Follow
Alexander Koch
Alexander Koch
Verified email at kit.edu
Title
Cited by
Cited by
Year
Card-based cryptographic protocols using a minimal number of cards
A Koch, S Walzer, K Härtel
International Conference on the Theory and Application of Cryptology and …, 2015
822015
Foundations for actively secure card-based cryptography
A Koch, S Walzer
Cryptology ePrint Archive, 2017
452017
The minimum number of cards in practical card-based protocols
J Kastner, A Koch, S Walzer, D Miyahara, Y Hayashi, T Mizuki, H Sone
International Conference on the Theory and Application of Cryptology and …, 2017
432017
ConTra Corona: Contact Tracing against the Coronavirus by Bridging the Centralized-Decentralized Divide for Stronger Privacy.
W Beskorovajnov, F Dörre, G Hartung, A Koch, J Müller-Quade, T Strufe
IACR Cryptol. ePrint Arch. 2020, 505, 2020
372020
Fault-tolerant aggregate signatures
G Hartung, B Kaidel, A Koch, J Koch, A Rupp
Public-Key Cryptography–PKC 2016, 331-356, 2016
312016
Card-Based Cryptography Meets Formal Verification
A Koch, M Schrempp, M Kirsten
International Conference on the Theory and Application of Cryptology and …, 2019
252019
The Landscape of Optimal Card-based Protocols.
A Koch
IACR Cryptol. ePrint Arch. 2018, 951, 2018
252018
Practical and robust secure logging from fault-tolerant sequential aggregate signatures
G Hartung, B Kaidel, A Koch, J Koch, D Hartmann
International Conference on Provable Security, 87-106, 2017
152017
Cryptographic protocols from physical assumptions
A Koch
Karlsruhe Institute of Technology, Germany, 2019
122019
Private Function Evaluation with Cards.
A Koch, S Walzer
IACR Cryptol. ePrint Arch. 2018, 1113, 2018
102018
Your Money or Your Life—Modeling and Analyzing the Security of Electronic Payment in the UC Framework
D Achenbach, R Gröll, T Hackenjos, A Koch, B Löwe, J Mechler, ...
International Conference on Financial Cryptography and Data Security, 243-261, 2019
52019
Private Stream Aggregation with Labels in the Standard Model
J Ernst, A Koch
Proceedings on Privacy Enhancing Technologies 4, 117-138, 2021
42021
Fortified Universal Composability: Taking Advantage of Simple Secure Hardware Modules.
B Broadnax, A Koch, J Mechler, T Müller, J Müller-Quade, M Nagel
IACR Cryptol. ePrint Arch. 2018, 519, 2018
32018
Graphs with plane outside-obstacle representations
A Koch, M Krug, I Rutter
arXiv preprint arXiv:1306.2978, 2013
32013
The Landscape of Security from Physical Assumptions1
A Koch
2021 IEEE Information Theory Workshop (ITW), 1-6, 2021
22021
Contact Tracing against the Coronavirus by Bridging the Centralized–Decentralized Divide for Stronger Privacy
W Beskorovajnov, F Dörre, G Hartung, A Koch, J Müller-Quade, T Strufe
crypto day matters 32, 2021
12021
Fortified Multi-Party Computation: Taking Advantage of Simple Secure Hardware Modules
B Broadnax, A Koch, J Mechler, T Müller, J Müller-Quade, M Nagel
Proceedings on Privacy Enhancing Technologies 4, 312-338, 2021
12021
Efficient Private Stream Aggregation with Labels in the Standard Model
J Ernst, A Koch
crypto day matters 32, 2021
12021
Black-Box Accumulation Based on Lattices
SH Faller, P Baumer, M Klooß, A Koch, A Ottenhues, M Raiber
Cryptology ePrint Archive, 2021
2021
Towards Everlasting Quantum Bit Commitments
N Döttling, A Koch, S Maier, J Mechler, J Müller-Quade, M Tiepelt
crypto day matters 32, 2021
2021
The system can't perform the operation now. Try again later.
Articles 1–20