Björn Tackmann
Björn Tackmann
DFINITY
Verified email at dfinity.org
Title
Cited by
Cited by
Year
Universally Composable Synchronous Computation
J Katz, U Maurer, B Tackmann, V Zikas
Theory of Cryptography, 2013
1502013
Rational Protocol Design: Cryptography against Incentive-driven Adversaries
J Garay, J Katz, U Maurer, B Tackmann, V Zikas
Foundations of Computer Science, 2013
772013
The Multi-User Security of Authenticated Encryption: AES-GCM in TLS 1.3
M Bellare, B Tackmann
CRYPTO, 2016
672016
From Single-Bit to Multi-Bit Public-Key Encryption via Non-Malleable Codes
S Coretti, U Maurer, B Tackmann, D Venturi
Theory of Cryptography 9014 (324), 532-560, 2015
642015
On the Soundness of Authenticate-then-Encrypt: Formalizing the Malleability of Symmetric Encryption
U Maurer, B Tackmann
Proceedings of the 17th ACM conference on Computer and communications …, 2010
552010
Non-Malleable Encryption: Simpler, Shorter, Stronger
S Coretti, Y Dodis, B Tackmann, D Venturi
Theory of Cryptography, 2016
50*2016
Causal boxes: quantum information-processing systems closed under composition
C Portmann, C Matt, U Maurer, R Renner, B Tackmann
IEEE Transactions on Information Theory, 2017
462017
Confidentiality and Integrity: A Constructive Perspective
U Maurer, A Rüedlinger, B Tackmann
Theory of Cryptography, 209-229, 2012
392012
Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer
C Badertscher, C Matt, U Maurer, P Rogaway, B Tackmann
International Conference on Provable Security, 2015
332015
Updatable Encryption with Post-Compromise Security
A Lehmann, B Tackmann
EUROCRYPT, 2018
302018
(De-) Constructing TLS
M Kohlweiss, U Maurer, C Onete, B Tackmann, D Venturi
282014
Constructing Confidential Channels from Authenticated Channels---Public-Key Encryption Revisited
S Coretti, U Maurer, B Tackmann
Advances in Cryptology-ASIACRYPT, 2013
282013
De-Constructing TLS 1.3
M Kohlweiss, U Maurer, C Onete, B Tackmann, D Venturi
Proceedings of the 16th International Conference on Progress in Cryptology …, 2015
212015
How Fair is Your Protocol? A Utility-based Approach to Protocol Optimality
J Garay, J Katz, B Tackmann, V Zikas
Principles of Distributed Computing, 2015
192015
Key Exchange with Unilateral Authentication: Composable Security Definition and Modular Protocol Design
U Maurer, B Tackmann, S Coretti
192013
Moderately Hard Functions: Definition, Instantiations, and Applications
J Alwen, B Tackmann
Theory of Cryptography Conference, 493-526, 2017
182017
Secure Event Tickets on a Blockchain
B Tackmann
Data Privacy Management, Cryptocurrencies and Blockchain Technology, 437-444, 2017
182017
Asymmetric Distributed Trust
C Cachin, B Tackmann
arXiv preprint arXiv:1906.09314, 2019
162019
Nonce-Based Cryptography: Retaining Security when Randomness Fails
M Bellare, B Tackmann
EUROCRYPT 2016, 2016
162016
The Transaction Graph for Modeling Blockchain Semantics
C Cachin, A De Caro, P Moreno-Sanchez, B Tackmann, M Vukolic
152017
The system can't perform the operation now. Try again later.
Articles 1–20