Card-based cryptographic protocols using a minimal number of cards A Koch, S Walzer, K Härtel International Conference on the Theory and Application of Cryptology and …, 2015 | 115 | 2015 |
Foundations for actively secure card-based cryptography A Koch, S Walzer Cryptology ePrint Archive, 2017 | 69 | 2017 |
The minimum number of cards in practical card-based protocols J Kastner, A Koch, S Walzer, D Miyahara, Y Hayashi, T Mizuki, H Sone International Conference on the Theory and Application of Cryptology and …, 2017 | 65 | 2017 |
ConTra Corona: Contact Tracing against the Coronavirus by Bridging the Centralized-Decentralized Divide for Stronger Privacy. W Beskorovajnov, F Dörre, G Hartung, A Koch, J Müller-Quade, T Strufe IACR Cryptol. ePrint Arch. 2020, 505, 2020 | 60 | 2020 |
Fault-tolerant aggregate signatures G Hartung, B Kaidel, A Koch, J Koch, A Rupp Public-Key Cryptography–PKC 2016, 331-356, 2016 | 56 | 2016 |
Card-Based Cryptography Meets Formal Verification A Koch, M Schrempp, M Kirsten International Conference on the Theory and Application of Cryptology and …, 2019 | 40 | 2019 |
The Landscape of Optimal Card-based Protocols. A Koch IACR Cryptol. ePrint Arch. 2018, 951, 2018 | 39 | 2018 |
Cryptographic protocols from physical assumptions A Koch Karlsruhe Institute of Technology, Germany, 2019 | 28 | 2019 |
Practical and robust secure logging from fault-tolerant sequential aggregate signatures G Hartung, B Kaidel, A Koch, J Koch, D Hartmann International Conference on Provable Security, 87-106, 2017 | 21 | 2017 |
Private Function Evaluation with Cards A Koch, S Walzer New Generation Computing 40 (1), 115-147, 2022 | 16 | 2022 |
Private Stream Aggregation with Labels in the Standard Model J Ernst, A Koch Proceedings on Privacy Enhancing Technologies 4, 117-138, 2021 | 12 | 2021 |
The Landscape of Security from Physical Assumptions1 A Koch 2021 IEEE Information Theory Workshop (ITW), 1-6, 2021 | 11 | 2021 |
Check alternating patterns: a physical zero-knowledge proof for Moon-or-Sun S Hand, A Koch, P Lafourcade, D Miyahara, L Robert International Workshop on Security, 255-272, 2023 | 8 | 2023 |
Fortified Multi-Party Computation: Taking Advantage of Simple Secure Hardware Modules B Broadnax, A Koch, J Mechler, T Müller, J Müller-Quade, M Nagel Proceedings on Privacy Enhancing Technologies 4, 312-338, 2021 | 7 | 2021 |
Your Money or Your Life—Modeling and Analyzing the Security of Electronic Payment in the UC Framework D Achenbach, R Gröll, T Hackenjos, A Koch, B Löwe, J Mechler, ... International Conference on Financial Cryptography and Data Security, 243-261, 2019 | 7 | 2019 |
Fortified Universal Composability: Taking Advantage of Simple Secure Hardware Modules. B Broadnax, A Koch, J Mechler, T Müller, J Müller-Quade, M Nagel IACR Cryptol. ePrint Arch. 2018, 519, 2018 | 3 | 2018 |
Graphs with plane outside-obstacle representations A Koch, M Krug, I Rutter arXiv preprint arXiv:1306.2978, 2013 | 3 | 2013 |
Quietot: Lightweight oblivious transfer with a public-key setup G Couteau, L Devadas, S Devadas, A Koch, S Servan-Schreiber ASIACRYPT 2024, 2024 | 1 | 2024 |
Black-Box Accumulation Based on Lattices SH Faller, P Baumer, M Klooß, A Koch, A Ottenhues, M Raiber Cryptology ePrint Archive, 2021 | 1 | 2021 |
Contact Tracing against the Coronavirus by Bridging the Centralized–Decentralized Divide for Stronger Privacy W Beskorovajnov, F Dörre, G Hartung, A Koch, J Müller-Quade, T Strufe crypto day matters 32, 2021 | 1 | 2021 |