Physically uncloneable functions in the universal composition framework C Brzuska, M Fischlin, H Schröder, S Katzenbeisser Advances in Cryptology–CRYPTO 2011: 31st Annual Cryptology Conference, Santa …, 2011 | 186 | 2011 |
Security of sanitizable signatures revisited C Brzuska, M Fischlin, T Freudenreich, A Lehmann, M Page, J Schelbert, ... Public Key Cryptography–PKC 2009: 12th International Conference on Practice …, 2009 | 181 | 2009 |
Redactable signatures for tree-structured data: Definitions and constructions C Brzuska, H Busch, O Dagdelen, M Fischlin, M Franz, S Katzenbeisser, ... Applied Cryptography and Network Security: 8th International Conference …, 2010 | 146 | 2010 |
Unlinkability of sanitizable signatures C Brzuska, M Fischlin, A Lehmann, D Schröder Public Key Cryptography–PKC 2010: 13th International Conference on Practice …, 2010 | 120 | 2010 |
Composability of Bellare-Rogaway key exchange protocols C Brzuska, M Fischlin, B Warinschi, SC Williams Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 96 | 2011 |
Downgrade resilience in key-exchange protocols K Bhargavan, C Brzuska, C Fournet, M Green, M Kohlweiss, ... 2016 IEEE Symposium on Security and Privacy (SP), 506-525, 2016 | 69 | 2016 |
Indistinguishability obfuscation and UCEs: The case of computationally unpredictable sources C Brzuska, P Farshim, A Mittelbach Advances in Cryptology–CRYPTO 2014: 34th Annual Cryptology Conference, Santa …, 2014 | 69 | 2014 |
Less is more: Relaxed yet composable security notions for key exchange C Brzuska, M Fischlin, NP Smart, B Warinschi, SC Williams International Journal of Information Security 12, 267-297, 2013 | 69 | 2013 |
Notions of black-box reductions, revisited P Baecher, C Brzuska, M Fischlin Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the …, 2013 | 60 | 2013 |
Non-interactive public accountability for sanitizable signatures C Brzuska, HC Pöhls, K Samelin Public Key Infrastructures, Services and Applications: 9th European Workshop …, 2013 | 56 | 2013 |
An analysis of the EMV channel establishment protocol C Brzuska, NP Smart, B Warinschi, GJ Watson Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 49 | 2013 |
Efficient and perfectly unlinkable sanitizable signatures without group signatures C Brzuska, HC Pöhls, K Samelin Public Key Infrastructures, Services and Applications: 10th European …, 2014 | 48 | 2014 |
White-box cryptography: don’t forget about grey-box attacks E Alpirez Bock, JW Bos, C Brzuska, C Hubain, W Michiels, C Mune, ... Journal of Cryptology 32, 1095-1143, 2019 | 46 | 2019 |
State separation for code-based game-playing proofs C Brzuska, A Delignat-Lavaud, C Fournet, K Kohbrok, M Kohlweiss Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the …, 2018 | 44 | 2018 |
Using indistinguishability obfuscation via UCEs C Brzuska, A Mittelbach Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014 | 41 | 2014 |
On basing size-verifiable one-way functions on NP-hardness A Bogdanov, C Brzuska Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015 …, 2015 | 39 | 2015 |
Indistinguishability obfuscation versus multi-bit point obfuscation with auxiliary input C Brzuska, A Mittelbach Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014 | 39 | 2014 |
On the ineffectiveness of internal encodings-revisiting the DCA attack on white-box cryptography E Alpirez Bock, C Brzuska, W Michiels, A Treff Applied Cryptography and Network Security: 16th International Conference …, 2018 | 38 | 2018 |
Security analysis of the MLS key derivation C Brzuska, E Cornelissen, K Kohbrok 2022 IEEE Symposium on Security and Privacy (SP), 2535-2553, 2022 | 37* | 2022 |
Sanitizable signatures: How to partially delegate control for authenticated data C Brzuska, M Fischlin, A Lehmann, D Schröder Gesellschaft für Informatik eV, 2009 | 37 | 2009 |