Franziskus Kiefer

According to our database1, Franziskus Kiefer authored at least 17 papers between 2011 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Asynchronous Remote Key Generation: An Analysis of Yubico's Proposal for W3C WebAuthn.
IACR Cryptol. ePrint Arch., 2020

2019
Crypto (engineering) at Mozilla.
Proceedings of the 30. Krypto-Tag, Berlin, Germany, March 28-29, 2019, 2019

Welcome to Mozilla.
Proceedings of the 30. Krypto-Tag, Berlin, Germany, March 28-29, 2019, 2019

2018
hacspec: Towards Verifiable Crypto Standards.
Proceedings of the Security Standardisation Research - 4th International Conference, 2018

2016
Secure modular password authentication for the web using channel bindings.
Int. J. Inf. Sec., 2016

Universally Composable Two-Server PAKE.
IACR Cryptol. ePrint Arch., 2016

Blind Password Registration for Verifier-based PAKE.
IACR Cryptol. ePrint Arch., 2016

Blind Password Registration for Two-Server Password Authenticated Key Exchange and Secret Sharing Protocols.
Proceedings of the Information Security - 19th International Conference, 2016

2015
Secure Set-based Policy Checking and Its Application to Password Registration.
IACR Cryptol. ePrint Arch., 2015

Oblivious PAKE: Efficient Handling of Password Trials.
Proceedings of the Information Security - 18th International Conference, 2015

2014
Distributed Smooth Projective Hashing and its Application to Two-Server PAKE.
IACR Cryptol. ePrint Arch., 2014

Zero-Knowledge Password Policy Checks and Verifier-Based PAKE.
IACR Cryptol. ePrint Arch., 2014

Distributed Smooth Projective Hashing and Its Application to Two-Server Password Authenticated Key Exchange.
Proceedings of the Applied Cryptography and Network Security, 2014

2013
Oblivious PAKE and Efficient Handling of Password Trials.
IACR Cryptol. ePrint Arch., 2013

Revocation and Non-repudiation: When the First Destroys the Latter.
Proceedings of the Public Key Infrastructures, Services and Applications, 2013

2011
Pseudorandom Signatures.
IACR Cryptol. ePrint Arch., 2011

An efficient mobile PACE implementation.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011


  Loading...