Julia Hesse

Orcid: 0000-0002-2875-6198

According to our database1, Julia Hesse authored at least 30 papers between 2014 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
The 2Hash OPRF Framework and Efficient Post-Quantum Instantiations.
IACR Cryptol. ePrint Arch., 2024

Bare PAKE: Universally Composable Key Exchange from just Passwords.
IACR Cryptol. ePrint Arch., 2024

2023
Attribute-based Single Sign-On: Secure, Private, and Efficient.
Proc. Priv. Enhancing Technol., October, 2023

How to Bind Anonymous Credentials to Humans.
IACR Cryptol. ePrint Arch., 2023

Password-Authenticated TLS via OPAQUE and Post-Handshake Authentication.
IACR Cryptol. ePrint Arch., 2023

Security Analysis of the WhatsApp End-to-End Encrypted Backup Protocol.
IACR Cryptol. ePrint Arch., 2023

Generalized Fuzzy Password-Authenticated Key Exchange from Error Correcting Codes.
IACR Cryptol. ePrint Arch., 2023

DualDory: Logarithmic-Verifier Linkable Ring Signatures through Preprocessing.
IACR Cryptol. ePrint Arch., 2023

2022
SoK: Oblivious Pseudorandom Functions.
IACR Cryptol. ePrint Arch., 2022

DPaSE: Distributed Password-Authenticated Symmetric-Key Encryption, or How to Get Many Keys from One Password.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Towards Tight Adaptive Security of Non-Interactive Key Exchange.
IACR Cryptol. ePrint Arch., 2021

Security Analysis of CPace.
IACR Cryptol. ePrint Arch., 2021

Towards Intelligent Context-Aware 6G Security.
CoRR, 2021

FastZIP: faster and more secure zero-interaction pairing.
Proceedings of the MobiSys '21: The 19th Annual International Conference on Mobile Systems, Applications, and Services, Virtual Event, Wisconsin, USA, 24 June, 2021

2020
Fuzzy Asymmetric Password-Authenticated Key Exchange.
IACR Cryptol. ePrint Arch., 2020

DPaSE: Distributed Password-Authenticated Symmetric Encryption.
IACR Cryptol. ePrint Arch., 2020

On the (Ir)Replaceability of Global Setups, or How (Not) to Use a Global Ledger.
IACR Cryptol. ePrint Arch., 2020

Universal Composition with Global Subroutines: Capturing Global Setup within plain UC.
IACR Cryptol. ePrint Arch., 2020

Separating Symmetric and Asymmetric Password-Authenticated Key Exchange.
Proceedings of the Security and Cryptography for Networks - 12th International Conference, 2020

2019
Separating Standard and Asymmetric Password-Authenticated Key Exchange.
IACR Cryptol. ePrint Arch., 2019

Multi-Party Virtual State Channels.
IACR Cryptol. ePrint Arch., 2019

PESTO: Proactively Secure Distributed Single Sign-On, or How to Trust a Hacked Server.
IACR Cryptol. ePrint Arch., 2019

Identity Management: State of the Art, Challenges and Perspectives.
Proceedings of the Privacy and Identity Management. Data for Better Living: AI and Privacy, 2019

2018
On Tightly Secure Non-Interactive Key Exchange.
IACR Cryptol. ePrint Arch., 2018

Graded Encoding Schemes from Obfuscation.
IACR Cryptol. ePrint Arch., 2018

Fuzzy Password-Authenticated Key Exchange.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

2017
Fuzzy Authenticated Key Exchange.
IACR Cryptol. ePrint Arch., 2017

2015
Reconfigurable Cryptography: A flexible approach to long-term security.
IACR Cryptol. ePrint Arch., 2015

2014
Polynomial Spaces: A New Framework for Composite-to-Prime-Order Transformations.
IACR Cryptol. ePrint Arch., 2014

Universally Composable Non-Interactive Key Exchange.
IACR Cryptol. ePrint Arch., 2014


  Loading...