Search the dblp DataBase
Christian Cachin :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Christian Cachin Modeling Complexity in Secure Distributed Computing. [Citation Graph (0, 0)][DBLP ] Future Directions in Distributed Computing, 2003, pp:57-61 [Conf ] Christian Cachin Efficient Private Bidding and Auctions with an Oblivious Third Party. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1999, pp:120-127 [Conf ] Christian Cachin , Klaus Kursawe , Anna Lysyanskaya , Reto Strobl Asynchronous verifiable secret sharing and proactive cryptosystems. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2002, pp:88-97 [Conf ] Christian Cachin , Jan Camenisch Optimistic Fair Secure Computation. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2000, pp:93-111 [Conf ] Christian Cachin , Klaus Kursawe , Frank Petzold , Victor Shoup Secure and Efficient Asynchronous Broadcast Protocols. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2001, pp:524-541 [Conf ] Christian Cachin , Ueli M. Maurer Unconditional Security Against Memory-Bounded Adversaries. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1997, pp:292-306 [Conf ] Christian Cachin Distributing Trust on the Internet . [Citation Graph (0, 0)][DBLP ] DSN, 2001, pp:183-192 [Conf ] Christian Cachin , Jonathan A. Poritz Secure Intrusion-tolerant Replication on the Internet. [Citation Graph (0, 0)][DBLP ] DSN, 2002, pp:167-176 [Conf ] Christian Cachin , Asad Samar Secure Distributed DNS. [Citation Graph (0, 0)][DBLP ] DSN, 2004, pp:423-432 [Conf ] Christian Cachin , Stefano Tessaro Optimal Resilience for Erasure-Coded Byzantine Distributed Storage. [Citation Graph (0, 0)][DBLP ] DSN, 2006, pp:115-124 [Conf ] Michael Backes , Christian Cachin Reliable Broadcast in a Computational Hybrid Model with Byzantine Faults, Crashes, and Recoveries. [Citation Graph (0, 0)][DBLP ] DSN, 2003, pp:37-46 [Conf ] Michael Backes , Christian Cachin , Alina Oprea Secure Key-Updating for Lazy Revocation. [Citation Graph (0, 0)][DBLP ] ESORICS, 2006, pp:327-346 [Conf ] Christian Cachin Smooth Entropy and Rényi Entropy. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1997, pp:193-208 [Conf ] Christian Cachin On the Foundations of Oblivious Transfer. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1998, pp:361-374 [Conf ] Christian Cachin , Ueli M. Maurer Linking Information Reconciliation and Privacy Amplification (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:266-274 [Conf ] Christian Cachin , Silvio Micali , Markus Stadler Computationally Private Information Retrieval with Polylogarithmic Communication. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1999, pp:402-414 [Conf ] Christian Cachin , Claude Crépeau , Julien Marcil Oblivious Transfer with a Memory-Bounded Receiver. [Citation Graph (0, 0)][DBLP ] FOCS, 1998, pp:493-502 [Conf ] Christian Cachin , Jan Camenisch , Joe Kilian , Joy Müller One-Round Secure Computation and Secure Autonomous Mobile Agents. [Citation Graph (0, 0)][DBLP ] ICALP, 2000, pp:512-523 [Conf ] Christian Cachin An Information-Theoretic Model for Steganography. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1998, pp:306-318 [Conf ] Christian Cachin On-Line Secret Sharing. [Citation Graph (0, 0)][DBLP ] IMA Conf., 1995, pp:190-198 [Conf ] HariGovind V. Ramasamy , Christian Cachin Parsimonious Asynchronous Byzantine-Fault-Tolerant Atomic Broadcast. [Citation Graph (0, 0)][DBLP ] OPODIS, 2005, pp:88-102 [Conf ] Michael Backes , Christian Cachin , Reto Strobl Proactive secure message transmission in asynchronous networks. [Citation Graph (0, 0)][DBLP ] PODC, 2003, pp:223-232 [Conf ] Christian Cachin , Reto Strobl Asynchronous group key exchange with failures. [Citation Graph (0, 0)][DBLP ] PODC, 2004, pp:357-366 [Conf ] Christian Cachin An asynchronous protocol for distributed computation of RSA inverses and its applications. [Citation Graph (0, 0)][DBLP ] PODC, 2003, pp:153-162 [Conf ] Christian Cachin , Klaus Kursawe , Victor Shoup Random oracles in constantipole: practical asynchronous Byzantine agreement using cryptography (extended abstract). [Citation Graph (0, 0)][DBLP ] PODC, 2000, pp:123-132 [Conf ] Joy Algesheimer , Christian Cachin , Jan Camenisch , Günter Karjoth Cryptographic Security for Mobile Code. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2001, pp:2-11 [Conf ] Christian Cachin , Stefano Tessaro Asynchronous Veri.able Information Dispersal. [Citation Graph (0, 0)][DBLP ] SRDS, 2005, pp:191-202 [Conf ] Michael Backes , Christian Cachin Public-Key Steganography with Active Attacks. [Citation Graph (0, 0)][DBLP ] TCC, 2005, pp:210-226 [Conf ] Matthias Rauterberg , Christian Cachin Locating the Primary Attention Focus of the User. [Citation Graph (0, 0)][DBLP ] VCHCI, 1993, pp:129-140 [Conf ] Christian Cachin , Stefano Tessaro Optimal Resilience for Erasure-Coded Byzantine Distributed Storage. [Citation Graph (0, 0)][DBLP ] DISC, 2005, pp:497-498 [Conf ] Christian Cachin , Stefano Tessaro Asynchronous Verifiable Information Dispersal. [Citation Graph (0, 0)][DBLP ] DISC, 2005, pp:503-504 [Conf ] Christian Cachin An information-theoretic model for steganography. [Citation Graph (0, 0)][DBLP ] Inf. Comput., 2004, v:192, n:1, pp:41-56 [Journal ] Christian Cachin , Klaus Kursawe , Victor Shoup Random Oracles in Constantinople: Practical Asynchronous Byzantine Agreement Using Cryptography. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 2005, v:18, n:3, pp:219-246 [Journal ] Christian Cachin , Ueli M. Maurer Linking Information Reconciliation and Privacy Amplification. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1997, v:10, n:2, pp:97-110 [Journal ] Christian Cachin Pedagogical pattern selection strategies. [Citation Graph (0, 0)][DBLP ] Neural Networks, 1994, v:7, n:1, pp:175-181 [Journal ] Roman Pletka , Christian Cachin Cryptographic Security for a High-Performance Distributed File System. [Citation Graph (0, 0)][DBLP ] MSST, 2007, pp:227-232 [Conf ] Christian Cachin , Abhi Shelat , Alexander Shraer Efficient fork-linearizable access to untrusted shared memory. [Citation Graph (0, 0)][DBLP ] PODC, 2007, pp:129-138 [Conf ] Integrity Protection for Revision Control. [Citation Graph (, )][DBLP ] A Secure Cryptographic Token Interface. [Citation Graph (, )][DBLP ] 06371 Abstracts Collection -- From Security to Dependability. [Citation Graph (, )][DBLP ] 06371 Executive Summary -- From Security to Dependability. [Citation Graph (, )][DBLP ] Fail-Aware Untrusted Storage. [Citation Graph (, )][DBLP ] Design and Implementation of a Key-Lifecycle Management System. [Citation Graph (, )][DBLP ] Principles of untrusted storage: a new look at consistency conditions. [Citation Graph (, )][DBLP ] Lazy Revocation in Cryptographic File Systems. [Citation Graph (, )][DBLP ] State Machine Replication with Byzantine Faults. [Citation Graph (, )][DBLP ] Fork Sequential Consistency is Blocking [Citation Graph (, )][DBLP ] Search in 0.000secs, Finished in 0.003secs