Follow
Christoph Egger
Title
Cited by
Cited by
Year
Atomic multi-channel updates with constant collateral in bitcoin-compatible payment-channel networks
C Egger, P Moreno-Sanchez, M Maffei
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
1172019
Configuration coverage in the analysis of large-scale system software
R Tartler, D Lohmann, C Dietrich, C Egger, J Sincero
Proceedings of the 6th Workshop on Programming Languages and Operating …, 2011
1102011
Phoenix: Rebirth of a Cryptographic {Password-Hardening} Service
RWF Lai, C Egger, D Schröder, SSM Chow
26th USENIX Security Symposium (USENIX Security 17), 899-916, 2017
582017
Practical attacks against the I2P network
C Egger, J Schlumberger, C Kruegel, G Vigna
Research in Attacks, Intrusions, and Defenses: 16th International Symposium …, 2013
582013
Simple {Password-Hardened} Encryption Services
RWF Lai, C Egger, M Reinert, SSM Chow, M Maffei, D Schröder
27th USENIX Security Symposium (USENIX Security 18), 1405-1421, 2018
452018
A security framework for distributed ledgers
M Graf, D Rausch, V Ronge, C Egger, R Küsters, D Schröder
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
262021
Facing the linux 8000 feature nightmare
J Sincero, R Tartler, C Egger, W Schröder-Preikschat, D Lohmann
Proceedings of ACM European Conference on Computer Systems (EuroSys 2010 …, 2010
222010
Threshold password-hardened encryption services
J Brost, C Egger, RWF Lai, F Schmid, D Schröder, M Zoppelt
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
202020
Key-schedule security for the TLS 1.3 standard
C Brzuska, A Delignat-Lavaud, C Egger, C Fournet, K Kohbrok, ...
International Conference on the Theory and Application of Cryptology and …, 2022
152022
My genome belongs to me: controlling third party computation on genomic data
D Deuber, C Egger, K Fech, G Malavolta, D Schröder, SAK Thyagarajan, ...
Proceedings on Privacy Enhancing Technologies, 2019
142019
Foundations of ring sampling
V Ronge, C Egger, RWF Lai, D Schröder, HHF Yin
Proceedings on Privacy Enhancing Technologies, 2021
122021
Global Caching for the Alternation-free -Calculus
D Hausmann, L Schröder, C Egger
arXiv preprint arXiv:1609.06379, 2016
112016
On defeating graph analysis of anonymous transactions
C Egger, RWF Lai, V Ronge, IKY Woo, HHF Yin
arXiv preprint arXiv:2402.18755, 2024
82024
On sustainable ring-based anonymous systems
SSM Chow, C Egger, RWF Lai, V Ronge, IKY Woo
2023 IEEE 36th Computer Security Foundations Symposium (CSF), 568-583, 2023
62023
Instantiating the Hash-Then-Evaluate Paradigm: Strengthening PRFs, PCFs, and OPRFs
C Brzuska, G Couteau, C Egger, P Karanko, P Meyer
International Conference on Security and Cryptography for Networks, 97-116, 2024
4*2024
Controlling my genome with my smartphone: first clinical experiences of the PROMISE system
A Amr, M Hinderer, L Griebel, D Deuber, C Egger, F Sedaghat-Hamedani, ...
Clinical Research in Cardiology, 1-13, 2022
42022
The Patient as Genomic Data Manager–Evaluation of the PROMISE App
L Griebel, M Hinderer, A Amr, B Meder, M Schweig, D Deuber, C Egger, ...
Digital Personalized Health and Medicine, 1061-1065, 2020
22020
On abstraction and modularization in protocol analysis
C Egger
PQDT-Global, 2022
12022
CryptoZoo: A Viewer for Reduction Proofs
C Brzuska, C Egger, K Puniamurthy
International Conference on Applied Cryptography and Network Security, 3-25, 2024
2024
Methods for threshold password-hardened encryption and decryption
RWF Lai, D Schröder, C Egger, J Brost
US Patent 11,323,248, 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–20