What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Stefan Katzenbeisser
Google Scholar
82
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/eurosp
Endless Subscriptions: Open RAN is Open to RIC E2 Subscription Denial of Service Attacks.
Felix Klement
Alessandro Brighente
Anup Kiran Bhattacharjee
Stefano Cecconello
Fernando Kuipers
Georgios Smaragdakis
Mauro Conti
Stefan Katzenbeisser
2025
conf/csr2
Driving Resilience: Assessing Security Incidents' Criticality in Autonomous Vehicles.
Yaman Qendah
Stefan Katzenbeisser
2025
conf/esorics
PUSH for Security: A PUF-Based Protocol to Prevent Session Hijacking.
Emiliia Gelóczi
Nico Mexis
Stefan Katzenbeisser
2025
conf/acns
IoTCat: A Multidimensional Approach to Categorize IoT Devices in Order to Identify a Delegate for Cybersecurity Functions.
Emiliia Gelóczi
Nico Mexis
Benedikt Holler
Henrich C. Pöhls
Stefan Katzenbeisser
2024
conf/asiaccs
Secure Data-Binding in FPGA-based Hardware Architectures utilizing PUFs.
Florian Frank
Martin Schmid
Felix Klement
Purushothaman Palani
Andreas Weber
Elif Bilge Kavun
Wenjie Xiong
Tolga Arul
Stefan Katzenbeisser
2023
journals/tifs
Abusing Commodity DRAMs in IoT Devices to Remotely Spy on Temperature.
Florian Frank
Wenjie Xiong
Nikolaos Athanasios Anagnostopoulos
André Schaller
Tolga Arul
Farinaz Koushanfar
Stefan Katzenbeisser
Ulrich Rührmair
Jakub Szefer
2023
conf/esorics
Firmware-Based DoS Attacks in Wireless Sensor Network.
Phi Tuong Lau
Stefan Katzenbeisser
2022
conf/esorics
Using Memristor Arrays as Physical Unclonable Functions.
Florian Frank
Tolga Arul
Nikolaos Athanasios Anagnostopoulos
Stefan Katzenbeisser
2020
journals/tifs
Software Protection Using Dynamic PUFs.
Wenjie Xiong
André Schaller
Stefan Katzenbeisser
Jakub Szefer
2020
journals/popets
In-Depth Evaluation of Redirect Tracking and Link Usage.
Martin Koop
Erik Tews
Stefan Katzenbeisser
2020
conf/ccs
ASHES 2020: 4th Workshop on Attacks and Solutions in Hardware Security.
Chip-Hong Chang
Stefan Katzenbeisser
Ulrich Rührmair
Patrick Schaumont
2020
conf/fc
Secure Computation of the k<sup>th</sup>-Ranked Element in a Star Network.
Anselme Tueno
Florian Kerschbaum
Stefan Katzenbeisser
Yordan Boev
Mubashir Qureshi
2020
conf/acns
Secure Two-Party Computation in a Quantum World.
Niklas Büscher
Daniel Demmler
Nikolaos P. Karvelas
Stefan Katzenbeisser
Juliane Krämer
Deevashwer Rathee
Thomas Schneider
Patrick Struck
2019
journals/popets
Private Evaluation of Decision Trees using Sublinear Cost.
Anselme Tueno
Florian Kerschbaum
Stefan Katzenbeisser
2019
conf/uss
On (The Lack Of) Location Privacy in Crowdsourcing Applications.
Spyros Boukoros
Mathias Humbert
Stefan Katzenbeisser
Carmela Troncoso
2019
conf/sp
Ensuring the Safe and Secure Operation of Electronic Control Units in Road Vehicles.
Florian Kohnhäuser
Dominik Püllen
Stefan Katzenbeisser
2019
conf/ih
Vibrational Covert Channels using Low-Frequency Acoustic Signals.
Nikolay Matyunin
Yujue Wang
Stefan Katzenbeisser
2019
conf/eurosp
A Practical Attestation Protocol for Autonomous Embedded Systems.
Florian Kohnhäuser
Niklas Büscher
Stefan Katzenbeisser
2018
journals/tifs
Eliminating Leakage in Reverse Fuzzy Extractors.
André Schaller
Taras Stanko
Boris Skoric
Stefan Katzenbeisser
2018
journals/tifs
Depreciating Motivation and Empirical Security Analysis of Chaos-Based Image and Video Encryption.
Mario Preishuber
Thomas Hütter
Stefan Katzenbeisser
Andreas Uhl
2018
conf/ccs
HyCC: Compilation of Hybrid Protocols for Practical Secure Computation.
Niklas Büscher
Daniel Demmler
Stefan Katzenbeisser
David Kretzmer
Thomas Schneider
2018
conf/ccs
SALAD: Secure and Lightweight Attestation of Highly Dynamic and Disruptive Networks.
Florian Kohnhäuser
Niklas Büscher
Stefan Katzenbeisser
2018
conf/ccs
PROPYLA: Privacy Preserving Long-Term Secure Storage.
Matthias Geihs
Nikolaos P. Karvelas
Stefan Katzenbeisser
Johannes Buchmann
2018
conf/esorics
Towards Practical RAM Based Secure Computation.
Niklas Büscher
Alina Weber
Stefan Katzenbeisser
2018
conf/host
Zero-permission acoustic cross-device tracking.
Nikolay Matyunin
Jakub Szefer
Stefan Katzenbeisser
2018
conf/wisec
Tracking Private Browsing Sessions using CPU-based Covert Channels.
Nikolay Matyunin
Nikolaos Athanasios Anagnostopoulos
Spyros Boukoros
Markus Heinrich
André Schaller
Maksim Kolinichenko
Stefan Katzenbeisser
2017
journals/popets
Two Is Not Enough: Privacy Assessment of Aggregation Schemes in Smart Metering.
Niklas Büscher
Spyros Boukoros
Stefan Bauregger
Stefan Katzenbeisser
2017
conf/eurosp
Challenges and Approaches in Securing Safety-Relevant Railway Signalling.
Christian Schlehuber
Markus Heinrich
Tsvetoslava Vateva-Gurova
Stefan Katzenbeisser
Neeraj Suri
2017
conf/esorics
Using Oblivious RAM in Genomic Studies.
Nikolaos P. Karvelas
Andreas Peter
Stefan Katzenbeisser
2017
conf/esorics
Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT Sensors.
Steffen Schulz
André Schaller
Florian Kohnhäuser
Stefan Katzenbeisser
2017
conf/host
Intrinsic Rowhammer PUFs: Leveraging the Rowhammer effect for improved security.
André Schaller
Wenjie Xiong
Nikolaos Athanasios Anagnostopoulos
Muhammad Umair Saleem
Sebastian Gabmeyer
Stefan Katzenbeisser
Jakub Szefer
2017
conf/wisec
SCAPI: a scalable attestation protocol to detect software and physical attacks.
Florian Kohnhäuser
Niklas Büscher
Sebastian Gabmeyer
Stefan Katzenbeisser
2016
journals/tifs
On the Privacy and Performance of Mobile Anonymous Microblogging.
Marius Senftleben
Ana Barroso
Mihai Bucicoiu
Matthias Hollick
Stefan Katzenbeisser
Erik Tews
2016
conf/ccs
Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge.
Johannes Buchmann
Niklas Büscher
Florian Göpfert
Stefan Katzenbeisser
Juliane Krämer
Daniele Micciancio
Sander Siim
Christine van Vredendaal
Michael Walter
2016
conf/esorics
Compiling Low Depth Circuits for Practical Secure Computation.
Niklas Büscher
Andreas Holzer
Alina Weber
Stefan Katzenbeisser
2016
conf/esorics
Secure Code Updates for Mesh Networked Commodity Low-End Embedded Devices.
Florian Kohnhäuser
Stefan Katzenbeisser
2016
conf/ches
Run-Time Accessible DRAM PUFs in Commodity Devices.
Wenjie Xiong
André Schaller
Nikolaos A. Anagnostopoulos
Muhammad Umair Saleem
Sebastian Gabmeyer
Stefan Katzenbeisser
Jakub Szefer
2016
conf/wisec
Trust The Wire, They Always Told Me!: On Practical Non-Destructive Wire-Tap Attacks Against Ethernet.
Matthias Schulz
Patrick Klapper
Matthias Hollick
Erik Tews
Stefan Katzenbeisser
2015
conf/ccs
Fifth International Workshop on Trustworthy Embedded Devices (TrustED 2015).
Jorge Guajardo
Stefan Katzenbeisser
2015
conf/ccs
On the Systematic Drift of Physically Unclonable Functions Due to Aging.
André Schaller
Boris Skoric
Stefan Katzenbeisser
2015
conf/uss
Faster Secure Computation through Automatic Parallelization.
Niklas Büscher
Stefan Katzenbeisser
2015
conf/fc
Hard Drive Side-Channel Attacks Using Smartphone Magnetic Field Sensors.
Sebastian Biedermann
Stefan Katzenbeisser
Jakub Szefer
2014
journals/compsec
Covert Computation - Hiding code in code through compile-time obfuscation.
Sebastian Schrittwieser
Stefan Katzenbeisser
Peter Kieseberg
Markus Huber
Manuel Leithner
Martin Mulazzani
Edgar R. Weippl
2014
conf/ccs
From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation.
Frederico Araujo
Kevin W. Hamlen
Sebastian Biedermann
Stefan Katzenbeisser
2014
conf/fc
MoP-2-MoP - Mobile Private Microblogging.
Marius Senftleben
Mihai Bucicoiu
Erik Tews
Frederik Armknecht
Stefan Katzenbeisser
Ahmad-Reza Sadeghi
2014
conf/pkc
General Impossibility of Group Homomorphic Encryption in the Quantum World.
Frederik Armknecht
Tommaso Gagliardoni
Stefan Katzenbeisser
Andreas Peter
2014
conf/acsac
Hot-hardening: getting more out of your security settings.
Sebastian Biedermann
Stefan Katzenbeisser
Jakub Szefer
2013
journals/istr
Secure computations on non-integer values with applications to privacy-preserving sequence analysis.
Martin Franz
Björn Deiseroth
Kay Hamacher
Somesh Jha
Stefan Katzenbeisser
Heike Schröder
2013
journals/tifs
Efficiently Outsourcing Multiparty Computation Under Multiple Keys.
Andreas Peter
Erik Tews
Stefan Katzenbeisser
2013
conf/ccs
Challenges in compiler construction for secure two-party computation.
Andreas Holzer
Nikolaos P. Karvelas
Stefan Katzenbeisser
Helmut Veith
Martin Franz
2013
conf/ccs
Event-based isolation of critical data in the cloud.
Sebastian Biedermann
Stefan Katzenbeisser
2013
conf/ccs
Secure PRNG seeding on commercial off-the-shelf microcontrollers.
Anthony Van Herrewege
Vincent van der Leest
André Schaller
Stefan Katzenbeisser
Ingrid Verbauwhede
2013
conf/ccs
Inherent PUFs and secure PRNGs on commercial off-the-shelf microcontrollers.
Anthony Van Herrewege
André Schaller
Stefan Katzenbeisser
Ingrid Verbauwhede
2013
conf/ccs
Covert computation: hiding code in code for obfuscation purposes.
Sebastian Schrittwieser
Stefan Katzenbeisser
Peter Kieseberg
Markus Huber
Manuel Leithner
Martin Mulazzani
Edgar R. Weippl
2012
conf/ccs
Fast dynamic extracted honeypots in cloud computing.
Sebastian Biedermann
Martin Mink
Stefan Katzenbeisser
2012
conf/ccs
Secure two-party computations in ANSI C.
Andreas Holzer
Martin Franz
Stefan Katzenbeisser
Helmut Veith
2012
conf/fc
Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-Enabled RFIDs.
Anthony Van Herrewege
Stefan Katzenbeisser
Roel Maes
Roel Peeters
Ahmad-Reza Sadeghi
Ingrid Verbauwhede
Christian Wachsmann
2012
conf/ches
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon.
Stefan Katzenbeisser
Ünal Koçabas
Vladimir Rozic
Ahmad-Reza Sadeghi
Ingrid Verbauwhede
Christian Wachsmann
2012
conf/africacrypt
Shift-Type Homomorphic Encryption and Its Application to Fully Homomorphic Encryption.
Frederik Armknecht
Stefan Katzenbeisser
Andreas Peter
2011
journals/tifs
Tardos Fingerprinting Codes in the Combined Digit Model.
Boris Skoric
Stefan Katzenbeisser
Hans Georg Schaathun
Mehmet Utku Celik
2011
conf/crypto
Physically Uncloneable Functions in the Universal Composition Framework.
Christina Brzuska
Marc Fischlin
Heike Schröder
Stefan Katzenbeisser
2011
conf/fc
Towards Secure Bioinformatics Services (Short Paper).
Martin Franz
Björn Deiseroth
Kay Hamacher
Somesh Jha
Stefan Katzenbeisser
Heike Schröder
2011
conf/fc
Oblivious Outsourced Storage with Delegation.
Martin Franz
Peter Williams
Bogdan Carbunar
Stefan Katzenbeisser
Andreas Peter
Radu Sion
Miroslava Sotáková
2011
conf/nspw
Public security: simulations need to replace conventional wisdom.
Kay Hamacher
Stefan Katzenbeisser
2011
conf/ih
Code Obfuscation against Static and Dynamic Reverse Engineering.
Sebastian Schrittwieser
Stefan Katzenbeisser
2011
conf/ches
Recyclable PUFs: Logically Reconfigurable PUFs.
Stefan Katzenbeisser
Ünal Koçabas
Vincent van der Leest
Ahmad-Reza Sadeghi
Geert Jan Schrijen
Heike Schröder
Christian Wachsmann
2010
conf/acns
Redactable Signatures for Tree-Structured Data: Definitions and Constructions.
Christina Brzuska
Heike Busch
Özgür Dagdelen
Marc Fischlin
Martin Franz
Stefan Katzenbeisser
Mark Manulis
Cristina Onete
Andreas Peter
Bertram Poettering
Dominique Schröder
2010
conf/ih
Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic.
Yali Liu
Dipak Ghosal
Frederik Armknecht
Ahmad-Reza Sadeghi
Steffen Schulz
Stefan Katzenbeisser
2009
conf/esorics
Hide and Seek in Time - Robust Covert Timing Channels.
Yali Liu
Dipak Ghosal
Frederik Armknecht
Ahmad-Reza Sadeghi
Steffen Schulz
Stefan Katzenbeisser
2009
conf/wisa
PUF-Based Authentication Protocols - Revisited.
Heike Busch
Stefan Katzenbeisser
Paul Baecher
2008
journals/tifs
A Buyer-Seller Watermarking Protocol Based on Secure Embedding.
Stefan Katzenbeisser
Aweke N. Lemma
Mehmet Utku Celik
Michiel van der Veen
Martijn Maas
2008
journals/tifs
Lookup-Table-Based Secure Client-Side Embedding for Spread-Spectrum Watermarks.
Mehmet Utku Celik
Aweke N. Lemma
Stefan Katzenbeisser
Michiel van der Veen
2008
conf/ccs
Improving the scalability of platform attestation.
Frederic Stumpf
Andreas Fuchs
Stefan Katzenbeisser
Claudia Eckert
2008
conf/icisc
Distributed Attribute-Based Encryption.
Sascha Müller
Stefan Katzenbeisser
Claudia Eckert
2007
journals/tifs
Decode-Time Forensic Watermarking of AAC Bitstreams.
Serap Kirbiz
Aweke N. Lemma
Mehmet Utku Celik
Stefan Katzenbeisser
2007
conf/ccs
Privacy preserving error resilient dna searching through oblivious automata.
Juan Ramón Troncoso-Pastoriza
Stefan Katzenbeisser
Mehmet Utku Celik
2007
conf/nspw
Computing under occupation.
Klaus Kursawe
Stefan Katzenbeisser
2007
conf/sp
Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments.
Somesh Jha
Stefan Katzenbeisser
Christian Schallhart
Helmut Veith
Stephen Chenney
2007
conf/ih
Combining Tardos Fingerprinting Codes and Fingercasting.
Stefan Katzenbeisser
Boris Skoric
Mehmet Utku Celik
Ahmad-Reza Sadeghi
2006
conf/ih
A Computational Model for Watermark Robustness.
André Adelsbach
Stefan Katzenbeisser
Ahmad-Reza Sadeghi
2006
conf/ih
Content-Aware Steganography: About Lazy Prisoners and Narrow-Minded Wardens.
Richard Bergmair
Stefan Katzenbeisser
2005
conf/sec
Ensuring Media Integrity on Third-Party Infrastructures.
Jana Dittmann
Stefan Katzenbeisser
Christian Schallhart
Helmut Veith
Coauthors
Ahmad-Reza Sadeghi
(8)
Alessandro Brighente
(1)
Alina Weber
(2)
Ana Barroso
(1)
André Adelsbach
(1)
André Schaller
(10)
Andreas Fuchs
(1)
Andreas Holzer
(3)
Andreas Peter
(6)
Andreas Uhl
(1)
Andreas Weber
(1)
Anselme Tueno
(2)
Anthony Van Herrewege
(3)
Anup Kiran Bhattacharjee
(1)
Aweke N. Lemma
(3)
Benedikt Holler
(1)
Bertram Poettering
(1)
Björn Deiseroth
(2)
Bogdan Carbunar
(1)
Boris Skoric
(4)
Carmela Troncoso
(1)
Chip-Hong Chang
(1)
Christian Schallhart
(2)
Christian Schlehuber
(1)
Christian Wachsmann
(3)
Christina Brzuska
(2)
Christine van Vredendaal
(1)
Claudia Eckert
(2)
Cristina Onete
(1)
Daniel Demmler
(2)
Daniele Micciancio
(1)
David Kretzmer
(1)
Deevashwer Rathee
(1)
Dipak Ghosal
(2)
Dominik Püllen
(1)
Dominique Schröder
(1)
Edgar R. Weippl
(2)
Elif Bilge Kavun
(1)
Emiliia Gelóczi
(2)
Erik Tews
(5)
Farinaz Koushanfar
(1)
Felix Klement
(2)
Fernando Kuipers
(1)
Florian Frank
(3)
Florian Göpfert
(1)
Florian Kerschbaum
(2)
Florian Kohnhäuser
(6)
Frederic Stumpf
(1)
Frederico Araujo
(1)
Frederik Armknecht
(5)
Geert Jan Schrijen
(1)
Georgios Smaragdakis
(1)
Hans Georg Schaathun
(1)
Heike Busch
(2)
Heike Schröder
(4)
Helmut Veith
(4)
Henrich C. Pöhls
(1)
Ingrid Verbauwhede
(4)
Jakub Szefer
(7)
Jana Dittmann
(1)
Johannes Buchmann
(2)
Jorge Guajardo
(1)
Juan Ramón Troncoso-Pastoriza
(1)
Juliane Krämer
(2)
Kay Hamacher
(3)
Kevin W. Hamlen
(1)
Klaus Kursawe
(1)
Maksim Kolinichenko
(1)
Manuel Leithner
(2)
Marc Fischlin
(2)
Mario Preishuber
(1)
Marius Senftleben
(2)
Mark Manulis
(1)
Markus Heinrich
(2)
Markus Huber
(2)
Martijn Maas
(1)
Martin Franz
(6)
Martin Koop
(1)
Martin Mink
(1)
Martin Mulazzani
(2)
Martin Schmid
(1)
Mathias Humbert
(1)
Matthias Geihs
(1)
Matthias Hollick
(2)
Matthias Schulz
(1)
Mauro Conti
(1)
Mehmet Utku Celik
(6)
Michael Walter
(1)
Michiel van der Veen
(2)
Mihai Bucicoiu
(2)
Miroslava Sotáková
(1)
Mubashir Qureshi
(1)
Muhammad Umair Saleem
(2)
Neeraj Suri
(1)
Nico Mexis
(2)
Niklas Büscher
(10)
Nikolaos A. Anagnostopoulos
(1)
Nikolaos Athanasios Anagnostopoulos
(4)
Nikolaos P. Karvelas
(4)
Nikolay Matyunin
(3)
Özgür Dagdelen
(1)
Patrick Klapper
(1)
Patrick Schaumont
(1)
Patrick Struck
(1)
Paul Baecher
(1)
Peter Kieseberg
(2)
Peter Williams
(1)
Phi Tuong Lau
(1)
Purushothaman Palani
(1)
Radu Sion
(1)
Richard Bergmair
(1)
Roel Maes
(1)
Roel Peeters
(1)
Sander Siim
(1)
Sascha Müller
(1)
Sebastian Biedermann
(5)
Sebastian Gabmeyer
(3)
Sebastian Schrittwieser
(3)
Serap Kirbiz
(1)
Somesh Jha
(3)
Spyros Boukoros
(3)
Stefan Bauregger
(1)
Stefan Katzenbeisser
(82)
Stefano Cecconello
(1)
Steffen Schulz
(3)
Stephen Chenney
(1)
Taras Stanko
(1)
Thomas Hütter
(1)
Thomas Schneider
(2)
Tolga Arul
(3)
Tommaso Gagliardoni
(1)
Tsvetoslava Vateva-Gurova
(1)
Ulrich Rührmair
(2)
Ünal Koçabas
(2)
Vincent van der Leest
(2)
Vladimir Rozic
(1)
Wenjie Xiong
(5)
Yali Liu
(2)
Yaman Qendah
(1)
Yordan Boev
(1)
Yujue Wang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to