2024

Long Meng, Liqun Chen, Yangguang Tian, Mark Manulis: FABESA: Fast (and Anonymous) Attribute-Based Encryption under Standard Assumptions, 2024 ACM SIGSAC Conference on Computer and Communications Security (ACM CCS 2024), Salt Lake City, USA, October 14-18, 2024, ACM, 2024: pp. 4688–4702. (doi)


Long Meng, Liqun Chen, Yangguang Tian, Mark Manulis, Suhui Liu: FEASE: Fast and Expressive Asymmetric Searchable Encryption, 33rd Usenix Security Symposium 2024, pp. 2545-2562. (url)


Long Meng, Liqun Chen, Yangguang Tian, Mark Manulis: FABESA: Fast (and Anonymous) Attribute-Based Encryption under Standard Assumptions, IACR Cryptol. EPrint Arch. (2024) 986. (url)


Jia Liu, Mark Manulis: Fast SNARK-based Non-Interactive Distributed Verifiable Random Function with Ethereum Compatibility, IACR Cryptol. EPrint Arch. (2024) 968. (url)


Mark Manulis, Hugo Nartz: Distributed Asynchronous Remote Key Generation, IACR Cryptol. EPrint Arch. (2024) 846. (url)


Mark Manulis, Jerome Nguyen: Fully Homomorphic Encryption beyond IND-CCA1 Security: Integrity through Verifiability, Advances in Cryptology - EUROCRYPT 2024, Zurich, Switzerland, May, 2024, Proceedings, Part II, Springer, 2024: pp. 63–93. (doi)


Mark Manulis, Diana Maimut, George Teseleanu (Eds): Innovative Security Solutions for Information Technology and Communications - 16th International Conference, SecITC 2023, Bucharest, Romania, November 23-24, 2023, Proceedings, Springer, 2024. (doi)


Mark Manulis, Jerome Nguyen: Fully Homomorphic Encryption beyond IND-CCA1 Security: Integrity through Verifiability, IACR Cryptol. EPrint Arch. (2024) 202. (url)


Long Meng, Liqun Chen, Yangguang Tian, Mark Manulis, Suhui Liu: FEASE: Fast and Expressive Asymmetric Searchable Encryption, IACR Cryptol. EPrint Arch. (2024) 054. (url)

2023

Nick Frymann, Daniel Gardham, Mark Manulis: Asynchronous Remote Key Generation for Post-Quantum Cryptosystems from Lattices, 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P), 2023, pp. 928-941 (doi)


Shujun Li, Mark Manulis, Atsuko Miyaji (Eds): Network and System Security - 17th International Conference, NSS 2023, Canterburry, UK, August 14-16, 2023, Proceedings, Springer, 2023. (doi)


Nick Frymann, Daniel Gardham, Mark Manulis, Hugo Nartz: Generalised Asynchronous Remote Key Generation for Pairing-based Cryptosystems, Applied Cryptography and Network Security - 21st International Conference, ACNS 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Springer, 2023: pp. 394–421. (doi)


Daniele Friolo, Matteo Salvino, Daniele Venturi: On the Complete Non-Malleability of the Fujisaki-Okamoto Transform, Applied Cryptography and Network Security - 21st International Conference, ACNS 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Springer, 2023: pp. 307–335. (doi)


Nick Frymann, Daniel Gardham, Mark Manulis: Asynchronous Remote Key Generation for Post-Quantum Cryptosystems from Lattices, IACR Cryptol. EPrint Arch. (2023) 419. (url)


Nick Frymann, Daniel Gardham, Mark Manulis, Hugo Nartz: Generalised Asynchronous Remote Key Generation for Pairing-based Cryptosystems, IACR Cryptol. EPrint Arch. (2023) 456. (url)

2022

Daniele Friolo, Matteo Salvino, Daniele Venturi: On the Complete Non-Malleability of the Fujisaki-Okamoto Transform, IACR Cryptol. EPrint Arch. (2022) 1654. (url)


Nick Frymann, Daniel Gardham, Mark Manulis: Unlinkable Delegation of WebAuthn Credentials, Computer Security – ESORICS 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part III, Springer, 2022: pp. 125–144. (doi)


M. Caballero et al.: ICT in Healthcare: the role of IoT and the SECANT solution, IEEE International Conference on Cyber Security and Resilience (CSR) (2022), pp. 104–111. (doi)


Yifan Yang, Daniel Cooper, John P. Collomosse, Constantin Catalin Dragan, Mark Manulis, Jamie Steane, Arthi Manohar, Jo Briggs, Helen S. Jones, Wendy Moncur: TAPESTRY: A De-Centralized Service for Trusted Interaction Online, IEEE Trans. Serv. Comput. 15(3) (2022) 1385–1398. (doi)


Daniel Gardham, Mark Manulis: Revocable Hierarchical Attribute-based Signatures from Lattices, in: G. Ateniese and D. Venturi (Eds.), Applied Cryptography and Network Security - 20th International Conference, ACNS 2022, Rome, Italy, June 20-23, 2022, Proceedings, Springer, 2022: pp. 459–479. (doi)


Daniel Gardham, Mark Manulis: Revocable Hierarchical Attribute-based Signatures from Lattices, IACR Cryptol. EPrint Arch. (2022) 397. (url)


Nick Frymann, Daniel Gardham, Mark Manulis: Unlinkable Delegation of WebAuthn Credentials, IACR Cryptol. EPrint Arch. (2022) 303. (url)

2021

Mark Manulis, Christopher P. Bridges, Rowena Harrison, Venkkatesh Sekar, Andy Davis: Cyber security in New Space, Int. J. Inf. Sec. 20 (2021) 287–311. (doi)


Liqun Chen, Kaibin Huang, Mark Manulis, Venkkatesh Sekar: Password-authenticated searchable encryption, Int. J. Inf. Sec. 20 (2021) 675–693. (doi)

2020

Daniel Gardham, Mark Manulis, Constantin Catalin Dragan: Biometric-Authenticated Searchable Encryption, in: M. Conti, J. Zhou, E. Casalicchio, A. Spognardi (Eds.), Applied Cryptography and Network Security - 18th International Conference, ACNS 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part II, Springer, 2020: pp. 40–61. (doi)


Nick Frymann, Daniel Gardham, Franziskus Kiefer, Emil Lundberg, Mark Manulis, Dain Nilsson: Asynchronous Remote Key Generation: An Analysis of Yubico’s Proposal for W3C WebAuthn, in: J. Ligatti, X. Ou, J. Katz, G. Vigna (Eds.), CCS ’20: 2020 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020, ACM, 2020: pp. 939–954. (doi)


Matthew Casey, Mark Manulis, Christopher J. P. Newton, Robin Savage, Helen Treharne: An Interoperable Architecture for Usable Password-Less Authentication, in: A. Saracino, P. Mori (Eds.), Emerging Technologies for Authorization and Authentication - Third International Workshop, ETAA 2020, Guildford, UK, September 18, 2020, Proceedings, Springer, 2020: pp. 16–32. (doi)


Constantin Catalin Dragan, Mark Manulis: KYChain: user-controlled KYC data sharing and certification, in: C.-C. Hung, T. Cerný, D. Shin, A. Bechini (Eds.), SAC ’20: The 35th ACM/SIGAPP Symposium on Applied Computing, Online Event, [Brno, Czech Republic], March 30 - April 3, 2020, ACM, 2020: pp. 301–307. (doi)


Ioana Boureanu, Constantin Catalin Dragan, Mark Manulis, Thanassis Giannetsos, Christoforos Dadoyan, Panagiotis Gouvas, Roger A. Hallman, Shujun Li, Victor Chang, Frank Pallas, Jörg Pohle, Angela M. Sasse: Computer Security - ESORICS 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17-18, 2020, Revised Selected Papers, Springer, 2020. (doi)


Constantin Catalin Dragan, Mark Manulis: KYChain: User-Controlled KYC Data Sharing and Certification, CoRR. abs/2001.01659 (2020). (url)


Daniel Gardham, Mark Manulis, Constantin Catalin Dragan: Biometric-Authenticated Searchable Encryption, IACR Cryptol. EPrint Arch. (2020) 17. (url)


Nick Frymann, Daniel Gardham, Franziskus Kiefer, Emil Lundberg, Mark Manulis, Dain Nilsson: Asynchronous Remote Key Generation: An Analysis of Yubico’s Proposal for W3C WebAuthn, IACR Cryptol. EPrint Arch. (2020) 1004. (url)

2019

Daniel Gardham, Mark Manulis: Hierarchical Attribute-Based Signatures: Short Keys and Optimal Signature Length, in: R.H. Deng, V. Gauthier-Umaña, M. Ochoa, M. Yung (Eds.), Applied Cryptography and Network Security - 17th International Conference, ACNS 2019, Bogota, Colombia, June 5-7, 2019, Proceedings, Springer, 2019: pp. 89–109. (doi)


Jia Liu, Mark Manulis: pRate: Anonymous Star Rating with Rating Secrecy, in: R.H. Deng, V. Gauthier-Umaña, M. Ochoa, M. Yung (Eds.), Applied Cryptography and Network Security - 17th International Conference, ACNS 2019, Bogota, Colombia, June 5-7, 2019, Proceedings, Springer, 2019: pp. 550–570. (doi)


Juan E. Rubio, Mark Manulis, Cristina Alcaraz, Javier López: Enhancing Security and Dependability of Industrial Networks with Opinion Dynamics, in: K. Sako, S.A. Schneider, P.Y.A. Ryan (Eds.), Computer Security - ESORICS 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part II, Springer, 2019: pp. 263–280. (doi)


Yifan Yang, Daniel Cooper, John P. Collomosse, Constantin Catalin Dragan, Mark Manulis, Jamie Steane, Arthi Manohar, Jo Briggs, Helen S. Jones, Wendy Moncur: TAPESTRY: A Blockchain based Service for Trusted Interaction Online, CoRR. abs/1905.06186 (2019). (url)


Nick Frymann, Mark Manulis: Securing Fleets of Consumer Drones at Low Cost, CoRR. abs/1912.05064 (2019). (url)


Jia Liu, Mark Manulis: pRate: Anonymous Star Rating with Rating Secrecy, IACR Cryptol. EPrint Arch. (2019) 378. (url)


Daniel Gardham, Mark Manulis: Hierarchical Attribute-based Signatures: Short Keys and Optimal Signature Length, IACR Cryptol. EPrint Arch. (2019) 382. (url)

2018

Constantin Catalin Dragan, Daniel Gardham, Mark Manulis: Hierarchical Attribute-Based Signatures, in: J. Camenisch, P. Papadimitratos (Eds.), Cryptology and Network Security - 17th International Conference, CANS 2018, Naples, Italy, September 30 - October 3, 2018, Proceedings, Springer, 2018: pp. 213–234. (doi)


Constantin Catalin Dragan, Mark Manulis: Bootstrapping Online Trust: Timeline Activity Proofs, in: J. Garcı́a-Alfaro, J. Herrera-Joancomartı́, G. Livraga, R. Rios (Eds.), Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2018 International Workshops, DPM 2018 and CBT 2018, Barcelona, Spain, September 6-7, 2018, Proceedings, Springer, 2018: pp. 242–259. (doi)


Liqun Chen, Mark Manulis, Steve A. Schneider: Information Security - 21st International Conference, ISC 2018, Guildford, UK, September 9-12, 2018, Proceedings, Springer, 2018. (doi)


Constantin Catalin Dragan, Daniel Gardham, Mark Manulis: Hierarchical Attribute-based Signatures, IACR Cryptol. EPrint Arch. (2018) 610. (url)

2017

Kaibin Huang, Mark Manulis, Liqun Chen: Password Authenticated Keyword Search, in: IEEE Symposium on Privacy-Aware Computing, PAC 2017, Washington, DC, USA, August 1-4, 2017, IEEE, 2017: pp. 129–140. (doi)

2016

Mark Manulis, Douglas Stebila, Franziskus Kiefer, Nick Denham: Secure modular password authentication for the web using channel bindings, Int. J. Inf. Sec. 15 (2016) 597–620. (doi)


Franziskus Kiefer, Mark Manulis: Blind Password Registration for Verifier-based PAKE, in: K. Emura, G. Hanaoka, R. Zhang (Eds.), Proceedings of the 3rd ACM International Workshop on ASIA Public-Key Cryptography, AsiaPKC@AsiaCCS, Xi’an, China, May 30 - June 03, 2016, ACM, 2016: pp. 39–48. (doi)


Franziskus Kiefer, Mark Manulis: Blind Password Registration for Two-Server Password Authenticated Key Exchange and Secret Sharing Protocols, in: M. Bishop, A.C.A. Nascimento (Eds.), Information Security - 19th International Conference, ISC 2016, Honolulu, HI, USA, September 3-6, 2016, Proceedings, Springer, 2016: pp. 95–114. (doi)


Franziskus Kiefer, Mark Manulis: Universally Composable Two-Server PAKE, in: M. Bishop, A.C.A. Nascimento (Eds.), Information Security - 19th International Conference, ISC 2016, Honolulu, HI, USA, September 3-6, 2016, Proceedings, Springer, 2016: pp. 147–166. (doi)


Mark Manulis, Ahmad-Reza Sadeghi, Steve A. Schneider: Applied Cryptography and Network Security - 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings, Springer, 2016. (doi)


Franziskus Kiefer, Mark Manulis: Blind Password Registration for Verifier-based PAKE, IACR Cryptol. EPrint Arch. (2016) 442. (url)


Franziskus Kiefer, Mark Manulis: Universally Composable Two-Server PAKE, IACR Cryptol. EPrint Arch. (2016) 520. (url)

2015

Veronika Kuchta, Mark Manulis: Public Key Encryption with Distributed Keyword Search, in: M. Yung, J. Zhang, Z. Yang (Eds.), Trusted Systems - 7th International Conference, INTRUST 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers, Springer, 2015: pp. 62–83. (doi)


Franziskus Kiefer, Mark Manulis: Oblivious PAKE: Efficient Handling of Password Trials, in: J. López, C.J. Mitchell (Eds.), Information Security - 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015, Proceedings, Springer, 2015: pp. 191–208. (doi)

2014

Juan Manuel González Nieto, Mark Manulis, Dongdong Sun: Forward-Secure Hierarchical Predicate Encryption, Comput. J. 57 (2014) 510–536. (doi)


Mark Manulis, Bertram Poettering, Douglas Stebila: Plaintext awareness in identity-based key encapsulation, Int. J. Inf. Sec. 13 (2014) 25–49. (doi)


Franziskus Kiefer, Mark Manulis: Distributed Smooth Projective Hashing and Its Application to Two-Server Password Authenticated Key Exchange, in: I. Boureanu, P. Owesarski, S. Vaudenay (Eds.), Applied Cryptography and Network Security - 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings, Springer, 2014: pp. 199–216. (doi)


Kenneth Radke, Colin Boyd, Juanma González Nieto, Mark Manulis, Douglas Stebila: Formalising Human Recognition: a Fundamental Building Block for Security Proofs, in: U. Parampalli, I. Welch (Eds.), Twelfth Australasian Information Security Conference, AISC 2014, Auckland, New Zealand, January 2014, Australian Computer Society, 2014: pp. 37–45. (url)


Felix Günther, Mark Manulis, Andreas Peter: Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation, in: D. Gritzalis, A. Kiayias, I.G. Askoxylakis (Eds.), Cryptology and Network Security - 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings, Springer, 2014: pp. 321–336. (doi)


Franziskus Kiefer, Mark Manulis: Zero-Knowledge Password Policy Checks and Verifier-Based PAKE, in: M. Kutylowski, J. Vaidya (Eds.), Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II, Springer, 2014: pp. 295–312. (doi)


Veronika Kuchta, Mark Manulis: Rerandomizable Threshold Blind Signatures, in: M. Yung, L. Zhu, Y. Yang (Eds.), Trusted Systems - 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers, Springer, 2014: pp. 70–89. (doi)


Mark Manulis, Douglas Stebila, Nick Denham: Secure Modular Password Authentication for the Web Using Channel Bindings, in: L. Chen, C.J. Mitchell (Eds.), Security Standardisation Research - First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings, Springer, 2014: pp. 167–189. (doi)


Nils Fleischhacker, Mark Manulis, Amir Azodi: A Modular Framework for Multi-Factor Authentication and Key Exchange, in: L. Chen, C.J. Mitchell (Eds.), Security Standardisation Research - First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings, Springer, 2014: pp. 190–214. (doi)


Franziskus Kiefer, Mark Manulis: Zero-Knowledge Password Policy Checks and Verifier-Based PAKE, IACR Cryptol. EPrint Arch. (2014) 242. (url)


Franziskus Kiefer, Mark Manulis: Distributed Smooth Projective Hashing and its Application to Two-Server PAKE, IACR Cryptol. EPrint Arch. (2014) 350. (url)


Felix Günther, Mark Manulis, Andreas Peter: Privacy-Enhanced Participatory Sensing with Collusion-Resistance and Data Aggregation, IACR Cryptol. EPrint Arch. (2014) 382. (url)


Mark Manulis, Douglas Stebila, Nick Denham: Secure modular password authentication for the web using channel bindings, IACR Cryptol. EPrint Arch. (2014) 731. (url)

2013

Mark Manulis, Koutarou Suzuki, Berkant Ustaoglu: Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange, IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A (2013) 101–110. (doi)


Emiliano De Cristofaro, Mark Manulis, Bertram Poettering: Private discovery of common social contacts, Int. J. Inf. Sec. 12 (2013) 49–65. (doi)


Ioannis G. Askoxylakis, Mark Manulis, Joachim Posegga: Security and privacy for digital ecosystems, Inf. Secur. Tech. Rep. 17 (2013) 45. (doi)


Juan Manuel González Nieto, Mark Manulis, Bertram Poettering, Jothi Rangasamy, Douglas Stebila: Publicly verifiable ciphertexts, J. Comput. Secur. 21 (2013) 749–778. (doi)


Yang Wang, Mark Manulis, Man Ho Au, Willy Susilo: Relations among Privacy Notions for Signcryption and Key Invisible “Sign-then-Encrypt,” in: C. Boyd, L. Simpson (Eds.), Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings, Springer, 2013: pp. 187–202. (doi)


Veronika Kuchta, Mark Manulis: Unique Aggregate Signatures with Applications to Distributed Verifiable Random Functions, in: M. Abdalla, C. Nita-Rotaru, R. Dahab (Eds.), Cryptology and Network Security - 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22. 2013. Proceedings, Springer, 2013: pp. 251–270. (doi)


Nils Fleischhacker, Felix Günther, Franziskus Kiefer, Mark Manulis, Bertram Poettering: Pseudorandom signatures, in: K. Chen, Q. Xie, W. Qiu, N. Li, W.-G. Tzeng (Eds.), 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS ’13, Hangzhou, China - May 08 - 10, 2013, ACM, 2013: pp. 107–118. (doi)


Franziskus Kiefer, Mark Manulis: Oblivious PAKE and Efficient Handling of Password Trials, IACR Cryptol. EPrint Arch. (2013) 127. (url)


Yang Wang, Mark Manulis, Man Ho Au, Willy Susilo: Relations among Privacy Notions for Signcryption and Key Invisible “Sign-then-Encrypt,” IACR Cryptol. EPrint Arch. (2013) 230. (url)

2012

Stanislaus Stelle, Mark Manulis, Matthias Hollick: Topology-Driven Secure Initialization in Wireless Sensor Networks: A Tool-Assisted Approach, in: Seventh International Conference on Availability, Reliability and Security, Prague, ARES 2012, Czech Republic, August 20-24, 2012, IEEE Computer Society, 2012: pp. 28–37. (doi)


Atsushi Fujioka, Mark Manulis, Koutarou Suzuki, Berkant Ustaoglu: Sufficient Condition for Ephemeral Key-Leakage Resilient Tripartite Key Exchange, in: W. Susilo, Y. Mu, J. Seberry (Eds.), Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings, Springer, 2012: pp. 15–28. (doi)


Juan Manuel González Nieto, Mark Manulis, Dongdong Sun: Fully Private Revocable Predicate Encryption, in: W. Susilo, Y. Mu, J. Seberry (Eds.), Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings, Springer, 2012: pp. 350–363. (doi)


Juan Manuel González Nieto, Mark Manulis, Dongdong Sun: Forward-Secure Hierarchical Predicate Encryption, in: M. Abdalla, T. Lange (Eds.), Pairing-Based Cryptography - Pairing 2012 - 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers, Springer, 2012: pp. 83–101. (doi)


Juan Manuel González Nieto, Mark Manulis, Bertram Poettering, Jothi Rangasamy, Douglas Stebila: Publicly Verifiable Ciphertexts, in: I. Visconti, R.D. Prisco (Eds.), Security and Cryptography for Networks - 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings, Springer, 2012: pp. 393–410. (doi)


Josef Pieprzyk, Ahmad-Reza Sadeghi, Mark Manulis: Cryptology and Network Security, 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings, Springer, 2012. (doi)


Marc Fischlin, Johannes Buchmann, Mark Manulis: Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings, Springer, 2012. (doi)


Jan Camenisch, Mark Manulis, Gene Tsudik, Rebecca N. Wright: Privacy-Oriented Cryptography (Dagstuhl Seminar 12381), Dagstuhl Reports. 2 (2012) 165–183. (doi)


Nils Fleischhacker, Mark Manulis, Amir Azodi: Modular Design and Analysis Framework for Multi-Factor Authentication and Key Exchange, IACR Cryptol. EPrint Arch. (2012) 181. (url)


Juan Manuel González Nieto, Mark Manulis, Bertram Poettering, Jothi Rangasamy, Douglas Stebila: Publicly Verifiable Ciphertexts, IACR Cryptol. EPrint Arch. (2012) 357. (url)


Juan Manuel González Nieto, Mark Manulis, Dongdong Sun: Forward-Secure Hierarchical Predicate Encryption, IACR Cryptol. EPrint Arch. (2012) 402. (url)


Juan Manuel González Nieto, Mark Manulis, Dongdong Sun: Fully Private Revocable Predicate Encryption, IACR Cryptol. EPrint Arch. (2012) 403. (url)


Mark Manulis, Bertram Poettering, Douglas Stebila: Plaintext Awareness in Identity-Based Key Encapsulation, IACR Cryptol. EPrint Arch. (2012) 559. (url)

2011

Damien Leroy, Gregory Detal, Julien Cathalo, Mark Manulis, François Koeune, Olivier Bonaventure: SWISH: Secure WiFi sharing, Comput. Networks. 55 (2011) 1614–1630. (doi)


M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto, Mark Manulis: Modeling key compromise impersonation attacks on group key exchange protocols, ACM Trans. Inf. Syst. Secur. 14 (2011) 28:1-28:24. (doi)


Emiliano De Cristofaro, Mark Manulis, Bertram Poettering: Private Discovery of Common Social Contacts, in: J. López, G. Tsudik (Eds.), Applied Cryptography and Network Security - 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011. Proceedings, 2011: pp. 147–165. (doi)


Marc Fischlin, Benoı̂t Libert, Mark Manulis: Non-interactive and Re-usable Universally Composable String Commitments with Adaptive Security, in: D.H. Lee, X. Wang (Eds.), Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings, Springer, 2011: pp. 468–485. (doi)


Chun-I Fan, Ruei-Hau Hsu, Mark Manulis: Group Signature with Constant Revocation Costs for Signers and Verifiers, in: D. Lin, G. Tsudik, X. Wang (Eds.), Cryptology and Network Security - 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011. Proceedings, Springer, 2011: pp. 214–233. (doi)


Mark Manulis, Bertram Poettering: Practical affiliation-hiding authentication from improved polynomial interpolation, in: B.S.N. Cheung, L.C.K. Hui, R.S. Sandhu, D.S. Wong (Eds.), Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2011, Hong Kong, China, March 22-24, 2011, ACM, 2011: pp. 286–295. (doi)


Felix Günther, Mark Manulis, Thorsten Strufe: Cryptographic Treatment of Private User Profiles, in: G. Danezis, S. Dietrich, K. Sako (Eds.), Financial Cryptography and Data Security - FC 2011 Workshops, RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers, Springer, 2011: pp. 40–54. (doi)


Mark Manulis, Marion Steiner: UPBA: User-Authenticated Property-Based Attestation, in: Ninth Annual Conference on Privacy, Security and Trust, PST 2011, 19-21 July, 2011, Montreal, Québec, Canada, IEEE, 2011: pp. 112–119. (doi)


Mark Manulis, Bertram Poettering: Affiliation-Hiding Authentication with Minimal Bandwidth Consumption, in: C.A. Ardagna, J. Zhou (Eds.), Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings, Springer, 2011: pp. 85–99. (doi)


Felix Günther, Mark Manulis, Thorsten Strufe: Key management in distributed online social networks, in: 12th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WOWMOM 2011, Lucca, Italy, 20-24 June, 2011, IEEE Computer Society, 2011: pp. 1–7. (doi)


Emiliano De Cristofaro, Mark Manulis, Bertram Poettering: Private Discovery of Common Social Contacts, IACR Cryptol. EPrint Arch. (2011) 26. (url)


Felix Günther, Mark Manulis, Thorsten Strufe: Cryptographic Treatment of Private User Profiles, IACR Cryptol. EPrint Arch. (2011) 64. (url)


Nils Fleischhacker, Felix Günther, Franziskus Kiefer, Mark Manulis, Bertram Poettering: Pseudorandom Signatures, IACR Cryptol. EPrint Arch. (2011) 673. (url)

2010

Luigi Catuogno, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy: Trusted virtual domains: Color your network, Datenschutz Und Datensicherheit. 34 (2010) 289–294. (doi)


Mark Manulis, Ahmad-Reza Sadeghi: Key agreement for heterogeneous mobile ad-hoc groups, Int. J. Wirel. Mob. Comput. 4 (2010) 17–30. (doi)


Christina Brzuska, Heike Busch, Özgür Dagdelen, Marc Fischlin, Martin Franz, Stefan Katzenbeisser, Mark Manulis, Cristina Onete, Andreas Peter, Bertram Poettering, Dominique Schröder: Redactable Signatures for Tree-Structured Data: Definitions and Constructions, in: J. Zhou, M. Yung (Eds.), Applied Cryptography and Network Security, 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010. Proceedings, 2010: pp. 87–104. (doi)


Mark Manulis, Bertram Poettering, Gene Tsudik: Affiliation-Hiding Key Exchange with Untrusted Group Authorities, in: J. Zhou, M. Yung (Eds.), Applied Cryptography and Network Security, 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010. Proceedings, 2010: pp. 402–419. (doi)


Mark Manulis, Benny Pinkas, Bertram Poettering: Privacy-Preserving Group Discovery with Linear Complexity, in: J. Zhou, M. Yung (Eds.), Applied Cryptography and Network Security, 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010. Proceedings, 2010: pp. 420–437. (doi)


David Galindo, Benoı̂t Libert, Marc Fischlin, Georg Fuchsbauer, Anja Lehmann, Mark Manulis, Dominique Schröder: Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions, in: D.J. Bernstein, T. Lange (Eds.), Progress in Cryptology - AFRICACRYPT 2010, Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. Proceedings, Springer, 2010: pp. 333–350. (doi)


Michel Abdalla, Céline Chevalier, Mark Manulis, David Pointcheval: Flexible Group Key Exchange with On-demand Computation of Subgroup Keys, in: D.J. Bernstein, T. Lange (Eds.), Progress in Cryptology - AFRICACRYPT 2010, Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. Proceedings, Springer, 2010: pp. 351–368. (doi)


Delphine Christin, Matthias Hollick, Mark Manulis: Security and Privacy Objectives for Sensing Applications in Wireless Community Networks, in: Proceedings of the 19th International Conference on Computer Communications and Networks, IEEE ICCCN 2010, Zürich, Switzerland, August 2-5, 2010, IEEE, 2010: pp. 1–6. (doi)


Mark Manulis: Privacy-preserving admission to mobile peer-to-peer groups, in: Eigth Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2010, March 29 - April 2, 2010, Mannheim, Germany, Workshop Proceedings, IEEE Computer Society, 2010: pp. 111–116. (doi)


Mark Manulis, Bertram Poettering, Gene Tsudik: Taming Big Brother Ambitions: More Privacy for Secret Handshakes, in: M.J. Atallah, N.J. Hopper (Eds.), Privacy Enhancing Technologies, 10th International Symposium, PETS 2010, Berlin, Germany, July 21-23, 2010. Proceedings, Springer, 2010: pp. 149–165. (doi)


Alexander W. Dent, Marc Fischlin, Mark Manulis, Martijn Stam, Dominique Schröder: Confidential Signatures and Deterministic Signcryption, in: P.Q. Nguyen, D. Pointcheval (Eds.), Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings, Springer, 2010: pp. 462–479. (doi)


Leucio Antonio Cutillo, Mark Manulis, Thorsten Strufe: Security and Privacy in Online Social Networks, in: B. Furht (Ed.), Handbook of Social Network Technologies and Applications, Springer, 2010: pp. 497–522. (doi)


Mark Manulis, Bertram Poettering: Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation, IACR Cryptol. EPrint Arch. (2010) 659. (url)

2009

Sebastian Gajek, Mark Manulis, Jörg Schwenk: User-aware provably secure protocols for browser-based mutual authentication, Int. J. Appl. Cryptogr. 1 (2009) 290–308. (doi)


Mark Manulis, Jörg Schwenk: Security model and framework for information aggregation in sensor networks, ACM Trans. Sens. Networks. 5 (2009) 13:1-13:28. (doi)


Mark Manulis: Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys, in: M. Abdalla, D. Pointcheval, P.-A. Fouque, D. Vergnaud (Eds.), Applied Cryptography and Network Security, 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings, 2009: pp. 1–19. (doi)


Timo Brecher, Emmanuel Bresson, Mark Manulis: Fully Robust Tree-Diffie-Hellman Group Key Exchange, in: J.A. Garay, A. Miyaji, A. Otsuka (Eds.), Cryptology and Network Security, 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings, Springer, 2009: pp. 478–497. (doi)


Mark Manulis, Damien Leroy, François Koeune, Olivier Bonaventure, Jean-Jacques Quisquater: Authenticated wireless roaming via tunnels: making mobile guests feel at home, in: W. Li, W. Susilo, U.K. Tupakula, R. Safavi-Naini, V. Varadharajan (Eds.), Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009, ACM, 2009: pp. 92–103. (doi)


Damien Leroy, Mark Manulis, Olivier Bonaventure: Enhanced wireless roaming security using three-party authentication and tunnels, in: P. Mendes, O. Marcé, R.C. Sofia (Eds.), Proceedings of the 1st ACM Workshop on User-Provided Networking: Challenges and Opportunities, U-NET@CoNEXT 2009, Rome, Italy, December 1, 2009, ACM, 2009: pp. 7–12. (doi)


M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto, Mark Manulis: Generic One Round Group Key Exchange in the Standard Model, in: D.H. Lee, S. Hong (Eds.), Information, Security and Cryptology - ICISC 2009, 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers, Springer, 2009: pp. 1–15. (doi)


Mark Manulis, Koutarou Suzuki, Berkant Ustaoglu: Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange, in: D.H. Lee, S. Hong (Eds.), Information, Security and Cryptology - ICISC 2009, 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers, Springer, 2009: pp. 16–33. (doi)


Luigi Catuogno, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi, Marcel Winandy: Transparent Mobile Storage Protection in Trusted Virtual Domains, in: A. Moskowitz (Ed.), Proceedings of the 23rd Large Installation System Administration Conference, November 1-6, 2009, Baltimore, MD, USA, USENIX Association, 2009: pp. 159–172. (url)


Mark Manulis: Securing Remote Access Inside Wireless Mesh Networks, in: H.Y. Youm, M. Yung (Eds.), Information Security Applications, 10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers, Springer, 2009: pp. 324–338. (doi)


M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto, Mark Manulis: Generic One Round Group Key Exchange in the Standard Model, IACR Cryptol. EPrint Arch. (2009) 514. (url)


Alexander W. Dent, Marc Fischlin, Mark Manulis, Martijn Stam, Dominique Schröder: Confidential Signatures and Deterministic Signcryption, IACR Cryptol. EPrint Arch. (2009) 588. (url)

2008

Emmanuel Bresson, Mark Manulis: Contributory group key exchange in the presence of malicious participants, IET Inf. Secur. 2 (2008) 85–93. (doi)


Emmanuel Bresson, Mark Manulis: Securing group key exchange against strong corruptions and key registration attacks, Int. J. Appl. Cryptogr. 1 (2008) 91–107. (doi)


Romain Robert, Mark Manulis, Florence De Villenfagne, Damien Leroy, Julien Jost, François Koeune, Caroline Ker, Jean-Marc Dinant, Yves Poullet, Olivier Bonaventure, Jean-Jacques Quisquater: WiFi Roaming: Legal Implications and Security Constraints, Int. J. Law Inf. Technol. 16 (2008) 205–241. (doi)


Sebastian Gajek, Mark Manulis, Jörg Schwenk: Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy, in: Y. Mu, W. Susilo, J. Seberry (Eds.), Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings, Springer, 2008: pp. 6–20. (doi)


Emmanuel Bresson, Mark Manulis: Securing group key exchange against strong corruptions, in: M. Abe, V.D. Gligor (Eds.), Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, Tokyo, Japan, March 18-20, 2008, ACM, 2008: pp. 249–260. (doi)


Sebastian Gajek, Mark Manulis, Ahmad-Reza Sadeghi, Jörg Schwenk: Provably secure browser-based user-aware mutual authentication over TLS, in: M. Abe, V.D. Gligor (Eds.), Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, Tokyo, Japan, March 18-20, 2008, ACM, 2008: pp. 300–311. (doi)


Sebastian Gajek, Tibor Jager, Mark Manulis, Jörg Schwenk: A Browser-Based Kerberos Authentication Scheme, in: S. Jajodia, J. López (Eds.), Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings, Springer, 2008: pp. 115–129. (doi)


Frederik Armknecht, Alberto N. Escalante, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi: Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly, in: L. Chen, Y. Mu, W. Susilo (Eds.), Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings, Springer, 2008: pp. 29–44. (doi)


Liqun Chen, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi: Property-Based Attestation without a Trusted Third Party, in: T.-C. Wu, C.-L. Lei, V. Rijmen, D.-T. Lee (Eds.), Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, Springer, 2008: pp. 31–46. (doi)


Sebastian Gajek, Mark Manulis, Olivier Pereira, Ahmad-Reza Sadeghi, Jörg Schwenk: Universally Composable Security Analysis of TLS, in: J. Baek, F. Bao, K. Chen, X. Lai (Eds.), Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings, Springer, 2008: pp. 313–327. (doi)


Sebastian Gajek, Mark Manulis, Olivier Pereira, Ahmad-Reza Sadeghi, Jörg Schwenk: Universally Composable Security Analysis of TLS - Secure Sessions with Handshake and Record Layer Protocols, IACR Cryptol. EPrint Arch. (2008) 251. (url)


Mark Manulis, Damien Leroy, François Koeune, Olivier Bonaventure, Jean-Jacques Quisquater: Authenticated Wireless Roaming via Tunnels: Making Mobile Guests Feel at Home, IACR Cryptol. EPrint Arch. (2008) 382. (url)

2007

Mark Manulis: Provably secure group key exchange, phdthesis, Ruhr University Bochum, 2007. (url)


Lijun Liao, Mark Manulis: Tree-based group key agreement framework for mobile ad-hoc networks, Future Gener. Comput. Syst. 23 (2007) 787–803. (doi)


Emmanuel Bresson, Mark Manulis: Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust, in: B. Xiao, L.T. Yang, J. Ma, C. Müller-Schloer, Y. Hua (Eds.), Autonomic and Trusted Computing, 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007, Proceedings, Springer, 2007: pp. 395–409. (doi)


Liqun Chen, Alberto N. Escalante, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi: A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting, in: S. Dietrich, R. Dhamija (Eds.), Financial Cryptography and Data Security, 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers, Springer, 2007: pp. 29–44. (doi)


Mark Manulis, Jörg Schwenk: Provably Secure Framework for Information Aggregation in Sensor Networks, in: O. Gervasi, M.L. Gavrilova (Eds.), Computational Science and Its Applications - ICCSA 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings, Part I, Springer, 2007: pp. 603–621. (doi)


Emmanuel Bresson, Mark Manulis, Jörg Schwenk: On Security Models and Compilers for Group Key Exchange Protocols, in: A. Miyaji, H. Kikuchi, K. Rannenberg (Eds.), Advances in Information and Computer Security, Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007, Proceedings, Springer, 2007: pp. 292–307. (doi)


Mark Manulis, Jörg Schwenk: Provably Secure Framework for Information Aggregation is Sensor Networks, IACR Cryptol. EPrint Arch. (2007) 283. (url)

2006

Lijun Liao, Mark Manulis: Tree-Based Group Key Agreement Framework for Mobile Ad-Hoc Networks, in: 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 18-20 April 2006, Vienna, Austria, IEEE Computer Society, 2006: pp. 5–9. (doi)


Mark Manulis, Ahmad-Reza Sadeghi: Property-Based Taming of Lying Mobile Nodes, in: 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 18-20 April 2006, Vienna, Austria, IEEE Computer Society, 2006: pp. 476–480. (doi)


Mark Manulis: Democratic group signatures: on an example of joint ventures, in: F.-C. Lin, D.-T. Lee, B.-S.P. Lin, S. Shieh, S. Jajodia (Eds.), Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006, ACM, 2006: p. 365. (doi)


Mark Manulis, Ahmad-Reza Sadeghi, Jörg Schwenk: Linkable Democratic Group Signatures, in: K. Chen, R.H. Deng, X. Lai, J. Zhou (Eds.), Information Security Practice and Experience, Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings, Springer, 2006: pp. 187–201. (doi)


Mark Manulis, Ahmad-Reza Sadeghi, Jörg Schwenk: Linkable Democratic Group Signatures, IACR Cryptol. EPrint Arch. (2006) 40. (url)


Emmanuel Bresson, Mark Manulis, Jörg Schwenk: On Security Models and Compilers for Group Key Exchange Protocols, IACR Cryptol. EPrint Arch. (2006) 385. (url)


Mark Manulis: Survey on Security Requirements and Models for Group Key Exchange, IACR Cryptol. EPrint Arch. (2006) 388. (url)


Mark Manulis: Security-Focused Survey on Group Key Exchange Protocols, IACR Cryptol. EPrint Arch. (2006) 395. (url)

2005

Mark Manulis: Key Agreement for Heterogeneous Mobile Ad-Hoc Groups, in: 11th International Conference on Parallel and Distributed Systems, ICPADS 2005, Fuduoka, Japan, July 20-22, 2005, IEEE Computer Society, 2005: pp. 290–294. (doi)


Mark Manulis: Contributory group key agreement protocols, revisited for mobile ad-hoc groups, in: IEEE 2nd International Conference on Mobile Adhoc and Sensor Systems, MASS 2005, November 7-10, 2005, The City Center Hotel, Washington, USA, IEEE Computer Society, 2005. (doi)


Mark Manulis: Democratic Group Signatures on Example of Joint Ventures, IACR Cryptol. EPrint Arch. (2005) 446. (url)

2004

Mark Manulis, Jörg Schwenk: Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH, in: C. Castelluccia, H. Hartenstein, C. Paar, D. Westhoff (Eds.), Security in Ad-Hoc and Sensor Networks, First European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers, Springer, 2004: pp. 107–124. (doi)