Publication | Date of Publication | Type |
---|
Tracing a linear subspace: application to linearly-homomorphic group signatures | 2023-11-24 | Paper |
Multi-client functional encryption with fine-grained access control | 2023-08-25 | Paper |
Key-policy ABE with switchable attributes | 2023-07-25 | Paper |
Traceable constant-size multi-authority credentials | 2023-07-25 | Paper |
MyOPE: malicious security for oblivious polynomial evaluation | 2023-07-25 | Paper |
Traceable constant-size multi-authority credentials | 2023-07-17 | Paper |
Asymmetric Cryptography | 2023-03-29 | Paper |
Multi-client inner-product functional encryption in the random-oracle model | 2022-12-16 | Paper |
Dynamic decentralized functional encryption | 2022-11-09 | Paper |
Homomorphic-Policy Attribute-Based Key Encapsulation Mechanisms | 2022-11-02 | Paper |
Robust password-protected secret sharing | 2022-08-19 | Paper |
Boosting verifiable computation on encrypted data | 2021-12-01 | Paper |
Linearly-homomorphic signatures and scalable mix-nets | 2021-12-01 | Paper |
Traceable inner product functional encryption | 2020-08-05 | Paper |
Divisible e-cash from constrained pseudo-random functions | 2020-05-20 | Paper |
Unbounded inner-product functional encryption with succinct keys | 2020-01-30 | Paper |
Reassessing security of randomizable signatures | 2020-01-21 | Paper |
On the tightness of forward-secure signature reductions | 2019-01-29 | Paper |
Decentralized multi-client functional encryption for inner product | 2019-01-23 | Paper |
On the leakage of corrupted garbled circuits | 2018-11-07 | Paper |
Privacy-preserving plaintext-equality of low-entropy inputs | 2018-08-10 | Paper |
Fuzzy password-authenticated key exchange | 2018-07-17 | Paper |
A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption | 2018-04-04 | Paper |
Cut Down the Tree to Achieve Constant Complexity in Divisible E-cash | 2017-06-13 | Paper |
Removing Erasures with Explainable Hash Proof Systems | 2017-06-13 | Paper |
The Whole is Less Than the Sum of Its Parts: Constructing More Efficient Lattice-Based AKEs | 2016-10-21 | Paper |
Legally Fair Contract Signing Without Keystones | 2016-10-04 | Paper |
Short Randomizable Signatures | 2016-04-08 | Paper |
Scalable Divisible E-cash | 2016-03-10 | Paper |
Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks | 2016-03-10 | Paper |
Practical multi-candidate election system | 2016-03-04 | Paper |
Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting | 2015-12-10 | Paper |
Disjunctions for Hash Proof Systems: New Constructions and Applications | 2015-09-30 | Paper |
Divisible E-Cash Made Practical | 2015-08-27 | Paper |
Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks | 2015-08-27 | Paper |
Simple Functional Encryption Schemes for Inner Products | 2015-08-27 | Paper |
Forward Secure Non-Interactive Key Exchange | 2014-10-14 | Paper |
Dynamic Fully Anonymous Short Group Signatures | 2014-08-21 | Paper |
Security Proofs for Signature Schemes | 2014-08-20 | Paper |
Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly Setting | 2014-03-25 | Paper |
Analysis and Improvement of Lindell’s UC-Secure Commitment Schemes | 2014-01-24 | Paper |
SPHF-Friendly Non-interactive Commitments | 2013-12-10 | Paper |
Black-box Trace\&Revoke codes | 2013-11-11 | Paper |
New Techniques for SPHFs and Efficient One-Round PAKE Protocols | 2013-09-02 | Paper |
Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages | 2013-04-19 | Paper |
Tighter Reductions for Forward-Secure Signature Schemes | 2013-04-19 | Paper |
Compact Round-Optimal Partially-Blind Signatures | 2012-09-25 | Paper |
Decentralized Dynamic Broadcast Encryption | 2012-09-25 | Paper |
Message-Based Traitor Tracing with Optimal Ciphertext Rate | 2012-09-21 | Paper |
Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts | 2012-09-07 | Paper |
Password-Based Authenticated Key Exchange | 2012-07-20 | Paper |
Round-Optimal Privacy-Preserving Protocols with Smooth Projective Hash Functions | 2012-06-15 | Paper |
Traceable Signature with Stepping Capabilities | 2012-06-08 | Paper |
Autotomic Signatures | 2012-06-08 | Paper |
Security Notions for Broadcast Encryption | 2011-06-28 | Paper |
Parallel Signcryption | 2011-05-18 | Paper |
Signatures on Randomizable Ciphertexts | 2011-03-15 | Paper |
Contributory Password-Authenticated Group Key Exchange with Join Capability | 2011-02-11 | Paper |
Mediated Traceable Anonymous Encryption | 2010-08-31 | Paper |
On Some Incompatible Properties of Voting Schemes | 2010-06-17 | Paper |
Strong Cryptography from Weak Secrets | 2010-05-04 | Paper |
Flexible Group Key Exchange with On-demand Computation of Subgroup Keys | 2010-05-04 | Paper |
Advances in Cryptology - ASIACRYPT 2003 | 2010-01-05 | Paper |
Advances in Cryptology - ASIACRYPT 2003 | 2010-01-05 | Paper |
Smooth Projective Hashing for Conditionally Extractable Commitments | 2009-10-20 | Paper |
Proofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of Signatures | 2009-08-18 | Paper |
Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness | 2009-07-07 | Paper |
New Anonymity Notions for Identity-Based Encryption | 2009-06-09 | Paper |
Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures | 2009-06-09 | Paper |
Public Key Cryptography – PKC 2004 | 2009-05-14 | Paper |
Optimal Randomness Extraction from a Diffie-Hellman Element | 2009-05-12 | Paper |
Distributed Public-Key Cryptography from Weak Secrets | 2009-03-24 | Paper |
An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication | 2009-03-06 | Paper |
Dynamic Threshold Public-Key Encryption | 2009-02-10 | Paper |
About the Security of MTI/C0 and MQV | 2008-11-27 | Paper |
A New Key Exchange Protocol Based on MQV Assuming Public Computations | 2008-11-27 | Paper |
New Anonymity Notions for Identity-Based Encryption | 2008-11-20 | Paper |
Anonymous Proxy Signatures | 2008-11-20 | Paper |
Public Traceability in Traitor Tracing Schemes | 2008-05-06 | Paper |
Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework | 2008-04-24 | Paper |
A Scalable Password-Based Group Key Exchange Protocol in the Standard Model | 2008-04-24 | Paper |
Extended Private Information Retrieval and Its Application in Biometrics Authentications | 2008-04-15 | Paper |
A Simple Threshold Authenticated Key Exchange from Short Secrets | 2008-03-18 | Paper |
Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys | 2007-11-29 | Paper |
Advances in Cryptology - CRYPTO 2003 | 2007-11-28 | Paper |
Optimal Asymmetric Encryption and Signature Paddings | 2007-09-24 | Paper |
Hardness of Distinguishing the MSB or LSB of Secret Keys in Diffie-Hellman Schemes | 2007-09-11 | Paper |
Automated Security Proofs with Sequences of Games | 2007-09-04 | Paper |
Trapdoor hard-to-invert group isomorphisms and their application to password-based authentication | 2007-05-24 | Paper |
Public Key Cryptography - PKC 2006 | 2007-05-02 | Paper |
Public Key Cryptography - PKC 2006 | 2007-05-02 | Paper |
Public Key Cryptography - PKC 2006 | 2007-05-02 | Paper |
Security in Communication Networks | 2006-10-10 | Paper |
Selected Areas in Cryptography | 2006-10-10 | Paper |
https://portal.mardi4nfdi.de/entity/Q5489061 | 2006-09-25 | Paper |
https://portal.mardi4nfdi.de/entity/Q3374905 | 2006-03-01 | Paper |
Financial Cryptography and Data Security | 2005-12-22 | Paper |
Topics in Cryptology – CT-RSA 2005 | 2005-12-08 | Paper |
Public Key Cryptography - PKC 2005 | 2005-12-07 | Paper |
Public Key Cryptography - PKC 2005 | 2005-12-07 | Paper |
Contemporary cryptology. | 2005-08-30 | Paper |
Cryptographic Hardware and Embedded Systems - CHES 2004 | 2005-08-23 | Paper |
Advances in Cryptology – CRYPTO 2004 | 2005-08-23 | Paper |
OAEP 3-Round:A Generic and Secure Asymmetric Encryption Padding | 2005-08-12 | Paper |
RSA-OAEP is secure under the RSA assumption | 2004-09-27 | Paper |
https://portal.mardi4nfdi.de/entity/Q4739516 | 2004-08-12 | Paper |
https://portal.mardi4nfdi.de/entity/Q4739524 | 2004-08-12 | Paper |
https://portal.mardi4nfdi.de/entity/Q4739525 | 2004-08-12 | Paper |
https://portal.mardi4nfdi.de/entity/Q4737254 | 2004-08-11 | Paper |
https://portal.mardi4nfdi.de/entity/Q3043924 | 2004-08-09 | Paper |
https://portal.mardi4nfdi.de/entity/Q4474181 | 2004-08-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q4474184 | 2004-08-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q4474200 | 2004-08-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q4472079 | 2004-08-03 | Paper |
https://portal.mardi4nfdi.de/entity/Q4450770 | 2004-02-16 | Paper |
The one-more-RSA-inversion problems and the security of Chaum's blind signature scheme | 2003-08-27 | Paper |
https://portal.mardi4nfdi.de/entity/Q4413871 | 2003-07-21 | Paper |
Group Diffie-Hellman Key Exchange Secure against Dictionary Attacks | 2003-07-16 | Paper |
https://portal.mardi4nfdi.de/entity/Q4409112 | 2003-06-30 | Paper |
https://portal.mardi4nfdi.de/entity/Q4409120 | 2003-06-30 | Paper |
A new NP-complete problem and public-key identification | 2003-04-03 | Paper |
https://portal.mardi4nfdi.de/entity/Q4547780 | 2003-03-31 | Paper |
https://portal.mardi4nfdi.de/entity/Q4536269 | 2003-03-07 | Paper |
https://portal.mardi4nfdi.de/entity/Q4783730 | 2002-12-08 | Paper |
https://portal.mardi4nfdi.de/entity/Q4536632 | 2002-11-24 | Paper |
https://portal.mardi4nfdi.de/entity/Q2724431 | 2002-09-19 | Paper |
https://portal.mardi4nfdi.de/entity/Q2724435 | 2002-09-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4536299 | 2002-06-25 | Paper |
https://portal.mardi4nfdi.de/entity/Q2724585 | 2002-05-05 | Paper |
https://portal.mardi4nfdi.de/entity/Q4502496 | 2002-01-27 | Paper |
https://portal.mardi4nfdi.de/entity/Q2754169 | 2001-12-09 | Paper |
https://portal.mardi4nfdi.de/entity/Q2757255 | 2001-11-25 | Paper |
https://portal.mardi4nfdi.de/entity/Q4950039 | 2000-08-28 | Paper |
Security arguments for digital signatures and blind signatures | 2000-08-08 | Paper |
https://portal.mardi4nfdi.de/entity/Q4950040 | 2000-05-07 | Paper |
https://portal.mardi4nfdi.de/entity/Q4950051 | 2000-05-07 | Paper |
https://portal.mardi4nfdi.de/entity/Q4250765 | 2000-04-09 | Paper |
https://portal.mardi4nfdi.de/entity/Q4249318 | 1999-06-17 | Paper |
https://portal.mardi4nfdi.de/entity/Q4249653 | 1999-06-17 | Paper |
https://portal.mardi4nfdi.de/entity/Q4250807 | 1999-06-17 | Paper |