Björn Tackmann
Björn Tackmann
DFINITY
Verified email at dfinity.org
Title
Cited by
Cited by
Year
Universally Composable Synchronous Computation
J Katz, U Maurer, B Tackmann, V Zikas
Theory of Cryptography, 2013
1162013
Rational Protocol Design: Cryptography against Incentive-driven Adversaries
J Garay, J Katz, U Maurer, B Tackmann, V Zikas
Foundations of Computer Science, 2013
662013
The Multi-User Security of Authenticated Encryption: AES-GCM in TLS 1.3
M Bellare, B Tackmann
CRYPTO, 2016
632016
From Single-Bit to Multi-Bit Public-Key Encryption via Non-Malleable Codes
S Coretti, U Maurer, B Tackmann, D Venturi
Theory of Cryptography 9014 (324), 532-560, 2015
622015
On the Soundness of Authenticate-then-Encrypt: Formalizing the Malleability of Symmetric Encryption
U Maurer, B Tackmann
Proceedings of the 17th ACM conference on Computer and communications …, 2010
552010
Non-Malleable Encryption: Simpler, Shorter, Stronger
S Coretti, Y Dodis, B Tackmann, D Venturi
Theory of Cryptography, 2016
48*2016
Confidentiality and Integrity: A Constructive Perspective
U Maurer, A Rüedlinger, B Tackmann
Theory of Cryptography, 209-229, 2012
372012
Causal boxes: quantum information-processing systems closed under composition
C Portmann, C Matt, U Maurer, R Renner, B Tackmann
IEEE Transactions on Information Theory, 2017
362017
Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer
C Badertscher, C Matt, U Maurer, P Rogaway, B Tackmann
International Conference on Provable Security, 2015
312015
(De-) Constructing TLS
M Kohlweiss, U Maurer, C Onete, B Tackmann, D Venturi
272014
Constructing Confidential Channels from Authenticated Channels---Public-Key Encryption Revisited
S Coretti, U Maurer, B Tackmann
Advances in Cryptology-ASIACRYPT, 2013
252013
Updatable Encryption with Post-Compromise Security
A Lehmann, B Tackmann
EUROCRYPT, 2018
202018
De-Constructing TLS 1.3
M Kohlweiss, U Maurer, C Onete, B Tackmann, D Venturi
Proceedings of the 16th International Conference on Progress in Cryptology …, 2015
202015
Key Exchange with Unilateral Authentication: Composable Security Definition and Modular Protocol Design
U Maurer, B Tackmann, S Coretti
182013
Secure Event Tickets on a Blockchain
B Tackmann
Data Privacy Management, Cryptocurrencies and Blockchain Technology, 437-444, 2017
172017
How Fair is Your Protocol? A Utility-based Approach to Protocol Optimality
J Garay, J Katz, B Tackmann, V Zikas
Principles of Distributed Computing, 2015
172015
Asymmetric Distributed Trust
C Cachin, B Tackmann
arXiv preprint arXiv:1906.09314, 2019
142019
Moderately Hard Functions: Definition, Instantiations, and Applications
J Alwen, B Tackmann
Theory of Cryptography Conference, 493-526, 2017
142017
Nonce-Based Cryptography: Retaining Security when Randomness Fails
M Bellare, B Tackmann
EUROCRYPT 2016, 2016
142016
Anonymity-Preserving Public-Key Encryption: A Constructive Approach
M Kohlweiss, U Maurer, C Onete, B Tackmann, D Venturi
Privacy Enhancing Technologies, 19-39, 2013
142013
The system can't perform the operation now. Try again later.
Articles 1–20