Publication | Date of Publication | Type |
---|
A survey on delegated computation | 2022-08-11 | Paper |
Towards a Theory of Intrusion Detection | 2022-03-09 | Paper |
Delegating a product of group exponentiations with application to signature schemes | 2021-05-12 | Paper |
Secure and efficient delegation of elliptic-curve pairing | 2021-02-23 | Paper |
Cryptographic password obfuscation | 2021-01-18 | Paper |
Efficient and secure delegation of exponentiation in general groups to a single malicious server | 2020-10-30 | Paper |
Efficient and secure delegation to a single malicious server: exponentiation over non-abelian groups | 2018-08-17 | Paper |
Randomness-efficient non-interactive zero knowledge | 2018-07-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q5271426 | 2017-07-11 | Paper |
Security-preserving hardness-amplification for any regular one-way function | 2016-09-29 | Paper |
The graph clustering problem has a perfect zero-knowledge interactive proof | 2016-06-16 | Paper |
Universal service-providers for database private information retrieval (extended abstract) | 2016-03-02 | Paper |
On zero-knowledge proofs (extended abstract) | 2014-09-26 | Paper |
Secure Node Discovery in Ad-hoc Networks and Applications | 2013-12-06 | Paper |
Zero-Knowledge Proofs via Polynomial Representations | 2012-09-25 | Paper |
Combinatorial Group Testing for Corruption Localizing Hashing | 2011-08-17 | Paper |
On server trust in private proxy auctions | 2010-11-30 | Paper |
Foundations of Optical Encryption: Formal Modeling and Achieving Shannon Secrecy | 2009-10-22 | Paper |
On Monotone Formula Composition of Perfect Zero-Knowledge Languages | 2009-08-20 | Paper |
Concurrently Non-malleable Black-Box Zero Knowledge in the Bare Public-Key Model | 2009-08-18 | Paper |
Algorithms and Computation | 2009-08-07 | Paper |
Minimal Assumptions and Round Complexity for Concurrent Zero-Knowledge in the Bare Public-Key Model | 2009-07-23 | Paper |
Hypergraph decomposition and secret sharing | 2009-06-30 | Paper |
3-Message NP Arguments in the BPK Model with Optimal Soundness and Zero-Knowledge | 2009-01-29 | Paper |
On the Security of Beth’s Identification Schemes against Active and Concurrent Adversaries | 2009-01-22 | Paper |
Succinct NP Proofs from an Extractability Assumption | 2008-06-19 | Paper |
Public Key Encryption with Searchable Keywords Based on Jacobi Symbols | 2008-04-11 | Paper |
Advances in Cryptology - EUROCRYPT 2004 | 2007-09-25 | Paper |
Theory of Cryptography | 2007-02-12 | Paper |
Information Security and Cryptology | 2006-11-14 | Paper |
Security in Communication Networks | 2006-10-10 | Paper |
https://portal.mardi4nfdi.de/entity/Q5489060 | 2006-09-25 | Paper |
https://portal.mardi4nfdi.de/entity/Q3374904 | 2006-03-01 | Paper |
Automata, Languages and Programming | 2006-01-10 | Paper |
Automata, Languages and Programming | 2006-01-10 | Paper |
Financial Cryptography and Data Security | 2005-12-22 | Paper |
Contemporary cryptology. | 2005-08-30 | Paper |
Advances in Cryptology – CRYPTO 2004 | 2005-08-23 | Paper |
Mathematical Foundations of Computer Science 2004 | 2005-08-22 | Paper |
Improved Setup Assumptions for 3-Round Resettable Zero Knowledge | 2005-08-12 | Paper |
https://portal.mardi4nfdi.de/entity/Q4739522 | 2004-08-12 | Paper |
https://portal.mardi4nfdi.de/entity/Q4252397 | 2004-03-09 | Paper |
https://portal.mardi4nfdi.de/entity/Q4448385 | 2004-02-18 | Paper |
https://portal.mardi4nfdi.de/entity/Q4440437 | 2003-12-17 | Paper |
Sharing one secret vs. sharing many secrets. | 2003-08-17 | Paper |
https://portal.mardi4nfdi.de/entity/Q4414269 | 2003-07-24 | Paper |
https://portal.mardi4nfdi.de/entity/Q4414273 | 2003-07-24 | Paper |
https://portal.mardi4nfdi.de/entity/Q4783745 | 2002-12-08 | Paper |
https://portal.mardi4nfdi.de/entity/Q4536288 | 2002-11-28 | Paper |
https://portal.mardi4nfdi.de/entity/Q4779152 | 2002-11-25 | Paper |
https://portal.mardi4nfdi.de/entity/Q4542531 | 2002-08-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q2766853 | 2002-07-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q2754163 | 2001-12-06 | Paper |
https://portal.mardi4nfdi.de/entity/Q2757259 | 2001-11-25 | Paper |
https://portal.mardi4nfdi.de/entity/Q2757268 | 2001-11-25 | Paper |
https://portal.mardi4nfdi.de/entity/Q2721175 | 2001-07-01 | Paper |
Universal service-providers for private information retrieval | 2001-05-13 | Paper |
https://portal.mardi4nfdi.de/entity/Q4952627 | 2000-10-23 | Paper |
https://portal.mardi4nfdi.de/entity/Q4941875 | 2000-08-27 | Paper |
https://portal.mardi4nfdi.de/entity/Q4940693 | 2000-03-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4938630 | 2000-02-23 | Paper |
https://portal.mardi4nfdi.de/entity/Q4258569 | 1999-09-13 | Paper |
https://portal.mardi4nfdi.de/entity/Q4249346 | 1999-06-17 | Paper |
Conditional Oblivious Transfer and Timed-Release Encryption | 1999-06-17 | Paper |
https://portal.mardi4nfdi.de/entity/Q4251066 | 1999-06-17 | Paper |
https://portal.mardi4nfdi.de/entity/Q4381399 | 1999-01-10 | Paper |
https://portal.mardi4nfdi.de/entity/Q4373608 | 1998-06-11 | Paper |
https://portal.mardi4nfdi.de/entity/Q4364541 | 1998-02-10 | Paper |
https://portal.mardi4nfdi.de/entity/Q4365736 | 1998-01-29 | Paper |
https://portal.mardi4nfdi.de/entity/Q4341776 | 1997-10-06 | Paper |
https://portal.mardi4nfdi.de/entity/Q4341734 | 1997-07-20 | Paper |
Zero-knowledge arguments and public-key cryptography | 1995-11-05 | Paper |
The knowledge complexity of quadratic residuosity languages | 1994-09-25 | Paper |
Round-optimal perfect zero-knowledge proofs | 1994-05-05 | Paper |