Search

Search Results

Showing 1-20 of 135 results
  1. Conference proceedings

    Applied Cryptography and Network Security 23rd International Conference, ACNS 2025, Munich, Germany, June 23–26, 2025, Proceedings, Part I

    This three-volume set LNCS 15825-15827 constitutes the proceedings of the 23rd International Conference on Applied Cryptography and Network Security,...

    Marc Fischlin, Veelasha Moonsamy in Lecture Notes in Computer Science
    2025
  2. Conference proceedings

    Applied Cryptography and Network Security 23rd International Conference, ACNS 2025, Munich, Germany, June 23–26, 2025, Proceedings, Part II

    This three-volume set LNCS 15825-15827 constitutes the proceedings of the 23rd International Conference on Applied Cryptography and Network Security,...

    Marc Fischlin, Veelasha Moonsamy in Lecture Notes in Computer Science
    2025
  3. Conference proceedings

    Applied Cryptography and Network Security 23rd International Conference, ACNS 2025, Munich, Germany, June 23–26, 2025, Proceedings, Part III

    This three-volume set LNCS 15825-15827 constitutes the proceedings of the 23rd International Conference on Applied Cryptography and Network Security,...

    Marc Fischlin, Veelasha Moonsamy in Lecture Notes in Computer Science
    2025
  4. Conference paper

    BUFFing Threshold Signature Schemes

    We explore advanced security notions for threshold signature schemes, focusing on Beyond UnForgeability Features (BUFF), introduced by Cremers et al....
    Marc Fischlin, Aikaterini Mitrokotsa, Jenit Tomy in Public-Key Cryptography – PKC 2025
    2025
  5. Conference paper

    Post-quantum Asynchronous Remote Key Generation for FIDO2

    The Fast IDentity Online (FIDO) Alliance has developed the widely adopted FIDO2 protocol suite that allows for passwordless online authentication....
    Jacqueline Brendel, Sebastian Clermont, Marc Fischlin in Advances in Cryptology – ASIACRYPT 2024
    2025
  6. Conference paper

    Key Derivation Functions Without a Grain of Salt

    Key derivation functions (KDFs) are integral to many cryptographic protocols. Their functionality is to turn raw key material, such as a...
    Matilda Backendal, Sebastian Clermont, ... Felix Günther in Advances in Cryptology – EUROCRYPT 2025
    2025
  7. Conference paper

    BUFFing FALCON Without Increasing the Signature Size

    This work shows how \(\textsf{FALCON}\) can...
    Samed Düzlü, Rune Fiedler, Marc Fischlin in Selected Areas in Cryptography – SAC 2024
    2025
  8. Article
    Full access

    Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3

    The common approach in secure communication channel protocols is to rely on ciphertexts arriving in-order and to close the connection upon any rogue...

    Marc Fischlin, Felix Günther, Christian Janson in Journal of Cryptology
    30 January 2024 Open access
  9. Conference paper

    Integrating Causality in Messaging Channels

    Causal reasoning plays an important role in the comprehension of communication, but it has been elusive so far how causality should be properly...
    Shan Chen, Marc Fischlin in Advances in Cryptology – EUROCRYPT 2024
    2024
  10. Conference paper

    Post-quantum Security for the Extended Access Control Protocol

    The Extended Access Control (EAC) protocol for authenticated key agreement is mainly used to secure connections between machine-readable travel...
    Marc Fischlin, Jonas von der Heyden, ... Holger Bock in Security Standardisation Research
    2023
  11. Conference paper

    Searching for ELFs in the Cryptographic Forest

    Extremely Lossy Functions (ELFs) are families of functions that, depending on the choice during key generation, either operate in injective mode or...
    Marc Fischlin, Felix Rohrbach in Theory of Cryptography
    2023
  12. Conference paper