Chris Brzuska

Orcid: 0009-0001-7485-1217

Affiliations:
  • Hamburg University of Technology, Institute for IT Security Analysis, Germany


According to our database1, Chris Brzuska authored at least 55 papers between 2009 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Threshold Public-Key Encryption: Definitions, Relations and Constructions.
IACR Cryptol. ePrint Arch., 2025

Relations Among New CCA Security Notions for Approximate FHE.
IACR Commun. Cryptol., 2025

Succinct PPRFs via Memory-Tight Reductions.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

Falsifiability, Composability, and Comparability of Game-Based Security Models for Key Exchange Protocols.
Proceedings of the Information Security in a Connected World, 2025

2024
Adaptive Distributional Security for Garbling Schemes with 풪(|x|) Online Complexity.
IACR Cryptol. ePrint Arch., 2024

Simple Watermarking Pseudorandom Functions from Extractable Pseudorandom Generators.
IACR Commun. Cryptol., 2024

On Bounded Storage Key Agreement and One-Way Functions.
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024

Instantiating the Hash-Then-Evaluate Paradigm: Strengthening PRFs, PCFs, and OPRFs.
Proceedings of the Security and Cryptography for Networks - 14th International Conference, 2024

Evasive LWE Assumptions: Definitions, Classes, and Counterexamples.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

CryptoZoo: A Viewer for Reduction Proofs.
Proceedings of the Applied Cryptography and Network Security, 2024

Breaking DPA-Protected Kyber via the Pair-Pointwise Multiplication.
Proceedings of the Applied Cryptography and Network Security, 2024

2023
New Random Oracle Instantiations from Extremely Lossy Functions.
IACR Cryptol. ePrint Arch., 2023

On Provable White-Box Security in the Strong Incompressibility Model.
IACR Cryptol. ePrint Arch., 2023

A State-Separating Proof for Yao's Garbling Scheme.
Proceedings of the 36th IEEE Computer Security Foundations Symposium, 2023

Adaptive Distributional Security for Garbling Schemes with 𝒪(|x|) Online Complexity.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
Security Analysis of the MLS Key Derivation.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

On Building Fine-Grained One-Way Functions from Strong Average-Case Hardness.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

Key-Schedule Security for the TLS 1.3 Standard.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

2021
Cryptographic Security of the MLS RFC, Draft 11.
IACR Cryptol. ePrint Arch., 2021

On Derandomizing Yao's Weak-to-Strong OWF Construction.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

2020
Towards Fine-Grained One-Way Functions from Strong Average-Case Hardness.
IACR Cryptol. ePrint Arch., 2020

On the Security Goals of White-Box Cryptography.
IACR Cryptol. ePrint Arch., 2020

Security Reductions for White-Box Key-Storage in Mobile Payments.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
White-Box Cryptography: Don't Forget About Grey-Box Attacks.
J. Cryptol., 2019

Doubly Half-Injective PRGs for Incompressible White-Box Cryptography.
Proceedings of the Topics in Cryptology - CT-RSA 2019, 2019

2018
State-Separating Proofs: A Reduction Methodology for Real-World Protocols.
IACR Cryptol. ePrint Arch., 2018

State Separation for Code-Based Game-Playing Proofs.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

On the Ineffectiveness of Internal Encodings - Revisiting the DCA Attack on White-Box Cryptography.
Proceedings of the Applied Cryptography and Network Security, 2018

2017
A Modular Security Analysis of EAP and IEEE 802.11.
Proceedings of the Public-Key Cryptography - PKC 2017, 2017

2016
Downgrade Resilience in Key-Exchange Protocols.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Safely Exporting Keys from Secure Channels - On the Security of EAP-TLS and TLS Key Exporters.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

On Statistically Secure Obfuscation with Approximate Correctness.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

2015
Universal Computational Extractors and the Superfluous Padding Assumption for Indistinguishability Obfuscation.
IACR Cryptol. ePrint Arch., 2015

Arithmetic Cryptography.
Electron. Colloquium Comput. Complex., 2015

Random-Oracle Uninstantiability from Indistinguishability Obfuscation.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

On Basing Size-Verifiable One-Way Functions on NP-Hardness.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

Arithmetic Cryptography: Extended Abstract.
Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, 2015

2014
Indistinguishability Obfuscation versus Point Obfuscation with Auxiliary Input.
IACR Cryptol. ePrint Arch., 2014

Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

Indistinguishability Obfuscation versus Multi-bit Point Obfuscation with Auxiliary Input.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

Using Indistinguishability Obfuscation via UCEs.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
On the foundations of key exchange.
PhD thesis, 2013

Efficient and Perfectly Unlinkable Sanitizable Signatures without Group Signatures.
Proceedings of the Public Key Infrastructures, Services and Applications, 2013

An analysis of the EMV channel establishment protocol.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Reset Indifferentiability and Its Consequences.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

Notions of Black-Box Reductions, Revisited.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

2012
Less is More: Relaxed yet Composable Security Notions for Key Exchange.
IACR Cryptol. ePrint Arch., 2012

TLS, PACE, and EAC: ACryptographic View at Modern Key Exchange Protocols.
Proceedings of the Sicherheit 2012: Sicherheit, 2012

Non-interactive Public Accountability for Sanitizable Signatures.
Proceedings of the Public Key Infrastructures, Services and Applications, 2012

2011
Physically Uncloneable Functions in the Universal Composition Framework.
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011

Composability of bellare-rogaway key exchange protocols.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Unlinkability of Sanitizable Signatures.
Proceedings of the Public Key Cryptography, 2010

Redactable Signatures for Tree-Structured Data: Definitions and Constructions.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

2009
Security of Sanitizable Signatures Revisited.
Proceedings of the Public Key Cryptography, 2009

Santizable Signatures: How to Partially Delegate Control for Authenticated Data.
Proceedings of the BIOSIG 2009, 2009


  Loading...