Christian Cachin
Christian Cachin
University of Bern, Cryptology and Data Security Group
Dirección de correo verificada de - Página principal
Citado por
Citado por
Hyperledger fabric: a distributed operating system for permissioned blockchains
E Androulaki, A Barger, V Bortnikov, C Cachin, K Christidis, A De Caro, ...
Proceedings of the thirteenth EuroSys conference, 1-15, 2018
Architecture of the hyperledger blockchain fabric
C Cachin
Workshop on distributed cryptocurrencies and consensus ledgers 310 (4), 1-4, 2016
An information-theoretic model for steganography
C Cachin
International Workshop on Information Hiding, 306-318, 1998
Blockchain consensus protocols in the wild
C Cachin, M Vukolić
arXiv preprint arXiv:1707.01873, 2017
Computationally private information retrieval with polylogarithmic communication
C Cachin, S Micali, M Stadler
Advances in Cryptology—EUROCRYPT’99: International Conference on the Theory …, 1999
Introduction to reliable and secure distributed programming
C Cachin, R Guerraoui, L Rodrigues
Springer Science & Business Media, 2011
Random oracles in constantipole: practical asynchronous byzantine agreement using cryptography
C Cachin, K Kursawe, V Shoup
Proceedings of the nineteenth annual ACM symposium on Principles of …, 2000
Secure and efficient asynchronous broadcast protocols
C Cachin, K Kursawe, F Petzold, V Shoup
Annual International Cryptology Conference, 524-541, 2001
Efficient private bidding and auctions with an oblivious third party
C Cachin
Proceedings of the 6th ACM Conference on Computer and Communications …, 1999
Trusting the cloud
C Cachin, I Keidar, A Shraer
Acm Sigact News 40 (2), 81-86, 2009
Entropy measures and unconditional security in cryptography
C Cachin
ETH Zurich, 1997
CheapBFT: Resource-efficient Byzantine fault tolerance
R Kapitza, J Behl, C Cachin, T Distler, S Kuhnle, SV Mohammadi, ...
Proceedings of the 7th ACM european conference on Computer Systems, 295-308, 2012
Asynchronous verifiable secret sharing and proactive cryptosystems
C Cachin, K Kursawe, A Lysyanskaya, R Strobl
Proceedings of the 9th ACM Conference on Computer and Communications …, 2002
{XFT}: Practical fault tolerance beyond crashes
S Liu, P Viotti, C Cachin, V Quéma, M Vukolić
12th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2016
Unconditional security against memory-bounded adversaries
C Cachin, U Maurer
Annual International Cryptology Conference, 292-306, 1997
Linking information reconciliation and privacy amplification
C Cachin, UM Maurer
journal of Cryptology 10 (2), 97-110, 1997
Asynchronous verifiable information dispersal
C Cachin, S Tessaro
24th IEEE Symposium on Reliable Distributed Systems (SRDS'05), 191-201, 2005
Secure intrusion-tolerant replication on the Internet
C Cachin, JA Poritz
Proceedings International Conference on Dependable Systems and Networks, 167-176, 2002
One-round secure computation and secure autonomous mobile agents
C Cachin, J Camenisch, J Kilian, J Müller
Automata, Languages and Programming: 27th International Colloquium, ICALP …, 2000
Cryptographic security for mobile code
J Algesheimer, C Cachin, J Camenisch, G Karjoth
Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, 2-11, 2000
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20