Publications
The following list includes all publications of the group and publications of Christian Cachin from 2010 onward.
For a complete bibliography of Christian Cachin see the DBLP bibliography page or the Google Scholar list.
Press coverage
Steganography: Secret Messages Can Hide in AI-Generated Media, Quanta magazine, 2023.
Recent work
- Alupotha, J., Gestin, M., & Cachin, C. (2024). Nopenena Untraceable Payments: Defeating Graph Analysis with Small Decoy Sets. Cryptology ePrint Archive, Paper 2024/903. https://eprint.iacr.org/2024/903
- Amores-Sesar, I., & Cachin, C. (2023). We will DAG you. e-print, arxiv:2311.03092 [cs.DC]. https://arxiv.org/abs/2311.03092
- Wicht, F.-X., Wang, Z., Le, D. V., & Cachin, C. (2023). A Transaction-Level Model for Blockchain Privacy. Cryptology ePrint Archive, Paper 2023/1902. https://eprint.iacr.org/2023/1902
Journal papers
- Alpos, O., Cachin, C., Tackmann, B., & Zanolini, L. (2024). Asymmetric Distributed Trust. Distributed Computing, 37(3), 247–277. https://doi.org/10.1007/s00446-024-00469-1
- Coy, S., Czumaj, A., Scheideler, C., Schneider, P., & Werthmann, J. (2024). Routing Schemes for Hybrid Communication Networks. Theoretical Computer Science, 985, 114352. https://doi.org/10.1016/j.tcs.2023.114352
- Cachin, C., Lehnherr, D., & Studer, T. (2025). Synergistic Knowledge. Theoretical Computer Science, 1023, 114902. https://doi.org/10.1016/j.tcs.2024.114902
- Lehnherr, D., Ognjanovic, Z., & Studer, T. (2022). A Logic of Interactive Proofs. Journal of Logic and Computation, 32(8), 1645–1658. https://doi.org/10.1093/logcom/exac071
- Cachin, C., De Caro, A., Moreno-Sanchez, P., Tackmann, B., & Vukolić, M. (2021). The Transaction Graph for Modeling Blockchain Semantics. Cryptoeconomic Systems, 1(1). https://doi.org/10.21428/58320208.a12c57e6
- Cachin, C., & Ohrimenko, O. (2018). Verifying the Consistency of Remote Untrusted Services with Conflict-Free Operations. Information and Computation, 260, 72–88. https://doi.org/10.1016/j.ic.2018.03.004
- Distler, T., Cachin, C., & Kapitza, R. (2016). Resource-efficient Byzantine Fault Tolerance. IEEE Transactions on Computers, 65(9), 2807–2819. https://doi.org/10.1109/TC.2015.2495213
- Cachin, C., Crépeau, C., Marcil, J., & Savvides, G. (2015). Information-Theoretic Interactive Hashing and Oblivious Transfer to a Storage-Bounded Receiver. IEEE Transactions on Information Theory, 61(10), 5623–5635. http://dx.doi.org/10.1109/TIT.2015.2450732
- Brandenburger, M., Cachin, C., & Knežević, N. (2017). Don’t Trust the Cloud, Verify: Integrity and Consistency for Cloud Object Stores. ACM Transactions on Privacy and Security, 20(3), 8:1–8:30. https://doi.acm.org/10.1145/3079762
- Cachin, C., Keidar, I., & Shraer, A. (2011). Fail-Aware Untrusted Storage. SIAM Journal on Computing, 40(2), 493–533.
Conference papers
- Amores-Sesar, I., Cachin, C., & Schneider, P. (2024). An Analysis of Avalanche Consensus. In Y. Emek (Ed.), Proc. Structural Information and Communication Complexity (SIROCCO) (Vol. 14662, pp. 27–44). Springer. https://doi.org/10.1007/978-3-031-60603-8_2
- Cachin, C., & Mićić, J. (2024). Quick Order Fairness: Implementation and Evaluation. Proc. IEEE International Conference on Blockchain And Cryptocurrency (ICBC), 230–234. https://doi.org/10.1109/ICBC59979.2024.10634386
- Cachin, C., Lehnherr, D., & Studer, T. (2023). Synergistic Knowledge. In S. Dolev & B. Schieber (Eds.), Proc. Stabilization, Safety, and Security of Distributed Systems (SSS) (Vol. 14310, pp. 552–567). Springer. https://doi.org/10.1007/978-3-031-44274-2_41
- Coy, S., Czumaj, A., Scheideler, C., Schneider, P., & Werthmann, J. (2023). Routing Schemes for Hybrid Communication Networks. In S. Rajsbaum, A. Balliu, J. J. Daymude, & D. Olivetti (Eds.), Proc. Structural Information and Communication Complexity (SIROCCO) (Vol. 13892, pp. 317–338). Springer. https://doi.org/10.1007/978-3-031-32733-9_14
- Wang, Z., Cirkovic, M., Le, D. V., Knottenbelt, W. J., & Cachin, C. (2023). Pay Less for Your Privacy: Towards Cost-Effective On-Chain Mixers. In J. Bonneau & S. M. Weinberg (Eds.), Proc. 5th Conference on Advances in Financial Technologies (AFT) (Vol. 282, pp. 16:1–16:25). Schloss Dagstuhl - Leibniz-Zentrum für Informatik. https://doi.org/10.4230/LIPIcs.AFT.2023.16
- Alpos, O., Cachin, C., Holmgaard Kamp, S., & Buus Nielsen, J. (2023). Practical Large-Scale Proof-Of-Stake Asynchronous Total-Order Broadcast. In J. Bonneau & S. M. Weinberg (Eds.), Proc. 5th Conference on Advances in Financial Technologies (AFT) (Vol. 282, pp. 31:1–31:22). Schloss Dagstuhl - Leibniz-Zentrum für Informatik. https://doi.org/10.4230/LIPIcs.AFT.2023.31
- Alpos, O., Amores-Sesar, I., Cachin, C., & Yeo, M. (2024). Eating Sandwiches: Modular and Lightweight Elimination of Transaction Reordering Attacks. In A. Bessani, X. Défago, J. Nakamura, K. Wada, & Y. Yamauchi (Eds.), Proc. 27th International Conference on Principles of Distributed Systems (OPODIS) (Vol. 286, pp. 12:1–12:22). Schloss Dagstuhl – Leibniz-Zentrum für Informatik. https://doi.org/10.4230/LIPIcs.OPODIS.2023.12
- Alpos, O., & Cachin, C. (2023). Do Not Trust in Numbers: Practical Distributed Cryptography With General Trust. In S. Dolev & B. Schieber (Eds.), Proc. Stabilization, Safety, and Security of Distributed Systems (SSS) (Vol. 14310, pp. 536–551). Springer. https://doi.org/10.1007/978-3-031-44274-2_40
- Azouvi, S., Cachin, C., Le, D. V., Vukolic, M., & Zanolini, L. (2022). Modeling Resources in Permissionless Longest-Chain Total-Order Broadcast. In E. Hillel, R. Palmieri, & E. Rivière (Eds.), Proc. 26th International Conference on Principles of Distributed Systems (OPODIS) (Vol. 253, pp. 19:1–19:23). Schloss Dagstuhl - Leibniz-Zentrum für Informatik. https://doi.org/10.4230/LIPIcs.OPODIS.2022.19
- Cachin, C., Losa, G., & Zanolini, L. (2022). Quorum Systems in Permissionless Networks. In E. Hillel, R. Palmieri, & E. Rivière (Eds.), Proc. 26th International Conference on Principles of Distributed Systems (OPODIS) (Vol. 253, pp. 17:1–17:22). Schloss Dagstuhl - Leibniz-Zentrum für Informatik. https://doi.org/10.4230/LIPIcs.OPODIS.2022.17
- Amores-Sesar, I., Cachin, C., & Tedeschi, E. (2022). When is Spring coming? A Security Analysis of Avalanche Consensus. In E. Hillel, R. Palmieri, & E. Rivière (Eds.), Proc. 26th International Conference on Principles of Distributed Systems (OPODIS) (Vol. 253, pp. 10:1–10:22). Schloss Dagstuhl - Leibniz-Zentrum für Informatik. https://doi.org/10.4230/LIPIcs.OPODIS.2022.10
- Cachin, C., Mićić, J., Steinhauer, N., & Zanolini, L. (2022). Quick Order Fairness. In I. Eyal & J. A. Garay (Eds.), Proc. Financial Cryptography and Data Security (FC) (Vol. 13411, pp. 316–333). Springer. https://doi.org/10.1007/978-3-031-18283-9_15
- Amores-Sesar, I., Cachin, C., & Parker, A. (2021). Generalizing Weighted Trees: A Bridge from Bitcoin to GHOST. In F. Baldimtsi & T. Roughgarden (Eds.), Proc. 3rd ACM Conference on Advances in Financial Technologies (AFT) (pp. 156–169). https://doi.org/10.1145/3479722.3480995
- Alpos, O., Cachin, C., & Zanolini, L. (2021). How to Trust Strangers: Composition of Byzantine Quorum Systems. Proc. 40th Symposium on Reliable Distributed Systems (SRDS), 120–131. https://doi.org/10.1109/SRDS53918.2021.00021
- Alpos, O., Cachin, C., Marson, G. A., & Zanolini, L. (2021). On the Synchronization Power of Token Smart Contracts. Proc. 41st International Conference on Distributed Computing Systems (ICDCS), 640–651. https://doi.org/10.1109/ICDCS51616.2021.00067
- Cachin, C., & Zanolini, L. (2021). Brief Announcement: Revisiting Signature-Free Asynchronous Byzantine Consensus. In S. Gilbert (Ed.), Proc. 35th International Symposium on Distributed Computing (DISC) (Vol. 209, pp. 51:1–51:4). Schloss Dagstuhl - Leibniz-Zentrum für Informatik. https://doi.org/10.4230/LIPIcs.DISC.2021.51
- Cachin, C., & Zanolini, L. (2021). Asymmetric Asynchronous Byzantine Consensus. In Garcı́a-Alfaro Joaquı́n, J. L. Muñoz-Tapia, G. Navarro-Arribas, & M. Soriano (Eds.), Proc. ESORICS Workshops on Data Privacy Management (DPM), Cryptocurrencies and Blockchain Technology (CBT) (Vol. 13140, pp. 192–207). Springer. https://doi.org/10.1007/978-3-030-93944-1_13
- Amores-Sesar, I., Cachin, C., & Mićić, J. (2021). Security Analysis of Ripple Consensus. In Q. Bramas, R. Oshman, & P. Romano (Eds.), Proc. 24th International Conference on Principles of Distributed Systems (OPODIS) (Vol. 184, pp. 10:1–10:16). Schloss Dagstuhl–Leibniz-Zentrum für Informatik. https://doi.org/10.4230/LIPIcs.OPODIS.2020.10
- Cachin, C., Collins, D., Crain, T., & Gramoli, V. (2020). Byzantine Fault Tolerant Vector Consensus with Anonymous Proposals. In L. Chen, N. Li, K. Liang, & S. Schneider (Eds.), Proc. 23rd European Symposium On Research In Computer Security (ESORICS) (Vol. 12308, pp. 133–152). Springer. https://doi.org/10.1007/978-3-030-58951-6_7
- Müller, C., Brandenburger, M., Cachin, C., Felber, P., Göttel, C., & Schiavoni, V. (2020). TZ4Fabric: Executing Smart Contracts with ARM TrustZone (Practical Experience Report). Proc. 39th Symposium on Reliable Distributed Systems (SRDS), 21–30. https://doi.org/10.1109/SRDS51746.2020.00011
- Alpos, O., & Cachin, C. (2020). Consensus Beyond Thresholds: Generalized Byzantine Quorums Made Live. Proc. 39th Symposium on Reliable Distributed Systems (SRDS), 31–40. https://doi.org/10.1109/SRDS51746.2020.00010
- Cachin, C., & Tackmann, B. (2019). Asymmetric Distributed Trust. In P. Felber, R. Friedman, S. Gilbert, & A. Miller (Eds.), Proc. 23rd International Conference on Principles of Distributed Systems (OPODIS) (Vol. 153, pp. 7:1–7:16). Schloss Dagstuhl–Leibniz-Zentrum fuer Informatik. https://doi.org/10.4230/LIPIcs.OPODIS.2019.7
- Cachin, C., De Caro, A., Moreno-Sanchez, P., Tackmann, B., & Vukolić, M. (2020, March). The Transaction Graph for Modeling Blockchain Semantics. Proc. Cryptoeconomic Systems Conference (CES ’20). https://assets.pubpub.org/oh4wbdb0/71581340107043.pdf
- Brandenburger, M., Cachin, C., Kapitza, R., & Sorniotti, A. (2019). Trusted Computing meets Blockchain: Rollback Attacks and a Solution for Hyperledger Fabric. Proc. 38th Symposium on Reliable Distributed Systems (SRDS), 324–333. https://doi.org/10.1109/SRDS47363.2019.00045
- Kokoris-Kogias, E., Androulaki, E., De Caro, A., & Cachin, C. (2018). Channels: Horizontal Scaling and Confidentiality on Permissioned Blockchains. Proc. 23rd European Symposium On Research In Computer Security (ESORICS), 11098, 111–131. https://doi.org/10.1007/978-3-319-99073-6_6
- Cachin, C., Ghosh, E., Papadopoulos, D., & Tackmann, B. (2018). Stateful Multi-Client Verifiable Computation. In B. Preneel & F. Vercauteren (Eds.), Proc. Applied Cryptography and Network Security (ACNS) (Vol. 10892, pp. 637–656). Springer.
- Björkqvist, M., Cachin, C., Engelmann, F., & Sorniotti, A. (2018). Scalable Key Management for Distributed Cloud Storage. Proc. IEEE International Conference on Cloud Engineering (IC2E).
- Androulaki, E., Barger, A., Bortnikov, V., Cachin, C., Christidis, K., De Caro, A., Enyeart, D., Ferris, C., Laventman, G., Manevich, Y., Muralidharan, S., Murthy, C., Nguyen, B., Sethi, M., Singh, G., Smith, K., Sorniotti, A., Stathakopoulou, C., Vukolić, M., … Yellick, J. (2018). Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains. Proc. 13th European Conference on Computer Systems (EuroSys), 30:1–30:15. https://doi.org/10.1145/3190508.3190538
- Cachin, C., & Vukolic, M. (2017). Blockchain Consensus Protocols in the Wild. In A. W. Richa (Ed.), Proc. 31st Intl. Symposium on Distributed Computing (DISC) (Vol. 91, pp. 1:1–1:16). Schloss Dagstuhl–Leibniz-Zentrum fuer Informatik. http://dx.doi.org/10.4230/LIPIcs.DISC.2017.1
- Cachin, C., Camenisch, J., Freire-Stögbuchner, E., & Lehmann, A. (2017). Updatable Tokenization: Formal Definitions and Provably Secure Constructions. Proc. Financial Cryptography and Data Security (FC), 10322, 59–75. https://doi.org/10.1007/978-3-319-70972-7_4
- Brandenburger, M., Cachin, C., Lorenz, M., & Kapitza, R. (2017, June). Rollback and Forking Detection for Trusted Execution Environments using Lightweight Collective Memory. Proc. Intl. Conference on Dependable Systems And Networks (DSN). https://doi.org/10.1109/DSN.2017.45
- Cachin, C., Schubert, S., & Vukolić, M. (2016). Non-determinism in Byzantine Fault-Tolerant Replication. In P. Fatourou, E. Jiménez, & F. Pedone (Eds.), Proc. 20th International Conference on Principles of Distributed Systems (OPODIS) (Vol. 70, pp. 24:1–24:16). Schloss Dagstuhl–Leibniz-Zentrum fuer Informatik. http://dx.doi.org/10.4230/LIPIcs.OPODIS.2016.24
- Liu, S., Cachin, C., Quéma, V., & Vukolić, M. (2016). XFT: Practical Fault Tolerance Beyond Crashes. In K. Keeton & T. Roscoe (Eds.), Proc. 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI). https://www.usenix.org/system/files/conference/osdi16/osdi16-liu.pdf
- Brandenburger, M., Cachin, C., & Knežević, N. (2015). Don’t Trust the Cloud, Verify: Integrity and Consistency for Cloud Object Stores. In D. Naor, G. Heiser, & I. Keidar (Eds.), Proc. 8th ACM International Systems and Storage Conference (SYSTOR) (p. 16). ACM. http://dx.doi.org/10.1145/2757667.2757681
- Androulaki, E., Cachin, C., Dobre, D., & Vukolić, M. (2014). Erasure-Coded Byzantine Storage with Separate Metadata. In M. K. Aguilera, L. Querzoni, & M. Shapiro (Eds.), Proc. 18th International Conference on Principles of Distributed Systems (OPODIS) (Vol. 8878, pp. 76–90). Springer. http://dx.doi.org/10.1007/978-3-319-14472-6_6
- Cachin, C., & Ohrimenko, O. (2014). Verifying the Consistency of Remote Untrusted Services with Commutative Operations. In M. K. Aguilera, L. Querzoni, & M. Shapiro (Eds.), Proc. 18th International Conference on Principles of Distributed Systems (OPODIS) (Vol. 8878, pp. 1–16). Springer. http://dx.doi.org/10.1007/978-3-319-14472-6_1
- Cachin, C., Dobre, D., & Vukolić, M. (2014). Separating Data and Control: Asynchronous BFT Storage with 2t+1 Data Replicas. Proc. 16th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS), 8756, 1–17. http://dx.doi.org/10.1007/978-3-319-11764-5_1
- Cachin, C., Haralambiev, K., Hsiao, H.-C., & Sorniotti, A. (2013). Policy-based Secure Deletion. Proc. 20th ACM Conference on Computer and Communications Security (CCS). http://doi.acm.org/10.1145/2508859.2516690
- Kapitza, R., Behl, J., Cachin, C., Distler, T., Kuhnle, S., Mohammadi, S. V., Schröder-Preikschat, W., & Stengel, K. (2012). CheapBFT: Resource-efficient Byzantine Fault Tolerance. Proc. 7th European Conference on Computer Systems (EuroSys), 295–308.
- Băsescu, C., Cachin, C., Eyal, I., Haas, R., Sorniotti, A., Vukolić, M., & Zachevsky, I. (2012, June). Robust Data Sharing with Key-Value Stores. Proc. Intl. Conference on Dependable Systems And Networks (DSN).
- Majuntke, M., Dobre, D., Cachin, C., & Suri, N. (2011). Fork-Consistent Constructions From Registers. In A. Fernández Anta, G. Lipari, & M. Roy (Eds.), Proc. 15th Intl. Conference on Principles of Distributed Systems (OPODIS) (Vol. 7109, pp. 283–298). Springer.
- Kurmus, A., Gupta, M., Pletka, R., Cachin, C., & Haas, R. (2011). A Comparison of Secure Multi-tenancy Architectures for Filesystem Storage Clouds. In F. Kon & A.-M. Kermarrec (Eds.), Proc. 12th International Middleware Conference (Vol. 7049, pp. 471–490). Springer.
- Cachin, C. (2011). Integrity and Consistency for Untrusted Services. In I. Cerná & others (Eds.), Proc. 37th Conference on Current Trends in Theory and Practice of Computer Science (SOFSEM 2011) (Vol. 6543, pp. 1–14). Springer.
- Shraer, A., Cachin, C., Cidon, A., Keidar, I., Michalevsky, Y., & Shaket, D. (2010). Venus: Verification for Untrusted Cloud Storage. Proc. Workshop on Cloud Computing Security.
- Björkqvist, M., Cachin, C., Haas, R., Hu, X.-Y., Kurmus, A., Pawlitzek, R., & Vukolić, M. (2010). Design and Implementation of a Key-Lifecycle Management System. In R. Sion (Ed.), Proc. Financial Cryptography and Data Security (FC) (Vol. 6052, pp. 160–174). Springer.
Proceedings, books and book chapters
- Baldimtsi, F., & Cachin, C. (Eds.). (2023). Proc. 27th International Conference on Financial Cryptography and Data Security (FC 2023): Vol. 13950–13951. Springer. https://doi.org/10.1016/j.tcs.2024.114902
- Emek, Y., & Cachin, C. (Eds.). (2020). Proc. 39th ACM Symposium on Principles of Distributed Computing (PODC ’20). ACM. https://doi.org/10.1145/3382734
- Cachin, C. (2019). Byzantine Faults. In D. Malkhi (Ed.), Concurrency: The Works of Leslie Lamport (pp. 67–81). ACM. https://doi.org/10.1145/3335772.3335778
- Anceaume, E., Cachin, C., & Potop-Butucaru, M. (2016). Principles of Distributed Systems, 19th International Conference (OPODIS 2015) (E. Anceaume, C. Cachin, & M. Potop-Butucaru, Eds.; Vol. 46). Schloss Dagstuhl–Leibniz-Zentrum fuer Informatik. http://www.dagstuhl.de/dagpub/978-3-939897-98-9
- Cachin, C., & van Renesse, R. (Eds.). (2013). Proc. 9th Workshop on Hot Topics in Dependable Systems (HotDep), Farmington (PA), USA. ACM. http://dl.acm.org/citation.cfm?id=2524224
- Cachin, C., Guerraoui, R., & Rodrigues, L. (2011). Introduction to Reliable and Secure Distributed Programming (Second Edition). Springer. https://doi.org/10.1007/978-3-642-15260-3
- Cachin, C. (2010). State Machine Replication with Byzantine Faults. In B. Charron-Bost, F. Pedone, & A. Schiper (Eds.), Replication: Theory and Practice (Vol. 5959, pp. 169–184). Springer. http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=5959
Other publications
- (Mićić) Milojević, J. (2024). Security and Fairness of Blockchain Consensus Protocols. Dissertation of the Faculty of Science, University of Bern. https://crypto.unibe.ch/archive/theses/2024.phd.jovana.milojevic.pdf
- Amores Sesar, I. (2024). Scaling the Unscalable: A Study About Consensus. Dissertation of the Faculty of Science, University of Bern. https://crypto.unibe.ch/archive/theses/2024.phd.ignacio.amores.sesar.pdf
- Alpos, O. (2023). Distributed Protocols with Threshold and General Trust Assumptions. Dissertation of the Faculty of Science, University of Bern. https://crypto.unibe.ch/archive/theses/2023.phd.orestis.alpos.pdf
- Zanolini, L. (2023). Asymmetric Trust in Distributed Systems. Dissertation of the Faculty of Science, University of Bern. https://crypto.unibe.ch/archive/theses/2023.phd.luca.zanolini.pdf
- Eggen, M., & Cachin, C. (2020). Modernisierung der Formerfordernisse bei der Übertragung von Rechten (Zession und Wertpapierrecht). Teil 1: Wertpapierrecht. Gutachten, im Auftrag des Bundesamtes für Justiz (BJ). https://www.bj.admin.ch/bj/de/home/publiservice/publikationen/externe/2020-12-22.html
- Alpos, O., Cachin, C., & Zanolini, L. (2021). Brief Announcement: How to Trust Strangers – Composition of Byzantine Quorum Systems. In S. Gilbert (Ed.), Proc. 35th International Symposium on Distributed Computing (DISC) (Vol. 209, pp. 44:1–44:4). Schloss Dagstuhl - Leibniz-Zentrum für Informatik. https://doi.org/10.4230/LIPIcs.DISC.2021.44
- Pellegrini, A., & Zanolini, L. (2020). An Algebraic Model For Quorum Systems. e-print, arXiv:2005.08536 [cs.SC]. https://arxiv.org/abs/2005.08536
- Cachin, C. (2017, September). Blockchain consensus protocols: Snake oil warning. Proc. 13th European Dependable Computing Conference (EDCC).
- Androulaki, E., Cachin, C., Caro, A. D., Sorniotti, A., & Vukolic, M. (2017). Permissioned Blockchains and Hyperledger Fabric. ERCIM News, 2017(110). https://ercim-news.ercim.eu/en110/special/permissioned-blockchains-and-hyperledger-fabric
- Stathakopoulou, C., & Cachin, C. (2017). Threshold Signatures for Blockchain Systems (Research Report RZ 3910; Number RZ 3910). IBM Research.
- Cachin, C. (2016). Architecture of the Hyperledger Blockchain Fabric. Workshop on Distributed Cryptocurrencies and Consensus Ledgers (DCCL 2016). https://www.zurich.ibm.com/dccl/papers/cachin_dccl.pdf
- Cachin, C. (2014). Integrity, Consistency, and Verification of Remote Computation. Tutorial, presented at 21st ACM Conference on Computer and Communications Security (CCS 2014) and 18th International Conference on Principles of Distributed Systems (OPODIS 2014). talks/veriftut.pdf
- Burger, R. A., Cachin, C., & Husmann, E. (2013). Cloud, Trust, Privacy: Trustworthy Cloud Computing Whitepaper. TClouds project. http://www.tclouds-project.eu
- Cachin, C., Dobre, D., & Vukolić, M. (2013). Brief Announcement: BFT Storage with 2t+1 Data Replicas. In Y. Afek (Ed.), Proc. 27th International Conference on Distributed Computing (DISC) (Vol. 8205, pp. 573–574). Springer.
- Cachin, C. (2012). From Reliable to Secure Distributed Programming. Tutorial, presented at the 42nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). http://www.distributedprogramming.net/teaching.shtml
- Cachin, C., Bansal, D., & Karjoth, G. (2012). Key Management with Policy-based Access Control. Presented at 6th International Workshop on Analysis of Security APIs.
- Cachin, C., Junker, B., & Sorniotti, A. (2012). On Limitations of Using Cloud Storage for Data Replication. Proc. 6th Workshop on Recent Advances in Intrusion Tolerance and reSilience (WRAITS 2012).
- Băsescu, C., Cachin, C., Eyal, I., Haas, R., & Vukolić, M. (2011, June). Robust Data Sharing with Key-Value Stores. Proc. 30th ACM Symposium on Principles of Distributed Computing (PODC).
- Cachin, C., & Schunter, M. (2011). A Cloud You Can Trust. IEEE Spectrum, 28–32. http://spectrum.ieee.org/computing/networks/a-cloud-you-can-trust/0
- Cachin, C. (2011). Secure Distributed Programming. Tutorial, presented at the 18th ACM Conference on Computer and Communications Security (CCS). http://www.distributedprogramming.net/teaching.shtml
- Cachin, C. (2011). From Reliable to Secure Distributed Programming. Tutorial, presented at the 25th International Symposium on Distributed Computing (DISC). http://www.distributedprogramming.net/teaching.shtml
- Cachin, C. (2011). Protocols for Secure Cloud Computing. Tutorial, presented at METIS-CTDS 2011, International Spring School on Distributed Systems, Marrakech.
- Kapitza, R., Schunter, M., Cachin, C., Stengel, K., & Distler, T. (2010). Storyboard: Optimistic Deterministic Multithreading. Proc. 6th Workshop on Hot Topics in System Dependability.
- Cachin, C., & Camenisch, J. (2010). Encrypting Keys Securely. IEEE Security & Privacy Magazine, 8(4), 66–69.