Christian Cachin
Christian Cachin
University of Bern, Cryptology and Data Security Group
Bekræftet mail på - Startside
Citeret af
Citeret af
Hyperledger fabric: a distributed operating system for permissioned blockchains
E Androulaki, A Barger, V Bortnikov, C Cachin, K Christidis, A De Caro, ...
Proceedings of the thirteenth EuroSys conference, 1-15, 2018
An information-theoretic model for steganography
C Cachin
International Workshop on Information Hiding, 306-318, 1998
Architecture of the hyperledger blockchain fabric
C Cachin
Workshop on distributed cryptocurrencies and consensus ledgers 310 (4), 2016
Computationally private information retrieval with polylogarithmic communication
C Cachin, S Micali, M Stadler
International Conference on the Theory and Applications of Cryptographic …, 1999
Blockchain consensus protocols in the wild
C Cachin, M Vukolić
arXiv preprint arXiv:1707.01873, 2017
Introduction to reliable and secure distributed programming
C Cachin, R Guerraoui, L Rodrigues
Springer Science & Business Media, 2011
Random oracles in Constantinople: Practical asynchronous Byzantine agreement using cryptography
C Cachin, K Kursawe, V Shoup
Journal of Cryptology 18 (3), 219-246, 2005
Efficient private bidding and auctions with an oblivious third party
C Cachin
Proceedings of the 6th ACM Conference on Computer and Communications …, 1999
Trusting the cloud
C Cachin, I Keidar, A Shraer
Acm Sigact News 40 (2), 81-86, 2009
Secure and efficient asynchronous broadcast protocols
C Cachin, K Kursawe, F Petzold, V Shoup
Annual International Cryptology Conference, 524-541, 2001
Entropy measures and unconditional security in cryptography
C Cachin
ETH Zurich, 1997
Asynchronous verifiable secret sharing and proactive cryptosystems
C Cachin, K Kursawe, A Lysyanskaya, R Strobl
Proceedings of the 9th ACM Conference on Computer and Communications …, 2002
CheapBFT: Resource-efficient Byzantine fault tolerance
R Kapitza, J Behl, C Cachin, T Distler, S Kuhnle, SV Mohammadi, ...
Proceedings of the 7th ACM european conference on Computer Systems, 295-308, 2012
Unconditional security against memory-bounded adversaries
C Cachin, U Maurer
Annual International Cryptology Conference, 292-306, 1997
Linking information reconciliation and privacy amplification
C Cachin, UM Maurer
journal of Cryptology 10 (2), 97-110, 1997
Cryptographic security for mobile code
J Algesheimer, C Cachin, J Camenisch, G Karjoth
Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, 2-11, 2000
One-round secure computation and secure autonomous mobile agents
C Cachin, J Camenisch, J Kilian, J Müller
International Colloquium on Automata, Languages, and Programming, 512-523, 2000
Secure intrusion-tolerant replication on the Internet
C Cachin, JA Poritz
Proceedings International Conference on Dependable Systems and Networks, 167-176, 2002
Venus: Verification for untrusted cloud storage
A Shraer, C Cachin, A Cidon, I Keidar, Y Michalevsky, D Shaket
Proceedings of the 2010 ACM workshop on Cloud computing security workshop, 19-30, 2010
Dependable storage in the intercloud
C Cachin, R Haas, M Vukolic
IBM research 3783, 1-6, 2010
Systemet kan ikke foretage handlingen nu. Prøv igen senere.
Artikler 1–20