Follow
Alexander Koch
Alexander Koch
IRIF, Université Paris Cité
Verified email at irif.fr
Title
Cited by
Cited by
Year
Card-based cryptographic protocols using a minimal number of cards
A Koch, S Walzer, K Härtel
International Conference on the Theory and Application of Cryptology and …, 2015
1082015
Foundations for actively secure card-based cryptography
A Koch, S Walzer
Cryptology ePrint Archive, 2017
612017
The minimum number of cards in practical card-based protocols
J Kastner, A Koch, S Walzer, D Miyahara, Y Hayashi, T Mizuki, H Sone
International Conference on the Theory and Application of Cryptology and …, 2017
602017
ConTra Corona: Contact Tracing against the Coronavirus by Bridging the Centralized-Decentralized Divide for Stronger Privacy.
W Beskorovajnov, F Dörre, G Hartung, A Koch, J Müller-Quade, T Strufe
IACR Cryptol. ePrint Arch. 2020, 505, 2020
552020
Fault-tolerant aggregate signatures
G Hartung, B Kaidel, A Koch, J Koch, A Rupp
Public-Key Cryptography–PKC 2016, 331-356, 2016
522016
Card-Based Cryptography Meets Formal Verification
A Koch, M Schrempp, M Kirsten
International Conference on the Theory and Application of Cryptology and …, 2019
372019
The Landscape of Optimal Card-based Protocols.
A Koch
IACR Cryptol. ePrint Arch. 2018, 951, 2018
352018
Cryptographic protocols from physical assumptions
A Koch
Karlsruhe Institute of Technology, Germany, 2019
252019
Practical and robust secure logging from fault-tolerant sequential aggregate signatures
G Hartung, B Kaidel, A Koch, J Koch, D Hartmann
International Conference on Provable Security, 87-106, 2017
212017
The Landscape of Security from Physical Assumptions1
A Koch
2021 IEEE Information Theory Workshop (ITW), 1-6, 2021
112021
Private Stream Aggregation with Labels in the Standard Model
J Ernst, A Koch
Proceedings on Privacy Enhancing Technologies 4, 117-138, 2021
92021
Private Function Evaluation with Cards
A Koch, S Walzer
New Generation Computing 40 (1), 115-147, 2022
82022
Your Money or Your Life—Modeling and Analyzing the Security of Electronic Payment in the UC Framework
D Achenbach, R Gröll, T Hackenjos, A Koch, B Löwe, J Mechler, ...
International Conference on Financial Cryptography and Data Security, 243-261, 2019
52019
Fortified Multi-Party Computation: Taking Advantage of Simple Secure Hardware Modules
B Broadnax, A Koch, J Mechler, T Müller, J Müller-Quade, M Nagel
Proceedings on Privacy Enhancing Technologies 4, 312-338, 2021
42021
Fortified Universal Composability: Taking Advantage of Simple Secure Hardware Modules.
B Broadnax, A Koch, J Mechler, T Müller, J Müller-Quade, M Nagel
IACR Cryptol. ePrint Arch. 2018, 519, 2018
42018
Graphs with plane outside-obstacle representations
A Koch, M Krug, I Rutter
arXiv preprint arXiv:1306.2978, 2013
32013
Check alternating patterns: a physical zero-knowledge proof for Moon-or-Sun
S Hand, A Koch, P Lafourcade, D Miyahara, L Robert
International Workshop on Security, 255-272, 2023
22023
Black-Box Accumulation Based on Lattices
SH Faller, P Baumer, M Klooß, A Koch, A Ottenhues, M Raiber
Cryptology ePrint Archive, 2021
12021
Contact Tracing against the Coronavirus by Bridging the Centralized–Decentralized Divide for Stronger Privacy
W Beskorovajnov, F Dörre, G Hartung, A Koch, J Müller-Quade, T Strufe
crypto day matters 32, 2021
12021
Efficient Private Stream Aggregation with Labels in the Standard Model
J Ernst, A Koch
crypto day matters 32, 2021
12021
The system can't perform the operation now. Try again later.
Articles 1–20