Florian Böhl

According to our database1, Florian Böhl authored at least 12 papers between 2012 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
MergeMAC: A MAC for Authentication with Strict Time Constraints and Limited Bandwidth.
Proceedings of the Applied Cryptography and Network Security, 2018

2014
Symbolic Analysis of Cryptographic Protocols.
PhD thesis, 2014

How to Put Usability into Focus: Using Focus Groups to Evaluate the Usability of Interactive Theorem Provers.
Proceedings of the Proceedings Eleventh Workshop on User Interfaces for Theorem Provers, 2014

A Usability Evaluation of Interactive Theorem Provers Using Focus Groups.
Proceedings of the Software Engineering and Formal Methods, 2014

Encryption Schemes Secure under Related-Key and Key-Dependent Message Attacks.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014

Proving Correctness and Security of Two-Party Computation Implemented in Java in Presence of a Semi-honest Sender.
Proceedings of the Cryptology and Network Security - 13th International Conference, 2014

2013
Confined Guessing: New Signatures From Standard Assumptions.
IACR Cryptol. ePrint Arch., 2013

RKA-KDM secure encryption from public-key encryption.
IACR Cryptol. ePrint Arch., 2013

Practical Signatures from Standard Assumptions.
Proceedings of the Advances in Cryptology, 2013

Symbolic Universal Composability.
Proceedings of the 2013 IEEE 26th Computer Security Foundations Symposium, 2013

Deduction soundness: prove one, get five for free.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
On Definitions of Selective Opening Security.
Proceedings of the Public Key Cryptography - PKC 2012, 2012


  Loading...