Follow
Christian Janson
Christian Janson
Research Group Leader, Technische Universität Darmstadt (TU Darmstadt), Germany
Verified email at tu-darmstadt.de
Title
Cited by
Cited by
Year
PRF-ODH: Relations, Instantiations, and Impossibility Results
J Brendel, M Fischlin, F Günther, C Janson
Annual International Cryptology Conference, 651-681, 2017
642017
Towards post-quantum security for signal’s X3DH handshake
J Brendel, M Fischlin, F Günther, C Janson, D Stebila
Selected Areas in Cryptography: 27th International Conference, Halifax, NS …, 2021
362021
Sponges resist leakage: The case of authenticated encryption
JP Degabriele, C Janson, P Struck
International Conference on the Theory and Application of Cryptology and …, 2019
352019
Post-quantum asynchronous deniable key exchange and the signal handshake
J Brendel, R Fiedler, F Günther, C Janson, D Stebila
IACR International Conference on Public-Key Cryptography, 3-34, 2022
342022
Backdoored Hash Functions: Immunizing HMAC and HKDF
M Fischlin, C Janson, S Mazaheri
2018 IEEE 31st Computer Security Foundations Symposium (CSF), 105-118, 2018
302018
BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures
C Cremers, S Düzlü, R Fiedler, M Fischlin, C Janson
2021 IEEE Symposium on Security and Privacy (SP), 1696-1714, 2021
252021
Signatures from sequential-OR proofs
M Fischlin, P Harasser, C Janson
Annual International Conference on the Theory and Applications of …, 2020
232020
Security Reductions for White-Box Key-Storage in Mobile Payments
EA Bock, C Brzuska, M Fischlin, C Janson, W Michiels
22*2019
Access Control in Publicly Verifiable Outsourced Computation
J Alderman, C Janson, C Cid, J Crampton
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
182015
Revocation in Publicly Verifiable Outsourced Computation
J Alderman, C Janson, C Cid, J Crampton
International Conference on Information Security and Cryptology, 51-71, 2014
152014
Hybrid Publicly Verifiable Computation
J Alderman, C Janson, C Cid, J Crampton
Topics in Cryptology–CT-RSA 2016, 147-163, 2016
142016
Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3
M Fischlin, F Günther, C Janson
Cryptology ePrint Archive, Report 2020/718. https://eprint.iacr.org/2020/718, 2020
13*2020
Extended Functionality in Verifiable Searchable Encryption
J Alderman, C Janson, KM Martin, SL Renwick
International Conference on Cryptography and Information Security in the …, 2015
92015
BlindOR: an efficient lattice-based blind signature scheme from OR-proofs
N Alkeilani Alkadri, P Harasser, C Janson
International Conference on Cryptology and Network Security, 95-115, 2021
62021
Publicly verifiable outsourced computation with a key distribution centre
J Alderman, C Cid, J Crampton, C Janson
arXiv preprint arXiv:1406.5720, 2014
32014
Sponge-based authenticated encryption: Security against quantum attackers
C Janson, P Struck
International Conference on Post-Quantum Cryptography, 230-259, 2022
22022
Cloud Storage File Recoverability
CA Gorke, C Janson, F Armknecht, C Cid
Proceedings of the Fifth ACM International Workshop on Security in Cloud …, 2017
22017
Boolean functions
C Janson, M Hortmann, G Leander
Brëmen University thesis repository, Alemanya, 2012
22012
Client-oblivious OPRAM
GT Davies, C Janson, DP Martin
Information and Communications Security: 22nd International Conference …, 2020
12020
On the Verification of Computation and Data Retrievability
C Janson
Royal Holloway, University of London, 2016
2016
The system can't perform the operation now. Try again later.
Articles 1–20