Arno Mittelbach
Arno Mittelbach
Unknown affiliation
Verified email at
Cited by
Cited by
Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources
C Brzuska, P Farshim, A Mittelbach
CRYPTO 2014, 188-205, 2014
Indistinguishability obfuscation versus multi-bit point obfuscation with auxiliary input
C Brzuska, A Mittelbach
International Conference on the Theory and Application of Cryptology and …, 2014
Using Indistinguishability Obfuscation via UCEs
C Brzuska, A Mittelbach
Salvaging Indifferentiability in a Multi-stage Setting
A Mittelbach
EUROCRYPT 2014, 603-621, 2014
Random-oracle uninstantiability from indistinguishability obfuscation
C Brzuska, P Farshim, A Mittelbach
Theory of Cryptography Conference, 428-455, 2015
Automatic detection of local reuse
A Mittelbach, L Lehmann, C Rensing, R Steinmetz
European Conference on Technology Enhanced Learning, 229-244, 2010
Fiat–Shamir for highly sound protocols is instantiable
A Mittelbach, D Venturi
Theoretical Computer Science 740, 28-62, 2018
A cryptographic analysis of OPACITY
Ö Dagdelen, M Fischlin, T Gagliardoni, GA Marson, A Mittelbach, C Onete
European Symposium on Research in Computer Security, 345-362, 2013
Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol
JP Degabriele, V Fehr, M Fischlin, T Gagliardoni, F Günther, GA Marson, ...
International Journal of Information Security 15 (6), 637-657, 2016
Universal Computational Extractors and the Superfluous Padding Assumption for Indistinguishability Obfuscation.
C Brzuska, A Mittelbach
IACR Cryptol. ePrint Arch. 2015, 581, 2015
Reset Indifferentiability and its Consequences
P Baecher, C Brzuska, A MIttelbach
Advances in Cryptology-ASIACRYPT 2013, 154-173, 2013
Hash combiners for second pre-image resistance, target collision resistance and pre-image resistance have long output
A Mittelbach
International Conference on Security and Cryptography for Networks, 522-539, 2012
Modeling random oracles under unpredictable queries
P Farshim, A Mittelbach
International Conference on Fast Software Encryption, 453-473, 2016
Cryptophia’s short combiner for collision-resistant hash functions
A Mittelbach
International Conference on Applied Cryptography and Network Security, 136-153, 2013
The Holinshed Project: Comparing and linking two editions of Holinshed's Chronicle
J Cummings, A Mittelbach
International Journal of Humanities and Arts Computing 4 (1-2), 39-53, 2010
Roma: generating validators for the TEI
A Mittelbach, S Rahtz, I Bernevig
Random Oracles in the Standard Model
AA Mittelbach
Technische Universität, 2016
Automatic Detection and Visualisation of Overlap for Tracking of Information Flow
L Lehmann, A Mittelbach, J Cummings, C Rensing, R Steinmetz
Proceedings of I-KNOW 10: 10th International Conference on Knowledge …, 2010
Capture of lifecycle information in office applications
L Lehmann, A Mittelbach, C Rensing, R Steinmetz
International Journal of Technology Enhanced Learning 2 (1-2), 41-57, 2010
Response to “Nit-Picking PLAID AS & ISO Project Editors Report into ‘Unpicking Plaid’”
JP Degabriele, V Fehr, M Fischlin, T Gagliardoni, F Günther, GA Marson, ...
Cryptology ePrint Archive Forum, http://www. cryptoplexity. informatik. tu …, 2014
The system can't perform the operation now. Try again later.
Articles 1–20