Filter
Conference contribution

Search results

  • 2024

    Batch Signatures, Revisited.

    Melchor, C. A., Albrecht, M. R., Bailleux, T., Bindel, N., Howe, J., Hülsing, A., Joseph, D. & Manzano, M., 2024, Topics in Cryptology – CT-RSA 2024 - Cryptographers’ Track at the RSA Conference 2024, Proceedings. Oswald, E. (ed.). p. 163-186 24 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14643 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • 2023

    Failing Gracefully: Decryption Failures and the Fujisaki-Okamoto Transform

    Hövelmanns, K., Hülsing, A. & Majenz, C., 2023, Advances in Cryptology -- ASIACRYPT 2022. Agrawal, S. & Lin, D. (eds.). Cham: Springer Nature, p. 414-443 30 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • Fixing and Mechanizing the Security Proof of Fiat-Shamir with Aborts and Dilithium

    Barbosa, M., Barthe, G., Doczkal, C., Don, J., Fehr, S., Grégoire, B., Huang, Y-H., Hülsing, A., Lee, Y. & Wu, X., 2023, Advances in Cryptology – CRYPTO 2023 : 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023, Proceedings. Handschuh, H. & Lysyanskaya, A. (eds.). Cham: Springer, Vol. 5. p. 358-389 32 p. (Lecture Notes in Computer Science; vol. 14085).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    1 Citation (Scopus)
  • Machine-Checked Security for XMSS as in RFC 8391 and SPHINCS+

    Barbosa, M., Dupressoir, F., Grégoire, B., Hülsing, A., Meijers, M. & Strub, P-Y., 2023, Advances in Cryptology – CRYPTO 2023: 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023, Proceedings, Part V. Handschuh, H. & Lysyanskaya, A. (eds.). Cham: Springer, p. 421-454 34 p. (Lecture Notes in Computer Science; vol. 14085).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • Recovering the Tight Security Proof of SPHINCS+

    Hülsing, A. & Kudinov, M., Jan 2023, Advances in Cryptology – ASIACRYPT 2022: 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5–9, 2022, Proceedings, Part IV. Agrawal, S. & Lin, D. (eds.). Cham: Springer Nature, p. 3-33 31 p. (Lecture Notes in Computer Science (LNCS); vol. 13794).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    4 Citations (Scopus)
  • SDitH in the QROM

    Melchor, C. A., Hülsing, A., Joseph, D., Majenz, C., Ronen, E. & Yue, D., 2023, Advances in Cryptology – ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Guo, J. & Steinfeld, R. (eds.). Cham, p. 317-350 34 p. (Lecture Notes in Computer Science (LNCS; vol. 14444).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
  • SPHINCS+C: Compressing SPHINCS+ With (Almost) No Cost.

    Hülsing, A., Kudinov, M., Ronen, E. & Yogev, E., 2023, Proceedings - 44th IEEE Symposium on Security and Privacy, SP 2023. Institute of Electrical and Electronics Engineers, p. 1435-1453 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    1 Citation (Scopus)
  • The Return of the SDitH

    Melchor, C. A., Gama, N., Howe, J., Hülsing, A., Joseph, D. & Yue, D., 2023, Advances in Cryptology – EUROCRYPT 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Hazay, C. & Stam, M. (eds.). p. 564-596 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14008 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    7 Citations (Scopus)
  • 2022

    Formal Verification of Saber's Public-Key Encryption Scheme in EasyCrypt.

    Hülsing, A., Meijers, M. & Strub, P-Y., 2022, Advances in Cryptology – CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Proceedings. Dodis, Y. & Shrimpton, T. (eds.). p. 622-653 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13507 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    2 Citations (Scopus)
  • Post Quantum Noise.

    Angel, Y., Dowling, B., Hülsing, A., Schwabe, P. & Weber, F., 7 Nov 2022, CCS 2022 - Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. p. 97-109 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    3 Citations (Scopus)
  • 2021

    Epochal Signatures for Deniable Group Chats

    Hülsing, A. & Weber, F., 1 May 2021, Proceedings - 2021 IEEE Symposium on Security and Privacy, SP 2021. Los Alamitos, CA, USA: IEEE Computer Society, p. 1677-1695 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    1 Citation (Scopus)
  • Post-Quantum WireGuard

    Hülsing, A., Ning, K., Schwabe, P., Weber, F. & Zimmermann, P. R., 1 May 2021, Proceedings - 2021 IEEE Symposium on Security and Privacy, SP 2021. Los Alamitos, CA, USA: IEEE Computer Society, p. 304-321 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    23 Citations (Scopus)
  • Tight Adaptive Reprogramming in the QROM

    Grilo, A. B., Hövelmanns, K., Hülsing, A. & Majenz, C., 2021, Advances in Cryptology – ASIACRYPT 2021: 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6–10, 2021, Proceedings. Tibouchi, M. & Wang, H. (eds.). Cham: Springer, Vol. 1. p. 637-667 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13090 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    7 Citations (Scopus)
  • Verifying Post-Quantum Signatures in 8 kB of RAM.

    Gonzalez, R., Hülsing, A., Kannwischer, M. J., Krämer, J., Lange, T., Stöttinger, M., Waitz, E., Wiggers, T. & Yang, B-Y., 2021, Post-Quantum Cryptography - 12th International Workshop, PQCrypto 2021, Proceedings. Cheon, J. H. & Tillich, J-P. (eds.). p. 215-233 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12841 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    6 Citations (Scopus)
  • 2019

    Decisional second-preimage resistance: when does SPR imply PRE?

    Bernstein, D. J. & Hülsing, A., 22 Nov 2019, Advances in Cryptology – ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Galbraith, S. D. & Moriai, S. (eds.). Berlin: Springer, p. 33-62 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11923 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    5 Citations (Scopus)
  • Quantum Indistinguishability of random sponges

    Czajkowski, J., Hülsing, A. & Schaffner, C., 1 Jan 2019, Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Proceedings. Boldyreva, A. & Micciancio, D. (eds.). Cham: Springer, p. 296-325 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11693 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    7 Citations (Scopus)
  • The SPHINCS+ signature framework

    Bernstein, D. J., Hülsing, A., Kölbl, S., Niederhagen, R., Rijneveld, J. & Schwabe, P., 6 Nov 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. New York: Association for Computing Machinery, Inc, p. 2129-2146 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    112 Citations (Scopus)
    572 Downloads (Pure)
  • Tighter Proofs of CCA Security in the Quantum Random Oracle Model

    Bindel, N., Hamburg, M., Hövelmanns, K., Hülsing, A. & Persichetti, E., 22 Nov 2019, Theory of Cryptography - 17th International Conference, TCC 2019, Proceedings. Hofheinz, D. & Rosen, A. (eds.). Berlin: Springer, Vol. 2. p. 61-90 30 p. (Lecture notes in computer science; vol. 11892)(Security and cryptology; vol. 11892).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    106 Citations (Scopus)
  • 2018

    Post-quantum security of the sponge construction

    Czajkowski, J., Groot Bruinderink, L., Hülsing, A., Schaffner, C. & Unruh, D., 1 Jan 2018, Post-Quantum Cryptography - 9th International Conference, PQCrypto 2018, Proceedings. Springer, p. 185-204 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10786 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    17 Citations (Scopus)
  • Rounded Gaussians: fast and secure constant-time sampling for lattice-based crypto

    Hülsing, A., Lange, T. & Smeets, K., 2018, Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Abdalla, M. & Dahab, R. (eds.). Berlin: Springer, p. 728-757 30 p. (Lecture Notes in Computer Science; vol. 10769).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    13 Citations (Scopus)
  • SOFIA: MQ-based signatures in the QROM

    Chen, M. S., Hülsing, A., Rijneveld, J., Samardjiska, S. & Schwabe, P., 2018, Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Abdalla, M. & Dahab, R. (eds.). Springer, p. 3-33 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10769 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    11 Citations (Scopus)
  • “Oops, I did it again” – Security of one-time signatures under two-message attacks

    Groot Bruinderink, L. & Hülsing, A. T., 2018, Selected Areas in Cryptography – SAC 2017: 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers. Adams, C. & Camenisch, J. (eds.). Cham: Springer, p. 299-322 24 p. (Lecture Notes in Computer Science; vol. 10719)(Security and Cryptology).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    9 Citations (Scopus)
  • 2017

    High-speed key encapsulation from NTRU

    Hülsing, A., Rijneveld, J., Schanck, J. & Schwabe, P., 2017, Cryptographic Hardware and Embedded Systems – CHES 2017 - 19th International Conference, Proceedings. Springer, p. 232-252 21 p. (Lecture Notes in Computer Science; vol. 10529).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    51 Citations (Scopus)
  • 2016

    ARMed SPHINCS computing a 41KB signature in 16KB of RAM

    Hülsing, A. T., Rijneveld, J. & Schwabe, P., 2016, Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, part I. Cheng, C-M., Chung, K-M., Persiano, G. & Yang, B-Y. (eds.). Berlin: Springer, p. 446-470 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9614).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    32 Citations (Scopus)
  • Flush, Gauss, and Reload – a cache attack on the BLISS lattice-based signature scheme

    Bruinderink, L. G., Hülsing, A. T., Lange, T. & Yarom, Y., 2016, Cryptographic Hardware and Embedded Systems - 18th International Conference, CHES 2016, Proceedings. Gierlichs, B. & Poschmann, A. Y. (eds.). Springer, Vol. 9813. p. 323-345 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9813).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    130 Citations (Scopus)
  • From 5-pass MQ-based identification to MQ-based signatures

    Chen, M. S., Hülsing, A., Rijneveld, J., Samardjiska, S. & Schwabe, P., 2016, Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Springer, p. 135-165 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10032 ).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    52 Citations (Scopus)
  • Mitigating multi-target attacks in hash-based signatures

    Hülsing, A. T., Rijneveld, J. & Song, F., 2016, Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings, part I. Cheng, C-M., Chung, K-M., Persiano, G. & Yang, B-Y. (eds.). Springer, Vol. 9614. p. 387-416 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9614).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    72 Citations (Scopus)
  • Semantic security and indistinguishability in the quantum world

    Gagliardoni, T., Hülsing, A. T. & Schaffner, C., 2016, Advances in Cryptology – CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part III. Robshaw, M. & Katz, J. (eds.). Dordrecht: Springer, p. 60-89 30 p. (Lecture Notes in Computer Science; vol. 9816).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    35 Citations (Scopus)
    1 Downloads (Pure)
  • 2015

    Bad directions in cryptographic hash functions

    Bernstein, D. J., Hülsing, A., Lange, T. & Niederhagen, R., 2015, Information Security and Privacy : 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings. Foo, E. & Stebila, D. (eds.). Berlin: Springer, p. 488-508 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9144).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    2 Citations (Scopus)
  • How to manipulate curve standards: a white paper for the black hat

    Bernstein, D. J., Chou, T., Chuengsatiansup, C., Hülsing, A., Lambooij, E., Lange, T., Niederhagen, R. & Van Vredendaal, C., 2015, Security Standardisation Research: Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedings. Chen, L. & Matsuo, S. (eds.). Berlin: Springer, p. 109-139 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9497).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    12 Citations (Scopus)
    3 Downloads (Pure)
  • PALPAS - PAssword Less PAssword synchronization

    Horsch, M., Hülsing, A. T. & Buchmann, J., 16 Oct 2015, Proceedings - 10th International Conference on Availability, Reliability and Security, ARES 2015. Piscataway: Institute of Electrical and Electronics Engineers, p. 30-39 10 p. 7299896

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    7 Citations (Scopus)
  • SPHINCS : practical stateless hash-based signatures

    Bernstein, D. J., Hopwood, D., Hülsing, A. T., Lange, T., Niederhagen, R. F., Papachristodoulou, L., Schwabe, P. & Wilcox O'Hearn, Z., 2015, Advances in Cryptology - Eurocrypt 2015 (34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015. Proceedings, Part I). Oswald, E. & Fischlin, M. (eds.). Berlin: Springer, p. 368-397 (Lecture Notes in Computer Science; vol. 9056).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    204 Citations (Scopus)
  • 2014

    Discrete Ziggurat: A time-memory trade-off for sampling from a Gaussian distribution over the integers

    Buchmann, J., Cabarcas, D., Göpfert, F., Hülsing, A. T. & Weiden, P., 2014, Selected Areas in Cryptography - SAC 2013 (20th International Conference, Burnaby BC, Canada, August 14-16, 2013. Revised Selected Papers). Lange, T., Lauter, K. & Lisonek, P. (eds.). Berlin: Springer, p. 402-417 (Lecture Notes in Computer Science; vol. 8282).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    42 Citations (Scopus)
    1 Downloads (Pure)
  • Revocation and non-repudiation : when the first destroys the latter

    Braun, J., Kiefer, F. & Hülsing, A. T., 2014, Public Key Infrastructures, Services and Applications (10th European Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers). Katsikas, S. & Agudo, I. (eds.). Berlin: Springer, p. 31-46 (Lecture Notes in Computer Science; vol. 8341).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    2 Citations (Scopus)
    1 Downloads (Pure)
  • 2013

    Developing and testing a visual hash scheme

    Olembo, M. M., Kilian, T., Stockhardt, S., Hülsing, A. & Volkamer, M., 2013, Proceedings of the European Information Security Multi-Conference, EISMC 2013, 8-10 may 2013, Portugal, Lisbon. Plymouth University, Centre for Security, Communications & Network Research, p. 91-100 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    2 Citations (Scopus)
  • Forward secure signatures on smart cards preliminary version

    Hülsing, A., Busold, C. & Buchmann, J., 2013, Selected Areas in Cryptography: 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers. Knudsen, L. R. & Wu, H. (eds.). Berlin: Springer, p. 66-80 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7707 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    22 Citations (Scopus)
  • How to avoid the breakdown of public key infrastructures: forward secure signatures for certificate authorities

    Braun, J., Hülsing, A., Wiesmaier, A., Vigil, M. A. G. & Buchmann, J., 2013, Public Key Infrastructures, Services and Applications: 9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers. De Capitani di Vimercati, S. & Mitchell, C. (eds.). Berlin: Springer, p. 53-68 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7868 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    2 Citations (Scopus)
  • Optimal parameters for XMSSMT

    Hülsing, A. T., Rausch, L. & Buchmann, J., 2013, Security engineering and intelligence informatics : CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings. Berlin: Springer, p. 194-208 15 p. (Lecture Notes in Computer Science; vol. 8128).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    51 Citations (Scopus)
  • W-OTS+ - shorter signatures for hash-based signature schemes

    Hülsing, A. T., 2013, Progress in Cryptology–AFRICACRYPT 2013: 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings. Youssef, A., Nitaj, A. & Hassanien, A. E. (eds.). Berlin: Springer, p. 173-188 16 p. (Lecture Notes in Computer Science (LNCS); vol. 7918).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    106 Citations (Scopus)
  • 2011

    On the security of the Winternitz one-time signature scheme

    Buchmann, J., Dahmen, E., Ereth, S., Hülsing, A. & Rückert, M., 2011, Progress in Cryptology – AFRICACRYPT 2011 : 4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011 Proceedings. Nitaj, A. & Pointcheval, D. (eds.). Berlin: Springer, p. 363-378 16 p. (Lecture Notes in Computer Science; vol. 6737).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    67 Citations (Scopus)
  • XMSS : a practical forward secure signature scheme based on minimal security assumptions

    Buchmann, J., Dahmen, E. & Hülsing, A., 2011, Post-Quantum Cryptography: 4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29 – December 2, 2011. Proceedings. Yang, B-Y. (ed.). Berlin: Springer, p. 117-129 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7071 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    181 Citations (Scopus)
    1 Downloads (Pure)
  • 2007

    Security of invertible media authentication schemes revisited

    Dönigus, D., Endler, S., Fischlin, M., Hülsing, A. T., Jäger, P., Lehmann, A., Podrazhansky, S., Schipp, S., Tews, E., Vowe, S., Walthart, M. & Weidemann, F., 2007, Information Hiding : 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers. Furon, T., Cayre, F., Doërr, G. & Bas, P. (eds.). Berlin: Springer, p. 189-203 15 p. (Lecture Notes in Computer Science (LNCS); vol. 4567).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review