Publication | Date of Publication | Type |
---|
Traceable policy-based signatures and instantiation from lattices | 2024-03-13 | Paper |
Leakage-Resilient Secret Sharing in Non-Compartmentalized Models. | 2023-11-02 | Paper |
Game-Theoretic Analysis of an Incentivized Verifiable Computation System | 2023-08-03 | Paper |
Batch Verifiable Computation of Polynomials on Outsourced Data | 2022-08-19 | Paper |
https://portal.mardi4nfdi.de/entity/Q5090431 | 2022-07-18 | Paper |
Privacy-preserving resource sharing using permissioned blockchains (the case of smart neighbourhood) | 2022-06-01 | Paper |
An intermediate secret-guessing attack on hash-based signatures | 2022-04-22 | Paper |
Password protected secret sharing from lattices | 2022-03-21 | Paper |
Group encryption: full dynamicity, message filtering and code-based instantiation | 2021-12-21 | Paper |
Privacy-preserving verifiable delegation of polynomial and matrix functions | 2021-05-03 | Paper |
Economically Optimal Variable Tag Length Message Authentication | 2021-03-17 | Paper |
Protecting data privacy in publicly verifiable delegation of matrix and polynomial functions | 2020-03-27 | Paper |
Keyed hash functions | 2019-10-10 | Paper |
New attacks and secure design for anonymous distance-bounding | 2018-09-26 | Paper |
In-region authentication | 2018-08-10 | Paper |
Secret Sharing with Binary Shares | 2018-08-08 | Paper |
MRD Hashing | 2018-05-09 | Paper |
A virtual wiretap channel for secure message transmission | 2017-10-23 | Paper |
On Optimal Secure Message Transmission by Public Discussion | 2017-07-27 | Paper |
Codes for Detection of Limited View Algebraic Tampering | 2017-05-05 | Paper |
A Model for Adversarial Wiretap Channels | 2017-04-28 | Paper |
Detecting Algebraic Manipulation in Leaky Storage Systems | 2017-01-06 | Paper |
Automated proofs of block cipher modes of operation | 2016-05-26 | Paper |
An Efficient Post-Quantum One-Time Signature Scheme | 2016-05-19 | Paper |
Almost Optimum Secret Sharing with Cheating Detection | 2015-11-25 | Paper |
Batch verifiable computation of outsourced functions | 2015-10-26 | Paper |
Detection of Algebraic Manipulation in the Presence of Leakage | 2015-09-30 | Paper |
Limited View Adversary Codes: Bounds, Constructions and Applications | 2015-09-24 | Paper |
A True Random Generator Using Human Gameplay | 2014-09-15 | Paper |
Paillier-based publicly verifiable (non-interactive) secret sharing | 2014-08-18 | Paper |
Verifiable Multi-server Private Information Retrieval | 2014-07-07 | Paper |
Private Message Transmission Using Disjoint Paths | 2014-07-07 | Paper |
Unconditionally-secure ideal robust secret sharing schemes for threshold and multilevel access structure | 2014-01-23 | Paper |
On the Share Efficiency of Robust Secret Sharing and Secret Sharing with Cheating Detection | 2014-01-14 | Paper |
Proofs of Retrievability via Fountain Code | 2013-08-07 | Paper |
Message Transmission and Key Establishment: Conditions for Equality of Weak and Strong Capacities | 2013-08-07 | Paper |
Short Pairing-Efficient Threshold-Attribute-Based Signature | 2013-04-04 | Paper |
Attribute-based encryption without key cloning | 2012-11-16 | Paper |
Guessing Secrecy | 2012-11-06 | Paper |
Private Fingerprint Matching | 2012-09-07 | Paper |
FUZZY UNIVERSAL HASHING AND APPROXIMATE AUTHENTICATION | 2012-08-27 | Paper |
Bounds and Constructions for 1-Round (0,δ)-Secure Message Transmission against Generalized Adversary | 2012-07-23 | Paper |
ON "THE POWER OF VERIFICATION QUERIES" IN UNCONDITIONALLY SECURE MESSAGE AUTHENTICATION | 2012-06-12 | Paper |
BREAKING AND REPAIRING AN APPROXIMATE MESSAGE AUTHENTICATION SCHEME | 2012-06-12 | Paper |
Automated Verification of Block Cipher Modes of Operation, an Improved Method | 2012-06-08 | Paper |
Secret Key Establishment over Noisy Channels | 2012-06-08 | Paper |
UNCONDITIONALLY SECURE CONFERENCE KEY DISTRIBUTION: SECURITY NOTIONS, BOUNDS AND CONSTRUCTIONS | 2011-10-10 | Paper |
Secret Keys from Channel Noise | 2011-05-27 | Paper |
Common Randomness and Secret Key Capacities of Two-Way Channels | 2011-05-19 | Paper |
Redistribution of Mechanical Secret Shares | 2011-04-20 | Paper |
Traitor Tracing for Shortened and Corrupted Fingerprints | 2011-03-18 | Paper |
Threshold Attribute-Based Signcryption | 2010-09-10 | Paper |
Simple and Communication Complexity Efficient Almost Secure and Perfectly Secure Message Transmission Schemes | 2010-05-04 | Paper |
Automated Security Proof for Symmetric Encryption Modes | 2010-01-14 | Paper |
New Results on Unconditionally Secure Multi-receiver Manual Authentication | 2009-12-03 | Paper |
How to Compare Image Watermarking Algorithms | 2009-07-24 | Paper |
Unconditionally Secure Approximate Message Authentication | 2009-07-23 | Paper |
Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems | 2009-07-07 | Paper |
Public Key Cryptography – PKC 2004 | 2009-05-14 | Paper |
Public Key Cryptography – PKC 2004 | 2009-05-14 | Paper |
An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme | 2009-03-10 | Paper |
Authentication Codes in the Query Model | 2009-03-09 | Paper |
Non-interactive Manual Channel Message Authentication Based on eTCR Hash Functions | 2009-03-06 | Paper |
Information Theoretic Bounds on Authentication Systems in Query Model | 2009-02-24 | Paper |
An Efficient Deniable Key Exchange Protocol (Extended Abstract) | 2009-02-12 | Paper |
Classification of the Deletion Correcting Capabilities of Reed–Solomon Codes of Dimension $2$ Over Prime Fields | 2008-12-21 | Paper |
RFID Privacy Models Revisited | 2008-10-27 | Paper |
Multi-party Concurrent Signatures | 2008-06-17 | Paper |
On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search | 2008-06-17 | Paper |
Universal Designated Verifier Signature Proof (or How to Efficiently Prove Knowledge of a Signature) | 2008-03-18 | Paper |
Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures | 2008-03-05 | Paper |
Progress in Cryptology - INDOCRYPT 2003 | 2007-11-29 | Paper |
Construction of deletion correcting codes using generalized Reed-Solomon codes and their subcodes | 2007-09-20 | Paper |
Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability | 2007-09-11 | Paper |
A Note on the Exposure Property of SBIBD | 2007-05-29 | Paper |
Applied Cryptography and Network Security | 2007-05-02 | Paper |
Secret sharing schemes with partial broadcast channels | 2006-11-22 | Paper |
Cryptology and Network Security | 2006-11-14 | Paper |
Information Security | 2006-10-20 | Paper |
RESILIENT LKH: SECURE MULTICAST KEY DISTRIBUTION SCHEMES | 2006-10-16 | Paper |
Information Security and Privacy | 2006-06-22 | Paper |
Recursive constructions of secure codes and hash families using difference function families. | 2006-05-18 | Paper |
2-secure codes from 2-SFP codes | 2006-01-13 | Paper |
Computing and Combinatorics | 2006-01-11 | Paper |
Progress in Cryptology - INDOCRYPT 2004 | 2005-12-22 | Paper |
Public Key Cryptography - PKC 2005 | 2005-12-07 | Paper |
Attack on Han et al.'s ID-based confirmer (undeniable) signature at ACM-EC'03 | 2005-11-22 | Paper |
Distributing the encryption and decryption of a block cipher | 2005-11-07 | Paper |
https://portal.mardi4nfdi.de/entity/Q5700980 | 2005-11-02 | Paper |
Information Security Practice and Experience | 2005-09-13 | Paper |
Information Security and Privacy | 2005-09-07 | Paper |
Information Security and Privacy | 2005-09-07 | Paper |
Applied Cryptography and Network Security | 2005-06-13 | Paper |
https://portal.mardi4nfdi.de/entity/Q4681987 | 2005-06-09 | Paper |
Linear authentication codes: bounds and constructions | 2005-06-01 | Paper |
Sequential traitor tracing | 2005-06-01 | Paper |
On the Maximal Codes of Length 3 with the 2-Identifiable Parent Property | 2005-02-28 | Paper |
https://portal.mardi4nfdi.de/entity/Q3154877 | 2005-01-14 | Paper |
https://portal.mardi4nfdi.de/entity/Q4738938 | 2004-08-11 | Paper |
https://portal.mardi4nfdi.de/entity/Q4472397 | 2004-08-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q4472428 | 2004-08-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q4463459 | 2004-05-27 | Paper |
https://portal.mardi4nfdi.de/entity/Q4460562 | 2004-05-18 | Paper |
https://portal.mardi4nfdi.de/entity/Q4250649 | 2004-03-09 | Paper |
https://portal.mardi4nfdi.de/entity/Q4452575 | 2004-03-01 | Paper |
Bounds And Constructions For Threshold Shared Generation Of Authenticators | 2003-10-21 | Paper |
https://portal.mardi4nfdi.de/entity/Q4417402 | 2003-07-29 | Paper |
https://portal.mardi4nfdi.de/entity/Q4414275 | 2003-07-24 | Paper |
https://portal.mardi4nfdi.de/entity/Q4412959 | 2003-07-17 | Paper |
https://portal.mardi4nfdi.de/entity/Q4413313 | 2003-07-17 | Paper |
https://portal.mardi4nfdi.de/entity/Q4413328 | 2003-07-17 | Paper |
https://portal.mardi4nfdi.de/entity/Q4413346 | 2003-07-17 | Paper |
https://portal.mardi4nfdi.de/entity/Q4410695 | 2003-07-03 | Paper |
https://portal.mardi4nfdi.de/entity/Q4788570 | 2003-05-19 | Paper |
Multireceiver authentication codes: Models, bounds, constructions, and extensions | 2003-01-14 | Paper |
https://portal.mardi4nfdi.de/entity/Q4536647 | 2002-11-23 | Paper |
https://portal.mardi4nfdi.de/entity/Q4536810 | 2002-10-07 | Paper |
https://portal.mardi4nfdi.de/entity/Q2766852 | 2002-10-07 | Paper |
https://portal.mardi4nfdi.de/entity/Q3149708 | 2002-09-26 | Paper |
https://portal.mardi4nfdi.de/entity/Q3149762 | 2002-09-26 | Paper |
New results on frame-proof codes and traceability schemes | 2002-08-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q4501500 | 2002-07-28 | Paper |
Broadcast authentication for group communication | 2002-03-03 | Paper |
https://portal.mardi4nfdi.de/entity/Q4502516 | 2002-01-27 | Paper |
https://portal.mardi4nfdi.de/entity/Q4502517 | 2002-01-27 | Paper |
https://portal.mardi4nfdi.de/entity/Q2744391 | 2001-09-19 | Paper |
https://portal.mardi4nfdi.de/entity/Q2708633 | 2001-07-17 | Paper |
https://portal.mardi4nfdi.de/entity/Q2708634 | 2001-07-17 | Paper |
https://portal.mardi4nfdi.de/entity/Q2707603 | 2001-07-08 | Paper |
https://portal.mardi4nfdi.de/entity/Q2721137 | 2001-07-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4495077 | 2001-04-26 | Paper |
https://portal.mardi4nfdi.de/entity/Q2707613 | 2001-04-03 | Paper |
Remarks on the multiple assignment secret sharing scheme | 2001-04-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4520486 | 2001-02-26 | Paper |
https://portal.mardi4nfdi.de/entity/Q4520506 | 2001-02-26 | Paper |
https://portal.mardi4nfdi.de/entity/Q4501507 | 2000-09-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q4495080 | 2000-08-10 | Paper |
Bounds and Techniques for Efficient Redistribution of Secret Shares to New Access Structures | 2000-07-27 | Paper |
https://portal.mardi4nfdi.de/entity/Q4249663 | 2000-02-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q4934717 | 2000-01-31 | Paper |
https://portal.mardi4nfdi.de/entity/Q4269754 | 1999-11-10 | Paper |
https://portal.mardi4nfdi.de/entity/Q4251034 | 1999-09-26 | Paper |
https://portal.mardi4nfdi.de/entity/Q4249270 | 1999-06-17 | Paper |
https://portal.mardi4nfdi.de/entity/Q4250632 | 1999-06-17 | Paper |
https://portal.mardi4nfdi.de/entity/Q4250638 | 1999-06-17 | Paper |
https://portal.mardi4nfdi.de/entity/Q3839199 | 1998-10-08 | Paper |
https://portal.mardi4nfdi.de/entity/Q3839198 | 1998-08-13 | Paper |
A multi-level view model for secure object-oriented databases | 1998-07-22 | Paper |
https://portal.mardi4nfdi.de/entity/Q4373624 | 1998-06-07 | Paper |
https://portal.mardi4nfdi.de/entity/Q4388206 | 1998-05-17 | Paper |
https://portal.mardi4nfdi.de/entity/Q4365745 | 1998-04-22 | Paper |
Secret sharing in hierarchical groups | 1998-02-16 | Paper |
https://portal.mardi4nfdi.de/entity/Q3839174 | 1998-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3839192 | 1998-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3840088 | 1998-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4341670 | 1997-08-26 | Paper |
https://portal.mardi4nfdi.de/entity/Q4341668 | 1997-08-10 | Paper |
https://portal.mardi4nfdi.de/entity/Q4341791 | 1997-06-18 | Paper |
Authentication codes in plaintext and chosen-content attacks | 1997-01-14 | Paper |
https://portal.mardi4nfdi.de/entity/Q4862224 | 1996-08-05 | Paper |
https://portal.mardi4nfdi.de/entity/Q4314025 | 1995-02-19 | Paper |
https://portal.mardi4nfdi.de/entity/Q4037489 | 1993-05-18 | Paper |
https://portal.mardi4nfdi.de/entity/Q3350640 | 1990-01-01 | Paper |