Patrick Struck

Orcid: 0000-0001-7738-2017

Affiliations:
  • Universität Konstanz, Germany
  • Universität Regensburg, Germany (former)
  • Technische Universität Darmstadt, Germany (former)


According to our database1, Patrick Struck authored at least 31 papers between 2017 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
A Framework for Advanced Signature Notions.
IACR Cryptol. ePrint Arch., 2025

A Note on the Binding Properties of KEM Combiners.
IACR Cryptol. ePrint Arch., 2025

How (not) to Build Identity-Based Encryption from Isogenies.
IACR Cryptol. ePrint Arch., 2025

Binding Security of Implicitly-Rejecting KEMs and Application to BIKE and HQC.
IACR Commun. Cryptol., 2025

Lattice-Based Sanitizable Signature Schemes: Chameleon Hash Functions and More.
Proceedings of the Post-Quantum Cryptography - 16th International Workshop, 2025

Exclusive Ownership of Fiat-Shamir Signatures: ML-DSA, SQIsign, LESS, and More.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

Field-Tested Authentication for Quantum Key Distribution and DoS Attacks.
Proceedings of the Applied Cryptography and Network Security Workshops, 2025

2024
Constructing Committing and Leakage-Resilient Authenticated Encryption.
IACR Cryptol. ePrint Arch., 2024

Quantum Black-Box Separations: Succinct Non-Interactive Arguments from Falsifiable Assumptions.
IACR Cryptol. ePrint Arch., 2024

Hide-and-Seek and the Non-resignability of the BUFF Transform.
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024

Hash Your Keys Before Signing - BUFF Security of the Additional NIST PQC Signatures.
Proceedings of the Post-Quantum Cryptography - 15th International Workshop, 2024

The Role of Message-Bound Signatures for the Beyond UnForgeability Features and Weak Keys.
Proceedings of the Information Security - 27th International Conference, 2024

Post-quantum Security of Tweakable Even-Mansour, and Applications.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

On the (In)Security of the BUFF Transform.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Efficient Post-Quantum Secure Deterministic Threshold Wallets from Isogenies.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
Committing AE from Sponges: Security Analysis of the NIST LWC Finalists.
IACR Cryptol. ePrint Arch., 2023

A Lightweight Identification Protocol Based on Lattices.
Proceedings of the Public-Key Cryptography - PKC 2023, 2023

2022
Security of Cryptographic Primitives in Advanced Security Notions.
PhD thesis, 2022

On the Related-Key Attack Security of Authenticated Encryption Schemes.
Proceedings of the Security and Cryptography for Networks - 13th International Conference, 2022

On Quantum Ciphertext Indistinguishability, Recoverability, and OAEP.
Proceedings of the Post-Quantum Cryptography - 13th International Workshop, 2022

Sponge-Based Authenticated Encryption: Security Against Quantum Attackers.
Proceedings of the Post-Quantum Cryptography - 13th International Workshop, 2022

2021
Quantum Indistinguishability for Public Key Encryption.
Proceedings of the Post-Quantum Cryptography - 12th International Workshop, 2021

2020
Encryption Schemes Using Random Oracles: From Classical to Post-Quantum Security.
Proceedings of the Post-Quantum Cryptography - 11th International Conference, 2020

Security of Public Key Encryption Against Resetting Attacks.
Proceedings of the Progress in Cryptology - INDOCRYPT 2020, 2020

Leakage-Resilient Authenticated Encryption from Leakage-Resilient Pseudorandom Functions.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2020

Deterministic Wallets in a Quantum World.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Secure Two-Party Computation in a Quantum World.
Proceedings of the Applied Cryptography and Network Security, 2020

2019
Sponges Resist Leakage: The Case of Authenticated Encryption.
Proceedings of the 31. Krypto-Tag, Berlin, Germany, October 17-18, 2019, 2019

2018
Challenges in Post-Quantum Security Reductions.
Proceedings of the 29. Krypto-Tag, Renningen, Germany, September 6-7, 2018, 2018

2017
A Linearly Homomorphic Signature Scheme from Weaker Assumptions.
Proceedings of the Cryptography and Coding - 16th IMA International Conference, 2017

Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability.
Proceedings of the Codes, Cryptology and Information Security, 2017


  Loading...