Publication | Date of Publication | Type |
---|
Internet Computer Consensus | 2024-03-26 | Paper |
Relaxed Lattice-Based Signatures with Short Zero-Knowledge Proofs | 2023-06-30 | Paper |
Short threshold dynamic group signatures | 2022-12-16 | Paper |
Efficient Post-quantum SNARKs for RSIS and RLWE and Their Applications to Privacy | 2022-10-13 | Paper |
Updatable Tokenization: Formal Definitions and Provably Secure Constructions | 2021-03-17 | Paper |
iUC: flexible universal composability made simple | 2020-05-11 | Paper |
Efficient fully secure leakage-deterring encryption | 2020-05-06 | Paper |
Password-authenticated public-key encryption | 2020-01-30 | Paper |
On the impossibility of structure-preserving deterministic primitives | 2019-01-29 | Paper |
Floppy-sized group signatures from lattices | 2018-08-10 | Paper |
The wonderful world of global random oracles | 2018-07-09 | Paper |
Anonymous attestation with subverted TPMs | 2017-10-27 | Paper |
Practical strongly invisible and strongly accountable sanitizable signatures | 2017-08-25 | Paper |
Chameleon-Hashes with Ephemeral Trapdoors | 2017-06-13 | Paper |
Universal Composition with Responsive Environments | 2017-01-06 | Paper |
UC Commitments for Modular Protocol Design and Applications to Revocation and Attribute Tokens | 2016-11-09 | Paper |
Memory Erasability Amplification | 2016-10-21 | Paper |
Virtual Smart Cards: How to Sign with a Password and a Server | 2016-10-21 | Paper |
Formal Treatment of Privacy-Enhancing Credential Systems | 2016-05-19 | Paper |
Universally Composable Direct Anonymous Attestation | 2016-04-13 | Paper |
Composable and Modular Anonymous Credentials: Definitions and Practical Constructions | 2016-03-23 | Paper |
Recovering Lost Device-Bound Credentials | 2016-03-10 | Paper |
Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions | 2015-08-27 | Paper |
Computing on authenticated data | 2015-05-12 | Paper |
Better Zero-Knowledge Proofs for Lattice Encryption and Their Application to Group Signatures | 2015-01-16 | Paper |
Practical and Employable Protocols for UC-Secure Circuit Evaluation over ℤn | 2014-10-16 | Paper |
Memento: How to Reconstruct Your Secrets from a Single Password in a Hostile Environment | 2014-08-07 | Paper |
On the Impossibility of Structure-Preserving Deterministic Primitives | 2014-02-18 | Paper |
Batch verification of short signatures | 2013-01-04 | Paper |
Fully Anonymous Attribute Tokens from Lattices | 2012-09-25 | Paper |
Efficient Structure-Preserving Signature Scheme from Standard Assumptions | 2012-09-25 | Paper |
Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption | 2012-09-25 | Paper |
Computing on Authenticated Data | 2012-06-15 | Paper |
Structure Preserving CCA Secure Encryption and Applications | 2011-12-02 | Paper |
A Framework for Practical Universally Composable Zero-Knowledge Protocols | 2011-12-02 | Paper |
Provably linkable trading | 2011-06-07 | Paper |
Oblivious Transfer with Hidden Access Control Policies | 2011-03-15 | Paper |
Get Shorty via Group Signatures without Encryption | 2010-09-10 | Paper |
Solving Revocation with Efficient Update of Anonymous Credentials | 2010-09-10 | Paper |
Credential Authenticated Identification and Key Exchange | 2010-08-24 | Paper |
Efficiency Limitations for Σ-Protocols for Group Homomorphisms | 2010-02-24 | Paper |
Private Intersection of Certified Sets | 2010-01-07 | Paper |
Randomizable Proofs and Delegatable Anonymous Credentials | 2009-10-20 | Paper |
Remarks on ``Analysis of one popular group signature scheme in Asiacrypt 2006 | 2009-10-12 | Paper |
A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks | 2009-05-12 | Paper |
On the Portability of Generalized Schnorr Proofs | 2009-05-12 | Paper |
An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials | 2009-03-24 | Paper |
Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data | 2009-03-24 | Paper |
Efficient Protocols for Set Membership and Range Proofs | 2009-02-10 | Paper |
Balancing Accountability and Privacy Using E-Cash (Extended Abstract) | 2008-11-27 | Paper |
Compact E-Cash | 2008-05-06 | Paper |
A Formal Treatment of Onion Routing | 2008-03-17 | Paper |
Batch Verification of Short Signatures | 2007-11-29 | Paper |
Simulatable Adaptive Oblivious Transfer | 2007-11-29 | Paper |
Advances in Cryptology - CRYPTO 2003 | 2007-11-28 | Paper |
Group Signatures: Better Efficiency and New Theoretical Aspects | 2006-10-10 | Paper |
Security in Communication Networks | 2006-10-10 | Paper |
Fine-grained forward-secure signature schemes without random oracles | 2006-04-28 | Paper |
https://portal.mardi4nfdi.de/entity/Q3374912 | 2006-03-01 | Paper |
Public Key Cryptography - PKC 2005 | 2005-12-07 | Paper |
Advances in Cryptology – CRYPTO 2004 | 2005-08-23 | Paper |
https://portal.mardi4nfdi.de/entity/Q4414288 | 2003-07-24 | Paper |
https://portal.mardi4nfdi.de/entity/Q4409110 | 2003-06-30 | Paper |
https://portal.mardi4nfdi.de/entity/Q4409134 | 2003-06-30 | Paper |
https://portal.mardi4nfdi.de/entity/Q4783737 | 2002-12-08 | Paper |
https://portal.mardi4nfdi.de/entity/Q4536806 | 2002-10-07 | Paper |
https://portal.mardi4nfdi.de/entity/Q4536796 | 2002-07-28 | Paper |
https://portal.mardi4nfdi.de/entity/Q4249264 | 2002-05-05 | Paper |
https://portal.mardi4nfdi.de/entity/Q2778843 | 2002-03-21 | Paper |
https://portal.mardi4nfdi.de/entity/Q2707436 | 2002-03-06 | Paper |
https://portal.mardi4nfdi.de/entity/Q2707429 | 2001-12-18 | Paper |
https://portal.mardi4nfdi.de/entity/Q2754171 | 2001-12-09 | Paper |
https://portal.mardi4nfdi.de/entity/Q2757245 | 2001-11-25 | Paper |
Proving in Zero-Knowledge that a Number is the Product of Two Safe Primes | 2001-11-02 | Paper |
https://portal.mardi4nfdi.de/entity/Q4941871 | 2000-08-24 | Paper |
https://portal.mardi4nfdi.de/entity/Q4364567 | 1998-03-10 | Paper |
https://portal.mardi4nfdi.de/entity/Q4365762 | 1997-11-18 | Paper |