A. Jolfei, S. Schiffner, T. Engel, and A. Rupp. Why Privacy-Preserving Protocols Are Sometimes Not Enough: A Case Study of the Brisbane Toll Collection Infrastructure. In Proceedings of the
24th Privacy Enhancing Technologies Symposium — PoPETs, vol. 2024, no. 1, p. 232–257. Degruyter, 2024.
[PDF]
V. Fetzer, M. Klooss, J. Mueller-Quade, M. Raiber, and A. Rupp. Universally Composable Auditable Surveillance. In Proceedings of the
30th International Conference on the Theory and Application of Cryptology and Information Security — ASIACRYPT, pages 453–487, 2023.
[PDF]
A. Jolfei, A. Boualouache, A. Rupp, S. Schiffner, and T. Engel. A Survey on Privacy-Preserving Electronic Toll Collection Schemes for Intelligent Transportation Systems. IEEE Transactions on Intelligent Transportation Systems, vol. 24, no. 9, p. 8945–8962.
IEEE Computer Society, 2023.
[PDF]
V. Fetzer, M. Keller, S. Maier, M. Raiber, A. Rupp, and R. Schwerdt.
C. Kuhn, D. Hofheinz, A. Rupp, and T. Strufe. PUBA: Privacy-Preserving User-Data Bookkeeping and Analytics. In Proceedings of the
22nd Privacy Enhancing Technologies Symposium — PoPETs, vol. 2022, no. 2, p. 447–516. Degruyter, 2022.
[PDF]
C. Kuhn, D. Hofheinz, A. Rupp, and T. Strufe. Onion Routing with Replies. In 27th
International Conference on the Theory and Application of Cryptology
and Information Security — ASIACRYPT 2021,
Lecture Notes in Computer Science, volume 13091 of Lecture Notes in Computer Science, pages
573–604. Springer-Verlag, 2021.
[PDF]
V. Fetzer, M. Hoffmann, M. Nagel, A. Rupp, and R. Schwerdt. P4TC: Provably-Secure
yet Practical Privacy-Preserving Toll Collection. In Proceedings of the
20th Privacy Enhancing Technologies Symposium — PoPETs, vol. 2020, no. 3, p. 62–152. Degruyter, 2020.
[PDF]
M. Hoffmann, M. Klooss, M. Raiber, and A. Rupp. Black-Box Wallets: Fast Anonymous Two-Way Payments for Constrained Devices. In Proceedings of the
20th Privacy Enhancing Technologies Symposium — PoPETs, 2020, no. 1, p. 165–194. Degruyter, 2020.
[PDF]
M. Hoffmann, M. Klooss, and A. Rupp. Efficient Zero-Knowledge Arguments in the Discrete Log Setting, Revisited. In Proceedings of the
26th ACM Conference on Computer and Communications Security — ACM CCS 2019, pages 2093–2110, ACM, 2019.
[PDF]
M. Klooss, A. Lehmann, and A. Rupp. (R)CCA Secure Updatable Encryption with Integrity Protection. In Proceedings of the
38th Annual International Conference on the Theory and Applications of Cryptographic Techniques — EUROCRYPT 2019, volume 11476 of Lecture Notes in Computer Science, pages 68–99. Springer-Verlag, 2019.
[PDF]
V. Fetzer, T. Graef, M.Nagel, A. Rupp, and R. Schwerdt. P6V2G: A Privacy-Preserving V2G Scheme for Two-Way Payments and Reputation. In Proceedings of the
8th DACH+ Conference on Energy Informatics — DACH+ 2019, Springer-Verlag, 2019.
[PDF]
B. Broadnax, V. Fetzer, J. Mueller-Quade, and A. Rupp. Non-Malleability vs. CCA-Security: The Case of Commitments. In Proceedings of the 21st International Conference on Practice and Theory of Public-Key Cryptography — PKC 2018, volume 10770 of Lecture Notes in Computer Science, pages 312–337. Springer-Verlag, 2018.
[PDF]
G. Hartung, M. Hoffmann, M. Nagel, and A. Rupp. BBA+: Improving the Security and Applicability of Privacy-Preserving Point Collection. In Proceedings of the 24th ACM Conference on Computer and Communications Security — ACM CCS 2017, pages 1925–1942, 2017.
[PDF]
G. Herold, M. Hoffmann, M. Klooss, C. Rafols, and A. Rupp. New Techniques for Structural Batch Verification in Bilinear Groups with Applications to Groth-Sahai Proofs. In Proceedings of the 24th ACM Conference on Computer and Communications Security — ACM CCS 2017, pages 1547–1564, ACM, 2017.
[PDF]
D. Hofheinz, T. Jager and A. Rupp. Public-Key Encryption with Simulation-Based
Selective-Opening Security and Compact Ciphertexts. In 14th Theory of Cryptography Conference — TCC 2016-B, volume 9986
of Lecture Notes in Computer Science, pages 146–168. Springer-Verlag, 2016.
[PDF]
T. Jager and A. Rupp. Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way. In Proceedings of the 16th Privacy Enhancing Technologies Symposium
— PoPETs 2016, vol. 2016, no. 3, p. 62–82. Degruyter, 2016.
[PDF]
G. Hartung, B. Kaidel, A. Koch, J. Koch, A. Rupp. Fault-Tolerant Aggregate Signatures.
In 19th International Conference on the Theory and Practice of Public-Key Cryptography
— PKC 2016, volume 9614 of Lecture Notes in Computer Science, pages 331–356. Springer-Verlag, 2016.
[PDF]
J. Hesse, D. Hofheinz, and A. Rupp. Reconfigurable Cryptography: A Flexible Approach
to Long-Term Security. In 13th Theory of Cryptography Conference — TCC 2016-A, volume 9562
of Lecture Notes in Computer Science, pages 416–445. Springer-Verlag, 2016.
[PDF]
A. Rupp, F. Baldimitsi, G. Hinterwalder, and C. Paar. Cryptographic Theory Meets Practice: Efficient and Privacy-Preserving Payments for Public Transport. ACM Transactions on Information and System Security, vol. 17,
no. 3, p. 10:1–10:31. ACM, 2015.
[PDF]
G. Herold, J. Hesse, D. Hofheinz, R. Rafols, and A. Rupp. Polynomial Spaces: A New
Framework for Composite-To-Prime-Order Transformations. In 34th International Cryptology
Conference — CRYPTO 2014, volume 8616 of Lecture Notes in Computer Science, pages 261–279. Springer-Verlag, 2014.
[PDF]
D. Hofheinz and A. Rupp. Standard versus Selective Opening Security: Separation and
Equivalence Results. In 11th Theory of Cryptography Conference — TCC 2014, volume 8349
of Lecture Notes in Computer Science, pages 591–615. Springer-Verlag, 2014.
[PDF]
A. Rupp, F. Baldimitsi, G. Hinterwalder, and C. Paar. P4R: Privacy-Preserving
Pre-Payments with Refunds for Transportation Systems,
In 17th International Conference on Financial Cryptography and Data Security — FC
2013, volume 7859 of Lecture Notes
in Computer Science, pages 205–212. Springer-Verlag, 2013.
[PDF]
M. Keller, G. L. Mikkelsen, and A. Rupp. Threshold Zero-Knowledge with
Applications to User-Centric Cryptographic Protocols, In
6th International Conference on Information
Theoretic Security — ICITS 2012, volume 7412 of Lecture Notes
in Computer Science, pages 147–166. Springer-Verlag, 2012.
[PDF]
F. Baldimtsi, G. Hinterwalder, A. Rupp, A. Lysyanskaya, C.
Paar, and W. P. Burleson. Pay
As You Go, Conference records of the 5th Workshop on Hot
Topics in Privacy Enhancing Technologies — HotPETs 2012.
[PDF]
T. Jager and A. Rupp. The Semi-Generic Group
Model and Applications to Pairing- Based Cryptography. In
16th International Conference on the Theory and Application of
Cryptology and Information Security — ASIACRYPT 2010, volume
6477 of Lecture Notes in Computer Science, pages 539–556.
Springer-Verlag, 2010.
[PDF]
A. Rupp, T. Eisenbarth, A. Bogdanov, and O. Grieb. Hardware
SLE Solvers: Efficient Building Blocks for Cryptographic and
Cryptanalytic Applications. Integration, the VLSI Journal -
Special Issue “Hardware Architectures for Algebra, Cryptology
and Number Theory”, Elsevier, 2010.
[PDF]
C. Paar, A. Rupp, K. Schramm, A. Weimerskirch, and W.
Burleson. Securing Green Cars: IT Security in Next-Generation
Electric Vehicle Systems. In 2009 Annual Meeting and
Exposition of the Intelligent Transportation Society of America, 2009.
[PDF]
C. Paar, J. Pelzl, A. Rupp, K. Schramm, and A.
Weimerskirch. Green Car Security: IT-Sicherheit und
Elektromobilität. DACH Security 2009.
[PDF]
T. Güneysu, T. Kasper, M. Novotny, C. Paar, and
A. Rupp. Cryptanalysis with COPACOBANA. IEEE
Transactions on Computers, vol. 57, no. 11, p. 1498–1513.
IEEE Computer Society, 2008.
[PDF]
A. Rupp, G. Leander, E. Bangerter, A. Dent, and A.
Sadeghi. Sufficient Conditions for Intractability over
Black-Box Groups: Generic Lower Bounds for Generalized DL and DH
Problems. In 14th International Conference on the Theory and
Application of Cryptology and Information Security —
ASIACRYPT 2008, volume 5350 of Lecture Notes in Computer Science, pages
489–505. Springer-Verlag, 2008.
[PDF]
K. Altmann, T. Jager, and A. Rupp. On Black-Box
Ring Extraction and Integer Factorization. In 35th
International Colloquium on Automata, Languages and Programming
— ICALP 2008, volume 5126 of Lecture Notes in Computer
Science, pages 437–448. Springer-Verlag, 2008.
[PDF]
B. Möller and A. Rupp. Faster
Multi-Exponentiation through Caching: Accelerating (EC)DSA Signature
Verification. In 6th Conference on Security and Cryptography
for Networks — SCN 2008, volume 5229 of Lecture Notes in
Computer Science, pages 39–56. Springer-Verlag, 2008.
[PDF]
A. Bogdanov, T. Eisenbarth, A. Rupp, and C. Wolf. Time-Area
Optimized Public-Key Engines: MQ-Cryptosystems as Replacement for
Elliptic Curves?. In 10th Workshop on Cryptographic Hardware
and Embedded Systems — CHES 2008, (Best Paper Award),
volume 5154 of Lecture Notes in Computer Science, pages
45–61. Springer-Verlag, 2008.
[PDF]
T. Gendrullis, M. Novotny, and A. Rupp. A
Real-World Attack Breaking A5/1 within Hours. In 10th
Workshop on Cryptographic Hardware and Embedded Systems —
CHES 2008, volume 5154 of Lecture Notes in Computer Science, pages
266–282. Springer-Verlag, 2008.
[PDF]
S. Balasubramanian, A. Bogdanov, A. Rupp, J. Ding, and H.
W. Carter. Fast Multivariate Signature Generation in
Hardware: The Case of Rainbow. In 19th IEEE International
Conference on Application-specific Systems, Architectures and
Processors — ASAP 2008, pages 25–30. IEEE Computer
Society, 2008.
[PDF]
S. Balasubramanian, A. Bogdanov, A. Rupp, J. Ding, and H.
W. Carter. Fast Multivariate Signature Generation in
Hardware: The Case of Rainbow (short paper). In 16th IEEE
Symposium on Field-Programmable Custom Computing Machines —
FCCM 2008. IEEE Computer Society, 2008.
[PDF]
A. Bogdanov, T. Eisenbarth, and A. Rupp. A
Hardware-Assisted Realtime Attack on A5/2 without Precomputations.
In 9th Workshop on Cryptographic Hardware and Embedded Systems
— CHES 2007, volume 4727 of Lecture Notes in Computer
Science, pages 394– 412. Springer-Verlag, 2007.
[PS]
T. Güneysu, A. Rupp, and S. Spitz. Cryptanalytic
Time-Memory Tradeoffs on COPACOBANA. In 2nd Workshop
Kryptologie in Theorie und Praxis (German), Informatik 2007, volume 110
of Lecture Notes in Informatics, pages 205–209. Gesellschaft
für Informatik e.V. (GI), 2007.
[PDF]
G. Leander and A. Rupp. On the Equivalence of
RSA and Factoring Regarding Generic Ring Algorithms. In 12th
International Conference on the Theory and Application of Cryptology
and Information Security — ASIACRYPT 2006, volume 4284 of
Lecture Notes in Computer Science, pages 241–251.
Springer-Verlag, 2006.
[PDF]
A. Bogdanov, M. Mertens, C. Paar, J. Pelzl, and A. Rupp. A
Parallel Hardware Architecture for fast Gaussian Elimination over GF(2).
In 14th IEEE Symposium on Field-Programmable Custom Computing Machines
— FCCM 2006, pages 237–248. IEEE Computer Society,
2006.
[PDF]
S. Kumar, C. Paar, J. Pelzl, G. Pfeiffer, A. Rupp, and M.
Schimmler. How to break DES for EUR 8,980. In 2nd
International Workshop on Special- Purpose Hardware for Attacking
Cryptographic Systems — SHARCS 2006, 2006.
[PDF]
A. Bogdanov, M. Mertens, C. Paar, J. Pelzl, and A. Rupp. SMITH
- a Parallel Hardware Architecture for fast Gaussian Elimination over
GF(2). In 2nd Workshop on Special-purpose Hardware for
Attacking Cryptographic Systems — SHARCS 2006, 2006.
[PDF]
E. Bangerter, A. Rupp, and A. Sadeghi. Simplified
Hardness Proofs in the Generic Group Model. In 1st Western
European Workshop on Research in Cryptology — WEWoRC 2005,
2005.
A. Rupp, H. Dreger, A. Feldmann, and R. Sommer. Packet
Trace Manipulation Framework for Test Labs. In 4th ACM
SIGCOMM Conference on Internet Measurement — IMC 2004, pages
251–256. ACM Press, 2004.
[PDF]
Technical Reports
T. Jager and A. Rupp. Generic Group Algorithms.
Technical Report TR-HGI-2007-003, 2007.
S. Babbage, D. Catalano, L. Granboulan, A. Lenstra, C.
Paar, J. Pelzl, T. Pornin, B. Preneel, M. Robshaw, A. Rupp, N. Smart,
and M. Ward. ECRYPT Yearly Report on Algorithms and Keysizes,
2005. [PDF]
R. Avanzi, L. Batina, B. Chevallier-Mames, N. Courtois, C.
Diem, R. Granger, J. Großschädl, M. Joye, N.
Mentens, R. Oyono, D. Page, J. Pelzl, A. Rupp, and S. Tillich. ECRYPT
Deliverable D.VAM.1: Performance Benchmarks, 2005. [PDF]
Theses
A. Rupp. Computational Aspects of Cryptography
and Cryptanalysis. Dissertation in Electrical Engineering and
Information Sciences, Ruhr-University Bochum, 2008. [PDF]
A. Rupp. A Software System for Packet Trace
Customization with Application to NIDS Evaluation. Diploma
Thesis, Saarland University, 2004. [PDF]