Publications

Publications

Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes
Günther, Felix; Poettering, Bertram
International Journal of Information Security, p.281-297
[Journal Article]


More Efficient Oblivious Transfer Extensions
Asharov, Gilad; Lindell, Yehuda; Schneider, Thomas; Zohner, Michael
Journal of Cryptology (JoC), p.805-858
[Journal Article]


Productivity vs. Security: Mitigating Conflicting Goals in Organizations
Mayer, Peter; Gerber, Nina; McDermott, Ronja; Volkamer, Melanie; Vogt, Joachim
Information and Computer Security, p.137-151
[Journal Article]


Sicherheit in der Kommunikation: kostenloses Maßnahmen-Angebot für KMU gegen Internetbetrug
Rehfeld, Silke; Volkamer, Melanie; Neumann, Stephan
>Mittelstand 4.0 - Agentur Kommunikation
[Journal Article]


Scalable Attestation Resilient to Physical Attacks for Embedded Devices in Mesh Networks
Kohnhäuser, Florian; Büscher, Niklas; Gabmeyer, Sebastian; Katzenbeisser, Stefan
arXiv
[Journal Article]


User experiences of TORPEDO: TOoltip-powered phishing email DetectiOn
Volkamer, Melanie; Renaud, Karen; Reinheimer, Benjamin; Kunz, Alexandra
>Computers & Security, p.100-113
[Journal Article]


Will a Decaying Atom Feel a Friction Force?
Trautmann, Nils; Sonnleitner, Matthias; Barnett, Stephen
Physical Review Letters
[Journal Article]


Privacy-Preserving Interdomain Routing at Internet Scale
Asharov, Gilad; Demmler, Daniel; Schapira, Michael; Schneider, Thomas; Segev, Gil; Shenker, Scott; Zohner, Michael
Proceedings on Privacy Enhancing Technologies (PoPETs), p.143-163
[Journal Article]


Ende-zu-Ende sichere E-Mail-Kommunikation
Zimmermann, Verena; Volkamer, Melanie; Vogt, Joachim; Henhapl, Birgit
>Datenschutz und Datensicherheit - DUD, p.308-313
[Journal Article]


Security Notions for Bidirectional Channels
Marson, Giorgia Azzurra; Poettering, Bertram
IACR Transactions on Symmetric Cryptology, p.405-426
[Journal Article]


Quantum Cryptography: a view from classical cryptography
Buchmann, Johannes; Braun, Johannes; Demirel, Denise; Geihs, Matthias
Quantum Science and Technology
[Journal Article]


Nothing Comes for Free: How Much Usability Can You Sacrifice for Security?
Kulyk, Oksana; Neumann, Stephan; Budurushi, Jurlind; Volkamer, Melanie
IEEE Security & Privacy, p.24-29
[Journal Article]


Toward Practical Secure Stable Matching
Riazi, M. Sadegh; Songhori, Ebrahim M.; Sadeghi, Ahmad-Reza; Schneider, Thomas; Koushanfar, Farinaz
Proceedings on Privacy Enhancing Technologies (PoPETs), p.62-78
[Journal Article]


Private Set Intersection for Unequal Set Sizes with Mobile Applications
Kiss, Ágnes; Liu, Jian; Schneider, Thomas; Asokan, N.; Pinkas, Benny
Proceedings on Privacy Enhancing Technologies (PoPETs), p.177-197
[Journal Article]


The Day the Cryptography Dies
Mulholland, John; Mosca, Michele; Braun, Johannes
IEEE Security & Privacy, p.14-21
[Journal Article]


Hash-Based Signatures: State of Play
Butin, Denis
IEEE Security & Privacy, p.37-43
[Journal Article]


Postquantum Cryptography - State of the Art
Buchmann, Johannes; Lauter, Kristin; Mosca, Michele
IEEE Security & Privacy, p.12-13
[Journal Article]


Survey and Systematization of Secure Device Pairing
Fomichev, Mikhail; Álvarez, Flor; Steinmetzer, Daniel; Gardner-Stephen, Paul; Hollick, Matthias
IEEE Communications Surveys & Tutorials, p.517-550
[Journal Article]


A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol
Dowling, Benjamin; Fischlin, Marc; Günther, Felix; Stebila, Douglas
Cryptology ePrint Archive, p.1-33
[Journal Article]


Post-Quantum Attribute-Based Signatures from Lattice Assumptions
Bansarkhani, Rachid El; El Kaafarani, Ali
Cryptology ePrint Archive, p.1-28
[Journal Article]


Revisiting the Hybrid Attack: Improved Analysis and Refined Security Estimates
Wunderer, Thomas
Cryptology ePrint Archive, p.1-35
[Journal Article]


Unlinkable improved multi-biometric iris fuzzy vault
Rathgeb, C.; Tams, B.; Wagner, J.; Busch, C.
EURASIP Journal on Information Security, Vol.2016, p.26
[Journal Article]


Effects of image compression on ear biometrics
Rathgeb, C.; Pflug, A.; Wagner, J.; Busch, C.
IET Biometrics, Vol.5, p.252-261
[Journal Article]


Finger image quality assessment features - definitions and evaluation
Olsen, M.; Šmida, V.; Busch, C.
IET Biometrics, Vol.5, p.47-64
[Journal Article]


Keystroke Biometrics Ongoing Competition
Morales, A.; Fierrez, J.; Tolosana, R.; Ortega-Garcia, J.; Galbally, J.; others
IEEE Access, Vol.4, p.7736-7746
[Journal Article]


Unlinkable and irreversible biometric template protection based on bloom filters
Gomez-Barrero, Marta; Rathgeb, Christian; Galbally, Javier; Busch, Christoph; Fierrez, Julian
Information Sciences, Vol.370—371, p.18-32
[Journal Article]


User-Centric Security and Dependability in the Cloud of Clouds
Lacoste, Marc; Sousa, Paulo; Neves, Nuno; Miettinen, Markus; Ramos, Fernando M.V.; Vukolic, Marko; Charmet, Fabien; Yaich, Reda; Oborzynski, Krzysztof; Vernekar, Gitesh
IEEE Cloud Computing Special issue on Cloud Security, p.64-75
[Journal Article]


Dissipation-enabled efficient excitation transfer from a single photon to a single quantum emitter
Trautmann, Nils; Alber, Gernot
Physical Review A
[Journal Article]


Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol
Degabriele, Jean Paul; Fehr, Victoria; Fischlin, Marc; Gagliardoni, Tommaso; Günther, Felix; Marson, Giorgia Azzurra; Mittelbach, Arno; Paterson, Kenneth G.
International Journal of Information Security, p.637-657
[Journal Article]


Remanence Decay Side-Channel: The PUF Case
Zeitouni, Shaza; Oren, Yossef; Wachsmann, Christian; Koeberl, Patrick; Sadeghi, Ahmad-Reza
IEEE Transactions on Information Forensics and Security
[Journal Article]