2020

  1. Privacy-Preserving Incentive Systems with Highly Efficient Point-Collection Bobolz, Jan, Eidens, Fabian, Krenn, Stephan, Slamanig, Daniel, and Striecks, Christoph IACR Cryptology ePrint Archive 2020

2019

  1. Practical Group-Signatures with Privacy-Friendly Openings Krenn, Stephan, Samelin, Kai, and Striecks, Christoph In Proceedings of the 14th International Conference on Availability, Reliability and Security, ARES 2019, Canterbury, UK, August 26-29, 2019 2019
  2. Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based Derler, David, Samelin, Kai, Slamanig, Daniel, and Striecks, Christoph In 26th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, California, USA, February 24-27, 2019 2019
  3. Practical Group-Signatures with Privacy-Friendly Openings Krenn, Stephan, Samelin, Kai, and Striecks, Christoph IACR Cryptology ePrint Archive 2019
  4. Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based Derler, David, Samelin, Kai, Slamanig, Daniel, and Striecks, Christoph IACR Cryptology ePrint Archive 2019
  5. I Want to Forget: Fine-Grained Encryption with Full Forward Secrecy in the Distributed Setting Derler, David, Ramacher, Sebastian, Slamanig, Daniel, and Striecks, Christoph IACR Cryptology ePrint Archive 2019

2018

  1. Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange Derler, David, Jager, Tibor, Slamanig, Daniel, and Striecks, Christoph In Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part III 2018
  2. Revisiting Proxy Re-encryption: Forward Secrecy, Improved Security, and Applications Derler, David, Krenn, Stephan, Lorünser, Thomas, Ramacher, Sebastian, Slamanig, Daniel, and Striecks, Christoph In Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part I 2018
  3. Engineering Cryptography for Security and Privacy in the Cloud Krenn, Stephan, Lorünser, Thomas, and Striecks, Christoph ERCIM News 2018
  4. Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange Derler, David, Gellert, Kai, Jager, Tibor, Slamanig, Daniel, and Striecks, Christoph IACR Cryptology ePrint Archive 2018
  5. Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications Derler, David, Krenn, Stephan, Lorünser, Thomas, Ramacher, Sebastian, Slamanig, Daniel, and Striecks, Christoph IACR Cryptology ePrint Archive 2018

2017

  1. Agile cryptographic solutions for the cloud Lorünser, Thomas, Krenn, Stephan, Striecks, Christoph, and Länger, Thomas Elektrotechnik und Informationstechnik 2017
  2. Towards Attribute-Based Credentials in the Cloud Krenn, Stephan, Lorünser, Thomas, Salzer, Anja, and Striecks, Christoph In Cryptology and Network Security - 16th International Conference, CANS 2017, Hong Kong, China, November 30 - December 2, 2017, Revised Selected Papers 2017
  3. Batch-verifiable Secret Sharing with Unconditional Privacy Krenn, Stephan, Lorünser, Thomas, and Striecks, Christoph In Proceedings of the 3rd International Conference on Information Systems Security and Privacy, ICISSP 2017, Porto, Portugal, February 19-21, 2017 2017
  4. Secure and Privacy-Friendly Storage and Data Processing in the Cloud Chiaro, Pasquale, Fischer-Hübner, Simone, Groß, Thomas, Krenn, Stephan, Lorünser, Thomas, Garcı́, Ana Isabel Martı́nez, Migliavacca, Andrea, Rannenberg, Kai, Slamanig, Daniel, Striecks, Christoph, and Zanini, Alberto In Privacy and Identity Management. The Smart Revolution - 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papers 2017

2016

  1. Opportunities and Challenges of CREDENTIAL - Towards a Metadata-Privacy Respecting Identity Provider Karegar, Farzaneh, Striecks, Christoph, Krenn, Stephan, Hörandner, Felix, Lorünser, Thomas, and Fischer-Hübner, Simone In Privacy and Identity Management. Facing up to Next Steps - 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Karlstad, Sweden, August 21-26, 2016, Revised Selected Papers 2016

2015

  1. On Cryptographic Building Blocks and Transformations Striecks, Christoph 2015
  2. Confined Guessing: New Signatures From Standard Assumptions Böhl, Florian, Hofheinz, Dennis, Jager, Tibor, Koch, Jessica, and Striecks, Christoph J. Cryptology 2015
  3. Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting Hofheinz, Dennis, Koch, Jessica, and Striecks, Christoph In Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings 2015
  4. Identity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext setting Hofheinz, Dennis, Koch, Jessica, and Striecks, Christoph IACR Cryptology ePrint Archive 2015

2014

  1. A Generic View on Trace-and-Revoke Broadcast Encryption Schemes Hofheinz, Dennis, and Striecks, Christoph In Topics in Cryptology - CT-RSA 2014 - The Cryptographer’s Track at the RSA Conference 2014, San Francisco, CA, USA, February 25-28, 2014. Proceedings 2014

2013

  1. Programmable Hash Functions in the Multilinear Setting Freire, Eduarda S. V., Hofheinz, Dennis, Paterson, Kenneth G., and Striecks, Christoph In Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part I 2013
  2. Practical Signatures from Standard Assumptions Böhl, Florian, Hofheinz, Dennis, Jager, Tibor, Koch, Jessica, Seo, Jae Hong, and Striecks, Christoph In Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings 2013
  3. Confined Guessing: New Signatures From Standard Assumptions Böhl, Florian, Hofheinz, Dennis, Jager, Tibor, Koch, Jessica, and Striecks, Christoph IACR Cryptology ePrint Archive 2013
  4. Programmable Hash Functions in the Multilinear Setting Freire, Eduarda S. V., Hofheinz, Dennis, Paterson, Kenneth G., and Striecks, Christoph IACR Cryptology ePrint Archive 2013
  5. A generic view on trace-and-revoke broadcast encryption schemes Hofheinz, Dennis, and Striecks, Christoph IACR Cryptology ePrint Archive 2013