Christian Matt
Christian Matt
Concordium
Verified email at concordium.com - Homepage
TitleCited byYear
Causal boxes: Quantum information-processing systems closed under composition
C Portmann, C Matt, U Maurer, R Renner, B Tackmann
IEEE Transactions on Information Theory 63 (5), 3277-3305, 2017
312017
Augmented secure channels and the goal of the TLS 1.3 record layer
C Badertscher, C Matt, U Maurer, P Rogaway, B Tackmann
International Conference on Provable Security, 85-104, 2015
292015
The one-time pad revisited
C Matt, U Maurer
2013 IEEE International Symposium on Information Theory, 2706-2710, 2013
182013
Pseudo flawed-smudging generators and their application to indistinguishability obfuscation
H Lin, C Matt
IACR Cryptology ePrint Archive 2018, 646, 2018
122018
Robust authenticated encryption and the limits of symmetric cryptography
C Badertscher, C Matt, U Maurer, P Rogaway, B Tackmann
IMA International Conference on Cryptography and Coding, 112-129, 2015
122015
A definitional framework for functional encryption
C Matt, U Maurer
2015 IEEE 28th Computer Security Foundations Symposium, 217-231, 2015
11*2015
Idealizing identity-based encryption
D Hofheinz, C Matt, U Maurer
International Conference on the Theory and Application of Cryptology and …, 2015
92015
Strengthening access control encryption
C Badertscher, C Matt, U Maurer
International Conference on the Theory and Application of Cryptology and …, 2017
72017
Toward an algebraic theory of systems
C Matt, U Maurer, C Portmann, R Renner, B Tackmann
Theoretical Computer Science 747, 1-25, 2018
32018
Indistinguishability obfuscation without multilinear maps: New paradigms via low degree weak pseudorandomness and security amplification
P Ananth, A Jain, H Lin, C Matt, A Sahai
Annual International Cryptology Conference, 284-332, 2019
22019
Afgjort–a semi-synchronous finality layer for blockchains
B Magri, C Matt, JB Nielsen, D Tschudi
Cryptology ePrint 2019/504, 2019
22019
How to leverage hardness of constant-degree expanding polynomials over to build
A Jain, H Lin, C Matt, A Sahai
Annual International Conference on the Theory and Applications of …, 2019
22019
A constructive treatment of enhanced encryption schemes
C Matt
ETH Zurich, 2017
2017
The system can't perform the operation now. Try again later.
Articles 1–13