Arno Mittelbach

According to our database1, Arno Mittelbach authored at least 20 papers between 2010 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
The Theory of Hash Functions and Random Oracles - An Approach to Modern Cryptography
Information Security and Cryptography, Springer, ISBN: 978-3-030-63286-1, 2021

An Overview of the Hybrid Argument.
IACR Cryptol. ePrint Arch., 2021

2016
Random Oracles in the Standard Model.
PhD thesis, 2016

Fiat-Shamir for Highly Sound Protocols Is Instantiable.
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016

Modeling Random Oracles Under Unpredictable Queries.
Proceedings of the Fast Software Encryption - 23rd International Conference, 2016

2015
Universal Computational Extractors and the Superfluous Padding Assumption for Indistinguishability Obfuscation.
IACR Cryptol. ePrint Arch., 2015

Random-Oracle Uninstantiability from Indistinguishability Obfuscation.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

2014
Indistinguishability Obfuscation versus Point Obfuscation with Auxiliary Input.
IACR Cryptol. ePrint Arch., 2014

Unpicking PLAID - A Cryptographic Analysis of an ISO-Standards-Track Authentication Protocol.
Proceedings of the Security Standardisation Research - First International Conference, 2014

Salvaging Indifferentiability in a Multi-stage Setting.
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014

Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

Indistinguishability Obfuscation versus Multi-bit Point Obfuscation with Auxiliary Input.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

Using Indistinguishability Obfuscation via UCEs.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
A Cryptographic Analysis of OPACITY.
IACR Cryptol. ePrint Arch., 2013

A Cryptographic Analysis of OPACITY - (Extended Abstract).
Proceedings of the Computer Security - ESORICS 2013, 2013

Reset Indifferentiability and Its Consequences.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

Cryptophia's Short Combiner for Collision-Resistant Hash Functions.
Proceedings of the Applied Cryptography and Network Security, 2013

2012
Hash Combiners for Second Pre-image Resistance, Target Collision Resistance and Pre-image Resistance Have Long Output.
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012

2010
The Holinshed Project: Comparing and linking two editions of Holinshed's Chronicle.
Int. J. Humanit. Arts Comput., 2010

Automatic Detection of Local Reuse.
Proceedings of the Sustaining TEL: From Innovation to Learning and Practice, 2010


  Loading...