Doreen Riepel

Orcid: 0000-0002-4990-0929

According to our database1, Doreen Riepel authored at least 29 papers between 2020 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Snake Mackerel: An Isogeny-Based AKEM Leveraging Randomness Reuse.
IACR Cryptol. ePrint Arch., 2025

ABE Cubed: Advanced Benchmarking Extensions for ABE Squared.
IACR Cryptol. ePrint Arch., 2025

Lattice-Based Updatable Public-Key Encryption for Group Messaging.
IACR Cryptol. ePrint Arch., 2025

Verifiable and Provably Secure Machine Unlearning.
Proceedings of the IEEE Conference on Secure and Trustworthy Machine Learning, 2025

Public-Algorithm Substitution Attacks: Subverting Hashing and Verification.
Proceedings of the Public-Key Cryptography - PKC 2025, 2025

Intermundium-DL: Assessing the Resilience of Current Schemes to Discrete-Log-Computation Attacks on Public Parameters.
Proceedings of the Public-Key Cryptography - PKC 2025, 2025

2024
Highly-Effective Backdoors for Hash Functions and Beyond.
IACR Cryptol. ePrint Arch., 2024

CCA Secure Updatable Encryption from Non-mappable Group Actions.
Proceedings of the Post-Quantum Cryptography - 15th International Workshop, 2024

Key Exchange with Tight (Full) Forward Secrecy via Key Confirmation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

ISABELLA: Improving Structures of Attribute-Based Encryption Leveraging Linear Algebra.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

On the Tight Security of the Double Ratchet.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Tightly-Secure Group Key Exchange with Perfect Forward Secrecy.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

Count Corruptions, Not Users: Improved Tightness for Signatures, Encryption and Authenticated Key Exchange.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

The Concrete Security of Two-Party Computation: Simple Definitions, and Tight Proofs for PSI and OPRFs.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

2023
Protokolle für den Authentifizierten Schlüsselaustausch mit Strikten Sicherheitsschranken.
Proceedings of the Ausgezeichnete Informatikdissertationen 2023., 2023

Tightly-secure authenticated key exchange.
PhD thesis, 2023

No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning.
Proceedings of the 32nd USENIX Security Symposium, 2023

Generic Models for Group Actions.
Proceedings of the Public-Key Cryptography - PKC 2023, 2023

Multi-user CDH Problems and the Concrete Security of NAXOS and HMQV.
Proceedings of the Topics in Cryptology - CT-RSA 2023, 2023

2022
Analysing the HPKE Standard - Supplementary Material.
Dataset, August, 2022

Password-Authenticated Key Exchange from Group Actions.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

FABEO: Fast Attribute-Based Encryption with Optimal Security.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Group Action Key Encapsulation and Non-Interactive Key Exchange in the QROM.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

Strongly Anonymous Ratcheted Key Exchange.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

2021
Analysing the HPKE Standard - Supplementary Material.
Dataset, September, 2021

Tightly-Secure Authenticated Key Exchange, Revisited.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

Analysing the HPKE Standard.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

Authenticated Key Exchange and Signatures with Tight Security in the Standard Model.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

2020
Analysing the HPKE Standard - Supplementary Material.
Dataset, November, 2020


  Loading...