Publikationsliste
Hartung, G. R.
Advanced Cryptographic Techniques for Protecting Log Data. Dissertation
2020, März 12. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000117650
Advanced Cryptographic Techniques for Protecting Log Data. Dissertation
2020, März 12. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000117650
Hartung, G.
Attacks on Secure Logging Schemes
2017. Financial Cryptography and Data Security, 21st International Conference, FC 2017, Revised Selected Papers, Sliema, Malta, 3rd - 7th April 2017. Ed.: A. Kiayias, 268–284, Springer. doi:10.1007/978-3-319-70972-7_14
Attacks on Secure Logging Schemes
2017. Financial Cryptography and Data Security, 21st International Conference, FC 2017, Revised Selected Papers, Sliema, Malta, 3rd - 7th April 2017. Ed.: A. Kiayias, 268–284, Springer. doi:10.1007/978-3-319-70972-7_14
Hartung, G.; Hoffman, M.; Nagel, M.; Rupp, A.
BBA+: Improving the Security and Applicability of Privacy-Preserving Point Collection
2017. 24th ACM Conference on Computer and Communications Security (ACM CCS 2017), Dallas, TX, October 30 - November 3, 2017, 1925–1942, Association for Computing Machinery (ACM). doi:10.1145/3133956.3134071
BBA+: Improving the Security and Applicability of Privacy-Preserving Point Collection
2017. 24th ACM Conference on Computer and Communications Security (ACM CCS 2017), Dallas, TX, October 30 - November 3, 2017, 1925–1942, Association for Computing Machinery (ACM). doi:10.1145/3133956.3134071
Hartung, G.; Kaidel, B.; Koch, A.; Koch, J.; Hartmann, D.
Practical and Robust Secure Logging from Fault-Tolerant Sequential Aggregate Signatures
2017. Provable Security, 11th International Conference, ProvSec 2017, Proceedings, Xi’an, China, 23rd - 25th October 2017. Ed.: T. Okamoto, 87–106, Springer. doi:10.1007/978-3-319-68637-0_6
Practical and Robust Secure Logging from Fault-Tolerant Sequential Aggregate Signatures
2017. Provable Security, 11th International Conference, ProvSec 2017, Proceedings, Xi’an, China, 23rd - 25th October 2017. Ed.: T. Okamoto, 87–106, Springer. doi:10.1007/978-3-319-68637-0_6
Hartung, G.
Secure Audit Logs with Verifiable Excerpts
2016. Topics in Cryptology - CT-RSA 2016 : The Cryptographers’ Track at the RSA Conference 2016, San Francisco, California, USA, 29th February - 4th March 2016. Ed.: K. Sako, 183–199, Springer International Publishing. doi:10.1007/978-3-319-29485-8_11
Secure Audit Logs with Verifiable Excerpts
2016. Topics in Cryptology - CT-RSA 2016 : The Cryptographers’ Track at the RSA Conference 2016, San Francisco, California, USA, 29th February - 4th March 2016. Ed.: K. Sako, 183–199, Springer International Publishing. doi:10.1007/978-3-319-29485-8_11
Hartung, G.; Kaidel, B.; Koch, A.; Koch, J.; Rupp, A.
Fault-Tolerant Aggregate Signatures
2016. 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, PKC 2016; Taipei; Taiwan; 6 March 2016 through 9 March 2016. Ed.: C.-M. Cheng, 331–356, Springer-Verlag. doi:10.1007/978-3-662-49384-7_13
Fault-Tolerant Aggregate Signatures
2016. 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, PKC 2016; Taipei; Taiwan; 6 March 2016 through 9 March 2016. Ed.: C.-M. Cheng, 331–356, Springer-Verlag. doi:10.1007/978-3-662-49384-7_13
Huber, M.; Hartung, G.
Side Channels in Secure Database Outsourcing on the Example of the MimoSecco Scheme
2014. Trusted Cloud Computing. Ed.: H. Krcmar, 35–48, Springer. doi:10.1007/978-3-319-12718-7_3
Side Channels in Secure Database Outsourcing on the Example of the MimoSecco Scheme
2014. Trusted Cloud Computing. Ed.: H. Krcmar, 35–48, Springer. doi:10.1007/978-3-319-12718-7_3
Titel | Typ | Semester |
---|---|---|
Digitale Signaturen | Vorlesung (V) | WS 14/15 |
Digitale Signaturen | Vorlesung (V) | WS 15/16 |
Digitale Signaturen | Vorlesung (V) | WS 15/16 |
Digitale Signaturen | Vorlesung (V) | WS 16/17 |
Die Logik der Sicherheit | Seminar (S) | SS 2016 |
Digitale Signaturen | Seminar (S) | SS 2015 |
Kryptographie in Medien und Alltag | Seminar (S) | SS 2014 |
Praxis der Forschung: Kryptographie und Sicherheit | Projektgruppe (Pg) | SS 2016 |
Praxis der Forschung: Kryptographie und Sicherheit | Projektgruppe (Pg) | WS 15/16 |
Praktikum Anwendungssicherheit | Praktikum (P) | SS 2017 |
Praktikum Anwendungssicherheit | Praktikum (P) | SS 2019 |
Praktikum Anwendungssicherheit | Praktikum (P) | SS 2020 |
Praktikum Anwendungssicherheit | Praktikum (P) | WS 16/17 |
Praktikum Anwendungssicherheit | Praktikum (P) | WS 18/19 |
Praktikum Anwendungssicherheit | Praktikum (P) | WS 19/20 |
Praktikum Sicherheit | WS 15/16 |