Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts DH Phan, D Pointcheval, SF Shahandashti, M Strefler International journal of information security 12 (4), 251-265, 2013 | 112 | 2013 |
On the joint security of encryption and signature in EMV JP Degabriele, A Lehmann, KG Paterson, NP Smart, M Strefler Cryptographers’ Track at the RSA Conference, 116-135, 2012 | 78 | 2012 |
Decentralized dynamic broadcast encryption DH Phan, D Pointcheval, M Strefler International Conference on Security and Cryptography for Networks, 166-183, 2012 | 49 | 2012 |
Security notions for broadcast encryption DH Phan, D Pointcheval, M Strefler International Conference on Applied Cryptography and Network Security, 377-394, 2011 | 32 | 2011 |
A Practical Attack Against the Use of RC4 in the HIVE Hidden Volume Encryption System KG Paterson, M Strefler Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015 | 12 | 2015 |
Partnership in key exchange protocols K Kobara, S Shin, M Strefler Proceedings of the 4th International Symposium on Information, Computer, and …, 2009 | 10 | 2009 |
Towards secure cloud computing C Henrich, M Huber, C Kempka, J Muller-Quade, M Strefler LECTURE NOTES IN COMPUTER SCIENCE 1 (5873), 785-786, 2009 | 9* | 2009 |
Message-based traitor tracing with optimal ciphertext rate DH Phan, D Pointcheval, M Strefler International Conference on Cryptology and Information Security in Latin …, 2012 | 8 | 2012 |
Brief Announcement: Towards secure cloud computing C Henrich, M Huber, C Kempka, J Müller-Quade, M Strefler Symposium on Self-Stabilizing Systems, 785-786, 2009 | 5 | 2009 |
Broadcast Encryption with Traitor Tracing M Strefler Ecole Normale Supérieure de Paris-ENS Paris, 2013 | 4* | 2013 |
Invisible Adaptive Attacks. JB Nielsen, M Strefler IACR Cryptology ePrint Archive 2014, 597, 2014 | 2 | 2014 |
Tor und JAP: Umsetzung von Anonymitätstechniken M Strefler Datenschutz in Kommunikationsnet-zen, 33, 2006 | | 2006 |
Computational and Symbolic Proofs of Security: a short report M Strefler, C Su, V Suppakitpaisarn, I Suzuki, A Turrini | | |
A New Security Model for Key Exchange H Imai, J Müller-Quade, M Strefler, K Kobara, SH Shin, DID Kraschewski | | |