publications

publications by categories in reversed chronological order; generated by jekyll-scholar.

2020

  1. CCA-Secure (Puncturable) KEMs with Non-Negligible Correctness Error
    Valerio Cini, Sebastian Ramacher, Daniel Slamanig, and Christoph Striecks
    ASIACRYPT 2020, to appear
  2. Privacy-Preserving Incentive Systems with Highly Efficient Point-Collection
    Jan Bobolz, Fabian Eidens, Stephan Krenn, Daniel Slamanig, and Christoph Striecks
    ASIA CCS ’20: The 15th ACM Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020
  3. Collecting and Classifying Security and Privacy Design Patterns for Connected Vehicles: SECREDAS Approach
    Nadja Marko, Alexandr Vasenev, and Christoph Striecks
    Computer Safety, Reliability, and Security. SAFECOMP 2020 Workshops – DECSoS 2020, DepDevOps 2020, USDAI 2020, and WAISE 2020, Lisbon, Portugal, September 15, 2020
  4. Generic Constructions of Incremental and Homomorphic Timed-Release Encryption
    Peter Chvojka, Tibor Jager, Daniel Slamanig, and Christoph Striecks
    IACR Cryptologic ePrint Archive 2020/739
  5. Logarithmic-Size (Linkable) Threshold Ring Signatures in the Plain Model
    Abida Haque, Stephan Krenn, Daniel Slamanig, and Christoph Striecks
    IACR Cryptol. ePrint Arch.
  6. Privacy-Preserving Incentive Systems with Highly Efficient Point-Collection
    Jan Bobolz, Fabian Eidens, Stephan Krenn, Daniel Slamanig, and Christoph Striecks
    IACR Cryptol. ePrint Arch.

2019

  1. Practical Group-Signatures with Privacy-Friendly Openings
    Stephan Krenn, Kai Samelin, and Christoph Striecks
    Proceedings of the 14th International Conference on Availability, Reliability and Security, ARES 2019, Canterbury, UK, August 26-29, 2019
  2. Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based
    David Derler, Kai Samelin, Daniel Slamanig, and Christoph Striecks
    26th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, California, USA, February 24-27, 2019
  3. Practical Group-Signatures with Privacy-Friendly Openings
    Stephan Krenn, Kai Samelin, and Christoph Striecks
    IACR Cryptology ePrint Archive
  4. Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based
    David Derler, Kai Samelin, Daniel Slamanig, and Christoph Striecks
    IACR Cryptology ePrint Archive
  5. I Want to Forget: Fine-Grained Encryption with Full Forward Secrecy in the Distributed Setting
    David Derler, Sebastian Ramacher, Daniel Slamanig, and Christoph Striecks
    IACR Cryptology ePrint Archive

2018

  1. Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange
    David Derler, Tibor Jager, Daniel Slamanig, and Christoph Striecks
    Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part III
  2. Revisiting Proxy Re-encryption: Forward Secrecy, Improved Security, and Applications
    David Derler, Stephan Krenn, Thomas Lorünser, Sebastian Ramacher, Daniel Slamanig, and Christoph Striecks
    Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part I
  3. Engineering Cryptography for Security and Privacy in the Cloud
    Stephan Krenn, Thomas Lorünser, and Christoph Striecks
    ERCIM News
  4. Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange
    David Derler, Kai Gellert, Tibor Jager, Daniel Slamanig, and Christoph Striecks
    IACR Cryptology ePrint Archive
  5. Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications
    David Derler, Stephan Krenn, Thomas Lorünser, Sebastian Ramacher, Daniel Slamanig, and Christoph Striecks
    IACR Cryptology ePrint Archive

2017

  1. Agile cryptographic solutions for the cloud
    Thomas Lorünser, Stephan Krenn, Christoph Striecks, and Thomas Länger
    Elektrotechnik und Informationstechnik
  2. Towards Attribute-Based Credentials in the Cloud
    Stephan Krenn, Thomas Lorünser, Anja Salzer, and Christoph Striecks
    Cryptology and Network Security - 16th International Conference, CANS 2017, Hong Kong, China, November 30 - December 2, 2017, Revised Selected Papers
  3. Batch-verifiable Secret Sharing with Unconditional Privacy
    Stephan Krenn, Thomas Lorünser, and Christoph Striecks
    Proceedings of the 3rd International Conference on Information Systems Security and Privacy, ICISSP 2017, Porto, Portugal, February 19-21, 2017
  4. Secure and Privacy-Friendly Storage and Data Processing in the Cloud
    Pasquale Chiaro, Simone Fischer-Hübner, Thomas Groß, Stephan Krenn, Thomas Lorünser, Ana Isabel Martı́nez Garcı́, Andrea Migliavacca, Kai Rannenberg, Daniel Slamanig, Christoph Striecks, and Alberto Zanini
    Privacy and Identity Management. The Smart Revolution - 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papers

2016

  1. Opportunities and Challenges of CREDENTIAL - Towards a Metadata-Privacy Respecting Identity Provider
    Farzaneh Karegar, Christoph Striecks, Stephan Krenn, Felix Hörandner, Thomas Lorünser, and Simone Fischer-Hübner
    Privacy and Identity Management. Facing up to Next Steps - 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Karlstad, Sweden, August 21-26, 2016, Revised Selected Papers

2015

  1. On Cryptographic Building Blocks and Transformations
    Christoph Striecks
  2. Confined Guessing: New Signatures From Standard Assumptions
    Florian Böhl, Dennis Hofheinz, Tibor Jager, Jessica Koch, and Christoph Striecks
    J. Cryptology
  3. Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting
    Dennis Hofheinz, Jessica Koch, and Christoph Striecks
    Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings
  4. Identity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext setting
    Dennis Hofheinz, Jessica Koch, and Christoph Striecks
    IACR Cryptology ePrint Archive

2014

  1. A Generic View on Trace-and-Revoke Broadcast Encryption Schemes
    Dennis Hofheinz, and Christoph Striecks
    Topics in Cryptology - CT-RSA 2014 - The Cryptographer’s Track at the RSA Conference 2014, San Francisco, CA, USA, February 25-28, 2014. Proceedings

2013

  1. Programmable Hash Functions in the Multilinear Setting
    Eduarda S. V. Freire, Dennis Hofheinz, Kenneth G. Paterson, and Christoph Striecks
    Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part I
  2. Practical Signatures from Standard Assumptions
    Florian Böhl, Dennis Hofheinz, Tibor Jager, Jessica Koch, Jae Hong Seo, and Christoph Striecks
    Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings
  3. Confined Guessing: New Signatures From Standard Assumptions
    Florian Böhl, Dennis Hofheinz, Tibor Jager, Jessica Koch, and Christoph Striecks
    IACR Cryptology ePrint Archive
  4. Programmable Hash Functions in the Multilinear Setting
    Eduarda S. V. Freire, Dennis Hofheinz, Kenneth G. Paterson, and Christoph Striecks
    IACR Cryptology ePrint Archive
  5. A generic view on trace-and-revoke broadcast encryption schemes
    Dennis Hofheinz, and Christoph Striecks
    IACR Cryptology ePrint Archive