Ron Steinfeld

From MaRDI portal
Person:412196

Available identifiers

zbMath Open steinfeld.ronMaRDI QIDQ412196

List of research outcomes





PublicationDate of PublicationType
Loquat: a SNARK-friendly post-quantum signature based on the Legendre PRF with applications in ring and aggregate signatures2024-12-04Paper
\textsf{Plover}: masking-friendly hash-and-sign lattice signatures2024-11-13Paper
An injectivity analysis of Crystals-Kyber and implications on quantum security2023-07-26Paper
Incremental symmetric puncturable encryption with support for unbounded number of punctures2023-04-12Paper
A Lattice-Based Approach to Privacy-Preserving Biometric Authentication Without Relying on Trusted Third Parties2022-12-09Paper
Post-quantum ID-based ring signatures from symmetric-key primitives2022-11-09Paper
Revocable and Linkable Ring Signature2022-10-14Paper
COSAC: COmpact and Scalable Arbitrary-Centered Discrete Gaussian Sampling over Integers2022-10-13Paper
Public-Key Puncturable Encryption: Modular and Compact Constructions2022-10-13Paper
DGM: a \underline{D}ynamic and revocable \underline{G}roup \underline{M}erkle signature2022-08-25Paper
Generic multi-keyword ranked search on encrypted cloud data2022-08-25Paper
An efficient non-interactive multi-client searchable encryption with support for Boolean queries2022-08-19Paper
Vandermonde meets Regev: public key encryption schemes based on partial Vandermonde problems2022-08-04Paper
Efficient Verifiable Partially-Decryptable Commitments from Lattices and Applications2022-07-08Paper
FPPW: a fair and privacy preserving watchtower for bitcoin2022-06-22Paper
Practical post-quantum few-time verifiable random function with applications to Algorand2022-06-22Paper
Efficient lattice-based polynomial evaluation and batch ZK arguments2022-03-25Paper
On the integer polynomial learning with errors problem2021-12-21Paper
Measure-rewind-measure: tighter quantum random oracle model proofs for one-way to hiding and CCA security2021-12-01Paper
MPSign: a signature from small-secret middle-product learning with errors2021-12-01Paper
Lattice-based zero-knowledge arguments for additive and multiplicative relations2021-05-10Paper
Senarai: A Sustainable Public Blockchain-Based Permanent Storage Protocol2020-07-20Paper
Lattice RingCT v2.0 with multiple input and multiple output wallets2020-05-27Paper
Risk of asynchronous protocol update: attacks to Monero protocols2020-05-27Paper
Lattice-based zero-knowledge proofs: new techniques for shorter and faster constructions and applications2020-05-20Paper
Short lattice-based one-out-of-many proofs and applications to ring signatures2020-01-30Paper
FACCT: FAst, Compact, and Constant-Time Discrete Gaussian Sampler over Integers2020-01-28Paper
Practical \(\mathsf{MP} \text{- }\mathsf{LWE}\)-based encryption balancing security-risk versus efficiency2019-11-07Paper
Post-quantum one-time linkable ring signature and application to ring confidential transactions in blockchain (lattice ringct v1.0)2018-09-26Paper
Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance2018-05-28Paper
Hardness of \(k\)-LWE and applications in traitor tracing2018-01-05Paper
All-but-many lossy trapdoor functions and selective opening chosen-ciphertext security from LWE2017-10-27Paper
Middle-product Learning with Errors2017-10-27Paper
Multi-user cloud-based secure keyword search2017-08-25Paper
Improved Security Proofs in Lattice-Based Cryptography: Using the Rényi Divergence Rather Than the Statistical Distance2016-06-10Paper
Rotational Cryptanalysis of ARX Revisited2015-09-18Paper
A subexponential construction of graph coloring for multiparty computation2015-01-22Paper
Hardness of k-LWE and Applications in Traitor Tracing2014-08-07Paper
Practical attack on NLM-MAC scheme2014-06-23Paper
GGHLite: More Efficient Multilinear Maps from Ideal Lattices2014-05-27Paper
Lattice-based completely non-malleable public-key encryption in the standard model2014-04-29Paper
Security analysis of linearly filtered NLFSRs2014-01-23Paper
Cryptanalysis of WG-7: a lightweight stream cipher2013-06-24Paper
Graph coloring applied to secure computation in non-abelian groups2013-01-04Paper
Active Security in Multiparty Computation over Black-Box Groups2012-09-25Paper
NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model2012-07-20Paper
On the modular inversion hidden number problem2012-05-04Paper
Multi-party computation with conversion of secret sharing2012-03-01Paper
Known and Chosen Key Differential Distinguishers for Block Ciphers2011-10-27Paper
Lattice-Based Completely Non-malleable PKE in the Standard Model (Poster)2011-07-07Paper
Making NTRU as Secure as Worst-Case Problems over Ideal Lattices2011-05-27Paper
Security for Signcryption: The Multi-User Model2011-05-18Paper
Faster Fully Homomorphic Encryption2010-12-07Paper
Advances in Cryptology - ASIACRYPT 20032010-01-05Paper
Efficient Public Key Encryption Based on Ideal Lattices2009-12-15Paper
Public Key Cryptography – PKC 20042009-05-14Paper
On Secure Multi-party Computation in Black-Box Groups2009-03-10Paper
Collision in the DSA Function2009-03-09Paper
A Critical Look at Cryptographic Hash Function Literature2009-03-09Paper
The Current Status in Design of Efficient Provably Secure Cryptographic Pseudorandom Generators2009-03-09Paper
Lattice-based treshold-changeability for standard CRT secret-sharing schemes2009-02-09Paper
Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits2009-01-09Paper
Lattice-Based Threshold Changeability for Standard Shamir Secret-Sharing Schemes2008-12-21Paper
Cryptanalysis of LASH2008-09-18Paper
A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders2008-06-17Paper
On the Provable Security of an Efficient RSA-Based Pseudorandom Generator2008-04-24Paper
How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature2008-04-17Paper
VSH, an Efficient and Provable Collision-Resistant Hash Function2007-09-24Paper
Formal proofs for the security of signcryption2007-05-03Paper
Public Key Cryptography - PKC 20062007-05-02Paper
New constructions of anonymous membership broadcasting schemes2007-04-05Paper
Chinese remaindering with multiplicative noise2007-02-14Paper
Public Key Cryptography - PKC 20052005-12-07Paper
Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes2005-08-12Paper
On the security of RSA with primes sharing least-significant bits2005-02-09Paper
https://portal.mardi4nfdi.de/entity/Q47374972004-08-11Paper
https://portal.mardi4nfdi.de/entity/Q30439282004-08-09Paper
Noisy Chinese remaindering in the Lee norm2004-08-06Paper
https://portal.mardi4nfdi.de/entity/Q44724292004-08-04Paper
https://portal.mardi4nfdi.de/entity/Q44129822003-07-17Paper
https://portal.mardi4nfdi.de/entity/Q27244232002-11-04Paper
https://portal.mardi4nfdi.de/entity/Q45366592002-10-10Paper

Research outcomes over time

This page was built for person: Ron Steinfeld