Marc Fischlin
Orcid: 0000-0003-0597-8297Affiliations:
- Darmstadt University of Technology, Germany
According to our database1,
Marc Fischlin
authored at least 145 papers
between 1997 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on fischlin.de
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3.
J. Cryptol., June, 2024
Decision-based Data Distribution (D³): Enabling Users to Minimize Data Propagation in Privacy-sensitive Scenarios.
Proc. Priv. Enhancing Technol., 2024
Fake It till You Make It: Enhancing Security of Bluetooth Secure Connections via Deferrable Authentication.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Quantum key distribution with post-processing driven by physical unclonable functions.
CoRR, 2023
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023
2022
2021
Information Security and Cryptography, Springer, ISBN: 978-3-030-63286-1, 2021
IACR Cryptol. ePrint Arch., 2021
2020
Single-to-Multi-Theorem Transformations for Non-Interactive Statistical Zero-Knowledge.
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures.
IACR Cryptol. ePrint Arch., 2020
Information-Theoretically Secure Data Origin Authentication with Quantum and Classical Resources.
Cryptogr., 2020
Proceedings of the Security Standardisation Research - 6th International Conference, 2020
Proceedings of the Selected Areas in Cryptography - SAC 2020, 2020
Proceedings of the Topics in Cryptology - CT-RSA 2020, 2020
2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Challenges in Proving Post-Quantum Key Exchanges Based on Key Encapsulation Mechanisms.
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Intercept-Resend Emulation Attacks against a Continuous-Variable Quantum Authentication Protocol with Physical Unclonable Keys.
Cryptogr., 2019
Proceedings of the Progress in Cryptology - LATINCRYPT 2019, 2019
Proceedings of the Computer Security - ESORICS 2019, 2019
2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Simulatable Channels: Extended Security that is Universally Composable and Easier to Prove.
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates.
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
2016
A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol.
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Information Security Theory and Practice, 2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the Security Standardisation Research - Third International Conference, 2016
2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, 2015
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015
2014
Unpicking PLAID - A Cryptographic Analysis of an ISO-standards-track Authentication Protocol.
IACR Cryptol. ePrint Arch., 2014
Intercepting tokens in cryptographic protocols: The empire strikes back in the clone wars.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013
Proceedings of the Trusted Systems - 5th International Conference, 2013
Proceedings of the Computer Security - ESORICS 2013, 2013
Proceedings of the Applied Cryptography and Network Security, 2013
2012
Security of blind signatures under aborts and applications to adaptive oblivious transfer.
J. Math. Cryptol., 2012
IACR Cryptol. ePrint Arch., 2012
Unconditionally-Secure Universally Composable Password-Based Key-Exchange based on One-Time Memory Tokens.
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Merging the Cryptographic Security Analysis and the Algebraic-Logic Security Proof of PACE.
Proceedings of the Sicherheit 2012: Sicherheit, 2012
Proceedings of the Sicherheit 2012: Sicherheit, 2012
Proceedings of the Information Security - 15th International Conference, 2012
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012
2011
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011
Proceedings of the Topics in Cryptology - CT-RSA 2011, 2011
Proceedings of the Topics in Cryptology - CT-RSA 2011, 2011
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Non-interactive and Re-usable Universally Composable String Commitments with Adaptive Security.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011
Proceedings of the Applied Cryptography and Network Security, 2011
2010
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010
Proceedings of the Sicherheit 2010: Sicherheit, 2010
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010
Proceedings of the Public Key Cryptography, 2010
Security Analysis of the Extended Access Control Protocol for Machine Readable Travel Documents.
Proceedings of the Information Security - 13th International Conference, 2010
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010
Proceedings of the Topics in Cryptology, 2010
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010
Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions.
Proceedings of the Progress in Cryptology, 2010
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010
2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Public Key Cryptography, 2009
Proceedings of the Public Key Cryptography, 2009
Proceedings of the BIOSIG 2009, 2009
2008
Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles.
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Theory of Cryptography, Fifth Theory of Cryptography Conference, 2008
Proceedings of the Automata, Languages and Programming, 35th International Colloquium, 2008
Proceedings of the Topics in Cryptology, 2008
2007
Proceedings of the Public Key Cryptography, 2007
Proceedings of the Information Hiding, 9th International Workshop, 2007
Proceedings of the Advances in Cryptology, 2007
2006
Proceedings of the Topics in Cryptology, 2006
Proceedings of the Advances in Cryptology, 2006
2005
Proceedings of the Automata, Languages and Programming, 32nd International Colloquium, 2005
Proceedings of the Advances in Cryptology, 2005
Analysis of Random Oracle Instantiation Scenarios for OAEP and Other Practical Schemes.
Proceedings of the Advances in Cryptology, 2005
2004
Proceedings of the Financial Cryptography, 2004
2003
Proceedings of the Public Key Cryptography, 2003
Proceedings of the Progress in Cryptology, 2003
2002
IACR Cryptol. ePrint Arch., 2002
Proceedings of the Topics in Cryptology, 2002
On the Impossibility of Constructing Non-interactive Statistically-Secret Protocols from Any Trapdoor One-Way Function.
Proceedings of the Topics in Cryptology, 2002
2001
Cryptographic limitations on parallelizing membership and equivalence queries with applications to random-self-reductions.
Theor. Comput. Sci., 2001
Proceedings of the Topics in Cryptology, 2001
2000
IACR Cryptol. ePrint Arch., 2000
Proceedings of the Advances in Cryptology, 2000
1999
Pseudorandom Function Tribe Ensembles Based on One-Way Permutations: Improvements and Applications.
Proceedings of the Advances in Cryptology, 1999
1997
Proceedings of the 38th Annual Symposium on Foundations of Computer Science, 1997
Proceedings of the Advances in Cryptology, 1997
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997