Publication | Date of Publication | Type |
---|
An injectivity analysis of Crystals-Kyber and implications on quantum security | 2023-07-26 | Paper |
Incremental symmetric puncturable encryption with support for unbounded number of punctures | 2023-04-12 | Paper |
A Lattice-Based Approach to Privacy-Preserving Biometric Authentication Without Relying on Trusted Third Parties | 2022-12-09 | Paper |
Post-quantum ID-based ring signatures from symmetric-key primitives | 2022-11-09 | Paper |
Revocable and Linkable Ring Signature | 2022-10-14 | Paper |
Public-Key Puncturable Encryption: Modular and Compact Constructions | 2022-10-13 | Paper |
COSAC: COmpact and Scalable Arbitrary-Centered Discrete Gaussian Sampling over Integers | 2022-10-13 | Paper |
DGM: a \underline{D}ynamic and revocable \underline{G}roup \underline{M}erkle signature | 2022-08-25 | Paper |
Generic multi-keyword ranked search on encrypted cloud data | 2022-08-25 | Paper |
An efficient non-interactive multi-client searchable encryption with support for Boolean queries | 2022-08-19 | Paper |
Vandermonde meets Regev: public key encryption schemes based on partial Vandermonde problems | 2022-08-04 | Paper |
Efficient Verifiable Partially-Decryptable Commitments from Lattices and Applications | 2022-07-08 | Paper |
FPPW: a fair and privacy preserving watchtower for bitcoin | 2022-06-22 | Paper |
Practical post-quantum few-time verifiable random function with applications to Algorand | 2022-06-22 | Paper |
Efficient lattice-based polynomial evaluation and batch ZK arguments | 2022-03-25 | Paper |
On the integer polynomial learning with errors problem | 2021-12-21 | Paper |
Measure-rewind-measure: tighter quantum random oracle model proofs for one-way to hiding and CCA security | 2021-12-01 | Paper |
MPSign: a signature from small-secret middle-product learning with errors | 2021-12-01 | Paper |
Lattice-based zero-knowledge arguments for additive and multiplicative relations | 2021-05-10 | Paper |
Senarai: A Sustainable Public Blockchain-Based Permanent Storage Protocol | 2020-07-20 | Paper |
Lattice RingCT v2.0 with multiple input and multiple output wallets | 2020-05-27 | Paper |
Risk of asynchronous protocol update: attacks to Monero protocols | 2020-05-27 | Paper |
Lattice-based zero-knowledge proofs: new techniques for shorter and faster constructions and applications | 2020-05-20 | Paper |
Short lattice-based one-out-of-many proofs and applications to ring signatures | 2020-01-30 | Paper |
FACCT: FAst, Compact, and Constant-Time Discrete Gaussian Sampler over Integers | 2020-01-28 | Paper |
Practical \(\mathsf{MP} \text{- }\mathsf{LWE}\)-based encryption balancing security-risk versus efficiency | 2019-11-07 | Paper |
Post-quantum one-time linkable ring signature and application to ring confidential transactions in blockchain (lattice ringct v1.0) | 2018-09-26 | Paper |
Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance | 2018-05-28 | Paper |
Hardness of \(k\)-LWE and applications in traitor tracing | 2018-01-05 | Paper |
Middle-product Learning with Errors | 2017-10-27 | Paper |
All-but-many lossy trapdoor functions and selective opening chosen-ciphertext security from LWE | 2017-10-27 | Paper |
Multi-user cloud-based secure keyword search | 2017-08-25 | Paper |
Improved Security Proofs in Lattice-Based Cryptography: Using the Rényi Divergence Rather Than the Statistical Distance | 2016-06-10 | Paper |
Rotational Cryptanalysis of ARX Revisited | 2015-09-18 | Paper |
A subexponential construction of graph coloring for multiparty computation | 2015-01-22 | Paper |
Hardness of k-LWE and Applications in Traitor Tracing | 2014-08-07 | Paper |
Practical attack on NLM-MAC scheme | 2014-06-23 | Paper |
GGHLite: More Efficient Multilinear Maps from Ideal Lattices | 2014-05-27 | Paper |
Lattice-based completely non-malleable public-key encryption in the standard model | 2014-04-29 | Paper |
Security analysis of linearly filtered NLFSRs | 2014-01-23 | Paper |
Cryptanalysis of WG-7: a lightweight stream cipher | 2013-06-24 | Paper |
Graph coloring applied to secure computation in non-abelian groups | 2013-01-04 | Paper |
Active Security in Multiparty Computation over Black-Box Groups | 2012-09-25 | Paper |
NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model | 2012-07-20 | Paper |
On the modular inversion hidden number problem | 2012-05-04 | Paper |
Multi-party computation with conversion of secret sharing | 2012-03-01 | Paper |
Known and Chosen Key Differential Distinguishers for Block Ciphers | 2011-10-27 | Paper |
Lattice-Based Completely Non-malleable PKE in the Standard Model (Poster) | 2011-07-07 | Paper |
Making NTRU as Secure as Worst-Case Problems over Ideal Lattices | 2011-05-27 | Paper |
Security for Signcryption: The Multi-User Model | 2011-05-18 | Paper |
Faster Fully Homomorphic Encryption | 2010-12-07 | Paper |
Advances in Cryptology - ASIACRYPT 2003 | 2010-01-05 | Paper |
Efficient Public Key Encryption Based on Ideal Lattices | 2009-12-15 | Paper |
Public Key Cryptography – PKC 2004 | 2009-05-14 | Paper |
On Secure Multi-party Computation in Black-Box Groups | 2009-03-10 | Paper |
A Critical Look at Cryptographic Hash Function Literature | 2009-03-09 | Paper |
Collision in the DSA Function | 2009-03-09 | Paper |
The Current Status in Design of Efficient Provably Secure Cryptographic Pseudorandom Generators | 2009-03-09 | Paper |
Lattice-based treshold-changeability for standard CRT secret-sharing schemes | 2009-02-09 | Paper |
Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits | 2009-01-09 | Paper |
Lattice-Based Threshold Changeability for Standard Shamir Secret-Sharing Schemes | 2008-12-21 | Paper |
Cryptanalysis of LASH | 2008-09-18 | Paper |
A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders | 2008-06-17 | Paper |
On the Provable Security of an Efficient RSA-Based Pseudorandom Generator | 2008-04-24 | Paper |
How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature | 2008-04-17 | Paper |
VSH, an Efficient and Provable Collision-Resistant Hash Function | 2007-09-24 | Paper |
Formal proofs for the security of signcryption | 2007-05-03 | Paper |
Public Key Cryptography - PKC 2006 | 2007-05-02 | Paper |
New constructions of anonymous membership broadcasting schemes | 2007-04-05 | Paper |
Chinese remaindering with multiplicative noise | 2007-02-14 | Paper |
Public Key Cryptography - PKC 2005 | 2005-12-07 | Paper |
Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes | 2005-08-12 | Paper |
On the security of RSA with primes sharing least-significant bits | 2005-02-09 | Paper |
https://portal.mardi4nfdi.de/entity/Q4737497 | 2004-08-11 | Paper |
https://portal.mardi4nfdi.de/entity/Q3043928 | 2004-08-09 | Paper |
Noisy Chinese remaindering in the Lee norm | 2004-08-06 | Paper |
https://portal.mardi4nfdi.de/entity/Q4472429 | 2004-08-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q4412982 | 2003-07-17 | Paper |
https://portal.mardi4nfdi.de/entity/Q2724423 | 2002-11-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q4536659 | 2002-10-10 | Paper |