Follow
Christian Badertscher
Christian Badertscher
Input Output (IOG) & Zurich University of Applied Sciences (ZHAW)
Verified email at iohk.io - Homepage
Title
Cited by
Cited by
Year
Ouroboros genesis: Composable proof-of-stake blockchains with dynamic availability
C Badertscher, P Gaži, A Kiayias, A Russell, V Zikas
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
3552018
Bitcoin as a transaction ledger: A composable treatment
C Badertscher, U Maurer, D Tschudi, V Zikas
Journal of Cryptology 37 (2), 18, 2024
2722024
But why does it work? A rational protocol design treatment of bitcoin
C Badertscher, J Garay, U Maurer, D Tschudi, V Zikas
Advances in Cryptology–EUROCRYPT 2018: 37th Annual International Conference …, 2018
982018
Universal composition with global subroutines: Capturing global setup within plain UC
C Badertscher, R Canetti, J Hesse, B Tackmann, V Zikas
Theory of Cryptography Conference, 1-30, 2020
442020
Augmented secure channels and the goal of the TLS 1.3 record layer
C Badertscher, C Matt, U Maurer, P Rogaway, B Tackmann
Provable Security: 9th International Conference, ProvSec 2015, Kanazawa …, 2015
412015
Dynamic ad hoc clock synchronization
C Badertscher, P Gaži, A Kiayias, A Russell, V Zikas
Annual International Conference on the Theory and Applications of …, 2021
38*2021
Strengthening access control encryption
C Badertscher, C Matt, U Maurer
Advances in Cryptology–ASIACRYPT 2017: 23rd International Conference on the …, 2017
332017
Security limitations of classical-client delegated quantum computing
C Badertscher, A Cojocaru, L Colisson, E Kashefi, D Leichtle, A Mantri, ...
International Conference on the Theory and Application of Cryptology and …, 2020
292020
A constructive perspective on signcryption security
C Badertscher, F Banfi, U Maurer
Security and Cryptography for Networks: 11th International Conference, SCN …, 2018
202018
Consensus redux: distributed ledgers in the face of adversarial supremacy
C Badertscher, P Gaži, A Kiayias, A Russell, V Zikas
2024 IEEE 37th Computer Security Foundations Symposium (CSF), 143-158, 2024
192024
A rational protocol treatment of 51% attacks
C Badertscher, Y Lu, V Zikas
Advances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology …, 2021
192021
Robust authenticated encryption and the limits of symmetric cryptography
C Badertscher, C Matt, U Maurer, P Rogaway, B Tackmann
Cryptography and Coding: 15th IMA International Conference, IMACC 2015 …, 2015
142015
Composable and robust outsourced storage
C Badertscher, U Maurer
Topics in Cryptology–CT-RSA 2018: The Cryptographers' Track at the RSA …, 2018
102018
On composable security for digital signatures
C Badertscher, U Maurer, B Tackmann
Public-Key Cryptography–PKC 2018: 21st IACR International Conference on …, 2018
102018
Policy-compliant signatures
C Badertscher, C Matt, H Waldner
Theory of Cryptography Conference, 350-381, 2021
82021
Revisiting (R) CCA security and replay protection
C Badertscher, U Maurer, C Portmann, G Rito
IACR International Conference on Public-Key Cryptography, 173-202, 2021
82021
On uc-secure range extension and batch verification for ecvrf
C Badertscher, P Gaži, I Querejeta-Azurmendi, A Russell
Cryptology ePrint Archive, 2022
62022
Consistency for functional encryption
C Badertscher, A Kiayias, M Kohlweiss, H Waldner
2021 IEEE 34th Computer Security Foundations Symposium (CSF), 1-16, 2021
62021
On the (ir) replaceability of global setups, or how (not) to use a global ledger
C Badertscher, J Hesse, V Zikas
Theory of Cryptography: 19th International Conference, TCC 2021, Raleigh, NC …, 2021
62021
Fine-Grained Accountable Privacy via Unlinkable Policy-Compliant Signatures.
C Badertscher, M Sedaghat, H Waldner
IACR Cryptol. ePrint Arch. 2023, 1070, 2023
42023
The system can't perform the operation now. Try again later.
Articles 1–20