The SCEAS System
Navigation Menu

Search the dblp DataBase


Christian Cachin: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Christian Cachin
    Modeling Complexity in Secure Distributed Computing. [Citation Graph (0, 0)][DBLP]
    Future Directions in Distributed Computing, 2003, pp:57-61 [Conf]
  2. Christian Cachin
    Efficient Private Bidding and Auctions with an Oblivious Third Party. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1999, pp:120-127 [Conf]
  3. Christian Cachin, Klaus Kursawe, Anna Lysyanskaya, Reto Strobl
    Asynchronous verifiable secret sharing and proactive cryptosystems. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2002, pp:88-97 [Conf]
  4. Christian Cachin, Jan Camenisch
    Optimistic Fair Secure Computation. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2000, pp:93-111 [Conf]
  5. Christian Cachin, Klaus Kursawe, Frank Petzold, Victor Shoup
    Secure and Efficient Asynchronous Broadcast Protocols. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2001, pp:524-541 [Conf]
  6. Christian Cachin, Ueli M. Maurer
    Unconditional Security Against Memory-Bounded Adversaries. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:292-306 [Conf]
  7. Christian Cachin
    Distributing Trust on the Internet . [Citation Graph (0, 0)][DBLP]
    DSN, 2001, pp:183-192 [Conf]
  8. Christian Cachin, Jonathan A. Poritz
    Secure Intrusion-tolerant Replication on the Internet. [Citation Graph (0, 0)][DBLP]
    DSN, 2002, pp:167-176 [Conf]
  9. Christian Cachin, Asad Samar
    Secure Distributed DNS. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:423-432 [Conf]
  10. Christian Cachin, Stefano Tessaro
    Optimal Resilience for Erasure-Coded Byzantine Distributed Storage. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:115-124 [Conf]
  11. Michael Backes, Christian Cachin
    Reliable Broadcast in a Computational Hybrid Model with Byzantine Faults, Crashes, and Recoveries. [Citation Graph (0, 0)][DBLP]
    DSN, 2003, pp:37-46 [Conf]
  12. Michael Backes, Christian Cachin, Alina Oprea
    Secure Key-Updating for Lazy Revocation. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:327-346 [Conf]
  13. Christian Cachin
    Smooth Entropy and Rényi Entropy. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1997, pp:193-208 [Conf]
  14. Christian Cachin
    On the Foundations of Oblivious Transfer. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:361-374 [Conf]
  15. Christian Cachin, Ueli M. Maurer
    Linking Information Reconciliation and Privacy Amplification (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:266-274 [Conf]
  16. Christian Cachin, Silvio Micali, Markus Stadler
    Computationally Private Information Retrieval with Polylogarithmic Communication. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1999, pp:402-414 [Conf]
  17. Christian Cachin, Claude Crépeau, Julien Marcil
    Oblivious Transfer with a Memory-Bounded Receiver. [Citation Graph (0, 0)][DBLP]
    FOCS, 1998, pp:493-502 [Conf]
  18. Christian Cachin, Jan Camenisch, Joe Kilian, Joy Müller
    One-Round Secure Computation and Secure Autonomous Mobile Agents. [Citation Graph (0, 0)][DBLP]
    ICALP, 2000, pp:512-523 [Conf]
  19. Christian Cachin
    An Information-Theoretic Model for Steganography. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1998, pp:306-318 [Conf]
  20. Christian Cachin
    On-Line Secret Sharing. [Citation Graph (0, 0)][DBLP]
    IMA Conf., 1995, pp:190-198 [Conf]
  21. HariGovind V. Ramasamy, Christian Cachin
    Parsimonious Asynchronous Byzantine-Fault-Tolerant Atomic Broadcast. [Citation Graph (0, 0)][DBLP]
    OPODIS, 2005, pp:88-102 [Conf]
  22. Michael Backes, Christian Cachin, Reto Strobl
    Proactive secure message transmission in asynchronous networks. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:223-232 [Conf]
  23. Christian Cachin, Reto Strobl
    Asynchronous group key exchange with failures. [Citation Graph (0, 0)][DBLP]
    PODC, 2004, pp:357-366 [Conf]
  24. Christian Cachin
    An asynchronous protocol for distributed computation of RSA inverses and its applications. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:153-162 [Conf]
  25. Christian Cachin, Klaus Kursawe, Victor Shoup
    Random oracles in constantipole: practical asynchronous Byzantine agreement using cryptography (extended abstract). [Citation Graph (0, 0)][DBLP]
    PODC, 2000, pp:123-132 [Conf]
  26. Joy Algesheimer, Christian Cachin, Jan Camenisch, Günter Karjoth
    Cryptographic Security for Mobile Code. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2001, pp:2-11 [Conf]
  27. Christian Cachin, Stefano Tessaro
    Asynchronous Information Dispersal. [Citation Graph (0, 0)][DBLP]
    SRDS, 2005, pp:191-202 [Conf]
  28. Michael Backes, Christian Cachin
    Public-Key Steganography with Active Attacks. [Citation Graph (0, 0)][DBLP]
    TCC, 2005, pp:210-226 [Conf]
  29. Matthias Rauterberg, Christian Cachin
    Locating the Primary Attention Focus of the User. [Citation Graph (0, 0)][DBLP]
    VCHCI, 1993, pp:129-140 [Conf]
  30. Christian Cachin, Stefano Tessaro
    Optimal Resilience for Erasure-Coded Byzantine Distributed Storage. [Citation Graph (0, 0)][DBLP]
    DISC, 2005, pp:497-498 [Conf]
  31. Christian Cachin, Stefano Tessaro
    Asynchronous Verifiable Information Dispersal. [Citation Graph (0, 0)][DBLP]
    DISC, 2005, pp:503-504 [Conf]
  32. Christian Cachin
    An information-theoretic model for steganography. [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 2004, v:192, n:1, pp:41-56 [Journal]
  33. Christian Cachin, Klaus Kursawe, Victor Shoup
    Random Oracles in Constantinople: Practical Asynchronous Byzantine Agreement Using Cryptography. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2005, v:18, n:3, pp:219-246 [Journal]
  34. Christian Cachin, Ueli M. Maurer
    Linking Information Reconciliation and Privacy Amplification. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1997, v:10, n:2, pp:97-110 [Journal]
  35. Christian Cachin
    Pedagogical pattern selection strategies. [Citation Graph (0, 0)][DBLP]
    Neural Networks, 1994, v:7, n:1, pp:175-181 [Journal]
  36. Roman Pletka, Christian Cachin
    Cryptographic Security for a High-Performance Distributed File System. [Citation Graph (0, 0)][DBLP]
    MSST, 2007, pp:227-232 [Conf]
  37. Christian Cachin, Abhi Shelat, Alexander Shraer
    Efficient fork-linearizable access to untrusted shared memory. [Citation Graph (0, 0)][DBLP]
    PODC, 2007, pp:129-138 [Conf]

  38. Integrity Protection for Revision Control. [Citation Graph (, )][DBLP]

  39. A Secure Cryptographic Token Interface. [Citation Graph (, )][DBLP]

  40. 06371 Abstracts Collection -- From Security to Dependability. [Citation Graph (, )][DBLP]

  41. 06371 Executive Summary -- From Security to Dependability. [Citation Graph (, )][DBLP]

  42. Fail-Aware Untrusted Storage. [Citation Graph (, )][DBLP]

  43. Design and Implementation of a Key-Lifecycle Management System. [Citation Graph (, )][DBLP]

  44. Principles of untrusted storage: a new look at consistency conditions. [Citation Graph (, )][DBLP]

  45. Lazy Revocation in Cryptographic File Systems. [Citation Graph (, )][DBLP]

  46. State Machine Replication with Byzantine Faults. [Citation Graph (, )][DBLP]

  47. Fork Sequential Consistency is Blocking [Citation Graph (, )][DBLP]

Search in 0.000secs, Finished in 0.003secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002