Chris Brzuska

Chris Brzuska

  • Phone+358 50 4450136
  • Aalto SCI Computer Science Konemiehentie 2

20092025

Research activity per year

Filter
Conference article in proceedings

Search results

  • 2025

    Evasive LWE Assumptions: Definitions, Classes, and Counterexamples

    Brzuska, C., Ünal, A. & Woo, I. K. Y., 2025, Advances in Cryptology – ASIACRYPT 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Chung, K.-M. & Sasaki, Y. (eds.). Springer, Vol. 4. p. 418-449 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 15487 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    1 Citation (Scopus)
  • On Bounded Storage Key Agreement and One-Way Functions

    Brzuska, C., Couteau, G., Egger, C. & Quach, W., 2025, Theory of Cryptography - 22nd International Conference, TCC 2024, Proceedings. Boyle, E., Boyle, E. & Mahmoody, M. (eds.). Springer, p. 287-318 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 15364 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
  • 2024

    Breaking DPA-Protected Kyber via the Pair-Pointwise Multiplication

    Bock, E. A., Banegas, G., Brzuska, C., Chmielewski, Ł., Puniamurthy, K. & Šorf, M., 1 Mar 2024, Applied Cryptography and Network Security - 22nd International Conference, ACNS 2024, Proceedings. Pöpper, C. & Batina, L. (eds.). Springer, p. 101-130 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14584 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    3 Citations (Scopus)
  • CryptoZoo : A Viewer for Reduction Proofs

    Brzuska, C., Egger, C. & Puniamurthy, K., 1 Mar 2024, Applied Cryptography and Network Security - 22nd International Conference, ACNS 2024, Proceedings. Pöpper, C. & Batina, L. (eds.). Springer, p. 3-25 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14583 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
  • Instantiating the Hash-Then-Evaluate Paradigm : Strengthening PRFs, PCFs, and OPRFs

    Brzuska, C., Couteau, G., Egger, C., Karanko, P. & Meyer, P., 2024, Security and Cryptography for Networks - 14th International Conference, SCN 2024, Proceedings. Galdi, C. & Phan, D. H. (eds.). Springer, p. 97-116 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14974 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
  • 2023

    Adaptive Distributional Security for Garbling Schemes with O(| x| ) Online Complexity

    Bock, E. A., Brzuska, C., Karanko, P., Oechsner, S. & Puniamurthy, K., 2023, Advances in Cryptology – ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Guo, J. & Steinfeld, R. (eds.). Springer, p. 139-171 33 p. (Lecture Notes in Computer Science; vol. 14438 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
  • A State-Separating Proof for Yao's Garbling Scheme

    Brzuska, C. & Oechsner, S., 2023, Proceedings - 2023 IEEE 36th Computer Security Foundations Symposium, CSF 2023. IEEE, p. 137-152 16 p. (Proceedings - IEEE Computer Security Foundations Symposium; vol. 2023-July).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    3 Citations (Scopus)
  • 2022

    Key-Schedule Security for the TLS 1.3 Standard

    Brzuska, C., Delignat-Lavaud, A., Egger, C., Fournet, C., Kohbrok, K. & Kohlweiss, M., 2022, Advances in Cryptology – ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, 2022, Proceedings. Agrawal, S. & Lin, D. (eds.). Springer, p. 621-650 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13791 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    1 Citation (Scopus)
  • On Building Fine-Grained One-Way Functions from Strong Average-Case Hardness

    Brzuska, C. & Couteau, G., 2022, Advances in Cryptology – EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2022, Proceedings. Dunkelman, O. & Dziembowski, S. (eds.). Springer, p. 584-613 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13276 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    5 Citations (Scopus)
  • Security Analysis of the MLS Key Derivation

    Brzuska, C., Cornelissen, E. & Kohbrok, K., 2022, Proceedings - 43rd IEEE Symposium on Security and Privacy, SP 2022. IEEE, p. 2535-2553 19 p. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2022-May).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    File
    18 Citations (Scopus)
    159 Downloads (Pure)
  • 2021

    On Derandomizing Yao’s Weak-to-Strong OWF Construction

    Brzuska, C., Couteau, G., Karanko, P. & Rohrbach, F., 4 Nov 2021, Theory of Cryptography: 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021, Proceedings, Part II. Nissim, K., Waters, B. & Waters, B. (eds.). Springer, p. 429-456 28 p. (Lecture Notes in Computer Science; vol. 13043).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    1 Citation (Scopus)
  • 2020

    Security Reductions for White-Box Key-Storage in Mobile Payments

    Alpirez Bock, E., Brzuska, C., Fischlin, M., Janson, C. & Michiels, W., 2020, International Conference on the Theory and Application of Cryptology and Information Security: ASIACRYPT 2020: Advances in Cryptology – ASIACRYPT 2020 . Moriai, S. & Wang, H. (eds.). Springer, p. 221-252 32 p. (Lecture Notes in Computer Science ; vol. 12491).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    10 Citations (Scopus)
  • 2019

    Doubly Half-Injective PRGs for Incompressible White-Box Cryptography

    Alpirez Bock, E., Amadori, A., Bos, J. W., Brzuska, C. & Michiels, W., 1 Jan 2019, Topics in Cryptology – CT-RSA 2019 - The Cryptographers’ Track at the RSA Conference 2019, Proceedings. Matsui, M. (ed.). Springer, p. 189-209 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11405 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    7 Citations (Scopus)
  • 2018

    On the ineffectiveness of internal encodings - Revisiting the DCA attack on white-box cryptography

    Alpirez Bock, E., Brzuska, C., Michiels, W. & Treff, A., 1 Jan 2018, Applied Cryptography and Network Security: 16th International Conference, ACNS 2018, Proceedings. Springer, p. 103-120 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10892 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    24 Citations (Scopus)
  • State separation for code-based game-playing proofs

    Brzuska, C., Delignat-Lavaud, A., Fournet, C., Kohbrok, K. & Kohlweiss, M., 1 Jan 2018, Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Peyrin, T. & Galbraith, S. (eds.). Springer, p. 222-249 28 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11274 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    21 Citations (Scopus)
  • 2017

    A Modular Security Analysis of EAP and IEEE 802.11

    Brzuska, C. & Jacobsen, H., 2017, PUBLIC-KEY CRYPTOGRAPHY (PKC 2017), PT II. Fehr, S. (ed.). Springer, p. 335-365 31 p. (Lecture Notes in Computer Science; vol. 10175).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

  • 2016

    Downgrade Resilience in Key-Exchange Protocols

    Bhargavan, K., Brzuska, C., Fournet, C., Green, M., Kohlweiss, M. & Zanella-Beguelin, S., 2016, 2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP). IEEE, p. 506-525 20 p. (IEEE Symposium on Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

  • On Statistically Secure Obfuscation with Approximate Correctness

    Brakerski, Z., Brzuska, C. & Fleischhacker, N., 2016, ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT II. Robshaw, M. & Katz, J. (eds.). Springer, p. 551-578 28 p. (Lecture Notes in Computer Science; vol. 9815).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

  • Safely Exporting Keys from Secure Channels On the Security of EAP-TLS and TLS Key Exporters

    Brzuska, C., Jacobsen, H. & Stebila, D., 2016, ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT I. Fischlin, M. & Coron, J. (eds.). Springer, p. 670-698 29 p. (Lecture Notes in Computer Science; vol. 9665).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

  • 2011

    Composability of Bellare-Rogaway Key Exchange Protocols

    Brzuska, C., Fischlin, M., Warinschi, B. & Williams, S. C., 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11). ACM, p. 51-61 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

  • Physically Uncloneable Functions in the Universal Composition Framework

    Brzuska, C., Fischlin, M., Schroeder, H. & Katzenbeisser, S., 2011, ADVANCES IN CRYPTOLOGY - CRYPTO 2011. Rogaway, P. (ed.). Springer, p. 51-70 20 p. (Lecture Notes in Computer Science; vol. 6841).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

  • 2010

    Redactable Signatures for Tree-Structured Data: Definitions and Constructions

    Brzuska, C., Busch, H., Dagdelen, O., Fischlin, M., Franz, M., Katzenbeisser, S., Manulis, M., Onete, C., Peter, A., Poettering, B. & Schroeder, D., 2010, APPLIED CRYPTOGRAPHY AND NETWORK SECURITY. Zhou, J. & Yung, M. (eds.). Springer, p. 87-104 18 p. (Lecture Notes in Computer Science; vol. 6123).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

  • Unlinkability of Sanitizable Signatures

    Brzuska, C., Fischlin, M., Lehmann, A. & Schroeder, D., 2010, PUBLIC KEY CRYPTOGRAPHY - PKC 2010, PROCEEDINGS. Nguyen, P. & Pointcheval, D. (eds.). Springer, p. 444-461 18 p. (Lecture Notes in Computer Science; vol. 6056).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

  • 2009

    Security of Sanitizable Signatures Revisited

    Brzuska, C., Fischlin, M., Freudenreich, T., Lehmann, A., Page, M., Schelbert, J., Schroeder, D. & Volk, F., 2009, PUBLIC KEY CRYPTOGRAPHY-PKC 2009, PROCEEDINGS. Jarecki, S. & Tsudik, G. (eds.). Springer, p. 317-336 20 p. (Lecture Notes in Computer Science; vol. 5443).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Your message has successfully been sent.
Your message was not sent due to an error.