Uhlenbrock, L., Moussa, D., Simmler, M., Canova, G., & Rieß, C. (2024). Synthetische Bilddaten vor Gericht. Datenschutz und Datensicherheit.
2023
Bajramovic, E., Fein, C., Frinken, M., Rösler, P., & Freiling, F. (2023). LAVA: Log Authentication and Verification Algorithm. In ACM (Eds.), Proceedings of the 12th International Conference on IT Security Incident Management & IT Forensics (IMF 2023). Munich, Germany.
Chow, S.S.M., Egger, C., Lai, R.W.F., Woo, I.K.Y., & Ronge, V. (2023). On Sustainable Ring-based Anonymous Systems. In Proceedings of the 36th IEEE Computer Security Foundations Symposium. Dubrovnik, HR.
Chu, T.T.H., Gerhart, P., Ruffing, T., & Schröder, D. (2023). Practical Schnorr Threshold Signatures Without the Algebraic Group Model. In Helena Handschuh, Anna Lysyanskaya (Eds.), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 743-773). Santa Barbara, CA, USA: Springer Science and Business Media Deutschland GmbH.
Chu, T.T.H., Fiore, D., Kolonelos, D., & Schröder, D. (2022). Inner Product Functional Commitments with Constant-Size Public Parameters and Openings. In Clemente Galdi, Stanislaw Jarecki (Eds.), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 639-662). Amalfi, IT: Springer Science and Business Media Deutschland GmbH.
Ruffing, T., Ronge, V., Jin, E., Schneider-Bensch, J., & Schröder, D. (2022). ROAST: Robust Asynchronous Schnorr Threshold Signatures. In Heng Yin, Angelos Stavrou (Eds.), CCS '22 (pp. 2551–2564). Los Angeles, US: New York, NY, United States: Association for Computing Machinery.
Albrecht, M.R., & Lai, R.W.F. (2021). Subtractive Sets over Cyclotomic Rings: Limits of Schnorr-Like Arguments over Lattices. In Tal Malkin, Chris Peikert (Eds.), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 519-548). Virtual, Online: Springer Science and Business Media Deutschland GmbH.
Deuber, D., & Schröder, D. (2021). CoinJoin in the Wild - An Empirical Analysis in Dash. In Bertino E, Shulman H, Waidner M (Eds.), Computer Security - ESORICS 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part II (pp. 461--480). online: Springer.
Graf, M., Rausch, D., Ronge, V., Egger, C., Küsters, R., & Schröder, D. (2021). A Security Framework for Distributed Ledgers. In Kim Y, Kim J, Vigna G, Shi E (Eds.), CCS '21 (pp. 1043--1064). Virtual Event, KR: New YorkNYUnited States: Association for Computing Machinery.
Ishai, Y., Lai, R.W.F., & Malavolta, G. (2021). A Geometric Approach to Homomorphic Secret Sharing. In Juan A. Garay (Eds.), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 92-119). Online: Springer Science and Business Media Deutschland GmbH.
Tao, C., Petzoldt, A., & Ding, J. (2021). Efficient Key Recovery for All HFE Signature Variants. In ADVANCES IN CRYPTOLOGY (CRYPTO 2021), PT I (pp. 70-93). , ELECTR NETWORK: CHAM: SPRINGER INTERNATIONAL PUBLISHING AG.
Thyagarajan, S.A.K., Bhat, A., Magri, B., Tschudi, D., & Kate, A. (2021). Reparo: Publicly Verifiable Layer to Repair Blockchains. In Nikita Borisov, Claudia Diaz (Eds.), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 37-56). Virtual, Online: Springer Science and Business Media Deutschland GmbH.
Thyagarajan, S.A.K., Castagnos, G., Laguillaumie, F., & Malavolta, G. (2021). Efficient CCA Timed Commitments in Class Groups. In Proceedings of the ACM Conference on Computer and Communications Security (pp. 2663-2684). Online, KR: Association for Computing Machinery.
Thyagarajan, S.A.K., Gong, T., Bhat, A., Kate, A., & Schröder, D. (2021). OpenSquare: Decentralized Repeated Modular Squaring Service. In Proceedings of the ACM Conference on Computer and Communications Security (pp. 3447-3464). Virtual, Online, KOR: Association for Computing Machinery.
Yin, H.H.E., Wang, X., Ng, K.H., Lai, R.W.F., Ng, L.K.L., & Ma, J.P.K. (2021). On Multi-Channel Huffman Codes for Asymmetric-Alphabet Channels. In 2021 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT) (pp. 2024-2029). , ELECTR NETWORK: NEW YORK: IEEE.
Brost, J., Egger, C., Lai, R.W.F., Schmid, F., Schröder, D., & Zoppelt, M. (2020). Threshold Password-Hardened Encryption Services. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (pp. 409–424). Virtual Event, USA: New York, NY, USA: Association for Computing Machinery.
Deuber, D., Döttling, N., Magri, B., Malavolta, G., & Thyagarajan, S.A.K. (2020). Minting Mechanism for Proof of Stake Blockchains. In Applied Cryptography and Network Security - 18th International Conference, ACNS 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part I (pp. 315-334).
Ding, J., Petzoldt, A., & Schmidt, D.S. (2020). Hidden field equations. In Jintai Ding, Albrecht Petzoldt, Dieter S. Schmidt (Eds.), Multivariate Public Key Cryptosystems. (pp. 61-88). New York: Springer.
Ding, J., Petzoldt, A., & Schmidt, D.S. (2020). Multivariate cryptography. In Jintai Ding, Albrecht Petzoldt, Dieter S. Schmidt (Eds.), Multivariate Public Key Cryptosystems. (pp. 7-23). Springer.
Ding, J., Petzoldt, A., & Schmidt, D.S. (2020). Oil and vinegar. In Jintai Ding, Albrecht Petzoldt, Dieter S. Schmidt (Eds.), Multivariate Public Key Cryptosystems. (pp. 89-151). New York: Springer.
Ding, J., Petzoldt, A., & Schmidt, D.S. (2020). Solving polynomial systems. In Jintai Ding, Albrecht Petzoldt, Dieter S. Schmidt (Eds.), Multivariate Public Key Cryptosystems. (pp. 185-248). New York: Springer.
Ding, J., Petzoldt, A., & Schmidt, D.S. (2020). The matsumoto-imai cryptosystem. In Advances in Information Security. (pp. 25-60). Springer.
Ding, J., Petzoldt, A., & Schmidt, D.S. (2020). The simplematrix encryption scheme. In Advances in Information Security. (pp. 169-183). Springer.
Griebel, L., Hinderer, M., Amr, A., Meder, B., Schweig, M., Deuber, D.,... Prokosch, H.-U. (2020). The Patient as Genomic Data Manager - Evaluation of the PROMISE App. In Louise B. Pape-Haugaard, Christian Lovis, Inge Cort Madsen, Patrick Weber, Per Hostrup Nielsen, Philip Scott (Eds.), Digital Personalized Health and Medicine. (pp. 1061-1065). Amsterdam, Berlin, Washington: IOS Press.
Petzoldt, A. (2020). Efficient Key Generation for Rainbow. In Jintai Ding, Jean-Pierre Tillich (Eds.), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 92-107). Paris, FR: Springer.
Rösler, P. (2020). Combiners for AEAD. IACR Transactions on Symmetric Cryptology.
Thyagarajan, S.A.K., Bhat, A., Malavolta, G., Döttling, N., Kate, A., & Schröder, D. (2020). Verifiable Timed Signatures Made Practical. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (pp. 1733–1750). Virtual event: New York, NY, USA: Association for Computing Machinery.
Dottling, N., Garg, S., Ishai, Y., Malavolta, G., Mour, T., & Ostrovsky, R. (2019). Trapdoor Hash Functions and Their Applications. In ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT III (pp. 3-32). Santa Barbara, CA: CHAM: SPRINGER INTERNATIONAL PUBLISHING AG.
Döttling, N., Lai, R.W.F., & Malavolta, G. (2019). Incremental proofs of sequential work. In Yuval Ishai, Vincent Rijmen (Eds.), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 292-323). Darmstadt, DE: Springer Verlag.
Lai, R.W.F., & Malavolta, G. (2019). Subvector Commitments with Application to Succinct Arguments. In Daniele Micciancio, Alexandra Boldyreva (Eds.), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 530-560). Santa Barbara, CA, US: Springer Verlag.
Lai, R.W.F., Ronge, V., Ruffing, T., Schröder, D., Thyagarajan, S.A.K., & Wang, J. (2019). Omniring: Scaling Private Payments Without Trusted Setup. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (pp. 31-48). London, GB.
Malavolta, G., & Thyagarajan, S.A.K. (2019). Homomorphic Time-Lock Puzzles and Applications. In Daniele Micciancio, Alexandra Boldyreva (Eds.), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 620-649). Santa Barbara, CA, US: Springer Verlag.
Yin, H.H., Ng, K.H., Shing, Y.T., Lai, R.W.F., & Wang, X. (2019). Decision Procedure for the Existence of Two-Channel Prefix-Free Codes. In IEEE International Symposium on Information Theory - Proceedings (pp. 1522-1526). Paris, FRA: Institute of Electrical and Electronics Engineers Inc..
Katz, J., Maffei, M., Malavolta, G., & Schröder, D. (2017). Subset Predicate Encryption and its Applications. In Proceedings of the 16th International Conference on Cryptology and Network Security (CANS). Hong Kong: Hong Kong.
Lai, R.W.F., Egger, C., Schröder, D., & Chow, S.S. (2017). Phoenix: Rebirth of a Cryptographic Password-Hardening Service. In 26th USENIX Security Symposium (USENIX Security 17) (pp. 899--916). Vancouver, BC, CA: 2560 Ninth Street, Suite 215
Berkeley, CA 94710
USA: USENIX Association.
Maffei, M., Malavolta, G., Reinert, M., & Schröder, D. (2017). Maliciously Secure Multi-Client ORAM. In International Conference on Applied Cryptography and Network Security (ACNS). Kanazawa, JP.
Malavolta, G., Moreno-Sanchez, P., Kate, A., & Maffei, M. (2017). Concurrency and Privacy with Payment-Channel Networks. In Proceedings of the 24th ACM Conference on Computer and Communications Security (CCS). Dallas, USA: Dallas, USA.
Malavolta, G., & Schröder, D. (2017). Efficient Ring Signatures in the Standard Model. In Proceedings of the 23rd Annual International Conference on the Theory and Applications of Cryptology and Information Security (ASIACRYPT). Hong Kong.
Hausmann, D., Schröder, L., & Egger, C. (2016). Global Caching for the Alternation-free Coalgebraic mu-calculus. In Proceedings of the 27th International Conference on Concurrency Theory, CONCUR 2016 (pp. 34:1-34:15). Québec City, Canada: Dagstuhl: Schloss Dagstuhl - Leibniz-Zentrum für Informatik.
Ateniese, G., Magri, B., & Venturi, D. (2015). Subversion-resilient signature schemes. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS 2015 (pp. 364-375). Association for Computing Machinery.
Maffei, M., Malavolta, G., Reinert, M., Schröder, D., & Malavolta, G. (2015). Privacy and access control for outsourced personal records. In Proceedings of the 36th IEEE Symposium on Security and Privacy, SP 2015 (pp. 341-358). Institute of Electrical and Electronics Engineers Inc..
Schröder, D., & Simkin, M. (2015). VeriStream - A Framework for Verifiable Data Streaming. In Financial Cryptography and Data Security - 19th International Conference, {FC} 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers (pp. 548--566).
2014
Ateniese, G., Faonio, A., Magri, B., & De Medeiros, B. (2014). Certified bitcoins. Springer Verlag.
Krupp, J., Schröder, D., & Simkin, M. (2014). Enhancing security and privacy with Google glass. In Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014 (pp. 1445-1447). Association for Computing Machinery.
Egger, C., Schlumberger, J., Kruegel, C., & Vigna, G. (2013). Practical attacks against the I2P network. In Proceedings of the 16th International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2013 (pp. 432-451). Rodney Bay.
Schröder, D., & Schröder, H. (2012). Verifiable data streaming. In Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS 2012 (pp. 953-964). Raleigh, NC.
Baecher, P., Fischlin, M., Gordon, L., Langenberg, R., Lützow, M., & Schröder, D. (2010). CAPTCHAs: The good, the bad, and the ugly. In Proceedings of the Sicherheit 2010 - Sicherheit, Schutz und Zuverlassigkeit Beitrage der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft fur Informatik e.V. (GI) - 5th Annual Conference of the Department of Security of the Society for Informatics (pp. 353-365). Berlin.
Rückert, M., & Schröder, D. (2009). Security of Verifiably Encrypted Signatures. In International Conference on Pairing-based Cryptography (pp. 27). Stanford University, US.