Mario Strefler
Mario Strefler
Verified email at kit.edu
Title
Cited by
Cited by
Year
Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts
DH Phan, D Pointcheval, SF Shahandashti, M Strefler
International journal of information security 12 (4), 251-265, 2013
902013
On the joint security of encryption and signature in EMV
JP Degabriele, A Lehmann, KG Paterson, NP Smart, M Strefler
Cryptographers’ Track at the RSA Conference, 116-135, 2012
562012
Security notions for broadcast encryption
DH Phan, D Pointcheval, M Strefler
International Conference on Applied Cryptography and Network Security, 377-394, 2011
312011
Decentralized dynamic broadcast encryption
DH Phan, D Pointcheval, M Strefler
International Conference on Security and Cryptography for Networks, 166-183, 2012
30*2012
A Practical Attack Against the Use of RC4 in the HIVE Hidden Volume Encryption System
KG Paterson, M Strefler
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
9*2015
Partnership in key exchange protocols
K Kobara, S Shin, M Strefler
Proceedings of the 4th International Symposium on Information, Computer, and …, 2009
82009
Message-based traitor tracing with optimal ciphertext rate
DH Phan, D Pointcheval, M Strefler
International Conference on Cryptology and Information Security in Latin …, 2012
72012
Brief Announcement: Towards secure cloud computing
C Henrich, M Huber, C Kempka, J Müller-Quade, M Strefler
Symposium on Self-Stabilizing Systems, 785-786, 2009
62009
Towards secure cloud computing
C Henrich, M Huber, C Kempka, J Muller-Quade, M Strefler
LECTURE NOTES IN COMPUTER SCIENCE 1 (5873), 785-786, 2009
6*2009
Invisible Adaptive Attacks.
JB Nielsen, M Strefler
IACR Cryptology ePrint Archive 2014, 597, 2014
22014
Broadcast Encryption with Traitor Tracing
M Strefler
Ecole Normale Supérieure de Paris-ENS Paris, 2013
1*2013
Tor und JAP: Umsetzung von Anonymitätstechniken
M Strefler
Datenschutz in Kommunikationsnet-zen, 33, 2006
2006
Computational and Symbolic Proofs of Security: a short report
M Strefler, C Su, V Suppakitpaisarn, I Suzuki, A Turrini
A New Security Model for Key Exchange
H Imai, J Müller-Quade, M Strefler, K Kobara, SH Shin, DID Kraschewski
The system can't perform the operation now. Try again later.
Articles 1–14