D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 38 Citations 5,714 183 World Ranking 6510 National Ranking 309

Overview

What is he best known for?

The fields of study he is best known for:

  • Cryptography
  • Operating system
  • Public-key cryptography

Marc Fischlin focuses on Theoretical computer science, Computer security, Cryptography, Random oracle and Commitment scheme. As a part of the same scientific study, he usually deals with the Theoretical computer science, concentrating on Oblivious transfer and frequently concerns with Security parameter, Quadratic residue and Arithmetic. Many of his research projects under Computer security are closely connected to Immutability and Security association with Immutability and Security association, tying the diverse disciplines of science together.

His Cryptography study integrates concerns from other disciplines, such as Mathematical proof, Encryption, Public-key cryptography and Digital signature. His Random oracle research incorporates themes from Group signature, Hash function, Signature and Pseudorandom function family. As a part of the same scientific family, he mostly works in the field of Commitment scheme, focusing on String and, on occasion, Blind signature, Executable, Ideal and Construct.

His most cited work include:

  • Universally Composable Commitments (535 citations)
  • Random oracles in a quantum world (208 citations)
  • Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles (164 citations)

What are the main themes of his work throughout his whole career to date?

His scientific interests lie mostly in Computer security, Theoretical computer science, Cryptography, Random oracle and Hash function. His research investigates the link between Computer security and topics such as Protocol that cross with problems in Smart card and Access control. In his work, Anonymity is strongly intertwined with Signature, which is a subfield of Theoretical computer science.

His Cryptography research is multidisciplinary, incorporating elements of Handshake, Adversary and Computer network. His work deals with themes such as Cryptosystem, Standard model and Pseudorandom function family, which intersect with Random oracle. His biological study spans a wide range of topics, including Discrete mathematics and Algorithm.

He most often published in these fields:

  • Computer security (42.57%)
  • Theoretical computer science (41.58%)
  • Cryptography (39.60%)

What were the highlights of his more recent work (between 2018-2021)?

  • Theoretical computer science (41.58%)
  • Computer security (42.57%)
  • Cryptography (39.60%)

In recent papers he was focusing on the following fields of study:

His primary scientific interests are in Theoretical computer science, Computer security, Cryptography, Hash function and Protocol. His Theoretical computer science research includes themes of Security properties, Random oracle, Key and Pseudorandomness. His work on Key exchange, Key storage and Cryptographic protocol as part of general Computer security research is often related to Mobile payment and White box, thus linking different fields of science.

His Key exchange research focuses on Resilience and how it connects with Constant. His studies deal with areas such as Adversary and Confidentiality as well as Cryptography. The concepts of his Hash function study are interwoven with issues in Discrete mathematics and Message authentication code, Authentication.

Between 2018 and 2021, his most popular works were:

  • Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange (19 citations)
  • Intercept-Resend Emulation Attacks against a Continuous-Variable Quantum Authentication Protocol with Physical Unclonable Keys (8 citations)
  • Signatures from Sequential-OR Proofs (7 citations)

In his most recent research, the most cited papers focused on:

  • Cryptography
  • Operating system
  • Public-key cryptography

Marc Fischlin mainly investigates Computer security, Protocol, Key exchange, Computer network and Key encapsulation. In the subject of general Computer security, his work in Cryptographic protocol, Key storage and Malware is often linked to White box and Mobile payment, thereby combining diverse domains of study. His work on Handshake and Authentication protocol as part of general Protocol study is frequently connected to Emulation and Coherent states, therefore bridging the gap between diverse disciplines of science and establishing a new relationship between them.

His Handshake research is multidisciplinary, incorporating perspectives in Open problem and Cryptography. His work carried out in the field of Key brings together such families of science as Theoretical computer science and Secrecy. Marc Fischlin integrates many fields in his works, including Theoretical computer science and Composition.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Universally Composable Commitments.

Ran Canetti;Marc Fischlin.
IACR Cryptology ePrint Archive (2001)

726 Citations

Random oracles in a quantum world

Dan Boneh;Özgür Dagdelen;Marc Fischlin;Anja Lehmann.
international conference on the theory and application of cryptology and information security (2011)

334 Citations

A Cost-Effective Pay-Per-Multiplication Comparison Method for Millionaires

Marc Fischlin.
the cryptographers track at the rsa conference (2001)

214 Citations

Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles.

Mihir Bellare;Marc Fischlin;Adam O'Neill;Thomas Ristenpart.
IACR Cryptology ePrint Archive (2008)

195 Citations

Security of Sanitizable Signatures Revisited

Christina Brzuska;Marc Fischlin;Tobias Freudenreich;Anja Lehmann.
public key cryptography (2009)

160 Citations

Physically uncloneable functions in the universal composition framework

Christina Brzuska;Marc Fischlin;Heike Schröder;Stefan Katzenbeisser.
international cryptology conference (2011)

160 Citations

Communication-efficient non-interactive proofs of knowledge with online extractors

Marc Fischlin.
international cryptology conference (2005)

158 Citations

Round-optimal composable blind signatures in the common reference string model

Marc Fischlin.
international cryptology conference (2006)

142 Citations

The Cramer-Shoup Strong-RSASignature Scheme Revisited

Marc Fischlin.
public key cryptography (2003)

141 Citations

Topics in Cryptology – CT-RSA 2009

Marc Fischlin.
Lecture Notes in Computer Science (2009)

138 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Marc Fischlin

Ran Canetti

Ran Canetti

Boston University

Publications: 48

Rafael Pass

Rafael Pass

Cornell University

Publications: 42

Jonathan Katz

Jonathan Katz

University of Maryland, College Park

Publications: 41

Amit Sahai

Amit Sahai

University of California, Los Angeles

Publications: 38

Yehuda Lindell

Yehuda Lindell

Bar-Ilan University

Publications: 34

Ivan Damgård

Ivan Damgård

Aarhus University

Publications: 33

Mihir Bellare

Mihir Bellare

University of California, San Diego

Publications: 33

Serge Vaudenay

Serge Vaudenay

École Polytechnique Fédérale de Lausanne

Publications: 33

Rafail Ostrovsky

Rafail Ostrovsky

University of California, Los Angeles

Publications: 31

Dennis Hofheinz

Dennis Hofheinz

ETH Zurich

Publications: 27

Gil Segev

Gil Segev

Hebrew University of Jerusalem

Publications: 26

Eike Kiltz

Eike Kiltz

Ruhr University Bochum

Publications: 25

Jan Camenisch

Jan Camenisch

DFINITY

Publications: 24

Willy Susilo

Willy Susilo

University of Wollongong

Publications: 24

Markulf Kohlweiss

Markulf Kohlweiss

University of Edinburgh

Publications: 24

Vipul Goyal

Vipul Goyal

Carnegie Mellon University

Publications: 24

Trending Scientists

Marco Aiello

Marco Aiello

University of Stuttgart

Robert I. Killey

Robert I. Killey

University College London

Atsushi Morimura

Atsushi Morimura

Panasonic (Japan)

Roberto Solano

Roberto Solano

Spanish National Research Council

James C. Wang

James C. Wang

Harvard University

William G. Hill

William G. Hill

University of Edinburgh

Judith A. Badner

Judith A. Badner

Rush University Medical Center

Michiko Takahashi

Michiko Takahashi

University of Tokyo

David L. Paul

David L. Paul

MRC Laboratory of Molecular Biology

Yechiel Shai

Yechiel Shai

Weizmann Institute of Science

Ron D. Appel

Ron D. Appel

Swiss Institute of Bioinformatics

Frans-Jan W. Parmentier

Frans-Jan W. Parmentier

Lund University

Nancy J. Keuthen

Nancy J. Keuthen

Harvard University

Susan M. Andersen

Susan M. Andersen

New York University

Paul S. Albert

Paul S. Albert

National Institutes of Health

Paul A. Djupe

Paul A. Djupe

Denison University

Something went wrong. Please try again later.