Björn Tackmann

According to our database1, Björn Tackmann authored at least 40 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Asymmetric distributed trust.
Distributed Comput., September, 2024

2021
Anonymous Transactions with Revocation and Auditing in Hyperledger Fabric.
Proceedings of the Cryptology and Network Security - 20th International Conference, 2021

2020
Non-malleable Encryption: Simpler, Shorter, Stronger.
J. Cryptol., 2020

Universal Composition with Global Subroutines: Capturing Global Setup Within Plain UC.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

Privacy-preserving auditable token payments in a permissioned blockchain system.
Proceedings of the 2nd ACM Conference on Advances in Financial Technologies, 2020

2019
Multi-Protocol UC and its Use for Building Modular and Efficient Protocols.
IACR Cryptol. ePrint Arch., 2019

Brief Announcement: Asymmetric Distributed Trust.
Proceedings of the 33rd International Symposium on Distributed Computing, 2019

Asymmetric Distributed Trust.
Proceedings of the 23rd International Conference on Principles of Distributed Systems, 2019

Nonces Are Noticed: AEAD Revisited.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

2018
Toward an algebraic theory of systems.
Theor. Comput. Sci., 2018

On Composable Security for Digital Signatures.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

Updatable Encryption with Post-Compromise Security.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

Secure Opportunistic Multipath Key Exchange.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Stateful Multi-client Verifiable Computation.
Proceedings of the Applied Cryptography and Network Security, 2018

2017
Causal Boxes: Quantum Information-Processing Systems Closed Under Composition.
IEEE Trans. Inf. Theory, 2017

The Transaction Graph for Modeling Blockchain Semantics.
IACR Cryptol. ePrint Arch., 2017

Moderately Hard Functions: Definition, Instantiations, and Applications.
Proceedings of the Theory of Cryptography - 15th International Conference, 2017

Secure Event Tickets on a Blockchain.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017

Per-Session Security: Password-Based Cryptography Revisited.
Proceedings of the Computer Security - ESORICS 2017, 2017

2016
Non-Malleable Encryption: Simpler, Shorter, Stronger.
Proceedings of the Theory of Cryptography - 13th International Conference, 2016

Nonce-Based Cryptography: Retaining Security When Randomness Fails.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

The Multi-user Security of Authenticated Encryption: AES-GCM in TLS 1.3.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

2015
Fair Distributed Computation of Reactive Functions.
Proceedings of the Distributed Computing - 29th International Symposium, 2015

From Single-Bit to Multi-bit Public-Key Encryption via Non-malleable Codes.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer.
Proceedings of the Provable Security, 2015

How Fair is Your Protocol?: A Utility-based Approach to Protocol Optimality.
Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing, 2015

(De-)Constructing TLS 1.3.
Proceedings of the Progress in Cryptology - INDOCRYPT 2015, 2015

Robust Authenticated Encryption and the Limits of Symmetric Cryptography.
Proceedings of the Cryptography and Coding - 15th IMA International Conference, 2015

Query-Complexity Amplification for Random Oracles.
Proceedings of the Information Theoretic Security - 8th International Conference, 2015

2014
(De-)Constructing TLS.
IACR Cryptol. ePrint Arch., 2014

Optimality of non-adaptive strategies: The case of parallel games.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

2013
Key Exchange with Unilateral Authentication: Composable Security Definition and Modular Protocol Design.
IACR Cryptol. ePrint Arch., 2013

Universally Composable Synchronous Computation.
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013

Anonymity-Preserving Public-Key Encryption: A Constructive Approach.
Proceedings of the Privacy Enhancing Technologies - 13th International Symposium, 2013

Rational Protocol Design: Cryptography against Incentive-Driven Adversaries.
Proceedings of the 54th Annual IEEE Symposium on Foundations of Computer Science, 2013

A Constructive Perspective on Key Encapsulation.
Proceedings of the Number Theory and Cryptography, 2013

Constructing Confidential Channels from Authenticated Channels - Public-Key Encryption Revisited.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

2012
Confidentiality and Integrity: A Constructive Perspective.
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012

Synchrony amplification.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

2010
On the soundness of authenticate-then-encrypt: formalizing the malleability of symmetric encryption.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010


  Loading...