Jeremias Mechler

Orcid: 0009-0009-3213-7478

According to our database1, Jeremias Mechler authored at least 17 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Hidden Δ-fairness: A Novel Notion for Fair Secure Two-Party Computation.
IACR Cryptol. ePrint Arch., 2024

Hidden $\varDelta $-Fairness: A Novel Notion for Fair Secure Two-Party Computation.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024

2023
Composable Long-Term Security with Rewinding.
IACR Cryptol. ePrint Arch., 2023

Practically Efficient Private Set Intersection from Trusted Hardware with Side-Channels.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
Hardening the Security of Server-Aided MPC Using Remotely Unhackable Hardware Modules.
Proceedings of the Sicherheit, 2022

2021
Fortified Multi-Party Computation: Taking Advantage of Simple Secure Hardware Modules.
Proc. Priv. Enhancing Technol., 2021

Environmentally Friendly Composable Multi-Party Computation in the Plain Model from Standard (Timed) Assumptions.
IACR Cryptol. ePrint Arch., 2021

2020
SES-14: Sichere und zuverlässliche Systeme: Datensouveränität.
Proceedings of the 50. Jahrestagung der Gesellschaft für Informatik, INFORMATIK 2020 - Back to the Future, Karlsruhe, Germany, 28. September, 2020

2019
Your Money or Your Life - Modeling and Analyzing the Security of Electronic Payment in the UC Framework.
IACR Cryptol. ePrint Arch., 2019

2018
Fortified Universal Composability: Taking Advantage of Simple Secure Hardware Modules.
IACR Cryptol. ePrint Arch., 2018

IT-Sicherheit - ein rechtsfreier Raum?
Datenschutz und Datensicherheit, 2018

Sicherheit auf festem Fundament.
Datenschutz und Datensicherheit, 2018

Reusing Tamper-Proof Hardware in UC-Secure Protocols.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

2017
Sicherheit relativ definieren.
Datenschutz und Datensicherheit, 2017

Security in a Distributed Key Management Approach.
Proceedings of the 30th IEEE International Symposium on Computer-Based Medical Systems, 2017

Secure Database Outsourcing to the Cloud: Side-Channels, Counter-Measures and Trusted Execution.
Proceedings of the 30th IEEE International Symposium on Computer-Based Medical Systems, 2017

2016
Universally Composable (Non-Interactive) Two-Party Computation from Untrusted Reusable Hardware Tokens.
IACR Cryptol. ePrint Arch., 2016


  Loading...