Stefan Katzenbeisser

ORCID: 0009-0005-3608-874X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Cryptography and Data Security
  • Advanced Steganography and Watermarking Techniques
  • Security and Verification in Computing
  • Advanced Malware Detection Techniques
  • Chaos-based Image/Signal Encryption
  • Privacy-Preserving Technologies in Data
  • Advanced Memory and Neural Computing
  • Internet Traffic Analysis and Secure E-voting
  • Complexity and Algorithms in Graphs
  • Integrated Circuits and Semiconductor Failure Analysis
  • Neuroscience and Neural Engineering
  • Cryptographic Implementations and Security
  • Network Security and Intrusion Detection
  • Digital Media Forensic Detection
  • Information and Cyber Security
  • Cloud Data Security Solutions
  • Digital Rights Management and Security
  • User Authentication and Security Systems
  • Privacy, Security, and Data Protection
  • Advanced Authentication Protocols Security
  • Blockchain Technology Applications and Security
  • Digital and Cyber Forensics
  • Software Testing and Debugging Techniques
  • Advanced Data Storage Technologies

University of Passau
2019-2025

Technical University of Darmstadt
2013-2023

Chemnitz University of Technology
2023

Bayer (Germany)
2020-2021

Yale University
2021

Korea Advanced Institute of Science and Technology
2021

University of Twente
2013-2020

Hesse (Germany)
2018

Eindhoven University of Technology
2017

National Research Center for Applied Cybersecurity ATHENE
2011-2015

The Bitcoin network of decentralized payment transactions has attracted a lot attention from both Internet users and researchers in recent years. utilizes peer-to-peer to issue anonymous between different users. In the currently used clients, full transaction history is available at each node prevent double spending without need for central authority, forming valuable source empirical research on structure, dynamics, implied anonymity challenges, as well guidance future evolution complex...

10.3390/fi5020237 article EN cc-by Future Internet 2013-05-07

Over the past years, an enormous variety of different chaos-based image and video encryption algorithms have been proposed published. While any algorithm published undergoes some more or less strict experimental security analysis, many those schemes are being broken in subsequent publications. In this paper, we show that two main motivations for preferring over classical strong cryptographic encryption, namely computational effort benefits, highly questionable. We demonstrate several...

10.1109/tifs.2018.2812080 article EN IEEE Transactions on Information Forensics and Security 2018-03-05

Human Desoxyribo-Nucleic Acid (DNA) sequences offer a wealth of information that reveal, among others, predisposition to various diseases and paternity relations. The breadth personalized nature this highlights the need for privacy-preserving protocols. In paper, we present new error-resilient string searching protocol is suitable running private DNA queries. This checks if short template (e.g., describes mutation leading disease), known one party, inside sequence owned by another accounting...

10.1145/1315245.1315309 article EN 2007-10-28

Secure multiparty computation enables a set of users to evaluate certain functionalities on their respective inputs while keeping these encrypted throughout the computation. In many applications, however, outsourcing computations an untrusted server is desirable, so that can perform behalf users. Unfortunately, existing solutions are either inefficient, rely heavily user interaction, or require be under same public key - drawbacks making employment in practice very limited. We propose novel...

10.1109/tifs.2013.2288131 article EN IEEE Transactions on Information Forensics and Security 2013-11-12

The practical application of Secure Two-Party Computation is hindered by the difficulty to implement secure computation protocols. While recent work has proposed very simple programming languages which can be used specify computations, it still difficult for practitioners use them, and cumbersome translate existing source code into this format. Similarly, manual construction two-party protocols, in particular ones based on approach garbled circuits, labor intensive error-prone.

10.1145/2382196.2382278 article EN Proceedings of the ACM Conference on Computer and Communications Security 2012-10-15

In classical encryption schemes, data is encrypted under a single key that associated with user or group. Ciphertext-Policy Attribute-Based Encryption(CP-ABE) keys are attributes of users, given to them by central trusted authority, and logical formula over these attributes. We extend this idea the case where an arbitrary number independent parties can be present maintain their corresponding secret keys. scheme for multi-authority CP-ABE, propose first two constructions fully implement...

10.4134/bkms.2009.46.4.803 article EN Bulletin of the Korean Mathematical Society 2009-07-31

Traditional software security patches often have the unfortunate side-effect of quickly alerting attackers that their attempts to exploit patched vulnerabilities failed. Attackers greatly benefit from this information; it expedites search for unpatched vulnerabilities, allows them reserve ultimate attack payloads successful attacks, and increases attacker confidence in stolen secrets or expected sabotage resulting attacks. To overcome disadvantage, a methodology is proposed reformulating...

10.1145/2660267.2660329 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2014-11-03

This paper presents a new covert channel using smartphone magnetic sensors. We show that modern smartphones are capable to detect the field changes induced by different computer components during I/O operations. In particular, we able create between laptop and mobile device without any additional equipment, firmware modifications or privileged access on either of devices. present two encoding schemes for communication evaluate their effectiveness.

10.1109/aspdac.2016.7428065 article EN 2016-01-01

In a forensic watermarking architecture, buyer-seller protocol protects the watermark secrets from buyer and prevents false infringement accusations by seller. Existing protocols encrypt content with homomorphic public-key cipher perform embedding under encryption. When used for multimedia data, these create large computation bandwidth overhead. this correspondence, we show that same functionality can be achieved efficiently using recently proposed secure algorithms.

10.1109/tifs.2008.2002939 article EN IEEE Transactions on Information Forensics and Security 2008-11-25
Coming Soon ...