[go: up one dir, main page]

Follow
Alexander Koch
Alexander Koch
IRIF, CNRS, Université Paris Cité
Verified email at irif.fr
Title
Cited by
Cited by
Year
Card-based cryptographic protocols using a minimal number of cards
A Koch, S Walzer, K Härtel
International Conference on the Theory and Application of Cryptology and …, 2015
1182015
The minimum number of cards in practical card-based protocols
J Kastner, A Koch, S Walzer, D Miyahara, Y Hayashi, T Mizuki, H Sone
International Conference on the Theory and Application of Cryptology and …, 2017
742017
Foundations for actively secure card-based cryptography
A Koch, S Walzer
Cryptology ePrint Archive, 2017
712017
ConTra Corona: Contact Tracing against the Coronavirus by Bridging the Centralized-Decentralized Divide for Stronger Privacy.
W Beskorovajnov, F Dörre, G Hartung, A Koch, J Müller-Quade, T Strufe
IACR Cryptol. ePrint Arch. 2020, 505, 2020
672020
Fault-tolerant aggregate signatures
G Hartung, B Kaidel, A Koch, J Koch, A Rupp
Public-Key Cryptography–PKC 2016, 331-356, 2016
602016
Card-Based Cryptography Meets Formal Verification
A Koch, M Schrempp, M Kirsten
International Conference on the Theory and Application of Cryptology and …, 2019
542019
The Landscape of Optimal Card-based Protocols.
A Koch
IACR Cryptol. ePrint Arch. 2018, 951, 2018
432018
Cryptographic protocols from physical assumptions
A Koch
Karlsruhe Institute of Technology, Germany, 2019
272019
Practical and robust secure logging from fault-tolerant sequential aggregate signatures
G Hartung, B Kaidel, A Koch, J Koch, D Hartmann
International Conference on Provable Security, 87-106, 2017
252017
Quietot: Lightweight oblivious transfer with a public-key setup
G Couteau, L Devadas, S Devadas, A Koch, S Servan-Schreiber
ASIACRYPT 2024, 2024
192024
The Landscape of Security from Physical Assumptions1
A Koch
2021 IEEE Information Theory Workshop (ITW), 1-6, 2021
172021
Private Function Evaluation with Cards
A Koch, S Walzer
New Generation Computing 40 (1), 115-147, 2022
142022
Check alternating patterns: a physical zero-knowledge proof for Moon-or-Sun
S Hand, A Koch, P Lafourcade, D Miyahara, L Robert
International Workshop on Security, 255-272, 2023
132023
Private Stream Aggregation with Labels in the Standard Model
J Ernst, A Koch
Proceedings on Privacy Enhancing Technologies 4, 117-138, 2021
132021
Fortified Multi-Party Computation: Taking Advantage of Simple Secure Hardware Modules
B Broadnax, A Koch, J Mechler, T Müller, J Müller-Quade, M Nagel
Proceedings on Privacy Enhancing Technologies 4, 312-338, 2021
102021
Your Money or Your Life—Modeling and Analyzing the Security of Electronic Payment in the UC Framework
D Achenbach, R Gröll, T Hackenjos, A Koch, B Löwe, J Mechler, ...
International Conference on Financial Cryptography and Data Security, 243-261, 2019
102019
The Quantum Decoherence Model: Everlasting Composable Secure Computation and More
N Döttling, A Koch, S Maier, J Mechler, A Müller, J Müller-Quade, ...
Cryptology ePrint Archive, 2025
42025
Efficient Card-Based ZKP for Single Loop Condition and Its Application to Moon-or-Sun
S Hand, A Koch, P Lafourcade, D Miyahara, L Robert
New Generation Computing 42 (3), 449-477, 2024
42024
Two-Party Decision Tree Training from Updatable Order-Revealing Encryption
R Berger, F Dörre, A Koch
International Conference on Applied Cryptography and Network Security, 288-317, 2024
42024
Fortified Universal Composability: Taking Advantage of Simple Secure Hardware Modules.
B Broadnax, A Koch, J Mechler, T Müller, J Müller-Quade, M Nagel
IACR Cryptol. ePrint Arch. 2018, 519, 2018
42018
The system can't perform the operation now. Try again later.
Articles 1–20