Christian Cachin
Christian Cachin
University of Bern, Cryptology and Data Security Group
Verified email at acm.org
TitleCited byYear
An information-theoretic model for steganography
C Cachin
International Workshop on Information Hiding, 306-318, 1998
1304*1998
Computationally private information retrieval with polylogarithmic communication
C Cachin, S Micali, M Stadler
International Conference on the Theory and Applications of Cryptographic …, 1999
6821999
Hyperledger fabric: a distributed operating system for permissioned blockchains
E Androulaki, A Barger, V Bortnikov, C Cachin, K Christidis, A De Caro, ...
Proceedings of the Thirteenth EuroSys Conference, 30, 2018
5462018
Architecture of the hyperledger blockchain fabric
C Cachin
Workshop on distributed cryptocurrencies and consensus ledgers 310, 4, 2016
4422016
Efficient private bidding and auctions with an oblivious third party
C Cachin
Proceedings of the 6th ACM conference on Computer and communications …, 1999
3751999
Random oracles in Constantinople: Practical asynchronous Byzantine agreement using cryptography
C Cachin, K Kursawe, V Shoup
Journal of Cryptology 18 (3), 219-246, 2005
3572005
Trusting the cloud
C Cachin, I Keidar, A Shraer
Acm Sigact News 40 (2), 81-86, 2009
3002009
Introduction to reliable and secure distributed programming
C Cachin, R Guerraoui, L Rodrigues
Springer Science & Business Media, 2011
2742011
Entropy measures and unconditional security in cryptography
C Cachin
ETH Zurich, 1997
2731997
Secure and efficient asynchronous broadcast protocols
C Cachin, K Kursawe, F Petzold, V Shoup
Annual International Cryptology Conference, 524-541, 2001
2262001
Blockchain consensus protocols in the wild
C Cachin, M Vukolić
arXiv preprint arXiv:1707.01873, 2017
2012017
Asynchronous verifiable secret sharing and proactive cryptosystems
C Cachin, K Kursawe, A Lysyanskaya, R Strobl
Proceedings of the 9th ACM conference on Computer and communications …, 2002
1812002
Cryptographic security for mobile code
J Algesheimer, C Cachin, J Camenisch, G Karjoth
Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, 2-11, 2000
1802000
Linking information reconciliation and privacy amplification
C Cachin, UM Maurer
journal of Cryptology 10 (2), 97-110, 1997
1801997
Unconditional security against memory-bounded adversaries
C Cachin, U Maurer
Annual International Cryptology Conference, 292-306, 1997
1771997
One-round secure computation and secure autonomous mobile agents
C Cachin, J Camenisch, J Kilian, J Müller
International Colloquium on Automata, Languages, and Programming, 512-523, 2000
1762000
Secure intrusion-tolerant replication on the Internet
C Cachin, JA Poritz
Proceedings International Conference on Dependable Systems and Networks, 167-176, 2002
1472002
Venus: Verification for untrusted cloud storage
A Shraer, C Cachin, A Cidon, I Keidar, Y Michalevsky, D Shaket
Proceedings of the 2010 ACM workshop on Cloud computing security workshop, 19-30, 2010
1322010
Optimal resilience for erasure-coded Byzantine distributed storage
C Cachin, S Tessaro
International Conference on Dependable Systems and Networks (DSN'06), 115-124, 2006
1312006
CheapBFT: resource-efficient byzantine fault tolerance
R Kapitza, J Behl, C Cachin, T Distler, S Kuhnle, SV Mohammadi, ...
Proceedings of the 7th ACM european conference on Computer Systems, 295-308, 2012
1282012
The system can't perform the operation now. Try again later.
Articles 1–20