Follow
Björn Tackmann
Björn Tackmann
DFINITY
Verified email at dfinity.org
Title
Cited by
Cited by
Year
Universally Composable Synchronous Computation
J Katz, U Maurer, B Tackmann, V Zikas
Theory of Cryptography, 2013
2152013
The Multi-User Security of Authenticated Encryption: AES-GCM in TLS 1.3
M Bellare, B Tackmann
CRYPTO, 2016
1322016
Rational Protocol Design: Cryptography against Incentive-driven Adversaries
J Garay, J Katz, U Maurer, B Tackmann, V Zikas
Foundations of Computer Science, 2013
1032013
Causal boxes: quantum information-processing systems closed under composition
C Portmann, C Matt, U Maurer, R Renner, B Tackmann
IEEE Transactions on Information Theory, 2017
812017
Updatable Encryption with Post-Compromise Security
A Lehmann, B Tackmann
EUROCRYPT, 2018
802018
From Single-Bit to Multi-Bit Public-Key Encryption via Non-Malleable Codes
S Coretti, U Maurer, B Tackmann, D Venturi
Theory of Cryptography 9014 (324), 532-560, 2015
702015
On the Soundness of Authenticate-then-Encrypt: Formalizing the Malleability of Symmetric Encryption
U Maurer, B Tackmann
Proceedings of the 17th ACM conference on Computer and communications …, 2010
612010
Non-Malleable Encryption: Simpler, Shorter, Stronger
S Coretti, Y Dodis, B Tackmann, D Venturi
Theory of Cryptography, 2016
59*2016
Privacy-preserving auditable token payments in a permissioned blockchain system
E Androulaki, J Camenisch, A De Caro, M Dubovitskaya, K Elkhiyaoui, ...
59*
Asymmetric Distributed Trust
C Cachin, B Tackmann
arXiv preprint arXiv:1906.09314, 2019
512019
Secure event tickets on a blockchain
B Tackmann
Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS …, 2017
422017
Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer
C Badertscher, C Matt, U Maurer, P Rogaway, B Tackmann
International Conference on Provable Security, 2015
422015
Constructing Confidential Channels from Authenticated Channels---Public-Key Encryption Revisited
S Coretti, U Maurer, B Tackmann
Advances in Cryptology-ASIACRYPT, 2013
402013
Confidentiality and Integrity: A Constructive Perspective
U Maurer, A Rüedlinger, B Tackmann
Theory of Cryptography, 209-229, 2012
402012
Nonces are noticed: AEAD revisited
M Bellare, R Ng, B Tackmann
Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019
322019
Universal composition with global subroutines: Capturing global setup within plain UC
C Badertscher, R Canetti, J Hesse, B Tackmann, V Zikas
Theory of Cryptography Conference, 1-30, 2020
282020
De-Constructing TLS 1.3
M Kohlweiss, U Maurer, C Onete, B Tackmann, D Venturi
Proceedings of the 16th International Conference on Progress in Cryptology …, 2015
282015
How Fair is Your Protocol? A Utility-based Approach to Protocol Optimality
J Garay, J Katz, B Tackmann, V Zikas
Principles of Distributed Computing, 2015
282015
(De-) Constructing TLS
M Kohlweiss, U Maurer, C Onete, B Tackmann, D Venturi
282014
Anonymous Transactions with Revocation and Auditing in Hyperledger Fabric
D Bogatov, A De Caro, K Elkhiyaoui, B Tackmann
preprint, 23-26, 2020
272020
The system can't perform the operation now. Try again later.
Articles 1–20