Author of the publication

Hardening the Security of Server-Aided MPC Using Remotely Unhackable Hardware Modules.

, , and . Sicherheit, volume P-323 of LNI, page 83-99. Gesellschaft für Informatik e.V., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Realising Oblivious Voting., , , , and . ICETE (Selected Papers), volume 764 of Communications in Computer and Information Science, page 216-240. Springer, (2016)On Group Key Agreement with Cheater Identification, , and . Western European Workshop on Research in Cryptology, WEWoRC 2005, (2005)Methods to Secure Services in an Untrusted Environment., and . Software Engineering, volume P-183 of LNI, page 159-170. GI, (2011)Environmentally Friendly Composable Multi-party Computation in the Plain Model from Standard (Timed) Assumptions., , and . TCC (1), volume 13042 of Lecture Notes in Computer Science, page 750-781. Springer, (2021)ZeTA-Zero-Trust Authentication: Relying on Innate Human Ability, Not Technology., , , , , , and . EuroS&P, page 357-371. IEEE, (2016)A New Security Notion for PKC in the Standard Model: Weaker, Simpler, and Still Realizing Secure Channels., , , , and . Public Key Cryptography (2), volume 13178 of Lecture Notes in Computer Science, page 316-344. Springer, (2022)Recent Developments in the Context of Online Elections and Digital Polls in Germany., , , , , , , , , and . Sicherheit, volume P-323 of LNI, page 213-217. Gesellschaft für Informatik e.V., (2022)Composable Long-Term Security with Rewinding., , , , , , and . TCC (4), volume 14372 of Lecture Notes in Computer Science, page 510-541. Springer, (2023)Challenges and Opportunities of Cloud Computing -- Trade-off Decisions in Cloud Computing Architecture, , , , , , , and . 2010-19. Karlsruhe Institue of Technology, Faculty of Informatics, (2010)Constructing Secure Multi-Party Computation with Identifiable Abort., , , and . IACR Cryptol. ePrint Arch., (2020)