Publikationen

Publikationen

Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3
Fischlin, Marc; Günther, Felix; Janson, Christian
Journal of Cryptology
[Journal Article]


SoK: Efficient Design and Implementation of Polynomial Hash Functions over Prime Fields
Degabriele, Jean Paul; Gilcher, Jan; Govinden, Jérôme; Paterson, Kenneth G.
2024 IEEE Symposium on Security and Privacy (SP)
[Conference Proceedings]


A Novel Design Flow for a Security-Driven Synthesis of Side-Channel Hardened Cryptographic Modules
Huss, Sorin; Stein, Oliver
Journal of Low Power Electronics and Applications
[Journal Article]


Verifiable Verification in Cryptographic Protocols
Fischlin, Marc; Günther, Felix
CCS'23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, p.3239-3253
[Conference Proceedings]


Stealth Key Exchange and Confined Access to the Record Protocol Data in TLS 1.3
Fischlin, Marc
CCS'23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, p.2901-2914
[Conference Proceedings]


Searching for ELFs in the Cryptographic Forest
Fischlin, Marc; Rohrbach, Felix
TCC 2023: Theory of Cryptography, p.207-236
[Conference Proceedings]


Hardware-Based Isolation for Advanced Safety and Security in Spacecraft
Koisser, David; Brasser, Ferdinand; Jauernig, Patrick; Stapf, Emmanuel; Wallum, Marcus; Fischer, Daniel; Sadeghi, Ahmad-Reza
17th International Conference on Space Operations (SpaceOps 2023)
[Conference Proceedings]


Populating the Zoo of Rugged Pseudorandom Permutations
Degabriele, Jean Paul; Karadžić, Vukašin
Advances in Cryptology - ASIACRYPT 2023, p.270-300
[Conference Proceedings]


The Indifferentiability of the Duplex and Its Practical Applications
Degabriele, Jean Paul; Fischlin, Marc; Govinden, Jérôme
Advances in Cryptology - ASIACRYPT 2023, p.237-269
[Conference Proceedings]


ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks
Rieger, Phillip; Chilese, Marco; Mohamed, Reham; Miettinen, Markus; Fereidooni, Hossein; Sadeghi, Ahmad-Reza
Proceedings of the 32nd USENIX Security Symposium, p.4301-4318
[Conference Proceedings]


FLAIRS: FPGA-Accelerated Inference-Resistant & Secure Federated Learning
Li, Huimin; Rieger, Phillip; Zeitouni, Shaza; Picek, Stjepan; Sadeghi, Ahmad-Reza
Proceedings of the 2023 33rd International Conference on Field-Programmable Logic and Applications (FPL)
[Conference Proceedings]


Oops..! I Glitched It Again! How to Multi-Glitch the Glitching-Protections on ARM TrustZone-M
Saß, Marvin; Mitev, Richard; Sadeghi, Ahmad-Reza
32nd USENIX Security Symposium (USENIX Security 23), p.6239-6256
[Conference Proceedings]


Unleashing IoT Security: Assessing the Effectiveness of Best Practices in Protecting Against Threats
Pütz, Philipp; Mitev, Richard; Sadeghi, Ahmad-Reza
Annual Computer Security Applications Conference (ACSAC 2023)
[Conference Proceedings]


Griffin: Towards mixed multi-key homomorphic encryption
Schneider, Thomas; Yalame, Hossein; Yonli, Michael
Proceedings of the 20th International Conference on Security and Cryptography - SECRYPT, p.147-158
[Conference Proceedings]


Breaking and Fixing Garbled Circuits When a Gate has Duplicate Input Wires
Nieminen, Raine; Schneider, Thomas
Journal of Cryptology
[Journal Article]


Investigating how Users Imagine their Personal Privacy Assistant
Stöver, Alina; Hahn, Sara; Kretschmer, Felix; Gerber, Nina
Proceedings on Privacy Enhancing Technologies (PoPETs), p.384-402
[Journal Article]


How Website Owners Face Privacy Issues: Thematic Analysis of Responses from a Covert Notification Study Reveals Diverse Circumstances and Challenges
Stöver, Alina; Gerber, Nina; Pridöhl, Henning; Maass, Max; Bretthauer, Sebastian; Spiecker gen. Döhmann, Indra; Hollick, Matthias; Herrmann, Dominik
Proceedings on Privacy Enhancing Technologies (PoPETs), p.251-264
[Journal Article]


Human Factors in Privacy Research
Marky, Karola; Gerber, Nina; Stöver, Alina; et al., /
[Book]


Safe AND Secure Infrastructures? - Studying Human Aspects of Safety and Security Incidents with Experts from both Domains
Zimmermann, Verena; Haunschild, Jasmin; Stöver, Alina; Gerber, Nina
Mensch und Computer 2023 - Workshopband
[Conference Proceedings]


Don’t accept all and continue: Exploring nudges for more deliberate interaction with tracking consent notices
Gerber, Nina; Stöver, Alina; Peschke, Justin; Zimmermann, Verena
ACM Transactions on Computer-Human Interaction
[Journal Article]


Psychotechnik, human factors, engineering psychology, Technikpsychologie—100 years of interdisciplinary cooperation between engineering and human sciences
Vogt, Joachim; Keil, Udo; Cornel, Christin; Gerber, Nina; Ferreira, Yvonne
Zeitschrift für Arbeitswissenschaft, p.1-6
[Journal Article]


Post-quantum Security for the Extended Access Control Protocol
Fischlin, Marc; Heyden, Jonas von der; Margraf, Marian; Morgner, Frank; Wallner, Andreas; Bock, Holger
Security Standardisation Research, p.22-52
[Conference Proceedings]


Disorientation Faults in CSIDH
Banegas, Gustavo; Krämer, Juliane; Lange, Tanja; Meyer, Michael; Panny, Lorenz; Reijnders, Krijn; Sotáková, Jana; Trimoska, Monika
Advances in Cryptology - EUROCRYPT 2023, p.310-342
[Conference Proceedings]


A Lightweight Identification Protocol Based on Lattices
Düzlü, Samed; Krämer, Juliane; Pöppelmann, Thomas; Struck, Patrick
Public-Key Cryptography - PKC 2023, p.95-113
[Conference Proceedings]


SAFEFL: MPC-friendly Framework for Private and Robust Federated Learning
Gehlhar, Till; Marx, Felix; Schneider, Thomas; Suresh, Ajith; Wehrle, Tobias; Yalame, Hossein
6th Deep Learning Security and Privacy Workshop (DLSP 2023)
[Conference Proceedings]


FLUTE: Fast and Secure Lookup Table Evaluations
Brüggemann, Andreas; Hundt, Robin; Schneider, Thomas; Suresh, Ajith; Yalame, Hossein
Proceedings: 44th IEEE Symposium on Security and Privacy: SP 2023, p.515-533
[Conference Proceedings]


ExTRUST: Reducing exploit stockpiles with a privacy-preserving depletion system for inter-state relationships
Reinhold, Thomas; Kühn, Philipp; Günther, Daniel; Schneider, Thomas; Reuter, Christian
IEEE Transactions on Technology and Society, p.158-170
[Journal Article]


Smarter Contracts: Detecting Vulnerabilities in Smart Contracts with Deep Transfer Learning
Sendner, Christoph; Chen, Huili; Fereidooni, Hossein; Petzi, Lukas; König, Jan; Stang, Jasper; Dmitrienko, Alexandra; Sadeghi, Ahmad-Reza; Koushanfar, Farinaz
Network and Distributed Systems Security (NDSS) Symposium 2023
[Conference Proceedings]


DARWIN: Survival of the Fittest Fuzzing Mutators
Jauernig, Patrick; Jakobovic, Domagoj; Picek, Stjepan; Stapf, Emmanuel; Sadeghi, Ahmad-Reza
Network and Distributed Systems Security (NDSS) Symposium 2023
[Conference Proceedings]


How to Count Bots in Longitudinal Datasets of IP Addresses
Böck, Leon; Levin, Dave; Padmanabhan, Ramakrishna; Doerr, Christian; Mühlhäuser, Max
30th Annual Network and Distributed System Security Symposium, NDSS 2023, San Diego, California, USA, February 27 - March 3, 2023
[Conference Proceedings]