Publication | Date of Publication | Type |
---|
Almost tight multi-user security under adaptive corruptions from LWE in the standard model | 2024-02-06 | Paper |
Almost tight multi-user security under adaptive corruptions \& leakages in the standard model | 2023-12-12 | Paper |
EKE meets tight security in the universally composable framework | 2023-11-24 | Paper |
Functional encryption against probabilistic queries: definition, construction and applications | 2023-11-16 | Paper |
Fine-grained verifier NIZK and its applications | 2023-11-16 | Paper |
A universally composable non-interactive aggregate cash system | 2023-08-25 | Paper |
Privacy-preserving authenticated key exchange in the standard model | 2023-08-25 | Paper |
Practical multi-party private set intersection cardinality and intersection-sum under arbitrary collusion | 2023-08-21 | Paper |
Further cryptanalysis of a type of RSA variants | 2023-08-04 | Paper |
Fuzzy authenticated key exchange with tight security | 2023-07-28 | Paper |
More efficient verifiable functional encryption | 2023-07-21 | Paper |
Key encapsulation mechanism with tight enhanced security in the multi-user setting: impossibility result and optimal tightness | 2023-05-12 | Paper |
Simulatable verifiable random function from the LWE assumption | 2023-04-27 | Paper |
Two-pass authenticated key exchange with explicit authentication and tight security | 2023-03-21 | Paper |
A New General Method of Searching for Cubes in Cube Attacks | 2022-12-21 | Paper |
Precise bounded-concurrent zero-knowledge proofs for NP | 2022-10-28 | Paper |
SymSem: Symbolic Execution with Time Stamps for Deobfuscation | 2022-10-14 | Paper |
Public-Key Puncturable Encryption: Modular and Compact Constructions | 2022-10-13 | Paper |
Revisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user setting | 2022-04-22 | Paper |
Tightly CCA-secure inner product functional encryption scheme | 2021-12-01 | Paper |
New cryptographic hardness for learning intersections of halfspaces over Boolean cubes with membership queries | 2021-11-25 | Paper |
Pseudorandom functions in NC class from the standard LWE assumption | 2021-11-11 | Paper |
Tightly secure chameleon hash functions in the multi-user setting and their applications | 2021-06-08 | Paper |
Robustly reusable fuzzy extractor with imperfect randomness | 2021-05-10 | Paper |
RingCT 3.0 for blockchain confidential transaction: shorter size and stronger security | 2021-02-08 | Paper |
Pseudorandom functions from LWE: RKA security and application | 2020-05-27 | Paper |
Tight leakage-resilient CCA-security from quasi-adaptive hash proof system | 2020-03-09 | Paper |
Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman | 2020-02-07 | Paper |
Strong leakage and tamper-resilient PKE from refined hash proof system | 2020-01-30 | Paper |
Generic constructions of robustly reusable fuzzy extractor | 2020-01-28 | Paper |
Structure-preserving public-key encryption with leakage-resilient CCA security | 2019-10-18 | Paper |
Tightly secure signature schemes from the LWE and subset sum assumptions | 2019-10-18 | Paper |
A generic construction of tightly secure signatures in the multi-user setting | 2019-05-29 | Paper |
Beyond-birthday secure domain-preserving PRFs from a single permutation | 2019-05-24 | Paper |
https://portal.mardi4nfdi.de/entity/Q4645675 | 2019-01-10 | Paper |
On the robustness of learning parity with noise | 2018-10-26 | Paper |
Tightly SIM-SO-CCA secure public key encryption from standard assumptions | 2018-05-16 | Paper |
A modified fuzzy fingerprint vault based on pair-polar minutiae structures | 2018-04-20 | Paper |
Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness | 2018-04-06 | Paper |
Evaluation and improvement of generic-emulating DPA attacks | 2018-02-14 | Paper |
Efficient fuzzy extraction of PUF-induced secrets: theory and applications | 2018-02-14 | Paper |
Functional graph revisited: updates on (second) preimage attacks on hash combiners | 2017-11-15 | Paper |
Public key encryption resilient to leakage and tampering attacks | 2017-09-07 | Paper |
Tightly-secure signatures from the decisional composite residuosity assumption | 2017-08-25 | Paper |
Learning $$AC^0$$ Under k-Dependent Distributions | 2017-05-19 | Paper |
Ridge-Based Profiled Differential Power Analysis | 2017-04-12 | Paper |
How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers | 2017-02-01 | Paper |
Efficient Completely Non-Malleable and RKA Secure Public Key Encryptions | 2016-09-02 | Paper |
Four-Round Zero-Knowledge Arguments of Knowledge with Strict Polynomial-Time Simulation from Differing-Input Obfuscation for Circuits | 2016-09-02 | Paper |
Differential power analysis of stream ciphers with LFSRs | 2016-07-06 | Paper |
(Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-Way Functions and Beyond | 2015-12-10 | Paper |
Automatic Detection and Analysis of Encrypted Messages in Malware | 2015-12-02 | Paper |
https://portal.mardi4nfdi.de/entity/Q3448009 | 2015-10-28 | Paper |
https://portal.mardi4nfdi.de/entity/Q3448010 | 2015-10-28 | Paper |
Secure Lightweight Entity Authentication with Strong PUFs: Mission Impossible? | 2015-07-21 | Paper |
The Randomized Iterate, Revisited - Almost Linear Seed Length PRGs from a Broader Class of One-Way Functions | 2015-07-06 | Paper |
Efficient Leakage-Resilient Identity-Based Encryption with CCA Security | 2014-02-18 | Paper |
Improved Impossible Differential Attacks on Large-Block Rijndael | 2013-06-04 | Paper |
New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia | 2013-01-08 | Paper |
Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming | 2013-01-07 | Paper |
On weaknesses of the HDCP authentication and key exchange protocol and its repair | 2012-08-24 | Paper |
Impossible Differential Attacks on Reduced-Round LBlock | 2012-06-29 | Paper |
Provably secure three-party password-based authenticated key exchange protocol | 2012-06-08 | Paper |
Efficient Pairing Computation on Elliptic Curves in Hessian Form | 2011-10-27 | Paper |
Precise Time and Space Simulatable Zero-Knowledge | 2011-09-16 | Paper |
On Obfuscating Programs with Tamper-proof Hardware | 2011-07-29 | Paper |
A Note on Obfuscation for Cryptographic Functionalities of Secret-Operation Then Public-Encryption | 2011-07-01 | Paper |
A General and Efficient Obfuscation for Programs with Tamper-Proof Hardware | 2011-05-19 | Paper |
HIERARCHICAL IDENTITY-BASED PROXY RE-ENCRYPTION WITHOUT RANDOM ORACLES | 2011-01-19 | Paper |
Precise zero-knowledge arguments with poly-logarithmic efficiency | 2011-01-05 | Paper |
On sequential composition of precise zero-knowledge | 2011-01-05 | Paper |
https://portal.mardi4nfdi.de/entity/Q3064579 | 2010-12-22 | Paper |
Differential-Multiple Linear Cryptanalysis | 2010-11-23 | Paper |
Fully CCA2 secure identity based broadcast encryption without random oracles | 2010-08-16 | Paper |
A program understanding approach for stripped binary code | 2010-03-06 | Paper |
Efficient scalar multiplication for elliptic curves over binary fields | 2010-02-12 | Paper |
Speeding Up the Double-Base Recoding Algorithm of Scalar Multiplication∗ | 2009-11-16 | Paper |
https://portal.mardi4nfdi.de/entity/Q3641432 | 2009-11-11 | Paper |
A Discrete-Logarithm Based Non-interactive Non-malleable Commitment Scheme with an Online Knowledge Extractor | 2009-02-10 | Paper |
Secure Hierarchical Identity Based Encryption Scheme in the Standard Model | 2009-01-22 | Paper |
https://portal.mardi4nfdi.de/entity/Q3524685 | 2008-09-12 | Paper |
An Approach for Symmetric Encryption Against Side Channel Attacks in Provable Security | 2008-06-10 | Paper |
Ono invariants of imaginary quadratic fields with class number three | 2008-02-04 | Paper |
Further analysis of block ciphers against timing attacks | 2007-06-01 | Paper |
Formalization of fault analysis and a new approach of fault detection | 2007-05-09 | Paper |
https://portal.mardi4nfdi.de/entity/Q3412630 | 2007-01-02 | Paper |
https://portal.mardi4nfdi.de/entity/Q5469712 | 2006-05-26 | Paper |
https://portal.mardi4nfdi.de/entity/Q5700996 | 2005-11-02 | Paper |
https://portal.mardi4nfdi.de/entity/Q5696658 | 2005-10-18 | Paper |
https://portal.mardi4nfdi.de/entity/Q4823985 | 2004-10-28 | Paper |
https://portal.mardi4nfdi.de/entity/Q4408433 | 2003-06-29 | Paper |