| 2009 | ||
|---|---|---|
| 53 | Christian Cachin, Martin Geisler: Integrity Protection for Revision Control. ACNS 2009: 382-399 | |
| 52 | Christian Cachin, Nishanth Chandran: A Secure Cryptographic Token Interface. CSF 2009: 141-153 | |
| 51 | Christian Cachin, Idit Keidar, Alexander Shraer: Fail-Aware Untrusted Storage. DSN 2009: 494-503 | |
| 50 | Christian Cachin, Idit Keidar, Alexander Shraer: Fork sequential consistency is blocking. Inf. Process. Lett. 109(7): 360-364 (2009) | |
| 49 | Christian Cachin, Idit Keidar, Alexander Shraer: Trusting the cloud. SIGACT News 40(2): 81-86 (2009) | |
| 48 | Lars Arge, Christian Cachin, Andrzej Tarlecki: Preface. Theor. Comput. Sci. 410(18): 1617 (2009) | |
| 2008 | ||
| 47 | Christian Cachin, Idit Keidar, Alexander Shraer: Principles of untrusted storage: a new look at consistency conditions. PODC 2008: 426 | |
| 46 | Christian Cachin, Idit Keidar, Alexander Shraer: Fork Sequential Consistency is Blocking CoRR abs/0805.2068: (2008) | |
| 2007 | ||
| 45 | Christian Cachin, Felix C. Freiling, Jaap-Henk Hoepman: From Security to Dependability, 10.09. - 15.09.2006 Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2007 | |
| 44 | Lars Arge, Christian Cachin, Tomasz Jurdzinski, Andrzej Tarlecki: Automata, Languages and Programming, 34th International Colloquium, ICALP 2007, Wroclaw, Poland, July 9-13, 2007, Proceedings Springer 2007 | |
| 43 | Roman Pletka, Christian Cachin: Cryptographic Security for a High-Performance Distributed File System. MSST 2007: 227-232 | |
| 42 | Christian Cachin, Abhi Shelat, Alexander Shraer: Efficient fork-linearizable access to untrusted shared memory. PODC 2007: 129-138 | |
| 2006 | ||
| 41 | Christian Cachin, Stefano Tessaro: Optimal Resilience for Erasure-Coded Byzantine Distributed Storage. DSN 2006: 115-124 | |
| 40 | Michael Backes, Christian Cachin, Alina Oprea: Secure Key-Updating for Lazy Revocation. ESORICS 2006: 327-346 | |
| 39 | Christian Cachin, Felix C. Freiling, Jaap-Henk Hoepman: 06371 Abstracts Collection -- From Security to Dependability. From Security to Dependability 2006 | |
| 38 | Christian Cachin, Felix C. Freiling, Jaap-Henk Hoepman: 06371 Executive Summary -- From Security to Dependability. From Security to Dependability 2006 | |
| 37 | Paulo Veríssimo, Nuno Ferreira Neves, Christian Cachin, Jonathan A. Poritz, David Powell, Yves Deswarte, Robert J. Stroud, Ian Welch: Intrusion-tolerant middleware: the road to automatic security. IEEE Security & Privacy 4(4): 54-62 (2006) | |
| 2005 | ||
| 36 | Christian Cachin, Stefano Tessaro: Optimal Resilience for Erasure-Coded Byzantine Distributed Storage. DISC 2005: 497-498 | |
| 35 | Christian Cachin, Stefano Tessaro: Asynchronous Verifiable Information Dispersal. DISC 2005: 503-504 | |
| 34 | Michael Backes, Christian Cachin, Alina Oprea: Lazy Revocation in Cryptographic File Systems. IEEE Security in Storage Workshop 2005: 1-11 | |
| 33 | HariGovind V. Ramasamy, Christian Cachin: Parsimonious Asynchronous Byzantine-Fault-Tolerant Atomic Broadcast. OPODIS 2005: 88-102 | |
| 32 | Christian Cachin, Stefano Tessaro: Asynchronous Veri.able Information Dispersal. SRDS 2005: 191-202 | |
| 31 | Michael Backes, Christian Cachin: Public-Key Steganography with Active Attacks. TCC 2005: 210-226 | |
| 30 | Christian Cachin: Digital Steganography. Encyclopedia of Cryptography and Security 2005 | |
| 29 | Christian Cachin, Klaus Kursawe, Victor Shoup: Random Oracles in Constantinople: Practical Asynchronous Byzantine Agreement Using Cryptography. J. Cryptology 18(3): 219-246 (2005) | |
| 2004 | ||
| 28 | Christian Cachin, Jan Camenisch: Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings Springer 2004 | |
| 27 | Christian Cachin, Asad Samar: Secure Distributed DNS. DSN 2004: 423-432 | |
| 26 | Christian Cachin, Reto Strobl: Asynchronous group key exchange with failures. PODC 2004: 357-366 | |
| 25 | Christian Cachin: An information-theoretic model for steganography. Inf. Comput. 192(1): 41-56 (2004) | |
| 2003 | ||
| 24 | Michael Backes, Christian Cachin: Reliable Broadcast in a Computational Hybrid Model with Byzantine Faults, Crashes, and Recoveries. DSN 2003: 37-46 | |
| 23 | Christian Cachin: Modeling Complexity in Secure Distributed Computing. Future Directions in Distributed Computing 2003: 57-61 | |
| 22 | Christian Cachin: An asynchronous protocol for distributed computation of RSA inverses and its applications. PODC 2003: 153-162 | |
| 21 | Michael Backes, Christian Cachin, Reto Strobl: Proactive secure message transmission in asynchronous networks. PODC 2003: 223-232 | |
| 2002 | ||
| 20 | Christian Cachin, Klaus Kursawe, Anna Lysyanskaya, Reto Strobl: Asynchronous verifiable secret sharing and proactive cryptosystems. ACM Conference on Computer and Communications Security 2002: 88-97 | |
| 19 | Christian Cachin, Jonathan A. Poritz: Secure Intrusion-tolerant Replication on the Internet. DSN 2002: 167-176 | |
| 2001 | ||
| 18 | Christian Cachin, Klaus Kursawe, Frank Petzold, Victor Shoup: Secure and Efficient Asynchronous Broadcast Protocols. CRYPTO 2001: 524-541 | |
| 17 | Christian Cachin: Distributing Trust on the Internet . DSN 2001: 183-192 | |
| 16 | Joy Algesheimer, Christian Cachin, Jan Camenisch, Günter Karjoth: Cryptographic Security for Mobile Code. IEEE Symposium on Security and Privacy 2001: 2-11 | |
| 2000 | ||
| 15 | Christian Cachin, Jan Camenisch: Optimistic Fair Secure Computation. CRYPTO 2000: 93-111 | |
| 14 | Christian Cachin, Jan Camenisch, Joe Kilian, Joy Müller: One-Round Secure Computation and Secure Autonomous Mobile Agents. ICALP 2000: 512-523 | |
| 13 | Christian Cachin, Klaus Kursawe, Victor Shoup: Random oracles in constantipole: practical asynchronous Byzantine agreement using cryptography (extended abstract). PODC 2000: 123-132 | |
| 1999 | ||
| 12 | Christian Cachin: Efficient Private Bidding and Auctions with an Oblivious Third Party. ACM Conference on Computer and Communications Security 1999: 120-127 | |
| 11 | Christian Cachin, Silvio Micali, Markus Stadler: Computationally Private Information Retrieval with Polylogarithmic Communication. EUROCRYPT 1999: 402-414 | |
| 1998 | ||
| 10 | Christian Cachin: On the Foundations of Oblivious Transfer. EUROCRYPT 1998: 361-374 | |
| 9 | Christian Cachin, Claude Crépeau, Julien Marcil: Oblivious Transfer with a Memory-Bounded Receiver. FOCS 1998: 493-502 | |
| 8 | Christian Cachin: An Information-Theoretic Model for Steganography. Information Hiding 1998: 306-318 | |
| 1997 | ||
| 7 | Christian Cachin, Ueli M. Maurer: Unconditional Security Against Memory-Bounded Adversaries. CRYPTO 1997: 292-306 | |
| 6 | Christian Cachin: Smooth Entropy and Rényi Entropy. EUROCRYPT 1997: 193-208 | |
| 5 | Christian Cachin, Ueli M. Maurer: Linking Information Reconciliation and Privacy Amplification. J. Cryptology 10(2): 97-110 (1997) | |
| 1995 | ||
| 4 | Christian Cachin: On-Line Secret Sharing. IMA Conf. 1995: 190-198 | |
| 1994 | ||
| 3 | Christian Cachin, Ueli M. Maurer: Linking Information Reconciliation and Privacy Amplification (Extended Abstract). EUROCRYPT 1994: 266-274 | |
| 2 | Christian Cachin: Pedagogical pattern selection strategies. Neural Networks 7(1): 175-181 (1994) | |
| 1993 | ||
| 1 | Matthias Rauterberg, Christian Cachin: Locating the Primary Attention Focus of the User. VCHCI 1993: 129-140 | |