Christian Cachin
Christian Cachin
University of Bern, Cryptology and Data Security Group
Verified email at - Homepage
Cited by
Cited by
Hyperledger fabric: a distributed operating system for permissioned blockchains
E Androulaki, A Barger, V Bortnikov, C Cachin, K Christidis, A De Caro, ...
Proceedings of the thirteenth EuroSys conference, 1-15, 2018
An information-theoretic model for steganography
C Cachin
International Workshop on Information Hiding, 306-318, 1998
Architecture of the hyperledger blockchain fabric
C Cachin
Workshop on distributed cryptocurrencies and consensus ledgers 310 (4), 1-4, 2016
Computationally private information retrieval with polylogarithmic communication
C Cachin, S Micali, M Stadler
International Conference on the Theory and Applications of Cryptographic …, 1999
Blockchains and consensus protocols: Snake oil warning
C Cachin
2017 13th European Dependable Computing Conference (EDCC), 1-2, 2017
Introduction to reliable and secure distributed programming
C Cachin, R Guerraoui, L Rodrigues
Springer Science & Business Media, 2011
Random oracles in constantipole: practical asynchronous byzantine agreement using cryptography
C Cachin, K Kursawe, V Shoup
Proceedings of the nineteenth annual ACM symposium on Principles of …, 2000
Secure and efficient asynchronous broadcast protocols
C Cachin, K Kursawe, F Petzold, V Shoup
Annual International Cryptology Conference, 524-541, 2001
Efficient private bidding and auctions with an oblivious third party
C Cachin
Proceedings of the 6th ACM Conference on Computer and Communications …, 1999
Trusting the cloud
C Cachin, I Keidar, A Shraer
Acm Sigact News 40 (2), 81-86, 2009
Entropy measures and unconditional security in cryptography
C Cachin
ETH Zurich, 1997
Asynchronous verifiable secret sharing and proactive cryptosystems
C Cachin, K Kursawe, A Lysyanskaya, R Strobl
Proceedings of the 9th ACM Conference on Computer and Communications …, 2002
CheapBFT: Resource-efficient Byzantine fault tolerance
R Kapitza, J Behl, C Cachin, T Distler, S Kuhnle, SV Mohammadi, ...
Proceedings of the 7th ACM european conference on Computer Systems, 295-308, 2012
Unconditional security against memory-bounded adversaries
C Cachin, U Maurer
Annual International Cryptology Conference, 292-306, 1997
Linking information reconciliation and privacy amplification
C Cachin, UM Maurer
journal of Cryptology 10 (2), 97-110, 1997
Secure intrusion-tolerant replication on the Internet
C Cachin, JA Poritz
Proceedings International Conference on Dependable Systems and Networks, 167-176, 2002
One-round secure computation and secure autonomous mobile agents
C Cachin, J Camenisch, J Kilian, J Müller
International Colloquium on Automata, Languages, and Programming, 512-523, 2000
Cryptographic security for mobile code
J Algesheimer, C Cachin, J Camenisch, G Karjoth
Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, 2-11, 2000
{XFT}: Practical fault tolerance beyond crashes
S Liu, P Viotti, C Cachin, V Quéma, M Vukolić
12th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2016
Venus: Verification for untrusted cloud storage
A Shraer, C Cachin, A Cidon, I Keidar, Y Michalevsky, D Shaket
Proceedings of the 2010 ACM workshop on Cloud computing security workshop, 19-30, 2010
The system can't perform the operation now. Try again later.
Articles 1–20