ETH Zürich » Computer Science » Theory » Cryptography

Björn Tackmann's Publications

Grégory Demay, Peter Gaži, Ueli Maurer, and Björn Tackmann
Optimality of Non-Adaptive Strategies: The Case of Parallel Games
to appear in 2014 IEEE International Symposium on Information Theory Proceedings (ISIT), Jul 2014.
Available files: [ PDF ] [ Abstract ] [ BibTeX ]
Sandro Coretti, Ueli Maurer, and Björn Tackmann
Constructing Confidential Channels from Authenticated Channels—Public-Key Encryption Revisited
Advances in Cryptology—ASIACRYPT 2013, Lecture Notes in Computer Science, Springer, vol. 8269, pp. 134–153, Dec 2013.
Available files: [ PDF ] [ Abstract ] [ BibTeX ]
Juan Garay, Jonathan Katz, Ueli Maurer, Björn Tackmann, and Vassilis Zikas
Rational Protocol Design: Cryptography Against Incentive-driven Adversaries
FOCS 2013, IEEE, Oct 2013.
Available files: [ PDF ] [ Abstract ] [ BibTeX ]
Markulf Kohlweiss, Ueli Maurer, Cristina Onete, Björn Tackmann, and Daniele Venturi
Anonymity-preserving Public-Key Encryption: A Constructive Approach
Privacy Enhancing Technologies — 13th International Symposium, Lecture Notes in Computer Science, Springer, vol. 7981, pp. 19–39, Jul 2013.
Available files: [ PDF ] [ Abstract ] [ BibTeX ]
Jonathan Katz, Ueli Maurer, Björn Tackmann, and Vassilis Zikas
Universally Composable Synchronous Computation
Theory of Cryptography — TCC 2013, Lecture Notes in Computer Science, Springer, vol. 7785, pp. 477-498, Mar 2013.
Available files: [ PDF ] [ Abstract ] [ BibTeX ]
Sandro Coretti, Ueli Maurer, and Björn Tackmann
A Constructive Perspective on Key Encapsulation
Number Theory and Cryptography, Lecture Notes in Computer Science, Springer, vol. 8260, pp. 226–239, 2013.
Available files: [ Abstract ] [ BibTeX ]
Ueli Maurer and Björn Tackmann
Synchrony Amplification
Information Theory Proceedings — ISIT 2012, IEEE, pp. 1583-1587, Jul 2012.
Available files: [ PDF ] [ Abstract ] [ BibTeX ]
Ueli Maurer, Andreas Rüedlinger, and Björn Tackmann
Confidentiality and Integrity: A Constructive Perspective
Theory of Cryptography — TCC 2012, Lecture Notes in Computer Science, Springer, vol. 7194, pp. 209–229, Mar 2012.
Available files: [ PDF ] [ Abstract ] [ BibTeX ]
Ueli Maurer and Björn Tackmann
On the Soundness of Authenticate-then-Encrypt: Formalizing the Malleability of Symmetric Encryption
Proceedings of the 17th ACM Conference on Computer and Communication Security, ACM, pp. 505–515, Oct 2010.
Available files: [ PDF ] [ Abstract ] [ BibTeX ]

© IACR | Springer | ACM | IEEE