Benedikt Auerbach

Orcid: 0000-0002-7553-6606

According to our database1, Benedikt Auerbach authored at least 19 papers between 2017 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Artifact - How to Compare Bandwidth Constrained Two-Party Secure Messaging Protocols: A Quest for A More Efficient and Secure Post-Quantum Protocol.
Dataset, June, 2025

How to Compare Bandwidth Constrained Two-Party Secure Messaging Protocols: A Quest for A More Efficient and Secure Post-Quantum Protocol.
Proceedings of the 34th USENIX Security Symposium, 2025

Continuous Group-Key Agreement: Concurrent Updates Without Pruning.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

2024
The Cost of Maintaining Keys in Dynamic Groups with Applications to Multicast Encryption and Group Messaging.
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024

DeCAF: Decentralizable CGKA with Fast Healing.
Proceedings of the Security and Cryptography for Networks - 14th International Conference, 2024

Trapdoor Memory-Hard Functions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

2023
On the Cost of Post-compromise Security in Concurrent Continuous Group-Key Agreement.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

Generic-Group Lower Bounds via Reductions Between Geometric-Search Problems: With and Without Preprocessing.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

2022
Coffee: Fast Healing Concurrent Continuous Group Key Agreement for Decentralized Group Messaging.
IACR Cryptol. ePrint Arch., 2022

CoCoA: Concurrent Continuous Group Key Agreement.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

2021
Grafting Key Trees: Efficient Key Management for Overlapping Groups.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

Inverse-Sybil Attacks in Automated Contact Tracing.
Proceedings of the Topics in Cryptology - CT-RSA 2021, 2021

2020
Everybody's a Target: Scalability in Public-Key Encryption.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

2019
On the security of public-key encrytion in mass-surveillance settings.
PhD thesis, 2019

Zwei Betrachtungen von Sicherheit und Privatheit nach Snowden.
Datenschutz und Datensicherheit, 2019

Lossy Trapdoor Permutations with Improved Lossiness.
Proceedings of the Topics in Cryptology - CT-RSA 2019, 2019

2018
Hashing Solutions Instead of Generating Problems: On the Interactive Certification of RSA Moduli.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

Public-Key Encryption Resistant to Parameter Subversion and Its Realization from Efficiently-Embeddable Groups.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

2017
Memory-Tight Reductions.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017


  Loading...