Publication | Date of Publication | Type |
---|
(Continuous) Non-malleable Codes for Partial Functions with Manipulation Detection and Light Updates | 2024-04-21 | Paper |
Permissionless clock synchronization with public setup | 2023-08-14 | Paper |
Decentralizing information technology: the advent of resource based systems | 2023-07-28 | Paper |
Watermarkable public key encryption with efficient extraction under standard assumptions | 2023-07-25 | Paper |
Ofelimos: combinatorial optimization via proof-of-useful-work. A provably secure blockchain protocol | 2023-06-28 | Paper |
Crowd verifiable zero-knowledge and end-to-end verifiable multiparty computation | 2023-03-29 | Paper |
Account management in proof of stake ledgers | 2022-12-16 | Paper |
Making Any Identity-Based Encryption Accountable, Efficiently | 2022-08-19 | Paper |
TOPPSS: Cost-Minimal Password-Protected Secret Sharing Based on Threshold OPRF | 2022-07-01 | Paper |
SoK: communication across distributed ledgers | 2022-06-22 | Paper |
Efficient state management in distributed ledgers | 2022-06-22 | Paper |
Fast isomorphic state channels | 2022-06-22 | Paper |
Multi-instance publicly verifiable time-lock puzzle and its applications | 2022-06-22 | Paper |
Mining for privacy: how to bootstrap a snarky blockchain | 2022-06-17 | Paper |
Composition with knowledge assumptions | 2022-05-18 | Paper |
Resource-restricted cryptography: revisiting MPC bounds in the proof-of-work era | 2022-03-23 | Paper |
Dynamic ad hoc clock synchronization | 2021-12-08 | Paper |
Blockchains from non-idealized hash functions | 2021-12-01 | Paper |
Ledger combiners for fast settlement | 2021-12-01 | Paper |
Timed signatures and zero-knowledge proofs -- timestamping in the blockchain era | 2021-02-23 | Paper |
Proof-of-burn | 2021-02-08 | Paper |
The Combinatorics of the Longest-Chain Rule: Linear Consistency for Proof-of-Stake Blockchains | 2021-02-02 | Paper |
Smart Contract Derivatives | 2021-02-02 | Paper |
One-shot signatures and applications to hybrid quantum/classical authentication | 2021-01-19 | Paper |
SoK: a consensus taxonomy in the blockchain era | 2020-08-05 | Paper |
Consensus from signatures of work | 2020-08-05 | Paper |
Non-malleable codes for partial functions with manipulation detection | 2020-06-30 | Paper |
Compact Storage of Superblocks for NIPoPoW Applications | 2020-06-29 | Paper |
On trees, chains and fast transactions in the blockchain | 2020-03-02 | Paper |
The combinatorics of hidden diversity | 2020-02-20 | Paper |
A universally composable framework for the privacy of email ecosystems | 2019-01-23 | Paper |
Secure outsourcing of cryptographic circuits manufacturing | 2018-11-07 | Paper |
Graded signatures | 2018-10-18 | Paper |
Distributed parameter generation for bilinear Diffie Hellman exponentiation and applications | 2018-10-18 | Paper |
On the security properties of e-voting bulletin boards | 2018-10-17 | Paper |
Ouroboros Praos: an adaptively-secure, semi-synchronous proof-of-stake blockchain | 2018-07-09 | Paper |
Bootstrapping the blockchain, with applications to consensus and fast PKI setup | 2018-05-29 | Paper |
The Bitcoin backbone protocol with chains of variable difficulty | 2017-11-03 | Paper |
Ouroboros: a provably secure proof-of-stake blockchain protocol | 2017-11-03 | Paper |
Ceremonies for End-to-End Verifiable Elections | 2017-06-13 | Paper |
Resource-based corruptions and the combinatorics of hidden diversity | 2017-05-16 | Paper |
Indistinguishable Proofs of Work or Knowledge | 2017-01-06 | Paper |
Fair and Robust Multi-party Computation Using a Global Transaction Ledger | 2016-07-15 | Paper |
Communication Optimal Tardos-Based Asymmetric Fingerprinting | 2016-03-02 | Paper |
The Bitcoin Backbone Protocol: Analysis and Applications | 2015-09-30 | Paper |
End-to-End Verifiable Elections in the Standard Model | 2015-09-30 | Paper |
Scalable public-key tracing and revoking | 2015-09-04 | Paper |
Distributing the setup in universally composable multi-party computation | 2015-09-03 | Paper |
A Little Honesty Goes a Long Way | 2015-07-06 | Paper |
Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model | 2015-01-06 | Paper |
Efficient Proofs of Secure Erasure | 2014-10-14 | Paper |
A one-time stegosystem and applications to efficient covert communication | 2014-04-01 | Paper |
Solving the at-most-once problem with nearly optimal effectiveness | 2014-01-10 | Paper |
Tamper Resilient Circuits: The Adversary at the Gates | 2013-12-10 | Paper |
Encryption for digital content | 2013-07-29 | Paper |
Scalable public-key tracing and revoking | 2013-06-07 | Paper |
The Strong At-Most-Once Problem | 2013-03-13 | Paper |
BiTR: Built-in Tamper Resilience | 2011-12-02 | Paper |
On the Effects of Pirate Evolution on the Design of Digital Content Distribution Systems | 2011-06-08 | Paper |
https://portal.mardi4nfdi.de/entity/Q3001125 | 2011-05-31 | Paper |
Breaking and Repairing Asymmetric Public-Key Traitor Tracing | 2011-03-18 | Paper |
Improving the Round Complexity of Traitor Tracing Schemes | 2010-07-06 | Paper |
The Vector-Ballot Approach for Online Voting Procedures | 2010-06-17 | Paper |
Multi-query Computationally-Private Information Retrieval with Constant Communication Rate | 2010-05-28 | Paper |
Computer Aided Verification | 2010-03-31 | Paper |
At-Most-Once Semantics in Asynchronous Shared Memory | 2009-11-19 | Paper |
Secure Function Collection with Sublinear Storage | 2009-07-14 | Paper |
On the Portability of Generalized Schnorr Proofs | 2009-05-12 | Paper |
Zero-Knowledge Proofs with Witness Elimination | 2009-03-24 | Paper |
Pirate Evolution: How to Make the Most of Your Traitor Keys | 2009-03-10 | Paper |
Cryptographic Hardness Based on the Decoding of Reed–Solomon Codes | 2009-02-24 | Paper |
Concurrent Blind Signatures Without Random Oracles | 2008-11-27 | Paper |
Privacy Preserving Data Mining within Anonymous Credential Systems | 2008-11-20 | Paper |
Efficient Cryptographic Protocols Realizing E-Markets with Price Discrimination | 2008-09-09 | Paper |
Group Encryption | 2008-05-15 | Paper |
Group Signatures with Efficient Concurrent Join | 2008-05-06 | Paper |
Equivocal Blind Signatures and Adaptive UC-Security | 2008-03-05 | Paper |
Trading Static for Adaptive Security in Universally Composable Zero-Knowledge | 2007-11-28 | Paper |
Advances in Cryptology - EUROCRYPT 2004 | 2007-09-25 | Paper |
Advances in Cryptology - EUROCRYPT 2004 | 2007-09-25 | Paper |
Cryptanalyzing the polynomial-reconstruction based public-key system under optimal parameter choice | 2007-09-20 | Paper |
Decoding interleaved Reed-Solomon codes over noisy channels | 2007-07-16 | Paper |
Applied Cryptography and Network Security | 2007-05-02 | Paper |
Progress in Cryptology – Mycrypt 2005 | 2006-10-05 | Paper |
Automata, Languages and Programming | 2006-01-10 | Paper |
Financial Cryptography and Data Security | 2005-12-22 | Paper |
Cryptanalyzing the Polynomial-Reconstruction Based Public-Key System Under Optimal Parameter Choice | 2005-08-12 | Paper |
Financial Cryptography | 2005-06-13 | Paper |
https://portal.mardi4nfdi.de/entity/Q4737160 | 2004-08-11 | Paper |
https://portal.mardi4nfdi.de/entity/Q4737263 | 2004-08-11 | Paper |
https://portal.mardi4nfdi.de/entity/Q4738936 | 2004-08-11 | Paper |
https://portal.mardi4nfdi.de/entity/Q3043933 | 2004-08-09 | Paper |
https://portal.mardi4nfdi.de/entity/Q4736427 | 2004-08-09 | Paper |
https://portal.mardi4nfdi.de/entity/Q4449167 | 2004-02-08 | Paper |
https://portal.mardi4nfdi.de/entity/Q4434903 | 2003-11-26 | Paper |
https://portal.mardi4nfdi.de/entity/Q4415064 | 2003-07-28 | Paper |
https://portal.mardi4nfdi.de/entity/Q4783720 | 2002-12-08 | Paper |
https://portal.mardi4nfdi.de/entity/Q4535074 | 2002-06-12 | Paper |