64834-3_6 BibTeX: Download Deuber, D., Döttling, N., Magri, B., Malavolta, G., & Thyagarajan, S.A.K. (2020). Minting Mechanism for Proof of Stake Blockchains . In Applied Cryptography and Network Security - 18th International Conference, ACNS 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part I (pp. 315-334). DOI: 10.1007/978-3-030-57808-4_16 BibTeX: Download Deuber, D., & Khorrami Jahromi, H. (2020). Liechtensteiner Blockchain-Gesetzgebung: Vorbild für Deutschland? Lösungsansatz für eine zivilrechtliche Behandlung von Token . MultiMedia und Recht , 2020 (9), 576-580. BibTeX: Download Ding, J., Petzoldt, A., & Schmidt, D.S. (2020). Hidden field equations . In Jintai Ding, Albrecht Petzoldt, Dieter S. Schmidt (Eds.), Multivariate Public Key Cryptosystems. (pp. 61-88). New York: Springer. DOI: 10.1007/978-1-0716-0987-3_4 BibTeX: Download Ding, J., Petzoldt, A., & Schmidt, D.S. (2020). Multivariate cryptography . In Jintai Ding, Albrecht Petzoldt, Dieter S. Schmidt (Eds.), Multivariate Public Key Cryptosystems. (pp. 7-23). Springer. DOI: 10.1007/978-1-0716-0987-3_2 BibTeX: Download Ding, J., Petzoldt, A., & Schmidt, D.S. (2020). Oil and vinegar . In Jintai Ding, Albrecht Petzoldt, Dieter S. Schmidt (Eds.), Multivariate Public Key Cryptosystems. (pp. 89-151). New York: Springer. DOI: 10.1007/978-1-0716-0987-3_5 BibTeX: Download Ding, J., Petzoldt, A., & Schmidt, D.S. (2020). Solving polynomial systems . In Jintai Ding, Albrecht Petzoldt, Dieter S. Schmidt (Eds.), Multivariate Public Key Cryptosystems. (pp. 185-248). New York: Springer. DOI: 10.1007/978-1-0716-0987-3_8 BibTeX: Download Ding, J., Petzoldt, A., & Schmidt, D.S. (2020). The matsumoto-imai cryptosystem . In Advances in Information Security. (pp. 25-60). Springer. DOI: 10.1007/978-1-0716-0987-3_3 BibTeX: Download Ding, J., Petzoldt, A., & Schmidt, D.S. (2020). The simplematrix encryption scheme . In Advances in Information Security. (pp. 169-183). Springer. DOI: 10.1007/978-1-0716-0987-3_7 BibTeX: Download Griebel, L., Hinderer, M., Amr, A., Meder, B., Schweig, M., Deuber, D.,... Prokosch, H.-U. (2020). The Patient as Genomic Data Manager - Evaluation of the PROMISE App . In Louise B. Pape-Haugaard, Christian Lovis, Inge Cort Madsen, Patrick Weber, Per Hostrup Nielsen, Philip Scott (Eds.), Digital Personalized Health and Medicine. (pp. 1061-1065). Amsterdam, Berlin, Washington: IOS Press. DOI: 10.3233/SHTI200324 BibTeX: Download Hong, M.M.-H., Ishai, Y., Kolobov, V.I., & Lai, R.W.F. (2020). On Computational Shortcuts for Information-Theoretic PIR . In TCC 2020 . DOI: 10.1007/978-3-030-64375-1_18 BibTeX: Download Petzoldt, A. (2020). Efficient Key Generation for Rainbow . In Jintai Ding, Jean-Pierre Tillich (Eds.), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 92-107). Paris, FR: Springer. DOI: 10.1007/978-3-030-44223-1_6 BibTeX: Download Rösler, P. (2020). Combiners for AEAD . IACR Transactions on Symmetric Cryptology . BibTeX: Download Thyagarajan, S.A.K., Bhat, A., Malavolta, G., Döttling, N., Kate, A., & Schröder, D. (2020). Verifiable Timed Signatures Made Practical . In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (pp. 1733–1750). Virtual event: New York, NY, USA: Association for Computing Machinery. DOI: 10.1145/3372297.3417263 BibTeX: Download 2019 Auernhammer, K., Tavakoli Kolagari, R., & Zoppelt, M. (2019). Attacks on machine learning: Lurking danger for accountability . In Proceedings of the 2019 AAAI Workshop on Artificial Intelligence Safety, SafeAI 2019 . CEUR-WS. BibTeX: Download Benenson, Z., Berger, F., Cherepantsev, A., Datsevich, S., Do, L., Eckert, M.,... Zlatanovic, J. (2019). Analyse verbreiteter Anwendungen zum Lesen von elektronischen Büchern . BibTeX: Download Bultel, X., Lafourcade, P., Lai, R.W.F., Malavolta, G., Schröder, D., & Thyagarajan, S.A.K. (2019). Efficient Invisible and Unlinkable Sanitizable Signatures . In Dongdai Lin, Kazue Sako (Eds.), Public-Key Cryptography – PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. (pp. 159-189). Springer Verlag. DOI: 10.1007/978-3-030-17253-4_6 BibTeX: Download Choi, S.G., Katz, J., Schröder, D., Yerukhimovich, A., & Zhou, H.-S. (2019). (Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens . Journal of Cryptology , 32 (2), 459-497. https://doi.org/10.1007/s00145-018-9288-x DOI: 10.1007/s00145-018-9288-x BibTeX: Download Dachman-Soled, D., Fleischhacker, N., Katz, J., Lysyanskaya, A., & Schröder, D. (2019). Feasibility and Infeasibility of Secure Computation with Malicious PUFs . Journal of Cryptology . https://doi.org/10.1007/s00145-019-09329-9 DOI: 10.1007/s00145-019-09329-9 BibTeX: Download Deuber, D., Egger, C., Fech, K., Malavolta, G., Schröder, D., Thyagarajan, S.A.K.,... Durand, C. (2019). My Genome Belongs to Me: Controlling Third Party Computation on Genomic Data . Proceedings on Privacy Enhancing Technologies , 2019 (1), 108-132. https://doi.org/10.2478/popets-2019-0007 DOI: 10.2478/popets-2019-0007 BibTeX: Download Deuber, D., Magri, B., & Thyagarajan, S.A.K. (2019). Redactable Blockchain in the Permissionless Setting . In Proceedings of the 40th IEEE Symposium on Security and Privacy . SAN FRANCISCO, CA, US. DOI: 10.1109/sp.2019.00039 BibTeX: Download Dottling, N., Garg, S., Ishai, Y., Malavolta, G., Mour, T., & Ostrovsky, R. (2019). Trapdoor Hash Functions and Their Applications . In ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT III (pp. 3-32). Santa Barbara, CA: CHAM: SPRINGER INTERNATIONAL PUBLISHING AG. DOI: 10.1007/978-3-030-26954-8_1 BibTeX: Download Döttling, N., Lai, R.W.F., & Malavolta, G. (2019). Incremental proofs of sequential work . In Yuval Ishai, Vincent Rijmen (Eds.), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 292-323). Darmstadt, DE: Springer Verlag. DOI: 10.1007/978-3-030-17656-3_11 BibTeX: Download Egger, C., Moreno-Sanchez, P., & Maffei, M. (2019). Atomic Multi-Channel Updates with Constant Collateral in Bitcoin-Compatible Payment-Channel Networks . In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (pp. 801-815). London, GB: Association for Computing Machinery. DOI: 10.1145/3319535.3345666 BibTeX: Download Fleischhacker, N., Jager, T., & Schröder, D. (2019). On Tight Security Proofs for Schnorr Signatures . Journal of Cryptology , 32 (2), 566-599. https://doi.org/10.1007/s00145-019-09311-5 DOI: 10.1007/s00145-019-09311-5 BibTeX: Download Fleischhacker, N., Malavolta, G., & Schröder, D. (2019). Arithmetic Garbling from Bilinear Maps . In Kazue Sako, Steve Schneider, Peter Y.A. Ryan (Eds.), Computer Security – ESORICS 2019 (pp. 172-192). Luxembourg, LU: Springer. DOI: 10.1007/978-3-030-29962-0_9 BibTeX: Download Lai, R.W.F., Cheung, K.-F., Chow, S.S.M., & So, A.M.-C. (2019). Another Look at Anonymous Communication . IEEE Transactions on Dependable and Secure Computing , 16 (5), 731-742. https://doi.org/10.1109/TDSC.2018.2828002 DOI: 10.1109/TDSC.2018.2828002 BibTeX: Download Lai, R.W.F., & Malavolta, G. (2019). Subvector Commitments with Application to Succinct Arguments . In Daniele Micciancio, Alexandra Boldyreva (Eds.), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 530-560). Santa Barbara, CA, US: Springer Verlag. DOI: 10.1007/978-3-030-26948-7_19 BibTeX: Download Lai, R.W.F., Malavolta, G., & Ronge, V. (2019). Succinct arguments for bilinear group arithmetic: Practical structure-preserving cryptography . In Proceedings of the ACM Conference on Computer and Communications Security (pp. 2057-2074). London, GB: Association for Computing Machinery. DOI: 10.1145/3319535.3354262 BibTeX: Download Lai, R.W.F., Ronge, V., Ruffing, T., Schröder, D., Thyagarajan, S.A.K., & Wang, J. (2019). Omniring: Scaling Private Payments Without Trusted Setup . In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (pp. 31-48). London, GB. BibTeX: Download Lai, R.W.F., Schröder, D., Ronge, V., Thyagarajan, S.A.K., Ruffing, T., & Wang, J. (2019). Omniring: Scaling private payments without trusted setup: Formal foundations and a construction of ring confidential transactions with log-size proofs . In Proceedings of the ACM Conference on Computer and Communications Security (pp. 31-48). London, GB: Association for Computing Machinery. DOI: 10.1145/3319535.3345655 BibTeX: Download Maffei, M., Malavolta, G., Reinert, M., & Schröder, D. (2019). Group ORAM for privacy and access control in outsourced personal records . Journal of Computer Security , 27 (1), 1--47. https://doi.org/10.3233/JCS-171030 DOI: 10.3233/JCS-171030 BibTeX: Download Malavolta, G., Moreno-Sanchez, P., Schneidewind, C., Kate, A., & Maffei, M. (2019). Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability . In 26TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2019) . San Diego, CA: RESTON: INTERNET SOC. DOI: 10.14722/ndss.2019.23330 BibTeX: Download Malavolta, G., & Thyagarajan, S.A.K. (2019). Homomorphic Time-Lock Puzzles and Applications . In Daniele Micciancio, Alexandra Boldyreva (Eds.), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 620-649). Santa Barbara, CA, US: Springer Verlag. DOI: 10.1007/978-3-030-26948-7_22 BibTeX: Download Yin, H.H., Ng, K.H., Shing, Y.T., Lai, R.W.F., & Wang, X. (2019). Decision Procedure for the Existence of Two-Channel Prefix-Free Codes . In IEEE International Symposium on Information Theory - Proceedings (pp. 1522-1526). Paris, FRA: Institute of Electrical and Electronics Engineers Inc.. DOI: 10.1109/ISIT.2019.8849758 BibTeX: Download Zoppelt, M., & Tavakoli Kolagari, R. (2019). Reaching Grey Havens: Industrial Automotive Security Modeling with SAM . BibTeX: Download Zoppelt, M., & Tavakoli Kolagari, R. (2019). SAM: A Security Abstraction Model for Automotive Software Systems . Springer Verlag. DOI: 10.1007/978-3-030-16874-2_5 BibTeX: Download Zoppelt, M., & Tavakoli Kolagari, R. (2019). UnCle SAM : Modeling Cloud Attacks with the Automotive Security Abstraction Model . In CLOUD COMPUTING 2019, The Tenth International Conference on Cloud Computing, GRIDs, and Virtualization (pp. 67--72). Venice, Italy. BibTeX: Download Zoppelt, M., & Tavakoli Kolagari, R. (2019). What Today's Serious Cyber Attacks on Cars Tell Us: Consequences for Automotive Security and Dependability . In {Papadopoulos, Yiannis and Aslansefat, Koorosh and Katsaros, Panagiotis and Bozzano} M (Eds.), International Symposium on Model-Based Safety and Assessment (pp. 270--285). Springer International Publishing. DOI: 10.1007/978-3-030-32872-6_18 BibTeX: Download 2018 Deuber, D., Maffei, M., Malavolta, G., Rabkin, M., Schröder, D., & Simkin, M. (2018). Functional Credentials . Proceedings on Privacy Enhancing Technologies , 2 , 64-84. https://doi.org/10.1515/popets-2018-0013 DOI: 10.1515/popets-2018-0013 BibTeX: Download Fleischhacker, N., Krupp, J., Malavolta, G., Schneider, J., Schröder, D., & Simkin, M. (2018). Efficient unlinkable sanitizable signatures from signatures with re-randomizable keys . IET Information Security , 12 (3), 166-183. BibTeX: Download Lai, R.W.F., Egger, C., Reinert, M., Chow, S.S., Maffei, M., & Schröder, D. (2018). Simple Password-Hardened Encryption Services . In USENIX Association (Eds.), 27th USENIX Security Symposium (USENIX Security 18) . Baltimore, MD, US: 2560 Ninth Street, Suite 215
Berkeley, CA 94710
USA: USENIX Association. BibTeX: Download Meiser, S., & Schröder, D. (2018). Delegatable functional signatures . IET Information Security , 12 (3), 194-206. BibTeX: Download Ruffing, T., Thyagarajan, S.A.K., Ronge, V., & Schröder, D. (2018). Burning Zerocoins for Fun and for Profit - A Cryptographic Denial-of-Spending Attack on the Zerocoin Protocol . In Proceedings of the 2018 Crypto Valley Conference on Blockchain Technology (CVCBT) (pp. 116 - 119). Zug, CH. DOI: 10.1109/cvcbt.2018.00023 BibTeX: Download 2017 Ateniese, G., Magri, B., Venturi, D., & Andrade, E. (2017). Redactable Blockchain -- or -- Rewriting History in Bitcoin and Friends . In IEEE European Symposium on Security and Privacy 2017 (EuroS&P) . Paris, France. BibTeX: Download Döttling, N. (2017). Concurrently composable security with shielded super-polynomial simulators . Springer Verlag. DOI: 10.1007/978-3-319-56620-7_13 BibTeX: Download Döttling, N. (2017). Cryptanalysis of indistinguishability obfuscations of circuits over GGH13 . In Proceedings of the 44th International Colloquium on Automata, Languages, and Programming, ICALP 2017 . Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing. DOI: 10.4230/LIPIcs.ICALP.2017.38 BibTeX: Download Döttling, N. (2017). Identity-based encryption from the diffie-hellman assumption . Springer Verlag. DOI: 10.1007/978-3-319-63688-7_18 BibTeX: Download Döttling, N. (2017). Laconic Oblivious Transfer and Its Applications . Springer Verlag. DOI: 10.1007/978-3-319-63715-0_2 BibTeX: Download Katz, J., Maffei, M., Malavolta, G., & Schröder, D. (2017). Subset Predicate Encryption and its Applications . In Proceedings of the 16th International Conference on Cryptology and Network Security (CANS) . Hong Kong: Hong Kong. BibTeX: Download Lai, R.W.F., Egger, C., Schröder, D., & Chow, S.S. (2017). Phoenix: Rebirth of a Cryptographic Password-Hardening Service . In 26th USENIX Security Symposium (USENIX Security 17) (pp. 899--916). Vancouver, BC, CA: 2560 Ninth Street, Suite 215
Berkeley, CA 94710
USA: USENIX Association. BibTeX: Download Maffei, M., Malavolta, G., Reinert, M., & Schröder, D. (2017). Maliciously Secure Multi-Client ORAM . In International Conference on Applied Cryptography and Network Security (ACNS) . Kanazawa, JP. BibTeX: Download Malavolta, G., Moreno-Sanchez, P., Kate, A., & Maffei, M. (2017). Concurrency and Privacy with Payment-Channel Networks . In Proceedings of the 24th ACM Conference on Computer and Communications Security (CCS) . Dallas, USA: Dallas, USA. BibTeX: Download Malavolta, G., Moreno-Sanchez, P., Kate, A., & Maffei, M. (2017). SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks . In Proceedings of the 24th Annual Network & Distributed System Security Symposium (NDSS) . San Diego, USA. BibTeX: Download Malavolta, G., & Schröder, D. (2017). Efficient Ring Signatures in the Standard Model . In Proceedings of the 23rd Annual International Conference on the Theory and Applications of Cryptology and Information Security (ASIACRYPT) . Hong Kong. BibTeX: Download Ruffing, T., & Malavolta, G. (2017). Switch Commitments: A Safety Switch for Confidential Transactions . In Proceedings of the 4th Workshop on Bitcoin and Blockchain Research (BITCOIN) . Malta. BibTeX: Download Schröder, D., & Unruh, D. (2017). Security of Blind Signatures Revisited . Journal of Cryptology , 30 (2), 470-494. https://doi.org/10.1007/s00145-015-9225-1 DOI: 10.1007/s00145-015-9225-1 BibTeX: Download 2016 Backes, M., Meiser, S., & Schröder, D. (2016). Delegatable functional signatures . Springer Verlag. DOI: 10.1007/978-3-662-49384-7_14 BibTeX: Download Döttling, N. (2016). Low Noise LPN: Key dependent message secure public key encryption an sample amplification . IET Information Security , 10 (6), 372-385. https://dx.doi.org/10.1049/iet-ifs.2015.0495 DOI: 10.1049/iet-ifs.2015.0495 BibTeX: Download Döttling, N. (2016). Rate-1, linear time and additively homomorphic UC commitments . Springer Verlag. DOI: 10.1007/978-3-662-53015-3_7 BibTeX: Download Döttling, N., Fleischhacker, N., Krupp, J., & Schröder, D. (2016). Two-message, oblivious evaluation of cryptographic functionalities . Heidelberg: Springer Verlag. DOI: 10.1007/978-3-662-53015-3_22 BibTeX: Download Fleischhacker, N., Krupp, J., Malavolta, G., Schneider, J., Schröder, D., Simkin, M., & Malavolta, G. (2016). Efficient unlinkable sanitizable signatures from signatures with re-randomizable keys . Springer Verlag. DOI: 10.1007/978-3-662-49384-7_12 BibTeX: Download Hausmann, D., Schröder, L., & Egger, C. (2016). Global Caching for the Alternation-free Coalgebraic mu-calculus . In Proceedings of the 27th International Conference on Concurrency Theory, CONCUR 2016 (pp. 34:1-34:15). Québec City, Canada: Dagstuhl: Schloss Dagstuhl - Leibniz-Zentrum für Informatik. DOI: 10.4230/LIPIcs.CONCUR.2016.34 BibTeX: Download Krupp, J., Schröder, D., Simkin, M., Fiore, D., Ateniese, G., & Nürnberger, S. (2016). Nearly optimal verifiable data streaming . Springer Verlag. DOI: 10.1007/978-3-662-49384-7_16 BibTeX: Download Lai, R.W., Zhang, T., Chow, S.S., & Schröder, D. (2016). Efficient sanitizable signatures without random oracles . Springer Verlag. DOI: 10.1007/978-3-319-45744-4_18 BibTeX: Download Rösler, P. (2016). How to Break Microsoft Rights Management Services . In 10th USENIX Workshop on Offensive Technologies, WOOT 16 . Austin, TX, USA. BibTeX: Download Schneider, J., Fleischhacker, N., Schröder, D., & Backes, M. (2016). Efficient cryptographic password hardening services from partially oblivious commitments . In Proceedings of the 23rd ACM Conference on Computer and Communications Security, CCS 2016 (pp. 1192-1203). Association for Computing Machinery. DOI: 10.1145/2976749.2978375 BibTeX: Download 2015 Ateniese, G., Magri, B., & Venturi, D. (2015). Subversion-resilient signature schemes . In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS 2015 (pp. 364-375). Association for Computing Machinery. DOI: 10.1145/2810103.2813635 BibTeX: Download Backes, M., Gagné, M., & Thyagarajan, S.A.K. (2015). Fully secure inner-product proxy re-encryption with constant size ciphertext . In Proceedings of the 3rd ACM International Workshop on Security in Cloud Computing, SCC 2015 (pp. 31-40). Association for Computing Machinery, Inc. DOI: 10.1145/2732516.2732525 BibTeX: Download Döttling, N. (2015). From stateful hardware to resettable hardware using symmetric assumptions . Springer Verlag. DOI: 10.1007/978-3-319-26059-4_2 BibTeX: Download Döttling, N. (2015). General statistically secure computation with bounded-resettable hardware tokens . Springer Verlag. BibTeX: Download Döttling, N. (2015). Linear secret sharing schemes from error correcting codes and universal hash functions . Springer Verlag. DOI: 10.1007/978-3-662-46803-6_11 BibTeX: Download Döttling, N., & Schröder, D. (2015). Efficient pseudorandom functions via on-the-fly adaptation . Springer Verlag. DOI: 10.1007/978-3-662-47989-6_16 BibTeX: Download Hanser, C., Rabkin, M., & Schröder, D. (2015). Verifiably encrypted signatures: Security revisited and a new construction . Springer Verlag. DOI: 10.1007/978-3-319-24174-6_8 BibTeX: Download Maffei, M., Malavolta, G., Reinert, M., Schröder, D., & Malavolta, G. (2015). Privacy and access control for outsourced personal records . In Proceedings of the 36th IEEE Symposium on Security and Privacy, SP 2015 (pp. 341-358). Institute of Electrical and Electronics Engineers Inc.. DOI: 10.1109/SP.2015.28 BibTeX: Download Ruffing, T., Kate, A., & Schröder, D. (2015). Liar, Liar, coins on fire!: Penalizing equivocation by loss of bitcoins . In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS 2015 (pp. 219-230). Association for Computing Machinery. DOI: 10.1145/2810103.2813686 BibTeX: Download Schröder, D., & Schneider, J. (2015). Foundations of reconfigurable PUFs . Springer Verlag. DOI: 10.1007/978-3-319-28166-7_28 BibTeX: Download Schröder, D., & Simkin, M. (2015). VeriStream - A Framework for Verifiable Data Streaming . In Financial Cryptography and Data Security - 19th International Conference, {FC} 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers (pp. 548--566). DOI: 10.1007/978-3-662-47854-7_34 BibTeX: Download 2014 Ateniese, G., Faonio, A., Magri, B., & De Medeiros, B. (2014). Certified bitcoins . Springer Verlag. DOI: 10.1007/978-3-319-07536-5_6 BibTeX: Download Backes, M., Gerling, R., Gerling, S., Nürnberger, S., Schröder, D., & Simkin, M. (2014). WebTrust - A comprehensive authenticity and integrity framework for HTTP . Springer Verlag. DOI: 10.1007/978-3-319-07536-5_24 BibTeX: Download Choi, S.G., Katz, J., Schröder, D., Yerukhimovich, A., & Zhou, H.-S. (2014). (Efficient) universally composable oblivious transfer using a minimal number of stateless tokens . Springer Verlag. DOI: 10.1007/978-3-642-54242-8_27 BibTeX: Download Dachman-Soled, D., Fleischhacker, N., Katz, J., Lysyanskaya, A., & Schröder, D. (2014). Feasibility and infeasibility of secure computation with malicious PUFs . Springer Verlag. DOI: 10.1007/978-3-662-44381-1_23 BibTeX: Download Fleischhacker, N., Schröder, D., & Jager, T. (2014). On tight security proofs for schnorr signatures . Springer Verlag. BibTeX: Download Krupp, J., Schröder, D., & Simkin, M. (2014). Enhancing security and privacy with Google glass . In Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014 (pp. 1445-1447). Association for Computing Machinery. DOI: 10.1145/2660267.2662374 BibTeX: Download Maffei, M., Malavolta, G., Reinert, M., Schröder, D., & Malavolta, G. (2014). Brief announcement: Towards security and privacy for outsourced data in the multi-party setting . In Proceedings of the 2014 ACM Symposium on Principles of Distributed Computing, PODC 2014 (pp. 144-146). Paris: Association for Computing Machinery. DOI: 10.1145/2611462.2611508 BibTeX: Download Simkin, M., Schröder, D., Bulling, A., & Fritz, M. (2014). Ubic: Bridging the gap between digital cryptography and the physical world . Springer Verlag. DOI: 10.1007/978-3-319-11203-9_4 BibTeX: Download 2013 Döttling, N. (2013). Implementing resettable UC-functionalities with untrusted tamper-proof hardware-tokens . DOI: 10.1007/978-3-642-36594-2_36 BibTeX: Download Döttling, N. (2013). Lossy codes and a new variant of the learning-with-errors problem . DOI: 10.1007/978-3-642-38348-9_2 BibTeX: Download Egger, C., Schlumberger, J., Kruegel, C., & Vigna, G. (2013). Practical attacks against the I2P network . In Proceedings of the 16th International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2013 (pp. 432-451). Rodney Bay. DOI: 10.1007/978-3-642-41284-4_22 BibTeX: Download 2012 Döttling, N. (2012). A CCA2 secure variant of the mceliece cryptosystem . IEEE Transactions on Information Theory , 58 (10), 6672-6680. https://dx.doi.org/10.1109/TIT.2012.2203582 DOI: 10.1109/TIT.2012.2203582 BibTeX: Download Döttling, N. (2012). IND-CCA secure cryptography based on a variant of the LPN problem . DOI: 10.1007/978-3-642-34961-4_30 BibTeX: Download Döttling, N. (2012). Statistically secure linear-rate dimension extension for oblivious affine function evaluation . DOI: 10.1007/978-3-642-32284-6_7 BibTeX: Download Fiore, D., & Schröder, D. (2012). Uniqueness is a different story: Impossibility of verifiable random functions from trapdoor permutations . DOI: 10.1007/978-3-642-28914-9_36 BibTeX: Download Fischlin, M., Lehmann, A., & Schröder, D. (2012). History-free sequential aggregate signatures . DOI: 10.1007/978-3-642-32928-9_7 BibTeX: Download Schröder, D., & Fischlin, M. (2012). Security of blind signatures under aborts and applications to adaptive oblivious transfer . Journal of Mathematical Cryptology , 5 (2), 169-203. https://doi.org/10.1515/JMC.2011.011 DOI: 10.1515/JMC.2011.011 BibTeX: Download Schröder, D., & Schröder, H. (2012). Verifiable data streaming . In Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS 2012 (pp. 953-964). Raleigh, NC. DOI: 10.1145/2382196.2382297 BibTeX: Download Schröder, D., & Unruh, D. (2012). Security of blind signatures revisited . DOI: 10.1007/978-3-642-30057-8_39 BibTeX: Download Tartler, R., Lohmann, D., Dietrich, C., Egger, C., & Sincero, J. (2012). Configuration coverage in the analysis of large-scale system software . Operating Systems Review , 45 (3), 10-14. https://doi.org/10.1145/2094091.2094095 DOI: 10.1145/2094091.2094095 BibTeX: Download 2011 Baecher, P., Fischlin, M., & Schröder, D. (2011). Expedient Non-malleability notions for hash functions . DOI: 10.1007/978-3-642-19074-2_18 BibTeX: Download Döttling, N. (2011). Efficient reductions for non-signaling cryptographic primitives . DOI: 10.1007/978-3-642-20728-0_12 BibTeX: Download Döttling, N. (2011). Unconditional and composable security using a single stateful tamper-proof hardware token . DOI: 10.1007/978-3-642-19571-6_11 BibTeX: Download Döttling, N. (2011). Vulnerabilities of Wireless Key Exchange Based on Channel Reciprocity . Springer Verlag. DOI: 10.1007/978-3-642-17955-6_15 BibTeX: Download Garg, S., Sahai, A., Rao, V., Schröder, D., & Unruh, D. (2011). Round optimal blind signatures . DOI: 10.1007/978-3-642-22792-9_36 BibTeX: Download Katz, J., Schröder, D., & Yerukhimovich, A. (2011). Impossibility of blind signatures from one-way permutations . DOI: 10.1007/978-3-642-19571-6_37 BibTeX: Download Schröder, D. (2011). How to aggregate the CL signature scheme . DOI: 10.1007/978-3-642-23822-2_17 BibTeX: Download 2010 Baecher, P., Fischlin, M., Gordon, L., Langenberg, R., Lützow, M., & Schröder, D. (2010). CAPTCHAs: The good, the bad, and the ugly . In Proceedings of the Sicherheit 2010 - Sicherheit, Schutz und Zuverlassigkeit Beitrage der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft fur Informatik e.V. (GI) - 5th Annual Conference of the Department of Security of the Society for Informatics (pp. 353-365). Berlin. BibTeX: Download Brzuska, C., Fischlin, M., Lehmann, A., & Schröder, D. (2010). Unlinkability of sanitizable signatures . DOI: 10.1007/978-3-642-13013-7_26 BibTeX: Download Brzuska, C., Schröder, H., Dagdelen, Ö., Fischlin, M., Franz, M., Katzenbeisser, S.,... Schröder, D. (2010). Redactable signatures for tree-structured data: Definitions and constructions . DOI: 10.1007/978-3-642-13708-2_6 BibTeX: Download Dent, A., Fischlin, M., Manulis, M., Stam, M., & Schröder, D. (2010). Confidential signatures and deterministic signcryption . DOI: 10.1007/978-3-642-13013-7_27 BibTeX: Download Eikemeier, O., Fischlin, M., Götzmann, J.-F., Lehmann, A., Schröder, D., Schröder, P., & Wagner, D. (2010). History-free aggregate message authentication codes . DOI: 10.1007/978-3-642-15317-4_20 BibTeX: Download Fischlin, M., & Schröder, D. (2010). On the impossibility of three-move blind signature schemes . DOI: 10.1007/978-3-642-13190-5_10 BibTeX: Download Galindo, D., Libert, B., Fischlin, M., Fuchsbauer, G., Lehmann, A., Manulis, M., & Schröder, D. (2010). Public-key encryption with non-interactive opening: New constructions and stronger definitions . DOI: 10.1007/978-3-642-12678-9_20 BibTeX: Download Rückert, M., Schneider, M., & Schröder, D. (2010). Generic constructions for verifiably encrypted signatures without random oracles or NIZKs . DOI: 10.1007/978-3-642-13708-2_5 BibTeX: Download Rückert, M., & Schröder, D. (2010). Fair partially blind signatures . DOI: 10.1007/978-3-642-12678-9_3 BibTeX: Download 2009 Brzuska, C., Fischlin, M., Freudenreich, T., Lehmann, A., Page, M., Schelbert, J.,... Volk, F. (2009). Security of sanitizable signatures revisited . DOI: 10.1007/978-3-642-00468-1_18 BibTeX: Download Brzuska, C., Fischlin, M., Lehmann, A., & Schröder, D. (2009). Sanitizable signatures: How to partially delegate control for authenticated data . In BIOSIG 2009 (pp. 117-128). Darmstadt. BibTeX: Download Dent, A., Fischlin, M., Manulis, M., Stam, M., & Schröder, D. (2009). Confidential Signatures and Deterministic Signcryption . In Proceedings of the PKC Public-Key Cryptography (pp. 588). BibTeX: Download Fischlin, M., & Schröder, D. (2009). Security of blind signatures under aborts . DOI: 10.1007/978-3-642-00468-1_17 BibTeX: Download Rückert, M., & Schröder, D. (2009). Security of verifiably encrypted signatures and a construction without random oracles . DOI: 10.1007/978-3-642-03298-1_2 BibTeX: Download Rückert, M., & Schröder, D. (2009). Security of Verifiably Encrypted Signatures . In International Conference on Pairing-based Cryptography (pp. 27). Stanford University, US. BibTeX: Download Schröder, D., & Rückert, M. (2009). Aggregate and verifiably encrypted signatures from multilinear maps without random oracles . DOI: 10.1007/978-3-642-02617-1_76 BibTeX: Download