What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Andy Rupp
Google Scholar
ORCID:
0000-0003-0439-3633
26
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/cic
POBA: Privacy-Preserving Operator-Side Bookkeeping and Analytics.
Dennis Faut
Valerie Fetzer
Jörn Müller-Quade
Markus Raiber
Andy Rupp
2025
conf/eurosp
Scalable and Fine-Tuned Privacy Pass from Group Verifiable Random Functions.
Dennis Faut
Julia Hesse
Lisa Kohl
Andy Rupp
2024
journals/popets
Why Privacy-Preserving Protocols Are Sometimes Not Enough: A Case Study of the Brisbane Toll Collection Infrastructure.
Amirhossein Adavoudi Jolfaei
Andy Rupp
Stefan Schiffner
Thomas Engel
2023
conf/asiacrypt
Universally Composable Auditable Surveillance.
Valerie Fetzer
Michael Klooß
Jörn Müller-Quade
Markus Raiber
Andy Rupp
2022
journals/popets
PUBA: Privacy-Preserving User-Data Bookkeeping and Analytics.
Valerie Fetzer
Marcel Keller
Sven Maier
Markus Raiber
Andy Rupp
Rebecca Schwerdt
2021
conf/asiacrypt
Onion Routing with Replies.
Christiane Kuhn
Dennis Hofheinz
Andy Rupp
Thorsten Strufe
2020
journals/popets
Black-Box Wallets: Fast Anonymous Two-Way Payments for Constrained Devices.
Max Hoffmann
Michael Klooß
Markus Raiber
Andy Rupp
2020
journals/popets
P4TC - Provably-Secure yet Practical Privacy-Preserving Toll Collection.
Valerie Fetzer
Max Hoffmann
Matthias Nagel
Andy Rupp
Rebecca Schwerdt
2019
conf/ccs
Efficient Zero-Knowledge Arguments in the Discrete Log Setting, Revisited.
Max Hoffmann
Michael Klooß
Andy Rupp
2019
conf/eurocrypt
(R)CCA Secure Updatable Encryption with Integrity Protection.
Michael Klooß
Anja Lehmann
Andy Rupp
2018
conf/pkc
Non-malleability vs. CCA-Security: The Case of Commitments.
Brandon Broadnax
Valerie Fetzer
Jörn Müller-Quade
Andy Rupp
2017
conf/ccs
New Techniques for Structural Batch Verification in Bilinear Groups with Applications to Groth-Sahai Proofs.
Gottfried Herold
Max Hoffmann
Michael Klooß
Carla Ràfols
Andy Rupp
2017
conf/ccs
BBA+: Improving the Security and Applicability of Privacy-Preserving Point Collection.
Gunnar Hartung
Max Hoffmann
Matthias Nagel
Andy Rupp
2016
journals/popets
Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way.
Tibor Jager
Andy Rupp
2016
conf/pkc
Fault-Tolerant Aggregate Signatures.
Gunnar Hartung
Björn Kaidel
Alexander Koch
Jessica Koch
Andy Rupp
2016
conf/tcc
Reconfigurable Cryptography: A Flexible Approach to Long-Term Security.
Julia Hesse
Dennis Hofheinz
Andy Rupp
2016
conf/tcc
Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts.
Dennis Hofheinz
Tibor Jager
Andy Rupp
2014
conf/crypto
Polynomial Spaces: A New Framework for Composite-to-Prime-Order Transformations.
Gottfried Herold
Julia Hesse
Dennis Hofheinz
Carla Ràfols
Andy Rupp
2014
conf/tcc
Standard versus Selective Opening Security: Separation and Equivalence Results.
Dennis Hofheinz
Andy Rupp
2013
conf/fc
P4R: Privacy-Preserving Pre-Payments with Refunds for Transportation Systems.
Andy Rupp
Gesine Hinterwälder
Foteini Baldimtsi
Christof Paar
2010
conf/asiacrypt
The Semi-Generic Group Model and Applications to Pairing-Based Cryptography.
Tibor Jager
Andy Rupp
2008
conf/ches
Time-Area Optimized Public-Key Engines: -Cryptosystems as Replacement for Elliptic Curves?.
Andrey Bogdanov
Thomas Eisenbarth
Andy Rupp
Christopher Wolf
2008
conf/ches
A Real-World Attack Breaking A5/1 within Hours.
Timo Gendrullis
Martin Novotný
Andy Rupp
2008
conf/asiacrypt
Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems.
Andy Rupp
Gregor Leander
Endre Bangerter
Alexander W. Dent
Ahmad-Reza Sadeghi
2007
conf/ches
A Hardware-Assisted Realtime Attack on A5/2 Without Precomputations.
Andrey Bogdanov
Thomas Eisenbarth
Andy Rupp
2006
conf/asiacrypt
On the Equivalence of RSA and Factoring Regarding Generic Ring Algorithms.
Gregor Leander
Andy Rupp
Coauthors
Ahmad-Reza Sadeghi
(1)
Alexander Koch
(1)
Alexander W. Dent
(1)
Amirhossein Adavoudi Jolfaei
(1)
Andrey Bogdanov
(2)
Andy Rupp
(26)
Anja Lehmann
(1)
Björn Kaidel
(1)
Brandon Broadnax
(1)
Carla Ràfols
(2)
Christiane Kuhn
(1)
Christof Paar
(1)
Christopher Wolf
(1)
Dennis Faut
(2)
Dennis Hofheinz
(5)
Endre Bangerter
(1)
Foteini Baldimtsi
(1)
Gesine Hinterwälder
(1)
Gottfried Herold
(2)
Gregor Leander
(2)
Gunnar Hartung
(2)
Jessica Koch
(1)
Jörn Müller-Quade
(3)
Julia Hesse
(3)
Lisa Kohl
(1)
Marcel Keller
(1)
Markus Raiber
(4)
Martin Novotný
(1)
Matthias Nagel
(2)
Max Hoffmann
(5)
Michael Klooß
(5)
Rebecca Schwerdt
(2)
Stefan Schiffner
(1)
Sven Maier
(1)
Thomas Eisenbarth
(2)
Thomas Engel
(1)
Thorsten Strufe
(1)
Tibor Jager
(3)
Timo Gendrullis
(1)
Valerie Fetzer
(5)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to