Christian Janson

According to our database1, Christian Janson authored at least 22 papers between 2014 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Lattice-Based Sanitizable Signature Schemes: Chameleon Hash Functions and More.
Proceedings of the Post-Quantum Cryptography - 16th International Workshop, 2025

2024
A Deniability Analysis of Signal's Initial Handshake PQXDH.
IACR Cryptol. ePrint Arch., 2024

2022
Sponge-Based Authenticated Encryption: Security Against Quantum Attackers.
Proceedings of the Post-Quantum Cryptography - 13th International Workshop, 2022

Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake.
Proceedings of the Public-Key Cryptography - PKC 2022, 2022

2021
BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

BlindOR: an Efficient Lattice-Based Blind Signature Scheme from OR-Proofs.
Proceedings of the Cryptology and Network Security - 20th International Conference, 2021

2020
Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3.
IACR Cryptol. ePrint Arch., 2020

Towards Post-Quantum Security for Signal's X3DH Handshake.
Proceedings of the Selected Areas in Cryptography - SAC 2020, 2020

Client-Oblivious OPRAM.
Proceedings of the Information and Communications Security - 22nd International Conference, 2020

Signatures from Sequential-OR Proofs.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

Security Reductions for White-Box Key-Storage in Mobile Payments.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
Challenges in Proving Post-Quantum Key Exchanges Based on Key Encapsulation Mechanisms.
IACR Cryptol. ePrint Arch., 2019

Sponges Resist Leakage: The Case of Authenticated Encryption.
Proceedings of the 31. Krypto-Tag, Berlin, Germany, October 17-18, 2019, 2019

2018
Backdoored Hash Functions: Immunizing HMAC and HKDF.
Proceedings of the 31st IEEE Computer Security Foundations Symposium, 2018

2017
PRF-ODH: Relations, Instantiations, and Impossibility Results.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

Cloud Storage File Recoverability.
Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing, 2017

2016
On the verification of computation and data retrievability.
PhD thesis, 2016

Hybrid Publicly Verifiable Computation.
Proceedings of the Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29, 2016

2015
Access Control in Publicly Verifiable Outsourced Computation.
Proceedings of the 10th ACM Symposium on Information, 2015

Extended Functionality in Verifiable Searchable Encryption.
Proceedings of the Cryptography and Information Security in the Balkans, 2015

2014
Publicly Verifiable Outsourced Computation with a Key Distribution Centre.
CoRR, 2014

Revocation in Publicly Verifiable Outsourced Computation.
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014


  Loading...