Publication | Date of Publication | Type |
---|
On the impossibility of algebraic vector commitments in pairing-free groups | 2023-08-14 | Paper |
Escrow Protocols for Cryptocurrencies: How to Buy Physical Goods Using Bitcoin | 2021-03-17 | Paper |
On the cryptographic deniability of the Signal protocol | 2021-02-23 | Paper |
Publicly evaluatable perceptual hashing | 2021-02-23 | Paper |
Using level-1 homomorphic encryption to improve threshold DSA signatures for Bitcoin wallet security | 2020-03-02 | Paper |
Fine-grained secure computation | 2018-12-06 | Paper |
Homomorphic secret sharing from Paillier encryption | 2018-11-07 | Paper |
Efficient rational proofs for space bounded computations | 2017-10-27 | Paper |
Achieving independence efficiently and securely | 2017-09-29 | Paper |
Threshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet Security | 2016-10-04 | Paper |
Automata evaluation and text search protocols with simulation-based security | 2016-06-01 | Paper |
Simplified VSS and fast-track multiparty computations with applications to threshold cryptography | 2016-03-02 | Paper |
Sequentially Composable Rational Proofs | 2015-12-11 | Paper |
Robust and Efficient Sharing of RSA Functions | 2015-11-11 | Paper |
Algebraic (trapdoor) one-way functions: constructions and applications | 2015-10-08 | Paper |
The round complexity of verifiable secret sharing and secure multicast | 2015-02-27 | Paper |
Robust Threshold DSS Signatures | 2014-08-20 | Paper |
Generalizing Homomorphic MACs for Arithmetic Circuits | 2014-03-25 | Paper |
On the Relationship between Functional Encryption, Obfuscation, and Fully Homomorphic Encryption | 2014-01-17 | Paper |
Fully Homomorphic Message Authenticators | 2013-12-10 | Paper |
Hard-Core Predicates for a Diffie-Hellman Problem over Finite Fields | 2013-09-17 | Paper |
Quadratic Span Programs and Succinct NIZKs without PCPs | 2013-05-31 | Paper |
The Generalized Randomized Iterate and Its Application to New Efficient Constructions of UOWHFs from Regular One-Way Functions | 2013-03-19 | Paper |
Algebraic (Trapdoor) One-Way Functions and Their Applications | 2013-03-18 | Paper |
Computational Extractors and Pseudorandomness | 2012-06-15 | Paper |
Verifiable Delegation of Computation over Large Datasets | 2011-08-12 | Paper |
Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement | 2010-11-26 | Paper |
Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers | 2010-08-24 | Paper |
Lower bounds on the efficiency of encryption and digital signature schemes | 2010-08-16 | Paper |
Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead | 2010-07-06 | Paper |
Secure Network Coding over the Integers | 2010-05-28 | Paper |
Text Search Protocols with Simulation Based Security | 2010-05-28 | Paper |
Making the Diffie-Hellman Protocol Identity-Based | 2010-03-16 | Paper |
A new and improved paradigm for hybrid encryption secure against chosen-ciphertext attack | 2010-03-01 | Paper |
Secure multiplication of shared secrets in the exponent | 2009-12-18 | Paper |
More on Key Wrapping | 2009-12-09 | Paper |
New approaches for deniable authentication | 2009-11-13 | Paper |
Theory of Cryptography | 2009-05-14 | Paper |
Foundations of Security Analysis and Design II | 2009-05-14 | Paper |
Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM | 2008-05-06 | Paper |
Tag-KEM/DEM: A new framework for hybrid encryption | 2008-04-16 | Paper |
Threshold RSA for Dynamic and Ad-Hoc Groups | 2008-04-15 | Paper |
Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results | 2008-03-05 | Paper |
Faster and Shorter Password-Authenticated Key Exchange | 2008-03-05 | Paper |
Advances in Cryptology - EUROCRYPT 2004 | 2007-09-25 | Paper |
Independent Zero-Knowledge Sets | 2007-09-11 | Paper |
Improved On-Line/Off-Line Threshold Signatures | 2007-09-04 | Paper |
Secure distributed key generation for discrete-log based cryptosystems | 2007-05-24 | Paper |
Cramer-Damgård signatures revisited: Efficient flat-tree signatures based on factoring | 2007-02-26 | Paper |
Provably secure threshold password-authenticated key exchange | 2006-10-05 | Paper |
https://portal.mardi4nfdi.de/entity/Q3374909 | 2006-03-01 | Paper |
An improved pseudo-random generator based on the discrete logarithm problem | 2006-02-08 | Paper |
Public Key Cryptography - PKC 2005 | 2005-12-07 | Paper |
Bounds on the Efficiency of Generic Cryptographic Constructions | 2005-10-28 | Paper |
Advances in Cryptology – CRYPTO 2004 | 2005-08-23 | Paper |
Advances in Cryptology – CRYPTO 2004 | 2005-08-23 | Paper |
https://portal.mardi4nfdi.de/entity/Q4737232 | 2004-08-11 | Paper |
https://portal.mardi4nfdi.de/entity/Q4434896 | 2003-11-26 | Paper |
https://portal.mardi4nfdi.de/entity/Q4434897 | 2003-11-26 | Paper |
https://portal.mardi4nfdi.de/entity/Q4418550 | 2003-08-10 | Paper |
https://portal.mardi4nfdi.de/entity/Q4409117 | 2003-06-30 | Paper |
Paillier's trapdoor function hides up to \(O(n)\) bits | 2003-03-25 | Paper |
https://portal.mardi4nfdi.de/entity/Q4797788 | 2003-03-09 | Paper |
Robust threshold DSS signatures | 2003-01-14 | Paper |
How to sign digital streams | 2003-01-14 | Paper |
https://portal.mardi4nfdi.de/entity/Q4536819 | 2002-08-06 | Paper |
Securing threshold cryptosystems against chosen ciphertext attack | 2002-06-27 | Paper |
https://portal.mardi4nfdi.de/entity/Q2778852 | 2002-03-21 | Paper |
https://portal.mardi4nfdi.de/entity/Q2757241 | 2001-11-25 | Paper |
New efficient and secure protocols for verifiable signature sharing and other applications | 2001-06-10 | Paper |
RSA-based undeniable signatures | 2000-12-21 | Paper |
Secure distributed storage and retrieval | 2000-08-21 | Paper |
https://portal.mardi4nfdi.de/entity/Q4941850 | 2000-07-19 | Paper |
https://portal.mardi4nfdi.de/entity/Q4249324 | 2000-03-09 | Paper |
https://portal.mardi4nfdi.de/entity/Q4250769 | 2000-03-07 | Paper |
Robust and efficient sharing of RSA functions. | 2000-01-01 | Paper |
Securing threshold cryptosystems against chosen ciphertext attack | 1999-09-09 | Paper |
Secure Hash-and-Sign Signatures Without the Random Oracle | 1999-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3838773 | 1998-08-13 | Paper |
https://portal.mardi4nfdi.de/entity/Q4364547 | 1998-05-12 | Paper |
https://portal.mardi4nfdi.de/entity/Q4364551 | 1998-03-17 | Paper |