Anja Lehmann

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Multi-signatures for ad-hoc and privacy-preserving group signing2024-11-12Paper
Password-based credentials with security against server compromise2024-06-05Paper
Short threshold dynamic group signatures2022-12-16Paper
Compact privacy protocols from post-quantum and timed classical assumptions
Post-Quantum Cryptography
2022-10-13Paper
Selectively linkable group signatures -- stronger security and preserved verifiability2022-06-29Paper
Updatable tokenization: formal definitions and provably secure constructions
Financial Cryptography and Data Security
2021-03-17Paper
(R)CCA secure updatable encryption with integrity protection2020-02-04Paper
Password-authenticated public-key encryption2020-01-30Paper
Group signatures with selective linkability2020-01-28Paper
Updatable encryption with post-compromise security2018-07-17Paper
The wonderful world of global random oracles2018-07-09Paper
Anonymous attestation with subverted TPMs2017-10-27Paper
Virtual smart cards: how to sign with a password and a server
Lecture Notes in Computer Science
2016-10-21Paper
Formal treatment of privacy-enhancing credential systems
Lecture Notes in Computer Science
2016-05-19Paper
Universally composable Direct Anonymous Attestation
Public-Key Cryptography – PKC 2016
2016-04-13Paper
Recovering lost device-bound credentials
Applied Cryptography and Network Security
2016-03-10Paper
Robust multi-property combiners for hash functions
Journal of Cryptology
2014-09-25Paper
Memento: how to reconstruct your secrets from a single password in a hostile environment
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
History-free sequential aggregate signatures
Lecture Notes in Computer Science
2012-09-25Paper
On the joint security of encryption and signature in EMV
Lecture Notes in Computer Science
2012-06-08Paper
Random oracles in a quantum world
Lecture Notes in Computer Science
2011-12-02Paper
Random oracles with(out) programmability
Advances in Cryptology - ASIACRYPT 2010
2010-12-07Paper
History-Free Aggregate Message Authentication Codes
Lecture Notes in Computer Science
2010-09-10Paper
Unlinkability of sanitizable signatures
Public Key Cryptography – PKC 2010
2010-05-28Paper
Public-key encryption with non-interactive opening: new constructions and stronger definitions
Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings
2010-05-04Paper
Hash function combiners in TLS and SSL
Topics in Cryptology - CT-RSA 2010
2010-03-16Paper
Delayed-key message authentication for streams
Theory of Cryptography
2010-02-24Paper
A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical
Advances in Cryptology – ASIACRYPT 2009
2009-12-15Paper
Security of Sanitizable Signatures Revisited
Public Key Cryptography – PKC 2009
2009-03-24Paper
Security-Amplifying Combiners for Collision-Resistant Hash Functions
Advances in Cryptology - CRYPTO 2007
2009-03-10Paper
Robust Multi-property Combiners for Hash Functions Revisited
Automata, Languages and Programming
2008-08-19Paper
Multi-property Preserving Combiners for Hash Functions
Theory of Cryptography
2008-03-05Paper


Research outcomes over time


This page was built for person: Anja Lehmann