Arno Mittelbach

According to our database1, Arno Mittelbach authored at least 20 papers between 2010 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
The Theory of Hash Functions and Random Oracles - An Approach to Modern Cryptography
Information Security and Cryptography, Springer, ISBN: 978-3-030-63286-1, 2021

An Overview of the Hybrid Argument.
IACR Cryptol. ePrint Arch., 2021

2018
Fiat-Shamir for highly sound protocols is instantiable.
Theor. Comput. Sci., 2018

2016
Random Oracles in the Standard Model.
PhD thesis, 2016

Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol.
Int. J. Inf. Sec., 2016

Modeling Random Oracles under Unpredictable Queries.
IACR Cryptol. ePrint Arch., 2016

2015
Universal Computational Extractors and the Superfluous Padding Assumption for Indistinguishability Obfuscation.
IACR Cryptol. ePrint Arch., 2015

2014
Indistinguishability Obfuscation versus Point Obfuscation with Auxiliary Input.
IACR Cryptol. ePrint Arch., 2014

Using Indistinguishability Obfuscation via UCEs.
IACR Cryptol. ePrint Arch., 2014

Random Oracle Uninstantiability from Indistinguishability Obfuscation.
IACR Cryptol. ePrint Arch., 2014

Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources.
IACR Cryptol. ePrint Arch., 2014

Indistinguishability Obfuscation versus Multi-bit Point Obfuscation with Auxiliary Input.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
Salvaging Indifferentiability in a Multi-stage Setting.
IACR Cryptol. ePrint Arch., 2013

Cryptophia's Short Combiner for Collision-Resistant Hash Functions.
IACR Cryptol. ePrint Arch., 2013

A Cryptographic Analysis of OPACITY.
IACR Cryptol. ePrint Arch., 2013

Reset Indifferentiability and its Consequences.
IACR Cryptol. ePrint Arch., 2013

A Cryptographic Analysis of OPACITY - (Extended Abstract).
Proceedings of the Computer Security - ESORICS 2013, 2013

2012
Hash Combiners for Second Pre-Image Resistance, Target Collision Resistance and Pre-Image Resistance have Long Output.
IACR Cryptol. ePrint Arch., 2012

2010
The Holinshed Project: Comparing and linking two editions of Holinshed's Chronicle.
Int. J. Humanit. Arts Comput., 2010

Automatic Detection of Local Reuse.
Proceedings of the Sustaining TEL: From Innovation to Learning and Practice, 2010


  Loading...