M.Sc.

Daniel Rausch

Ph.D. Student
Institute of Information Security

Contact

+49 711 685-88357

Universitaetsstrasse 38
70569 Stuttgart
Germany
Room: 2.458

  1. 2019

    1. J. Camenisch, S. Krenn, R. Küsters, and D. Rausch, “iUC: Flexible Universal Composability Made Simple,” Advances in Cryptology - ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, 2019.
    2. J. Camenisch, S. Krenn, R. Küsters, and D. Rausch, “iUC: Flexible Universal Composability Made Simple,” Cryptology ePrint Archive, Technical Report 2019/1037, 2019.
    3. R. Küsters, J. Liedtke, J. Müller, D. Rausch, and A. Vogt, “Ordinos: A Verifiable Tally-Hiding Remote E-Voting System,” 2019.
    4. R. Küsters, M. Tuengerthal, and D. Rausch, “Joint State Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation,” Journal of Cryptology, 2019. To appear. See also https://eprint.iacr.org/2008/006 for the technical report.
    5. R. Küsters, M. Tuengerthal, and D. Rausch, “The IITM Model: a Simple and Expressive Model for Universal Composability,” Journal of Cryptology, 2019. To appear. See also https://eprint.iacr.org/2013/025 for the technical report.
  2. 2018

    1. R. Küsters, M. Tuengerthal, and D. Rausch, “The IITM Model: a Simple and Expressive Model for Universal Composability,” Cryptology ePrint Archive, Technical Report 2013/025, 2018. Available at http://eprint.iacr.org/2013/025/. This is an updated version of the technical report from 2013. Compared to the previous version, we added a discussion on Canetti’s UC model, version July 2013. We provided more examples of how the IITM model can be used. The actual model did not change at all.
  3. 2017

    1. R. Küsters and D. Rausch, “A Framework for Universally Composable Diffie-Hellman Key Exchange,” in IEEE 38th Symposium on Security and Privacy (S&P 2017), 2017, pp. 881--900.
    2. R. Küsters and D. Rausch, “A Framework for Universally Composable Diffie-Hellman Key Exchange,” Cryptology ePrint Archive, Technical Report 2017/256, 2017. Available at http://eprint.iacr.org/2017/256.
  4. 2016

    1. J. Camenisch, R. R. Enderlein, S. Krenn, R. Küsters, and D. Rausch, “Universal Composition with Responsive Environments,” in Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, 2016, pp. 807--840.
    2. J. Camenisch, R. R. Enderlein, S. Krenn, R. Küsters, and D. Rausch, “Universal Composition with Responsive Environments,” Cryptology ePrint Archive, Report 2016/034, 2016. Available at http://eprint.iacr.org/2016/034.

Are you a student and want to write a thesis / carry out a project at the SEC?

To the top of the page