Publication | Date of Publication | Type |
---|
Computational wiretap coding from indistinguishability obfuscation | 2024-02-06 | Paper |
Tracing quantum state distinguishers via backtracking | 2024-02-06 | Paper |
Security-preserving distributed samplers: how to generate any CRS in one round without random oracles | 2024-02-02 | Paper |
Another round of breaking and making quantum money: how to not build it from lattices, and more | 2024-01-16 | Paper |
A lower bound on the length of signatures based on group actions and generic isogenies | 2023-12-08 | Paper |
Full quantum equivalence of group action DLog and CDH, and more | 2023-08-25 | Paper |
Collusion resistant copy-protection for watermarkable functionalities | 2023-08-14 | Paper |
Adaptive multiparty NIKE | 2023-08-14 | Paper |
Augmented random oracles | 2023-06-30 | Paper |
To label, or not to label (in generic groups) | 2023-06-30 | Paper |
New constructions of collapsing hashes | 2023-06-30 | Paper |
On the feasibility of unclonable encryption, and more | 2023-06-28 | Paper |
Redeeming reset indifferentiability and applications to post-quantum security | 2023-05-12 | Paper |
Franchised quantum money | 2023-05-12 | Paper |
Disappearing cryptography in the bounded storage model | 2023-04-13 | Paper |
https://portal.mardi4nfdi.de/entity/Q5875789 | 2023-02-03 | Paper |
How to Construct Quantum Random Functions | 2022-12-08 | Paper |
Indifferentiability for public key cryptosystems | 2022-11-09 | Paper |
New techniques for traitor tracing: size \(N^{1/3}\) and more from pairings | 2022-11-09 | Paper |
Incompressible cryptography | 2022-08-30 | Paper |
Quantum algorithms for variants of average-case lattice problems via filtering | 2022-08-30 | Paper |
White box traitor tracing | 2022-05-18 | Paper |
New approaches for quantum copy-protection | 2022-03-31 | Paper |
Hidden cosets and applications to unclonable cryptography | 2022-03-31 | Paper |
Schrödinger's pirate: how to trace a quantum decoder | 2022-03-23 | Paper |
Classical vs quantum random oracles | 2021-12-08 | Paper |
Towards non-interactive witness hiding | 2021-12-01 | Paper |
Decomposable obfuscation: a framework for building applications of obfuscation from polynomial hardness | 2021-08-10 | Paper |
Quantum lightning never strikes the same state twice. Or: quantum money from cryptographic assumptions | 2021-04-07 | Paper |
One-shot signatures and applications to hybrid quantum/classical authentication | 2021-01-19 | Paper |
Multiparty non-interactive key exchange and more from isogenies on elliptic curves | 2020-06-24 | Paper |
How to record quantum queries, and applications to quantum indifferentiability | 2020-03-09 | Paper |
Revisiting post-quantum Fiat-Shamir | 2020-03-09 | Paper |
The distinction between fixed and random generators in group-based assumptions | 2020-03-09 | Paper |
On ELFs, deterministic encryption, and correlated-input security | 2020-02-04 | Paper |
On finding quantum multi-collisions | 2020-02-04 | Paper |
Quantum lightning never strikes the same state twice | 2020-02-04 | Paper |
New techniques for obfuscating conjunctions | 2020-02-04 | Paper |
The magic of ELFs | 2019-08-13 | Paper |
Parameter-hiding order revealing encryption | 2018-12-20 | Paper |
Impossibility of order-revealing encryption in idealized models | 2018-12-06 | Paper |
The MMap strikes back: obfuscation and new multilinear maps immune to CLT13 zeroizing attacks | 2018-12-06 | Paper |
Return of GGH15: provable security against zeroizing attacks | 2018-12-06 | Paper |
Cutting-edge cryptography through the lens of secret sharing | 2018-12-03 | Paper |
Decomposable obfuscation: a framework for building applications of obfuscation from polynomial hardness | 2018-01-19 | Paper |
Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation | 2018-01-05 | Paper |
New security notions and feasibility results for authentication of quantum data | 2017-11-15 | Paper |
Breaking the Sub-Exponential Barrier in Obfustopia | 2017-06-23 | Paper |
How to Generate and Use Universal Samplers | 2017-01-06 | Paper |
Secure Obfuscation in a Weak Multilinear Map Model | 2016-12-22 | Paper |
Strong Hardness of Privacy from Weak Traitor Tracing | 2016-12-21 | Paper |
The Magic of ELFs | 2016-11-30 | Paper |
Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13 | 2016-10-27 | Paper |
Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key | 2016-07-15 | Paper |
Post-zeroizing Obfuscation: New Mathematical Tools, and the Case of Evasive Circuits | 2016-07-15 | Paper |
How to Avoid Obfuscation Using Witness PRFs | 2016-04-08 | Paper |
Cutting-Edge Cryptography Through the Lens of Secret Sharing | 2016-04-08 | Paper |
Functional Encryption Without Obfuscation | 2016-04-08 | Paper |
Order-Revealing Encryption and the Hardness of Private Learning | 2016-03-23 | Paper |
https://portal.mardi4nfdi.de/entity/Q2950582 | 2015-10-09 | Paper |
Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation | 2015-09-30 | Paper |
Low Overhead Broadcast Encryption from Multilinear Maps | 2014-08-07 | Paper |
Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation | 2014-08-07 | Paper |
Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World | 2013-09-17 | Paper |
Quantum-Secure Message Authentication Codes | 2013-05-31 | Paper |
Secure Identity-Based Encryption in the Quantum Random Oracle Model | 2012-09-25 | Paper |
Random Oracles in a Quantum World | 2011-12-02 | Paper |