Chris Brzuska
Chris Brzuska
Verified email at aalto.fi - Homepage
Title
Cited by
Cited by
Year
Security of sanitizable signatures revisited
C Brzuska, M Fischlin, T Freudenreich, A Lehmann, M Page, J Schelbert, ...
International Workshop on Public Key Cryptography, 317-336, 2009
1412009
Physically uncloneable functions in the universal composition framework
C Brzuska, M Fischlin, H Schröder, S Katzenbeisser
Annual Cryptology Conference, 51-70, 2011
1292011
Redactable signatures for tree-structured data: definitions and constructions
C Brzuska, H Busch, O Dagdelen, M Fischlin, M Franz, S Katzenbeisser, ...
International Conference on Applied Cryptography and Network Security, 87-104, 2010
1182010
Unlinkability of sanitizable signatures
C Brzuska, M Fischlin, A Lehmann, D Schröder
International Workshop on Public Key Cryptography, 444-461, 2010
892010
Composability of Bellare-Rogaway key exchange protocols
C Brzuska, M Fischlin, B Warinschi, SC Williams
Proceedings of the 18th ACM conference on Computer and communications …, 2011
662011
Less is more: Relaxed yet composable security notions for key exchange
C Brzuska, M Fischlin, NP Smart, B Warinschi, SC Williams
International Journal of Information Security 12 (4), 267-297, 2013
592013
Indistinguishability obfuscation and UCEs: The case of computationally unpredictable sources
C Brzuska, P Farshim, A Mittelbach
Annual Cryptology Conference, 188-205, 2014
472014
Non-interactive public accountability for sanitizable signatures
C Brzuska, HC Pöhls, K Samelin
European Public Key Infrastructure Workshop, 178-193, 2012
462012
Downgrade resilience in key-exchange protocols
K Bhargavan, C Brzuska, C Fournet, M Green, M Kohlweiss, ...
2016 IEEE Symposium on Security and Privacy (SP), 506-525, 2016
422016
An analysis of the EMV channel establishment protocol
C Brzuska, NP Smart, B Warinschi, GJ Watson
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
372013
Efficient and perfectly unlinkable sanitizable signatures without group signatures
C Brzuska, HC Pöhls, K Samelin
European Public Key Infrastructure Workshop, 12-30, 2013
352013
Indistinguishability obfuscation versus multi-bit point obfuscation with auxiliary input
C Brzuska, A Mittelbach
International Conference on the Theory and Application of Cryptology and …, 2014
312014
Notions of black-box reductions, revisited
P Baecher, C Brzuska, M Fischlin
International Conference on the Theory and Application of Cryptology and …, 2013
302013
Using indistinguishability obfuscation via UCEs
C Brzuska, A Mittelbach
International Conference on the Theory and Application of Cryptology and …, 2014
292014
Sanitizable signatures: How to partially delegate control for authenticated data
C Brzuska, M Fischlin, A Lehmann, D Schröder
BIOSIG 2009: biometrics and electronic signatures, 2009
292009
Random-oracle uninstantiability from indistinguishability obfuscation
C Brzuska, P Farshim, A Mittelbach
Theory of Cryptography Conference, 428-455, 2015
222015
On the foundations of key exchange
C Brzuska
Technische Universität, 2013
202013
Safely exporting keys from secure channels
C Brzuska, H Jacobsen, D Stebila
Annual International Conference on the Theory and Applications of …, 2016
192016
On basing size-verifiable one-way functions on NP-hardness
A Bogdanov, C Brzuska
Theory of Cryptography Conference, 1-6, 2015
172015
White-box cryptography: don’t forget about grey-box attacks
EA Bock, JW Bos, C Brzuska, C Hubain, W Michiels, C Mune, ...
Journal of Cryptology 32 (4), 1095-1143, 2019
162019
The system can't perform the operation now. Try again later.
Articles 1–20