Christian Cachin - Publications

This page is no longer maintained and remains as of 2018. Please see https://crypto.unibe.ch/pub/


Recent Work

Last updated: Wed Oct 3 20:31:38 2018

[1]
Marcus Brandenburger, Christian Cachin, Rüdiger Kapitza, and Alessandro Sorniotti. Blockchain and trusted computing: Problems, pitfalls, and a solution for Hyperledger Fabric. e-print, arXiv:1805.08541 [cs.DC], 2018.

[2]
Christian Cachin, Angelo De Caro, Pedro Moreno-Sanchez, Björn Tackmann, and Marko Vukolic. The transaction graph for modeling blockchain semantics. Cryptology ePrint Archive, Report 2017/1070, November 2017.

Journal Papers

[1]
Christian Cachin and Olga Ohrimenko. Verifying the consistency of remote untrusted services with conflict-free operations. Information and Computation, 260:72-88, June 2018. (PDF)

[2]
Marcus Brandenburger, Christian Cachin, and Nikola Knezevic. Don't trust the cloud, verify: Integrity and consistency for cloud object stores. ACM Transactions on Privacy and Security, 20(3):8:1-8:30, August 2017. (PDF)

[3]
Tobias Distler, Christian Cachin, and Rüdiger Kapitza. Resource-efficient Byzantine fault tolerance. IEEE Transactions on Computers, 65(9):2807-2819, 2016.

[4]
Christian Cachin, Claude Crépeau, Julien Marcil, and George Savvides. Information-theoretic interactive hashing and oblivious transfer to a storage-bounded receiver. IEEE Transactions on Information Theory, 61(10):5623-5635, October 2015.

[5]
Christian Cachin, Idit Keidar, and Alexander Shraer. Fail-aware untrusted storage. SIAM Journal on Computing, 40(2):493-533, April 2011. Preliminary version appears in Proc. DSN 2009. (PDF)

[6]
Christian Cachin, Idit Keidar, and Alexander Shraer. Fork sequential consistency is blocking. Information Processing Letters, 109(7):360-364, March 2009. (PDF) (GZIP)

[7]
Christian Cachin, Klaus Kursawe, and Victor Shoup. Random oracles in Constantinople: Practical asynchronous Byzantine agreement using cryptography. Journal of Cryptology, 18(3):219-246, 2005. Preliminary version appears in Proc. 19th ACM Symposium on Principles of Distributed Computing (PODC). Copyright © IACR. (PDF) (PS) (GZIP)

[8]
Christian Cachin. An information-theoretic model for steganography. Information and Computation, 192(1):41-56, July 2004. Parts of this paper appear in Proc. 2nd Workshop on Information Hiding, 1998. (PDF) (PS) (GZIP)

[9]
Christian Cachin and Ueli Maurer. Linking information reconciliation and privacy amplification. Journal of Cryptology, 10(2):97-110, 1997. Preliminary version appears in Proc. EUROCRYPT '94. (PS) (GZIP)

[10]
Christian Cachin and Hans Jürg Wiesmann. PD recognition with knowledge-based preprocessing and neural networks. IEEE Transactions on Dielectrics and Electrical Insulation, 2(4):578-589, 1995. Copyright © IEEE.

[11]
Christian Cachin. Pedagogical pattern selection strategies. Neural Networks, 7(1):175-181, 1994.

Conference Papers

[1]
Eleftherios Kokoris-Kogias, Elli Androulaki, Angelo De Caro, and Christian Cachin. Channels: Horizontal scaling and confidentiality on permissioned blockchains. In Proc. 23rd European Symposium On Research In Computer Security (ESORICS), volume 11098 of Lecture Notes in Computer Science, pages 111-131. Springer, 2018. (PDF)

[2]
Christian Cachin, Esha Ghosh, Dimitris Papadopoulos, and Björn Tackmann. Stateful multi-client verifiable computation. In Bart Preneel and Frederik Vercauteren, editors, Proc. Applied Cryptography and Network Security (ACNS), volume 10892 of Lecture Notes in Computer Science, pages 637-656. Springer, 2018. Copyright © Springer. (PDF)

[3]
Mathias Björkqvist, Christian Cachin, Felix Engelmann, and Alessandro Sorniotti. Scalable key management for distributed cloud storage. In Proc. IEEE International Conference on Cloud Engineering (IC2E). IEEE, 2018. (PDF)

[4]
Elli Androulaki, Artem Barger, Vita Bortnikov, Christian Cachin, Konstantinos Christidis, Angelo De Caro, David Enyeart, Christopher Ferris, Gennady Laventman, Yacov Manevich, Srinivasan Muralidharan, Chet Murthy, Binh Nguyen, Manish Sethi, Gari Singh, Keith Smith, Alessandro Sorniotti, Chrysoula Stathakopoulou, Marko Vukolic, Sharon Weed, and Jason Yellick. Hyperledger Fabric: A distributed operating system for permissioned blockchains. In Proc. 13th European Conference on Computer Systems (EuroSys), pages 30:1-30:15, April 2018.

[5]
Christian Cachin and Marko Vukolic. Blockchain consensus protocols in the wild. In Andréa W. Richa, editor, Proc. 31st Intl. Symposium on Distributed Computing (DISC 2017), volume 91 of Leibniz International Proceedings in Informatics (LIPIcs), pages 1:1-1:16. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, 2017. Extended version appears as arXiv:1707.01873 [cs.DC] https://arxiv.org/abs/1707.01873, 2017.

[6]
Christian Cachin, Jan Camenisch, Eduarda Freire-Stögbuchner, and Anja Lehmann. Updatable tokenization: Formal definitions and provably secure constructions. In Proc. Financial Cryptography and Data Security (FC), volume 10322 of Lecture Notes in Computer Science, pages 59-75. Springer, 2017. (PDF)

[7]
Marcus Brandenburger, Christian Cachin, Matthias Lorenz, and Rüdiger Kapitza. Rollback and forking detection for trusted execution environments using lightweight collective memory. In Proc. Intl. Conference on Dependable Systems and Networks (DSN), June 2017. Copyright © IEEE. (PDF)

[8]
Christian Cachin, Simon Schubert, and Marko Vukolic. Non-determinism in Byzantine fault-tolerant replication. In Panagiota Fatourou, Ernesto Jiménez, and Fernando Pedone, editors, Proc. 20th International Conference on Principles of Distributed Systems (OPODIS), volume 70, pages 24:1-24:16. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, 2016. (PDF)

[9]
Shengyun Liu, Christian Cachin, Vivien Quéma, and Marko Vukolic. XFT: Practical fault tolerance beyond crashes. In Kimberly Keeton and Timothy Roscoe, editors, Proc. 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI), November 2016.

[10]
Marcus Brandenburger, Christian Cachin, and Nikola Knezevic. Don't trust the cloud, verify: Integrity and consistency for cloud object stores. In Dalit Naor, Gernot Heiser, and Idit Keidar, editors, Proc. 8th ACM International Systems and Storage Conference (SYSTOR), page 16. ACM, May 2015.

[11]
Elli Androulaki, Christian Cachin, Dan Dobre, and Marko Vukolic. Erasure-coded Byzantine storage with separate metadata. In Marcos K. Aguilera, Leonardo Querzoni, and Marc Shapiro, editors, Proc. 18th International Conference on Principles of Distributed Systems (OPODIS), volume 8878 of Lecture Notes in Computer Science, pages 76-90. Springer, 2014. Copyright © Springer. (PDF)

[12]
Christian Cachin and Olga Ohrimenko. Verifying the consistency of remote untrusted services with commutative operations. In Marcos K. Aguilera, Leonardo Querzoni, and Marc Shapiro, editors, Proc. 18th International Conference on Principles of Distributed Systems (OPODIS), volume 8878 of Lecture Notes in Computer Science, pages 1-16. Springer, 2014. Copyright © Springer. (PDF)

[13]
Christian Cachin, Dan Dobre, and Marko Vukolic. Separating data and control: Asynchronous BFT storage with 2t+1 data replicas. In Proc. 16th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS), volume 8756 of Lecture Notes in Computer Science, pages 1-17. Springer, 2014. Copyright © Springer. (PDF)

[14]
Christian Cachin, Kristiyan Haralambiev, Hsu-Chun Hsiao, and Alessandro Sorniotti. Policy-based secure deletion. In Proc. 20th ACM Conference on Computer and Communications Security (CCS), 2013. Copyright © ACM. (PDF)

[15]
Rüdiger Kapitza, Johannes Behl, Christian Cachin, Tobias Distler, Simon Kuhnle, Seyed Vahid Mohammadi, Wolfgang Schröder-Preikschat, and Klaus Stengel. CheapBFT: Resource-efficient Byzantine fault tolerance. In Proc. 7th European Conference on Computer Systems (EuroSys), pages 295-308, April 2012. Copyright © ACM. (PDF)

[16]
Cristina Basescu, Christian Cachin, Ittay Eyal, Robert Haas, Alessandro Sorniotti, Marko Vukolic, and Ido Zachevsky. Robust data sharing with key-value stores. In Proc. Intl. Conference on Dependable Systems and Networks (DSN), June 2012. Copyright © IEEE. (PDF)

[17]
Matthias Majuntke, Dan Dobre, Christian Cachin, and Neeraj Suri. Fork-consistent constructions from registers. In Antonio Fernández Anta, Giuseppe Lipari, and Matthieu Roy, editors, Proc. 15th Intl. Conference on Principles of Distributed Systems (OPODIS), volume 7109 of Lecture Notes in Computer Science, pages 283-298. Springer, December 2011. Copyright © Springer. (PDF)

[18]
Anil Kurmus, Moitrayee Gupta, Roman Pletka, Christian Cachin, and Robert Haas. A comparison of secure multi-tenancy architectures for filesystem storage clouds. In Fabio Kon and Anne-Marie Kermarrec, editors, Proc. 12th International Middleware Conference, volume 7049 of Lecture Notes in Computer Science, pages 471-490. Springer, December 2011. Copyright © ACM. (PDF)

[19]
Christian Cachin. Integrity and consistency for untrusted services. In Ivana Cerná et al., editors, Proc. 37th Conference on Current Trends in Theory and Practice of Computer Science (SOFSEM 2011), volume 6543 of Lecture Notes in Computer Science, pages 1-14. Springer, 2011. Copyright © Springer. (PDF)

[20]
Alexander Shraer, Christian Cachin, Asaf Cidon, Idit Keidar, Yan Michalevsky, and Dani Shaket. Venus: Verification for untrusted cloud storage. In Proc. Workshop on Cloud Computing Security. ACM, 2010. Copyright © ACM. (PDF)

[21]
Mathias Björkqvist, Christian Cachin, Robert Haas, Xiao-Yu Hu, Anil Kurmus, René Pawlitzek, and Marko Vukolic. Design and implementation of a key-lifecycle management system. In Radu Sion, editor, Proc. Financial Cryptography and Data Security (FC), volume 6052 of Lecture Notes in Computer Science, pages 160-174. Springer, 2010. Copyright © Springer. (PDF)

[22]
Christian Cachin, Idit Keidar, and Alexander Shraer. Fail-aware untrusted storage. In Proc. Intl. Conference on Dependable Systems and Networks (DSN), pages 494-503, June 2009. (PDF)

[23]
Christian Cachin and Nishanth Chandran. A secure cryptographic token interface. In Proc. Computer Security Foundations Symposium (CSF-22), pages 141-153. IEEE, July 2009. (PDF)

[24]
Christian Cachin and Martin Geisler. Integrity protection for revision control. In Michel Abdalla and David Pointcheval, editors, Proc. Applied Cryptography and Network Security (ACNS), volume 5536 of Lecture Notes in Computer Science, pages 382-399. Springer, 2009. Copyright © Springer. (PDF)

[25]
Christian Cachin, abhi shelat, and Alexander Shraer. Efficient fork-linearizable access to untrusted shared memory. In Proc. 26th ACM Symposium on Principles of Distributed Computing (PODC), pages 129-138, August 2007. Copyright © ACM. (PDF) (GZIP)

[26]
Roman Pletka and Christian Cachin. Cryptographic security for a high-performance distributed file system. In Proc. 24th IEEE Conf. on Mass Storage Systems and Technologies (MSST), pages 227-232, September 2007. Extended version available as IBM Research Report RZ 3661. Copyright © IEEE. (PDF) (GZIP)

[27]
HariGovind V. Ramasamy and Christian Cachin. Parsimonious asynchronous Byzantine-fault-tolerant atomic broadcast. In J. H. Anderson, G. Prencipe, and R. Wattenhofer, editors, Proc. 9th International Conference on Principles of Distributed Systems (OPODIS), number 3974 in Lecture Notes in Computer Science, pages 88-102. Springer, 2006. Copyright © Springer. (PDF) (GZIP)

[28]
Michael Backes, Christian Cachin, and Alina Oprea. Lazy revocation in cryptographic file systems. In Proc. 3rd Intl. IEEE Security in Storage Workshop (SISW), pages 1-11, December 2005. Copyright © IEEE. (PDF) (GZIP)

[29]
Michael Backes, Christian Cachin, and Alina Oprea. Secure key-updating for lazy revocation. In D. Gollmann, J. Meier, and A. Sabelfeld, editors, Proc. 11th European Symposium On Research In Computer Security (ESORICS), number 4189 in Lecture Notes in Computer Science, pages 327-346. Springer, 2006. Copyright © Springer. (PDF) (GZIP)

[30]
Christian Cachin and Stefano Tessaro. Optimal resilience for erasure-coded Byzantine distributed storage. In Proc. Intl. Conference on Dependable Systems and Networks (DSN), pages 115-124, 2006. Copyright © IEEE. (PDF) (PS) (GZIP)

[31]
Michael Backes and Christian Cachin. Public-key steganography with active attacks. In Joe Kilian, editor, Proc. 2nd Theory of Cryptography Conference (TCC), volume 3378 of Lecture Notes in Computer Science, pages 210-226. Springer, 2005. (PDF) (PS) (GZIP)

[32]
Christian Cachin and Stefano Tessaro. Asynchronous verifiable information dispersal. In Proc. 24th Symposium on Reliable Distributed Systems (SRDS), pages 191-202, October 2005. Copyright © IEEE. (PDF) (PS) (GZIP)

[33]
Christian Cachin and Reto Strobl. Asynchronous group key exchange with failures. In Proc. 23rd ACM Symposium on Principles of Distributed Computing (PODC), pages 357-366, July 2004. Copyright © ACM. (PDF) (PS) (GZIP)

[34]
Christian Cachin and Asad Samar. Secure distributed DNS. In Proc. Intl. Conference on Dependable Systems and Networks (DSN), pages 423-432, June 2004. Copyright © IEEE. (PDF) (PS) (GZIP)

[35]
Christian Cachin. An asynchronous protocol for distributed computation of RSA inverses and its applications. In Proc. 22nd ACM Symposium on Principles of Distributed Computing (PODC), pages 153-162, July 2003. Copyright © ACM. (PDF) (PS) (GZIP)

[36]
Michael Backes, Christian Cachin, and Reto Strobl. Proactive secure message transmission in asynchronous networks. In Proc. 22nd ACM Symposium on Principles of Distributed Computing (PODC), pages 223-232, July 2003. Copyright © ACM. (PS) (GZIP)

[37]
Michael Backes and Christian Cachin. Reliable broadcast in a computational hybrid model with Byzantine faults, crashes, and recoveries. In Proc. Intl. Conference on Dependable Systems and Networks (DSN), pages 37-46, June 2003. Copyright © IEEE. (PDF) (PS) (GZIP)

[38]
Christian Cachin. Modeling complexity in secure distributed computing. In André Schiper, Alexander A. Shvartsman, Hakim Weatherspoon, and Ben Y. Zhao, editors, Future Directions in Distributed Computing, volume 2584 of Lecture Notes in Computer Science, pages 57-61. Springer, 2003. Copyright © Springer. (PDF) (PS) (GZIP)

[39]
Christian Cachin, Klaus Kursawe, Anna Lysyanskaya, and Reto Strobl. Asynchronous verifiable secret sharing and proactive cryptosystems. In Proc. 9th ACM Conference on Computer and Communications Security (CCS), pages 88-97, 2002. Copyright © ACM. (PDF) (PS) (GZIP)

[40]
Christian Cachin and Jonathan A. Poritz. Secure intrusion-tolerant replication on the Internet. In Proc. Intl. Conference on Dependable Systems and Networks (DSN), pages 167-176, June 2002. Copyright © IEEE. (PDF) (PS) (GZIP)

[41]
Christian Cachin, Klaus Kursawe, Frank Petzold, and Victor Shoup. Secure and efficient asynchronous broadcast protocols (extended abstract). In Joe Kilian, editor, Advances in Cryptology: CRYPTO 2001, volume 2139 of Lecture Notes in Computer Science, pages 524-541. Springer, 2001. Full version available as Cryptology ePrint Archive, Report 2001/006, http://eprint.iacr.org/. Copyright © IACR. (PDF) (PS) (GZIP)

[42]
Christian Cachin. Distributing trust on the Internet. In Proc. Intl. Conference on Dependable Systems and Networks (DSN), pages 183-192, June 2001. Copyright © IEEE. (PDF) (PS) (GZIP)

[43]
Joy Algesheimer, Christian Cachin, Jan Camenisch, and Günter Karjoth. Cryptographic security for mobile code. In Proc. IEEE Symposium on Security and Privacy, pages 2-11, May 2001. Copyright © IEEE. (PDF) (PS) (GZIP)

[44]
Christian Cachin and Jan Camenisch. Optimistic fair secure computation. In Mihir Bellare, editor, Advances in Cryptology: CRYPTO 2000, volume 1880 of Lecture Notes in Computer Science, pages 94-112. Springer, 2000. Copyright © IACR. (PDF) (PS)

[45]
Christian Cachin, Jan Camenisch, Joe Kilian, and Joy Müller. One-round secure computation and secure autonomous mobile agents. In Ugo Montanari, José P. Rolim, and Emo Welzl, editors, Proc. 27th International Colloquium on Automata, Languages and Programming (ICALP), volume 1853 of Lecture Notes in Computer Science, pages 512-523. Springer, 2000. Copyright © Springer. (PDF) (PS) (GZIP)

[46]
Christian Cachin. Efficient private bidding and auctions with an oblivious third party. In Proc. 6th ACM Conference on Computer and Communications Security, pages 120-127, 1999. Copyright © ACM. (PDF) (PS) (GZIP)

[47]
Christian Cachin, Silvio Micali, and Markus Stadler. Computationally private information retrieval with polylogarithmic communication. In Jacques Stern, editor, Advances in Cryptology: EUROCRYPT '99, volume 1592 of Lecture Notes in Computer Science, pages 402-414. Springer, 1999. Copyright © IACR. (PDF) (PS) (GZIP)

[48]
Christian Cachin, Claude Crépeau, and Julien Marcil. Oblivious transfer with a memory-bounded receiver. In Proc. 39th IEEE Symposium on Foundations of Computer Science (FOCS), pages 493-502, 1998. Copyright © IEEE. (PS) (GZIP)

[49]
Christian Cachin. An information-theoretic model for steganography. In David Aucsmith, editor, Information Hiding, 2nd International Workshop, volume 1525 of Lecture Notes in Computer Science, pages 306-318. Springer, 1998. Revised version appears in Information and Computation, 2004.

[50]
Christian Cachin. On the foundations of oblivious transfer. In Kaisa Nyberg, editor, Advances in Cryptology: EUROCRYPT '98, volume 1403 of Lecture Notes in Computer Science, pages 361-374. Springer, 1998. (PS) (GZIP)

[51]
Christian Cachin and Ueli Maurer. Unconditional security against memory-bounded adversaries. In Burt Kaliski, editor, Advances in Cryptology: CRYPTO '97, volume 1294 of Lecture Notes in Computer Science, pages 292-306. Springer, 1997. (PS) (GZIP)

[52]
Christian Cachin. Smooth entropy and Rényi entropy. In Walter Fumy, editor, Advances in Cryptology: EUROCRYPT '97, volume 1233 of Lecture Notes in Computer Science, pages 193-208. Springer, 1997. (PS) (GZIP)

[53]
Christian Cachin. On-line secret sharing. In Colin Boyd, editor, Cryptography and Coding: 5th IMA Conference, Cirencester, UK, volume 1025 of Lecture Notes in Computer Science, pages 190-198. Springer, 1995. (PS) (GZIP)

[54]
Matthias Rauterberg and Christian Cachin. Locating the primary attention focus of the user. In Thomas Grechenig and Manfred Tscheligi, editors, Vienna Conference on Human Computer Interaction, volume 733 of Lecture Notes in Computer Science, pages 129-140. Springer, 1993. (PDF)

Proceedings, Books and Book Chapters

[1]
Emmanuelle Anceaume, Christian Cachin, and Maria Potop-Butucaru, editors. Principles of Distributed Systems, 19th International Conference (OPODIS 2015), volume 46 of LIPIcs. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, 2016.

[2]
Christian Cachin and Robbert van Renesse, editors. Proc. 9th Workshop on Hot Topics in Dependable Systems (HotDep), Farmington (PA), USA. ACM, November 2013.

[3]
Christian Cachin, Rachid Guerraoui, and Luís Rodrigues. Introduction to Reliable and Secure Distributed Programming (Second Edition). Springer, 2011.

[4]
Christian Cachin. State machine replication with Byzantine faults. In Bernadette Charron-Bost, Fernando Pedone, and André Schiper, editors, Replication: Theory and Practice, volume 5959 of Lecture Notes in Computer Science, pages 169-184. Springer, 2010. (PDF)

[5]
Lars Arge, Christian Cachin, Tomasz Jurdzinski, and Andrzej Tarlecki, editors. Proc. 34th International Colloquium on Automata, Languages and Programming (ICALP), volume 4596 of Lecture Notes in Computer Science. Springer, 2007.

[6]
Christian Cachin and Jan Camenisch, editors. Advances in Cryptology --- EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science. Springer, 2004.

[7]
Christian Cachin. Digital steganography. In Henk C.A. van Tilborg, editor, Encyclopedia of Cryptography and Security. Springer, 2005. (PDF) (PS) (GZIP)

Other Published Work

[1]
Christian Cachin. Blockchain consensus protocols: Snake oil warning. In Proc. 13th European Dependable Computing Conference (EDCC), September 2017. Copyright © IEEE. (PDF)

[2]
Elli Androulaki, Christian Cachin, Angelo De Caro, Alessandro Sorniotti, and Marko Vukolic. Permissioned blockchains and Hyperledger Fabric. ERCIM News, 2017(110), 2017.

[3]
Chrysoula Stathakopoulou and Christian Cachin. Threshold signatures for blockchain systems. Research Report RZ 3910, IBM Research, 2017. (PDF)

[4]
Christian Cachin. Architecture of the Hyperledger blockchain fabric. Workshop on Distributed Cryptocurrencies and Consensus Ledgers (DCCL 2016), 2016.

[5]
Christian Cachin. Integrity, consistency, and verification of remote computation. Tutorial, presented at 21st ACM Conference on Computer and Communications Security (CCS 2014) and 18th International Conference on Principles of Distributed Systems (OPODIS 2014), 2014. (PDF)

[6]
Roland A. Burger, Christian Cachin, and Elmar Husmann. Cloud, trust, privacy: Trustworthy cloud computing whitepaper. Published by the TClouds project, available online at url http://www.tclouds-project.eu, 2013. (PDF)

[7]
Christian Cachin, Dan Dobre, and Marko Vukolic. Brief Announcement: BFT storage with 2t+1 data replicas. In Yehuda Afek, editor, Proc. 27th International Conference on Distributed Computing (DISC), volume 8205 of Lecture Notes in Computer Science, pages 573-574. Springer, 2013.

[8]
Christian Cachin. From reliable to secure distributed programming. Tutorial, presented at the 42nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), June 2012.

[9]
Christian Cachin, Divay Bansal, and Günter Karjoth. Key management with policy-based access control. Presented at 6th International Workshop on Analysis of Security APIs, June 2012. (PDF)

[10]
Christian Cachin, Birgit Junker, and Alessandro Sorniotti. On limitations of using cloud storage for data replication. Proc. 6th Workshop on Recent Advances in Intrusion Tolerance and reSilience (WRAITS 2012), June 2012. (PDF)

[11]
Cristina Basescu, Christian Cachin, Ittay Eyal, Robert Haas, and Marko Vukolic. Robust data sharing with key-value stores. In Proc. 30th ACM Symposium on Principles of Distributed Computing (PODC), June 2011. Copyright © ACM.

[12]
Christian Cachin and Matthias Schunter. A cloud you can trust. IEEE Spectrum, pages 28-32, December 2011.

[13]
Christian Cachin. Secure distributed programming. Tutorial, presented at the 18th ACM Conference on Computer and Communications Security (CCS), October 2011.

[14]
Christian Cachin. From reliable to secure distributed programming. Tutorial, presented at the 25th International Symposium on Distributed Computing (DISC), September 2011.

[15]
Christian Cachin. Protocols for secure cloud computing. Tutorial, presented at METIS-CTDS 2011, International Spring School on Distributed Systems, Marrakech, April 2011. (PDF)

[16]
Rüdiger Kapitza, Matthias Schunter, Christian Cachin, Klaus Stengel, and Tobias Distler. Storyboard: Optimistic deterministic multithreading. In Proc. 6th Workshop on Hot Topics in System Dependability, 2010. (PDF)

[17]
Christian Cachin and Jan Camenisch. Encrypting keys securely. IEEE Security & Privacy Magazine, 8(4):66-69, July/August 2010.

[18]
Christian Cachin. Yet another visit to Paxos. Research Report RZ 3754, IBM Research, November 2009. (PDF)

[19]
Christian Cachin. From Byzantine-tolerant to intrusion-safe services. Presented at Workshop on Theory and Practice of Byzantine Fault Tolerance (BFTW3), September 2009. (PDF)

[20]
Christian Cachin, Anil Kurmus, and Marko Vukolic. Strict access control in a key-management server. Presented at 3rd International Workshop on Analysis of Security APIs, July 2009. (PDF)

[21]
Christian Cachin. Rational protocols. Presented at Workshop on Open Research Problems in Network Security (iNetSec 2009), April 2009.

[22]
Christian Cachin, Idit Keidar, and Alexander Shraer. Trusting the cloud. SIGACT News, 40(2):80-86, June 2009. (PDF)

[23]
Christian Cachin, Idit Keidar, and Alexander Shraer. Principles of untrusted storage: A new look at consistency conditions. In Proc. 27th ACM Symposium on Principles of Distributed Computing (PODC), page 426, August 2008. Copyright © ACM.

[24]
Christian Cachin, Idit Keidar, and Alexander Shraer. Improving efficiency and enhancing concurrency of untrusted storage. In Proc. 6th USENIX Conference on File and Storage Technologies (FAST), Work-in-Progress Report, February 2008.

[25]
Christian Cachin. Cryptographic methods for protecting storage systems. Tutorial, presented at 6th USENIX Conference on File and Storage Technologies (FAST '08), at 24th IEEE Conf. on Mass Storage Systems and Technologies (MSST 2007), and at 13th ACM Conference on Computer and Communications Security (CCS 2006), 2008. (PDF)

[26]
Paulo Veríssimo, Nuno F. Neves, Christian Cachin, Jonathan Poritz, David Powell, Yves Deswarte, Robert Stroud, and Ian Welch. Intrusion-tolerant middleware. IEEE Security & Privacy Magazine, 4(4):88-102, July 2006. Copyright © Springer.

[27]
Christian Cachin and Stefano Tessaro. Brief Announcement: Optimal resilience for erasure-coded Byzantine distributed storage. In Pierre Fraigniaud, editor, Proc. 19th International Conference on Distributed Computing (DISC), volume 3724 of Lecture Notes in Computer Science, pages 497-498. Springer, 2005.

[28]
Christian Cachin and Stefano Tessaro. Brief Announcement: Asynchronous verifiable information dispersal. In Pierre Fraigniaud, editor, Proc. 19th International Conference on Distributed Computing (DISC), volume 3724 of Lecture Notes in Computer Science, pages 503-504. Springer, 2005.

[29]
Christian Cachin. Entropy Measures and Unconditional Security in Cryptography, volume 1 of ETH Series in Information Security and Cryptography. Hartung-Gorre Verlag, Konstanz, Germany, 1997. ISBN 3-89649-185-7 (Reprint of Ph.D. dissertation No. 12187, ETH Zürich, Ref. Prof. U. Maurer, Co-Ref. Prof. J.L. Massey). (PDF)


Copyright Notices

Some material that is available from this page is copyrighted.

IACR Copyright Notice:

Permission is granted for a user to display all material at this site, to copy the material onto a single computer, and to make print copies of the material for personal use only. All other rights are retained by the International Association for Cryptologic Research. In particular, any other copying, other redistribution, or any commercial use of the material requires the permission of the publisher, which may be requested by contacting the International Association for Cryptologic Research.

IEEE Copyright Notice:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder. ACM Copyright Notice

ACM Copyright Notice:

ACM COPYRIGHT NOTICE. Copyright © 1999-2004 by the Association for Computing Machinery, Inc. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, to republish, to post on servers, or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from Publications Dept., ACM, Inc., fax +1 (212) 869-0481, or permissions@acm.org.

Springer-Verlag LNCS Copyright Notice:

The copyright of these contributions has been transferred to Springer-Verlag Berlin Heidelberg New York. The copyright transfer covers the exclusive right to reproduce and distribute the contribution, including reprints, translations, photographic reproductions, microform, electronic form (offline, online), or any other reproductions of similar nature. Online available from Springer-Verlag LNCS series.