Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources C Brzuska, P Farshim, A Mittelbach CRYPTO 2014, 188-205, 2014 | 69 | 2014 |
The theory of hash functions and random oracles A Mittelbach, M Fischlin An Approach to Modern Cryptography, Cham: Springer Nature, 2021 | 49 | 2021 |
Using Indistinguishability Obfuscation via UCEs C Brzuska, A Mittelbach | 42 | 2014 |
Indistinguishability obfuscation versus multi-bit point obfuscation with auxiliary input C Brzuska, A Mittelbach Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014 | 39 | 2014 |
Random-oracle uninstantiability from indistinguishability obfuscation C Brzuska, P Farshim, A Mittelbach Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015 …, 2015 | 34 | 2015 |
Salvaging Indifferentiability in a Multi-stage Setting A Mittelbach EUROCRYPT 2014, 603-621, 2014 | 29 | 2014 |
A cryptographic analysis of OPACITY Ö Dagdelen, M Fischlin, T Gagliardoni, GA Marson, A Mittelbach, C Onete Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013 | 22 | 2013 |
An overview of the hybrid argument M Fischlin, A Mittelbach Cryptology ePrint Archive, 2021 | 18 | 2021 |
Fiat–Shamir for highly sound protocols is instantiable A Mittelbach, D Venturi Security and Cryptography for Networks: 10th International Conference, SCN …, 2016 | 17 | 2016 |
Automatic detection of local reuse A Mittelbach, L Lehmann, C Rensing, R Steinmetz Sustaining TEL: From Innovation to Learning and Practice: 5th European …, 2010 | 16 | 2010 |
Universal computational extractors and the superfluous padding assumption for indistinguishability obfuscation C Brzuska, A Mittelbach Cryptology ePrint Archive, 2015 | 13 | 2015 |
Unpicking PLAID: A Cryptographic Analysis of an ISO-Standards-Track Authentication Protocol JP Degabriele, V Fehr, M Fischlin, T Gagliardoni, F Günther, GA Marson, ... Security Standardisation Research: First International Conference, SSR 2014 …, 2014 | 13 | 2014 |
Reset Indifferentiability and its Consequences P Baecher, C Brzuska, A MIttelbach Advances in Cryptology-ASIACRYPT 2013, 154-173, 2013 | 10 | 2013 |
The Holinshed Project: Comparing and linking two editions of Holinshed's Chronicle J Cummings, A Mittelbach International Journal of Humanities and Arts Computing 4 (1-2), 39-53, 2010 | 9 | 2010 |
Modeling random oracles under unpredictable queries P Farshim, A Mittelbach International Conference on Fast Software Encryption, 453-473, 2016 | 8 | 2016 |
Cryptophia’s short combiner for collision-resistant hash functions A Mittelbach Applied Cryptography and Network Security: 11th International Conference …, 2013 | 8 | 2013 |
Hash combiners for second pre-image resistance, target collision resistance and pre-image resistance have long output A Mittelbach Security and Cryptography for Networks: 8th International Conference, SCN …, 2012 | 8 | 2012 |
Roma: generating validators for the TEI A Mittelbach, S Rahtz, I Bernevig | 7 | 2007 |
Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol JP Degabriele, V Fehr, M Fischlin, T Gagliardoni, F Günther, GA Marson, ... International Journal of Information Security 15, 637-657, 2016 | 5 | 2016 |
Random Oracles in the Standard Model AA Mittelbach Technische Universität Darmstadt, 2016 | 3 | 2016 |