What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Doreen Riepel
Google Scholar
ORCID:
0000-0002-4990-0929
19
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/pkc
Public-Algorithm Substitution Attacks: Subverting Hashing and Verification.
Mihir Bellare
Doreen Riepel
Laura Shea
2025
conf/pkc
Intermundium-DL: Assessing the Resilience of Current Schemes to Discrete-Log-Computation Attacks on Public Parameters.
Mihir Bellare
Doreen Riepel
Laura Shea
2025
journals/tches
ABE Cubed: Advanced Benchmarking Extensions for ABE Squared.
Sven Argo
Marloes Venema
Doreen Riepel
Tim Güneysu
Diego F. Aranha
2024
conf/ccs
On the Tight Security of the Double Ratchet.
Daniel Collins
Doreen Riepel
Si An Oliver Tran
2024
conf/ccs
ISABELLA: Improving Structures of Attribute-Based Encryption Leveraging Linear Algebra.
Doreen Riepel
Marloes Venema
Tanya Verma
2024
conf/eurocrypt
Key Exchange with Tight (Full) Forward Secrecy via Key Confirmation.
Jiaxin Pan
Doreen Riepel
Runzhi Zeng
2024
conf/asiacrypt
Count Corruptions, Not Users: Improved Tightness for Signatures, Encryption and Authenticated Key Exchange.
Mihir Bellare
Doreen Riepel
Stefano Tessaro
Yizhao Zhang
2024
conf/asiacrypt
The Concrete Security of Two-Party Computation: Simple Definitions, and Tight Proofs for PSI and OPRFs.
Mihir Bellare
Rishabh Ranjan
Doreen Riepel
Ali Aldakheel
2024
conf/asiacrypt
Tightly-Secure Group Key Exchange with Perfect Forward Secrecy.
Emanuele Di Giandomenico
Doreen Riepel
Sven Schäge
2023
conf/uss
No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning.
Thorsten Eisenhofer
Erwin Quiring
Jonas Möller
Doreen Riepel
Thorsten Holz
Konrad Rieck
2023
conf/pkc
Generic Models for Group Actions.
Julien Duman
Dominik Hartmann
Eike Kiltz
Sabrina Kunzweiler
Jonas Lehmann
Doreen Riepel
2023
conf/ctrsa
Multi-user CDH Problems and the Concrete Security of NAXOS and HMQV.
Eike Kiltz
Jiaxin Pan
Doreen Riepel
Magnus Ringerud
2022
conf/ccs
FABEO: Fast Attribute-Based Encryption with Optimal Security.
Doreen Riepel
Hoeteck Wee
2022
conf/crypto
Password-Authenticated Key Exchange from Group Actions.
Michel Abdalla
Thorsten Eisenhofer
Eike Kiltz
Sabrina Kunzweiler
Doreen Riepel
2022
conf/asiacrypt
Group Action Key Encapsulation and Non-Interactive Key Exchange in the QROM.
Julien Duman
Dominik Hartmann
Eike Kiltz
Sabrina Kunzweiler
Jonas Lehmann
Doreen Riepel
2022
conf/asiacrypt
Strongly Anonymous Ratcheted Key Exchange.
Benjamin Dowling
Eduard Hauck
Doreen Riepel
Paul Rösler
2021
conf/crypto
Authenticated Key Exchange and Signatures with Tight Security in the Standard Model.
Shuai Han
Tibor Jager
Eike Kiltz
Shengli Liu
Jiaxin Pan
Doreen Riepel
Sven Schäge
2021
conf/eurocrypt
Tightly-Secure Authenticated Key Exchange, Revisited.
Tibor Jager
Eike Kiltz
Doreen Riepel
Sven Schäge
2021
conf/eurocrypt
Analysing the HPKE Standard.
Joël Alwen
Bruno Blanchet
Eduard Hauck
Eike Kiltz
Benjamin Lipp
Doreen Riepel
Coauthors
Ali Aldakheel
(1)
Benjamin Dowling
(1)
Benjamin Lipp
(1)
Bruno Blanchet
(1)
Daniel Collins
(1)
Diego F. Aranha
(1)
Dominik Hartmann
(2)
Doreen Riepel
(19)
Eduard Hauck
(2)
Eike Kiltz
(7)
Emanuele Di Giandomenico
(1)
Erwin Quiring
(1)
Hoeteck Wee
(1)
Jiaxin Pan
(3)
Joël Alwen
(1)
Jonas Lehmann
(2)
Jonas Möller
(1)
Julien Duman
(2)
Konrad Rieck
(1)
Laura Shea
(2)
Magnus Ringerud
(1)
Marloes Venema
(2)
Michel Abdalla
(1)
Mihir Bellare
(4)
Paul Rösler
(1)
Rishabh Ranjan
(1)
Runzhi Zeng
(1)
Sabrina Kunzweiler
(3)
Shengli Liu
(1)
Shuai Han
(1)
Si An Oliver Tran
(1)
Stefano Tessaro
(1)
Sven Argo
(1)
Sven Schäge
(3)
Tanya Verma
(1)
Thorsten Eisenhofer
(2)
Thorsten Holz
(1)
Tibor Jager
(2)
Tim Güneysu
(1)
Yizhao Zhang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to