Follow
Benedikt Auerbach
Benedikt Auerbach
Institute of Science and Technology Austria
Verified email at ista.ac.at
Title
Cited by
Cited by
Year
Memory-tight reductions
B Auerbach, D Cash, M Fersch, E Kiltz
Annual International Cryptology Conference, 101-132, 2017
262017
Public-key encryption resistant to parameter subversion and its realization from efficiently-embeddable groups
B Auerbach, M Bellare, E Kiltz
Public-Key Cryptography–PKC 2018: 21st IACR International Conference on …, 2018
242018
CoCoA: concurrent continuous group key agreement
J Alwen, B Auerbach, MC Noval, K Klein, G Pascual-Perez, K Pietrzak, ...
Annual International Conference on the Theory and Applications of …, 2022
212022
Everybody’s a target: scalability in public-key encryption
B Auerbach, F Giacon, E Kiltz
Annual International Conference on the Theory and Applications of …, 2020
122020
Grafting key trees: efficient key management for overlapping groups
J Alwen, B Auerbach, MA Baig, M Cueto Noval, K Klein, G Pascual-Perez, ...
Theory of Cryptography: 19th International Conference, TCC 2021, Raleigh, NC …, 2021
102021
DeCAF: decentralizable continuous group key agreement with fast healing
J Alwen, B Auerbach, MC Noval, K Klein, G Pascual-Perez, K Pietrzak
Cryptology ePrint Archive, 2022
92022
Hashing solutions instead of generating problems: On the interactive certification of RSA moduli
B Auerbach, B Poettering
Public-Key Cryptography–PKC 2018: 21st IACR International Conference on …, 2018
82018
Inverse-sybil attacks in automated contact tracing
B Auerbach, S Chakraborty, K Klein, G Pascual-Perez, K Pietrzak, ...
Cryptographers’ Track at the RSA Conference, 399-421, 2021
62021
Lossy trapdoor permutations with improved lossiness
B Auerbach, E Kiltz, B Poettering, S Schoenen
Cryptographers’ Track at the RSA Conference, 230-250, 2019
52019
Generic-Group Lower Bounds via Reductions Between Geometric-Search Problems: With and Without Preprocessing
B Auerbach, C Hoffmann, G Pascual-Perez
Theory of Cryptography Conference, 301–330, 2023
12023
Zwei Betrachtungen von Sicherheit und Privatheit nach Snowden
B Auerbach, M Shnayien, E Kiltz, A Tuschling
Datenschutz und Datensicherheit-DuD 43 (11), 706-712, 2019
12019
Trapdoor Memory-Hard Functions
B Auerbach, CU Günther, K Pietrzak
Cryptology ePrint Archive, 2024
2024
On the cost of post-compromise security in concurrent continuous group-key agreement
B Auerbach, M Cueto Noval, G Pascual-Perez, K Pietrzak
Theory of Cryptography Conference, 271-300, 2023
2023
On the security of public-key encrytion in mass-surveillance settings
BJ Auerbach
Dissertation, Bochum, Ruhr-Universität Bochum, 2019, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–14