2009 |
47 | EE | Lars Arge,
Christian Cachin,
Andrzej Tarlecki:
Preface.
Theor. Comput. Sci. 410(18): 1617 (2009) |
2008 |
46 | EE | Christian Cachin,
Idit Keidar,
Alexander Shraer:
Principles of untrusted storage: a new look at consistency conditions.
PODC 2008: 426 |
45 | EE | Christian Cachin,
Idit Keidar,
Alexander Shraer:
Fork Sequential Consistency is Blocking
CoRR abs/0805.2068: (2008) |
2007 |
44 | | Christian Cachin,
Felix C. Freiling,
Jaap-Henk Hoepman:
From Security to Dependability, 10.09. - 15.09.2006
Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2007 |
43 | | Lars Arge,
Christian Cachin,
Tomasz Jurdzinski,
Andrzej Tarlecki:
Automata, Languages and Programming, 34th International Colloquium, ICALP 2007, Wroclaw, Poland, July 9-13, 2007, Proceedings
Springer 2007 |
42 | EE | Roman Pletka,
Christian Cachin:
Cryptographic Security for a High-Performance Distributed File System.
MSST 2007: 227-232 |
41 | EE | Christian Cachin,
Abhi Shelat,
Alexander Shraer:
Efficient fork-linearizable access to untrusted shared memory.
PODC 2007: 129-138 |
2006 |
40 | EE | Christian Cachin,
Stefano Tessaro:
Optimal Resilience for Erasure-Coded Byzantine Distributed Storage.
DSN 2006: 115-124 |
39 | EE | Michael Backes,
Christian Cachin,
Alina Oprea:
Secure Key-Updating for Lazy Revocation.
ESORICS 2006: 327-346 |
38 | EE | Christian Cachin,
Felix C. Freiling,
Jaap-Henk Hoepman:
06371 Abstracts Collection -- From Security to Dependability.
From Security to Dependability 2006 |
37 | EE | Christian Cachin,
Felix C. Freiling,
Jaap-Henk Hoepman:
06371 Executive Summary -- From Security to Dependability.
From Security to Dependability 2006 |
2005 |
36 | EE | Christian Cachin,
Stefano Tessaro:
Optimal Resilience for Erasure-Coded Byzantine Distributed Storage.
DISC 2005: 497-498 |
35 | EE | Christian Cachin,
Stefano Tessaro:
Asynchronous Verifiable Information Dispersal.
DISC 2005: 503-504 |
34 | EE | Michael Backes,
Christian Cachin,
Alina Oprea:
Lazy Revocation in Cryptographic File Systems.
IEEE Security in Storage Workshop 2005: 1-11 |
33 | EE | HariGovind V. Ramasamy,
Christian Cachin:
Parsimonious Asynchronous Byzantine-Fault-Tolerant Atomic Broadcast.
OPODIS 2005: 88-102 |
32 | EE | Christian Cachin,
Stefano Tessaro:
Asynchronous Veri.able Information Dispersal.
SRDS 2005: 191-202 |
31 | EE | Michael Backes,
Christian Cachin:
Public-Key Steganography with Active Attacks.
TCC 2005: 210-226 |
30 | EE | Christian Cachin:
Digital Steganography.
Encyclopedia of Cryptography and Security 2005 |
29 | EE | Christian Cachin,
Klaus Kursawe,
Victor Shoup:
Random Oracles in Constantinople: Practical Asynchronous Byzantine Agreement Using Cryptography.
J. Cryptology 18(3): 219-246 (2005) |
2004 |
28 | | Christian Cachin,
Jan Camenisch:
Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings
Springer 2004 |
27 | EE | Christian Cachin,
Asad Samar:
Secure Distributed DNS.
DSN 2004: 423-432 |
26 | EE | Christian Cachin,
Reto Strobl:
Asynchronous group key exchange with failures.
PODC 2004: 357-366 |
25 | EE | Christian Cachin:
An information-theoretic model for steganography.
Inf. Comput. 192(1): 41-56 (2004) |
2003 |
24 | EE | Michael Backes,
Christian Cachin:
Reliable Broadcast in a Computational Hybrid Model with Byzantine Faults, Crashes, and Recoveries.
DSN 2003: 37-46 |
23 | EE | Christian Cachin:
Modeling Complexity in Secure Distributed Computing.
Future Directions in Distributed Computing 2003: 57-61 |
22 | EE | Christian Cachin:
An asynchronous protocol for distributed computation of RSA inverses and its applications.
PODC 2003: 153-162 |
21 | EE | Michael Backes,
Christian Cachin,
Reto Strobl:
Proactive secure message transmission in asynchronous networks.
PODC 2003: 223-232 |
2002 |
20 | EE | Christian Cachin,
Klaus Kursawe,
Anna Lysyanskaya,
Reto Strobl:
Asynchronous verifiable secret sharing and proactive cryptosystems.
ACM Conference on Computer and Communications Security 2002: 88-97 |
19 | EE | Christian Cachin,
Jonathan A. Poritz:
Secure Intrusion-tolerant Replication on the Internet.
DSN 2002: 167-176 |
2001 |
18 | EE | Christian Cachin,
Klaus Kursawe,
Frank Petzold,
Victor Shoup:
Secure and Efficient Asynchronous Broadcast Protocols.
CRYPTO 2001: 524-541 |
17 | EE | Christian Cachin:
Distributing Trust on the Internet .
DSN 2001: 183-192 |
16 | EE | Joy Algesheimer,
Christian Cachin,
Jan Camenisch,
Günter Karjoth:
Cryptographic Security for Mobile Code.
IEEE Symposium on Security and Privacy 2001: 2-11 |
2000 |
15 | EE | Christian Cachin,
Jan Camenisch:
Optimistic Fair Secure Computation.
CRYPTO 2000: 93-111 |
14 | EE | Christian Cachin,
Jan Camenisch,
Joe Kilian,
Joy Müller:
One-Round Secure Computation and Secure Autonomous Mobile Agents.
ICALP 2000: 512-523 |
13 | EE | Christian Cachin,
Klaus Kursawe,
Victor Shoup:
Random oracles in constantipole: practical asynchronous Byzantine agreement using cryptography (extended abstract).
PODC 2000: 123-132 |
1999 |
12 | EE | Christian Cachin:
Efficient Private Bidding and Auctions with an Oblivious Third Party.
ACM Conference on Computer and Communications Security 1999: 120-127 |
11 | EE | Christian Cachin,
Silvio Micali,
Markus Stadler:
Computationally Private Information Retrieval with Polylogarithmic Communication.
EUROCRYPT 1999: 402-414 |
1998 |
10 | EE | Christian Cachin:
On the Foundations of Oblivious Transfer.
EUROCRYPT 1998: 361-374 |
9 | EE | Christian Cachin,
Claude Crépeau,
Julien Marcil:
Oblivious Transfer with a Memory-Bounded Receiver.
FOCS 1998: 493-502 |
8 | EE | Christian Cachin:
An Information-Theoretic Model for Steganography.
Information Hiding 1998: 306-318 |
1997 |
7 | EE | Christian Cachin,
Ueli M. Maurer:
Unconditional Security Against Memory-Bounded Adversaries.
CRYPTO 1997: 292-306 |
6 | EE | Christian Cachin:
Smooth Entropy and Rényi Entropy.
EUROCRYPT 1997: 193-208 |
5 | | Christian Cachin,
Ueli M. Maurer:
Linking Information Reconciliation and Privacy Amplification.
J. Cryptology 10(2): 97-110 (1997) |
1995 |
4 | | Christian Cachin:
On-Line Secret Sharing.
IMA Conf. 1995: 190-198 |
1994 |
3 | EE | Christian Cachin,
Ueli M. Maurer:
Linking Information Reconciliation and Privacy Amplification (Extended Abstract).
EUROCRYPT 1994: 266-274 |
2 | EE | Christian Cachin:
Pedagogical pattern selection strategies.
Neural Networks 7(1): 175-181 (1994) |
1993 |
1 | | Matthias Rauterberg,
Christian Cachin:
Locating the Primary Attention Focus of the User.
VCHCI 1993: 129-140 |