Julia Hesse

Orcid: 0000-0002-2875-6198

According to our database1, Julia Hesse authored at least 37 papers between 2014 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
How to (not) combine Oblivious Pseudorandom Functions.
IACR Cryptol. ePrint Arch., 2025

Scalable and Fine-Tuned Privacy Pass from Group Verifiable Random Functions.
Proceedings of the 10th IEEE European Symposium on Security and Privacy, 2025

PAKE Combiners and Efficient Post-quantum Instantiations.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

The 2Hash OPRF Framework and Efficient Post-quantum Instantiations.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

2024
Bare PAKE: Universally Composable Key Exchange from Just Passwords.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Password-Protected Key Retrieval with(out) HSM Protection.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
Attribute-based Single Sign-On: Secure, Private, and Efficient.
IACR Cryptol. ePrint Arch., 2023

How to Bind Anonymous Credentials to Humans.
Proceedings of the 32nd USENIX Security Symposium, 2023

Password-Authenticated TLS via OPAQUE and Post-Handshake Authentication.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

Security Analysis of the WhatsApp End-to-End Encrypted Backup Protocol.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Generalized Fuzzy Password-Authenticated Key Exchange from Error Correcting Codes.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
SoK: Oblivious Pseudorandom Functions.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022

DualDory: Logarithmic-Verifier Linkable Ring Signatures Through Preprocessing.
Proceedings of the Computer Security - ESORICS 2022, 2022

DPaSE: Distributed Password-Authenticated Symmetric-Key Encryption, or How to Get Many Keys from One Password.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Raw data from "FastZIP: Faster and More Secure Zero-Interaction Pairing".
Dataset, June, 2021

Evaluation results from "FastZIP: Faster and More Secure Zero-Interaction Pairing".
Dataset, June, 2021

Index of supplementary files from "FastZIP: Faster and More Secure Zero-Interaction Pairing".
Dataset, May, 2021

Towards Intelligent Context-Aware 6G Security.
CoRR, 2021

Towards Tight Adaptive Security of Non-interactive Key Exchange.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

On the (Ir)Replaceability of Global Setups, or How (Not) to Use a Global Ledger.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

FastZIP: faster and more secure zero-interaction pairing.
Proceedings of the MobiSys '21: The 19th Annual International Conference on Mobile Systems, Applications, and Services, Virtual Event, Wisconsin, USA, 24 June, 2021

Security Analysis of CPace.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
DPaSE: Distributed Password-Authenticated Symmetric Encryption.
IACR Cryptol. ePrint Arch., 2020

Universal Composition with Global Subroutines: Capturing Global Setup Within Plain UC.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

Separating Symmetric and Asymmetric Password-Authenticated Key Exchange.
Proceedings of the Security and Cryptography for Networks - 12th International Conference, 2020

PESTO: Proactively Secure Distributed Single Sign-On, or How to Trust a Hacked Server.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020

Fuzzy Asymmetric Password-Authenticated Key Exchange.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
Separating Standard and Asymmetric Password-Authenticated Key Exchange.
IACR Cryptol. ePrint Arch., 2019

Identity Management: State of the Art, Challenges and Perspectives.
Proceedings of the Privacy and Identity Management. Data for Better Living: AI and Privacy, 2019

Multi-party Virtual State Channels.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

2018
Graded Encoding Schemes from Obfuscation.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

Fuzzy Password-Authenticated Key Exchange.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

On Tightly Secure Non-Interactive Key Exchange.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

2017
Fuzzy Authenticated Key Exchange.
IACR Cryptol. ePrint Arch., 2017

2016
Reconfigurable Cryptography: A Flexible Approach to Long-Term Security.
Proceedings of the Theory of Cryptography - 13th International Conference, 2016

2014
Universally Composable Non-Interactive Key Exchange.
Proceedings of the Security and Cryptography for Networks - 9th International Conference, 2014

Polynomial Spaces: A New Framework for Composite-to-Prime-Order Transformations.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014


  Loading...