Christoph Striecks

Orcid: 0000-0003-4724-8022

Affiliations:
  • AIT Austrian Institute of Technology, Center for Digital Safety & Security, Vienna, Austria
  • Karlsruhe Institute of Technology, Cryptography and Security Group, Karlsruhe, Germany (former)


According to our database1, Christoph Striecks authored at least 36 papers between 2013 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Versatile Quantum-Safe Hybrid Key Exchange and Its Application to MACsec.
CoRR, May, 2025

Quantum-Safe Hybrid Key Exchanges with KEM-Based Authentication.
IACR Cryptol. ePrint Arch., 2025

Malleable SNARKs and Their Applications.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

2023
Revisiting Updatable Encryption: Controlled Forward Security, Constructions and a Puncturable Perspective.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

Muckle+: End-to-End Hybrid Authenticated Key Exchanges.
Proceedings of the Post-Quantum Cryptography - 14th International Workshop, 2023

Unique-Path Identity Based Encryption with Applications to Strongly Secure Messaging.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

Optimizing 0-RTT Key Exchange with Full Forward Security.
Proceedings of the 2023 on Cloud Computing Security Workshop, 2023

2022
(Inner-Product) Functional Encryption with Updatable Ciphertexts.
IACR Cryptol. ePrint Arch., 2022

Logarithmic-Size (Linkable) Threshold Ring Signatures in the Plain Model.
Proceedings of the Public-Key Cryptography - PKC 2022, 2022

2021
Puncture 'Em All: Stronger Updatable Encryption with No-Directional Key Updates.
IACR Cryptol. ePrint Arch., 2021

Guideline for Architectural Safety, Security and Privacy Implementations Using Design Patterns: SECREDAS Approach.
Proceedings of the Computer Safety, Reliability, and Security. SAFECOMP 2021 Workshops, 2021

Updatable Signatures and Message Authentication Codes.
Proceedings of the Public-Key Cryptography - PKC 2021, 2021

Fine-Grained Forward Secrecy: Allow-List/Deny-List Encryption and Applications.
Proceedings of the Financial Cryptography and Data Security, 2021

Versatile and Sustainable Timed-Release Encryption and Sequential Time-Lock Puzzles (Extended Abstract).
Proceedings of the Computer Security - ESORICS 2021, 2021

2020
Generic Constructions of Incremental and Homomorphic Timed-Release Encryption.
IACR Cryptol. ePrint Arch., 2020

Collecting and Classifying Security and Privacy Design Patterns for Connected Vehicles: SECREDAS Approach.
Proceedings of the Computer Safety, Reliability, and Security. SAFECOMP 2020 Workshops, 2020

Privacy-Preserving Incentive Systems with Highly Efficient Point-Collection.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

CCA-Secure (Puncturable) KEMs from Encryption with Non-Negligible Decryption Errors.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
I Want to Forget: Fine-Grained Encryption with Full Forward Secrecy in the Distributed Setting.
IACR Cryptol. ePrint Arch., 2019

Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Practical Group-Signatures with Privacy-Friendly Openings.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange.
IACR Cryptol. ePrint Arch., 2018

Engineering Cryptography for Security and Privacy in the Cloud.
ERCIM News, 2018

Revisiting Proxy Re-encryption: Forward Secrecy, Improved Security, and Applications.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

2017
Agile cryptographic solutions for the cloud.
Elektrotech. Informationstechnik, 2017

Secure and Privacy-Friendly Storage and Data Processing in the Cloud.
Proceedings of the Privacy and Identity Management. The Smart Revolution, 2017

Batch-verifiable Secret Sharing with Unconditional Privacy.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Towards Attribute-Based Credentials in the Cloud.
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017

2016
Opportunities and Challenges of CREDENTIAL - Towards a Metadata-Privacy Respecting Identity Provider.
Proceedings of the Privacy and Identity Management. Facing up to Next Steps, 2016

2015
On Cryptographic Building Blocks and Transformations.
PhD thesis, 2015

Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting.
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015

2014
A Generic View on Trace-and-Revoke Broadcast Encryption Schemes.
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014

2013
Confined Guessing: New Signatures From Standard Assumptions.
IACR Cryptol. ePrint Arch., 2013

Practical Signatures from Standard Assumptions.
Proceedings of the Advances in Cryptology, 2013

Programmable Hash Functions in the Multilinear Setting.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013


  Loading...