Dennis Hofheinz

From MaRDI portal
Person:300381



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
On structure-preserving cryptography and lattices2024-11-12Paper
Compact selective opening security from LWE2024-11-12Paper
Identity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext setting
Journal of Cryptology
2024-03-11Paper
The power of undirected rewindings for adaptive security
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
Deniable authentication when signing keys leak
Advances in Cryptology – EUROCRYPT 2023
2023-12-12Paper
Almost tightly-secure re-randomizable and replayable CCA-secure public key encryption
Lecture Notes in Computer Science
2023-11-16Paper
Compact structure-preserving signatures with almost tight security
Journal of Cryptology
2023-08-22Paper
The price of verifiability: lower bounds for verifiable random functions
Theory of Cryptography
2023-08-14Paper
Onion routing with replies
Lecture Notes in Computer Science
2023-05-12Paper
Towards tight adaptive security of non-interactive key exchange2023-04-13Paper
On the impossibility of purely algebraic signatures2023-04-13Paper
The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iO
Lecture Notes in Computer Science
2022-10-13Paper
On instantiating the algebraic group model from falsifiable assumptions2022-03-23Paper
Conditional reactive simulatability
Computer Security – ESORICS 2006
2022-03-09Paper
Initiator-resilient universally composable key exchange
Computer Security – ESORICS 2003
2022-02-16Paper
Adaptively secure constrained pseudorandom functions2021-03-17Paper
Multilinear maps from obfuscation
Journal of Cryptology
2020-06-15Paper
Dual-mode NIZKs from obfuscation2020-05-20Paper
Designated-verifier pseudorandom generators, and their applications2020-02-06Paper
On tightly secure primitives in the multi-instance setting2020-01-28Paper
Identity-based encryption tightly secure under chosen-ciphertext attacks2019-01-23Paper
On the (im-)possibility of extending coin toss
Journal of Cryptology
2018-11-01Paper
On tightly secure non-interactive key exchange2018-09-26Paper
More efficient (almost) tightly secure structure-preserving signatures2018-07-09Paper
Interactively secure groups from obfuscation2018-05-29Paper
Graded encoding schemes from obfuscation2018-05-29Paper
A modular analysis of the Fujisaki-Okamoto transformation2018-01-19Paper
Compact structure-preserving signatures with almost tight security2017-11-15Paper
Kurosawa-Desmedt meets tight security2017-10-27Paper
Adaptive partitioning
Lecture Notes in Computer Science
2017-06-23Paper
How to Generate and Use Universal Samplers
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
Standard security does not imply indistinguishability under selective opening
Theory of Cryptography
2016-12-22Paper
Public-key encryption with simulation-based selective-opening security and compact ciphertexts
Theory of Cryptography
2016-12-22Paper
Tightly CCA-secure encryption without pairings
Advances in Cryptology – EUROCRYPT 2016
2016-09-09Paper
Tightly secure signatures and public-key encryption
Designs, Codes and Cryptography
2016-06-27Paper
Idealizing identity-based encryption
Advances in Cryptology -- ASIACRYPT 2015
2016-06-10Paper
Multilinear maps from obfuscation
Theory of Cryptography
2016-03-23Paper
Algebraic partitioning: fully compact and (almost) tightly secure cryptography
Theory of Cryptography
2016-03-23Paper
Verifiable random functions from standard assumptions
Theory of Cryptography
2016-03-23Paper
Reconfigurable cryptography: a flexible approach to long-term security
Theory of Cryptography
2016-03-23Paper
Identity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext setting
Lecture Notes in Computer Science
2015-08-27Paper
GNUC: a new universal composability framework
Journal of Cryptology
2015-08-03Paper
Tightly-secure authenticated key exchange
Theory of Cryptography
2015-07-06Paper
Confined guessing: new signatures from standard assumptions
Journal of Cryptology
2015-03-25Paper
Subtleties in the definition of IND-CCA: when and how should challenge decryption be disallowed?
Journal of Cryptology
2015-03-25Paper
Universally Composable Non-Interactive Key Exchange
Lecture Notes in Computer Science
2014-10-14Paper
Polynomial Spaces: A New Framework for Composite-to-Prime-Order Transformations
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
A generic view on trace-and-revoke broadcast encryption schemes
Topics in Cryptology – CT-RSA 2014
2014-03-28Paper
Encryption schemes secure under related-key and key-dependent message attacks
Public-Key Cryptography – PKC 2014
2014-03-25Paper
Standard versus selective opening security: separation and equivalence results
Theory of Cryptography
2014-02-18Paper
Programmable hash functions in the multilinear setting
Advances in Cryptology – CRYPTO 2013
2013-09-02Paper
Polynomial runtime and composability
Journal of Cryptology
2013-08-01Paper
Circular chosen-ciphertext security with compact ciphertexts
Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
2013-05-31Paper
Practical signatures from standard assumptions
Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
2013-05-31Paper
Non-interactive key exchange
Public-Key Cryptography – PKC 2013
2013-04-19Paper
Practical chosen ciphertext secure encryption from factoring
Journal of Cryptology
2013-04-15Paper
Bonsai trees, or how to delegate a lattice basis
Journal of Cryptology
2013-01-04Paper
Tightly Secure Signatures and Public-Key Encryption
Lecture Notes in Computer Science
2012-09-25Paper
Possibility and impossibility results for selective decommitments
Journal of Cryptology
2012-09-21Paper
On definitions of selective opening security
Public Key Cryptography – PKC 2012
2012-07-20Paper
Waters signatures with optimal security reduction
Public Key Cryptography – PKC 2012
2012-07-20Paper
Programmable hash functions and their applications
Journal of Cryptology
2012-07-10Paper
All-but-many lossy trapdoor functions
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
Short signatures from weaker assumptions
Lecture Notes in Computer Science
2011-12-02Paper
Some (in)sufficient conditions for secure hybrid encryption
Information and Computation
2010-10-22Paper
Bonsai trees, or how to delegate a lattice basis
Advances in Cryptology – EUROCRYPT 2010
2010-06-01Paper
Encryption schemes secure against chosen-ciphertext selective opening attacks
Advances in Cryptology – EUROCRYPT 2010
2010-06-01Paper
Bounded key-dependent message security
Advances in Cryptology – EUROCRYPT 2010
2010-06-01Paper
Obfuscation for cryptographic purposes
Journal of Cryptology
2010-03-01Paper
A Twist on the Naor-Yung Paradigm and Its Application to Efficient CCA-Secure Encryption from Hard Search Problems
Theory of Cryptography
2010-02-24Paper
The Group of Signed Quadratic Residues and Applications
Advances in Cryptology - CRYPTO 2009
2009-10-20Paper
Theory of Cryptography
Lecture Notes in Computer Science
2009-05-14Paper
Practical Chosen Ciphertext Secure Encryption from Factoring
Advances in Cryptology - EUROCRYPT 2009
2009-05-12Paper
Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening
Advances in Cryptology - EUROCRYPT 2009
2009-05-12Paper
Secure Hybrid Encryption from Weakened Key Encapsulation
Advances in Cryptology - CRYPTO 2007
2009-03-10Paper
Programmable Hash Functions and Their Applications
Lecture Notes in Computer Science
2009-02-10Paper
scientific article; zbMATH DE number 5380260 (Why is no real title available?)2008-12-10Paper
scientific article; zbMATH DE number 5380259 (Why is no real title available?)2008-12-10Paper
Bounded CCA2-Secure Encryption
Advances in Cryptology – ASIACRYPT 2007
2008-05-15Paper
Public-Key Encryption with Non-interactive Opening
Topics in Cryptology – CT-RSA 2008
2008-04-24Paper
Towards Key-Dependent Message Security in the Standard Model
Advances in Cryptology – EUROCRYPT 2008
2008-04-15Paper
Universally composable zero-knowledge arguments and commitments from signature cards2008-03-05Paper
On the (Im-)Possibility of Extending Coin Toss
Advances in Cryptology - EUROCRYPT 2006
2007-09-24Paper
Obfuscation for Cryptographic Purposes
Theory of Cryptography
2007-08-30Paper
On IND-CCA security modeling in cryptographic protocols2007-02-13Paper
Information Security
Lecture Notes in Computer Science
2006-10-20Paper
Information Security
Lecture Notes in Computer Science
2006-10-16Paper
Theory of Cryptography
Lecture Notes in Computer Science
2005-12-07Paper
On the security of two public key cryptosystems using non-abelian groups
Designs, Codes and Cryptography
2004-08-16Paper
A Practical Attack on Some Braid Group Based Cryptographic Primitives
Public Key Cryptography — PKC 2003
2003-07-27Paper


Research outcomes over time


This page was built for person: Dennis Hofheinz