Multi-party virtual state channels S Dziembowski, L Eckey, S Faust, J Hesse, K Hostáková Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference …, 2019 | 106 | 2019 |
Fuzzy password-authenticated key exchange PA Dupont, J Hesse, D Pointcheval, L Reyzin, S Yakoubov Annual International Conference on the Theory and Applications of …, 2018 | 54 | 2018 |
PESTO: proactively secure distributed single sign-on, or how to trust a hacked server C Baum, T Frederiksen, J Hesse, A Lehmann, A Yanai 2020 IEEE European Symposium on Security and Privacy (EuroS&P), 587-606, 2020 | 46 | 2020 |
SoK: oblivious pseudorandom functions S Casacuberta, J Hesse, A Lehmann 2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P), 625-646, 2022 | 38 | 2022 |
Polynomial spaces: A new framework for composite-to-prime-order transformations G Herold, J Hesse, D Hofheinz, C Ràfols, A Rupp Advances in Cryptology–CRYPTO 2014: 34th Annual Cryptology Conference, Santa …, 2014 | 38 | 2014 |
Universal composition with global subroutines: Capturing global setup within plain UC C Badertscher, R Canetti, J Hesse, B Tackmann, V Zikas Theory of Cryptography Conference, 1-30, 2020 | 36 | 2020 |
Security analysis of CPace M Abdalla, B Haase, J Hesse International Conference on the Theory and Application of Cryptology and …, 2021 | 31 | 2021 |
On tightly secure non-interactive key exchange J Hesse, D Hofheinz, L Kohl Annual International Cryptology Conference, 65-94, 2018 | 30 | 2018 |
Universally composable non-interactive key exchange ESV Freire, J Hesse, D Hofheinz Security and Cryptography for Networks: 9th International Conference, SCN …, 2014 | 22 | 2014 |
Fastzip: Faster and more secure zero-interaction pairing M Fomichev, J Hesse, L Almon, T Lippert, J Han, M Hollick Proceedings of the 19th Annual International Conference on Mobile Systems …, 2021 | 20 | 2021 |
Graded encoding schemes from obfuscation P Farshim, J Hesse, D Hofheinz, E Larraia Public-Key Cryptography–PKC 2018: 21st IACR International Conference on …, 2018 | 20 | 2018 |
Fuzzy asymmetric password-authenticated key exchange A Erwig, J Hesse, M Orlt, S Riahi Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the …, 2020 | 18 | 2020 |
CPace, a balanced composable PAKE M Abdalla, B Haase, J Hesse IETF draft-irtf-cfrg-cpace-05, 2022 | 16 | 2022 |
DPaSE: distributed password-authenticated symmetric-key encryption, or how to get many keys from one password P Das, J Hesse, A Lehmann Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022 | 16 | 2022 |
Security analysis of the whatsapp end-to-end encrypted backup protocol GT Davies, S Faller, K Gellert, T Handirk, J Hesse, M Horváth, T Jager Annual International Cryptology Conference, 330-361, 2023 | 14 | 2023 |
Separating symmetric and asymmetric password-authenticated key exchange J Hesse International Conference on Security and Cryptography for Networks, 579-599, 2020 | 13 | 2020 |
Reconfigurable Cryptography: A flexible approach to long-term security J Hesse, D Hofheinz, A Rupp Theory of Cryptography Conference, 416-445, 2015 | 8 | 2015 |
Generalized fuzzy password-authenticated key exchange from error correcting codes J Bootle, S Faller, J Hesse, K Hostáková, J Ottenhues International Conference on the Theory and Application of Cryptology and …, 2023 | 7 | 2023 |
Password-authenticated tls via opaque and post-handshake authentication J Hesse, S Jarecki, H Krawczyk, C Wood Annual International Conference on the Theory and Applications of …, 2023 | 6 | 2023 |
How to bind anonymous credentials to humans J Hesse, N Singh, A Sorniotti 32nd USENIX Security Symposium (USENIX Security 23), 3047-3064, 2023 | 6 | 2023 |