Publication | Date of Publication | Type |
---|
Limits of breach-resistant and snapshot-oblivious RAMs | 2024-02-06 | Paper |
Anamorphic signatures: secrecy from a dictator who only permits authentication! | 2024-02-02 | Paper |
Lower bound framework for differentially private and oblivious data structures | 2024-01-16 | Paper |
The complexity of secure RAMs | 2023-10-04 | Paper |
Efficient Boolean search over encrypted data with reduced leakage | 2023-05-12 | Paper |
Lower bounds for encrypted multi-maps and searchable encryption in the leakage cell probe model | 2022-11-09 | Paper |
Anamorphic encryption: private communication against a dictator | 2022-08-30 | Paper |
Communication efficient Zero-knowledge Proofs of knowledge | 2022-08-18 | Paper |
https://portal.mardi4nfdi.de/entity/Q5002851 | 2021-07-28 | Paper |
The price of defense | 2021-04-19 | Paper |
Continuously non-malleable codes in the split-state model from minimal assumptions | 2020-06-30 | Paper |
Lower bounds for differentially private RAMs | 2020-02-04 | Paper |
One-message statistical Zero-Knowledge Proofs and space-bounded verifier | 2019-12-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q5743454 | 2019-05-10 | Paper |
Information Retention in Heterogeneous Majority Dynamics | 2019-01-30 | Paper |
Metastability of logit dynamics for coordination games | 2019-01-11 | Paper |
On the number of random bits in totally private computation | 2019-01-10 | Paper |
Placing resources in a tree: Dynamic and static algorithms | 2019-01-10 | Paper |
Routing selfish unsplittable traffic | 2018-11-05 | Paper |
Convergence to equilibrium of logit dynamics for strategic games | 2016-11-01 | Paper |
Online/Offline OR Composition of Sigma Protocols | 2016-07-15 | Paper |
The graph clustering problem has a perfect zero-knowledge interactive proof | 2016-06-16 | Paper |
A Transform for NIZK Almost as Efficient and General as the Fiat-Shamir Transform Without Programmable Random Oracles | 2016-04-08 | Paper |
Improved OR-Composition of Sigma-Protocols | 2016-04-08 | Paper |
Minority Becomes Majority in Social Networks | 2016-01-08 | Paper |
Impossibility of Black-Box Simulation Against Leakage Attacks | 2015-12-10 | Paper |
Logit dynamics with concurrent updates for local interaction potential games | 2015-11-19 | Paper |
Innovative approaches for security of small artefacts | 2014-10-24 | Paper |
On Input Indistinguishable Proof Systems | 2014-07-01 | Paper |
Mixing time and stationary expected social welfare of logit dynamics | 2013-10-21 | Paper |
Logit Dynamics with Concurrent Updates for Local Interaction Games | 2013-09-17 | Paper |
On the Achievability of Simulation-Based Security for Functional Encryption | 2013-09-17 | Paper |
Fully Secure Hidden Vector Encryption | 2013-04-04 | Paper |
Predicate Encryption with Partial Public Keys | 2010-12-07 | Paper |
Fully Secure Anonymous HIBE and Secret-Key Anonymous IBE with Short Ciphertexts | 2010-11-26 | Paper |
Mixing time and stationary expected social welfare of logit dynamics | 2010-10-19 | Paper |
Collusion-Free Multiparty Computation in the Mediated Model | 2009-10-20 | Paper |
Private Capacities in Mechanism Design | 2009-10-16 | Paper |
On designing truthful mechanisms for online scheduling | 2009-08-21 | Paper |
On Monotone Formula Composition of Perfect Zero-Knowledge Languages | 2009-08-20 | Paper |
New Constructions of Mechanisms with Verification | 2009-03-12 | Paper |
Simulation-Based Concurrent Non-malleable Commitments and Decommitments | 2009-03-03 | Paper |
The power of verification for one-parameter agents | 2009-03-02 | Paper |
Hidden-Vector Encryption with Groups of Prime Order | 2009-02-10 | Paper |
Constant-Round Concurrent Non-malleable Zero Knowledge in the Bare Public-Key Model | 2008-08-19 | Paper |
Alternatives to Truthfulness Are Hard to Recognize | 2008-05-02 | Paper |
Impossibility and Feasibility Results for Zero Knowledge with Public Keys | 2008-03-17 | Paper |
Approximation Algorithms for Path Coloring in Trees | 2008-03-14 | Paper |
STACS 2004 | 2007-10-01 | Paper |
Advances in Cryptology - EUROCRYPT 2004 | 2007-09-25 | Paper |
On Non-Interactive Zero-Knowledge Proofs of Knowledge in the Shared Random String Model | 2007-09-05 | Paper |
Efficient automatic simulation of parallel computation on networks of workstations | 2006-06-09 | Paper |
Automata, Languages and Programming | 2006-01-10 | Paper |
Structural Information and Communication Complexity | 2005-11-30 | Paper |
Automata, Languages and Programming | 2005-08-24 | Paper |
Advances in Cryptology – CRYPTO 2004 | 2005-08-23 | Paper |
Mathematical Foundations of Computer Science 2004 | 2005-08-22 | Paper |
Improved Setup Assumptions for 3-Round Resettable Zero Knowledge | 2005-08-12 | Paper |
https://portal.mardi4nfdi.de/entity/Q4440437 | 2003-12-17 | Paper |
https://portal.mardi4nfdi.de/entity/Q4783745 | 2002-12-08 | Paper |
Randomness complexity of private computation | 2002-04-21 | Paper |
https://portal.mardi4nfdi.de/entity/Q2754163 | 2001-12-06 | Paper |
https://portal.mardi4nfdi.de/entity/Q4938630 | 2000-02-23 | Paper |
https://portal.mardi4nfdi.de/entity/Q4230367 | 1999-04-22 | Paper |
https://portal.mardi4nfdi.de/entity/Q4377122 | 1998-07-19 | Paper |
https://portal.mardi4nfdi.de/entity/Q4341789 | 1998-01-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q4341734 | 1997-07-20 | Paper |
Minimal path length of trees with known fringe | 1997-02-28 | Paper |
Characteristic inequalities for binary trees | 1997-02-28 | Paper |
Dynamic and static algorithms for optimal placement of resources in a tree | 1997-02-27 | Paper |
A note on the expected path length of trees with known fringe | 1997-02-27 | Paper |
The power of preprocessing in zero-knowledge proofs of knowledge | 1997-01-14 | Paper |
Zero-knowledge arguments and public-key cryptography | 1995-11-05 | Paper |
Branch-and-bound and backtrack search on mesh-connected arrays of processors | 1995-05-14 | Paper |
Binary prefix codes ending in a "1" | 1995-03-01 | Paper |
The knowledge complexity of quadratic residuosity languages | 1994-09-25 | Paper |
Round-optimal perfect zero-knowledge proofs | 1994-05-05 | Paper |
Tight Upper and Lower Bounds on the Path Length of Binary Trees | 1994-03-27 | Paper |
https://portal.mardi4nfdi.de/entity/Q4035694 | 1993-05-18 | Paper |
https://portal.mardi4nfdi.de/entity/Q4036858 | 1993-05-18 | Paper |
Noninteractive Zero-Knowledge | 1992-06-27 | Paper |
Removing Interaction from Zero-Knowledge Proofs | 1990-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3789104 | 1988-01-01 | Paper |