default search action
Marc Fischlin
Person information
- affiliation: Darmstadt University of Technology, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Marc Fischlin, Felix Günther, Christian Janson:
Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3. J. Cryptol. 37(2): 9 (2024) - [j13]Sebastian Linsner, Kilian Demuth, Marc Fischlin, Christian Reuter:
Decision-based Data Distribution (D³): Enabling Users to Minimize Data Propagation in Privacy-sensitive Scenarios. Proc. Priv. Enhancing Technol. 2024(4): 185-208 (2024) - [c115]Shan Chen, Marc Fischlin:
Integrating Causality in Messaging Channels. EUROCRYPT (3) 2024: 251-282 - [i70]Shan Chen, Marc Fischlin:
Integrating Causality in Messaging Channels. IACR Cryptol. ePrint Arch. 2024: 362 (2024) - [i69]Samed Düzlü, Rune Fiedler, Marc Fischlin:
BUFFing FALCON without Increasing the Signature Size. IACR Cryptol. ePrint Arch. 2024: 710 (2024) - [i68]Marc Fischlin, Olga Sanina:
Fake It till You Make It: Enhancing Security of Bluetooth Secure Connections via Deferrable Authentication. IACR Cryptol. ePrint Arch. 2024: 874 (2024) - 2023
- [c114]Jean Paul Degabriele, Marc Fischlin, Jérôme Govinden:
The Indifferentiability of the Duplex and Its Practical Applications. ASIACRYPT (8) 2023: 237-269 - [c113]Marc Fischlin:
Stealth Key Exchange and Confined Access to the Record Protocol Data in TLS 1.3. CCS 2023: 2901-2914 - [c112]Marc Fischlin, Felix Günther:
Verifiable Verification in Cryptographic Protocols. CCS 2023: 3239-3253 - [c111]Marc Fischlin, Jonas von der Heyden, Marian Margraf, Frank Morgner, Andreas Wallner, Holger Bock:
Post-quantum Security for the Extended Access Control Protocol. SSR 2023: 22-52 - [c110]Marc Fischlin, Felix Rohrbach:
Searching for ELFs in the Cryptographic Forest. TCC (3) 2023: 207-236 - [i67]Georgios M. Nikolopoulos, Marc Fischlin:
Quantum key distribution with post-processing driven by physical unclonable functions. CoRR abs/2302.07623 (2023) - [i66]Marc Fischlin, Jonas von der Heyden, Marian Margraf, Frank Morgner, Andreas Wallner, Holger Bock:
Post-Quantum Security for the Extended Access Control Protocol. IACR Cryptol. ePrint Arch. 2023: 352 (2023) - [i65]Marc Fischlin:
Stealth Key Exchange and Confined Access to the Record Protocol Data in TLS 1.3. IACR Cryptol. ePrint Arch. 2023: 651 (2023) - [i64]Marc Fischlin, Felix Günther:
Verifiable Verification in Cryptographic Protocols. IACR Cryptol. ePrint Arch. 2023: 1214 (2023) - [i63]Jacqueline Brendel, Sebastian Clermont, Marc Fischlin:
Post-Quantum Asynchronous Remote Key Generation for FIDO2 Account Recovery. IACR Cryptol. ePrint Arch. 2023: 1275 (2023) - [i62]Marc Fischlin, Felix Rohrbach:
Searching for ELFs in the Cryptographic Forest. IACR Cryptol. ePrint Arch. 2023: 1403 (2023) - 2022
- [c109]Marc Fischlin, Felix Rohrbach, Tobias Schmalz:
A Random Oracle for All of Us. AFRICACRYPT 2022: 469-489 - [c108]Barbara Jiabao Benedikt, Marc Fischlin, Moritz Huppert:
Nostradamus Goes Quantum. ASIACRYPT (3) 2022: 583-613 - [i61]Marc Fischlin, Felix Rohrbach, Tobias Schmalz:
A Random Oracle for All of Us. IACR Cryptol. ePrint Arch. 2022: 906 (2022) - [i60]Barbara Jiabao Benedikt, Marc Fischlin, Moritz Huppert:
Nostradamus goes Quantum. IACR Cryptol. ePrint Arch. 2022: 1213 (2022) - 2021
- [b2]Arno Mittelbach, Marc Fischlin:
The Theory of Hash Functions and Random Oracles - An Approach to Modern Cryptography. Information Security and Cryptography, Springer 2021, ISBN 978-3-030-63286-1, pp. 1-778 - [j12]Benjamin Dowling, Marc Fischlin, Felix Günther, Douglas Stebila:
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol. J. Cryptol. 34(4): 37 (2021) - [c107]Marc Fischlin, Olga Sanina:
Cryptographic Analysis of the Bluetooth Secure Connection Protocol Suite. ASIACRYPT (2) 2021: 696-725 - [c106]Marc Fischlin, Sven-André Müller, Jean-Pierre Münch, Lars Porth:
Multipath TLS 1.3. ESORICS (2) 2021: 86-105 - [c105]Marc Fischlin, Felix Rohrbach:
Single-to-Multi-theorem Transformations for Non-interactive Statistical Zero-Knowledge. Public Key Cryptography (2) 2021: 205-234 - [c104]Cas Cremers, Samed Düzlü, Rune Fiedler, Marc Fischlin, Christian Janson:
BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures. SP 2021: 1696-1714 - [i59]Marc Fischlin, Arno Mittelbach:
An Overview of the Hybrid Argument. IACR Cryptol. ePrint Arch. 2021: 88 (2021) - [i58]Marc Fischlin, Olga Sanina:
Cryptographic Analysis of the Bluetooth Secure Connection Protocol Suite. IACR Cryptol. ePrint Arch. 2021: 1597 (2021) - 2020
- [j11]Georgios M. Nikolopoulos, Marc Fischlin:
Information-Theoretically Secure Data Origin Authentication with Quantum and Classical Resources. Cryptogr. 4(4): 31 (2020) - [c103]Estuardo Alpirez Bock, Chris Brzuska, Marc Fischlin, Christian Janson, Wil Michiels:
Security Reductions for White-Box Key-Storage in Mobile Payments. ASIACRYPT (1) 2020: 221-252 - [c102]Cyprien Delpech de Saint Guilhem, Marc Fischlin, Bogdan Warinschi:
Authentication in Key-Exchange: Definitions, Relations and Composition. CSF 2020: 288-303 - [c101]Marc Fischlin, Felix Günther:
Modeling Memory Faults in Signature and Authenticated Encryption Schemes. CT-RSA 2020: 56-84 - [c100]Marc Fischlin, Patrick Harasser, Christian Janson:
Signatures from Sequential-OR Proofs. EUROCRYPT (3) 2020: 212-244 - [c99]Marc Fischlin, Felix Günther, Philipp Muth:
Information-Theoretic Security of Cryptographic Channels. ICICS 2020: 295-311 - [c98]Jacqueline Brendel, Marc Fischlin, Felix Günther, Christian Janson, Douglas Stebila:
Towards Post-Quantum Security for Signal's X3DH Handshake. SAC 2020: 404-430 - [c97]Lukas Brandstetter, Marc Fischlin, Robin Leander Schröder, Michael Yonli:
On the Memory Fault Resilience of TLS 1.3. SSR 2020: 1-22 - [i57]Georgios M. Nikolopoulos, Marc Fischlin:
Information-theoretically secure data origin authentication with quantum and classical resources. CoRR abs/2011.06849 (2020) - [i56]Marc Fischlin, Patrick Harasser, Christian Janson:
Signatures from Sequential-OR Proofs. IACR Cryptol. ePrint Arch. 2020: 271 (2020) - [i55]Marc Fischlin, Felix Günther, Christian Janson:
Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3. IACR Cryptol. ePrint Arch. 2020: 718 (2020) - [i54]Benjamin Dowling, Marc Fischlin, Felix Günther, Douglas Stebila:
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol. IACR Cryptol. ePrint Arch. 2020: 1044 (2020) - [i53]Marc Fischlin, Felix Rohrbach:
Single-to-Multi-Theorem Transformations for Non-Interactive Statistical Zero-Knowledge. IACR Cryptol. ePrint Arch. 2020: 1204 (2020) - [i52]Cas Cremers, Samed Düzlü, Rune Fiedler, Marc Fischlin, Christian Janson:
BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures. IACR Cryptol. ePrint Arch. 2020: 1525 (2020) - [i51]Marc Fischlin, Felix Günther, Philipp Muth:
Information-Theoretic Security of Cryptographic Channels. IACR Cryptol. ePrint Arch. 2020: 1539 (2020)
2010 – 2019
- 2019
- [j10]Lukas Fladung, Georgios M. Nikolopoulos, Gernot Alber, Marc Fischlin:
Intercept-Resend Emulation Attacks against a Continuous-Variable Quantum Authentication Protocol with Physical Unclonable Keys. Cryptogr. 3(4): 25 (2019) - [c96]Jacqueline Brendel, Marc Fischlin, Felix Günther:
Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids. ESORICS (2) 2019: 521-541 - [c95]Marc Fischlin, Helene Haagh:
How to Sign with White-Boxed AES. LATINCRYPT 2019: 259-279 - [c94]Nina Bindel, Jacqueline Brendel, Marc Fischlin, Brian Goncalves, Douglas Stebila:
Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange. PQCrypto 2019: 206-226 - [i50]Lukas Fladung, Georgios M. Nikolopoulos, Gernot Alber, Marc Fischlin:
Intercept-Resend Emulation Attacks Against a Continuous-Variable Quantum Authentication Protocol with Physical Unclonable Keys. CoRR abs/1910.11579 (2019) - [i49]Estuardo Alpirez Bock, Chris Brzuska, Marc Fischlin, Christian Janson, Wil Michiels:
Security Reductions for White-Box Key-Storage in Mobile Payments. IACR Cryptol. ePrint Arch. 2019: 1014 (2019) - [i48]Marc Fischlin, Felix Günther:
Modeling Memory Faults in Signature and Encryption Schemes. IACR Cryptol. ePrint Arch. 2019: 1053 (2019) - [i47]Cyprien Delpech de Saint Guilhem, Marc Fischlin, Bogdan Warinschi:
Authentication in Key-Exchange: Definitions, Relations and Composition. IACR Cryptol. ePrint Arch. 2019: 1203 (2019) - [i46]Jacqueline Brendel, Marc Fischlin, Felix Günther, Christian Janson, Douglas Stebila:
Challenges in Proving Post-Quantum Key Exchanges Based on Key Encapsulation Mechanisms. IACR Cryptol. ePrint Arch. 2019: 1356 (2019) - 2018
- [c93]Marc Fischlin, Patrick Harasser:
Invisible Sanitizable Signatures and Public-Key Encryption are Equivalent. ACNS 2018: 202-220 - [c92]Jean Paul Degabriele, Marc Fischlin:
Simulatable Channels: Extended Security that is Universally Composable and Easier to Prove. ASIACRYPT (3) 2018: 519-550 - [c91]Marc Fischlin, Sogol Mazaheri:
Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks. CSF 2018: 76-90 - [c90]Marc Fischlin, Christian Janson, Sogol Mazaheri:
Backdoored Hash Functions: Immunizing HMAC and HKDF. CSF 2018: 105-118 - [i45]Marc Fischlin, Patrick Harasser:
Invisible Sanitizable Signatures and Public-Key Encryption are Equivalent. IACR Cryptol. ePrint Arch. 2018: 337 (2018) - [i44]Marc Fischlin, Christian Janson, Sogol Mazaheri:
Backdoored Hash Functions: Immunizing HMAC and HKDF. IACR Cryptol. ePrint Arch. 2018: 362 (2018) - [i43]Jean Paul Degabriele, Marc Fischlin:
Simulatable Channels: Extended Security that is Universally Composable and Easier to Prove. IACR Cryptol. ePrint Arch. 2018: 844 (2018) - [i42]Nina Bindel, Jacqueline Brendel, Marc Fischlin, Brian Goncalves, Douglas Stebila:
Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange. IACR Cryptol. ePrint Arch. 2018: 903 (2018) - 2017
- [c89]Andreas Erwig, Marc Fischlin, Martin Hald, Dominik Helm, Robert Kiel, Florian Kübler, Michael Kümmerlin, Jakob Laenge, Felix Rohrbach:
Redactable Graph Hashing, Revisited - (Extended Abstract). ACISP (2) 2017: 398-405 - [c88]Jacqueline Brendel, Marc Fischlin, Felix Günther, Christian Janson:
PRF-ODH: Relations, Instantiations, and Impossibility Results. CRYPTO (3) 2017: 651-681 - [c87]Jacqueline Brendel, Marc Fischlin:
Zero Round-Trip Time for the Extended Access Control Protocol. ESORICS (1) 2017: 297-314 - [c86]Marc Fischlin, Felix Günther:
Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates. EuroS&P 2017: 60-75 - [i41]Jacqueline Brendel, Marc Fischlin:
Zero Round-Trip Time for the Extended Access Control Protocol. IACR Cryptol. ePrint Arch. 2017: 60 (2017) - [i40]Marc Fischlin, Felix Günther:
Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates. IACR Cryptol. ePrint Arch. 2017: 82 (2017) - [i39]Jacqueline Brendel, Marc Fischlin, Felix Günther, Christian Janson:
PRF-ODH: Relations, Instantiations, and Impossibility Results. IACR Cryptol. ePrint Arch. 2017: 517 (2017) - [i38]Marc Fischlin, Sogol Mazaheri:
Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks. IACR Cryptol. ePrint Arch. 2017: 984 (2017) - [i37]Marc Fischlin, Felix Günther, Giorgia Azzurra Marson, Kenneth G. Paterson:
Data Is a Stream: Security of Stream-Based Channels. IACR Cryptol. ePrint Arch. 2017: 1191 (2017) - [i36]Jacqueline Brendel, Marc Fischlin, Felix Günther:
Breakdown Resilience of Key Exchange Protocols and the Cases of NewHope and TLS 1.3. IACR Cryptol. ePrint Arch. 2017: 1252 (2017) - 2016
- [j9]David Bernhard, Marc Fischlin, Bogdan Warinschi:
Adaptive proofs of knowledge in the random oracle model. IET Inf. Secur. 10(6): 319-331 (2016) - [j8]Jean Paul Degabriele, Victoria Fehr, Marc Fischlin, Tommaso Gagliardoni, Felix Günther, Giorgia Azzurra Marson, Arno Mittelbach, Kenneth G. Paterson:
Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol. Int. J. Inf. Sec. 15(6): 637-657 (2016) - [c85]Marc Fischlin, Amir Herzberg, Hod Bin Noon, Haya Schulmann:
Obfuscation Combiners. CRYPTO (2) 2016: 521-550 - [c84]David Bernhard, Marc Fischlin, Bogdan Warinschi:
On the Hardness of Proving CCA-Security of Signed ElGamal. Public Key Cryptography (1) 2016: 47-69 - [c83]Frank Morgner, Paul Bastian, Marc Fischlin:
Attribute-Based Access Control Architectures with the eIDAS Protocols. SSR 2016: 205-226 - [c82]Marc Fischlin, Felix Günther, Benedikt Schmidt, Bogdan Warinschi:
Key Confirmation in Key Exchange: A Formal Treatment and Implications for TLS 1.3. IEEE Symposium on Security and Privacy 2016: 452-469 - [c81]Frank Morgner, Paul Bastian, Marc Fischlin:
Securing Transactions with the eIDAS Protocols. WISTP 2016: 3-18 - [e7]Marc Fischlin, Jean-Sébastien Coron:
Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I. Lecture Notes in Computer Science 9665, Springer 2016, ISBN 978-3-662-49889-7 [contents] - [e6]Marc Fischlin, Jean-Sébastien Coron:
Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II. Lecture Notes in Computer Science 9666, Springer 2016, ISBN 978-3-662-49895-8 [contents] - [i35]Marc Fischlin, Alexander May, David Pointcheval, Tal Rabin:
Public-Key Cryptography (Dagstuhl Seminar 16371). Dagstuhl Reports 6(9): 46-58 (2016) - [i34]Benjamin Dowling, Marc Fischlin, Felix Günther, Douglas Stebila:
A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol. IACR Cryptol. ePrint Arch. 2016: 81 (2016) - [i33]Marc Fischlin, Amir Herzberg, Hod Bin Noon, Haya Schulmann:
Obfuscation Combiners. IACR Cryptol. ePrint Arch. 2016: 289 (2016) - [i32]Marc Fischlin, Anja Lehmann, Krzysztof Pietrzak:
Robust Multi-Property Combiners for Hash Functions. IACR Cryptol. ePrint Arch. 2016: 723 (2016) - 2015
- [c80]Rolf Egert, Marc Fischlin, David Gens, Sven Jacob, Matthias Senker, Jörn Tillmanns:
Privately Computing Set-Union and Set-Intersection Cardinality via Bloom Filters. ACISP 2015: 413-430 - [c79]Benjamin Dowling, Marc Fischlin, Felix Günther, Douglas Stebila:
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates. CCS 2015: 1197-1210 - [c78]Marc Fischlin, Felix Günther, Giorgia Azzurra Marson, Kenneth G. Paterson:
Data Is a Stream: Security of Stream-Based Channels. CRYPTO (2) 2015: 545-564 - [c77]David Bernhard, Marc Fischlin, Bogdan Warinschi:
Adaptive Proofs of Knowledge in the Random Oracle Model. Public Key Cryptography 2015: 629-649 - [c76]Marc Fischlin, Sogol Mazaheri:
Notions of Deniable Message Authentication. WPES@CCS 2015: 55-64 - [e5]Elisabeth Oswald, Marc Fischlin:
Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I. Lecture Notes in Computer Science 9056, Springer 2015, ISBN 978-3-662-46799-2 [contents] - [e4]Elisabeth Oswald, Marc Fischlin:
Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II. Lecture Notes in Computer Science 9057, Springer 2015, ISBN 978-3-662-46802-9 [contents] - [i31]David Bernhard, Marc Fischlin, Bogdan Warinschi:
Adaptive Proofs of Knowledge in the Random Oracle Model. IACR Cryptol. ePrint Arch. 2015: 648 (2015) - [i30]David Bernhard, Marc Fischlin, Bogdan Warinschi:
On the Hardness of Proving CCA-security of Signed ElGamal. IACR Cryptol. ePrint Arch. 2015: 649 (2015) - [i29]Victoria Fehr, Marc Fischlin:
Sanitizable Signcryption: Sanitization over Encrypted Data (Full Version). IACR Cryptol. ePrint Arch. 2015: 765 (2015) - [i28]Benjamin Dowling, Marc Fischlin, Felix Günther, Douglas Stebila:
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates. IACR Cryptol. ePrint Arch. 2015: 914 (2015) - 2014
- [j7]Marc Fischlin:
Abstreitbarkeit bei eID-Lösungen. Datenschutz und Datensicherheit 38(7): 462-466 (2014) - [j6]Marc Fischlin, Anja Lehmann, Krzysztof Pietrzak:
Robust Multi-Property Combiners for Hash Functions. J. Cryptol. 27(3): 397-428 (2014) - [c75]Marc Fischlin, Felix Günther:
Multi-Stage Key Exchange and the Case of Google's QUIC Protocol. CCS 2014: 1193-1204 - [c74]Özgür Dagdelen, Marc Fischlin:
Intercepting tokens in cryptographic protocols: The empire strikes back in the clone wars. ISIT 2014: 1529-1533 - [c73]Jean Paul Degabriele, Victoria Fehr, Marc Fischlin, Tommaso Gagliardoni, Felix Günther, Giorgia Azzurra Marson, Arno Mittelbach, Kenneth G. Paterson:
Unpicking PLAID - A Cryptographic Analysis of an ISO-Standards-Track Authentication Protocol. SSR 2014: 1-25 - [i27]Jean Paul Degabriele, Victoria Fehr, Marc Fischlin, Tommaso Gagliardoni, Felix Günther, Giorgia Azzurra Marson, Arno Mittelbach, Kenneth G. Paterson:
Unpicking PLAID - A Cryptographic Analysis of an ISO-standards-track Authentication Protocol. IACR Cryptol. ePrint Arch. 2014: 728 (2014) - [i26]Michael Backes, Özgür Dagdelen, Marc Fischlin, Sebastian Gajek, Sebastian Meiser, Dominique Schröder:
Operational Signature Schemes. IACR Cryptol. ePrint Arch. 2014: 820 (2014) - 2013
- [j5]Christina Brzuska, Marc Fischlin, Nigel P. Smart, Bogdan Warinschi, Stephen C. Williams:
Less is more: relaxed yet composable security notions for key exchange. Int. J. Inf. Sec. 12(4): 267-297 (2013) - [c72]Björn Deiseroth, Victoria Fehr, Marc Fischlin, Manuel Maasz, Nils Fabian Reimers, Richard Stein:
Computing on Authenticated Data for Adjustable Predicates. ACNS 2013: 53-68 - [c71]Marc Fischlin, Cristina Onete:
Terrorism in Distance Bounding: Modeling Terrorist-Fraud Resistance. ACNS 2013: 414-431 - [c70]Özgür Dagdelen, Marc Fischlin, Tommaso Gagliardoni:
The Fiat-Shamir Transformation in a Quantum World. ASIACRYPT (2) 2013: 62-81 - [c69]Paul Baecher, Christina Brzuska, Marc Fischlin:
Notions of Black-Box Reductions, Revisited. ASIACRYPT (1) 2013: 296-315 - [c68]Özgür Dagdelen, Marc Fischlin, Tommaso Gagliardoni, Giorgia Azzurra Marson, Arno Mittelbach, Cristina Onete:
A Cryptographic Analysis of OPACITY - (Extended Abstract). ESORICS 2013: 345-362 - [c67]Paul Baecher, Pooya Farshim, Marc Fischlin, Martijn Stam:
Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions. EUROCRYPT 2013: 426-443 - [c66]Marc Fischlin, Nils Fleischhacker:
Limitations of the Meta-reduction Technique: The Case of Schnorr Signatures. EUROCRYPT 2013: 444-460 - [c65]Jens Bender, Marc Fischlin, Dennis Kügler:
The PACE|CA Protocol for Machine Readable Travel Documents. INTRUST 2013: 17-35 - [c64]Marc Fischlin, Cristina Onete:
Subtle kinks in distance-bounding: an analysis of prominent protocols. WISEC 2013: 195-206 - [e3]Marc Fischlin, Stefan Katzenbeisser:
Number Theory and Cryptography - Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday. Lecture Notes in Computer Science 8260, Springer 2013, ISBN 978-3-642-42000-9 [contents] - [i25]Özgür Dagdelen, Marc Fischlin, Tommaso Gagliardoni:
The Fiat-Shamir Transformation in a Quantum World. CoRR abs/1306.0315 (2013) - [i24]Paul Baecher, Christina Brzuska, Marc Fischlin:
Notions of Black-Box Reductions, Revisited. IACR Cryptol. ePrint Arch. 2013: 101 (2013) - [i23]Marc Fischlin, Nils Fleischhacker:
Limitations of the Meta-Reduction Technique: The Case of Schnorr Signatures. IACR Cryptol. ePrint Arch. 2013: 140 (2013) - [i22]Björn Deiseroth, Victoria Fehr, Marc Fischlin, Manuel Maasz, Nils Fabian Reimers, Richard Stein:
Computing on Authenticated Data for Adjustable Predicates. IACR Cryptol. ePrint Arch. 2013: 217 (2013) - [i21]Jens Bender, Özgür Dagdelen, Marc Fischlin, Dennis Kügler:
The PACE|AA Protocol for Machine Readable Travel Documents, and its Security. IACR Cryptol. ePrint Arch. 2013: 223 (2013) - [i20]Özgür Dagdelen, Marc Fischlin, Tommaso Gagliardoni, Giorgia Azzurra Marson, Arno Mittelbach, Cristina Onete:
A Cryptographic Analysis of OPACITY. IACR Cryptol. ePrint Arch. 2013: 234 (2013) - [i19]Özgür Dagdelen, Marc Fischlin, Tommaso Gagliardoni:
The Fiat-Shamir Transformation in a Quantum World. IACR Cryptol. ePrint Arch. 2013: 245 (2013) - [i18]Paul Baecher, Pooya Farshim, Marc Fischlin, Martijn Stam:
Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions. IACR Cryptol. ePrint Arch. 2013: 350 (2013) - 2012
- [j4]Marc Fischlin, Dominique Schröder:
Security of blind signatures under aborts and applications to adaptive oblivious transfer. J. Math. Cryptol. 5(2): 169-204 (2012) - [c63]Marc Fischlin:
Black-Box Reductions and Separations in Cryptography. AFRICACRYPT 2012: 413-422 - [c62]Jens Bender, Özgür Dagdelen, Marc Fischlin, Dennis Kügler:
The PACE|AA Protocol for Machine Readable Travel Documents, and Its Security. Financial Cryptography 2012: 344-358 - [c61]Jens Bender, Özgür Dagdelen, Marc Fischlin, Dennis Kügler:
Domain-Specific Pseudonymous Signatures for the German Identity Card. ISC 2012: 104-119 - [c60]Marc Fischlin, Anja Lehmann, Dominique Schröder:
History-Free Sequential Aggregate Signatures. SCN 2012: 113-130 - [c59]Christina Brzuska, Özgür Dagdelen, Marc Fischlin:
TLS, PACE, and EAC: ACryptographic View at Modern Key Exchange Protocols. Sicherheit 2012: 71-82 - [c58]Lassaad Cheikhrouhou, Werner Stephan, Özgür Dagdelen, Marc Fischlin, Markus Ullmann:
Merging the Cryptographic Security Analysis and the Algebraic-Logic Security Proof of PACE. Sicherheit 2012: 83-94 - [e2]Marc Fischlin, Johannes Buchmann, Mark Manulis:
Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings. Lecture Notes in Computer Science 7293, Springer 2012, ISBN 978-3-642-30056-1 [contents] - [i17]Marc Fischlin, Cristina Onete:
Provably Secure Distance-Bounding: an Analysis of Prominent Protocols. IACR Cryptol. ePrint Arch. 2012: 128 (2012) - [i16]Christina Brzuska, Marc Fischlin, Nigel P. Smart, Bogdan Warinschi, Stephen C. Williams:
Less is More: Relaxed yet Composable Security Notions for Key Exchange. IACR Cryptol. ePrint Arch. 2012: 242 (2012) - [i15]Özgür Dagdelen, Marc Fischlin:
Unconditionally-Secure Universally Composable Password-Based Key-Exchange based on One-Time Memory Tokens. IACR Cryptol. ePrint Arch. 2012: 537 (2012) - [i14]Jens Bender, Özgür Dagdelen, Marc Fischlin, Dennis Kügler:
Domain-Specifi c Pseudonymous Signatures for the German Identity Card. IACR Cryptol. ePrint Arch. 2012: 558 (2012) - 2011
- [j3]Marc Fischlin, Roger Fischlin:
Efficient Non-Malleable Commitment Schemes. J. Cryptol. 24(1): 203-244 (2011) - [c57]Marc Fischlin, Cristina Onete:
Relaxed Security Notions for Signatures of Knowledge. ACNS 2011: 309-326 - [c56]Dan Boneh, Özgür Dagdelen, Marc Fischlin, Anja Lehmann, Christian Schaffner, Mark Zhandry:
Random Oracles in a Quantum World. ASIACRYPT 2011: 41-69 - [c55]Marc Fischlin, Benoît Libert, Mark Manulis:
Non-interactive and Re-usable Universally Composable String Commitments with Adaptive Security. ASIACRYPT 2011: 468-485 - [c54]Christina Brzuska, Marc Fischlin, Bogdan Warinschi, Stephen C. Williams:
Composability of bellare-rogaway key exchange protocols. CCS 2011: 51-62 - [c53]Paul Baecher, Marc Fischlin:
Random Oracle Reducibility. CRYPTO 2011: 21-38 - [c52]Christina Brzuska, Marc Fischlin, Heike Schröder, Stefan Katzenbeisser:
Physically Uncloneable Functions in the Universal Composition Framework. CRYPTO 2011: 51-70 - [c51]Marc Fischlin, Benny Pinkas, Ahmad-Reza Sadeghi, Thomas Schneider, Ivan Visconti:
Secure Set Intersection with Untrusted Hardware Tokens. CT-RSA 2011: 1-16 - [c50]Paul Baecher, Marc Fischlin, Dominique Schröder:
Expedient Non-malleability Notions for Hash Functions. CT-RSA 2011: 268-283 - [c49]Ulrich Dürholz, Marc Fischlin, Michael Kasper, Cristina Onete:
A Formal Approach to Distance-Bounding RFID Protocols. ISC 2011: 47-62 - [c48]Paul Baecher, Niklas Büscher, Marc Fischlin, Benjamin Milde:
Breaking reCAPTCHA: A Holistic Approach via Shape Recognition. SEC 2011: 56-67 - [c47]Sebastian Ries, Marc Fischlin, Leonardo A. Martucci, Max Mühlhäuser:
Learning Whom to Trust in a Privacy-Friendly Way. TrustCom 2011: 214-225 - [i13]Marc Fischlin, Anna Lysyanskaya, Ueli Maurer, Alexander May:
Public-Key Cryptography (Dagstuhl Seminar 11391). Dagstuhl Reports 1(9): 76-94 (2011) - [i12]Marc Fischlin, Anja Lehmann, Dominique Schröder:
History-Free Sequential Aggregate Signatures. IACR Cryptol. ePrint Arch. 2011: 231 (2011) - [i11]Ulrich Dürholz, Marc Fischlin, Michael Kasper, Cristina Onete:
A Formal Approach to Distance-Bounding RFID Protocols. IACR Cryptol. ePrint Arch. 2011: 321 (2011) - [i10]Christina Brzuska, Marc Fischlin, Heike Schröder, Stefan Katzenbeisser:
Physically Uncloneable Functions in the Universal Composition Framework. IACR Cryptol. ePrint Arch. 2011: 681 (2011) - 2010
- [c46]Christina Brzuska, Heike Busch, Özgür Dagdelen, Marc Fischlin, Martin Franz, Stefan Katzenbeisser, Mark Manulis, Cristina Onete, Andreas Peter, Bertram Poettering, Dominique Schröder:
Redactable Signatures for Tree-Structured Data: Definitions and Constructions. ACNS 2010: 87-104 - [c45]David Galindo, Benoît Libert, Marc Fischlin, Georg Fuchsbauer, Anja Lehmann, Mark Manulis, Dominique Schröder:
Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions. AFRICACRYPT 2010: 333-350 - [c44]Marc Fischlin, Anja Lehmann, Thomas Ristenpart, Thomas Shrimpton, Martijn Stam, Stefano Tessaro:
Random Oracles with(out) Programmability. ASIACRYPT 2010: 303-320 - [c43]Marc Fischlin, Anja Lehmann, Daniel Wagner:
Hash Function Combiners in TLS and SSL. CT-RSA 2010: 268-283 - [c42]Marc Fischlin, Dominique Schröder:
On the Impossibility of Three-Move Blind Signature Schemes. EUROCRYPT 2010: 197-215 - [c41]Özgür Dagdelen, Marc Fischlin:
Security Analysis of the Extended Access Control Protocol for Machine Readable Travel Documents. ISC 2010: 54-68 - [c40]Christina Brzuska, Marc Fischlin, Anja Lehmann, Dominique Schröder:
Unlinkability of Sanitizable Signatures. Public Key Cryptography 2010: 444-461 - [c39]Alexander W. Dent, Marc Fischlin, Mark Manulis, Martijn Stam, Dominique Schröder:
Confidential Signatures and Deterministic Signcryption. Public Key Cryptography 2010: 462-479 - [c38]Oliver Eikemeier, Marc Fischlin, Jens-Fabian Götzmann, Anja Lehmann, Dominique Schröder, Peter Schröder, Daniel Wagner:
History-Free Aggregate Message Authentication Codes. SCN 2010: 309-328 - [c37]Paul Baecher, Marc Fischlin, Lior Gordon, Robert Langenberg, Michael Lützow, Dominique Schröder:
CAPTCHAs: The Good, the Bad, and the Ugly. Sicherheit 2010: 353-365 - [c36]Marc Fischlin, Anja Lehmann:
Delayed-Key Message Authentication for Streams. TCC 2010: 290-307 - [i9]Özgür Dagdelen, Marc Fischlin, Anja Lehmann, Christian Schaffner:
Random Oracles in a Quantum World. CoRR abs/1008.0931 (2010) - [i8]Dan Boneh, Özgür Dagdelen, Marc Fischlin, Anja Lehmann, Christian Schaffner, Mark Zhandry:
Random Oracles in a Quantum World. IACR Cryptol. ePrint Arch. 2010: 428 (2010)
2000 – 2009
- 2009
- [j2]Marc Fischlin, Roger Fischlin:
Efficient Non-malleable Commitment Schemes. J. Cryptol. 22(4): 530-571 (2009) - [c35]Alexandra Boldyreva, David Cash, Marc Fischlin, Bogdan Warinschi:
Foundations of Non-malleable Hash and One-Way Functions. ASIACRYPT 2009: 524-541 - [c34]Christina Brzuska, Marc Fischlin, Anja Lehmann, Dominique Schröder:
Santizable Signatures: How to Partially Delegate Control for Authenticated Data. BIOSIG 2009: 117-128 - [c33]Jens Bender, Marc Fischlin, Dennis Kügler:
Security Analysis of the PACE Key-Agreement Protocol. ISC 2009: 33-48 - [c32]Marc Fischlin, Dominique Schröder:
Security of Blind Signatures under Aborts. Public Key Cryptography 2009: 297-316 - [c31]Christina Brzuska, Marc Fischlin, Tobias Freudenreich, Anja Lehmann, Marcus Page, Jakob Schelbert, Dominique Schröder, Florian Volk:
Security of Sanitizable Signatures Revisited. Public Key Cryptography 2009: 317-336 - [e1]Marc Fischlin:
Topics in Cryptology - CT-RSA 2009, The Cryptographers' Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings. Lecture Notes in Computer Science 5473, Springer 2009, ISBN 978-3-642-00861-0 [contents] - [i7]Alexandra Boldyreva, David Cash, Marc Fischlin, Bogdan Warinschi:
Foundations of Non-Malleable Hash and One-Way Functions. IACR Cryptol. ePrint Arch. 2009: 65 (2009) - [i6]Alexander W. Dent, Marc Fischlin, Mark Manulis, Martijn Stam, Dominique Schröder:
Confidential Signatures and Deterministic Signcryption. IACR Cryptol. ePrint Arch. 2009: 588 (2009) - [i5]Jens Bender, Marc Fischlin, Dennis Kügler:
Security Analysis of the PACE Key-Agreement Protocol. IACR Cryptol. ePrint Arch. 2009: 624 (2009) - 2008
- [c30]Mihir Bellare, Marc Fischlin, Adam O'Neill, Thomas Ristenpart:
Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles. CRYPTO 2008: 360-378 - [c29]Marc Fischlin:
Security of NMACand HMACBased on Non-malleability. CT-RSA 2008: 138-154 - [c28]Marc Fischlin, Anja Lehmann, Krzysztof Pietrzak:
Robust Multi-property Combiners for Hash Functions Revisited. ICALP (2) 2008: 655-666 - [c27]Marc Fischlin, Anja Lehmann:
Multi-property Preserving Combiners for Hash Functions. TCC 2008: 375-392 - [i4]Mihir Bellare, Marc Fischlin, Adam O'Neill, Thomas Ristenpart:
Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles. IACR Cryptol. ePrint Arch. 2008: 267 (2008) - 2007
- [c26]Marc Fischlin, Anja Lehmann:
Security-Amplifying Combiners for Collision-Resistant Hash Functions. CRYPTO 2007: 224-243 - [c25]Daniel Dönigus, Stefan Endler, Marc Fischlin, Andreas Hülsing, Patrick Jäger, Anja Lehmann, Sergey Podrazhansky, Sebastian Schipp, Erik Tews, Sven Vowe, Matthias Walthart, Frederik Weidemann:
Security of Invertible Media Authentication Schemes Revisited. Information Hiding 2007: 189-203 - [c24]Marc Fischlin:
Anonymous Signatures Made Easy. Public Key Cryptography 2007: 31-42 - [c23]Alexandra Boldyreva, Marc Fischlin, Adriana Palacio, Bogdan Warinschi:
A Closer Look at PKI: Security and Efficiency. Public Key Cryptography 2007: 458-475 - 2006
- [c22]Alexandra Boldyreva, Marc Fischlin:
On the Security of OAEP. ASIACRYPT 2006: 210-225 - [c21]Marc Fischlin:
Round-Optimal Composable Blind Signatures in the Common Reference String Model. CRYPTO 2006: 60-77 - [c20]Marc Fischlin:
Universally Composable Oblivious Transfer in the Multi-party Setting. CT-RSA 2006: 332-349 - 2005
- [c19]Marc Fischlin:
Communication-Efficient Non-interactive Proofs of Knowledge with Online Extractors. CRYPTO 2005: 152-168 - [c18]Alexandra Boldyreva, Marc Fischlin:
Analysis of Random Oracle Instantiation Scenarios for OAEP and Other Practical Schemes. CRYPTO 2005: 412-429 - [c17]Marc Fischlin:
Completely Non-malleable Schemes. ICALP 2005: 779-790 - 2004
- [c16]Marc Fischlin:
Fast Verification of Hash Chains. CT-RSA 2004: 339-352 - [c15]Matthias Enzmann, Marc Fischlin, Markus Schneider:
A Privacy-Friendly Loyalty System Based on Discrete Logarithms over Elliptic Curves. Financial Cryptography 2004: 24-38 - 2003
- [c14]Marc Fischlin:
Progressive Verification: The Case of Message Authentication: (Extended Abstract). INDOCRYPT 2003: 416-429 - [c13]Marc Fischlin:
The Cramer-Shoup Strong-RSASignature Scheme Revisited. Public Key Cryptography 2003: 116-129 - 2002
- [c12]Marc Fischlin:
On the Impossibility of Constructing Non-interactive Statistically-Secret Protocols from Any Trapdoor One-Way Function. CT-RSA 2002: 79-95 - [c11]Marc Fischlin, Roger Fischlin:
The Representation Problem Based on Factoring. CT-RSA 2002: 96-113 - [i3]Marc Fischlin:
The Cramer-Shoup Strong-RSA Signature Scheme Revisited. IACR Cryptol. ePrint Arch. 2002: 17 (2002) - 2001
- [b1]Marc Fischlin:
Trapdoor commitment schemes and their applications. Goethe University Frankfurt, Frankfurt am Main, Germany, 2001, pp. 1-148 - [j1]Marc Fischlin:
Cryptographic limitations on parallelizing membership and equivalence queries with applications to random-self-reductions. Theor. Comput. Sci. 268(2): 199-219 (2001) - [c10]Ran Canetti, Marc Fischlin:
Universally Composable Commitments. CRYPTO 2001: 19-40 - [c9]Marc Fischlin:
A Cost-Effective Pay-Per-Multiplication Comparison Method for Millionaires. CT-RSA 2001: 457-472 - [c8]Mihir Bellare, Marc Fischlin, Shafi Goldwasser, Silvio Micali:
Identification Protocols Secure against Reset Attacks. EUROCRYPT 2001: 495-511 - [i2]Ran Canetti, Marc Fischlin:
Universally Composable Commitments. IACR Cryptol. ePrint Arch. 2001: 55 (2001) - 2000
- [c7]Marc Fischlin:
A Note on Security Proofs in the Generic Model. ASIACRYPT 2000: 458-469 - [c6]Marc Fischlin, Roger Fischlin:
Efficient Non-malleable Commitment Schemes. CRYPTO 2000: 413-431 - [i1]Mihir Bellare, Marc Fischlin, Shafi Goldwasser, Silvio Micali:
Identification Protocols Secure Against Reset Attacks. IACR Cryptol. ePrint Arch. 2000: 15 (2000)
1990 – 1999
- 1999
- [c5]Marc Fischlin:
Pseudorandom Function Tribe Ensembles Based on One-Way Permutations: Improvements and Applications. EUROCRYPT 1999: 432-445 - 1998
- [c4]Marc Fischlin:
Cryptographic Limitations on Parallelizing Membership and Equivalence Queries with Applications to Random Self-Reductions. ALT 1998: 72-86 - 1997
- [c3]Marc Fischlin:
Practical Memory Checkers for Stacks, Queues and Deques. ACISP 1997: 114-125 - [c2]Marc Fischlin:
Incremental Cryptography and Memory Checkers. EUROCRYPT 1997: 293-408 - [c1]Marc Fischlin:
Lower Bounds for the Signature Size of Incremental Schemes. FOCS 1997: 438-447
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint