Universally Composable Synchronous Computation J Katz, U Maurer, B Tackmann, V Zikas Theory of Cryptography, 2013 | 223 | 2013 |
The Multi-User Security of Authenticated Encryption: AES-GCM in TLS 1.3 M Bellare, B Tackmann CRYPTO, 2016 | 136 | 2016 |
Rational Protocol Design: Cryptography against Incentive-driven Adversaries J Garay, J Katz, U Maurer, B Tackmann, V Zikas Foundations of Computer Science, 2013 | 111 | 2013 |
Updatable Encryption with Post-Compromise Security A Lehmann, B Tackmann EUROCRYPT, 2018 | 89 | 2018 |
Causal boxes: quantum information-processing systems closed under composition C Portmann, C Matt, U Maurer, R Renner, B Tackmann IEEE Transactions on Information Theory, 2017 | 88 | 2017 |
From Single-Bit to Multi-Bit Public-Key Encryption via Non-Malleable Codes S Coretti, U Maurer, B Tackmann, D Venturi Theory of Cryptography 9014 (324), 532-560, 2015 | 76 | 2015 |
Privacy-preserving auditable token payments in a permissioned blockchain system E Androulaki, J Camenisch, A De Caro, M Dubovitskaya, K Elkhiyaoui, ... | 64* | |
On the Soundness of Authenticate-then-Encrypt: Formalizing the Malleability of Symmetric Encryption U Maurer, B Tackmann Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 60 | 2010 |
Asymmetric Distributed Trust C Cachin, B Tackmann arXiv preprint arXiv:1906.09314, 2019 | 57 | 2019 |
Non-malleable encryption: simpler, shorter, stronger S Coretti, Y Dodis, U Maurer, B Tackmann, D Venturi Journal of Cryptology 33 (4), 1984-2033, 2020 | 54 | 2020 |
Secure event tickets on a blockchain B Tackmann Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS …, 2017 | 43 | 2017 |
Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer C Badertscher, C Matt, U Maurer, P Rogaway, B Tackmann International Conference on Provable Security, 2015 | 41 | 2015 |
Constructing Confidential Channels from Authenticated Channels---Public-Key Encryption Revisited S Coretti, U Maurer, B Tackmann Advances in Cryptology-ASIACRYPT, 2013 | 40 | 2013 |
Confidentiality and Integrity: A Constructive Perspective U Maurer, A Rüedlinger, B Tackmann Theory of Cryptography, 209-229, 2012 | 40 | 2012 |
Nonces are noticed: AEAD revisited M Bellare, R Ng, B Tackmann Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019 | 37 | 2019 |
Universal composition with global subroutines: Capturing global setup within plain UC C Badertscher, R Canetti, J Hesse, B Tackmann, V Zikas Theory of Cryptography Conference, 1-30, 2020 | 33 | 2020 |
How Fair is Your Protocol? A Utility-based Approach to Protocol Optimality J Garay, J Katz, B Tackmann, V Zikas Principles of Distributed Computing, 2015 | 31 | 2015 |
Anonymous Transactions with Revocation and Auditing in Hyperledger Fabric D Bogatov, A De Caro, K Elkhiyaoui, B Tackmann preprint, 23-26, 2020 | 29 | 2020 |
The Transaction Graph for Modeling Blockchain Semantics C Cachin, A De Caro, P Moreno-Sanchez, B Tackmann, M Vukolic | 29* | 2017 |
De-Constructing TLS 1.3 M Kohlweiss, U Maurer, C Onete, B Tackmann, D Venturi Proceedings of the 16th International Conference on Progress in Cryptology …, 2015 | 29 | 2015 |