Folgen
Mario Strefler
Mario Strefler
Bestätigte E-Mail-Adresse bei kit.edu
Titel
Zitiert von
Zitiert von
Jahr
Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts
DH Phan, D Pointcheval, SF Shahandashti, M Strefler
International journal of information security 12 (4), 251-265, 2013
1112013
On the joint security of encryption and signature in EMV
JP Degabriele, A Lehmann, KG Paterson, NP Smart, M Strefler
Cryptographers’ Track at the RSA Conference, 116-135, 2012
772012
Decentralized dynamic broadcast encryption
DH Phan, D Pointcheval, M Strefler
International Conference on Security and Cryptography for Networks, 166-183, 2012
462012
Security notions for broadcast encryption
DH Phan, D Pointcheval, M Strefler
International Conference on Applied Cryptography and Network Security, 377-394, 2011
322011
A Practical Attack Against the Use of RC4 in the HIVE Hidden Volume Encryption System
KG Paterson, M Strefler
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
122015
Partnership in key exchange protocols
K Kobara, S Shin, M Strefler
Proceedings of the 4th International Symposium on Information, Computer, and …, 2009
102009
Towards secure cloud computing
C Henrich, M Huber, C Kempka, J Muller-Quade, M Strefler
LECTURE NOTES IN COMPUTER SCIENCE 1 (5873), 785-786, 2009
9*2009
Message-based traitor tracing with optimal ciphertext rate
DH Phan, D Pointcheval, M Strefler
International Conference on Cryptology and Information Security in Latin …, 2012
82012
Brief Announcement: Towards secure cloud computing
C Henrich, M Huber, C Kempka, J Müller-Quade, M Strefler
Symposium on Self-Stabilizing Systems, 785-786, 2009
52009
Broadcast Encryption with Traitor Tracing
M Strefler
Ecole Normale Supérieure de Paris-ENS Paris, 2013
4*2013
Invisible Adaptive Attacks.
JB Nielsen, M Strefler
IACR Cryptology ePrint Archive 2014, 597, 2014
22014
Tor und JAP: Umsetzung von Anonymitätstechniken
M Strefler
Datenschutz in Kommunikationsnet-zen, 33, 2006
2006
Computational and Symbolic Proofs of Security: a short report
M Strefler, C Su, V Suppakitpaisarn, I Suzuki, A Turrini
A New Security Model for Key Exchange
H Imai, J Müller-Quade, M Strefler, K Kobara, SH Shin, DID Kraschewski
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–14