


default search action
Christoph Egger 0001
Person information
- affiliation: Chalmers University of Technology, Sweden
- affiliation (former): Friedrich-Alexander Universität Erlangen-Nürnberg, Germany
Other persons with the same name
- Christoph Egger 0002 — Technische Universität Wien, Austria
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c14]Chris Brzuska, Christoph Egger
, Kirthivaasan Puniamurthy:
CryptoZoo: A Viewer for Reduction Proofs. ACNS (1) 2024: 3-25 - [c13]Chris Brzuska, Geoffroy Couteau, Christoph Egger
, Pihla Karanko, Pierre Meyer:
Instantiating the Hash-Then-Evaluate Paradigm: Strengthening PRFs, PCFs, and OPRFs. SCN (2) 2024: 97-116 - [c12]Chris Brzuska, Geoffroy Couteau, Christoph Egger
, Willy Quach:
On Bounded Storage Key Agreement and One-Way Functions. TCC (1) 2024: 287-318 - [i11]Christoph Egger, Russell W. F. Lai, Viktoria Ronge, Ivy K. Y. Woo, Hoover H. F. Yin
:
On Defeating Graph Analysis of Anonymous Transactions. CoRR abs/2402.18755 (2024) - 2023
- [b1]Christoph Egger:
On Abstraction and Modularization in Protocol Analysis. University of Erlangen-Nuremberg, Germany, 2023 - [c11]Sherman S. M. Chow, Christoph Egger
, Russell W. F. Lai
, Viktoria Ronge, Ivy K. Y. Woo
:
On Sustainable Ring-Based Anonymous Systems. CSF 2023: 568-583 - [i10]Sherman S. M. Chow, Christoph Egger, Russell W. F. Lai, Viktoria Ronge, Ivy K. Y. Woo:
On Sustainable Ring-based Anonymous Systems. IACR Cryptol. ePrint Arch. 2023: 743 (2023) - [i9]Chris Brzuska, Geoffroy Couteau, Christoph Egger
, Pihla Karanko, Pierre Meyer:
New Random Oracle Instantiations from Extremely Lossy Functions. IACR Cryptol. ePrint Arch. 2023: 1145 (2023) - [i8]Chris Brzuska, Christoph Egger, Kirthivaasan Puniamurthy:
CryptoZoo: A Viewer for Reduction Proofs. IACR Cryptol. ePrint Arch. 2023: 1581 (2023) - 2022
- [j4]Christoph Egger
, Russell W. F. Lai
, Viktoria Ronge, Ivy K. Y. Woo
, Hoover H. F. Yin
:
On Defeating Graph Analysis of Anonymous Transactions. Proc. Priv. Enhancing Technol. 2022(3): 538-557 (2022) - [c10]Chris Brzuska, Antoine Delignat-Lavaud, Christoph Egger
, Cédric Fournet, Konrad Kohbrok, Markulf Kohlweiss
:
Key-Schedule Security for the TLS 1.3 Standard. ASIACRYPT (1) 2022: 621-650 - [i7]Christoph Egger, Russell W. F. Lai, Viktoria Ronge, Ivy K. Y. Woo, Hoover H. F. Yin:
On Defeating Graph Analysis of Anonymous Transactions. IACR Cryptol. ePrint Arch. 2022: 132 (2022) - 2021
- [j3]Viktoria Ronge, Christoph Egger
, Russell W. F. Lai
, Dominique Schröder, Hoover H. F. Yin
:
Foundations of Ring Sampling. Proc. Priv. Enhancing Technol. 2021(3): 265-288 (2021) - [c9]Mike Graf
, Daniel Rausch, Viktoria Ronge, Christoph Egger
, Ralf Küsters, Dominique Schröder
:
A Security Framework for Distributed Ledgers. CCS 2021: 1043-1064 - [i6]Christoph Egger, Mike Graf
, Ralf Küsters, Daniel Rausch, Viktoria Ronge, Dominique Schröder:
A Security Framework for Distributed Ledgers. IACR Cryptol. ePrint Arch. 2021: 145 (2021) - [i5]Chris Brzuska, Antoine Delignat-Lavaud, Christoph Egger, Cédric Fournet, Konrad Kohbrok, Markulf Kohlweiss:
Key-schedule Security for the TLS 1.3 Standard. IACR Cryptol. ePrint Arch. 2021: 467 (2021) - 2020
- [c8]Julian Brost, Christoph Egger
, Russell W. F. Lai
, Fritz Schmid, Dominique Schröder
, Markus Zoppelt:
Threshold Password-Hardened Encryption Services. CCS 2020: 409-424 - [c7]Lena Griebel, Marc Hinderer, Ali Amr, Benjamin Meder, Marc Schweig, Dominic Deuber
, Christoph Egger
, Claudia Kawohl, Annika Krämer, Isabell Flade, Dominique Schröder
, Hans-Ulrich Prokosch:
The Patient as Genomic Data Manager - Evaluation of the PROMISE App. MIE 2020: 1061-1065 - [i4]Viktoria Ronge, Christoph Egger, Russell W. F. Lai, Dominique Schröder, Hoover H. F. Yin:
Foundations of Ring Sampling. IACR Cryptol. ePrint Arch. 2020: 1550 (2020) - [i3]Julian Brost, Christoph Egger, Russell W. F. Lai, Fritz Schmid, Dominique Schröder, Markus Zoppelt:
Threshold Password-Hardened Encryption Services. IACR Cryptol. ePrint Arch. 2020: 1552 (2020)
2010 – 2019
- 2019
- [j2]Dominic Deuber
, Christoph Egger
, Katharina Fech, Giulio Malavolta
, Dominique Schröder, Sri Aravinda Krishnan Thyagarajan
, Florian Battke
, Claudia Durand:
My Genome Belongs to Me: Controlling Third Party Computation on Genomic Data. Proc. Priv. Enhancing Technol. 2019(1): 108-132 (2019) - [c6]Christoph Egger
, Pedro Moreno-Sanchez
, Matteo Maffei:
Atomic Multi-Channel Updates with Constant Collateral in Bitcoin-Compatible Payment-Channel Networks. CCS 2019: 801-815 - [i2]Christoph Egger, Pedro Moreno-Sanchez
, Matteo Maffei:
Atomic Multi-Channel Updates with Constant Collateral in Bitcoin-Compatible Payment-Channel Networks. IACR Cryptol. ePrint Arch. 2019: 583 (2019) - 2018
- [c5]Russell W. F. Lai, Christoph Egger, Manuel Reinert, Sherman S. M. Chow, Matteo Maffei, Dominique Schröder:
Simple Password-Hardened Encryption Services. USENIX Security Symposium 2018: 1405-1421 - 2017
- [c4]Russell W. F. Lai, Christoph Egger, Dominique Schröder, Sherman S. M. Chow:
Phoenix: Rebirth of a Cryptographic Password-Hardening Service. USENIX Security Symposium 2017: 899-916 - 2016
- [c3]Daniel Hausmann
, Lutz Schröder
, Christoph Egger
:
Global Caching for the Alternation-free μ-Calculus. CONCUR 2016: 34:1-34:15 - [i1]Daniel Hausmann, Lutz Schröder, Christoph Egger:
Global Caching for the Alternation-free μ-Calculus. CoRR abs/1609.06379 (2016) - 2013
- [c2]Christoph Egger, Johannes Schlumberger, Christopher Kruegel, Giovanni Vigna:
Practical Attacks against the I2P Network. RAID 2013: 432-451 - 2011
- [j1]Reinhard Tartler, Daniel Lohmann
, Christian Dietrich, Christoph Egger
, Julio Sincero:
Configuration coverage in the analysis of large-scale system software. ACM SIGOPS Oper. Syst. Rev. 45(3): 10-14 (2011) - [c1]Reinhard Tartler, Daniel Lohmann
, Christian Dietrich
, Christoph Egger
, Julio Sincero:
Configuration coverage in the analysis of large-scale system software. PLOS@SOSP 2011: 2:1-2:5
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-04 22:11 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint