Marc Fischlin

Orcid: 0000-0003-0597-8297

Affiliations:
  • Darmstadt University of Technology, Germany


According to our database1, Marc Fischlin authored at least 153 papers between 1997 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
The Order of Hashing in Fiat-Shamir Schemes.
IACR Cryptol. ePrint Arch., 2025

Efficiency Improvements for Signal's Handshake Protocol.
IACR Cryptol. ePrint Arch., 2025

Strongly Secure Updatable Encryption Requires Public-Key Cryptography.
IACR Commun. Cryptol., 2025

BUFFing Threshold Signature Schemes.
Proceedings of the Public-Key Cryptography - PKC 2025, 2025

Key Derivation Functions Without a Grain of Salt.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

Probabilistic Skipping-Based Data Structures with Robust Efficiency Guarantees.
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025

A Cryptographic Analysis of Google's PSP and Falcon Channel Protocols.
Proceedings of the 20th ACM Asia Conference on Computer and Communications Security, 2025

2024
Decision-based Data Distribution (D³): Enabling Users to Minimize Data Propagation in Privacy-sensitive Scenarios.
Proc. Priv. Enhancing Technol., 2024

BUFFing FALCON Without Increasing the Signature Size.
Proceedings of the Selected Areas in Cryptography - SAC 2024, 2024

Integrating Causality in Messaging Channels.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

Fake It till You Make It: Enhancing Security of Bluetooth Secure Connections via Deferrable Authentication.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Post-quantum Asynchronous Remote Key Generation for FIDO2.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

2023
Post-Quantum Asynchronous Remote Key Generation for FIDO2 Account Recovery.
IACR Cryptol. ePrint Arch., 2023

Quantum key distribution with post-processing driven by physical unclonable functions.
CoRR, 2023

Searching for ELFs in the Cryptographic Forest.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

Post-quantum Security for the Extended Access Control Protocol.
Proceedings of the Security Standardisation Research - 8th International Conference, 2023

Stealth Key Exchange and Confined Access to the Record Protocol Data in TLS 1.3.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Verifiable Verification in Cryptographic Protocols.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

The Indifferentiability of the Duplex and Its Practical Applications.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
Nostradamus Goes Quantum.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

A Random Oracle for All of Us.
Proceedings of the Progress in Cryptology, 2022

2021
The Theory of Hash Functions and Random Oracles - An Approach to Modern Cryptography
Information Security and Cryptography, Springer, ISBN: 978-3-030-63286-1, 2021

An Overview of the Hybrid Argument.
IACR Cryptol. ePrint Arch., 2021

BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Single-to-Multi-theorem Transformations for Non-interactive Statistical Zero-Knowledge.
Proceedings of the Public-Key Cryptography - PKC 2021, 2021

Multipath TLS 1.3.
Proceedings of the Computer Security - ESORICS 2021, 2021

Cryptographic Analysis of the Bluetooth Secure Connection Protocol Suite.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3.
IACR Cryptol. ePrint Arch., 2020

A Cryptographic Analysis of the TLS 1.3 Handshake Protocol.
IACR Cryptol. ePrint Arch., 2020

Information-Theoretically Secure Data Origin Authentication with Quantum and Classical Resources.
Cryptogr., 2020

On the Memory Fault Resilience of TLS 1.3.
Proceedings of the Security Standardisation Research - 6th International Conference, 2020

Towards Post-Quantum Security for Signal's X3DH Handshake.
Proceedings of the Selected Areas in Cryptography - SAC 2020, 2020

Information-Theoretic Security of Cryptographic Channels.
Proceedings of the Information and Communications Security - 22nd International Conference, 2020

Signatures from Sequential-OR Proofs.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

Modeling Memory Faults in Signature and Authenticated Encryption Schemes.
Proceedings of the Topics in Cryptology - CT-RSA 2020, 2020

Authentication in Key-Exchange: Definitions, Relations and Composition.
Proceedings of the 33rd IEEE Computer Security Foundations Symposium, 2020

Security Reductions for White-Box Key-Storage in Mobile Payments.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
Modeling Memory Faults in Signature and Encryption Schemes.
IACR Cryptol. ePrint Arch., 2019

Challenges in Proving Post-Quantum Key Exchanges Based on Key Encapsulation Mechanisms.
IACR Cryptol. ePrint Arch., 2019

Intercept-Resend Emulation Attacks against a Continuous-Variable Quantum Authentication Protocol with Physical Unclonable Keys.
Cryptogr., 2019

Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange.
Proceedings of the Post-Quantum Cryptography - 10th International Conference, 2019

How to Sign with White-Boxed AES.
Proceedings of the Progress in Cryptology - LATINCRYPT 2019, 2019

Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids.
Proceedings of the Computer Security - ESORICS 2019, 2019

2018
Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks.
Proceedings of the 31st IEEE Computer Security Foundations Symposium, 2018

Backdoored Hash Functions: Immunizing HMAC and HKDF.
Proceedings of the 31st IEEE Computer Security Foundations Symposium, 2018

Simulatable Channels: Extended Security that is Universally Composable and Easier to Prove.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

Invisible Sanitizable Signatures and Public-Key Encryption are Equivalent.
Proceedings of the Applied Cryptography and Network Security, 2018

2017
Breakdown Resilience of Key Exchange Protocols and the Cases of NewHope and TLS 1.3.
IACR Cryptol. ePrint Arch., 2017

Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

Zero Round-Trip Time for the Extended Access Control Protocol.
Proceedings of the Computer Security - ESORICS 2017, 2017

PRF-ODH: Relations, Instantiations, and Impossibility Results.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

Redactable Graph Hashing, Revisited - (Extended Abstract).
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Robust Multi-Property Combiners for Hash Functions.
IACR Cryptol. ePrint Arch., 2016

A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol.
IACR Cryptol. ePrint Arch., 2016

Public-Key Cryptography (Dagstuhl Seminar 16371).
Dagstuhl Reports, 2016

Securing Transactions with the eIDAS Protocols.
Proceedings of the Information Security Theory and Practice, 2016

Key Confirmation in Key Exchange: A Formal Treatment and Implications for TLS 1.3.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Attribute-Based Access Control Architectures with the eIDAS Protocols.
Proceedings of the Security Standardisation Research - Third International Conference, 2016

On the Hardness of Proving CCA-Security of Signed ElGamal.
Proceedings of the Public-Key Cryptography - PKC 2016, 2016

Obfuscation Combiners.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

2015
Sanitizable Signcryption: Sanitization over Encrypted Data (Full Version).
IACR Cryptol. ePrint Arch., 2015

Notions of Deniable Message Authentication.
Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, 2015

Adaptive Proofs of Knowledge in the Random Oracle Model.
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015

Data Is a Stream: Security of Stream-Based Channels.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Privately Computing Set-Union and Set-Intersection Cardinality via Bloom Filters.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015

2014
Operational Signature Schemes.
IACR Cryptol. ePrint Arch., 2014

Abstreitbarkeit bei eID-Lösungen.
Datenschutz und Datensicherheit, 2014

Unpicking PLAID - A Cryptographic Analysis of an ISO-Standards-Track Authentication Protocol.
Proceedings of the Security Standardisation Research - First International Conference, 2014

Intercepting tokens in cryptographic protocols: The empire strikes back in the clone wars.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

Multi-Stage Key Exchange and the Case of Google's QUIC Protocol.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
A Cryptographic Analysis of OPACITY.
IACR Cryptol. ePrint Arch., 2013

Subtle kinks in distance-bounding: an analysis of prominent protocols.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

The PACE|CA Protocol for Machine Readable Travel Documents.
Proceedings of the Trusted Systems - 5th International Conference, 2013

Limitations of the Meta-reduction Technique: The Case of Schnorr Signatures.
Proceedings of the Advances in Cryptology, 2013

Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions.
Proceedings of the Advances in Cryptology, 2013

A Cryptographic Analysis of OPACITY - (Extended Abstract).
Proceedings of the Computer Security - ESORICS 2013, 2013

The Fiat-Shamir Transformation in a Quantum World.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

Notions of Black-Box Reductions, Revisited.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

Terrorism in Distance Bounding: Modeling Terrorist-Fraud Resistance.
Proceedings of the Applied Cryptography and Network Security, 2013

Computing on Authenticated Data for Adjustable Predicates.
Proceedings of the Applied Cryptography and Network Security, 2013

2012
Security of blind signatures under aborts and applications to adaptive oblivious transfer.
J. Math. Cryptol., 2012

Provably Secure Distance-Bounding: an Analysis of Prominent Protocols.
IACR Cryptol. ePrint Arch., 2012

Unconditionally-Secure Universally Composable Password-Based Key-Exchange based on One-Time Memory Tokens.
IACR Cryptol. ePrint Arch., 2012

Less is More: Relaxed yet Composable Security Notions for Key Exchange.
IACR Cryptol. ePrint Arch., 2012

Domain-Specifi c Pseudonymous Signatures for the German Identity Card.
IACR Cryptol. ePrint Arch., 2012

Merging the Cryptographic Security Analysis and the Algebraic-Logic Security Proof of PACE.
Proceedings of the Sicherheit 2012: Sicherheit, 2012

TLS, PACE, and EAC: ACryptographic View at Modern Key Exchange Protocols.
Proceedings of the Sicherheit 2012: Sicherheit, 2012

History-Free Sequential Aggregate Signatures.
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012

Domain-Specific Pseudonymous Signatures for the German Identity Card.
Proceedings of the Information Security - 15th International Conference, 2012

The PACE|AA Protocol for Machine Readable Travel Documents, and Its Security.
Proceedings of the Financial Cryptography and Data Security, 2012

Black-Box Reductions and Separations in Cryptography.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012

2011
Public-Key Cryptography (Dagstuhl Seminar 11391).
Dagstuhl Reports, 2011

Learning Whom to Trust in a Privacy-Friendly Way.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Breaking reCAPTCHA: A Holistic Approach via Shape Recognition.
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011

A Formal Approach to Distance-Bounding RFID Protocols.
Proceedings of the Information Security, 14th International Conference, 2011

Secure Set Intersection with Untrusted Hardware Tokens.
Proceedings of the Topics in Cryptology - CT-RSA 2011, 2011

Expedient Non-malleability Notions for Hash Functions.
Proceedings of the Topics in Cryptology - CT-RSA 2011, 2011

Physically Uncloneable Functions in the Universal Composition Framework.
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011

Random Oracle Reducibility.
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011

Composability of bellare-rogaway key exchange protocols.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Non-interactive and Re-usable Universally Composable String Commitments with Adaptive Security.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

Random Oracles in a Quantum World.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

Relaxed Security Notions for Signatures of Knowledge.
Proceedings of the Applied Cryptography and Network Security, 2011

2010
Random Oracles in a Quantum World
CoRR, 2010

Delayed-Key Message Authentication for Streams.
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010

CAPTCHAs: The Good, the Bad, and the Ugly.
Proceedings of the Sicherheit 2010: Sicherheit, 2010

History-Free Aggregate Message Authentication Codes.
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010

Confidential Signatures and Deterministic Signcryption.
Proceedings of the Public Key Cryptography, 2010

Unlinkability of Sanitizable Signatures.
Proceedings of the Public Key Cryptography, 2010

Security Analysis of the Extended Access Control Protocol for Machine Readable Travel Documents.
Proceedings of the Information Security - 13th International Conference, 2010

On the Impossibility of Three-Move Blind Signature Schemes.
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010

Hash Function Combiners in TLS and SSL.
Proceedings of the Topics in Cryptology, 2010

Random Oracles with(out) Programmability.
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010

Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions.
Proceedings of the Progress in Cryptology, 2010

Redactable Signatures for Tree-Structured Data: Definitions and Constructions.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

2009
Security of Blind Signatures under Aborts.
Proceedings of the Public Key Cryptography, 2009

Security of Sanitizable Signatures Revisited.
Proceedings of the Public Key Cryptography, 2009

Security Analysis of the PACE Key-Agreement Protocol.
Proceedings of the Information Security, 12th International Conference, 2009

Santizable Signatures: How to Partially Delegate Control for Authenticated Data.
Proceedings of the BIOSIG 2009, 2009

Foundations of Non-malleable Hash and One-Way Functions.
Proceedings of the Advances in Cryptology, 2009

2008
Multi-property Preserving Combiners for Hash Functions.
Proceedings of the Theory of Cryptography, Fifth Theory of Cryptography Conference, 2008

Robust Multi-property Combiners for Hash Functions Revisited.
Proceedings of the Automata, Languages and Programming, 35th International Colloquium, 2008

Security of NMACand HMACBased on Non-malleability.
Proceedings of the Topics in Cryptology, 2008

Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles.
Proceedings of the Advances in Cryptology, 2008

2007
Anonymous Signatures Made Easy.
Proceedings of the Public Key Cryptography, 2007

A Closer Look at PKI: Security and Efficiency.
Proceedings of the Public Key Cryptography, 2007

Security of Invertible Media Authentication Schemes Revisited.
Proceedings of the Information Hiding, 9th International Workshop, 2007

Security-Amplifying Combiners for Collision-Resistant Hash Functions.
Proceedings of the Advances in Cryptology, 2007

2006
Universally Composable Oblivious Transfer in the Multi-party Setting.
Proceedings of the Topics in Cryptology, 2006

Round-Optimal Composable Blind Signatures in the Common Reference String Model.
Proceedings of the Advances in Cryptology, 2006

On the Security of OAEP.
Proceedings of the Advances in Cryptology, 2006

2005
Completely Non-malleable Schemes.
Proceedings of the Automata, Languages and Programming, 32nd International Colloquium, 2005

Communication-Efficient Non-interactive Proofs of Knowledge with Online Extractors.
Proceedings of the Advances in Cryptology, 2005

Analysis of Random Oracle Instantiation Scenarios for OAEP and Other Practical Schemes.
Proceedings of the Advances in Cryptology, 2005

2004
A Privacy-Friendly Loyalty System Based on Discrete Logarithms over Elliptic Curves.
Proceedings of the Financial Cryptography, 2004

Fast Verification of Hash Chains.
Proceedings of the Topics in Cryptology, 2004

2003
The Cramer-Shoup Strong-RSASignature Scheme Revisited.
Proceedings of the Public Key Cryptography, 2003

Progressive Verification: The Case of Message Authentication: (Extended Abstract).
Proceedings of the Progress in Cryptology, 2003

2002
The Cramer-Shoup Strong-RSA Signature Scheme Revisited.
IACR Cryptol. ePrint Arch., 2002

The Representation Problem Based on Factoring.
Proceedings of the Topics in Cryptology, 2002

On the Impossibility of Constructing Non-interactive Statistically-Secret Protocols from Any Trapdoor One-Way Function.
Proceedings of the Topics in Cryptology, 2002

2001
Trapdoor commitment schemes and their applications.
PhD thesis, 2001

Identification Protocols Secure against Reset Attacks.
Proceedings of the Advances in Cryptology, 2001

A Cost-Effective Pay-Per-Multiplication Comparison Method for Millionaires.
Proceedings of the Topics in Cryptology, 2001

Universally Composable Commitments.
Proceedings of the Advances in Cryptology, 2001

2000
Efficient Non-malleable Commitment Schemes.
Proceedings of the Advances in Cryptology, 2000

A Note on Security Proofs in the Generic Model.
Proceedings of the Advances in Cryptology, 2000

1999
Pseudorandom Function Tribe Ensembles Based on One-Way Permutations: Improvements and Applications.
Proceedings of the Advances in Cryptology, 1999

1998
Cryptographic Limitations on Parallelizing Membership and Equivalence Queries with Applications to Random Self-Reductions.
Proceedings of the Algorithmic Learning Theory, 9th International Conference, 1998

1997
Lower Bounds for the Signature Size of Incremental Schemes.
Proceedings of the 38th Annual Symposium on Foundations of Computer Science, 1997

Incremental Cryptography and Memory Checkers.
Proceedings of the Advances in Cryptology, 1997

Practical Memory Checkers for Stacks, Queues and Deques.
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997


  Loading...