Ron Steinfeld

From MaRDI portal
Person:412196

Available identifiers

zbMath Open steinfeld.ronMaRDI QIDQ412196

List of research outcomes

PublicationDate of PublicationType
An injectivity analysis of Crystals-Kyber and implications on quantum security2023-07-26Paper
Incremental symmetric puncturable encryption with support for unbounded number of punctures2023-04-12Paper
A Lattice-Based Approach to Privacy-Preserving Biometric Authentication Without Relying on Trusted Third Parties2022-12-09Paper
Post-quantum ID-based ring signatures from symmetric-key primitives2022-11-09Paper
Revocable and Linkable Ring Signature2022-10-14Paper
Public-Key Puncturable Encryption: Modular and Compact Constructions2022-10-13Paper
COSAC: COmpact and Scalable Arbitrary-Centered Discrete Gaussian Sampling over Integers2022-10-13Paper
DGM: a \underline{D}ynamic and revocable \underline{G}roup \underline{M}erkle signature2022-08-25Paper
Generic multi-keyword ranked search on encrypted cloud data2022-08-25Paper
An efficient non-interactive multi-client searchable encryption with support for Boolean queries2022-08-19Paper
Vandermonde meets Regev: public key encryption schemes based on partial Vandermonde problems2022-08-04Paper
Efficient Verifiable Partially-Decryptable Commitments from Lattices and Applications2022-07-08Paper
FPPW: a fair and privacy preserving watchtower for bitcoin2022-06-22Paper
Practical post-quantum few-time verifiable random function with applications to Algorand2022-06-22Paper
Efficient lattice-based polynomial evaluation and batch ZK arguments2022-03-25Paper
On the integer polynomial learning with errors problem2021-12-21Paper
Measure-rewind-measure: tighter quantum random oracle model proofs for one-way to hiding and CCA security2021-12-01Paper
MPSign: a signature from small-secret middle-product learning with errors2021-12-01Paper
Lattice-based zero-knowledge arguments for additive and multiplicative relations2021-05-10Paper
Senarai: A Sustainable Public Blockchain-Based Permanent Storage Protocol2020-07-20Paper
Lattice RingCT v2.0 with multiple input and multiple output wallets2020-05-27Paper
Risk of asynchronous protocol update: attacks to Monero protocols2020-05-27Paper
Lattice-based zero-knowledge proofs: new techniques for shorter and faster constructions and applications2020-05-20Paper
Short lattice-based one-out-of-many proofs and applications to ring signatures2020-01-30Paper
FACCT: FAst, Compact, and Constant-Time Discrete Gaussian Sampler over Integers2020-01-28Paper
Practical \(\mathsf{MP} \text{- }\mathsf{LWE}\)-based encryption balancing security-risk versus efficiency2019-11-07Paper
Post-quantum one-time linkable ring signature and application to ring confidential transactions in blockchain (lattice ringct v1.0)2018-09-26Paper
Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance2018-05-28Paper
Hardness of \(k\)-LWE and applications in traitor tracing2018-01-05Paper
Middle-product Learning with Errors2017-10-27Paper
All-but-many lossy trapdoor functions and selective opening chosen-ciphertext security from LWE2017-10-27Paper
Multi-user cloud-based secure keyword search2017-08-25Paper
Improved Security Proofs in Lattice-Based Cryptography: Using the Rényi Divergence Rather Than the Statistical Distance2016-06-10Paper
Rotational Cryptanalysis of ARX Revisited2015-09-18Paper
A subexponential construction of graph coloring for multiparty computation2015-01-22Paper
Hardness of k-LWE and Applications in Traitor Tracing2014-08-07Paper
Practical attack on NLM-MAC scheme2014-06-23Paper
GGHLite: More Efficient Multilinear Maps from Ideal Lattices2014-05-27Paper
Lattice-based completely non-malleable public-key encryption in the standard model2014-04-29Paper
Security analysis of linearly filtered NLFSRs2014-01-23Paper
Cryptanalysis of WG-7: a lightweight stream cipher2013-06-24Paper
Graph coloring applied to secure computation in non-abelian groups2013-01-04Paper
Active Security in Multiparty Computation over Black-Box Groups2012-09-25Paper
NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model2012-07-20Paper
On the modular inversion hidden number problem2012-05-04Paper
Multi-party computation with conversion of secret sharing2012-03-01Paper
Known and Chosen Key Differential Distinguishers for Block Ciphers2011-10-27Paper
Lattice-Based Completely Non-malleable PKE in the Standard Model (Poster)2011-07-07Paper
Making NTRU as Secure as Worst-Case Problems over Ideal Lattices2011-05-27Paper
Security for Signcryption: The Multi-User Model2011-05-18Paper
Faster Fully Homomorphic Encryption2010-12-07Paper
Advances in Cryptology - ASIACRYPT 20032010-01-05Paper
Efficient Public Key Encryption Based on Ideal Lattices2009-12-15Paper
Public Key Cryptography – PKC 20042009-05-14Paper
On Secure Multi-party Computation in Black-Box Groups2009-03-10Paper
A Critical Look at Cryptographic Hash Function Literature2009-03-09Paper
Collision in the DSA Function2009-03-09Paper
The Current Status in Design of Efficient Provably Secure Cryptographic Pseudorandom Generators2009-03-09Paper
Lattice-based treshold-changeability for standard CRT secret-sharing schemes2009-02-09Paper
Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits2009-01-09Paper
Lattice-Based Threshold Changeability for Standard Shamir Secret-Sharing Schemes2008-12-21Paper
Cryptanalysis of LASH2008-09-18Paper
A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders2008-06-17Paper
On the Provable Security of an Efficient RSA-Based Pseudorandom Generator2008-04-24Paper
How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature2008-04-17Paper
VSH, an Efficient and Provable Collision-Resistant Hash Function2007-09-24Paper
Formal proofs for the security of signcryption2007-05-03Paper
Public Key Cryptography - PKC 20062007-05-02Paper
New constructions of anonymous membership broadcasting schemes2007-04-05Paper
Chinese remaindering with multiplicative noise2007-02-14Paper
Public Key Cryptography - PKC 20052005-12-07Paper
Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes2005-08-12Paper
On the security of RSA with primes sharing least-significant bits2005-02-09Paper
https://portal.mardi4nfdi.de/entity/Q47374972004-08-11Paper
https://portal.mardi4nfdi.de/entity/Q30439282004-08-09Paper
Noisy Chinese remaindering in the Lee norm2004-08-06Paper
https://portal.mardi4nfdi.de/entity/Q44724292004-08-04Paper
https://portal.mardi4nfdi.de/entity/Q44129822003-07-17Paper
https://portal.mardi4nfdi.de/entity/Q27244232002-11-04Paper
https://portal.mardi4nfdi.de/entity/Q45366592002-10-10Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Ron Steinfeld