Publication | Date of Publication | Type |
---|
Certifying giant nonprimes | 2023-11-24 | Paper |
Practical statistically-sound proofs of exponentiation in any group | 2023-06-28 | Paper |
\textsc{Hide} \& \textsc{Seek}: privacy-preserving rebalancing on payment channel networks | 2023-05-26 | Paper |
Trojan-resilience without cryptography | 2023-04-13 | Paper |
On treewidth, separators and Yao's garbling | 2023-04-13 | Paper |
Efficient Zero-Knowledge Proofs for Commitments from Learning with Errors over Rings | 2022-08-19 | Paper |
Proofs of Catalytic Space | 2022-07-18 | Paper |
Simple verifiable delay functions | 2022-07-18 | Paper |
Delayed authentication: preventing replay and relay attacks in private contact tracing | 2022-07-06 | Paper |
Limits on the adaptive security of Yao's garbling | 2022-04-22 | Paper |
Non-Uniform Attacks Against Pseudoentropy | 2020-05-27 | Paper |
Finding a Nash equilibrium is no easier than breaking Fiat-Shamir | 2020-01-30 | Paper |
Adaptively secure proxy re-encryption | 2020-01-28 | Paper |
Non-Malleable Codes | 2018-12-06 | Paper |
Sustained space complexity | 2018-07-09 | Paper |
Simple proofs of sequential work | 2018-07-09 | Paper |
Beyond Hellman's time-memory trade-offs with applications to proofs of space | 2018-03-08 | Paper |
Efficient authentication from hard learning problems | 2018-02-15 | Paper |
Position-based cryptography and multiparty communication complexity | 2018-01-19 | Paper |
Be adaptive, avoid overcommitting | 2017-11-03 | Paper |
Depth-Robust Graphs and Their Cumulative Memory Complexity | 2017-06-23 | Paper |
Scrypt Is Maximally Memory-Hard | 2017-06-23 | Paper |
Pseudoentropy: Lower-Bounds for Chain Rules and Transformations | 2016-12-21 | Paper |
A counterexample to the chain rule for conditional HILL entropy | 2016-10-28 | Paper |
Offline Witness Encryption | 2016-10-04 | Paper |
On the Complexity of Scrypt and Proofs of Space in the Parallel Random Oracle Model | 2016-07-15 | Paper |
New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators | 2016-06-10 | Paper |
Constrained PRFs for Unbounded Inputs | 2016-04-08 | Paper |
Generic Security of NMAC and HMAC with Input Whitening | 2016-03-23 | Paper |
Standard Security Does Imply Security Against Selective Opening for Markov Distributions | 2016-03-23 | Paper |
Proofs of Space | 2015-12-10 | Paper |
The Exact PRF Security of Truncation: Tight Bounds for Keyed Sponges and Truncated CBC | 2015-12-10 | Paper |
A Quasipolynomial Reduction for Generalized Selective Decryption on Trees | 2015-12-10 | Paper |
Condensed Unpredictability | 2015-10-27 | Paper |
The Chain Rule for HILL Pseudoentropy, Revisited | 2015-09-17 | Paper |
Key-Homomorphic Constrained Pseudorandom Functions | 2015-07-06 | Paper |
Adaptive Security of Constrained PRFs | 2015-01-06 | Paper |
Robust multi-property combiners for hash functions | 2014-09-25 | Paper |
The Exact PRF-Security of NMAC and HMAC | 2014-08-07 | Paper |
Key Derivation without Entropy Waste | 2014-05-27 | Paper |
Simple Chosen-Ciphertext Security from Low-Noise LPN | 2014-03-25 | Paper |
How to Fake Auxiliary Input | 2014-02-18 | Paper |
Learning with Rounding, Revisited | 2013-09-02 | Paper |
Digital Signatures with Minimal Overhead from Indifferentiable Random Invertible Functions | 2013-09-02 | Paper |
Commitments and Efficient Zero-Knowledge Proofs from Learning Parity with Noise | 2013-03-19 | Paper |
A Counterexample to the Chain Rule for Conditional HILL Entropy | 2013-03-18 | Paper |
Lapin: An Efficient Authentication Protocol Based on Ring-LPN | 2013-01-08 | Paper |
Practical Leakage-Resilient Symmetric Cryptography | 2012-11-13 | Paper |
Message Authentication, Revisited | 2012-06-29 | Paper |
Cryptography from Learning Parity with Noise | 2012-06-15 | Paper |
Hardness Preserving Constructions of Pseudorandom Functions | 2012-06-15 | Paper |
Lossy Functions Do Not Amplify Well | 2012-06-15 | Paper |
Subspace LWE | 2012-06-15 | Paper |
Parallel repetition of computationally sound protocols revisited | 2012-05-23 | Paper |
Leftover Hash Lemma, Revisited | 2011-08-12 | Paper |
Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience | 2011-07-06 | Paper |
Efficient Authentication from Hard Learning Problems | 2011-05-27 | Paper |
Parallel Repetition for Leakage Resilience Amplification Revisited | 2011-05-19 | Paper |
Leakage Resilient ElGamal Encryption | 2010-12-07 | Paper |
Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks | 2010-08-24 | Paper |
An Efficient Parallel Repetition Theorem | 2010-02-24 | Paper |
Leakage-Resilient Signatures | 2010-02-24 | Paper |
Theory of Cryptography | 2009-05-14 | Paper |
On the Security of Padding-Based Encryption Schemes – or – Why We Cannot Prove OAEP Secure in the Standard Model | 2009-05-12 | Paper |
A Leakage-Resilient Mode of Operation | 2009-05-12 | Paper |
A New Randomness Extraction Paradigm for Hybrid Encryption | 2009-05-12 | Paper |
Indistinguishability Amplification | 2009-03-10 | Paper |
Compression from Collisions, or Why CRHF Combiners Have a Long Output | 2009-02-10 | Paper |
Improving the Security of MACs Via Randomized Message Preprocessing | 2008-09-16 | Paper |
Weak Pseudorandom Functions in Minicrypt | 2008-08-19 | Paper |
Robust Multi-property Combiners for Hash Functions Revisited | 2008-08-19 | Paper |
A New Mode of Operation for Block Ciphers and Length-Preserving MACs | 2008-04-15 | Paper |
Composition Does Not Imply Adaptive Security | 2008-03-17 | Paper |
On the Generic Insecurity of the Full Domain Hash | 2008-03-17 | Paper |
Improved Security Analyses for CBC MACs | 2008-03-17 | Paper |
Non-trivial Black-Box Combiners for Collision-Resistant Hash-Functions Don’t Exist | 2007-11-29 | Paper |
Range Extension for Weak PRFs; The Good, the Bad, and the Ugly | 2007-11-29 | Paper |
Composition Implies Adaptive Security in Minicrypt | 2007-09-24 | Paper |
Luby-Rackoff Ciphers from Weak Round Functions? | 2007-09-24 | Paper |
A Tight Bound for EMAC | 2007-09-11 | Paper |
Parallel Repetition of Computationally Sound Protocols Revisited | 2007-08-30 | Paper |
Theory of Cryptography | 2007-02-12 | Paper |
On the parameterized complexity of the fixed alphabet shortest common supersequence and longest common subsequence problems | 2004-08-19 | Paper |
https://portal.mardi4nfdi.de/entity/Q4434898 | 2003-11-26 | Paper |