Sebastian Faust

Orcid: 0000-0002-8625-4639

Affiliations:
  • TU Darmstadt, Germany


According to our database1, Sebastian Faust authored at least 103 papers between 2007 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
All-You-Can-Compute: Packed Secret Sharing for Combined Resilience.
IACR Cryptol. ePrint Arch., 2025

Efficient IP Masking with Generic Security Guarantees under Minimum Assumptions.
IACR Cryptol. ePrint Arch., 2025

Beholder Signatures.
IACR Cryptol. ePrint Arch., 2025

BEAST-MEV: Batched Threshold Encryption with Silent Setup for MEV prevention.
IACR Cryptol. ePrint Arch., 2025

CCA-Secure Traceable Threshold (ID-based) Encryption and Application.
IACR Cryptol. ePrint Arch., 2025

Improving the Fault Robustness of Polynomial Masking.
IACR Cryptol. ePrint Arch., 2025

Non-interactive Threshold BBS+ from Pseudorandom Correlations.
Proceedings of the Topics in Cryptology - CT-RSA 2025, 2025

Strong Secret Sharing with Snitching.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

BIP32-Compatible Threshold Wallets.
Proceedings of the 20th ACM Asia Conference on Computer and Communications Security, 2025

2024
Shutter Network: Private Transactions from Threshold Cryptography.
IACR Cryptol. ePrint Arch., 2024

BEAT-MEV: Epochless Approach to Batched Threshold Encryption for MEV Prevention.
IACR Cryptol. ePrint Arch., 2024

Round Efficient Byzantine Agreement from VDFs.
Proceedings of the Security and Cryptography for Networks - 14th International Conference, 2024

Shared-Custodial Password-Authenticated Deterministic Wallets.
Proceedings of the Security and Cryptography for Networks - 14th International Conference, 2024

Connecting Leakage-Resilient Secret Sharing to Practice: Scaling Trends and Physical Dependencies of Prime Field Masking.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

From Random Probing to Noisy Leakages Without Field-Size Dependence.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

Secret Sharing with Snitching.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
Prisma : A Tierless Language for Enforcing Contract-client Protocols in Decentralized Applications.
ACM Trans. Program. Lang. Syst., September, 2023

Provable Secure Parallel Gadgets.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

Threshold BBS+ From Pseudorandom Correlations.
IACR Cryptol. ePrint Arch., 2023

BIP32-Compatible Threshold Wallets.
IACR Cryptol. ePrint Arch., 2023

Long Paper: Provable Secure Parallel Gadgets.
IACR Cryptol. ePrint Arch., 2023

POSE: Practical Off-chain Smart Contract Execution.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

CommiTEE : An Efficient and Secure Commit-Chain Protocol using TEEs.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

Putting the Online Phase on a Diet: Covert Security from Short MACs.
Proceedings of the Topics in Cryptology - CT-RSA 2023, 2023

Statement-Oblivious Threshold Witness Encryption.
Proceedings of the 36th IEEE Computer Security Foundations Symposium, 2023

Individual Cryptography.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Combined Fault and Leakage Resilience: Composability, Constructions and Compiler.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Revisiting Transaction Ledger Robustness in the Miner Extractable Value Era.
Proceedings of the Applied Cryptography and Network Security, 2023

2022
Prisma: A Tierless Language for Enforcing Contract-Client Protocols in Decentralized Applications (Artifact).
Dagstuhl Artifacts Ser., 2022

Prisma: A Tierless Language for Enforcing Contract-Client Protocols in Decentralized Applications (Extended Version).
CoRR, 2022

On the Related-Key Attack Security of Authenticated Encryption Schemes.
Proceedings of the Security and Cryptography for Networks - 13th International Conference, 2022

Financially Backed Covert Security.
Proceedings of the Public-Key Cryptography - PKC 2022, 2022

Prisma: A Tierless Language for Enforcing Contract-Client Protocols in Decentralized Applications (Extended Abstract).
Proceedings of the 36th European Conference on Object-Oriented Programming, 2022

Continuously Non-malleable Codes Against Bounded-Depth Tampering.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

2021
MOE: Multiplication Operated Encryption with Trojan Resilience.
IACR Trans. Symmetric Cryptol., 2021

Large-Scale Non-Interactive Threshold Cryptosystems Through Anonymity.
IACR Cryptol. ePrint Arch., 2021

Bitcoin-Compatible Virtual Channels.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Two-Party Adaptor Signatures from Identification Schemes.
Proceedings of the Public-Key Cryptography - PKC 2021, 2021

Lower Bounds for Off-Chain Protocols: Exploring the Limits of Plasma.
Proceedings of the 12th Innovations in Theoretical Computer Science Conference, 2021

Generic Compiler for Publicly Verifiable Covert Multi-Party Computation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

Towards Tight Random Probing Security.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

The Exact Security of BIP32 Wallets.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

DeFi-ning DeFi: Challenges & Pathway.
Proceedings of the 3rd Conference on Blockchain Research & Applications for Innovative Networks and Services, 2021

Generalized Channels from Limited Blockchain Scripts and Adaptor Signatures.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
Continuously Non-malleable Codes in the Split-State Model.
J. Cryptol., 2020

Splitting Payments Locally While Routing Interdimensionally.
IACR Cryptol. ePrint Arch., 2020

Generalized Bitcoin-Compatible Channels.
IACR Cryptol. ePrint Arch., 2020

OptiSwap: Fast Optimistic Fair Exchange.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

Deterministic Wallets in a Quantum World.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Making Masking Security Proofs Concrete (Or How to Evaluate the Security of Any Leaking Device), Extended Version.
J. Cryptol., 2019

FastKitten: Practical Smart Contracts on Bitcoin.
Proceedings of the 28th USENIX Security Symposium, 2019

Perun: Virtual Payment Hubs over Cryptocurrencies.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Temporary Censorship Attacks in the Presence of Rational Miners.
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019

Multi-party Virtual State Channels.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

A Formal Treatment of Deterministic Wallets.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Simple Refreshing in the Noisy Leakage Model.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2018
Composable Masking Schemes in the Presence of Physical Defaults & the Robust Probing Model.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Foundations of State Channel Networks.
IACR Cryptol. ePrint Arch., 2018

General State Channel Networks.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

FairSwap: How To Fairly Exchange Digital Goods.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Implementing Trojan-Resilient Hardware from (Mostly) Untrusted Components Designed by Colluding Manufacturers.
Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, 2018

2017
Composable Masking Schemes in the Presence of Physical Defaults and the Robust Probing Model.
IACR Cryptol. ePrint Arch., 2017

Efficient Algorithms for Broadcast and Consensus Based on Proofs of Work.
IACR Cryptol. ePrint Arch., 2017

PERUN: Virtual Payment Channels over Cryptographic Currencies.
IACR Cryptol. ePrint Arch., 2017

Position-Based Cryptography and Multiparty Communication Complexity.
Proceedings of the Theory of Cryptography - 15th International Conference, 2017

Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

Non-Malleable Codes for Space-Bounded Tampering.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

Amortizing Randomness Complexity in Private Circuits.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

Consolidating Inner Product Masking.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

2016
Optimal Amplification of Noisy Leakages.
Proceedings of the Theory of Cryptography - 13th International Conference, 2016

Chosen-Ciphertext Security from Subset Sum.
Proceedings of the Public-Key Cryptography - PKC 2016, 2016

Circuit Compilers with O(1/\log (n)) Leakage Rate.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

Private Circuits III: Hardware Trojan-Resilience via Testing Amplification.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
A Tamper and Leakage Resilient von Neumann Architecture.
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015

The Chaining Lemma and Its Application.
Proceedings of the Information Theoretic Security - 8th International Conference, 2015

Noisy Leakage Revisited.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

Making Masking Security Proofs Concrete - Or How to Evaluate the Security of Any Leaking Device.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

Inner Product Masking Revisited.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

Efficient Leakage Resilient Circuit Compilers.
Proceedings of the Topics in Cryptology, 2015

Proofs of Space.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

2014
Protecting Circuits from Computationally Bounded and Noisy Leakage.
SIAM J. Comput., 2014

A Tamper and Leakage Resilient Random Access Machine.
IACR Cryptol. ePrint Arch., 2014

Continuous Non-malleable Codes.
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014

Efficient Non-malleable Codes and Key-Derivation for Poly-size Tampering Circuits.
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014

Unifying Leakage Models: From Probing Attacks to Noisy Leakage.
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014

2013
Outsourced Pattern Matching.
Proceedings of the Automata, Languages, and Programming - 40th International Colloquium, 2013

Masking vs. Multiparty Computation: How Large Is the Gap for AES?
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2013, 2013

Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

2012
Leakage-Resilient Circuits without Computational Assumptions.
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012

Secure Two-Party Computation with Low Communication.
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012

On the Non-malleability of the Fiat-Shamir Transform.
Proceedings of the Progress in Cryptology, 2012

Practical Leakage-Resilient Symmetric Cryptography.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012

Signature Schemes Secure against Hard-to-Invert Leakage.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

Theory and Practice of a Leakage Resilient Masking Scheme.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

2011
Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience.
Proceedings of the Automata, Languages and Programming - 38th International Colloquium, 2011

Leakage-Resilient Cryptography from the Inner-Product Extractor.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

2010
Leakage-Resilient Signatures.
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010

Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases.
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010

2009
Protecting Circuits from Computationally-Bounded Leakage.
IACR Cryptol. ePrint Arch., 2009

2008
Efficient Simultaneous Broadcast.
Proceedings of the Public Key Cryptography, 2008

2007
Efficient Oblivious Augmented Maps: Location-Based Services with a Payment Broker.
Proceedings of the Privacy Enhancing Technologies, 7th International Symposium, 2007

Efficient Negative Databases from Cryptographic Hash Functions.
Proceedings of the Information Security, 10th International Conference, 2007


  Loading...