Sebastian Faust
Sebastian Faust
Verified email at
Cited by
Cited by
Proofs of space
S Dziembowski, S Faust, V Kolmogorov, K Pietrzak
Annual Cryptology Conference, 585-605, 2015
Leakage-resilient signatures
S Faust, E Kiltz, K Pietrzak, GN Rothblum
Theory of Cryptography Conference, 343-360, 2010
Protecting circuits from leakage: the computationally-bounded and noisy cases
S Faust, T Rabin, L Reyzin, E Tromer, V Vaikuntanathan
Annual International Conference on the Theory and Applications of …, 2010
Unifying Leakage Models: From Probing Attacks to Noisy Leakage.
A Duc, S Dziembowski, S Faust
Annual International Conference on the Theory and Applications of …, 2014
Making masking security proofs concrete
A Duc, S Faust, FX Standaert
Advances in Cryptology--EUROCRYPT 2015, 401-429, 2015
Secure two-party computation with low communication
I Damgård, S Faust, C Hazay
Theory of Cryptography Conference, 54-74, 2012
Efficient non-malleable codes and key derivation for poly-size tampering circuits
S Faust, P Mukherjee, D Venturi, D Wichs
IEEE Transactions on Information Theory 62 (12), 7179-7194, 2016
Continuous non-malleable codes
S Faust, P Mukherjee, JB Nielsen, D Venturi
Theory of Cryptography Conference, 465-488, 2014
Perun: Virtual payment hubs over cryptographic currencies
S Dziembowski, L Eckey, S Faust, D Malinowski
Technical report, IACR Cryptology ePrint Archive 2017, 2017
General state channel networks
S Dziembowski, S Faust, K Hostáková
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
On the non-malleability of the Fiat-Shamir transform
S Faust, M Kohlweiss, GA Marson, D Venturi
International Conference on Cryptology in India, 60-79, 2012
Leakage-resilient cryptography from the inner-product extractor
S Dziembowski, S Faust
International Conference on the Theory and Application of Cryptology and …, 2011
Parallel implementations of masking schemes and the bounded moment leakage model
G Barthe, F Dupressoir, S Faust, B Grégoire, FX Standaert, PY Strub
Annual International Conference on the Theory and Applications of …, 2017
Practical leakage-resilient symmetric cryptography
S Faust, K Pietrzak, J Schipper
International Workshop on Cryptographic Hardware and Embedded Systems, 213-232, 2012
Fairswap: How to fairly exchange digital goods
S Dziembowski, L Eckey, S Faust
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
Leakage-resilient circuits without computational assumptions
S Dziembowski, S Faust
Theory of Cryptography Conference, 230-247, 2012
Bounded tamper resilience: How to go beyond the algebraic barrier
I Damgård, S Faust, P Mukherjee, D Venturi
Journal of Cryptology 30 (1), 152-190, 2017
Masking vs. multiparty computation: how large is the gap for AES?
V Grosso, FX Standaert, S Faust
Journal of Cryptographic Engineering 4 (1), 47-57, 2014
Tamper-proof circuits: How to trade leakage for tamper-resilience
S Faust, K Pietrzak, D Venturi
International Colloquium on Automata, Languages, and Programming, 391-402, 2011
Efficient oblivious augmented maps: Location-based services with a payment broker
M Kohlweiss, S Faust, L Fritsch, B Gedrojc, B Preneel
International Workshop on Privacy Enhancing Technologies, 77-94, 2007
The system can't perform the operation now. Try again later.
Articles 1–20