Arno Mittelbach


I am currently working as a director of software development for AGT International.

My formal background is in theoretical cryptography. I was part of Prof. Dr. Marc Fischlin’s research group Cryptography and Complexity Theory where I completed a Ph.D. in December 2015.


Publications

Books / Thesis

  1. Random Oracles in the Standard Model
    Arno Mittelbach
    Ph.D. Thesis, January 2016 (tuprints 5222)

Journal Articles

  1. Fiat–Shamir for Highly Sound Protocols Is Instantiable
    Arno Mittelbach, Daniele Venturi
    Theoretical Computer Science Volume 740, 5 September 2018, Pages 28-62
  2. Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol
    Jean Paul Degabriele, Victoria Fehr, Marc Fischlin, Tommaso Gagliardoni, Felix Günther, Giorgia Azzurra Marson, Arno Mittelbach and Kenneth G. Paterson
    International Journal of Information Security 15 (2016), Pages 637–657
  3. The Holinshed Project: Comparing and linking two editions of Holinshed's Chronicles
    James Cummings, Arno Mittelbach
    IJHAC 2010/4: pages 39-53
  4. Capture of lifecycle information in office applications
    Lasse Lehmann, Arno Mittelbach, Christoph Rensing, Ralf Steinmetz
    IJTEL 2010/2: pages 41-57

Papers in Conferences and Workshops with Proceedings

  1. Fiat–Shamir for Highly Sound Protocols Is Instantiable
    Arno Mittelbach, Daniele Venturi
    Security and Cryptography for Networks (SCN) 2016: pages 198-215
  2. Modeling Random Oracles Under Unpredictable Queries
    Pooya Farshim, Arno Mittelbach
    Fast Software Encryption (FSE) 2016: pages 453-473
  3. Random Oracle Uninstantiability from Indistinguishability Obfuscation
    Christina Brzuska, Pooya Farshim, Arno Mittelbach
    Theory of Cryptography Conference (TCC) 2015: pages 428-455
  4. Unpicking PLAID - A Cryptographic Analysis of an ISO-standards-track Authentication Protocol
    Jean Paul Degabriele, Victoria Fehr, Marc Fischlin, Tommaso Gagliardoni, Felix Günther, Giorgia Azzurra Marson, Arno Mittelbach, Kenneth G. Paterson
    Security Standardisation Research (SSR) 2014: pages 1-25
  5. Indistinguishability Obfuscation versus Multi-Bit Point Obfuscation with Auxiliary Input
    Christina Brzuska, Arno Mittelbach
    ASIACRYPT 2014: pages 142-161
  6. Using Indistinguishability Obfuscation via UCEs
    Christina Brzuska, Arno Mittelbach
    ASIACRYPT 2014: pages 122-141
  7. Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources
    Christina Brzuska, Pooya Farshim, Arno Mittelbach
    CRYPTO 2014: pages 188-204
  8. Salvaging Indifferentiability in a Multi-stage Setting
    Arno Mittelbach
    EUROCRYPT 2014: pages 603-621
  9. Reset Indifferentiability and its Consequences
    Paul Baecher, Christina Brzuska, Arno Mittelbach
    ASIACRYPT 2013: pages 154-173
  10. A Cryptographic Analysis of OPACITY
    Özgür Dagdelen, Marc Fischlin, Tommaso Gagliardoni, Giorgia Azzurra Marson, Arno Mittelbach, Cristina Onete
    ESORICS 2013: pages 345-362
  11. Cryptophia's Short Combiner for Collision-Resistant Hash Functions (best student paper award)
    Arno Mittelbach
    ACNS 2013: pages 136-153
  12. Hash Combiners for Second Pre-Image Resistance, Target Collision Resistance and Pre-Image Resistance have Long Output
    Arno Mittelbach
    SCN 2012: pages 522-539
  13. Automatic Detection of Local Reuse
    Arno Mittelbach, Lasse Lehmann, Christoph Rensing and Ralf Steinmetz
    ECTEL 2010: pages 229-244
  14. Automatic Detection and Visualisation of Overlap for Tracking of Information Flow
    Lasse Lehmann, Arno Mittelbach, James Cummings, Christoph Rensing and Ralf Steinmetz
    I-Know 2010: pages 186-197