Sponges resist leakage: The case of authenticated encryption JP Degabriele, C Janson, P Struck International Conference on the Theory and Application of Cryptology and …, 2019 | 37 | 2019 |
Deterministic wallets in a quantum world N Alkeilani Alkadri, P Das, A Erwig, S Faust, J Krämer, S Riahi, P Struck Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 32 | 2020 |
Secure two-party computation in a quantum world N Büscher, D Demmler, NP Karvelas, S Katzenbeisser, J Krämer, ... Applied Cryptography and Network Security: 18th International Conference …, 2020 | 20 | 2020 |
Quantum indistinguishability for public key encryption T Gagliardoni, J Krämer, P Struck Post-Quantum Cryptography: 12th International Workshop, PQCrypto 2021 …, 2021 | 17* | 2021 |
Leakage-resilient authenticated encryption from leakage-resilient pseudorandom functions J Krämer, P Struck Constructive Side-Channel Analysis and Secure Design: 11th International …, 2021 | 17 | 2021 |
A linearly homomorphic signature scheme from weaker assumptions L Schabhüser, J Buchmann, P Struck Cryptography and Coding: 16th IMA International Conference, IMACC 2017 …, 2017 | 11 | 2017 |
Encryption schemes using random oracles: from classical to post-quantum security J Krämer, P Struck International Conference on Post-Quantum Cryptography, 539-558, 2020 | 10 | 2020 |
Linearly homomorphic authenticated encryption with provable correctness and public verifiability P Struck, L Schabhüser, D Demirel, J Buchmann International Conference on Codes, Cryptology, and Information Security, 142-160, 2017 | 9 | 2017 |
On the (in) security of the BUFF transform J Don, S Fehr, YH Huang, P Struck Annual International Cryptology Conference, 246-275, 2024 | 8 | 2024 |
Committing AE from Sponges: Security Analysis of the NIST LWC Finalists J Krämer, P Struck, M Weishäupl Cryptology ePrint Archive, 2023 | 6* | 2023 |
Hash Your Keys Before Signing: BUFF Security of the Additional NIST PQC Signatures T Aulbach, S Düzlü, M Meyer, P Struck, M Weishäupl International Conference on Post-Quantum Cryptography, 301-335, 2024 | 4 | 2024 |
Constructing Committing and Leakage-Resilient Authenticated Encryption P Struck, M Weishäupl IACR Transactions on Symmetric Cryptology 2024 (1), 497-528, 2024 | 4 | 2024 |
On the related-key attack security of authenticated encryption schemes S Faust, J Krämer, M Orlt, P Struck International Conference on Security and Cryptography for Networks, 362-386, 2022 | 4 | 2022 |
Hide-and-Seek and the Non-Resignability of the BUFF Transform J Don, S Fehr, YH Huang, JJ Liao, P Struck Cryptology ePrint Archive, 2024 | 2 | 2024 |
Sponge-based authenticated encryption: Security against quantum attackers C Janson, P Struck International Conference on Post-Quantum Cryptography, 230-259, 2022 | 2 | 2022 |
Post-Quantum Security of Tweakable Even-Mansour, and Applications G Alagic, C Bai, J Katz, C Majenz, P Struck Cryptology ePrint Archive, 2022 | 1 | 2022 |
Security of public key encryption against resetting attacks J Krämer, P Struck Progress in Cryptology–INDOCRYPT 2020: 21st International Conference on …, 2020 | 1 | 2020 |
Efficient Post-Quantum Secure Deterministic Threshold Wallets from Isogenies P Das, A Erwig, M Meyer, P Struck Proceedings of the 19th ACM Asia Conference on Computer and Communications …, 2024 | | 2024 |
Binding Security of Implicitly-Rejecting KEMs and Application to BIKE and HQC J Krämer, P Struck, M Weishäupl Cryptology ePrint Archive, 2024 | | 2024 |
A Lightweight Identification Protocol Based on Lattices S Düzlü, J Krämer, T Pöppelmann, P Struck IACR International Conference on Public-Key Cryptography, 95-113, 2023 | | 2023 |