Chris Brzuska

Chris Brzuska

  • Phone+358 50 4450136
  • Aalto SCI Computer Science Konemiehentie 2

20112023

Research activity per year

If you made any changes in Pure these will be visible here soon.

Search results

  • 2023

    A State-Separating Proof for Yao's Garbling Scheme

    Brzuska, C. & Oechsner, S., 2023, Proceedings - 2023 IEEE 36th Computer Security Foundations Symposium, CSF 2023. IEEE Computer Society, p. 137-152 16 p. (Proceedings - IEEE Computer Security Foundations Symposium; vol. 2023-July).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
  • On Provable White-Box Security in the Strong Incompressibility Model

    Bock, E. A., Brzuska, C. & Lai, R. W. F., 31 Aug 2023, In: IACR Transactions on Cryptographic Hardware and Embedded Systems. 2023, 4, p. 167-187 21 p.

    Research output: Contribution to journalArticleScientificpeer-review

    Open Access
    File
    6 Downloads (Pure)
  • 2022

    Key-Schedule Security for the TLS 1.3 Standard

    Brzuska, C., Delignat-Lavaud, A., Egger, C., Fournet, C., Kohbrok, K. & Kohlweiss, M., 2022, Advances in Cryptology – ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, 2022, Proceedings. Agrawal, S. & Lin, D. (eds.). Springer, p. 621-650 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13791 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
  • On Building Fine-Grained One-Way Functions from Strong Average-Case Hardness

    Brzuska, C. & Couteau, G., 2022, Advances in Cryptology – EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2022, Proceedings. Dunkelman, O. & Dziembowski, S. (eds.). Springer, p. 584-613 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13276 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
  • Security Analysis of the MLS Key Derivation

    Brzuska, C., Cornelissen, E. & Kohbrok, K., 2022, Proceedings - 43rd IEEE Symposium on Security and Privacy, SP 2022. IEEE, p. 2535-2553 19 p. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2022-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    File
    8 Citations (Scopus)
    39 Downloads (Pure)
  • 2021

    On Derandomizing Yao’s Weak-to-Strong OWF Construction

    Brzuska, C., Couteau, G., Karanko, P. & Rohrbach, F., 4 Nov 2021, Theory of Cryptography: 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021, Proceedings, Part II. Nissim, K., Waters, B. & Waters, B. (eds.). Springer, p. 429-456 28 p. (Lecture Notes in Computer Science; vol. 13043).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  • 2020

    On the Security Goals of White-Box Cryptography

    Alpirez Bock, E., Amadori, A., Brzuska, C. & Michiels, W., 2 Mar 2020, In: IACR Transactions on Cryptographic Hardware and Embedded Systems. 2020, 2, p. 327-357 31 p.

    Research output: Contribution to journalArticleScientificpeer-review

    Open Access
    File
    51 Downloads (Pure)
  • Security Reductions for White-Box Key-Storage in Mobile Payments

    Alpirez Bock, E., Brzuska, C., Fischlin, M., Janson, C. & Michiels, W., 2020, International Conference on the Theory and Application of Cryptology and Information Security: ASIACRYPT 2020: Advances in Cryptology – ASIACRYPT 2020 . Moriai, S. & Wang, H. (eds.). Springer, p. 221-252 32 p. (Lecture Notes in Computer Science ; vol. 12491).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
    7 Citations (Scopus)
  • 2019

    Doubly Half-Injective PRGs for Incompressible White-Box Cryptography

    Alpirez Bock, E., Amadori, A., Bos, J. W., Brzuska, C. & Michiels, W., 1 Jan 2019, Topics in Cryptology – CT-RSA 2019 - The Cryptographers’ Track at the RSA Conference 2019, Proceedings. Matsui, M. (ed.). Springer, p. 189-209 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11405 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
    5 Citations (Scopus)
  • White-Box Cryptography: Don’t Forget About Grey-Box Attacks

    Alpirez Bock, E., Bos, J. W., Brzuska, C., Hubain, C., Michiels, W., Mune, C., Sanfelix Gonzalez, E., Teuwen, P. & Treff, A., 1 Oct 2019, In: Journal of Cryptology. 32, 4, p. 1095-1143 49 p.

    Research output: Contribution to journalArticleScientificpeer-review

    Open Access
    21 Citations (Scopus)
  • 2018

    On the ineffectiveness of internal encodings - Revisiting the DCA attack on white-box cryptography

    Alpirez Bock, E., Brzuska, C., Michiels, W. & Treff, A., 1 Jan 2018, Applied Cryptography and Network Security: 16th International Conference, ACNS 2018, Proceedings. Springer, p. 103-120 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10892 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
    16 Citations (Scopus)
  • State separation for code-based game-playing proofs

    Brzuska, C., Delignat-Lavaud, A., Fournet, C., Kohbrok, K. & Kohlweiss, M., 1 Jan 2018, Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Peyrin, T. & Galbraith, S. (eds.). Springer, p. 222-249 28 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11274 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
    13 Citations (Scopus)
  • 2017

    A Modular Security Analysis of EAP and IEEE 802.11

    Brzuska, C. & Jacobsen, H., 2017, PUBLIC-KEY CRYPTOGRAPHY (PKC 2017), PT II. Fehr, S. (ed.). Springer, p. 335-365 31 p. (Lecture Notes in Computer Science; vol. 10175).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  • Arithmetic Cryptography

    Applebaum, B., Avron, J. & Brzuska, C., Jun 2017, In: Journal of the ACM. 64, 2, 74 p., 10.

    Research output: Contribution to journalArticleScientificpeer-review

  • 2016

    Downgrade Resilience in Key-Exchange Protocols

    Bhargavan, K., Brzuska, C., Fournet, C., Green, M., Kohlweiss, M. & Zanella-Beguelin, S., 2016, 2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP). IEEE, p. 506-525 20 p. (IEEE Symposium on Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  • On Statistically Secure Obfuscation with Approximate Correctness

    Brakerski, Z., Brzuska, C. & Fleischhacker, N., 2016, ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT II. Robshaw, M. & Katz, J. (eds.). Springer, p. 551-578 28 p. (Lecture Notes in Computer Science; vol. 9815).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  • Safely Exporting Keys from Secure Channels On the Security of EAP-TLS and TLS Key Exporters

    Brzuska, C., Jacobsen, H. & Stebila, D., 2016, ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT I. Fischlin, M. & Coron, JS. (eds.). Springer, p. 670-698 29 p. (Lecture Notes in Computer Science; vol. 9665).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  • 2011

    Composability of Bellare-Rogaway Key Exchange Protocols

    Brzuska, C., Fischlin, M., Warinschi, B. & Williams, S. C., 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11). ACM, p. 51-61 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

Your message has successfully been sent.
Your message was not sent due to an error.