Jacob C. N. Schuldt

From MaRDI portal
(Redirected from Person:278729)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Signature for objects: formalizing how to authenticate physical data and more2024-07-17Paper
Forward-secure public key encryption without key update from proof-of-stake blockchain
Lecture Notes in Computer Science
2023-05-12Paper
Maliciously circuit-private multi-key FHE and MPC based on LWE
Designs, Codes and Cryptography
2023-04-28Paper
On Private Information Retrieval Supporting Range Queries
1511.68044
2022-12-22Paper
Efficient two-party exponentiation from quotient transfer2022-11-09Paper
Field extension in secret-shared form and its applications to efficient secure computation2020-05-27Paper
Token-based multi-input functional encryption2018-11-07Paper
Secure multi-party computation using polarizing cards2018-10-24Paper
Statistical attacks on cookie masking for RC4
Cryptography and Communications
2018-05-28Paper
Related randomness security for public key encryption, revisited2018-05-16Paper
Backdoors in pseudorandom number generators: possibility and impossibility results
Advances in Cryptology – CRYPTO 2016
2016-11-30Paper
On the Security of the Schnorr Signature Scheme and DSA Against Related-Key Attacks
Information Security and Cryptology - ICISC 2015
2016-05-19Paper
Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency
Theoretical Computer Science
2016-05-02Paper
Multi-party computation with small shuffle complexity using regular polygon cards
Provable Security
2016-01-27Paper
Security Against Related Randomness Attacks via Reconstructive Extractors
Cryptography and Coding
2016-01-12Paper
Dynamic threshold public-key encryption with decryption consistency from static assumptions
Information Security and Privacy
2015-10-20Paper
Plaintext Recovery Attacks Against WPA/TKIP
Fast Software Encryption
2015-09-18Paper
Big Bias Hunting in Amazonia: Large-Scale Computation and Exploitation of RC4 Biases (Invited Paper)
Lecture Notes in Computer Science
2015-01-16Paper
Related randomness attacks for public key encryption
Public-Key Cryptography – PKC 2014
2014-03-25Paper
On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups
Lecture Notes in Computer Science
2012-09-25Paper
Verifiable predicate encryption and applications to CCA security and anonymous predicate authentication
Public Key Cryptography – PKC 2012
2012-07-20Paper
On the Security of Dynamic Group Signatures: Preventing Signature Hijacking
Public Key Cryptography – PKC 2012
2012-07-20Paper
On the joint security of encryption and signature, revisited
Lecture Notes in Computer Science
2011-12-02Paper
Non-transferable User Certification Secure against Authority Information Leaks and Impersonation Attacks
Applied Cryptography and Network Security
2011-06-28Paper
Wildcarded identity-based encryption
Journal of Cryptology
2011-04-01Paper
On-line non-transferable signatures revisited
Public Key Cryptography – PKC 2011
2011-03-15Paper
Efficient constructions of signcryption schemes and signcryption composability
Progress in Cryptology - INDOCRYPT 2009
2009-12-17Paper
Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards
Information Security and Privacy
2009-03-06Paper
Proxy Signatures Secure Against Proxy Key Exposure
Public key cryptography -- PKC 2008. 11th international workshop on practice and theory in public-key cryptography, Barcelona, Spain, March 9--12, 2008. Proceedings
2008-03-05Paper
Efficient Identity-Based Signatures Secure in the Standard Model
Information Security and Privacy
2007-09-07Paper


Research outcomes over time


This page was built for person: Jacob C. N. Schuldt