publications

Pre-print

[13] Challenges in Proving Post-Quantum Key Exchanges Based on Key Encapsulation Mechanisms

Jacqueline Brendel, Marc Fischlin, Felix Günther, Christian Janson, and Douglas Stebila(available at IACR ePrint archive 2019/1356)

[12] Security Reductions for White-Box Key-Storage in Mobile Payments

Estuardo Alpirez Bock, Chris Brzuska, Marc Fischlin, Christian Janson, and Wil Michiels(available at IACR ePrint archive 2019/1014)

papers in conferences and workshops with proceedings

[11] Signatures from Sequential-OR Proofs

Marc Fishlin, Patrick Harasser, and Christian Janson39th International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2020), Lecture Notes in Computer Science, Volume ???, Part ??, pp. ???-???. Springer.(full version available at IACR ePrint archive soon)

[10] Sponges Resist Leakage: The Case of Authenticated Encryption

Jean Paul Degabriele, Christian Janson, and Patrick Struck25th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2019), Lecture Notes in Computer Science, Volume 11922, Part II, pp. 209–240. Springer.(full version available at IACR ePrint archive 2019/1034)

[9] Backdoored Hash Functions: Immunizing HMAC and HKDF

Marc Fischlin, Christian Janson, and Sogol Mazaheri31st IEEE Computer Security Foundations Symposium (CSF 2018). pp. 105-118, IEEE, 2018.(full version available at IACR ePrint archive 2018/362)

[8] PRF-ODH: Relations, Instantiations, and Impossibility Results

Jacqueline Brendel, Marc Fischlin, Felix Günther, and Christian Janson37th International Cryptology Conference (CRYPTO 2017), Lecture Notes in Computer Science, Volume 10403, Part III, pp. 651–681. Springer, August 2017.(full version available at IACR ePrint archive 2017/517)

[7] Cloud Storage File Recoverability

Christian A. Gorke, Christian Janson, Frederik Armknecht, and Carlos CidProceedings of the 5th ACM International Workshop on Security in Cloud Computing (ASIACCS-SSC 2017), p. 19-26, New York, NY, USA, 2017. ACM.(full version available at IACR ePrint archive 2017/167)

[6] Hybrid Publicly Verifiable Computation

James Alderman, Christian Janson, Carlos Cid, and Jason CramptonProceedings of CT-RSA 2016, Lecture Notes in Computer Science Vol. 9610, pp. 147-163, Springer, 2016.(full version available at IACR ePrint archive 2015/320)

[5] Extended Functionality in Verifiable Searchable Encryption

James Alderman, Christian Janson, Keith M. Martin, and Sarah Louise RenwickProceedings of the 2nd International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 03-04, 2015, Lecture Notes in Computer Science Vol. 9540, p. 187-205, Springer, 2015.(full version available at IACR ePrint archive 2015/975)

[4] Access Control in Publicly Verifiable Outsourced Computation

James Alderman, Christian Janson, Carlos Cid, and Jason CramptonProceedings of the 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015), p. 657-662, New York, NY, USA, 2015. ACM.(full version available at IACR ePrint archive 2014/762)

[3] Revocation in Publicly Verifiable Outsourced Computation

James Alderman, Christian Janson, Carlos Cid, and Jason CramptonProceedings of the 10th International Conference on Information Security and Cryptology – Inscrypt 2014, Beijing, China, December 13-15, 2014, Lecture Notes in Computer Science Vol. 8957, p. 51-71, Springer, 2014.(full version available at IACR ePrint archive 2014/640)

thesis

[2] On the Verification of Computation and Data Retrievability

PhD thesis, Royal Holloway University of London, 2016

[1] Boolean Functions

Diplomarbeit, Universität Bremen, 2012