publications

Pre-print

[16] Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3

Marc Fischlin, Felix Günther, and Christian Janson(available at IACR ePrint archive 2020/718)

papers in conferences and workshops with proceedings

[15] BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures

Cas Cremers, Samed Düzlü, Rune Fiedler, Marc Fischlin, and Christian JansonIEEE Security and Privacy, IEEE S&P 2021. TO APPEAR(available at IACR ePrint archive 2020/1525 )

[14] Towards Post-Quantum Security for Signal's X3DH Handshake

Jacqueline Brendel, Marc Fischlin, Felix Günther, Christian Janson, and Douglas Stebila
Selected Areas in Cryptography, 27th International Conference, SAC 2020, Lecture Notes in Computer Science, Volume ???, pp. ??–??. Springer. TO APPEAR
(preliminary version available at IACR ePrint archive 2019/1356)

[13] Security Reductions for White-Box Key-Storage in Mobile Payments

Estuardo Alpirez Bock, Chris Brzuska, Marc Fischlin, Christian Janson, and Wil Michiels
26th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2020), Lecture Notes in Computer Science, Volume 12491, Part I, pp. 221–252. Springer.
(full version available at IACR ePrint archive 2019/1014)

[12] Client-oblivious OPRAM

Gareth T. Davies, Christian Janson, and Daniel P. Martin22nd International Conference on Information and Communications Security (ICICS 2020), Lecture Notes in Computer Science, Volume 12282, pp. 312-330. Springer.(full version available at IACR ePrint 2020/858)

[11] Signatures from Sequential-OR Proofs

Marc Fishlin, Patrick Harasser, and Christian Janson39th International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2020), Lecture Notes in Computer Science, Volume 12107, Part III, pp. 212-244. Springer.(full version available at IACR ePrint archive 2020/271)

[10] Sponges Resist Leakage: The Case of Authenticated Encryption

Jean Paul Degabriele, Christian Janson, and Patrick Struck25th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2019), Lecture Notes in Computer Science, Volume 11922, Part II, pp. 209–240. Springer.(full version available at IACR ePrint archive 2019/1034)

[9] Backdoored Hash Functions: Immunizing HMAC and HKDF

Marc Fischlin, Christian Janson, and Sogol Mazaheri31st IEEE Computer Security Foundations Symposium (CSF 2018). pp. 105-118, IEEE, 2018.(full version available at IACR ePrint archive 2018/362)

[8] PRF-ODH: Relations, Instantiations, and Impossibility Results

Jacqueline Brendel, Marc Fischlin, Felix Günther, and Christian Janson37th International Cryptology Conference (CRYPTO 2017), Lecture Notes in Computer Science, Volume 10403, Part III, pp. 651–681. Springer, August 2017.(full version available at IACR ePrint archive 2017/517)

[7] Cloud Storage File Recoverability

Christian A. Gorke, Christian Janson, Frederik Armknecht, and Carlos CidProceedings of the 5th ACM International Workshop on Security in Cloud Computing (ASIACCS-SSC 2017), p. 19-26, New York, NY, USA, 2017. ACM.(full version available at IACR ePrint archive 2017/167)

[6] Hybrid Publicly Verifiable Computation

James Alderman, Christian Janson, Carlos Cid, and Jason CramptonProceedings of CT-RSA 2016, Lecture Notes in Computer Science Vol. 9610, pp. 147-163, Springer, 2016.(full version available at IACR ePrint archive 2015/320)

[5] Extended Functionality in Verifiable Searchable Encryption

James Alderman, Christian Janson, Keith M. Martin, and Sarah Louise RenwickProceedings of the 2nd International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 03-04, 2015, Lecture Notes in Computer Science Vol. 9540, p. 187-205, Springer, 2015.(full version available at IACR ePrint archive 2015/975)

[4] Access Control in Publicly Verifiable Outsourced Computation

James Alderman, Christian Janson, Carlos Cid, and Jason CramptonProceedings of the 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015), p. 657-662, New York, NY, USA, 2015. ACM.(full version available at IACR ePrint archive 2014/762)

[3] Revocation in Publicly Verifiable Outsourced Computation

James Alderman, Christian Janson, Carlos Cid, and Jason CramptonProceedings of the 10th International Conference on Information Security and Cryptology – Inscrypt 2014, Beijing, China, December 13-15, 2014, Lecture Notes in Computer Science Vol. 8957, p. 51-71, Springer, 2014.(full version available at IACR ePrint archive 2014/640)

thesis

[2] On the Verification of Computation and Data Retrievability

PhD thesis, Royal Holloway University of London, 2016

[1] Boolean Functions

Diplomarbeit, Universität Bremen, 2012