Björn Tackmann

According to our database1, Björn Tackmann authored at least 39 papers between 2010 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Non-malleable Encryption: Simpler, Shorter, Stronger.
J. Cryptol., 2020

Universal Composition with Global Subroutines: Capturing Global Setup within plain UC.
IACR Cryptol. ePrint Arch., 2020

2019
Multi-Protocol UC and its Use for Building Modular and Efficient Protocols.
IACR Cryptol. ePrint Arch., 2019

Anonymous Transactions with Revocation and Auditing in Hyperledger Fabric.
IACR Cryptol. ePrint Arch., 2019

Nonces are Noticed: AEAD Revisited.
IACR Cryptol. ePrint Arch., 2019

Privacy-preserving auditable token payments in a permissioned blockchain system.
IACR Cryptol. ePrint Arch., 2019

Brief Announcement: Asymmetric Distributed Trust.
Proceedings of the 33rd International Symposium on Distributed Computing, 2019

Asymmetric Distributed Trust.
Proceedings of the 23rd International Conference on Principles of Distributed Systems, 2019

2018
Toward an algebraic theory of systems.
Theor. Comput. Sci., 2018

Updatable Encryption with Post-Compromise Security.
IACR Cryptol. ePrint Arch., 2018

Secure Opportunistic Multipath Key Exchange.
IACR Cryptol. ePrint Arch., 2018

On Composable Security for Digital Signatures.
IACR Cryptol. ePrint Arch., 2018

2017
Causal Boxes: Quantum Information-Processing Systems Closed Under Composition.
IEEE Trans. Inf. Theory, 2017

Stateful Multi-Client Verifiable Computation.
IACR Cryptol. ePrint Arch., 2017

The Transaction Graph for Modeling Blockchain Semantics.
IACR Cryptol. ePrint Arch., 2017

Moderately Hard Functions: Definition, Instantiations, and Applications.
IACR Cryptol. ePrint Arch., 2017

Secure Event Tickets on a Blockchain.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017

2016
Per-Session Security: Password-Based Cryptography Revisited.
IACR Cryptol. ePrint Arch., 2016

The Multi-User Security of Authenticated Encryption: AES-GCM in TLS 1.3.
IACR Cryptol. ePrint Arch., 2016

Nonce-Based Cryptography: Retaining Security when Randomness Fails.
IACR Cryptol. ePrint Arch., 2016

2015
Fair Distributed Computation of Reactive Functions.
IACR Cryptol. ePrint Arch., 2015

How Fair is Your Protocol? A Utility-based Approach to Protocol Optimality.
IACR Cryptol. ePrint Arch., 2015

Query-Complexity Amplification for Random Oracles.
IACR Cryptol. ePrint Arch., 2015

Non-Malleable Encryption: Simpler, Shorter, Stronger.
IACR Cryptol. ePrint Arch., 2015

Robust Authenticated Encryption and the Limits of Symmetric Cryptography.
IACR Cryptol. ePrint Arch., 2015

Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer.
IACR Cryptol. ePrint Arch., 2015

(De-)Constructing TLS 1.3.
Proceedings of the Progress in Cryptology - INDOCRYPT 2015, 2015

2014
(De-)Constructing TLS.
IACR Cryptol. ePrint Arch., 2014

Optimality of Non-Adaptive Strategies: The Case of Parallel Games.
IACR Cryptol. ePrint Arch., 2014

From Single-Bit to Multi-Bit Public-Key Encryption via Non-Malleable Codes.
IACR Cryptol. ePrint Arch., 2014

2013
Key Exchange with Unilateral Authentication: Composable Security Definition and Modular Protocol Design.
IACR Cryptol. ePrint Arch., 2013

Anonymity-preserving Public-Key Encryption: A Constructive Approach.
IACR Cryptol. ePrint Arch., 2013

Rational Protocol Design: Cryptography Against Incentive-driven Adversaries.
IACR Cryptol. ePrint Arch., 2013

Constructing Confidential Channels from Authenticated Channels - Public-Key Encryption Revisited.
IACR Cryptol. ePrint Arch., 2013

A Constructive Perspective on Key Encapsulation.
Proceedings of the Number Theory and Cryptography, 2013

2012
Confidentiality and Integrity: A Constructive Perspective.
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012

Synchrony amplification.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

2011
Universally Composable Synchronous Computation.
IACR Cryptol. ePrint Arch., 2011

2010
On the soundness of authenticate-then-encrypt: formalizing the malleability of symmetric encryption.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010


  Loading...