default search action
Jeremias Mechler
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c10]Saskia Bayreuther, Robin Berger, Felix Dörre, Jeremias Mechler, Jörn Müller-Quade:
Hidden $\varDelta $-Fairness: A Novel Notion for Fair Secure Two-Party Computation. ACISP (2) 2024: 330-349 - [i6]Saskia Bayreuther, Robin Berger, Felix Dörre, Jeremias Mechler, Jörn Müller-Quade:
Hidden Δ-fairness: A Novel Notion for Fair Secure Two-Party Computation. IACR Cryptol. ePrint Arch. 2024: 587 (2024) - 2023
- [c9]Felix Dörre, Jeremias Mechler, Jörn Müller-Quade:
Practically Efficient Private Set Intersection from Trusted Hardware with Side-Channels. ASIACRYPT (4) 2023: 268-301 - [c8]Robin Berger, Brandon Broadnax, Michael Klooß, Jeremias Mechler, Jörn Müller-Quade, Astrid Ottenhues, Markus Raiber:
Composable Long-Term Security with Rewinding. TCC (4) 2023: 510-541 - [i5]Robin Berger, Brandon Broadnax, Michael Klooß, Jeremias Mechler, Jörn Müller-Quade, Astrid Ottenhues, Markus Raiber:
Composable Long-Term Security with Rewinding. IACR Cryptol. ePrint Arch. 2023: 363 (2023) - 2022
- [c7]Dominik Doerner, Jeremias Mechler, Jörn Müller-Quade:
Hardening the Security of Server-Aided MPC Using Remotely Unhackable Hardware Modules. Sicherheit 2022: 83-99 - 2021
- [j4]Brandon Broadnax, Alexander Koch, Jeremias Mechler, Tobias Müller, Jörn Müller-Quade, Matthias Nagel:
Fortified Multi-Party Computation: Taking Advantage of Simple Secure Hardware Modules. Proc. Priv. Enhancing Technol. 2021(4): 312-338 (2021) - [c6]Brandon Broadnax, Jeremias Mechler, Jörn Müller-Quade:
Environmentally Friendly Composable Multi-party Computation in the Plain Model from Standard (Timed) Assumptions. TCC (1) 2021: 750-781 - [i4]Brandon Broadnax, Jeremias Mechler, Jörn Müller-Quade:
Environmentally Friendly Composable Multi-Party Computation in the Plain Model from Standard (Timed) Assumptions. IACR Cryptol. ePrint Arch. 2021: 843 (2021) - 2020
- [c5]Jörn Müller-Quade, Roger Gutbrod, Volkmar Lotz, Fabian Biegel, Benny Fuhry, Jeremias Mechler:
SES-14: Sichere und zuverlässliche Systeme: Datensouveränität. GI-Jahrestagung 2020: 111-113
2010 – 2019
- 2019
- [c4]Dirk Achenbach, Roland Gröll, Timon Hackenjos, Alexander Koch, Bernhard Löwe, Jeremias Mechler, Jörn Müller-Quade, Jochen Rill:
Your Money or Your Life - Modeling and Analyzing the Security of Electronic Payment in the UC Framework. Financial Cryptography 2019: 243-261 - [i3]Dirk Achenbach, Roland Gröll, Timon Hackenjos, Alexander Koch, Bernhard Löwe, Jeremias Mechler, Jörn Müller-Quade, Jochen Rill:
Your Money or Your Life - Modeling and Analyzing the Security of Electronic Payment in the UC Framework. IACR Cryptol. ePrint Arch. 2019: 924 (2019) - 2018
- [j3]Brandon Broadnax, Bernhard Löwe, Jeremias Mechler, Jörn Müller-Quade, Matthias Nagel:
Sicherheit auf festem Fundament. Datenschutz und Datensicherheit 42(2): 74-78 (2018) - [j2]Timon Hackenjos, Jeremias Mechler, Jochen Rill:
IT-Sicherheit - ein rechtsfreier Raum? Datenschutz und Datensicherheit 42(5): 286-290 (2018) - [c3]Jeremias Mechler, Jörn Müller-Quade, Tobias Nilges:
Reusing Tamper-Proof Hardware in UC-Secure Protocols. Public Key Cryptography (1) 2018: 463-493 - [i2]Brandon Broadnax, Alexander Koch, Jeremias Mechler, Tobias Müller, Jörn Müller-Quade, Matthias Nagel:
Fortified Universal Composability: Taking Advantage of Simple Secure Hardware Modules. IACR Cryptol. ePrint Arch. 2018: 519 (2018) - 2017
- [j1]Brandon Broadnax, Jeremias Mechler, Jörn Müller-Quade, Matthias Nagel, Jochen Rill:
Sicherheit relativ definieren. Datenschutz und Datensicherheit 41(1): 24-28 (2017) - [c2]Matthias Gabel, Jeremias Mechler:
Secure Database Outsourcing to the Cloud: Side-Channels, Counter-Measures and Trusted Execution. CBMS 2017: 799-804 - [c1]Gunther Schiefer, Matthias Gabel, Jeremias Mechler, Andreas Schoknecht, Murat Çitak:
Security in a Distributed Key Management Approach. CBMS 2017: 816-821 - 2016
- [i1]Jeremias Mechler, Jörn Müller-Quade, Tobias Nilges:
Universally Composable (Non-Interactive) Two-Party Computation from Untrusted Reusable Hardware Tokens. IACR Cryptol. ePrint Arch. 2016: 615 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 21:35 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint