Dr. Jeremias Mechler

Forschungsinteressen

Publikationsliste


Mechler, J.
Frameworks and Protocols for Composable Multi-Party Computation. Dissertation
2024, September 30. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000174597
Bayreuther, S.; Berger, R.; Dörre, F.; Mechler, J.; Müller-Quade, J.
HiddenΔ-Fairness: A Novel Notion for Fair Secure Two-Party Computation
2024. Information Security and Privacy. Ed.: T. Zhu. Pt. 2, 330–349, Springer Nature Singapore. doi:10.1007/978-981-97-5028-3_17
Bayreuther, S.; Berger, R.; Dörre, F.; Mechler, J.; Müller-Quade, J.
Hidden ∆-fairness: A Novel Notion for Fair Secure: Two-Party Computation
2024. 36. Kryptotag, 2 S., Gesellschaft für Informatik (GI). doi:10.18420/cdm-2024-36-32
Bayreuther, S.; Berger, R.; Dörre, F.; Mechler, J.; Müller-Quade, J.
Hidden -fairness: A Novel Notion for Fair Secure Two-Party Computation
2024. Cryptology ePrint Archive
Berger, R.; Broadnax, B.; Klooß, M.; Mechler, J.; Müller-Quade, J.; Ottenhues, A.; Raiber, M.
Composable Long-Term Security with Rewinding
2023. Theory of Cryptography – 21st International Conference, TCC 2023, Taipei, Taiwan, November 29–December 2, 2023, Proceedings, Part IV. Ed.: G. Rothblum, 510 – 541, Springer Nature Switzerland. doi:10.1007/978-3-031-48624-1_19
Dörre, F.; Mechler, J.; Müller-Quade, J.
Practically Efficient Private Set Intersection From Trusted Hardware with Side-Channels
2023. Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Springer-Verlag. doi:10.1007/978-981-99-8730-6_9
Berger, R. M.; Broadnax, B.; Klooß, M.; Mechler, J.; Müller-Quade, J.; Ottenhues, A.; Raiber, M.
Composable Long-Term Security with Rewinding
2023. Theory of Cryptography. 21th International Conference, TCC 2023. Proceedings, Part 1. Ed.: G. Rothblum, Springer-Verlag
Doerner, D.; Mechler, J.; Müller-Quade, J.
Hardening the Security of Server-Aided MPC Using Remotely Unhackable Hardware Modules
2022. GI SICHERHEIT 2022, Ed.: C. Wressnegger, 83–99, Gesellschaft für Informatik (GI). doi:10.18420/sicherheit2022_05
Broadnax, B.; Koch, A.; Mechler, J.; Müller, T.; Müller-Quade, J.; Nagel, M.
Fortified Multi-Party Computation: Taking Advantage of Simple Secure Hardware Modules
2021. Proceedings on privacy enhancing technologies, 2021 (4), 312–338. doi:10.2478/popets-2021-0072
Broadnax, B.; Mechler, J.; Müller-Quade, J.
Environmentally Friendly Composable Multi-party Computation in the Plain Model from Standard (Timed) Assumptions
2021. Theory of Cryptography – 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021, Proceedings, Part I. Ed.: K. Nissim, 750–781, Springer International Publishing. doi:10.1007/978-3-030-90459-3_25
Achenbach, D.; Gröll, R.; Hackenjos, T.; Koch, A.; Löwe, B.; Mechler, J.; Müller-Quade, J.; Rill, J.
Your Money or Your Life—Modeling and Analyzing the Security of Electronic Payment in the UC Framework
2019. Financial Cryptography and Data Security – 23rd International Conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18–22, 2019, Revised Selected Papers. Ed.: I. Goldberg, 243–261, Springer International Publishing. doi:10.1007/978-3-030-32101-7_16
Mechler, J.; Müller-Quade, J.; Nilges, T.
Reusing Tamper-Proof Hardware in UC-Secure Protocols
2018. Public-Key Cryptography – PKC 2018. 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25–29, 2018. Proceedings, Part I. Ed.: M. Abdalla, 463–493, Springer International Publishing. doi:10.1007/978-3-319-76578-5_16
Hackenjos, T.; Mechler, J.; Rill, J.
IT-Sicherheit - ein rechtsfreier Raum?
2018. Datenschutz und Datensicherheit, 42 (5), 286–290. doi:10.1007/s11623-018-0942-0
Broadnax, B.; Löwe, B.; Mechler, J.; Müller-Quade, J.; Nagel, M.
Sicherheit auf festem Fundament – Starke Sicherheit durch vertrauenswürdige Hardware
2018. Datenschutz und Datensicherheit, 42 (2), 74–78. doi:10.1007/s11623-018-0897-1
Broadnax, B.; Mechler, J.; Müller-Quade, J.; Nagel, M.; Rill, J.
Sicherheit relativ definieren
2017. Datenschutz und Datensicherheit. doi:10.1007/s11623-017-0720-4
Papatheocharous, E.; Mantzouratos, S.; Gouvas, P.; Schiefer, G.; Schork, S. T.; Abdelraheem, M. A.; Mechler, J.; Gabel, M.; Moldovan, G.; Yurchenko, K.; Carnehult, T.
PaaSword: A Data Privacy and Context-aware Security Framework for Developing Secure Cloud Applications - Technical and Scientific Contributions
2017. European Space Projects: Developments, Implementations and Impacts in a Changing World (EPS), 2017, 3-27, Porto, Portugal. Vol.: 1, 3–27, SciTePress. doi:10.5220/0007901500030027
Schiefer, G.; Gabel, M.; Mechler, J.; Schoknecht, A.; Citak, M.
Security in a Distributed Key Management Approach
2017. Proceedings of the 2017 IEEE 30th International Symposium on Computer-Based Medical Systems (CBMS), Thessaloniki, Greece, 22nd - 24th June 2017, 816–821, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/CBMS.2017.151
Gabel, M.; Mechler, J.
Secure Database Outsourcing to the Cloud : Side-Channels, Counter-Measures and Trusted Execution
2017. Proceedings of the 2017 IEEE 30th International Symposium on Computer-Based Medical Systems (CBMS), Thessaloniki, Greece, 22nd - 24th June 2017, 799–804, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/CBMS.2017.141