Marc Fischlin
Orcid: 0000-0003-0597-8297Affiliations:
- Darmstadt University of Technology, Germany
According to our database1,
Marc Fischlin
authored at least 153 papers
between 1997 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on fischlin.de
-
on dl.acm.org
On csauthors.net:
Bibliography
2025
IACR Cryptol. ePrint Arch., 2025
IACR Commun. Cryptol., 2025
Proceedings of the Public-Key Cryptography - PKC 2025, 2025
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025
Proceedings of the 20th ACM Asia Conference on Computer and Communications Security, 2025
2024
Decision-based Data Distribution (D³): Enabling Users to Minimize Data Propagation in Privacy-sensitive Scenarios.
Proc. Priv. Enhancing Technol., 2024
Proceedings of the Selected Areas in Cryptography - SAC 2024, 2024
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024
Fake It till You Make It: Enhancing Security of Bluetooth Secure Connections via Deferrable Authentication.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024
2023
IACR Cryptol. ePrint Arch., 2023
Quantum key distribution with post-processing driven by physical unclonable functions.
CoRR, 2023
Proceedings of the Theory of Cryptography - 21st International Conference, 2023
Proceedings of the Security Standardisation Research - 8th International Conference, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023
2022
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022
2021
Information Security and Cryptography, Springer, ISBN: 978-3-030-63286-1, 2021
BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Single-to-Multi-theorem Transformations for Non-interactive Statistical Zero-Knowledge.
Proceedings of the Public-Key Cryptography - PKC 2021, 2021
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021
2020
Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3.
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Information-Theoretically Secure Data Origin Authentication with Quantum and Classical Resources.
Cryptogr., 2020
Proceedings of the Security Standardisation Research - 6th International Conference, 2020
Proceedings of the Selected Areas in Cryptography - SAC 2020, 2020
Proceedings of the Information and Communications Security - 22nd International Conference, 2020
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020
Proceedings of the Topics in Cryptology - CT-RSA 2020, 2020
Proceedings of the 33rd IEEE Computer Security Foundations Symposium, 2020
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020
2019
IACR Cryptol. ePrint Arch., 2019
Challenges in Proving Post-Quantum Key Exchanges Based on Key Encapsulation Mechanisms.
IACR Cryptol. ePrint Arch., 2019
Intercept-Resend Emulation Attacks against a Continuous-Variable Quantum Authentication Protocol with Physical Unclonable Keys.
Cryptogr., 2019
Proceedings of the Post-Quantum Cryptography - 10th International Conference, 2019
Proceedings of the Progress in Cryptology - LATINCRYPT 2019, 2019
Proceedings of the Computer Security - ESORICS 2019, 2019
2018
Proceedings of the 31st IEEE Computer Security Foundations Symposium, 2018
Proceedings of the 31st IEEE Computer Security Foundations Symposium, 2018
Simulatable Channels: Extended Security that is Universally Composable and Easier to Prove.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018
Proceedings of the Applied Cryptography and Network Security, 2018
2017
IACR Cryptol. ePrint Arch., 2017
Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017
Proceedings of the Computer Security - ESORICS 2017, 2017
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
2016
A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol.
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Information Security Theory and Practice, 2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the Security Standardisation Research - Third International Conference, 2016
Proceedings of the Public-Key Cryptography - PKC 2016, 2016
2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, 2015
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015
2014
Unpicking PLAID - A Cryptographic Analysis of an ISO-Standards-Track Authentication Protocol.
Proceedings of the Security Standardisation Research - First International Conference, 2014
Intercepting tokens in cryptographic protocols: The empire strikes back in the clone wars.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013
Proceedings of the Trusted Systems - 5th International Conference, 2013
Proceedings of the Advances in Cryptology, 2013
Proceedings of the Advances in Cryptology, 2013
Proceedings of the Computer Security - ESORICS 2013, 2013
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013
Proceedings of the Applied Cryptography and Network Security, 2013
Proceedings of the Applied Cryptography and Network Security, 2013
2012
Security of blind signatures under aborts and applications to adaptive oblivious transfer.
J. Math. Cryptol., 2012
IACR Cryptol. ePrint Arch., 2012
Unconditionally-Secure Universally Composable Password-Based Key-Exchange based on One-Time Memory Tokens.
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Merging the Cryptographic Security Analysis and the Algebraic-Logic Security Proof of PACE.
Proceedings of the Sicherheit 2012: Sicherheit, 2012
Proceedings of the Sicherheit 2012: Sicherheit, 2012
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012
Proceedings of the Information Security - 15th International Conference, 2012
Proceedings of the Financial Cryptography and Data Security, 2012
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012
2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011
Proceedings of the Information Security, 14th International Conference, 2011
Proceedings of the Topics in Cryptology - CT-RSA 2011, 2011
Proceedings of the Topics in Cryptology - CT-RSA 2011, 2011
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Non-interactive and Re-usable Universally Composable String Commitments with Adaptive Security.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011
Proceedings of the Applied Cryptography and Network Security, 2011
2010
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010
Proceedings of the Sicherheit 2010: Sicherheit, 2010
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010
Proceedings of the Public Key Cryptography, 2010
Proceedings of the Public Key Cryptography, 2010
Security Analysis of the Extended Access Control Protocol for Machine Readable Travel Documents.
Proceedings of the Information Security - 13th International Conference, 2010
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010
Proceedings of the Topics in Cryptology, 2010
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010
Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions.
Proceedings of the Progress in Cryptology, 2010
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010
2009
Proceedings of the Public Key Cryptography, 2009
Proceedings of the Public Key Cryptography, 2009
Proceedings of the Information Security, 12th International Conference, 2009
Proceedings of the BIOSIG 2009, 2009
Proceedings of the Advances in Cryptology, 2009
2008
Proceedings of the Theory of Cryptography, Fifth Theory of Cryptography Conference, 2008
Proceedings of the Automata, Languages and Programming, 35th International Colloquium, 2008
Proceedings of the Topics in Cryptology, 2008
Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles.
Proceedings of the Advances in Cryptology, 2008
2007
Proceedings of the Public Key Cryptography, 2007
Proceedings of the Information Hiding, 9th International Workshop, 2007
Proceedings of the Advances in Cryptology, 2007
2006
Proceedings of the Topics in Cryptology, 2006
Proceedings of the Advances in Cryptology, 2006
2005
Proceedings of the Automata, Languages and Programming, 32nd International Colloquium, 2005
Proceedings of the Advances in Cryptology, 2005
Analysis of Random Oracle Instantiation Scenarios for OAEP and Other Practical Schemes.
Proceedings of the Advances in Cryptology, 2005
2004
Proceedings of the Financial Cryptography, 2004
2003
Proceedings of the Public Key Cryptography, 2003
Proceedings of the Progress in Cryptology, 2003
2002
IACR Cryptol. ePrint Arch., 2002
Proceedings of the Topics in Cryptology, 2002
On the Impossibility of Constructing Non-interactive Statistically-Secret Protocols from Any Trapdoor One-Way Function.
Proceedings of the Topics in Cryptology, 2002
2001
Proceedings of the Advances in Cryptology, 2001
Proceedings of the Topics in Cryptology, 2001
2000
Proceedings of the Advances in Cryptology, 2000
Proceedings of the Advances in Cryptology, 2000
1999
Pseudorandom Function Tribe Ensembles Based on One-Way Permutations: Improvements and Applications.
Proceedings of the Advances in Cryptology, 1999
1998
Cryptographic Limitations on Parallelizing Membership and Equivalence Queries with Applications to Random Self-Reductions.
Proceedings of the Algorithmic Learning Theory, 9th International Conference, 1998
1997
Proceedings of the 38th Annual Symposium on Foundations of Computer Science, 1997
Proceedings of the Advances in Cryptology, 1997
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997