Publication | Date of Publication | Type |
---|
Secure Multiparty Matrix Multiplication Based on Strassen-Winograd Algorithm | 2024-03-14 | Paper |
Optimal exclusive perpetual grid exploration by luminous myopic opaque robots with common chirality | 2023-10-17 | Paper |
Perpetual torus exploration by myopic luminous robots | 2023-10-17 | Paper |
Physical ZKP protocols for Nurimisaki and Kurodoko | 2023-09-07 | Paper |
Protego: efficient, revocable and auditable anonymous credentials with applications to hyperledger fabric | 2023-08-14 | Paper |
Hide a liar: card-based ZKP protocol for Usowan | 2023-08-04 | Paper |
Physical zero-knowledge proof for Makaro | 2023-08-02 | Paper |
Unlinkable and strongly accountable sanitizable signatures from verifiable ring signatures | 2023-08-02 | Paper |
Shadoks Approach to Low-Makespan Coordinated Motion Planning | 2023-06-26 | Paper |
Perpetual torus exploration by myopic luminous robots | 2023-06-12 | Paper |
Card-based ZKP protocol for Nurimisaki | 2023-06-12 | Paper |
Secure cumulative reward maximization in linear stochastic bandits | 2023-03-21 | Paper |
Physical Zero-Knowledge Proof for Suguru Puzzle | 2023-03-21 | Paper |
Finding water on Poleless using melomaniac myopic chameleon robots | 2023-02-07 | Paper |
Card-based ZKP protocols for Takuzu and Juosan | 2023-02-07 | Paper |
A physical ZKP for Slitherlink: how to perform physical topology-preserving computation | 2022-08-30 | Paper |
Secure best arm identification in multi-armed bandits | 2022-08-30 | Paper |
Improved Constructions of Anonymous Credentials from Structure-Preserving Signatures on Equivalence Classes | 2022-07-08 | Paper |
Generic plaintext equality and inequality proofs | 2022-06-17 | Paper |
Physical zero-knowledge proof and NP-completeness proof of Suguru puzzle | 2022-06-08 | Paper |
SAMBA: A Generic Framework for Secure Federated Multi-Armed Bandits | 2022-05-16 | Paper |
Interactive physical ZKP for connectivity: applications to Nurikabe and Hitori | 2022-03-22 | Paper |
How to construct physical zero-knowledge proofs for puzzles with a ``single loop condition | 2021-09-27 | Paper |
A faster cryptographer's Conspiracy Santa | 2020-09-03 | Paper |
https://portal.mardi4nfdi.de/entity/Q3305731 | 2020-08-11 | Paper |
About blockchain interoperability | 2020-08-04 | Paper |
Optimal Threshold Padlock Systems | 2020-04-24 | Paper |
Infinite grid exploration by disoriented robots | 2020-03-03 | Paper |
Interactive physical zero-knowledge proof for Norinori | 2020-02-24 | Paper |
Efficient invisible and unlinkable sanitizable signatures | 2020-01-28 | Paper |
Computing AES related-key differential characteristics with constraint programming | 2020-01-20 | Paper |
DABSTERS: a privacy preserving e-voting protocol for permissioned blockchain | 2019-12-12 | Paper |
Anonymizable ring signature without pairing | 2018-12-07 | Paper |
Verifiable private polynomial evaluation | 2018-11-07 | Paper |
Revisiting AES related-key differential attacks with constraint programming | 2018-10-19 | Paper |
Formal analysis and offline monitoring of electronic exams | 2017-09-08 | Paper |
https://portal.mardi4nfdi.de/entity/Q5282806 | 2017-07-17 | Paper |
Formal verification of mobile robot protocols | 2017-06-22 | Paper |
Related-Key Cryptanalysis of Midori | 2016-12-21 | Paper |
Automated proofs of block cipher modes of operation | 2016-05-26 | Paper |
On the existence and decidability of unique decompositions of processes in the applied \(\pi\)-calculus | 2015-12-15 | Paper |
Comparison of mean hitting times for a degree-biased random walk | 2014-05-06 | Paper |
Formal Verification of e-Auction Protocols | 2013-08-06 | Paper |
Brandt’s Fully Private Auction Protocol Revisited | 2013-06-07 | Paper |
On Unique Decomposition of Processes in the Applied π-Calculus | 2013-03-18 | Paper |
Analysis of Random Walks Using Tabu Lists | 2012-09-26 | Paper |
Automated Verification of Block Cipher Modes of Operation, an Improved Method | 2012-06-08 | Paper |
Vote-Independence: A Powerful Privacy Notion for Voting Protocols | 2012-06-08 | Paper |
Benaloh’s Dense Probabilistic Encryption Revisited | 2011-06-29 | Paper |
Automated proofs for asymmetric encryption | 2011-06-03 | Paper |
Automated Proofs for Asymmetric Encryption | 2010-03-09 | Paper |
Automated Security Proof for Symmetric Encryption Modes | 2010-01-14 | Paper |
Comparing State Spaces in Automatic Security Protocol Analysis | 2009-06-09 | Paper |
Symbolic protocol analysis for monoidal equational theories | 2008-04-16 | Paper |
Symbolic Protocol Analysis in Presence of a Homomorphism Operator and Exclusive Or | 2007-09-11 | Paper |
Intruder deduction for the equational theory of abelian groups with distributive encryption | 2007-04-16 | Paper |
Term Rewriting and Applications | 2005-11-11 | Paper |