Christoph Egger

Orcid: 0000-0002-3745-5442

Affiliations:
  • Friedrich-Alexander Universität Erlangen-Nürnberg, Germany


According to our database1, Christoph Egger authored at least 17 papers between 2011 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
On Abstraction and Modularization in Protocol Analysis.
PhD thesis, 2023

On Sustainable Ring-based Anonymous Systems.
IACR Cryptol. ePrint Arch., 2023

CryptoZoo: A Viewer for Reduction Proofs.
IACR Cryptol. ePrint Arch., 2023

New Random Oracle Instantiations from Extremely Lossy Functions.
IACR Cryptol. ePrint Arch., 2023

2022
On Defeating Graph Analysis of Anonymous Transactions.
Proc. Priv. Enhancing Technol., 2022

2021
Foundations of Ring Sampling.
Proc. Priv. Enhancing Technol., 2021

A Security Framework for Distributed Ledgers.
IACR Cryptol. ePrint Arch., 2021

Key-schedule Security for the TLS 1.3 Standard.
IACR Cryptol. ePrint Arch., 2021

2020
Threshold Password-Hardened Encryption Services.
IACR Cryptol. ePrint Arch., 2020

The Patient as Genomic Data Manager - Evaluation of the PROMISE App.
Proceedings of the Digital Personalized Health and Medicine - Proceedings of MIE 2020, Medical Informatics Europe, Geneva, Switzerland, April 28, 2020

2019
My Genome Belongs to Me: Controlling Third Party Computation on Genomic Data.
Proc. Priv. Enhancing Technol., 2019

Atomic Multi-Channel Updates with Constant Collateral in Bitcoin-Compatible Payment-Channel Networks.
IACR Cryptol. ePrint Arch., 2019

2018
Simple Password-Hardened Encryption Services.
Proceedings of the 27th USENIX Security Symposium, 2018

2017
Phoenix: Rebirth of a Cryptographic Password-Hardening Service.
Proceedings of the 26th USENIX Security Symposium, 2017

2016
Global Caching for the Alternation-free μ-Calculus.
Proceedings of the 27th International Conference on Concurrency Theory, 2016

2013
Practical Attacks against the I2P Network.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013

2011
Configuration coverage in the analysis of large-scale system software.
ACM SIGOPS Oper. Syst. Rev., 2011


  Loading...