Marian Margraf

Orcid: 0009-0005-8577-1318

According to our database1, Marian Margraf authored at least 44 papers between 2007 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
A Specification of an Anonymous Credential System Using BBS+ Signatures with Privacy-Preserving Revocation and Device Binding.
IACR Cryptol. ePrint Arch., 2025

A Note on the Post-Quantum Security of Identity-Based Encryption on Isogenous Pairing Groups.
IACR Cryptol. ePrint Arch., 2025

Strong Multiple-CCA Security in the Quantum Random Oracle Model for an FO-like PKE Combiner.
IACR Commun. Cryptol., 2025

An Approach for a Supporting Multi-LLM System for Automated Certification Based on the German IT-Grundschutz.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2025

2024
A Black-box Attack on Fixed-Unitary Quantum Encryption Schemes.
IACR Cryptol. ePrint Arch., 2024

HHL for tensor-decomposable matrices.
IACR Cryptol. ePrint Arch., 2024

Advancements in UWB: Paving the Way for Sovereign Data Networks in Healthcare Facilities.
Proceedings of the 2nd International Workshop on Networked AI Systems, 2024

Achieving Third-party Deniability in Signature-based Credential Systems.
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024

2023
On Multiple Encryption for Public-Key Cryptography.
Cryptogr., September, 2023

On iterated punctured Grover.
IACR Cryptol. ePrint Arch., 2023

Post-quantum Security for the Extended Access Control Protocol.
Proceedings of the Security Standardisation Research - 8th International Conference, 2023

Cryptographic Requirements of Verifiable Credentials for Digital Identification Documents.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

2021
An overview of touchless 2D fingerprint recognition.
EURASIP J. Image Video Process., 2021

Systeme der Künstlichen Intelligenz.
Datenschutz und Datensicherheit, 2021

Privacy Needs Reflection: Conceptional Design Rationales for Privacy-Preserving Explanation User Interfaces.
Proceedings of the Mensch und Computer 2021, 2021

2020
Gewährleistung langfristiger Sicherheit für Breeder-Dokumente durch Biometrie und Blockchain-Technologie.
Datenschutz und Datensicherheit, 2020

The Shift PUF: Technique for Squaring the Machine Learning Complexity of Arbiter-based PUFs: Work-in-Progress.
Proceedings of the International Conference on Compilers, 2020

2019
Sample Essentiality and Its Application to Modeling Attacks on Arbiter PUFs.
ACM Trans. Embed. Comput. Syst., 2019

Why attackers lose: design and security analysis of arbitrarily large XOR arbiter PUFs.
J. Cryptogr. Eng., 2019

Splitting the Interpose PUF: A Novel Modeling Attack Strategy.
IACR Cryptol. ePrint Arch., 2019

Digitale Identitäten auf dem Smartphone.
Datenschutz und Datensicherheit, 2019

IT-Sicherheit und Datenschutz: Nutzergerecht.
Datenschutz und Datensicherheit, 2019

SLIDEDroid: A Secure Lightweight Identity for the Android Platform.
Proceedings of the 31. Krypto-Tag, Berlin, Germany, October 17-18, 2019, 2019

Breaking the Lightweight Secure PUF: Understanding the Relation of Input Transformations and Machine Learning Resistance.
Proceedings of the Smart Card Research and Advanced Applications, 2019

On the Application of Homomorphic Encryption to Face Identification.
Proceedings of the 2019 International Conference of the Biometrics Special Interest Group, 2019

2018
Hijacking DNS Subdomains via Subzone Registration: A Case for Signed Zones.
Open J. Web Technol., 2018

Attacking RO-PUFs with Enhanced Challenge-Response Pairs.
Proceedings of the ICT Systems Security and Privacy Protection, 2018

2017
Datenschutz und -sicherheit in einer zunehmend vernetzten Welt.
Datenschutz und Datensicherheit, 2017

The German eID as an Authentication Token on Android Devices.
CoRR, 2017

Enhancing Breeder Document Long-Term Security Using Blockchain Technology.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

Why Attackers Lose: Design and Security Analysis of Arbitrarily Large XOR Arbiter PUFs.
Proceedings of the PROOFS 2017, 2017

2016
Security Evaluation of Apple Pay at Point-of-Sale Terminals.
Proceedings of the 10th International Conference on Next Generation Mobile Applications, 2016

Zur Benutzbarkeit der AusweisApp2.
Proceedings of the Mensch und Computer 2016, 2016

Usability-Untersuchung eines Papierprototypen für eine mobile Online-Ausweisfunktion des Personalausweises.
Proceedings of the 46. Jahrestagung der Gesellschaft für Informatik, 2016

Workshop: Nutzerzentrierte Sicherheit - NzS 2016.
Proceedings of the 46. Jahrestagung der Gesellschaft für Informatik, 2016

2015
Benutzerzentrierte Entwicklung für das Internet der Dinge.
Datenschutz und Datensicherheit, 2015

2014
On Valid and Optimal Deployments for Mixed-Tenancy Problems in SaaS-Applications.
Proceedings of the 2014 IEEE World Congress on Services, 2014

2010
Der Ausweis für das Internet.
Wirtschaftsinformatik Manag., 2010

Kartenleser für den neuen deutschen personalausweis - Vor- und Nachteile unterschiedlicher Lesertypen.
Datenschutz und Datensicherheit, 2010

Das Sperrmanagement im neuen deutschen Personalausweis - Sperrmanagement ohne globale chipindividuelle Merkmale.
Datenschutz und Datensicherheit, 2010

The New German ID Card.
Proceedings of the ISSE 2010, 2010

2008
Sicherheitsmechanismen für kontaktlose Chips im deutschen elektronischen Personalausweis - Ein Überblick über Sicherheitsmerkmale, Risiken und Gegenmaßnahmen.
Datenschutz und Datensicherheit, 2008

Approximative Algorithmen und Nichtapproximierbarkeit.
De Gruyter Lehrbuch, de Gruyter, ISBN: 978-3-11-020317-2, 2008

2007
Attacks on the ESA-PSS-04-151 MAC Scheme.
Proceedings of the Selected Areas in Cryptography, 14th International Workshop, 2007


  Loading...