This picture showsDaniel Rausch

M.Sc.

Daniel Rausch

Ph.D. Student
Institute of Information Security

Contact

+49 711 685-88357

Universitaetsstrasse 38
70569 Stuttgart
Germany
Room: 2.458

  1. 2020

    1. Ralf Küsters, Daniel Rausch, and Mike Simon, “Accountability in a Permissioned Blockchain: Formal Analysis of Hyperledger Fabric,” Cryptology ePrint Archive, Technical Report 2020/386, 2020.
    2. Ralf Küsters, Julian Liedtke, Johannes Müller, Daniel Rausch, and Andreas Vogt, “Ordinos: A Verifiable Tally-Hiding Remote E-Voting System,” in IEEE European Symposium on Security and Privacy, EuroS&P 2020, 2020. To appear.
    3. Ralf Küsters, Daniel Rausch, and Mike Simon, “Accountability in a Permissioned Blockchain: Formal Analysis of Hyperledger Fabric,” in IEEE European Symposium on Security and Privacy, EuroS&P 2020, 2020. To appear.
    4. Ralf Küsters, Max Tuengerthal, and Daniel Rausch, “Joint State Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation,” Journal of Cryptology, 2020.
    5. Ralf Küsters, Max Tuengerthal, and Daniel Rausch, “The IITM Model: a Simple and Expressive Model for Universal Composability,” Journal of Cryptology, 2020.
  2. 2019

    1. Jan Camenisch, Stephan Krenn, Ralf Küsters, and Daniel Rausch, “iUC: Flexible Universal Composability Made Simple,” in Advances in Cryptology - ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part III, 2019, vol. 11923, pp. 191--221.
    2. Jan Camenisch, Stephan Krenn, Ralf Küsters, and Daniel Rausch, “iUC: Flexible Universal Composability Made Simple,” Cryptology ePrint Archive, Technical Report 2019/1037, 2019.
    3. Ralf Küsters, Julian Liedtke, Johannes Müller, Daniel Rausch, and Andreas Vogt, “Ordinos: A Verifiable Tally-Hiding Remote E-Voting System,” 2019.
  3. 2018

    1. Ralf Küsters, Max Tuengerthal, and Daniel Rausch, “The IITM Model: a Simple and Expressive Model for Universal Composability,” Cryptology ePrint Archive, Technical Report 2013/025, 2018. Available at http://eprint.iacr.org/2013/025/. This is an updated version of the technical report from 2013. Compared to the previous version, we added a discussion on Canetti’s UC model, version July 2013. We provided more examples of how the IITM model can be used. The actual model did not change at all.
  4. 2017

    1. Ralf Küsters and Daniel Rausch, “A Framework for Universally Composable Diffie-Hellman Key Exchange,” in IEEE 38th Symposium on Security and Privacy (S&P 2017), 2017, pp. 881--900.
    2. Ralf Küsters and Daniel Rausch, “A Framework for Universally Composable Diffie-Hellman Key Exchange,” Cryptology ePrint Archive, Technical Report 2017/256, 2017. Available at http://eprint.iacr.org/2017/256.
  5. 2016

    1. Jan Camenisch, Robert R. Enderlein, Stephan Krenn, Ralf Küsters, and Daniel Rausch, “Universal Composition with Responsive Environments,” in Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, 2016, pp. 807--840.
    2. Jan Camenisch, Robert R. Enderlein, Stephan Krenn, Ralf Küsters, and Daniel Rausch, “Universal Composition with Responsive Environments,” Cryptology ePrint Archive, Report 2016/034, 2016. Available at http://eprint.iacr.org/2016/034.

Are you a student and want to write a thesis / carry out a project at the SEC?

To the top of the page