publications
Pre-print
[19] Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3
papers in conferences and workshops with proceedings
[18] Sponge-based Authenticated Encryption: Security against Quantum Attackers
Christian Janson and Patrick StruckPost-Quantum Cryptography - 13th International Workshop, PQCrypto 2022, Virtual, Lecture Notes in Computer Science, Volume 13512, pp. 230–259. Springer.
(available at IACR ePrint archive 2022/139)
[17] Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake
Jacqueline Brendel, Rune Fiedler, Felix Günther, Christian Janson, and Douglas StebilaPublic Key Cryptography, 25th International Conference, PKC 2022, Lecture Notes in Computer Science, Volume 13178, pp. 3–34. Springer.
(available at IACR ePrint archive 2021/769 )
[16] BlindOR: An Efficient Lattice-based Signature Scheme from OR-Proofs
Nabil Alkeilani Alkadri, Patrick Harasser, and Christian JansonCryptology and Network Security, 20th International Conference, CANS 2021, Lecture Notes in Computer Science, Volume 13099, pp. 95--115 Springer.(full version available at IACR ePrint archive 2021/1385 )[15] BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures
Cas Cremers, Samed Düzlü, Rune Fiedler, Marc Fischlin, and Christian JansonIEEE Symposium on Security and Privacy, IEEE S&P 2021, pp. 1607-1625, IEEE Computer Society.(full version available at IACR ePrint archive 2020/1525 )[14] Towards Post-Quantum Security for Signal's X3DH Handshake
Jacqueline Brendel, Marc Fischlin, Felix Günther, Christian Janson, and Douglas StebilaSelected Areas in Cryptography, 27th International Conference, SAC 2020, Lecture Notes in Computer Science, Volume 12804, pp. 404–430. Springer.(full version available at IACR ePrint archive 2019/1356)
[13] Security Reductions for White-Box Key-Storage in Mobile Payments
Estuardo Alpirez Bock, Chris Brzuska, Marc Fischlin, Christian Janson, and Wil Michiels26th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2020), Lecture Notes in Computer Science, Volume 12491, Part I, pp. 221–252. Springer.(full version available at IACR ePrint archive 2019/1014)
[12] Client-oblivious OPRAM
Gareth T. Davies, Christian Janson, and Daniel P. Martin22nd International Conference on Information and Communications Security (ICICS 2020), Lecture Notes in Computer Science, Volume 12282, pp. 312-330. Springer.(full version available at IACR ePrint 2020/858)[11] Signatures from Sequential-OR Proofs
Marc Fishlin, Patrick Harasser, and Christian Janson39th International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2020), Lecture Notes in Computer Science, Volume 12107, Part III, pp. 212-244. Springer.(full version available at IACR ePrint archive 2020/271)[10] Sponges Resist Leakage: The Case of Authenticated Encryption
Jean Paul Degabriele, Christian Janson, and Patrick Struck25th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2019), Lecture Notes in Computer Science, Volume 11922, Part II, pp. 209–240. Springer.(full version available at IACR ePrint archive 2019/1034)[9] Backdoored Hash Functions: Immunizing HMAC and HKDF
Marc Fischlin, Christian Janson, and Sogol Mazaheri31st IEEE Computer Security Foundations Symposium (CSF 2018). pp. 105-118, IEEE, 2018.(full version available at IACR ePrint archive 2018/362)[8] PRF-ODH: Relations, Instantiations, and Impossibility Results
Jacqueline Brendel, Marc Fischlin, Felix Günther, and Christian Janson37th International Cryptology Conference (CRYPTO 2017), Lecture Notes in Computer Science, Volume 10403, Part III, pp. 651–681. Springer, August 2017.(full version available at IACR ePrint archive 2017/517)[7] Cloud Storage File Recoverability
Christian A. Gorke, Christian Janson, Frederik Armknecht, and Carlos CidProceedings of the 5th ACM International Workshop on Security in Cloud Computing (ASIACCS-SSC 2017), p. 19-26, New York, NY, USA, 2017. ACM.(full version available at IACR ePrint archive 2017/167)[6] Hybrid Publicly Verifiable Computation
James Alderman, Christian Janson, Carlos Cid, and Jason CramptonProceedings of CT-RSA 2016, Lecture Notes in Computer Science Vol. 9610, pp. 147-163, Springer, 2016.(full version available at IACR ePrint archive 2015/320)[5] Extended Functionality in Verifiable Searchable Encryption
James Alderman, Christian Janson, Keith M. Martin, and Sarah Louise RenwickProceedings of the 2nd International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 03-04, 2015, Lecture Notes in Computer Science Vol. 9540, p. 187-205, Springer, 2015.(full version available at IACR ePrint archive 2015/975)[4] Access Control in Publicly Verifiable Outsourced Computation
James Alderman, Christian Janson, Carlos Cid, and Jason CramptonProceedings of the 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015), p. 657-662, New York, NY, USA, 2015. ACM.(full version available at IACR ePrint archive 2014/762)[3] Revocation in Publicly Verifiable Outsourced Computation
James Alderman, Christian Janson, Carlos Cid, and Jason CramptonProceedings of the 10th International Conference on Information Security and Cryptology – Inscrypt 2014, Beijing, China, December 13-15, 2014, Lecture Notes in Computer Science Vol. 8957, p. 51-71, Springer, 2014.(full version available at IACR ePrint archive 2014/640)thesis
[2] On the Verification of Computation and Data Retrievability
PhD thesis, Royal Holloway University of London, 2016Diplomarbeit, Universität Bremen, 2012