Christoph Striecks
Christoph Striecks
Bestätigte E-Mail-Adresse bei ait.ac.at - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Programmable hash functions in the multilinear setting
ESV Freire, D Hofheinz, KG Paterson, C Striecks
Annual Cryptology Conference, 513-530, 2013
952013
Identity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext setting
D Hofheinz, J Koch, C Striecks
IACR International Workshop on Public Key Cryptography, 799-822, 2015
522015
Practical signatures from standard assumptions
F Böhl, D Hofheinz, T Jager, J Koch, JH Seo, C Striecks
Annual International Conference on the Theory and Applications of …, 2013
472013
Confined guessing: New signatures from standard assumptions
F Böhl, D Hofheinz, T Jager, J Koch, C Striecks
Journal of Cryptology 28 (1), 176-208, 2015
322015
Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange
D Derler, T Jager, D Slamanig, C Striecks
Annual International Conference on the Theory and Applications of …, 2018
312018
Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based.
D Derler, K Samelin, D Slamanig, C Striecks
IACR Cryptol. ePrint Arch. 2019, 406, 2019
232019
Revisiting proxy re-encryption: Forward secrecy, improved security, and applications
D Derler, S Krenn, T Lorünser, S Ramacher, D Slamanig, C Striecks
IACR International Workshop on Public Key Cryptography, 219-250, 2018
192018
Opportunities and Challenges of CREDENTIAL
F Karegar, C Striecks, S Krenn, F Hörandner, T Lorünser, ...
IFIP International Summer School on Privacy and Identity Management, 76-91, 2016
102016
Towards attribute-based credentials in the cloud
S Krenn, T Lorünser, A Salzer, C Striecks
International Conference on Cryptology and Network Security, 179-202, 2017
72017
A generic view on trace-and-revoke broadcast encryption schemes
D Hofheinz, C Striecks
Cryptographers’ Track at the RSA Conference, 48-63, 2014
62014
I Want to Forget: Fine-Grained Encryption with Full Forward Secrecy in the Distributed Setting.
D Derler, S Ramacher, D Slamanig, C Striecks
IACR Cryptol. ePrint Arch. 2019, 912, 2019
52019
Batch-verifiable Secret Sharing with Unconditional Privacy.
S Krenn, T Loruenser, C Striecks
ICISSP, 303-311, 2017
52017
Agile cryptographic solutions for the cloud
T Lorünser, S Krenn, C Striecks, T Länger
e & i Elektrotechnik und Informationstechnik 134 (7), 364-369, 2017
32017
Practical group-signatures with privacy-friendly openings
S Krenn, K Samelin, C Striecks
Proceedings of the 14th International Conference on Availability …, 2019
22019
Privacy-Preserving Incentive Systems with Highly Efficient Point-Collection.
J Bobolz, F Eidens, S Krenn, D Slamanig, C Striecks
IACR Cryptol. ePrint Arch. 2020, 382, 2020
12020
Secure and Privacy-Friendly Storage and Data Processing in the Cloud
P Chiaro, S Fischer-Hübner, T Groß, S Krenn, T Lorünser, AIM Garcí, ...
IFIP International Summer School on Privacy and Identity Management, 153-169, 2017
12017
On Cryptographic Building Blocks and Transformations.
C Striecks
Karlsruhe Institute of Technology, 2015
12015
Collecting and Classifying Security and Privacy Design Patterns for Connected Vehicles: SECREDAS Approach
N Marko, A Vasenev, C Striecks
International Conference on Computer Safety, Reliability, and Security, 36-53, 2020
2020
Secure and Privacy-Friendly Storage and Data Processing in the Cloud
SP Krenn, TS Lorünser, AITM Fischer-Hübner, G Groß, A Migliavacca, ...
Privacy and Identity Management. The Smart Revolution: 12th IFIP WG 9.2, 9.5 …, 2018
2018
Engineering Cryptography for Security and Privacy in the Cloud
S Krenn, T Lorünser, C Striecks
ERCIM NEWS, 53-54, 2018
2018
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20