Sebastian Faust

According to our database1, Sebastian Faust authored at least 55 papers between 2007 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Making Masking Security Proofs Concrete (Or How to Evaluate the Security of Any Leaking Device), Extended Version.
J. Cryptology, 2019

Unifying Leakage Models: From Probing Attacks to Noisy Leakage.
J. Cryptology, 2019

Temporary Censorship Attacks in the Presence of Rational Miners.
IACR Cryptology ePrint Archive, 2019

OptiSwap: Fast Optimistic Fair Exchange.
IACR Cryptology ePrint Archive, 2019

Multi-Party Virtual State Channels.
IACR Cryptology ePrint Archive, 2019

A Formal Treatment of Deterministic Wallets.
IACR Cryptology ePrint Archive, 2019

FastKitten: Practical Smart Contracts on Bitcoin.
IACR Cryptology ePrint Archive, 2019

Perun: Virtual Payment Hubs over Cryptocurrencies.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Simple Refreshing in the Noisy Leakage Model.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2018
Composable Masking Schemes in the Presence of Physical Defaults & the Robust Probing Model.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Outsourced pattern matching.
Int. J. Inf. Sec., 2018

Foundations of State Channel Networks.
IACR Cryptology ePrint Archive, 2018

FairSwap: How to fairly exchange digital goods.
IACR Cryptology ePrint Archive, 2018

General State Channel Networks.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Implementing Trojan-Resilient Hardware from (Mostly) Untrusted Components Designed by Colluding Manufacturers.
Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, 2018

2017
Bounded Tamper Resilience: How to Go Beyond the Algebraic Barrier.
J. Cryptology, 2017

Amortizing Randomness Complexity in Private Circuits.
IACR Cryptology ePrint Archive, 2017

Non-Malleable Codes for Space-Bounded Tampering.
IACR Cryptology ePrint Archive, 2017

Composable Masking Schemes in the Presence of Physical Defaults and the Robust Probing Model.
IACR Cryptology ePrint Archive, 2017

Efficient Algorithms for Broadcast and Consensus Based on Proofs of Work.
IACR Cryptology ePrint Archive, 2017

PERUN: Virtual Payment Channels over Cryptographic Currencies.
IACR Cryptology ePrint Archive, 2017

Consolidating Inner Product Masking.
IACR Cryptology ePrint Archive, 2017

2016
Efficient Non-Malleable Codes and Key Derivation for Poly-Size Tampering Circuits.
IEEE Trans. Information Theory, 2016

Signature Schemes Secure Against Hard-to-Invert Leakage.
J. Cryptology, 2016

Private Circuits III: Hardware Trojan-Resilience via Testing Amplification.
IACR Cryptology ePrint Archive, 2016

Towards Sound Fresh Re-Keying with Hard (Physical) Learning Problems.
IACR Cryptology ePrint Archive, 2016

Position-Based Cryptography and Multiparty Communication Complexity.
IACR Cryptology ePrint Archive, 2016

Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model.
IACR Cryptology ePrint Archive, 2016

Circuit Compilers with O(1/ log(n)) Leakage Rate.
IACR Cryptology ePrint Archive, 2016

Optimal Amplification of Noisy Leakages.
Proceedings of the Theory of Cryptography - 13th International Conference, 2016

2015
Chosen-Ciphertext Security from Subset Sum.
IACR Cryptology ePrint Archive, 2015

Making Masking Security Proofs Concrete Or How to Evaluate the Security of any Leaking Device.
IACR Cryptology ePrint Archive, 2015

Inner Product Masking Revisited.
IACR Cryptology ePrint Archive, 2015

A Tamper and Leakage Resilient von Neumann Architecture.
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015

Noisy Leakage Revisited.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

Efficient Leakage Resilient Circuit Compilers.
Proceedings of the Topics in Cryptology, 2015

2014
Protecting Circuits from Computationally Bounded and Noisy Leakage.
SIAM J. Comput., 2014

Masking vs. multiparty computation: how large is the gap for AES?
J. Cryptographic Engineering, 2014

A Tamper and Leakage Resilient Random Access Machine.
IACR Cryptology ePrint Archive, 2014

Continuous Non-malleable Codes.
IACR Cryptology ePrint Archive, 2014

The Chaining Lemma and its application.
IACR Cryptology ePrint Archive, 2014

2013
Proofs of Space.
IACR Cryptology ePrint Archive, 2013

2012
On the Non-malleability of the Fiat-Shamir Transform.
IACR Cryptology ePrint Archive, 2012

Leakage-Resilient Circuits without Computational Assumptions.
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012

Practical Leakage-Resilient Symmetric Cryptography.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012

Theory and Practice of a Leakage Resilient Masking Scheme.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

2011
Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience.
IACR Cryptology ePrint Archive, 2011

Leakage-Resilient Cryptography From the Inner-Product Extractor.
IACR Cryptology ePrint Archive, 2011

Secure Two-Party Computation with Low Communication.
IACR Cryptology ePrint Archive, 2011

2010
Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases.
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010

2009
Protecting Circuits from Computationally-Bounded Leakage.
IACR Cryptology ePrint Archive, 2009

Leakage-Resilient Signatures.
IACR Cryptology ePrint Archive, 2009

2008
Efficient Simultaneous Broadcast.
Proceedings of the Public Key Cryptography, 2008

2007
Efficient Oblivious Augmented Maps: Location-Based Services with a Payment Broker.
Proceedings of the Privacy Enhancing Technologies, 7th International Symposium, 2007

Efficient Negative Databases from Cryptographic Hash Functions.
Proceedings of the Information Security, 10th International Conference, 2007


  Loading...