Takip et
Arno Mittelbach
Arno Mittelbach
Bilinmeyen bağlantı
arno-mittelbach.de üzerinde doğrulanmış e-posta adresine sahip
Başlık
Alıntı yapanlar
Alıntı yapanlar
Yıl
Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources
C Brzuska, P Farshim, A Mittelbach
CRYPTO 2014, 188-205, 2014
662014
The theory of hash functions and random oracles
A Mittelbach, M Fischlin
An Approach to Modern Cryptography, Cham: Springer Nature, 2021
432021
Using Indistinguishability Obfuscation via UCEs
C Brzuska, A Mittelbach
412014
Indistinguishability obfuscation versus multi-bit point obfuscation with auxiliary input
C Brzuska, A Mittelbach
Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014
392014
Random-oracle uninstantiability from indistinguishability obfuscation
C Brzuska, P Farshim, A Mittelbach
Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015 …, 2015
332015
Salvaging Indifferentiability in a Multi-stage Setting
A Mittelbach
EUROCRYPT 2014, 603-621, 2014
292014
A cryptographic analysis of OPACITY
Ö Dagdelen, M Fischlin, T Gagliardoni, GA Marson, A Mittelbach, C Onete
Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013
212013
Automatic detection of local reuse
A Mittelbach, L Lehmann, C Rensing, R Steinmetz
Sustaining TEL: From Innovation to Learning and Practice: 5th European …, 2010
162010
Fiat–Shamir for highly sound protocols is instantiable
A Mittelbach, D Venturi
Security and Cryptography for Networks: 10th International Conference, SCN …, 2016
132016
Universal computational extractors and the superfluous padding assumption for indistinguishability obfuscation
C Brzuska, A Mittelbach
Cryptology ePrint Archive, 2015
132015
Unpicking PLAID: A Cryptographic Analysis of an ISO-Standards-Track Authentication Protocol
JP Degabriele, V Fehr, M Fischlin, T Gagliardoni, F Günther, GA Marson, ...
Security Standardisation Research: First International Conference, SSR 2014 …, 2014
132014
An overview of the hybrid argument
M Fischlin, A Mittelbach
Cryptology ePrint Archive, 2021
122021
Reset Indifferentiability and its Consequences
P Baecher, C Brzuska, A MIttelbach
Advances in Cryptology-ASIACRYPT 2013, 154-173, 2013
102013
Modeling random oracles under unpredictable queries
P Farshim, A Mittelbach
International Conference on Fast Software Encryption, 453-473, 2016
82016
Cryptophia’s short combiner for collision-resistant hash functions
A Mittelbach
Applied Cryptography and Network Security: 11th International Conference …, 2013
82013
Hash combiners for second pre-image resistance, target collision resistance and pre-image resistance have long output
A Mittelbach
Security and Cryptography for Networks: 8th International Conference, SCN …, 2012
82012
Fiat–Shamir for highly sound protocols is instantiable
A Mittelbach, D Venturi
Theoretical Computer Science 740, 28-62, 2018
72018
The Holinshed Project: Comparing and linking two editions of Holinshed's Chronicle
J Cummings, A Mittelbach
International Journal of Humanities and Arts Computing 4 (1-2), 39-53, 2010
72010
Roma: generating validators for the TEI
A Mittelbach, S Rahtz, I Bernevig
72007
Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol
JP Degabriele, V Fehr, M Fischlin, T Gagliardoni, F Günther, GA Marson, ...
International Journal of Information Security 15, 637-657, 2016
52016
Sistem, işlemi şu anda gerçekleştiremiyor. Daha sonra yeniden deneyin.
Makaleler 1–20