Configuration coverage in the analysis of large-scale system software R Tartler, D Lohmann, C Dietrich, C Egger, J Sincero Proceedings of the 6th Workshop on Programming Languages and Operating …, 2011 | 107 | 2011 |
Atomic multi-channel updates with constant collateral in bitcoin-compatible payment-channel networks C Egger, P Moreno-Sanchez, M Maffei Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 105 | 2019 |
Practical attacks against the I2P network C Egger, J Schlumberger, C Kruegel, G Vigna Research in Attacks, Intrusions, and Defenses: 16th International Symposium …, 2013 | 57 | 2013 |
Phoenix: Rebirth of a Cryptographic {Password-Hardening} Service RWF Lai, C Egger, D Schröder, SSM Chow 26th USENIX Security Symposium (USENIX Security 17), 899-916, 2017 | 55 | 2017 |
Simple {Password-Hardened} Encryption Services RWF Lai, C Egger, M Reinert, SSM Chow, M Maffei, D Schröder 27th USENIX Security Symposium (USENIX Security 18), 1405-1421, 2018 | 41 | 2018 |
A security framework for distributed ledgers M Graf, D Rausch, V Ronge, C Egger, R Küsters, D Schröder Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 24 | 2021 |
Facing the linux 8000 feature nightmare J Sincero, R Tartler, C Egger, W Schröder-Preikschat, D Lohmann Proceedings of ACM European Conference on Computer Systems (EuroSys 2010 …, 2010 | 22 | 2010 |
Threshold password-hardened encryption services J Brost, C Egger, RWF Lai, F Schmid, D Schröder, M Zoppelt Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 18 | 2020 |
My genome belongs to me: controlling third party computation on genomic data D Deuber, C Egger, K Fech, G Malavolta, D Schröder, SAK Thyagarajan, ... Proceedings on Privacy Enhancing Technologies, 2019 | 16 | 2019 |
Key-schedule security for the TLS 1.3 standard C Brzuska, A Delignat-Lavaud, C Egger, C Fournet, K Kohbrok, ... International Conference on the Theory and Application of Cryptology and …, 2022 | 15 | 2022 |
Foundations of ring sampling V Ronge, C Egger, RWF Lai, D Schröder, HHF Yin Proceedings on Privacy Enhancing Technologies, 2021 | 11 | 2021 |
Global Caching for the Alternation-free -Calculus D Hausmann, L Schröder, C Egger arXiv preprint arXiv:1609.06379, 2016 | 11 | 2016 |
On defeating graph analysis of anonymous transactions C Egger, RWF Lai, V Ronge, IKY Woo, HHF Yin arXiv preprint arXiv:2402.18755, 2024 | 8 | 2024 |
On sustainable ring-based anonymous systems SSM Chow, C Egger, RWF Lai, V Ronge, IKY Woo 2023 IEEE 36th Computer Security Foundations Symposium (CSF), 568-583, 2023 | 6 | 2023 |
New random oracle instantiations from extremely lossy functions C Brzuska, G Couteau, C Egger, P Karanko, P Meyer Cryptology ePrint Archive, 2023 | 4 | 2023 |
Controlling my genome with my smartphone: first clinical experiences of the PROMISE system A Amr, M Hinderer, L Griebel, D Deuber, C Egger, F Sedaghat-Hamedani, ... Clinical Research in Cardiology, 1-13, 2022 | 3 | 2022 |
The Patient as Genomic Data Manager–Evaluation of the PROMISE App L Griebel, M Hinderer, A Amr, B Meder, M Schweig, D Deuber, C Egger, ... Digital Personalized Health and Medicine, 1061-1065, 2020 | 2 | 2020 |
On abstraction and modularization in protocol analysis C Egger Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU), 2023 | 1 | 2023 |
CryptoZoo: A Viewer for Reduction Proofs C Brzuska, C Egger, K Puniamurthy International Conference on Applied Cryptography and Network Security, 3-25, 2024 | | 2024 |
Methods for threshold password-hardened encryption and decryption RWF Lai, D Schröder, C Egger, J Brost US Patent 11,323,248, 2022 | | 2022 |