BibTeX records: Sebastian Faust

download as .bib file

@article{DBLP:journals/iacr/BrianDF24,
  author       = {Gianluca Brian and
                  Stefan Dziembowski and
                  Sebastian Faust},
  title        = {From Random Probing to Noisy Leakages Without Field-Size Dependence},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {339},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/339},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BrianDF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaustMMOS24,
  author       = {Sebastian Faust and
                  Lo{\"{\i}}c Masure and
                  Elena Micheli and
                  Maximilian Orlt and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Connecting Leakage-Resilient Secret Sharing to Practice: Scaling Trends
                  and Physical Dependencies of Prime Field Masking},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {377},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/377},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FaustMMOS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BertiFO23,
  author       = {Francesco Berti and
                  Sebastian Faust and
                  Maximilian Orlt},
  title        = {Provable Secure Parallel Gadgets},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {4},
  pages        = {420--459},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i4.420-459},
  doi          = {10.46586/TCHES.V2023.I4.420-459},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BertiFO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toplas/RichterKWSFM23,
  author       = {David Richter and
                  David Kretzler and
                  Pascal Weisenburger and
                  Guido Salvaneschi and
                  Sebastian Faust and
                  Mira Mezini},
  title        = {Prisma : {A} Tierless Language for Enforcing Contract-client Protocols
                  in Decentralized Applications},
  journal      = {{ACM} Trans. Program. Lang. Syst.},
  volume       = {45},
  number       = {3},
  pages        = {17:1--17:41},
  year         = {2023},
  url          = {https://doi.org/10.1145/3604629},
  doi          = {10.1145/3604629},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/toplas/RichterKWSFM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/KamphuisMLF23,
  author       = {Fredrik Kamphuis and
                  Bernardo Magri and
                  Ricky Lamberty and
                  Sebastian Faust},
  editor       = {Mehdi Tibouchi and
                  Xiaofeng Wang},
  title        = {Revisiting Transaction Ledger Robustness in the Miner Extractable
                  Value Era},
  booktitle    = {Applied Cryptography and Network Security - 21st International Conference,
                  {ACNS} 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13906},
  pages        = {675--698},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-33491-7\_25},
  doi          = {10.1007/978-3-031-33491-7\_25},
  timestamp    = {Wed, 31 May 2023 14:56:55 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/KamphuisMLF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BerndtEFGOS23,
  author       = {Sebastian Berndt and
                  Thomas Eisenbarth and
                  Sebastian Faust and
                  Marc Gourjon and
                  Maximilian Orlt and
                  Okan Seker},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Combined Fault and Leakage Resilience: Composability, Constructions
                  and Compiler},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14083},
  pages        = {377--409},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38548-3\_13},
  doi          = {10.1007/978-3-031-38548-3\_13},
  timestamp    = {Mon, 14 Aug 2023 16:16:26 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BerndtEFGOS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DziembowskiFL23,
  author       = {Stefan Dziembowski and
                  Sebastian Faust and
                  Tomasz Lizurej},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Individual Cryptography},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14082},
  pages        = {547--579},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38545-2\_18},
  doi          = {10.1007/978-3-031-38545-2\_18},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DziembowskiFL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/FaustHKS23,
  author       = {Sebastian Faust and
                  Carmit Hazay and
                  David Kretzler and
                  Benjamin Schlosser},
  title        = {Statement-Oblivious Threshold Witness Encryption},
  booktitle    = {36th {IEEE} Computer Security Foundations Symposium, {CSF} 2023, Dubrovnik,
                  Croatia, July 10-14, 2023},
  pages        = {17--32},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CSF57540.2023.00026},
  doi          = {10.1109/CSF57540.2023.00026},
  timestamp    = {Tue, 05 Sep 2023 20:33:27 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/FaustHKS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/FaustHKS23,
  author       = {Sebastian Faust and
                  Carmit Hazay and
                  David Kretzler and
                  Benjamin Schlosser},
  editor       = {Mike Rosulek},
  title        = {Putting the Online Phase on a Diet: Covert Security from Short MACs},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2023 - Cryptographers' Track at the
                  {RSA} Conference 2023, San Francisco, CA, USA, April 24-27, 2023,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13871},
  pages        = {360--386},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30872-7\_14},
  doi          = {10.1007/978-3-031-30872-7\_14},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/FaustHKS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/ErwigFRS23,
  author       = {Andreas Erwig and
                  Sebastian Faust and
                  Siavash Riahi and
                  Tobias St{\"{o}}ckert},
  title        = {CommiTEE : An Efficient and Secure Commit-Chain Protocol using TEEs},
  booktitle    = {8th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2023, Delft, Netherlands, July 3-7, 2023},
  pages        = {429--448},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/EuroSP57164.2023.00033},
  doi          = {10.1109/EUROSP57164.2023.00033},
  timestamp    = {Fri, 11 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/ErwigFRS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/FrassettoJKKSFS23,
  author       = {Tommaso Frassetto and
                  Patrick Jauernig and
                  David Koisser and
                  David Kretzler and
                  Benjamin Schlosser and
                  Sebastian Faust and
                  Ahmad{-}Reza Sadeghi},
  title        = {{POSE:} Practical Off-chain Smart Contract Execution},
  booktitle    = {30th Annual Network and Distributed System Security Symposium, {NDSS}
                  2023, San Diego, California, USA, February 27 - March 3, 2023},
  publisher    = {The Internet Society},
  year         = {2023},
  url          = {https://www.ndss-symposium.org/ndss-paper/pose-practical-off-chain-smart-contract-execution/},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/FrassettoJKKSFS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaustHKS23,
  author       = {Sebastian Faust and
                  Carmit Hazay and
                  David Kretzler and
                  Benjamin Schlosser},
  title        = {Putting the Online Phase on a Diet: Covert Security from Short MACs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {52},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/052},
  timestamp    = {Mon, 30 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FaustHKS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DziembowskiFL23,
  author       = {Stefan Dziembowski and
                  Sebastian Faust and
                  Tomasz Lizurej},
  title        = {Individual Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {88},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/088},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DziembowskiFL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DasEFLR23,
  author       = {Poulami Das and
                  Andreas Erwig and
                  Sebastian Faust and
                  Julian Loss and
                  Siavash Riahi},
  title        = {BIP32-Compatible Threshold Wallets},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {312},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/312},
  timestamp    = {Fri, 31 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DasEFLR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaustHKS23a,
  author       = {Sebastian Faust and
                  Carmit Hazay and
                  David Kretzler and
                  Benjamin Schlosser},
  title        = {Statement-Oblivious Threshold Witness Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {668},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/668},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FaustHKS23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaustHKS23b,
  author       = {Sebastian Faust and
                  Carmit Hazay and
                  David Kretzler and
                  Benjamin Schlosser},
  title        = {Threshold {BBS+} From Pseudorandom Correlations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1076},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1076},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FaustHKS23b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/00010FGOS23,
  author       = {Sebastian Berndt and
                  Thomas Eisenbarth and
                  Sebastian Faust and
                  Marc Gourjon and
                  Maximilian Orlt and
                  Okan Seker},
  title        = {Combined Fault and Leakage Resilience: Composability, Constructions
                  and Compiler},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1143},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1143},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/00010FGOS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BertiFO23,
  author       = {Francesco Berti and
                  Sebastian Faust and
                  Maximilian Orlt},
  title        = {Long Paper: Provable Secure Parallel Gadgets},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1182},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1182},
  timestamp    = {Fri, 08 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BertiFO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/darts/RichterKWSFM22,
  author       = {David Richter and
                  David Kretzler and
                  Pascal Weisenburger and
                  Guido Salvaneschi and
                  Sebastian Faust and
                  Mira Mezini},
  title        = {Prisma: {A} Tierless Language for Enforcing Contract-Client Protocols
                  in Decentralized Applications (Artifact)},
  journal      = {Dagstuhl Artifacts Ser.},
  volume       = {8},
  number       = {2},
  pages        = {16:1--16:3},
  year         = {2022},
  url          = {https://doi.org/10.4230/DARTS.8.2.16},
  doi          = {10.4230/DARTS.8.2.16},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/darts/RichterKWSFM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BrianFMV22,
  author       = {Gianluca Brian and
                  Sebastian Faust and
                  Elena Micheli and
                  Daniele Venturi},
  editor       = {Shweta Agrawal and
                  Dongdai Lin},
  title        = {Continuously Non-malleable Codes Against Bounded-Depth Tampering},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13794},
  pages        = {384--413},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22972-5\_14},
  doi          = {10.1007/978-3-031-22972-5\_14},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BrianFMV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecoop/RichterKWSFM22,
  author       = {David Richter and
                  David Kretzler and
                  Pascal Weisenburger and
                  Guido Salvaneschi and
                  Sebastian Faust and
                  Mira Mezini},
  editor       = {Karim Ali and
                  Jan Vitek},
  title        = {Prisma: {A} Tierless Language for Enforcing Contract-Client Protocols
                  in Decentralized Applications (Extended Abstract)},
  booktitle    = {36th European Conference on Object-Oriented Programming, {ECOOP} 2022,
                  June 6-10, 2022, Berlin, Germany},
  series       = {LIPIcs},
  volume       = {222},
  pages        = {35:1--35:4},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2022},
  url          = {https://doi.org/10.4230/LIPIcs.ECOOP.2022.35},
  doi          = {10.4230/LIPICS.ECOOP.2022.35},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecoop/RichterKWSFM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FaustHKS22,
  author       = {Sebastian Faust and
                  Carmit Hazay and
                  David Kretzler and
                  Benjamin Schlosser},
  editor       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {Financially Backed Covert Security},
  booktitle    = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Virtual Event,
                  March 8-11, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13178},
  pages        = {99--129},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-97131-1\_4},
  doi          = {10.1007/978-3-030-97131-1\_4},
  timestamp    = {Thu, 10 Mar 2022 11:26:10 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/FaustHKS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/FaustKOS22,
  author       = {Sebastian Faust and
                  Juliane Kr{\"{a}}mer and
                  Maximilian Orlt and
                  Patrick Struck},
  editor       = {Clemente Galdi and
                  Stanislaw Jarecki},
  title        = {On the Related-Key Attack Security of Authenticated Encryption Schemes},
  booktitle    = {Security and Cryptography for Networks - 13th International Conference,
                  {SCN} 2022, Amalfi, Italy, September 12-14, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13409},
  pages        = {362--386},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-14791-3\_16},
  doi          = {10.1007/978-3-031-14791-3\_16},
  timestamp    = {Wed, 07 Sep 2022 17:42:21 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/FaustKOS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2205-07780,
  author       = {David Richter and
                  David Kretzler and
                  Pascal Weisenburger and
                  Guido Salvaneschi and
                  Sebastian Faust and
                  Mira Mezini},
  title        = {Prisma: {A} Tierless Language for Enforcing Contract-Client Protocols
                  in Decentralized Applications (Extended Version)},
  journal      = {CoRR},
  volume       = {abs/2205.07780},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2205.07780},
  doi          = {10.48550/ARXIV.2205.07780},
  eprinttype    = {arXiv},
  eprint       = {2205.07780},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2205-07780.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-07110,
  author       = {Tommaso Frassetto and
                  Patrick Jauernig and
                  David Koisser and
                  David Kretzler and
                  Benjamin Schlosser and
                  Sebastian Faust and
                  Ahmad{-}Reza Sadeghi},
  title        = {{POSE:} Practical Off-chain Smart Contract Execution},
  journal      = {CoRR},
  volume       = {abs/2210.07110},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.07110},
  doi          = {10.48550/ARXIV.2210.07110},
  eprinttype    = {arXiv},
  eprint       = {2210.07110},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-07110.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaustKOS22,
  author       = {Sebastian Faust and
                  Juliane Kr{\"{a}}mer and
                  Maximilian Orlt and
                  Patrick Struck},
  title        = {On the Related-Key Attack Security of Authenticated Encryption Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {140},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/140},
  timestamp    = {Fri, 18 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FaustKOS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0003EFLM22,
  author       = {Poulami Das and
                  Lisa Eckey and
                  Sebastian Faust and
                  Julian Loss and
                  Monosij Maitra},
  title        = {Round Efficient Byzantine Agreement from VDFs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {823},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/823},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0003EFLM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrianFM022,
  author       = {Gianluca Brian and
                  Sebastian Faust and
                  Elena Micheli and
                  Daniele Venturi},
  title        = {Continuously Non-Malleable Codes against Bounded-Depth Tampering},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1231},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1231},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrianFM022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BronchainFLLPS21,
  author       = {Olivier Bronchain and
                  Sebastian Faust and
                  Virginie Lallemand and
                  Gregor Leander and
                  L{\'{e}}o Perrin and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {{MOE:} Multiplication Operated Encryption with Trojan Resilience},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2021},
  number       = {1},
  pages        = {78--129},
  year         = {2021},
  url          = {https://doi.org/10.46586/tosc.v2021.i1.78-129},
  doi          = {10.46586/TOSC.V2021.I1.78-129},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/BronchainFLLPS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AumayrEEFHMMR21,
  author       = {Lukas Aumayr and
                  Oguzhan Ersoy and
                  Andreas Erwig and
                  Sebastian Faust and
                  Kristina Host{\'{a}}kov{\'{a}} and
                  Matteo Maffei and
                  Pedro Moreno{-}Sanchez and
                  Siavash Riahi},
  editor       = {Mehdi Tibouchi and
                  Huaxiong Wang},
  title        = {Generalized Channels from Limited Blockchain Scripts and Adaptor Signatures},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 6-10, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13091},
  pages        = {635--664},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92075-3\_22},
  doi          = {10.1007/978-3-030-92075-3\_22},
  timestamp    = {Fri, 03 Dec 2021 17:36:49 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/AumayrEEFHMMR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/brains/AmlerEFKSS21,
  author       = {Hendrik Amler and
                  Lisa Eckey and
                  Sebastian Faust and
                  Marcel Kaiser and
                  Philipp G. Sandner and
                  Benjamin Schlosser},
  title        = {DeFi-ning DeFi: Challenges {\&} Pathway},
  booktitle    = {3rd Conference on Blockchain Research {\&} Applications for Innovative
                  Networks and Services, {BRAINS} 2021, Paris, France, September 27-30,
                  2021},
  pages        = {181--184},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/BRAINS52497.2021.9569795},
  doi          = {10.1109/BRAINS52497.2021.9569795},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/brains/AmlerEFKSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/0003EFL021,
  author       = {Poulami Das and
                  Andreas Erwig and
                  Sebastian Faust and
                  Julian Loss and
                  Siavash Riahi},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Giovanni Vigna and
                  Elaine Shi},
  title        = {The Exact Security of {BIP32} Wallets},
  booktitle    = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
  pages        = {1020--1042},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460120.3484807},
  doi          = {10.1145/3460120.3484807},
  timestamp    = {Tue, 16 Nov 2021 12:59:46 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/0003EFL021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CassiersFOS21,
  author       = {Ga{\"{e}}tan Cassiers and
                  Sebastian Faust and
                  Maximilian Orlt and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Towards Tight Random Probing Security},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12827},
  pages        = {185--214},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84252-9\_7},
  doi          = {10.1007/978-3-030-84252-9\_7},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/CassiersFOS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/FaustHKS21,
  author       = {Sebastian Faust and
                  Carmit Hazay and
                  David Kretzler and
                  Benjamin Schlosser},
  editor       = {Anne Canteaut and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Generic Compiler for Publicly Verifiable Covert Multi-Party Computation},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12697},
  pages        = {782--811},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-77886-6\_27},
  doi          = {10.1007/978-3-030-77886-6\_27},
  timestamp    = {Mon, 28 Aug 2023 21:17:52 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/FaustHKS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/DziembowskiFF021,
  author       = {Stefan Dziembowski and
                  Grzegorz Fabianski and
                  Sebastian Faust and
                  Siavash Riahi},
  editor       = {James R. Lee},
  title        = {Lower Bounds for Off-Chain Protocols: Exploring the Limits of Plasma},
  booktitle    = {12th Innovations in Theoretical Computer Science Conference, {ITCS}
                  2021, January 6-8, 2021, Virtual Conference},
  series       = {LIPIcs},
  volume       = {185},
  pages        = {72:1--72:20},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2021},
  url          = {https://doi.org/10.4230/LIPIcs.ITCS.2021.72},
  doi          = {10.4230/LIPICS.ITCS.2021.72},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/innovations/DziembowskiFF021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ErwigFHM021,
  author       = {Andreas Erwig and
                  Sebastian Faust and
                  Kristina Host{\'{a}}kov{\'{a}} and
                  Monosij Maitra and
                  Siavash Riahi},
  editor       = {Juan A. Garay},
  title        = {Two-Party Adaptor Signatures from Identification Schemes},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12710},
  pages        = {451--480},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75245-3\_17},
  doi          = {10.1007/978-3-030-75245-3\_17},
  timestamp    = {Fri, 07 May 2021 15:40:46 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ErwigFHM021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/AumayrMEEFRHM21,
  author       = {Lukas Aumayr and
                  Matteo Maffei and
                  Oguzhan Ersoy and
                  Andreas Erwig and
                  Sebastian Faust and
                  Siavash Riahi and
                  Kristina Host{\'{a}}kov{\'{a}} and
                  Pedro Moreno{-}Sanchez},
  title        = {Bitcoin-Compatible Virtual Channels},
  booktitle    = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco,
                  CA, USA, 24-27 May 2021},
  pages        = {901--918},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SP40001.2021.00097},
  doi          = {10.1109/SP40001.2021.00097},
  timestamp    = {Thu, 21 Sep 2023 15:57:26 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/AumayrMEEFRHM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2101-05589,
  author       = {Hendrik Amler and
                  Lisa Eckey and
                  Sebastian Faust and
                  Marcel Kaiser and
                  Philipp G. Sandner and
                  Benjamin Schlosser},
  title        = {DeFi-ning DeFi: Challenges {\&} Pathway},
  journal      = {CoRR},
  volume       = {abs/2101.05589},
  year         = {2021},
  url          = {https://arxiv.org/abs/2101.05589},
  eprinttype    = {arXiv},
  eprint       = {2101.05589},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2101-05589.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ErwigFHMR21,
  author       = {Andreas Erwig and
                  Sebastian Faust and
                  Kristina Host{\'{a}}kov{\'{a}} and
                  Monosij Maitra and
                  Siavash Riahi},
  title        = {Two-Party Adaptor Signatures From Identification Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {150},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/150},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ErwigFHMR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaustHKS21,
  author       = {Sebastian Faust and
                  Carmit Hazay and
                  David Kretzler and
                  Benjamin Schlosser},
  title        = {Generic Compiler for Publicly Verifiable Covert Multi-Party Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {251},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/251},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FaustHKS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CassiersFOS21,
  author       = {Ga{\"{e}}tan Cassiers and
                  Sebastian Faust and
                  Maximilian Orlt and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Towards Tight Random Probing Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {880},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/880},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CassiersFOS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DasEFLR21,
  author       = {Poulami Das and
                  Andreas Erwig and
                  Sebastian Faust and
                  Julian Loss and
                  Siavash Riahi},
  title        = {The Exact Security of {BIP32} Wallets},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1287},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1287},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DasEFLR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ErwigFR21,
  author       = {Andreas Erwig and
                  Sebastian Faust and
                  Siavash Riahi},
  title        = {Large-Scale Non-Interactive Threshold Cryptosystems Through Anonymity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1290},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1290},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ErwigFR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaustHKS21a,
  author       = {Sebastian Faust and
                  Carmit Hazay and
                  David Kretzler and
                  Benjamin Schlosser},
  title        = {Financially Backed Covert Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1652},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1652},
  timestamp    = {Thu, 13 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FaustHKS21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/FaustMNV20,
  author       = {Sebastian Faust and
                  Pratyay Mukherjee and
                  Jesper Buus Nielsen and
                  Daniele Venturi},
  title        = {Continuously Non-malleable Codes in the Split-State Model},
  journal      = {J. Cryptol.},
  volume       = {33},
  number       = {4},
  pages        = {2034--2077},
  year         = {2020},
  url          = {https://doi.org/10.1007/s00145-020-09362-z},
  doi          = {10.1007/S00145-020-09362-Z},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joc/FaustMNV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/EckeyFS20,
  author       = {Lisa Eckey and
                  Sebastian Faust and
                  Benjamin Schlosser},
  editor       = {Hung{-}Min Sun and
                  Shiuh{-}Pyng Shieh and
                  Guofei Gu and
                  Giuseppe Ateniese},
  title        = {OptiSwap: Fast Optimistic Fair Exchange},
  booktitle    = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications
                  Security, Taipei, Taiwan, October 5-9, 2020},
  pages        = {543--557},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3320269.3384749},
  doi          = {10.1145/3320269.3384749},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/EckeyFS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Alkadri0EFK0S20,
  author       = {Nabil Alkeilani Alkadri and
                  Poulami Das and
                  Andreas Erwig and
                  Sebastian Faust and
                  Juliane Kr{\"{a}}mer and
                  Siavash Riahi and
                  Patrick Struck},
  editor       = {Jay Ligatti and
                  Xinming Ou and
                  Jonathan Katz and
                  Giovanni Vigna},
  title        = {Deterministic Wallets in a Quantum World},
  booktitle    = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, USA, November 9-13, 2020},
  pages        = {1017--1031},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372297.3423361},
  doi          = {10.1145/3372297.3423361},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Alkadri0EFK0S20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DziembowskiFFR20,
  author       = {Stefan Dziembowski and
                  Grzegorz Fabianski and
                  Sebastian Faust and
                  Siavash Riahi},
  title        = {Lower Bounds for Off-Chain Protocols: Exploring the Limits of Plasma},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {175},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/175},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DziembowskiFFR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AumayrEEFHMMR20,
  author       = {Lukas Aumayr and
                  Oguzhan Ersoy and
                  Andreas Erwig and
                  Sebastian Faust and
                  Kristina Host{\'{a}}kov{\'{a}} and
                  Matteo Maffei and
                  Pedro Moreno{-}Sanchez and
                  Siavash Riahi},
  title        = {Generalized Bitcoin-Compatible Channels},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {476},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/476},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AumayrEEFHMMR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AumayrEEFHMMR20a,
  author       = {Lukas Aumayr and
                  Oguzhan Ersoy and
                  Andreas Erwig and
                  Sebastian Faust and
                  Kristina Host{\'{a}}kov{\'{a}} and
                  Matteo Maffei and
                  Pedro Moreno{-}Sanchez and
                  Siavash Riahi},
  title        = {Bitcoin-Compatible Virtual Channels},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {554},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/554},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AumayrEEFHMMR20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EckeyFHR20,
  author       = {Lisa Eckey and
                  Sebastian Faust and
                  Kristina Host{\'{a}}kov{\'{a}} and
                  Stefanie Roos},
  title        = {Splitting Payments Locally While Routing Interdimensionally},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {555},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/555},
  timestamp    = {Wed, 27 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EckeyFHR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlkadriDEFKRS20,
  author       = {Nabil Alkeilani Alkadri and
                  Poulami Das and
                  Andreas Erwig and
                  Sebastian Faust and
                  Juliane Kr{\"{a}}mer and
                  Siavash Riahi and
                  Patrick Struck},
  title        = {Deterministic Wallets in a Quantum World},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1149},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1149},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlkadriDEFKRS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ErwigFRS20,
  author       = {Andreas Erwig and
                  Sebastian Faust and
                  Siavash Riahi and
                  Tobias St{\"{o}}ckert},
  title        = {CommiTEE: An Efficient and Secure Commit-Chain Protocol using TEEs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1486},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1486},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ErwigFRS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/DucDF19,
  author       = {Alexandre Duc and
                  Stefan Dziembowski and
                  Sebastian Faust},
  title        = {Unifying Leakage Models: From Probing Attacks to Noisy Leakage},
  journal      = {J. Cryptol.},
  volume       = {32},
  number       = {1},
  pages        = {151--177},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00145-018-9284-1},
  doi          = {10.1007/S00145-018-9284-1},
  timestamp    = {Fri, 25 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joc/DucDF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/DucFS19,
  author       = {Alexandre Duc and
                  Sebastian Faust and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Making Masking Security Proofs Concrete (Or How to Evaluate the Security
                  of Any Leaking Device), Extended Version},
  journal      = {J. Cryptol.},
  volume       = {32},
  number       = {4},
  pages        = {1263--1297},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00145-018-9277-0},
  doi          = {10.1007/S00145-018-9277-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/DucFS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DziembowskiFZ19,
  author       = {Stefan Dziembowski and
                  Sebastian Faust and
                  Karol Zebrowski},
  editor       = {Steven D. Galbraith and
                  Shiho Moriai},
  title        = {Simple Refreshing in the Noisy Leakage Model},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kobe, Japan, December 8-12, 2019, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11923},
  pages        = {315--344},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34618-8\_11},
  doi          = {10.1007/978-3-030-34618-8\_11},
  timestamp    = {Fri, 22 Nov 2019 13:53:07 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/DziembowskiFZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/0003FL19,
  author       = {Poulami Das and
                  Sebastian Faust and
                  Julian Loss},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {A Formal Treatment of Deterministic Wallets},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {651--668},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3354236},
  doi          = {10.1145/3319535.3354236},
  timestamp    = {Tue, 10 Nov 2020 20:00:36 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/0003FL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DziembowskiEFHH19,
  author       = {Stefan Dziembowski and
                  Lisa Eckey and
                  Sebastian Faust and
                  Julia Hesse and
                  Kristina Host{\'{a}}kov{\'{a}}},
  editor       = {Yuval Ishai and
                  Vincent Rijmen},
  title        = {Multi-party Virtual State Channels},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11476},
  pages        = {625--656},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17653-2\_21},
  doi          = {10.1007/978-3-030-17653-2\_21},
  timestamp    = {Tue, 14 May 2019 13:47:56 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DziembowskiEFHH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/WinzerHF19,
  author       = {Fredrik Winzer and
                  Benjamin Herd and
                  Sebastian Faust},
  title        = {Temporary Censorship Attacks in the Presence of Rational Miners},
  booktitle    = {2019 {IEEE} European Symposium on Security and Privacy Workshops,
                  EuroS{\&}P Workshops 2019, Stockholm, Sweden, June 17-19, 2019},
  pages        = {357--366},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EuroSPW.2019.00046},
  doi          = {10.1109/EUROSPW.2019.00046},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/WinzerHF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/DziembowskiEFM19,
  author       = {Stefan Dziembowski and
                  Lisa Eckey and
                  Sebastian Faust and
                  Daniel Malinowski},
  title        = {Perun: Virtual Payment Hubs over Cryptocurrencies},
  booktitle    = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco,
                  CA, USA, May 19-23, 2019},
  pages        = {106--123},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SP.2019.00020},
  doi          = {10.1109/SP.2019.00020},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/DziembowskiEFM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/0003EFGHJFS19,
  author       = {Poulami Das and
                  Lisa Eckey and
                  Tommaso Frassetto and
                  David Gens and
                  Kristina Host{\'{a}}kov{\'{a}} and
                  Patrick Jauernig and
                  Sebastian Faust and
                  Ahmad{-}Reza Sadeghi},
  editor       = {Nadia Heninger and
                  Patrick Traynor},
  title        = {FastKitten: Practical Smart Contracts on Bitcoin},
  booktitle    = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara,
                  CA, USA, August 14-16, 2019},
  pages        = {801--818},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/usenixsecurity19/presentation/das},
  timestamp    = {Mon, 01 Feb 2021 08:43:12 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/0003EFGHJFS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DasEFGHJFS19,
  author       = {Poulami Das and
                  Lisa Eckey and
                  Tommaso Frassetto and
                  David Gens and
                  Kristina Host{\'{a}}kov{\'{a}} and
                  Patrick Jauernig and
                  Sebastian Faust and
                  Ahmad{-}Reza Sadeghi},
  title        = {FastKitten: Practical Smart Contracts on Bitcoin},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {154},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/154},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DasEFGHJFS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DziembowskiEFHH19,
  author       = {Stefan Dziembowski and
                  Lisa Eckey and
                  Sebastian Faust and
                  Julia Hesse and
                  Kristina Host{\'{a}}kov{\'{a}}},
  title        = {Multi-Party Virtual State Channels},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {571},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/571},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DziembowskiEFHH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DasFL19,
  author       = {Poulami Das and
                  Sebastian Faust and
                  Julian Loss},
  title        = {A Formal Treatment of Deterministic Wallets},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {698},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/698},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DasFL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WinzerHF19,
  author       = {Fredrik Winzer and
                  Benjamin Herd and
                  Sebastian Faust},
  title        = {Temporary Censorship Attacks in the Presence of Rational Miners},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {748},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/748},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WinzerHF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EckeyFS19,
  author       = {Lisa Eckey and
                  Sebastian Faust and
                  Benjamin Schlosser},
  title        = {OptiSwap: Fast Optimistic Fair Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1330},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1330},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EckeyFS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/FaustH018,
  author       = {Sebastian Faust and
                  Carmit Hazay and
                  Daniele Venturi},
  title        = {Outsourced pattern matching},
  journal      = {Int. J. Inf. Sec.},
  volume       = {17},
  number       = {3},
  pages        = {327--346},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10207-017-0374-0},
  doi          = {10.1007/S10207-017-0374-0},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/FaustH018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/FaustGPPS18,
  author       = {Sebastian Faust and
                  Vincent Grosso and
                  Santos Merino Del Pozo and
                  Clara Paglialonga and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Composable Masking Schemes in the Presence of Physical Defaults {\&}
                  the Robust Probing Model},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {3},
  pages        = {89--120},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i3.89-120},
  doi          = {10.13154/TCHES.V2018.I3.89-120},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/FaustGPPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BronchainDFS18,
  author       = {Olivier Bronchain and
                  Louis Dassy and
                  Sebastian Faust and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Chip{-}Hong Chang and
                  Ulrich R{\"{u}}hrmair and
                  Daniel E. Holcomb and
                  Jorge Guajardo},
  title        = {Implementing Trojan-Resilient Hardware from (Mostly) Untrusted Components
                  Designed by Colluding Manufacturers},
  booktitle    = {Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware
                  Security, ASHES@CCS 2018, Toronto, ON, Canada, October 19, 2018},
  pages        = {1--10},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3266444.3266447},
  doi          = {10.1145/3266444.3266447},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BronchainDFS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DziembowskiFH18,
  author       = {Stefan Dziembowski and
                  Sebastian Faust and
                  Kristina Host{\'{a}}kov{\'{a}}},
  editor       = {David Lie and
                  Mohammad Mannan and
                  Michael Backes and
                  XiaoFeng Wang},
  title        = {General State Channel Networks},
  booktitle    = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2018, Toronto, ON, Canada, October
                  15-19, 2018},
  pages        = {949--966},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3243734.3243856},
  doi          = {10.1145/3243734.3243856},
  timestamp    = {Tue, 10 Nov 2020 20:00:51 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DziembowskiFH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DziembowskiEF18,
  author       = {Stefan Dziembowski and
                  Lisa Eckey and
                  Sebastian Faust},
  editor       = {David Lie and
                  Mohammad Mannan and
                  Michael Backes and
                  XiaoFeng Wang},
  title        = {FairSwap: How To Fairly Exchange Digital Goods},
  booktitle    = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2018, Toronto, ON, Canada, October
                  15-19, 2018},
  pages        = {967--984},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3243734.3243857},
  doi          = {10.1145/3243734.3243857},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DziembowskiEF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DziembowskiFH18,
  author       = {Stefan Dziembowski and
                  Sebastian Faust and
                  Kristina Host{\'{a}}kov{\'{a}}},
  title        = {Foundations of State Channel Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {320},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/320},
  timestamp    = {Tue, 23 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DziembowskiFH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DziembowskiEF18,
  author       = {Stefan Dziembowski and
                  Lisa Eckey and
                  Sebastian Faust},
  title        = {FairSwap: How to fairly exchange digital goods},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {740},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/740},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DziembowskiEF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/DamgardFMV17,
  author       = {Ivan Damg{\aa}rd and
                  Sebastian Faust and
                  Pratyay Mukherjee and
                  Daniele Venturi},
  title        = {Bounded Tamper Resilience: How to Go Beyond the Algebraic Barrier},
  journal      = {J. Cryptol.},
  volume       = {30},
  number       = {1},
  pages        = {152--190},
  year         = {2017},
  url          = {https://doi.org/10.1007/s00145-015-9218-0},
  doi          = {10.1007/S00145-015-9218-0},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joc/DamgardFMV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BalaschFGPS17,
  author       = {Josep Balasch and
                  Sebastian Faust and
                  Benedikt Gierlichs and
                  Clara Paglialonga and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Tsuyoshi Takagi and
                  Thomas Peyrin},
  title        = {Consolidating Inner Product Masking},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Hong Kong, China, December 3-7, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10624},
  pages        = {724--754},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70694-8\_25},
  doi          = {10.1007/978-3-319-70694-8\_25},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BalaschFGPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/FaustPS17,
  author       = {Sebastian Faust and
                  Clara Paglialonga and
                  Tobias Schneider},
  editor       = {Tsuyoshi Takagi and
                  Thomas Peyrin},
  title        = {Amortizing Randomness Complexity in Private Circuits},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Hong Kong, China, December 3-7, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10624},
  pages        = {781--810},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70694-8\_27},
  doi          = {10.1007/978-3-319-70694-8\_27},
  timestamp    = {Tue, 22 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/FaustPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FaustHM017,
  author       = {Sebastian Faust and
                  Kristina Host{\'{a}}kov{\'{a}} and
                  Pratyay Mukherjee and
                  Daniele Venturi},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Non-Malleable Codes for Space-Bounded Tampering},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10402},
  pages        = {95--126},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63715-0\_4},
  doi          = {10.1007/978-3-319-63715-0\_4},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/FaustHM017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BartheDFGSS17,
  author       = {Gilles Barthe and
                  Fran{\c{c}}ois Dupressoir and
                  Sebastian Faust and
                  Benjamin Gr{\'{e}}goire and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Pierre{-}Yves Strub},
  editor       = {Jean{-}S{\'{e}}bastien Coron and
                  Jesper Buus Nielsen},
  title        = {Parallel Implementations of Masking Schemes and the Bounded Moment
                  Leakage Model},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Paris, France, April 30 - May 4, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10210},
  pages        = {535--566},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-56620-7\_19},
  doi          = {10.1007/978-3-319-56620-7\_19},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BartheDFGSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BrodyDFP17,
  author       = {Joshua Brody and
                  Stefan Dziembowski and
                  Sebastian Faust and
                  Krzysztof Pietrzak},
  editor       = {Yael Kalai and
                  Leonid Reyzin},
  title        = {Position-Based Cryptography and Multiparty Communication Complexity},
  booktitle    = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
                  Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10677},
  pages        = {56--81},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70500-2\_3},
  doi          = {10.1007/978-3-319-70500-2\_3},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/BrodyDFP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaustHM017,
  author       = {Sebastian Faust and
                  Kristina Host{\'{a}}kov{\'{a}} and
                  Pratyay Mukherjee and
                  Daniele Venturi},
  title        = {Non-Malleable Codes for Space-Bounded Tampering},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {530},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/530},
  timestamp    = {Tue, 23 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FaustHM017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DziembowskiEFM17,
  author       = {Stefan Dziembowski and
                  Lisa Eckey and
                  Sebastian Faust and
                  Daniel Malinowski},
  title        = {{PERUN:} Virtual Payment Channels over Cryptographic Currencies},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {635},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/635},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DziembowskiEFM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaustGPPS17,
  author       = {Sebastian Faust and
                  Vincent Grosso and
                  Santos Merino Del Pozo and
                  Clara Paglialonga and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Composable Masking Schemes in the Presence of Physical Defaults and
                  the Robust Probing Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {711},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/711},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FaustGPPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaustPS17,
  author       = {Sebastian Faust and
                  Clara Paglialonga and
                  Tobias Schneider},
  title        = {Amortizing Randomness Complexity in Private Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {869},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/869},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FaustPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EckeyFL17,
  author       = {Lisa Eckey and
                  Sebastian Faust and
                  Julian Loss},
  title        = {Efficient Algorithms for Broadcast and Consensus Based on Proofs of
                  Work},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {915},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/915},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EckeyFL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BalaschFGPS17,
  author       = {Josep Balasch and
                  Sebastian Faust and
                  Benedikt Gierlichs and
                  Clara Paglialonga and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Consolidating Inner Product Masking},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1047},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1047},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BalaschFGPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/FaustHNNZ16,
  author       = {Sebastian Faust and
                  Carmit Hazay and
                  Jesper Buus Nielsen and
                  Peter Sebastian Nordholt and
                  Angela Zottarel},
  title        = {Signature Schemes Secure Against Hard-to-Invert Leakage},
  journal      = {J. Cryptol.},
  volume       = {29},
  number       = {2},
  pages        = {422--455},
  year         = {2016},
  url          = {https://doi.org/10.1007/s00145-015-9197-1},
  doi          = {10.1007/S00145-015-9197-1},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/FaustHNNZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/FaustMVW16,
  author       = {Sebastian Faust and
                  Pratyay Mukherjee and
                  Daniele Venturi and
                  Daniel Wichs},
  title        = {Efficient Non-Malleable Codes and Key Derivation for Poly-Size Tampering
                  Circuits},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {62},
  number       = {12},
  pages        = {7179--7194},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIT.2016.2613919},
  doi          = {10.1109/TIT.2016.2613919},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/FaustMVW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DziembowskiFS16,
  author       = {Stefan Dziembowski and
                  Sebastian Faust and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {Private Circuits {III:} Hardware Trojan-Resilience via Testing Amplification},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {142--153},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978419},
  doi          = {10.1145/2976749.2978419},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/DziembowskiFS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DziembowskiFHJM16,
  author       = {Stefan Dziembowski and
                  Sebastian Faust and
                  Gottfried Herold and
                  Anthony Journault and
                  Daniel Masny and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9815},
  pages        = {272--301},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53008-5\_10},
  doi          = {10.1007/978-3-662-53008-5\_10},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DziembowskiFHJM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AndrychowiczDF16,
  author       = {Marcin Andrychowicz and
                  Stefan Dziembowski and
                  Sebastian Faust},
  editor       = {Marc Fischlin and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Circuit Compilers with O(1/{\textbackslash}log (n)) Leakage Rate},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9666},
  pages        = {586--615},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49896-5\_21},
  doi          = {10.1007/978-3-662-49896-5\_21},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/AndrychowiczDF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FaustMV16,
  author       = {Sebastian Faust and
                  Daniel Masny and
                  Daniele Venturi},
  editor       = {Chen{-}Mou Cheng and
                  Kai{-}Min Chung and
                  Giuseppe Persiano and
                  Bo{-}Yin Yang},
  title        = {Chosen-Ciphertext Security from Subset Sum},
  booktitle    = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
                  March 6-9, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9614},
  pages        = {35--46},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49384-7\_2},
  doi          = {10.1007/978-3-662-49384-7\_2},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/FaustMV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DziembowskiFS16,
  author       = {Stefan Dziembowski and
                  Sebastian Faust and
                  Maciej Sk{\'{o}}rski},
  editor       = {Eyal Kushilevitz and
                  Tal Malkin},
  title        = {Optimal Amplification of Noisy Leakages},
  booktitle    = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A,
                  Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9563},
  pages        = {291--318},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49099-0\_11},
  doi          = {10.1007/978-3-662-49099-0\_11},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/DziembowskiFS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AndrychowiczDF16,
  author       = {Marcin Andrychowicz and
                  Stefan Dziembowski and
                  Sebastian Faust},
  title        = {Circuit Compilers with {O(1/} log(n)) Leakage Rate},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {173},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/173},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AndrychowiczDF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrodyDFP16,
  author       = {Joshua Brody and
                  Stefan Dziembowski and
                  Sebastian Faust and
                  Krzysztof Pietrzak},
  title        = {Position-Based Cryptography and Multiparty Communication Complexity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {536},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/536},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrodyDFP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DziembowskiFHJM16,
  author       = {Stefan Dziembowski and
                  Sebastian Faust and
                  Gottfried Herold and
                  Anthony Journault and
                  Daniel Masny and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Towards Sound Fresh Re-Keying with Hard (Physical) Learning Problems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {573},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/573},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DziembowskiFHJM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BartheDFGSS16,
  author       = {Gilles Barthe and
                  Fran{\c{c}}ois Dupressoir and
                  Sebastian Faust and
                  Benjamin Gr{\'{e}}goire and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Pierre{-}Yves Strub},
  title        = {Parallel Implementations of Masking Schemes and the Bounded Moment
                  Leakage Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {912},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/912},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BartheDFGSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DziembowskiFS16,
  author       = {Stefan Dziembowski and
                  Sebastian Faust and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Private Circuits {III:} Hardware Trojan-Resilience via Testing Amplification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1004},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1004},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DziembowskiFS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DziembowskiFKP15,
  author       = {Stefan Dziembowski and
                  Sebastian Faust and
                  Vladimir Kolmogorov and
                  Krzysztof Pietrzak},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Proofs of Space},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {585--605},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_29},
  doi          = {10.1007/978-3-662-48000-7\_29},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DziembowskiFKP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/AndrychowiczDDF15,
  author       = {Marcin Andrychowicz and
                  Ivan Damg{\aa}rd and
                  Stefan Dziembowski and
                  Sebastian Faust and
                  Antigoni Polychroniadou},
  editor       = {Kaisa Nyberg},
  title        = {Efficient Leakage Resilient Circuit Compilers},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2015, The Cryptographer's Track at
                  the {RSA} Conference 2015, San Francisco, CA, USA, April 20-24, 2015.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9048},
  pages        = {311--329},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-16715-2\_17},
  doi          = {10.1007/978-3-319-16715-2\_17},
  timestamp    = {Thu, 14 Oct 2021 10:27:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/AndrychowiczDDF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DziembowskiFS15,
  author       = {Stefan Dziembowski and
                  Sebastian Faust and
                  Maciej Skorski},
  editor       = {Elisabeth Oswald and
                  Marc Fischlin},
  title        = {Noisy Leakage Revisited},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9057},
  pages        = {159--188},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46803-6\_6},
  doi          = {10.1007/978-3-662-46803-6\_6},
  timestamp    = {Thu, 14 Oct 2021 09:58:15 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DziembowskiFS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DucFS15,
  author       = {Alexandre Duc and
                  Sebastian Faust and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Elisabeth Oswald and
                  Marc Fischlin},
  title        = {Making Masking Security Proofs Concrete - Or How to Evaluate the Security
                  of Any Leaking Device},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9056},
  pages        = {401--429},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46800-5\_16},
  doi          = {10.1007/978-3-662-46800-5\_16},
  timestamp    = {Thu, 14 Oct 2021 09:58:16 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DucFS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BalaschFG15,
  author       = {Josep Balasch and
                  Sebastian Faust and
                  Benedikt Gierlichs},
  editor       = {Elisabeth Oswald and
                  Marc Fischlin},
  title        = {Inner Product Masking Revisited},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9056},
  pages        = {486--510},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46800-5\_19},
  doi          = {10.1007/978-3-662-46800-5\_19},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BalaschFG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/DamgardFMV15,
  author       = {Ivan Damg{\aa}rd and
                  Sebastian Faust and
                  Pratyay Mukherjee and
                  Daniele Venturi},
  editor       = {Anja Lehmann and
                  Stefan Wolf},
  title        = {The Chaining Lemma and Its Application},
  booktitle    = {Information Theoretic Security - 8th International Conference, {ICITS}
                  2015, Lugano, Switzerland, May 2-5, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9063},
  pages        = {181--196},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-17470-9\_11},
  doi          = {10.1007/978-3-319-17470-9\_11},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/DamgardFMV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FaustMNV15,
  author       = {Sebastian Faust and
                  Pratyay Mukherjee and
                  Jesper Buus Nielsen and
                  Daniele Venturi},
  editor       = {Jonathan Katz},
  title        = {A Tamper and Leakage Resilient von Neumann Architecture},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {579--603},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_26},
  doi          = {10.1007/978-3-662-46447-2\_26},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/FaustMNV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BalaschFG15,
  author       = {Josep Balasch and
                  Sebastian Faust and
                  Benedikt Gierlichs},
  title        = {Inner Product Masking Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {105},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/105},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BalaschFG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DucFS15,
  author       = {Alexandre Duc and
                  Sebastian Faust and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Making Masking Security Proofs Concrete Or How to Evaluate the Security
                  of any Leaking Device},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {119},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/119},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DucFS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrossoSF15,
  author       = {Vincent Grosso and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Sebastian Faust},
  title        = {Masking vs. Multiparty Computation: How Large is the Gap for AES?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {492},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/492},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrossoSF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaustMV15,
  author       = {Sebastian Faust and
                  Daniel Masny and
                  Daniele Venturi},
  title        = {Chosen-Ciphertext Security from Subset Sum},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1223},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1223},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FaustMV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/GrossoSF14,
  author       = {Vincent Grosso and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Sebastian Faust},
  title        = {Masking vs. multiparty computation: how large is the gap for AES?},
  journal      = {J. Cryptogr. Eng.},
  volume       = {4},
  number       = {1},
  pages        = {47--57},
  year         = {2014},
  url          = {https://doi.org/10.1007/s13389-014-0073-y},
  doi          = {10.1007/S13389-014-0073-Y},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/GrossoSF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/FaustRRTV14,
  author       = {Sebastian Faust and
                  Tal Rabin and
                  Leonid Reyzin and
                  Eran Tromer and
                  Vinod Vaikuntanathan},
  title        = {Protecting Circuits from Computationally Bounded and Noisy Leakage},
  journal      = {{SIAM} J. Comput.},
  volume       = {43},
  number       = {5},
  pages        = {1564--1614},
  year         = {2014},
  url          = {https://doi.org/10.1137/120880343},
  doi          = {10.1137/120880343},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/FaustRRTV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/FaustMVW14,
  author       = {Sebastian Faust and
                  Pratyay Mukherjee and
                  Daniele Venturi and
                  Daniel Wichs},
  editor       = {Phong Q. Nguyen and
                  Elisabeth Oswald},
  title        = {Efficient Non-malleable Codes and Key-Derivation for Poly-size Tampering
                  Circuits},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Copenhagen, Denmark, May 11-15, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8441},
  pages        = {111--128},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55220-5\_7},
  doi          = {10.1007/978-3-642-55220-5\_7},
  timestamp    = {Thu, 14 Oct 2021 09:58:16 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/FaustMVW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DucDF14,
  author       = {Alexandre Duc and
                  Stefan Dziembowski and
                  Sebastian Faust},
  editor       = {Phong Q. Nguyen and
                  Elisabeth Oswald},
  title        = {Unifying Leakage Models: From Probing Attacks to Noisy Leakage},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Copenhagen, Denmark, May 11-15, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8441},
  pages        = {423--440},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55220-5\_24},
  doi          = {10.1007/978-3-642-55220-5\_24},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DucDF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/FaustMNV14,
  author       = {Sebastian Faust and
                  Pratyay Mukherjee and
                  Jesper Buus Nielsen and
                  Daniele Venturi},
  editor       = {Yehuda Lindell},
  title        = {Continuous Non-malleable Codes},
  booktitle    = {Theory of Cryptography - 11th Theory of Cryptography Conference, {TCC}
                  2014, San Diego, CA, USA, February 24-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8349},
  pages        = {465--488},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54242-8\_20},
  doi          = {10.1007/978-3-642-54242-8\_20},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/FaustMNV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DucDF14,
  author       = {Alexandre Duc and
                  Stefan Dziembowski and
                  Sebastian Faust},
  title        = {Unifying Leakage Models: from Probing Attacks to Noisy Leakage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {79},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/079},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DucDF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaustMNV14,
  author       = {Sebastian Faust and
                  Pratyay Mukherjee and
                  Jesper Buus Nielsen and
                  Daniele Venturi},
  title        = {Continuous Non-malleable Codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {173},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/173},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FaustMNV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaustMNV14a,
  author       = {Sebastian Faust and
                  Pratyay Mukherjee and
                  Jesper Buus Nielsen and
                  Daniele Venturi},
  title        = {A Tamper and Leakage Resilient Random Access Machine},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {338},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/338},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FaustMNV14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaustHV14a,
  author       = {Sebastian Faust and
                  Carmit Hazay and
                  Daniele Venturi},
  title        = {Outsourced Pattern Matching},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {662},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/662},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FaustHV14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardFMV14,
  author       = {Ivan Damg{\aa}rd and
                  Sebastian Faust and
                  Pratyay Mukherjee and
                  Daniele Venturi},
  title        = {The Chaining Lemma and its application},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {979},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/979},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardFMV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DamgardFMV13,
  author       = {Ivan Damg{\aa}rd and
                  Sebastian Faust and
                  Pratyay Mukherjee and
                  Daniele Venturi},
  editor       = {Kazue Sako and
                  Palash Sarkar},
  title        = {Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Bengaluru, India, December 1-5, 2013, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8270},
  pages        = {140--160},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-42045-0\_8},
  doi          = {10.1007/978-3-642-42045-0\_8},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/DamgardFMV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GrossoSF13,
  author       = {Vincent Grosso and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Sebastian Faust},
  editor       = {Guido Bertoni and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Masking vs. Multiparty Computation: How Large Is the Gap for AES?},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International
                  Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8086},
  pages        = {400--416},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40349-1\_23},
  doi          = {10.1007/978-3-642-40349-1\_23},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GrossoSF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/FaustHV13,
  author       = {Sebastian Faust and
                  Carmit Hazay and
                  Daniele Venturi},
  editor       = {Fedor V. Fomin and
                  Rusins Freivalds and
                  Marta Z. Kwiatkowska and
                  David Peleg},
  title        = {Outsourced Pattern Matching},
  booktitle    = {Automata, Languages, and Programming - 40th International Colloquium,
                  {ICALP} 2013, Riga, Latvia, July 8-12, 2013, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7966},
  pages        = {545--556},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39212-2\_48},
  doi          = {10.1007/978-3-642-39212-2\_48},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/FaustHV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardFMV13a,
  author       = {Ivan Damg{\aa}rd and
                  Sebastian Faust and
                  Pratyay Mukherjee and
                  Daniele Venturi},
  title        = {Bounded Tamper Resilience: How to go beyond the Algebraic Barrier},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {677},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/677},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardFMV13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaustMVW13,
  author       = {Sebastian Faust and
                  Pratyay Mukherjee and
                  Daniele Venturi and
                  Daniel Wichs},
  title        = {Efficient Non-Malleable Codes and Key-Derivation for Poly-Size Tampering
                  Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {702},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/702},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FaustMVW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DziembowskiFKP13,
  author       = {Stefan Dziembowski and
                  Sebastian Faust and
                  Vladimir Kolmogorov and
                  Krzysztof Pietrzak},
  title        = {Proofs of Space},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {796},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/796},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DziembowskiFKP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/FaustHNNZ12,
  author       = {Sebastian Faust and
                  Carmit Hazay and
                  Jesper Buus Nielsen and
                  Peter Sebastian Nordholt and
                  Angela Zottarel},
  editor       = {Xiaoyun Wang and
                  Kazue Sako},
  title        = {Signature Schemes Secure against Hard-to-Invert Leakage},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Beijing, China, December 2-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7658},
  pages        = {98--115},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34961-4\_8},
  doi          = {10.1007/978-3-642-34961-4\_8},
  timestamp    = {Mon, 25 Nov 2019 15:32:14 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/FaustHNNZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BalaschFGV12,
  author       = {Josep Balasch and
                  Sebastian Faust and
                  Benedikt Gierlichs and
                  Ingrid Verbauwhede},
  editor       = {Xiaoyun Wang and
                  Kazue Sako},
  title        = {Theory and Practice of a Leakage Resilient Masking Scheme},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Beijing, China, December 2-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7658},
  pages        = {758--775},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34961-4\_45},
  doi          = {10.1007/978-3-642-34961-4\_45},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BalaschFGV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/FaustPS12,
  author       = {Sebastian Faust and
                  Krzysztof Pietrzak and
                  Joachim Schipper},
  editor       = {Emmanuel Prouff and
                  Patrick Schaumont},
  title        = {Practical Leakage-Resilient Symmetric Cryptography},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International
                  Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7428},
  pages        = {213--232},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33027-8\_13},
  doi          = {10.1007/978-3-642-33027-8\_13},
  timestamp    = {Mon, 15 Jun 2020 17:09:16 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/FaustPS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/FaustKMV12,
  author       = {Sebastian Faust and
                  Markulf Kohlweiss and
                  Giorgia Azzurra Marson and
                  Daniele Venturi},
  editor       = {Steven D. Galbraith and
                  Mridul Nandi},
  title        = {On the Non-malleability of the Fiat-Shamir Transform},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2012, 13th International Conference
                  on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7668},
  pages        = {60--79},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34931-7\_5},
  doi          = {10.1007/978-3-642-34931-7\_5},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/FaustKMV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DamgardFH12,
  author       = {Ivan Damg{\aa}rd and
                  Sebastian Faust and
                  Carmit Hazay},
  editor       = {Ronald Cramer},
  title        = {Secure Two-Party Computation with Low Communication},
  booktitle    = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC}
                  2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7194},
  pages        = {54--74},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28914-9\_4},
  doi          = {10.1007/978-3-642-28914-9\_4},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/DamgardFH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DziembowskiF12,
  author       = {Stefan Dziembowski and
                  Sebastian Faust},
  editor       = {Ronald Cramer},
  title        = {Leakage-Resilient Circuits without Computational Assumptions},
  booktitle    = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC}
                  2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7194},
  pages        = {230--247},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28914-9\_13},
  doi          = {10.1007/978-3-642-28914-9\_13},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/DziembowskiF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaustHNNZ12,
  author       = {Sebastian Faust and
                  Carmit Hazay and
                  Jesper Buus Nielsen and
                  Peter Sebastian Nordholt and
                  Angela Zottarel},
  title        = {Signature Schemes Secure against Hard-to-Invert Leakage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {45},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/045},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FaustHNNZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaustKMV12,
  author       = {Sebastian Faust and
                  Markulf Kohlweiss and
                  Giorgia Azzurra Marson and
                  Daniele Venturi},
  title        = {On the Non-malleability of the Fiat-Shamir Transform},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {704},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/704},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FaustKMV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DziembowskiF11,
  author       = {Stefan Dziembowski and
                  Sebastian Faust},
  editor       = {Dong Hoon Lee and
                  Xiaoyun Wang},
  title        = {Leakage-Resilient Cryptography from the Inner-Product Extractor},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Seoul, South Korea, December 4-8, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7073},
  pages        = {702--721},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25385-0\_38},
  doi          = {10.1007/978-3-642-25385-0\_38},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/DziembowskiF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/FaustPV11,
  author       = {Sebastian Faust and
                  Krzysztof Pietrzak and
                  Daniele Venturi},
  editor       = {Luca Aceto and
                  Monika Henzinger and
                  Jir{\'{\i}} Sgall},
  title        = {Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience},
  booktitle    = {Automata, Languages and Programming - 38th International Colloquium,
                  {ICALP} 2011, Zurich, Switzerland, July 4-8, 2011, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6755},
  pages        = {391--402},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22006-7\_33},
  doi          = {10.1007/978-3-642-22006-7\_33},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/FaustPV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaustPV11,
  author       = {Sebastian Faust and
                  Krzysztof Pietrzak and
                  Daniele Venturi},
  title        = {Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {314},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/314},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FaustPV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardFH11,
  author       = {Ivan Damg{\aa}rd and
                  Sebastian Faust and
                  Carmit Hazay},
  title        = {Secure Two-Party Computation with Low Communication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {508},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/508},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardFH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DziembowskiF11,
  author       = {Stefan Dziembowski and
                  Sebastian Faust},
  title        = {Leakage-Resilient Cryptography From the Inner-Product Extractor},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {519},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/519},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DziembowskiF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/FaustRRTV10,
  author       = {Sebastian Faust and
                  Tal Rabin and
                  Leonid Reyzin and
                  Eran Tromer and
                  Vinod Vaikuntanathan},
  editor       = {Henri Gilbert},
  title        = {Protecting Circuits from Leakage: the Computationally-Bounded and
                  Noisy Cases},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Monaco / French Riviera, May 30 - June 3, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6110},
  pages        = {135--156},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13190-5\_7},
  doi          = {10.1007/978-3-642-13190-5\_7},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/FaustRRTV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/FaustKPR10,
  author       = {Sebastian Faust and
                  Eike Kiltz and
                  Krzysztof Pietrzak and
                  Guy N. Rothblum},
  editor       = {Daniele Micciancio},
  title        = {Leakage-Resilient Signatures},
  booktitle    = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  pages        = {343--360},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2\_21},
  doi          = {10.1007/978-3-642-11799-2\_21},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/FaustKPR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaustKPR09,
  author       = {Sebastian Faust and
                  Eike Kiltz and
                  Krzysztof Pietrzak and
                  Guy N. Rothblum},
  title        = {Leakage-Resilient Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {282},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/282},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FaustKPR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaustRT09,
  author       = {Sebastian Faust and
                  Leonid Reyzin and
                  Eran Tromer},
  title        = {Protecting Circuits from Computationally-Bounded Leakage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {379},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/379},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FaustRT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FaustKL08,
  author       = {Sebastian Faust and
                  Emilia K{\"{a}}sper and
                  Stefan Lucks},
  editor       = {Ronald Cramer},
  title        = {Efficient Simultaneous Broadcast},
  booktitle    = {Public Key Cryptography - {PKC} 2008, 11th International Workshop
                  on Practice and Theory in Public-Key Cryptography, Barcelona, Spain,
                  March 9-12, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4939},
  pages        = {180--196},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78440-1\_11},
  doi          = {10.1007/978-3-540-78440-1\_11},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/FaustKL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/DanezisDFKTP07,
  author       = {George Danezis and
                  Claudia D{\'{\i}}az and
                  Sebastian Faust and
                  Emilia K{\"{a}}sper and
                  Carmela Troncoso and
                  Bart Preneel},
  editor       = {Juan A. Garay and
                  Arjen K. Lenstra and
                  Masahiro Mambo and
                  Ren{\'{e}} Peralta},
  title        = {Efficient Negative Databases from Cryptographic Hash Functions},
  booktitle    = {Information Security, 10th International Conference, {ISC} 2007, Valpara{\'{\i}}so,
                  Chile, October 9-12, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4779},
  pages        = {423--436},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75496-1\_28},
  doi          = {10.1007/978-3-540-75496-1\_28},
  timestamp    = {Fri, 03 Feb 2023 21:39:19 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/DanezisDFKTP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/KohlweissFFGP07,
  author       = {Markulf Kohlweiss and
                  Sebastian Faust and
                  Lothar Fritsch and
                  Bartek Gedrojc and
                  Bart Preneel},
  editor       = {Nikita Borisov and
                  Philippe Golle},
  title        = {Efficient Oblivious Augmented Maps: Location-Based Services with a
                  Payment Broker},
  booktitle    = {Privacy Enhancing Technologies, 7th International Symposium, {PET}
                  2007 Ottawa, Canada, June 20-22, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4776},
  pages        = {77--94},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75551-7\_6},
  doi          = {10.1007/978-3-540-75551-7\_6},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/KohlweissFFGP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics