Follow
Julia Hesse
Julia Hesse
IBM Research - Zurich
Verified email at zurich.ibm.com - Homepage
Title
Cited by
Cited by
Year
Multi-party virtual state channels
S Dziembowski, L Eckey, S Faust, J Hesse, K Hostáková
Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference …, 2019
1002019
Fuzzy password-authenticated key exchange
PA Dupont, J Hesse, D Pointcheval, L Reyzin, S Yakoubov
Annual International Conference on the Theory and Applications of …, 2018
522018
PESTO: proactively secure distributed single sign-on, or how to trust a hacked server
C Baum, T Frederiksen, J Hesse, A Lehmann, A Yanai
2020 IEEE European Symposium on Security and Privacy (EuroS&P), 587-606, 2020
432020
Polynomial spaces: A new framework for composite-to-prime-order transformations
G Herold, J Hesse, D Hofheinz, C Ràfols, A Rupp
Advances in Cryptology–CRYPTO 2014: 34th Annual Cryptology Conference, Santa …, 2014
382014
SoK: oblivious pseudorandom functions
S Casacuberta, J Hesse, A Lehmann
2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P), 625-646, 2022
342022
Universal composition with global subroutines: Capturing global setup within plain UC
C Badertscher, R Canetti, J Hesse, B Tackmann, V Zikas
Theory of Cryptography Conference, 1-30, 2020
332020
Security analysis of CPace
M Abdalla, B Haase, J Hesse
International Conference on the Theory and Application of Cryptology and …, 2021
292021
On tightly secure non-interactive key exchange
J Hesse, D Hofheinz, L Kohl
Annual International Cryptology Conference, 65-94, 2018
272018
Universally composable non-interactive key exchange
ESV Freire, J Hesse, D Hofheinz
Security and Cryptography for Networks: 9th International Conference, SCN …, 2014
222014
Fastzip: Faster and more secure zero-interaction pairing
M Fomichev, J Hesse, L Almon, T Lippert, J Han, M Hollick
Proceedings of the 19th Annual International Conference on Mobile Systems …, 2021
202021
Graded encoding schemes from obfuscation
P Farshim, J Hesse, D Hofheinz, E Larraia
Public-Key Cryptography–PKC 2018: 21st IACR International Conference on …, 2018
202018
Fuzzy asymmetric password-authenticated key exchange
A Erwig, J Hesse, M Orlt, S Riahi
Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the …, 2020
182020
CPace, a balanced composable PAKE
M Abdalla, B Haase, J Hesse
IETF draft-irtf-cfrg-cpace-05, 2022
162022
DPaSE: distributed password-authenticated symmetric-key encryption, or how to get many keys from one password
P Das, J Hesse, A Lehmann
Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022
142022
Security analysis of the whatsapp end-to-end encrypted backup protocol
GT Davies, S Faller, K Gellert, T Handirk, J Hesse, M Horváth, T Jager
Annual International Cryptology Conference, 330-361, 2023
112023
Separating symmetric and asymmetric password-authenticated key exchange
J Hesse
International Conference on Security and Cryptography for Networks, 579-599, 2020
112020
Reconfigurable Cryptography: A flexible approach to long-term security
J Hesse, D Hofheinz, A Rupp
Theory of Cryptography Conference, 416-445, 2015
82015
Generalized fuzzy password-authenticated key exchange from error correcting codes
J Bootle, S Faller, J Hesse, K Hostáková, J Ottenhues
International Conference on the Theory and Application of Cryptology and …, 2023
62023
Password-authenticated tls via opaque and post-handshake authentication
J Hesse, S Jarecki, H Krawczyk, C Wood
Annual International Conference on the Theory and Applications of …, 2023
62023
Towards tight adaptive security of non-interactive key exchange
J Hesse, D Hofheinz, L Kohl, R Langrehr
Theory of Cryptography: 19th International Conference, TCC 2021, Raleigh, NC …, 2021
62021
The system can't perform the operation now. Try again later.
Articles 1–20