Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Sebastian Faust
@article{DBLP:journals/iacr/BrianDF24, author = {Gianluca Brian and Stefan Dziembowski and Sebastian Faust}, title = {From Random Probing to Noisy Leakages Without Field-Size Dependence}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {339}, year = {2024}, url = {https://eprint.iacr.org/2024/339}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BrianDF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaustMMOS24, author = {Sebastian Faust and Lo{\"{\i}}c Masure and Elena Micheli and Maximilian Orlt and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Connecting Leakage-Resilient Secret Sharing to Practice: Scaling Trends and Physical Dependencies of Prime Field Masking}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {377}, year = {2024}, url = {https://eprint.iacr.org/2024/377}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FaustMMOS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BertiFO23, author = {Francesco Berti and Sebastian Faust and Maximilian Orlt}, title = {Provable Secure Parallel Gadgets}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {4}, pages = {420--459}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i4.420-459}, doi = {10.46586/TCHES.V2023.I4.420-459}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/BertiFO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toplas/RichterKWSFM23, author = {David Richter and David Kretzler and Pascal Weisenburger and Guido Salvaneschi and Sebastian Faust and Mira Mezini}, title = {Prisma : {A} Tierless Language for Enforcing Contract-client Protocols in Decentralized Applications}, journal = {{ACM} Trans. Program. Lang. Syst.}, volume = {45}, number = {3}, pages = {17:1--17:41}, year = {2023}, url = {https://doi.org/10.1145/3604629}, doi = {10.1145/3604629}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/toplas/RichterKWSFM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/KamphuisMLF23, author = {Fredrik Kamphuis and Bernardo Magri and Ricky Lamberty and Sebastian Faust}, editor = {Mehdi Tibouchi and Xiaofeng Wang}, title = {Revisiting Transaction Ledger Robustness in the Miner Extractable Value Era}, booktitle = {Applied Cryptography and Network Security - 21st International Conference, {ACNS} 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13906}, pages = {675--698}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-33491-7\_25}, doi = {10.1007/978-3-031-33491-7\_25}, timestamp = {Wed, 31 May 2023 14:56:55 +0200}, biburl = {https://dblp.org/rec/conf/acns/KamphuisMLF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BerndtEFGOS23, author = {Sebastian Berndt and Thomas Eisenbarth and Sebastian Faust and Marc Gourjon and Maximilian Orlt and Okan Seker}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Combined Fault and Leakage Resilience: Composability, Constructions and Compiler}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14083}, pages = {377--409}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38548-3\_13}, doi = {10.1007/978-3-031-38548-3\_13}, timestamp = {Mon, 14 Aug 2023 16:16:26 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BerndtEFGOS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DziembowskiFL23, author = {Stefan Dziembowski and Sebastian Faust and Tomasz Lizurej}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Individual Cryptography}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14082}, pages = {547--579}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38545-2\_18}, doi = {10.1007/978-3-031-38545-2\_18}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DziembowskiFL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/FaustHKS23, author = {Sebastian Faust and Carmit Hazay and David Kretzler and Benjamin Schlosser}, title = {Statement-Oblivious Threshold Witness Encryption}, booktitle = {36th {IEEE} Computer Security Foundations Symposium, {CSF} 2023, Dubrovnik, Croatia, July 10-14, 2023}, pages = {17--32}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CSF57540.2023.00026}, doi = {10.1109/CSF57540.2023.00026}, timestamp = {Tue, 05 Sep 2023 20:33:27 +0200}, biburl = {https://dblp.org/rec/conf/csfw/FaustHKS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/FaustHKS23, author = {Sebastian Faust and Carmit Hazay and David Kretzler and Benjamin Schlosser}, editor = {Mike Rosulek}, title = {Putting the Online Phase on a Diet: Covert Security from Short MACs}, booktitle = {Topics in Cryptology - {CT-RSA} 2023 - Cryptographers' Track at the {RSA} Conference 2023, San Francisco, CA, USA, April 24-27, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13871}, pages = {360--386}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30872-7\_14}, doi = {10.1007/978-3-031-30872-7\_14}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/FaustHKS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/ErwigFRS23, author = {Andreas Erwig and Sebastian Faust and Siavash Riahi and Tobias St{\"{o}}ckert}, title = {CommiTEE : An Efficient and Secure Commit-Chain Protocol using TEEs}, booktitle = {8th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2023, Delft, Netherlands, July 3-7, 2023}, pages = {429--448}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/EuroSP57164.2023.00033}, doi = {10.1109/EUROSP57164.2023.00033}, timestamp = {Fri, 11 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/ErwigFRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/FrassettoJKKSFS23, author = {Tommaso Frassetto and Patrick Jauernig and David Koisser and David Kretzler and Benjamin Schlosser and Sebastian Faust and Ahmad{-}Reza Sadeghi}, title = {{POSE:} Practical Off-chain Smart Contract Execution}, booktitle = {30th Annual Network and Distributed System Security Symposium, {NDSS} 2023, San Diego, California, USA, February 27 - March 3, 2023}, publisher = {The Internet Society}, year = {2023}, url = {https://www.ndss-symposium.org/ndss-paper/pose-practical-off-chain-smart-contract-execution/}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/FrassettoJKKSFS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaustHKS23, author = {Sebastian Faust and Carmit Hazay and David Kretzler and Benjamin Schlosser}, title = {Putting the Online Phase on a Diet: Covert Security from Short MACs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {52}, year = {2023}, url = {https://eprint.iacr.org/2023/052}, timestamp = {Mon, 30 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FaustHKS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DziembowskiFL23, author = {Stefan Dziembowski and Sebastian Faust and Tomasz Lizurej}, title = {Individual Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {88}, year = {2023}, url = {https://eprint.iacr.org/2023/088}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DziembowskiFL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DasEFLR23, author = {Poulami Das and Andreas Erwig and Sebastian Faust and Julian Loss and Siavash Riahi}, title = {BIP32-Compatible Threshold Wallets}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {312}, year = {2023}, url = {https://eprint.iacr.org/2023/312}, timestamp = {Fri, 31 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DasEFLR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaustHKS23a, author = {Sebastian Faust and Carmit Hazay and David Kretzler and Benjamin Schlosser}, title = {Statement-Oblivious Threshold Witness Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {668}, year = {2023}, url = {https://eprint.iacr.org/2023/668}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FaustHKS23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaustHKS23b, author = {Sebastian Faust and Carmit Hazay and David Kretzler and Benjamin Schlosser}, title = {Threshold {BBS+} From Pseudorandom Correlations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1076}, year = {2023}, url = {https://eprint.iacr.org/2023/1076}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FaustHKS23b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/00010FGOS23, author = {Sebastian Berndt and Thomas Eisenbarth and Sebastian Faust and Marc Gourjon and Maximilian Orlt and Okan Seker}, title = {Combined Fault and Leakage Resilience: Composability, Constructions and Compiler}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1143}, year = {2023}, url = {https://eprint.iacr.org/2023/1143}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/00010FGOS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BertiFO23, author = {Francesco Berti and Sebastian Faust and Maximilian Orlt}, title = {Long Paper: Provable Secure Parallel Gadgets}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1182}, year = {2023}, url = {https://eprint.iacr.org/2023/1182}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BertiFO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/darts/RichterKWSFM22, author = {David Richter and David Kretzler and Pascal Weisenburger and Guido Salvaneschi and Sebastian Faust and Mira Mezini}, title = {Prisma: {A} Tierless Language for Enforcing Contract-Client Protocols in Decentralized Applications (Artifact)}, journal = {Dagstuhl Artifacts Ser.}, volume = {8}, number = {2}, pages = {16:1--16:3}, year = {2022}, url = {https://doi.org/10.4230/DARTS.8.2.16}, doi = {10.4230/DARTS.8.2.16}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/darts/RichterKWSFM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BrianFMV22, author = {Gianluca Brian and Sebastian Faust and Elena Micheli and Daniele Venturi}, editor = {Shweta Agrawal and Dongdai Lin}, title = {Continuously Non-malleable Codes Against Bounded-Depth Tampering}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {13794}, pages = {384--413}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22972-5\_14}, doi = {10.1007/978-3-031-22972-5\_14}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/BrianFMV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecoop/RichterKWSFM22, author = {David Richter and David Kretzler and Pascal Weisenburger and Guido Salvaneschi and Sebastian Faust and Mira Mezini}, editor = {Karim Ali and Jan Vitek}, title = {Prisma: {A} Tierless Language for Enforcing Contract-Client Protocols in Decentralized Applications (Extended Abstract)}, booktitle = {36th European Conference on Object-Oriented Programming, {ECOOP} 2022, June 6-10, 2022, Berlin, Germany}, series = {LIPIcs}, volume = {222}, pages = {35:1--35:4}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2022}, url = {https://doi.org/10.4230/LIPIcs.ECOOP.2022.35}, doi = {10.4230/LIPICS.ECOOP.2022.35}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecoop/RichterKWSFM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FaustHKS22, author = {Sebastian Faust and Carmit Hazay and David Kretzler and Benjamin Schlosser}, editor = {Goichiro Hanaoka and Junji Shikata and Yohei Watanabe}, title = {Financially Backed Covert Security}, booktitle = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13178}, pages = {99--129}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-97131-1\_4}, doi = {10.1007/978-3-030-97131-1\_4}, timestamp = {Thu, 10 Mar 2022 11:26:10 +0100}, biburl = {https://dblp.org/rec/conf/pkc/FaustHKS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/FaustKOS22, author = {Sebastian Faust and Juliane Kr{\"{a}}mer and Maximilian Orlt and Patrick Struck}, editor = {Clemente Galdi and Stanislaw Jarecki}, title = {On the Related-Key Attack Security of Authenticated Encryption Schemes}, booktitle = {Security and Cryptography for Networks - 13th International Conference, {SCN} 2022, Amalfi, Italy, September 12-14, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13409}, pages = {362--386}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-14791-3\_16}, doi = {10.1007/978-3-031-14791-3\_16}, timestamp = {Wed, 07 Sep 2022 17:42:21 +0200}, biburl = {https://dblp.org/rec/conf/scn/FaustKOS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2205-07780, author = {David Richter and David Kretzler and Pascal Weisenburger and Guido Salvaneschi and Sebastian Faust and Mira Mezini}, title = {Prisma: {A} Tierless Language for Enforcing Contract-Client Protocols in Decentralized Applications (Extended Version)}, journal = {CoRR}, volume = {abs/2205.07780}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2205.07780}, doi = {10.48550/ARXIV.2205.07780}, eprinttype = {arXiv}, eprint = {2205.07780}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2205-07780.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-07110, author = {Tommaso Frassetto and Patrick Jauernig and David Koisser and David Kretzler and Benjamin Schlosser and Sebastian Faust and Ahmad{-}Reza Sadeghi}, title = {{POSE:} Practical Off-chain Smart Contract Execution}, journal = {CoRR}, volume = {abs/2210.07110}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.07110}, doi = {10.48550/ARXIV.2210.07110}, eprinttype = {arXiv}, eprint = {2210.07110}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-07110.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaustKOS22, author = {Sebastian Faust and Juliane Kr{\"{a}}mer and Maximilian Orlt and Patrick Struck}, title = {On the Related-Key Attack Security of Authenticated Encryption Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {140}, year = {2022}, url = {https://eprint.iacr.org/2022/140}, timestamp = {Fri, 18 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FaustKOS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0003EFLM22, author = {Poulami Das and Lisa Eckey and Sebastian Faust and Julian Loss and Monosij Maitra}, title = {Round Efficient Byzantine Agreement from VDFs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {823}, year = {2022}, url = {https://eprint.iacr.org/2022/823}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0003EFLM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrianFM022, author = {Gianluca Brian and Sebastian Faust and Elena Micheli and Daniele Venturi}, title = {Continuously Non-Malleable Codes against Bounded-Depth Tampering}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1231}, year = {2022}, url = {https://eprint.iacr.org/2022/1231}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrianFM022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BronchainFLLPS21, author = {Olivier Bronchain and Sebastian Faust and Virginie Lallemand and Gregor Leander and L{\'{e}}o Perrin and Fran{\c{c}}ois{-}Xavier Standaert}, title = {{MOE:} Multiplication Operated Encryption with Trojan Resilience}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2021}, number = {1}, pages = {78--129}, year = {2021}, url = {https://doi.org/10.46586/tosc.v2021.i1.78-129}, doi = {10.46586/TOSC.V2021.I1.78-129}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/BronchainFLLPS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AumayrEEFHMMR21, author = {Lukas Aumayr and Oguzhan Ersoy and Andreas Erwig and Sebastian Faust and Kristina Host{\'{a}}kov{\'{a}} and Matteo Maffei and Pedro Moreno{-}Sanchez and Siavash Riahi}, editor = {Mehdi Tibouchi and Huaxiong Wang}, title = {Generalized Channels from Limited Blockchain Scripts and Adaptor Signatures}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13091}, pages = {635--664}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92075-3\_22}, doi = {10.1007/978-3-030-92075-3\_22}, timestamp = {Fri, 03 Dec 2021 17:36:49 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/AumayrEEFHMMR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/brains/AmlerEFKSS21, author = {Hendrik Amler and Lisa Eckey and Sebastian Faust and Marcel Kaiser and Philipp G. Sandner and Benjamin Schlosser}, title = {DeFi-ning DeFi: Challenges {\&} Pathway}, booktitle = {3rd Conference on Blockchain Research {\&} Applications for Innovative Networks and Services, {BRAINS} 2021, Paris, France, September 27-30, 2021}, pages = {181--184}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/BRAINS52497.2021.9569795}, doi = {10.1109/BRAINS52497.2021.9569795}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/brains/AmlerEFKSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/0003EFL021, author = {Poulami Das and Andreas Erwig and Sebastian Faust and Julian Loss and Siavash Riahi}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {The Exact Security of {BIP32} Wallets}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {1020--1042}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3484807}, doi = {10.1145/3460120.3484807}, timestamp = {Tue, 16 Nov 2021 12:59:46 +0100}, biburl = {https://dblp.org/rec/conf/ccs/0003EFL021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CassiersFOS21, author = {Ga{\"{e}}tan Cassiers and Sebastian Faust and Maximilian Orlt and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Tal Malkin and Chris Peikert}, title = {Towards Tight Random Probing Security}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12827}, pages = {185--214}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84252-9\_7}, doi = {10.1007/978-3-030-84252-9\_7}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/CassiersFOS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FaustHKS21, author = {Sebastian Faust and Carmit Hazay and David Kretzler and Benjamin Schlosser}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Generic Compiler for Publicly Verifiable Covert Multi-Party Computation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12697}, pages = {782--811}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77886-6\_27}, doi = {10.1007/978-3-030-77886-6\_27}, timestamp = {Mon, 28 Aug 2023 21:17:52 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/FaustHKS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/DziembowskiFF021, author = {Stefan Dziembowski and Grzegorz Fabianski and Sebastian Faust and Siavash Riahi}, editor = {James R. Lee}, title = {Lower Bounds for Off-Chain Protocols: Exploring the Limits of Plasma}, booktitle = {12th Innovations in Theoretical Computer Science Conference, {ITCS} 2021, January 6-8, 2021, Virtual Conference}, series = {LIPIcs}, volume = {185}, pages = {72:1--72:20}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2021}, url = {https://doi.org/10.4230/LIPIcs.ITCS.2021.72}, doi = {10.4230/LIPICS.ITCS.2021.72}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/innovations/DziembowskiFF021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ErwigFHM021, author = {Andreas Erwig and Sebastian Faust and Kristina Host{\'{a}}kov{\'{a}} and Monosij Maitra and Siavash Riahi}, editor = {Juan A. Garay}, title = {Two-Party Adaptor Signatures from Identification Schemes}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12710}, pages = {451--480}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75245-3\_17}, doi = {10.1007/978-3-030-75245-3\_17}, timestamp = {Fri, 07 May 2021 15:40:46 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ErwigFHM021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/AumayrMEEFRHM21, author = {Lukas Aumayr and Matteo Maffei and Oguzhan Ersoy and Andreas Erwig and Sebastian Faust and Siavash Riahi and Kristina Host{\'{a}}kov{\'{a}} and Pedro Moreno{-}Sanchez}, title = {Bitcoin-Compatible Virtual Channels}, booktitle = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco, CA, USA, 24-27 May 2021}, pages = {901--918}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SP40001.2021.00097}, doi = {10.1109/SP40001.2021.00097}, timestamp = {Thu, 21 Sep 2023 15:57:26 +0200}, biburl = {https://dblp.org/rec/conf/sp/AumayrMEEFRHM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2101-05589, author = {Hendrik Amler and Lisa Eckey and Sebastian Faust and Marcel Kaiser and Philipp G. Sandner and Benjamin Schlosser}, title = {DeFi-ning DeFi: Challenges {\&} Pathway}, journal = {CoRR}, volume = {abs/2101.05589}, year = {2021}, url = {https://arxiv.org/abs/2101.05589}, eprinttype = {arXiv}, eprint = {2101.05589}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2101-05589.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ErwigFHMR21, author = {Andreas Erwig and Sebastian Faust and Kristina Host{\'{a}}kov{\'{a}} and Monosij Maitra and Siavash Riahi}, title = {Two-Party Adaptor Signatures From Identification Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {150}, year = {2021}, url = {https://eprint.iacr.org/2021/150}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ErwigFHMR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaustHKS21, author = {Sebastian Faust and Carmit Hazay and David Kretzler and Benjamin Schlosser}, title = {Generic Compiler for Publicly Verifiable Covert Multi-Party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {251}, year = {2021}, url = {https://eprint.iacr.org/2021/251}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FaustHKS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CassiersFOS21, author = {Ga{\"{e}}tan Cassiers and Sebastian Faust and Maximilian Orlt and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Towards Tight Random Probing Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {880}, year = {2021}, url = {https://eprint.iacr.org/2021/880}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CassiersFOS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DasEFLR21, author = {Poulami Das and Andreas Erwig and Sebastian Faust and Julian Loss and Siavash Riahi}, title = {The Exact Security of {BIP32} Wallets}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1287}, year = {2021}, url = {https://eprint.iacr.org/2021/1287}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DasEFLR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ErwigFR21, author = {Andreas Erwig and Sebastian Faust and Siavash Riahi}, title = {Large-Scale Non-Interactive Threshold Cryptosystems Through Anonymity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1290}, year = {2021}, url = {https://eprint.iacr.org/2021/1290}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ErwigFR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaustHKS21a, author = {Sebastian Faust and Carmit Hazay and David Kretzler and Benjamin Schlosser}, title = {Financially Backed Covert Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1652}, year = {2021}, url = {https://eprint.iacr.org/2021/1652}, timestamp = {Thu, 13 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FaustHKS21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/FaustMNV20, author = {Sebastian Faust and Pratyay Mukherjee and Jesper Buus Nielsen and Daniele Venturi}, title = {Continuously Non-malleable Codes in the Split-State Model}, journal = {J. Cryptol.}, volume = {33}, number = {4}, pages = {2034--2077}, year = {2020}, url = {https://doi.org/10.1007/s00145-020-09362-z}, doi = {10.1007/S00145-020-09362-Z}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joc/FaustMNV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/EckeyFS20, author = {Lisa Eckey and Sebastian Faust and Benjamin Schlosser}, editor = {Hung{-}Min Sun and Shiuh{-}Pyng Shieh and Guofei Gu and Giuseppe Ateniese}, title = {OptiSwap: Fast Optimistic Fair Exchange}, booktitle = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020}, pages = {543--557}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3320269.3384749}, doi = {10.1145/3320269.3384749}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/EckeyFS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Alkadri0EFK0S20, author = {Nabil Alkeilani Alkadri and Poulami Das and Andreas Erwig and Sebastian Faust and Juliane Kr{\"{a}}mer and Siavash Riahi and Patrick Struck}, editor = {Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna}, title = {Deterministic Wallets in a Quantum World}, booktitle = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020}, pages = {1017--1031}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372297.3423361}, doi = {10.1145/3372297.3423361}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Alkadri0EFK0S20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DziembowskiFFR20, author = {Stefan Dziembowski and Grzegorz Fabianski and Sebastian Faust and Siavash Riahi}, title = {Lower Bounds for Off-Chain Protocols: Exploring the Limits of Plasma}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {175}, year = {2020}, url = {https://eprint.iacr.org/2020/175}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DziembowskiFFR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AumayrEEFHMMR20, author = {Lukas Aumayr and Oguzhan Ersoy and Andreas Erwig and Sebastian Faust and Kristina Host{\'{a}}kov{\'{a}} and Matteo Maffei and Pedro Moreno{-}Sanchez and Siavash Riahi}, title = {Generalized Bitcoin-Compatible Channels}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {476}, year = {2020}, url = {https://eprint.iacr.org/2020/476}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AumayrEEFHMMR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AumayrEEFHMMR20a, author = {Lukas Aumayr and Oguzhan Ersoy and Andreas Erwig and Sebastian Faust and Kristina Host{\'{a}}kov{\'{a}} and Matteo Maffei and Pedro Moreno{-}Sanchez and Siavash Riahi}, title = {Bitcoin-Compatible Virtual Channels}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {554}, year = {2020}, url = {https://eprint.iacr.org/2020/554}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AumayrEEFHMMR20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EckeyFHR20, author = {Lisa Eckey and Sebastian Faust and Kristina Host{\'{a}}kov{\'{a}} and Stefanie Roos}, title = {Splitting Payments Locally While Routing Interdimensionally}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {555}, year = {2020}, url = {https://eprint.iacr.org/2020/555}, timestamp = {Wed, 27 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EckeyFHR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlkadriDEFKRS20, author = {Nabil Alkeilani Alkadri and Poulami Das and Andreas Erwig and Sebastian Faust and Juliane Kr{\"{a}}mer and Siavash Riahi and Patrick Struck}, title = {Deterministic Wallets in a Quantum World}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1149}, year = {2020}, url = {https://eprint.iacr.org/2020/1149}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlkadriDEFKRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ErwigFRS20, author = {Andreas Erwig and Sebastian Faust and Siavash Riahi and Tobias St{\"{o}}ckert}, title = {CommiTEE: An Efficient and Secure Commit-Chain Protocol using TEEs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1486}, year = {2020}, url = {https://eprint.iacr.org/2020/1486}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ErwigFRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/DucDF19, author = {Alexandre Duc and Stefan Dziembowski and Sebastian Faust}, title = {Unifying Leakage Models: From Probing Attacks to Noisy Leakage}, journal = {J. Cryptol.}, volume = {32}, number = {1}, pages = {151--177}, year = {2019}, url = {https://doi.org/10.1007/s00145-018-9284-1}, doi = {10.1007/S00145-018-9284-1}, timestamp = {Fri, 25 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joc/DucDF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/DucFS19, author = {Alexandre Duc and Sebastian Faust and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Making Masking Security Proofs Concrete (Or How to Evaluate the Security of Any Leaking Device), Extended Version}, journal = {J. Cryptol.}, volume = {32}, number = {4}, pages = {1263--1297}, year = {2019}, url = {https://doi.org/10.1007/s00145-018-9277-0}, doi = {10.1007/S00145-018-9277-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/DucFS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DziembowskiFZ19, author = {Stefan Dziembowski and Sebastian Faust and Karol Zebrowski}, editor = {Steven D. Galbraith and Shiho Moriai}, title = {Simple Refreshing in the Noisy Leakage Model}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11923}, pages = {315--344}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34618-8\_11}, doi = {10.1007/978-3-030-34618-8\_11}, timestamp = {Fri, 22 Nov 2019 13:53:07 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/DziembowskiFZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/0003FL19, author = {Poulami Das and Sebastian Faust and Julian Loss}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {A Formal Treatment of Deterministic Wallets}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {651--668}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3354236}, doi = {10.1145/3319535.3354236}, timestamp = {Tue, 10 Nov 2020 20:00:36 +0100}, biburl = {https://dblp.org/rec/conf/ccs/0003FL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DziembowskiEFHH19, author = {Stefan Dziembowski and Lisa Eckey and Sebastian Faust and Julia Hesse and Kristina Host{\'{a}}kov{\'{a}}}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Multi-party Virtual State Channels}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11476}, pages = {625--656}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17653-2\_21}, doi = {10.1007/978-3-030-17653-2\_21}, timestamp = {Tue, 14 May 2019 13:47:56 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DziembowskiEFHH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/WinzerHF19, author = {Fredrik Winzer and Benjamin Herd and Sebastian Faust}, title = {Temporary Censorship Attacks in the Presence of Rational Miners}, booktitle = {2019 {IEEE} European Symposium on Security and Privacy Workshops, EuroS{\&}P Workshops 2019, Stockholm, Sweden, June 17-19, 2019}, pages = {357--366}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EuroSPW.2019.00046}, doi = {10.1109/EUROSPW.2019.00046}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/WinzerHF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/DziembowskiEFM19, author = {Stefan Dziembowski and Lisa Eckey and Sebastian Faust and Daniel Malinowski}, title = {Perun: Virtual Payment Hubs over Cryptocurrencies}, booktitle = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco, CA, USA, May 19-23, 2019}, pages = {106--123}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SP.2019.00020}, doi = {10.1109/SP.2019.00020}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/DziembowskiEFM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/0003EFGHJFS19, author = {Poulami Das and Lisa Eckey and Tommaso Frassetto and David Gens and Kristina Host{\'{a}}kov{\'{a}} and Patrick Jauernig and Sebastian Faust and Ahmad{-}Reza Sadeghi}, editor = {Nadia Heninger and Patrick Traynor}, title = {FastKitten: Practical Smart Contracts on Bitcoin}, booktitle = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara, CA, USA, August 14-16, 2019}, pages = {801--818}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/usenixsecurity19/presentation/das}, timestamp = {Mon, 01 Feb 2021 08:43:12 +0100}, biburl = {https://dblp.org/rec/conf/uss/0003EFGHJFS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DasEFGHJFS19, author = {Poulami Das and Lisa Eckey and Tommaso Frassetto and David Gens and Kristina Host{\'{a}}kov{\'{a}} and Patrick Jauernig and Sebastian Faust and Ahmad{-}Reza Sadeghi}, title = {FastKitten: Practical Smart Contracts on Bitcoin}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {154}, year = {2019}, url = {https://eprint.iacr.org/2019/154}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DasEFGHJFS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DziembowskiEFHH19, author = {Stefan Dziembowski and Lisa Eckey and Sebastian Faust and Julia Hesse and Kristina Host{\'{a}}kov{\'{a}}}, title = {Multi-Party Virtual State Channels}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {571}, year = {2019}, url = {https://eprint.iacr.org/2019/571}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DziembowskiEFHH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DasFL19, author = {Poulami Das and Sebastian Faust and Julian Loss}, title = {A Formal Treatment of Deterministic Wallets}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {698}, year = {2019}, url = {https://eprint.iacr.org/2019/698}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DasFL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WinzerHF19, author = {Fredrik Winzer and Benjamin Herd and Sebastian Faust}, title = {Temporary Censorship Attacks in the Presence of Rational Miners}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {748}, year = {2019}, url = {https://eprint.iacr.org/2019/748}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WinzerHF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EckeyFS19, author = {Lisa Eckey and Sebastian Faust and Benjamin Schlosser}, title = {OptiSwap: Fast Optimistic Fair Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1330}, year = {2019}, url = {https://eprint.iacr.org/2019/1330}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EckeyFS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/FaustH018, author = {Sebastian Faust and Carmit Hazay and Daniele Venturi}, title = {Outsourced pattern matching}, journal = {Int. J. Inf. Sec.}, volume = {17}, number = {3}, pages = {327--346}, year = {2018}, url = {https://doi.org/10.1007/s10207-017-0374-0}, doi = {10.1007/S10207-017-0374-0}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/FaustH018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/FaustGPPS18, author = {Sebastian Faust and Vincent Grosso and Santos Merino Del Pozo and Clara Paglialonga and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Composable Masking Schemes in the Presence of Physical Defaults {\&} the Robust Probing Model}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {3}, pages = {89--120}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i3.89-120}, doi = {10.13154/TCHES.V2018.I3.89-120}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/FaustGPPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BronchainDFS18, author = {Olivier Bronchain and Louis Dassy and Sebastian Faust and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Chip{-}Hong Chang and Ulrich R{\"{u}}hrmair and Daniel E. Holcomb and Jorge Guajardo}, title = {Implementing Trojan-Resilient Hardware from (Mostly) Untrusted Components Designed by Colluding Manufacturers}, booktitle = {Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, ASHES@CCS 2018, Toronto, ON, Canada, October 19, 2018}, pages = {1--10}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3266444.3266447}, doi = {10.1145/3266444.3266447}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BronchainDFS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DziembowskiFH18, author = {Stefan Dziembowski and Sebastian Faust and Kristina Host{\'{a}}kov{\'{a}}}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {General State Channel Networks}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {949--966}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3243856}, doi = {10.1145/3243734.3243856}, timestamp = {Tue, 10 Nov 2020 20:00:51 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DziembowskiFH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DziembowskiEF18, author = {Stefan Dziembowski and Lisa Eckey and Sebastian Faust}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {FairSwap: How To Fairly Exchange Digital Goods}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {967--984}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3243857}, doi = {10.1145/3243734.3243857}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DziembowskiEF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DziembowskiFH18, author = {Stefan Dziembowski and Sebastian Faust and Kristina Host{\'{a}}kov{\'{a}}}, title = {Foundations of State Channel Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {320}, year = {2018}, url = {https://eprint.iacr.org/2018/320}, timestamp = {Tue, 23 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DziembowskiFH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DziembowskiEF18, author = {Stefan Dziembowski and Lisa Eckey and Sebastian Faust}, title = {FairSwap: How to fairly exchange digital goods}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {740}, year = {2018}, url = {https://eprint.iacr.org/2018/740}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DziembowskiEF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/DamgardFMV17, author = {Ivan Damg{\aa}rd and Sebastian Faust and Pratyay Mukherjee and Daniele Venturi}, title = {Bounded Tamper Resilience: How to Go Beyond the Algebraic Barrier}, journal = {J. Cryptol.}, volume = {30}, number = {1}, pages = {152--190}, year = {2017}, url = {https://doi.org/10.1007/s00145-015-9218-0}, doi = {10.1007/S00145-015-9218-0}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joc/DamgardFMV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BalaschFGPS17, author = {Josep Balasch and Sebastian Faust and Benedikt Gierlichs and Clara Paglialonga and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Tsuyoshi Takagi and Thomas Peyrin}, title = {Consolidating Inner Product Masking}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10624}, pages = {724--754}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70694-8\_25}, doi = {10.1007/978-3-319-70694-8\_25}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BalaschFGPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/FaustPS17, author = {Sebastian Faust and Clara Paglialonga and Tobias Schneider}, editor = {Tsuyoshi Takagi and Thomas Peyrin}, title = {Amortizing Randomness Complexity in Private Circuits}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10624}, pages = {781--810}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70694-8\_27}, doi = {10.1007/978-3-319-70694-8\_27}, timestamp = {Tue, 22 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/FaustPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FaustHM017, author = {Sebastian Faust and Kristina Host{\'{a}}kov{\'{a}} and Pratyay Mukherjee and Daniele Venturi}, editor = {Jonathan Katz and Hovav Shacham}, title = {Non-Malleable Codes for Space-Bounded Tampering}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10402}, pages = {95--126}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63715-0\_4}, doi = {10.1007/978-3-319-63715-0\_4}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/FaustHM017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BartheDFGSS17, author = {Gilles Barthe and Fran{\c{c}}ois Dupressoir and Sebastian Faust and Benjamin Gr{\'{e}}goire and Fran{\c{c}}ois{-}Xavier Standaert and Pierre{-}Yves Strub}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10210}, pages = {535--566}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56620-7\_19}, doi = {10.1007/978-3-319-56620-7\_19}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BartheDFGSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BrodyDFP17, author = {Joshua Brody and Stefan Dziembowski and Sebastian Faust and Krzysztof Pietrzak}, editor = {Yael Kalai and Leonid Reyzin}, title = {Position-Based Cryptography and Multiparty Communication Complexity}, booktitle = {Theory of Cryptography - 15th International Conference, {TCC} 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10677}, pages = {56--81}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70500-2\_3}, doi = {10.1007/978-3-319-70500-2\_3}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/BrodyDFP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaustHM017, author = {Sebastian Faust and Kristina Host{\'{a}}kov{\'{a}} and Pratyay Mukherjee and Daniele Venturi}, title = {Non-Malleable Codes for Space-Bounded Tampering}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {530}, year = {2017}, url = {http://eprint.iacr.org/2017/530}, timestamp = {Tue, 23 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FaustHM017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DziembowskiEFM17, author = {Stefan Dziembowski and Lisa Eckey and Sebastian Faust and Daniel Malinowski}, title = {{PERUN:} Virtual Payment Channels over Cryptographic Currencies}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {635}, year = {2017}, url = {http://eprint.iacr.org/2017/635}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DziembowskiEFM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaustGPPS17, author = {Sebastian Faust and Vincent Grosso and Santos Merino Del Pozo and Clara Paglialonga and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Composable Masking Schemes in the Presence of Physical Defaults and the Robust Probing Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {711}, year = {2017}, url = {http://eprint.iacr.org/2017/711}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FaustGPPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaustPS17, author = {Sebastian Faust and Clara Paglialonga and Tobias Schneider}, title = {Amortizing Randomness Complexity in Private Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {869}, year = {2017}, url = {http://eprint.iacr.org/2017/869}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FaustPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EckeyFL17, author = {Lisa Eckey and Sebastian Faust and Julian Loss}, title = {Efficient Algorithms for Broadcast and Consensus Based on Proofs of Work}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {915}, year = {2017}, url = {http://eprint.iacr.org/2017/915}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EckeyFL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BalaschFGPS17, author = {Josep Balasch and Sebastian Faust and Benedikt Gierlichs and Clara Paglialonga and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Consolidating Inner Product Masking}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1047}, year = {2017}, url = {http://eprint.iacr.org/2017/1047}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BalaschFGPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/FaustHNNZ16, author = {Sebastian Faust and Carmit Hazay and Jesper Buus Nielsen and Peter Sebastian Nordholt and Angela Zottarel}, title = {Signature Schemes Secure Against Hard-to-Invert Leakage}, journal = {J. Cryptol.}, volume = {29}, number = {2}, pages = {422--455}, year = {2016}, url = {https://doi.org/10.1007/s00145-015-9197-1}, doi = {10.1007/S00145-015-9197-1}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/FaustHNNZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/FaustMVW16, author = {Sebastian Faust and Pratyay Mukherjee and Daniele Venturi and Daniel Wichs}, title = {Efficient Non-Malleable Codes and Key Derivation for Poly-Size Tampering Circuits}, journal = {{IEEE} Trans. Inf. Theory}, volume = {62}, number = {12}, pages = {7179--7194}, year = {2016}, url = {https://doi.org/10.1109/TIT.2016.2613919}, doi = {10.1109/TIT.2016.2613919}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/FaustMVW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DziembowskiFS16, author = {Stefan Dziembowski and Sebastian Faust and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {Private Circuits {III:} Hardware Trojan-Resilience via Testing Amplification}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {142--153}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978419}, doi = {10.1145/2976749.2978419}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/DziembowskiFS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DziembowskiFHJM16, author = {Stefan Dziembowski and Sebastian Faust and Gottfried Herold and Anthony Journault and Daniel Masny and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9815}, pages = {272--301}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53008-5\_10}, doi = {10.1007/978-3-662-53008-5\_10}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DziembowskiFHJM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AndrychowiczDF16, author = {Marcin Andrychowicz and Stefan Dziembowski and Sebastian Faust}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Circuit Compilers with O(1/{\textbackslash}log (n)) Leakage Rate}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9666}, pages = {586--615}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49896-5\_21}, doi = {10.1007/978-3-662-49896-5\_21}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AndrychowiczDF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FaustMV16, author = {Sebastian Faust and Daniel Masny and Daniele Venturi}, editor = {Chen{-}Mou Cheng and Kai{-}Min Chung and Giuseppe Persiano and Bo{-}Yin Yang}, title = {Chosen-Ciphertext Security from Subset Sum}, booktitle = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9614}, pages = {35--46}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49384-7\_2}, doi = {10.1007/978-3-662-49384-7\_2}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/FaustMV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DziembowskiFS16, author = {Stefan Dziembowski and Sebastian Faust and Maciej Sk{\'{o}}rski}, editor = {Eyal Kushilevitz and Tal Malkin}, title = {Optimal Amplification of Noisy Leakages}, booktitle = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9563}, pages = {291--318}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49099-0\_11}, doi = {10.1007/978-3-662-49099-0\_11}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/DziembowskiFS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AndrychowiczDF16, author = {Marcin Andrychowicz and Stefan Dziembowski and Sebastian Faust}, title = {Circuit Compilers with {O(1/} log(n)) Leakage Rate}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {173}, year = {2016}, url = {http://eprint.iacr.org/2016/173}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AndrychowiczDF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrodyDFP16, author = {Joshua Brody and Stefan Dziembowski and Sebastian Faust and Krzysztof Pietrzak}, title = {Position-Based Cryptography and Multiparty Communication Complexity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {536}, year = {2016}, url = {http://eprint.iacr.org/2016/536}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrodyDFP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DziembowskiFHJM16, author = {Stefan Dziembowski and Sebastian Faust and Gottfried Herold and Anthony Journault and Daniel Masny and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Towards Sound Fresh Re-Keying with Hard (Physical) Learning Problems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {573}, year = {2016}, url = {http://eprint.iacr.org/2016/573}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DziembowskiFHJM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BartheDFGSS16, author = {Gilles Barthe and Fran{\c{c}}ois Dupressoir and Sebastian Faust and Benjamin Gr{\'{e}}goire and Fran{\c{c}}ois{-}Xavier Standaert and Pierre{-}Yves Strub}, title = {Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {912}, year = {2016}, url = {http://eprint.iacr.org/2016/912}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BartheDFGSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DziembowskiFS16, author = {Stefan Dziembowski and Sebastian Faust and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Private Circuits {III:} Hardware Trojan-Resilience via Testing Amplification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1004}, year = {2016}, url = {http://eprint.iacr.org/2016/1004}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DziembowskiFS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DziembowskiFKP15, author = {Stefan Dziembowski and Sebastian Faust and Vladimir Kolmogorov and Krzysztof Pietrzak}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Proofs of Space}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {585--605}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_29}, doi = {10.1007/978-3-662-48000-7\_29}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DziembowskiFKP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/AndrychowiczDDF15, author = {Marcin Andrychowicz and Ivan Damg{\aa}rd and Stefan Dziembowski and Sebastian Faust and Antigoni Polychroniadou}, editor = {Kaisa Nyberg}, title = {Efficient Leakage Resilient Circuit Compilers}, booktitle = {Topics in Cryptology - {CT-RSA} 2015, The Cryptographer's Track at the {RSA} Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9048}, pages = {311--329}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-16715-2\_17}, doi = {10.1007/978-3-319-16715-2\_17}, timestamp = {Thu, 14 Oct 2021 10:27:48 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/AndrychowiczDDF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DziembowskiFS15, author = {Stefan Dziembowski and Sebastian Faust and Maciej Skorski}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Noisy Leakage Revisited}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9057}, pages = {159--188}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46803-6\_6}, doi = {10.1007/978-3-662-46803-6\_6}, timestamp = {Thu, 14 Oct 2021 09:58:15 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DziembowskiFS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DucFS15, author = {Alexandre Duc and Sebastian Faust and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Making Masking Security Proofs Concrete - Or How to Evaluate the Security of Any Leaking Device}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9056}, pages = {401--429}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46800-5\_16}, doi = {10.1007/978-3-662-46800-5\_16}, timestamp = {Thu, 14 Oct 2021 09:58:16 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DucFS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BalaschFG15, author = {Josep Balasch and Sebastian Faust and Benedikt Gierlichs}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Inner Product Masking Revisited}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9056}, pages = {486--510}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46800-5\_19}, doi = {10.1007/978-3-662-46800-5\_19}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BalaschFG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/DamgardFMV15, author = {Ivan Damg{\aa}rd and Sebastian Faust and Pratyay Mukherjee and Daniele Venturi}, editor = {Anja Lehmann and Stefan Wolf}, title = {The Chaining Lemma and Its Application}, booktitle = {Information Theoretic Security - 8th International Conference, {ICITS} 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9063}, pages = {181--196}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-17470-9\_11}, doi = {10.1007/978-3-319-17470-9\_11}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/icits/DamgardFMV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FaustMNV15, author = {Sebastian Faust and Pratyay Mukherjee and Jesper Buus Nielsen and Daniele Venturi}, editor = {Jonathan Katz}, title = {A Tamper and Leakage Resilient von Neumann Architecture}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {579--603}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_26}, doi = {10.1007/978-3-662-46447-2\_26}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/FaustMNV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BalaschFG15, author = {Josep Balasch and Sebastian Faust and Benedikt Gierlichs}, title = {Inner Product Masking Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {105}, year = {2015}, url = {http://eprint.iacr.org/2015/105}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BalaschFG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DucFS15, author = {Alexandre Duc and Sebastian Faust and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Making Masking Security Proofs Concrete Or How to Evaluate the Security of any Leaking Device}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {119}, year = {2015}, url = {http://eprint.iacr.org/2015/119}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DucFS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrossoSF15, author = {Vincent Grosso and Fran{\c{c}}ois{-}Xavier Standaert and Sebastian Faust}, title = {Masking vs. Multiparty Computation: How Large is the Gap for AES?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {492}, year = {2015}, url = {http://eprint.iacr.org/2015/492}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrossoSF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaustMV15, author = {Sebastian Faust and Daniel Masny and Daniele Venturi}, title = {Chosen-Ciphertext Security from Subset Sum}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1223}, year = {2015}, url = {http://eprint.iacr.org/2015/1223}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FaustMV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/GrossoSF14, author = {Vincent Grosso and Fran{\c{c}}ois{-}Xavier Standaert and Sebastian Faust}, title = {Masking vs. multiparty computation: how large is the gap for AES?}, journal = {J. Cryptogr. Eng.}, volume = {4}, number = {1}, pages = {47--57}, year = {2014}, url = {https://doi.org/10.1007/s13389-014-0073-y}, doi = {10.1007/S13389-014-0073-Y}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/GrossoSF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/FaustRRTV14, author = {Sebastian Faust and Tal Rabin and Leonid Reyzin and Eran Tromer and Vinod Vaikuntanathan}, title = {Protecting Circuits from Computationally Bounded and Noisy Leakage}, journal = {{SIAM} J. Comput.}, volume = {43}, number = {5}, pages = {1564--1614}, year = {2014}, url = {https://doi.org/10.1137/120880343}, doi = {10.1137/120880343}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/FaustRRTV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FaustMVW14, author = {Sebastian Faust and Pratyay Mukherjee and Daniele Venturi and Daniel Wichs}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Efficient Non-malleable Codes and Key-Derivation for Poly-size Tampering Circuits}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {111--128}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_7}, doi = {10.1007/978-3-642-55220-5\_7}, timestamp = {Thu, 14 Oct 2021 09:58:16 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/FaustMVW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DucDF14, author = {Alexandre Duc and Stefan Dziembowski and Sebastian Faust}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Unifying Leakage Models: From Probing Attacks to Noisy Leakage}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {423--440}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_24}, doi = {10.1007/978-3-642-55220-5\_24}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DucDF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/FaustMNV14, author = {Sebastian Faust and Pratyay Mukherjee and Jesper Buus Nielsen and Daniele Venturi}, editor = {Yehuda Lindell}, title = {Continuous Non-malleable Codes}, booktitle = {Theory of Cryptography - 11th Theory of Cryptography Conference, {TCC} 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8349}, pages = {465--488}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54242-8\_20}, doi = {10.1007/978-3-642-54242-8\_20}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/FaustMNV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DucDF14, author = {Alexandre Duc and Stefan Dziembowski and Sebastian Faust}, title = {Unifying Leakage Models: from Probing Attacks to Noisy Leakage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {79}, year = {2014}, url = {http://eprint.iacr.org/2014/079}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DucDF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaustMNV14, author = {Sebastian Faust and Pratyay Mukherjee and Jesper Buus Nielsen and Daniele Venturi}, title = {Continuous Non-malleable Codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {173}, year = {2014}, url = {http://eprint.iacr.org/2014/173}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FaustMNV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaustMNV14a, author = {Sebastian Faust and Pratyay Mukherjee and Jesper Buus Nielsen and Daniele Venturi}, title = {A Tamper and Leakage Resilient Random Access Machine}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {338}, year = {2014}, url = {http://eprint.iacr.org/2014/338}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FaustMNV14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaustHV14a, author = {Sebastian Faust and Carmit Hazay and Daniele Venturi}, title = {Outsourced Pattern Matching}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {662}, year = {2014}, url = {http://eprint.iacr.org/2014/662}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FaustHV14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardFMV14, author = {Ivan Damg{\aa}rd and Sebastian Faust and Pratyay Mukherjee and Daniele Venturi}, title = {The Chaining Lemma and its application}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {979}, year = {2014}, url = {http://eprint.iacr.org/2014/979}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardFMV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DamgardFMV13, author = {Ivan Damg{\aa}rd and Sebastian Faust and Pratyay Mukherjee and Daniele Venturi}, editor = {Kazue Sako and Palash Sarkar}, title = {Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8270}, pages = {140--160}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-42045-0\_8}, doi = {10.1007/978-3-642-42045-0\_8}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/DamgardFMV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GrossoSF13, author = {Vincent Grosso and Fran{\c{c}}ois{-}Xavier Standaert and Sebastian Faust}, editor = {Guido Bertoni and Jean{-}S{\'{e}}bastien Coron}, title = {Masking vs. Multiparty Computation: How Large Is the Gap for AES?}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8086}, pages = {400--416}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40349-1\_23}, doi = {10.1007/978-3-642-40349-1\_23}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/GrossoSF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/FaustHV13, author = {Sebastian Faust and Carmit Hazay and Daniele Venturi}, editor = {Fedor V. Fomin and Rusins Freivalds and Marta Z. Kwiatkowska and David Peleg}, title = {Outsourced Pattern Matching}, booktitle = {Automata, Languages, and Programming - 40th International Colloquium, {ICALP} 2013, Riga, Latvia, July 8-12, 2013, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {7966}, pages = {545--556}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39212-2\_48}, doi = {10.1007/978-3-642-39212-2\_48}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/FaustHV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardFMV13a, author = {Ivan Damg{\aa}rd and Sebastian Faust and Pratyay Mukherjee and Daniele Venturi}, title = {Bounded Tamper Resilience: How to go beyond the Algebraic Barrier}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {677}, year = {2013}, url = {http://eprint.iacr.org/2013/677}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardFMV13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaustMVW13, author = {Sebastian Faust and Pratyay Mukherjee and Daniele Venturi and Daniel Wichs}, title = {Efficient Non-Malleable Codes and Key-Derivation for Poly-Size Tampering Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {702}, year = {2013}, url = {http://eprint.iacr.org/2013/702}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FaustMVW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DziembowskiFKP13, author = {Stefan Dziembowski and Sebastian Faust and Vladimir Kolmogorov and Krzysztof Pietrzak}, title = {Proofs of Space}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {796}, year = {2013}, url = {http://eprint.iacr.org/2013/796}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DziembowskiFKP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/FaustHNNZ12, author = {Sebastian Faust and Carmit Hazay and Jesper Buus Nielsen and Peter Sebastian Nordholt and Angela Zottarel}, editor = {Xiaoyun Wang and Kazue Sako}, title = {Signature Schemes Secure against Hard-to-Invert Leakage}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7658}, pages = {98--115}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34961-4\_8}, doi = {10.1007/978-3-642-34961-4\_8}, timestamp = {Mon, 25 Nov 2019 15:32:14 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/FaustHNNZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BalaschFGV12, author = {Josep Balasch and Sebastian Faust and Benedikt Gierlichs and Ingrid Verbauwhede}, editor = {Xiaoyun Wang and Kazue Sako}, title = {Theory and Practice of a Leakage Resilient Masking Scheme}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7658}, pages = {758--775}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34961-4\_45}, doi = {10.1007/978-3-642-34961-4\_45}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BalaschFGV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/FaustPS12, author = {Sebastian Faust and Krzysztof Pietrzak and Joachim Schipper}, editor = {Emmanuel Prouff and Patrick Schaumont}, title = {Practical Leakage-Resilient Symmetric Cryptography}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7428}, pages = {213--232}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33027-8\_13}, doi = {10.1007/978-3-642-33027-8\_13}, timestamp = {Mon, 15 Jun 2020 17:09:16 +0200}, biburl = {https://dblp.org/rec/conf/ches/FaustPS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/FaustKMV12, author = {Sebastian Faust and Markulf Kohlweiss and Giorgia Azzurra Marson and Daniele Venturi}, editor = {Steven D. Galbraith and Mridul Nandi}, title = {On the Non-malleability of the Fiat-Shamir Transform}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2012, 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7668}, pages = {60--79}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34931-7\_5}, doi = {10.1007/978-3-642-34931-7\_5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/FaustKMV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DamgardFH12, author = {Ivan Damg{\aa}rd and Sebastian Faust and Carmit Hazay}, editor = {Ronald Cramer}, title = {Secure Two-Party Computation with Low Communication}, booktitle = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC} 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7194}, pages = {54--74}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28914-9\_4}, doi = {10.1007/978-3-642-28914-9\_4}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/DamgardFH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DziembowskiF12, author = {Stefan Dziembowski and Sebastian Faust}, editor = {Ronald Cramer}, title = {Leakage-Resilient Circuits without Computational Assumptions}, booktitle = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC} 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7194}, pages = {230--247}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28914-9\_13}, doi = {10.1007/978-3-642-28914-9\_13}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/DziembowskiF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaustHNNZ12, author = {Sebastian Faust and Carmit Hazay and Jesper Buus Nielsen and Peter Sebastian Nordholt and Angela Zottarel}, title = {Signature Schemes Secure against Hard-to-Invert Leakage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {45}, year = {2012}, url = {http://eprint.iacr.org/2012/045}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FaustHNNZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaustKMV12, author = {Sebastian Faust and Markulf Kohlweiss and Giorgia Azzurra Marson and Daniele Venturi}, title = {On the Non-malleability of the Fiat-Shamir Transform}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {704}, year = {2012}, url = {http://eprint.iacr.org/2012/704}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FaustKMV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DziembowskiF11, author = {Stefan Dziembowski and Sebastian Faust}, editor = {Dong Hoon Lee and Xiaoyun Wang}, title = {Leakage-Resilient Cryptography from the Inner-Product Extractor}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7073}, pages = {702--721}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25385-0\_38}, doi = {10.1007/978-3-642-25385-0\_38}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/DziembowskiF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/FaustPV11, author = {Sebastian Faust and Krzysztof Pietrzak and Daniele Venturi}, editor = {Luca Aceto and Monika Henzinger and Jir{\'{\i}} Sgall}, title = {Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience}, booktitle = {Automata, Languages and Programming - 38th International Colloquium, {ICALP} 2011, Zurich, Switzerland, July 4-8, 2011, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {6755}, pages = {391--402}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22006-7\_33}, doi = {10.1007/978-3-642-22006-7\_33}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/FaustPV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaustPV11, author = {Sebastian Faust and Krzysztof Pietrzak and Daniele Venturi}, title = {Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {314}, year = {2011}, url = {http://eprint.iacr.org/2011/314}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FaustPV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardFH11, author = {Ivan Damg{\aa}rd and Sebastian Faust and Carmit Hazay}, title = {Secure Two-Party Computation with Low Communication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {508}, year = {2011}, url = {http://eprint.iacr.org/2011/508}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardFH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DziembowskiF11, author = {Stefan Dziembowski and Sebastian Faust}, title = {Leakage-Resilient Cryptography From the Inner-Product Extractor}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {519}, year = {2011}, url = {http://eprint.iacr.org/2011/519}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DziembowskiF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FaustRRTV10, author = {Sebastian Faust and Tal Rabin and Leonid Reyzin and Eran Tromer and Vinod Vaikuntanathan}, editor = {Henri Gilbert}, title = {Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30 - June 3, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6110}, pages = {135--156}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13190-5\_7}, doi = {10.1007/978-3-642-13190-5\_7}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/FaustRRTV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/FaustKPR10, author = {Sebastian Faust and Eike Kiltz and Krzysztof Pietrzak and Guy N. Rothblum}, editor = {Daniele Micciancio}, title = {Leakage-Resilient Signatures}, booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC} 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5978}, pages = {343--360}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11799-2\_21}, doi = {10.1007/978-3-642-11799-2\_21}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/FaustKPR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaustKPR09, author = {Sebastian Faust and Eike Kiltz and Krzysztof Pietrzak and Guy N. Rothblum}, title = {Leakage-Resilient Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {282}, year = {2009}, url = {http://eprint.iacr.org/2009/282}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FaustKPR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaustRT09, author = {Sebastian Faust and Leonid Reyzin and Eran Tromer}, title = {Protecting Circuits from Computationally-Bounded Leakage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {379}, year = {2009}, url = {http://eprint.iacr.org/2009/379}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FaustRT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FaustKL08, author = {Sebastian Faust and Emilia K{\"{a}}sper and Stefan Lucks}, editor = {Ronald Cramer}, title = {Efficient Simultaneous Broadcast}, booktitle = {Public Key Cryptography - {PKC} 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4939}, pages = {180--196}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78440-1\_11}, doi = {10.1007/978-3-540-78440-1\_11}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/FaustKL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/DanezisDFKTP07, author = {George Danezis and Claudia D{\'{\i}}az and Sebastian Faust and Emilia K{\"{a}}sper and Carmela Troncoso and Bart Preneel}, editor = {Juan A. Garay and Arjen K. Lenstra and Masahiro Mambo and Ren{\'{e}} Peralta}, title = {Efficient Negative Databases from Cryptographic Hash Functions}, booktitle = {Information Security, 10th International Conference, {ISC} 2007, Valpara{\'{\i}}so, Chile, October 9-12, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4779}, pages = {423--436}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75496-1\_28}, doi = {10.1007/978-3-540-75496-1\_28}, timestamp = {Fri, 03 Feb 2023 21:39:19 +0100}, biburl = {https://dblp.org/rec/conf/isw/DanezisDFKTP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/KohlweissFFGP07, author = {Markulf Kohlweiss and Sebastian Faust and Lothar Fritsch and Bartek Gedrojc and Bart Preneel}, editor = {Nikita Borisov and Philippe Golle}, title = {Efficient Oblivious Augmented Maps: Location-Based Services with a Payment Broker}, booktitle = {Privacy Enhancing Technologies, 7th International Symposium, {PET} 2007 Ottawa, Canada, June 20-22, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4776}, pages = {77--94}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75551-7\_6}, doi = {10.1007/978-3-540-75551-7\_6}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pet/KohlweissFFGP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.