Ralf Küsters

Orcid: 0000-0002-9071-9312

Affiliations:
  • University of Stuttgart, Germany
  • University of Trier, Department of Computer Science, Germany (former)


According to our database1, Ralf Küsters authored at least 127 papers between 1997 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Gaze3P: Gaze-Based Prediction of User-Perceived Privacy.
CoRR, July, 2025

Guidelines for Gaze-based Neural Preliminary Diagnosis.
CoRR, June, 2025

QualitEye: Public and Privacy-preserving Gaze Data Quality Verification.
CoRR, June, 2025

Formal Security Analysis of the OpenID FAPI 2.0 Family of Protocols: Accompanying a Standardization Process.
ACM Trans. Priv. Secur., February, 2025

Audience Injection Attacks: A New Class of Attacks on Web-Based Authorization and Authentication Standards.
IACR Cryptol. ePrint Arch., 2025

Pseudorandom Correlation Functions from Ring-LWR.
IACR Cryptol. ePrint Arch., 2025

AttentionLeak: What Does Human Attention Reveal About Information Visualisation?
Proceedings of the Document Analysis and Recognition - ICDAR 2025, 2025

Verifiable E-Voting with a Trustless Bulletin Board.
Proceedings of the 38th IEEE Computer Security Foundations Symposium, 2025

2024
PrivatEyes: Appearance-based Gaze Estimation Using Federated Secure Multi-Party Computation.
Proc. ACM Hum. Comput. Interact., 2024

ZK-SNARKs for Ballot Validity: A Feasibility Study.
Proceedings of the Electronic Voting - 9th International Joint Conference, 2024

Formal Security Analysis of the OpenID FAPI 2.0: Accompanying a Standardization Process.
Proceedings of the 37th IEEE Computer Security Foundations Symposium, 2024

Accountable Bulletin Boards: Definition and Provably Secure Implementation.
Proceedings of the 37th IEEE Computer Security Foundations Symposium, 2024

Actively Secure Polynomial Evaluation from Shared Polynomial Encodings.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

2023
Convolutions in Overdrive: Maliciously Secure Convolutions for MPC.
IACR Cryptol. ePrint Arch., 2023

Multipars: Reduced-Communication MPC over Z2k.
IACR Cryptol. ePrint Arch., 2023

Overdrive LowGear 2.0: Reduced-Bandwidth MPC without Sacrifice.
IACR Cryptol. ePrint Arch., 2023

Layered Symbolic Security Analysis in DY$^\star$.
IACR Cryptol. ePrint Arch., 2023

AUC: Accountable Universal Composability.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Fully Tally-Hiding Verifiable E-Voting for Real-World Elections with Seat-Allocations.
Proceedings of the Computer Security - ESORICS 2023, 2023

The Grant Negotiation and Authorization Protocol: Attacking, Fixing, and Verifying an Emerging Standard.
Proceedings of the Computer Security - ESORICS 2023, 2023

Layered Symbolic Security Analysis in $\textsf {DY}^\star $.
Proceedings of the Computer Security - ESORICS 2023, 2023

Overdrive LowGear 2.0: Reduced-Bandwidth MPC without Sacrifice.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
Arithmetic Tuples for MPC.
IACR Cryptol. ePrint Arch., 2022

Publicly Accountable Robust Multi-Party Computation.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

A Formal Security Analysis of the W3C Web Payment APIs: Attacks and Verification.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Recent Developments in the Context of Online Elections and Digital Polls in Germany.
Proceedings of the Sicherheit, 2022

Federated Learning for Appearance-based Gaze Estimation in the Wild.
Proceedings of The 1st Gaze Meets ML workshop, 2022

Embedding the UC Model into the IITM Model.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022


Kryvos: Publicly Tally-Hiding Verifiable E-Voting.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Extending the Tally-Hiding Ordinos System: Implementations for Borda, Hare-Niemeyer, Condorcet, and Instant-Runoff Voting.
IACR Cryptol. ePrint Arch., 2021

DY*: A Modular Symbolic Verification Framework for Executable Cryptographic Protocol Code.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

An In-Depth Symbolic Security Analysis of the ACME Standard.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

A Security Framework for Distributed Ledgers.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

A Tutorial-Style Introduction to DY*.
Proceedings of the Protocols, Strands, and Logic, 2021

2020
Joint State Composition Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation.
J. Cryptol., 2020

The IITM Model: A Simple and Expressive Model for Universal Composability.
J. Cryptol., 2020

Ordinos: A Verifiable Tally-Hiding E-Voting System.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020

Accountability in a Permissioned Blockchain: Formal Analysis of Hyperledger Fabric.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020

2019
Practical Yet Composably Secure Cryptographic Protocols (Dagstuhl Seminar 19042).
Dagstuhl Reports, 2019

An Extensive Formal Security Analysis of the OpenID Financial-Grade API.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

iUC: Flexible Universal Composability Made Simple.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2017
Cryptographic Security Analysis of E-voting Systems: Achievements, Misconceptions, and Limitations.
Proceedings of the Electronic Voting - Second International Joint Conference, 2017

A Framework for Universally Composable Diffie-Hellman Key Exchange.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

The Web SSO Standard OpenID Connect: In-depth Formal Security Analysis and Security Guidelines.
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017

2016
Verifiability Notions for E-Voting Protocols.
IACR Cryptol. ePrint Arch., 2016

SoK: Verifiability Notions for E-Voting Protocols.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Security Analysis of Re-Encryption RPC Mix Nets.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

sElect: A Lightweight Verifiable Remote Voting System.
Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016

A Comprehensive Formal Security Analysis of OAuth 2.0.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Universal Composition with Responsive Environments.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
Analyzing the BrowserID SSO System with Primary Identity Providers Using an Expressive Model of the Web.
Proceedings of the Computer Security - ESORICS 2015, 2015

A Hybrid Approach for Proving Noninterference of Java Programs.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015

SPRESSO: A Secure, Privacy-Respecting Single Sign-On System for the Web.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
E-Voting Systems.
Proceedings of the Software Systems Safety, 2014

Security in e-voting.
it Inf. Technol., 2014

An Expressive Model for the Web Infrastructure: Definition and Application to the BrowserID SSO System.
CoRR, 2014

Formal Analysis of Chaumian Mix Nets with Randomized Partial Checking.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

An Expressive Model for the Web Infrastructure: Definition and Application to the Browser ID SSO System.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

Extending and Applying a Framework for the Cryptographic Verification of Java Programs.
Proceedings of the Principles of Security and Trust - Third International Conference, 2014

2013
The IITM Model: a Simple and Expressive Model for Universal Composability.
IACR Cryptol. ePrint Arch., 2013

2012
Clash Attacks on the Verifiability of E-Voting Systems.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

A Framework for the Cryptographic Verification of Java-Like Programs.
Proceedings of the 25th IEEE Computer Security Foundations Symposium, 2012

2011
Security and Rewriting (Dagstuhl Seminar 11332).
Dagstuhl Reports, 2011

Verifiability, Privacy, and Coercion-Resistance: New Insights from a Case Study.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

Ideal Key Derivation and Encryption in Simulation-Based Security.
Proceedings of the Topics in Cryptology - CT-RSA 2011, 2011

Composition theorems without pre-established session identifiers.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Moderne Kryptographie - Eine Einführung.
Vieweg + Teubner, ISBN: 978-3-519-00509-4, 2011

2010
Deciding strategy properties of contract-signing protocols.
ACM Trans. Comput. Log., 2010

A Formal Definition of Online Abuse-Freeness.
Proceedings of the Security and Privacy in Communication Networks, 2010

Proving Coercion-Resistance of Scantegrity II.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

A Game-Based Definition of Coercion-Resistance and Its Applications.
Proceedings of the 23rd IEEE Computer Security Foundations Symposium, 2010

Accountability: definition and relationship to verifiability.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Improving and Simplifying a Variant of Prêt à Voter.
Proceedings of the E-Voting and Identity, Second International Conference, 2009

An Epistemic Approach to Coercion-Resistance for Electronic Voting Protocols.
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009

Universally Composable Symmetric Encryption.
Proceedings of the 22nd IEEE Computer Security Foundations Symposium, 2009

Using ProVerif to Analyze Protocols with Diffie-Hellman Exponentiation.
Proceedings of the 22nd IEEE Computer Security Foundations Symposium, 2009

Computational soundness for key exchange protocols with symmetric encryption.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Complexity results for security protocols with Diffie-Hellman exponentiation and commuting public key encryption.
ACM Trans. Comput. Log., 2008

Joint workshop on foundations of computer security and automated reasoning for security protocol analysis (FCS-ARSPA '06).
Inf. Comput., 2008

Joint State Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation.
Proceedings of the 21st IEEE Computer Security Foundations Symposium, 2008

Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

2007
Transducer-based analysis of cryptographic protocols.
Inf. Comput., 2007

On the Automatic Analysis of Recursive Security Protocols with XOR.
Proceedings of the STACS 2007, 2007

Infinite State AMC-Model Checking for Cryptographic Protocols.
Proceedings of the 22nd IEEE Symposium on Logic in Computer Science (LICS 2007), 2007

On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography.
Proceedings of the FSTTCS 2007: Foundations of Software Technology and Theoretical Computer Science, 2007

A Cryptographic Model for Branching Time Security Properties - The Case of Contract Signing Protocols.
Proceedings of the Computer Security, 2007

Selecting theories and nonce generation for recursive protocols.
Proceedings of the 2007 ACM workshop on Formal methods in security engineering, 2007

2006
Implementing a Unification Algorithm for Protocol Analysis with XOR
CoRR, 2006

A Dolev-Yao-Based Definition of Abuse-Free Protocols.
Proceedings of the Automata, Languages and Programming, 33rd International Colloquium, 2006

Computationally Sound Symbolic Secrecy in the Presence of Hash Functions.
Proceedings of the FSTTCS 2006: Foundations of Software Technology and Theoretical Computer Science, 2006

Conditional Reactive Simulatability.
Proceedings of the Computer Security, 2006

Simulation-Based Security with Inexhaustible Interactive Turing Machines.
Proceedings of the 19th IEEE Computer Security Foundations Workshop, 2006

2005
Structural Subsumption and Least Common Subsumers in a Description Logic with Existential and Number Restrictions.
Stud Logica, 2005

On the Relationships Between Notions of Simulation-Based Security.
Proceedings of the Theory of Cryptography, Second Theory of Cryptography Conference, 2005

Deciding Properties of Contract-Signing Protocols.
Proceedings of the STACS 2005, 2005

Constraint Solving for Contract-Signing Protocols.
Proceedings of the CONCUR 2005 - Concurrency Theory, 16th International Conference, 2005

2004
Deciding the Security of Protocols with Commuting Public Key Encryption.
Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis, 2004

Automata-Based Analysis of Recursive Cryptographic Protocols.
Proceedings of the STACS 2004, 2004

2003
Extensions of Non-standard Inferences to Descriptions Logics with Transitive Roles.
Proceedings of the Logic for Programming, 2003

An NP Decision Procedure for Protocol Insecurity with XOR.
Proceedings of the 18th IEEE Symposium on Logic in Computer Science (LICS 2003), 2003

Deciding the Security of Protocols with Diffie-Hellman Exponentiation and Products in Exponents.
Proceedings of the FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science, 2003

Extensions to Description Logics.
Proceedings of the Description Logic Handbook: Theory, Implementation, and Applications, 2003

Extending the Dolev-Yao Intruder for Analyzing an Unbounded Number of Sessions.
Proceedings of the Computer Science Logic, 17th International Workshop, 2003

2002
Approximation and Difference in Description Logics.
Proceedings of the Eights International Conference on Principles and Knowledge Representation and Reasoning (KR-02), 2002

Deciding the First Level of the µ-Calculus Alternation Hierarchy.
Proceedings of the FST TCS 2002: Foundations of Software Technology and Theoretical Computer Science, 2002

Approximating ALCN-Concept Descriptions.
Proceedings of the 2002 International Workshop on Description Logics (DL2002), 2002

Unification in a Description Logic with Inconsistency and Transitive Closure of Roles.
Proceedings of the 2002 International Workshop on Description Logics (DL2002), 2002

On the Decidability of Cryptographic Protocols with Open-Ended Data Structures.
Proceedings of the CONCUR 2002, 2002

2001
What's in an Attribute? Consequences for the Least Common Subsumer.
J. Artif. Intell. Res., 2001

Approximating Most Specific Concepts in Description Logics with Existential Restrictions.
Proceedings of the KI 2001: Advances in Artificial Intelligence, 2001

Computing Least Common Subsumers in ALEN.
Proceedings of the Seventeenth International Joint Conference on Artificial Intelligence, 2001

Matching under Side Conditions in Description Logics.
Proceedings of the Seventeenth International Joint Conference on Artificial Intelligence, 2001

Unification in a Description Logic with Transitive Closure of Roles.
Proceedings of the Working Notes of the 2001 International Description Logics Workshop (DL-2001), 2001

Memoryless Determinacy of Parity Games.
Proceedings of the Automata, 2001

Non-Standard Inferences in Description Logics
Lecture Notes in Computer Science 2100, Springer, ISBN: 3-540-42397-4, 2001

2000
Rewriting Concepts Using Terminologies.
Proceedings of the KR 2000, 2000

Matching Concept Descriptions with Existential Restrictions.
Proceedings of the KR 2000, 2000

What's not in a name: Some Properties of a Purely Structural Approach to Integrating Large DL Knowledge Bases.
Proceedings of the 2000 International Workshop on Description Logics (DL2000), 2000

1999
Matching in Description Logics.
J. Log. Comput., 1999

Computing Least Common Subsumers in Description Logics with Existential Restrictions.
Proceedings of the Sixteenth International Joint Conference on Artificial Intelligence, 1999

Matching in Description Logics with Existential Restrictions.
Proceedings of the 1999 International Workshop on Description Logics (DL'99), Linköping, Sweden, July 30, 1999

1998
Characterizing the Semantics of Terminological Cycles in ALN Using Finite Automata.
Proceedings of the Sixth International Conference on Principles of Knowledge Representation and Reasoning (KR'98), 1998

Computing the Least Common Subsumer and the Most Specific Concept in the Presence of Cyclic ALN-Concept Descriptions.
Proceedings of the KI-98: Advances in Artificial Intelligence, 1998

Structural Subsumption Considered from an Automata-Theoretic Point of View.
Proceedings of the 1998 International Workshop on Description Logics (DL'98), IRST, Povo, 1998

Least Common Subsumer Computation w.r.t. cyclic ALN-Terminologies.
Proceedings of the 1998 International Workshop on Description Logics (DL'98), IRST, Povo, 1998

1997
Characterizing the semantics of terminological cycles with the help of finite automata.
Proceedings of the 1997 International Workshop on Description Logics, 1997


  Loading...