Björn Tackmann
Björn Tackmann
DFINITY
Verified email at dfinity.org
Title
Cited by
Cited by
Year
Universally Composable Synchronous Computation
J Katz, U Maurer, B Tackmann, V Zikas
Theory of Cryptography, 2013
1052013
Rational Protocol Design: Cryptography against Incentive-driven Adversaries
J Garay, J Katz, U Maurer, B Tackmann, V Zikas
Foundations of Computer Science, 2013
622013
From Single-Bit to Multi-Bit Public-Key Encryption via Non-Malleable Codes
S Coretti, U Maurer, B Tackmann, D Venturi
Theory of Cryptography 9014 (324), 532-560, 2015
602015
The Multi-User Security of Authenticated Encryption: AES-GCM in TLS 1.3
M Bellare, B Tackmann
CRYPTO, 2016
572016
On the Soundness of Authenticate-then-Encrypt: Formalizing the Malleability of Symmetric Encryption
U Maurer, B Tackmann
Proceedings of the 17th ACM conference on Computer and communications …, 2010
542010
Non-Malleable Encryption: Simpler, Shorter, Stronger
S Coretti, Y Dodis, B Tackmann, D Venturi
Theory of Cryptography, 2016
46*2016
Confidentiality and Integrity: A Constructive Perspective
U Maurer, A Rüedlinger, B Tackmann
Theory of Cryptography, 209-229, 2012
342012
Causal boxes: quantum information-processing systems closed under composition
C Portmann, C Matt, U Maurer, R Renner, B Tackmann
IEEE Transactions on Information Theory, 2017
332017
Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer
C Badertscher, C Matt, U Maurer, P Rogaway, B Tackmann
International Conference on Provable Security, 2015
322015
(De-) Constructing TLS
M Kohlweiss, U Maurer, C Onete, B Tackmann, D Venturi
272014
Constructing Confidential Channels from Authenticated Channels---Public-Key Encryption Revisited
S Coretti, U Maurer, B Tackmann
Advances in Cryptology-ASIACRYPT, 2013
242013
Key Exchange with Unilateral Authentication: Composable Security Definition and Modular Protocol Design
U Maurer, B Tackmann, S Coretti
182013
De-Constructing TLS 1.3
M Kohlweiss, U Maurer, C Onete, B Tackmann, D Venturi
Proceedings of the 16th International Conference on Progress in Cryptology …, 2015
172015
Secure Event Tickets on a Blockchain
B Tackmann
Data Privacy Management, Cryptocurrencies and Blockchain Technology, 437-444, 2017
162017
Updatable Encryption with Post-Compromise Security
A Lehmann, B Tackmann
EUROCRYPT, 2018
152018
How Fair is Your Protocol? A Utility-based Approach to Protocol Optimality
J Garay, J Katz, B Tackmann, V Zikas
Principles of Distributed Computing, 2015
152015
Moderately Hard Functions: Definition, Instantiations, and Applications
J Alwen, B Tackmann
Theory of Cryptography Conference, 493-526, 2017
142017
Nonce-Based Cryptography: Retaining Security when Randomness Fails
M Bellare, B Tackmann
EUROCRYPT 2016, 2016
142016
Anonymity-Preserving Public-Key Encryption: A Constructive Approach
M Kohlweiss, U Maurer, C Onete, B Tackmann, D Venturi
Privacy Enhancing Technologies, 19-39, 2013
142013
Robust Authenticated Encryption and the Limits of Symmetric Cryptography
C Badertscher, C Matt, U Maurer, P Rogaway, B Tackmann
IMA International Conference on Cryptography and Coding, 2015
132015
The system can't perform the operation now. Try again later.
Articles 1–20