Folgen
Arno Mittelbach
Arno Mittelbach
Zugehörigkeit unbekannt
Bestätigte E-Mail-Adresse bei arno-mittelbach.de
Titel
Zitiert von
Zitiert von
Jahr
Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources
C Brzuska, P Farshim, A Mittelbach
CRYPTO 2014, 188-205, 2014
552014
Indistinguishability obfuscation versus multi-bit point obfuscation with auxiliary input
C Brzuska, A Mittelbach
International Conference on the Theory and Application of Cryptology and …, 2014
362014
Using Indistinguishability Obfuscation via UCEs
C Brzuska, A Mittelbach
362014
Salvaging Indifferentiability in a Multi-stage Setting
A Mittelbach
EUROCRYPT 2014, 603-621, 2014
292014
Random-oracle uninstantiability from indistinguishability obfuscation
C Brzuska, P Farshim, A Mittelbach
Theory of Cryptography Conference, 428-455, 2015
272015
A cryptographic analysis of OPACITY
Ö Dagdelen, M Fischlin, T Gagliardoni, GA Marson, A Mittelbach, C Onete
European Symposium on Research in Computer Security, 345-362, 2013
182013
Fiat–Shamir for highly sound protocols is instantiable
A Mittelbach, D Venturi
Theoretical Computer Science 740, 28-62, 2018
162018
Automatic detection of local reuse
A Mittelbach, L Lehmann, C Rensing, R Steinmetz
European Conference on Technology Enhanced Learning, 229-244, 2010
152010
Universal computational extractors and the superfluous padding assumption for indistinguishability obfuscation
C Brzuska, A Mittelbach
Cryptology ePrint Archive, 2015
122015
Unpicking PLAID
JP Degabriele, V Fehr, M Fischlin, T Gagliardoni, F Günther, GA Marson, ...
International Conference on Research in Security Standardisation, 1-25, 2014
122014
Reset Indifferentiability and its Consequences
P Baecher, C Brzuska, A MIttelbach
Advances in Cryptology-ASIACRYPT 2013, 154-173, 2013
112013
Modeling random oracles under unpredictable queries
P Farshim, A Mittelbach
International Conference on Fast Software Encryption, 453-473, 2016
82016
Hash combiners for second pre-image resistance, target collision resistance and pre-image resistance have long output
A Mittelbach
International Conference on Security and Cryptography for Networks, 522-539, 2012
82012
Cryptophia’s short combiner for collision-resistant hash functions
A Mittelbach
International Conference on Applied Cryptography and Network Security, 136-153, 2013
72013
The Holinshed Project: Comparing and linking two editions of Holinshed's Chronicle
J Cummings, A Mittelbach
International Journal of Humanities and Arts Computing 4 (1-2), 39-53, 2010
72010
Roma: generating validators for the TEI
A Mittelbach, S Rahtz, I Bernevig
72007
Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol
JP Degabriele, V Fehr, M Fischlin, T Gagliardoni, F Günther, GA Marson, ...
International Journal of Information Security 15 (6), 637-657, 2016
52016
The Theory of Hash Functions and Random Oracles: An Approach to Modern Cryptography
A Mittelbach, M Fischlin
Springer, 2021
42021
An overview of the hybrid argument
M Fischlin, A Mittelbach
Cryptology ePrint Archive, 2021
32021
Random Oracles in the Standard Model
AA Mittelbach
Technische Universität, 2016
32016
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20