Serge Fehr

From MaRDI portal
Person:477163

Available identifiers

zbMath Open fehr.sergeMaRDI QIDQ477163

List of research outcomes





PublicationDate of PublicationType
On the (in)security of the BUFF transform2024-12-04Paper
On fully-secure honest majority MPC without \(n^2\) round overhead2024-10-16Paper
Generalized special-sound interactive proofs and their knowledge soundness2024-08-02Paper
On the Quantum Security of HAWK2024-04-26Paper
Fixing and mechanizing the security proof of Fiat-Shamir with aborts and Dilithium2024-02-06Paper
Fiat-Shamir transformation of multi-round interactive proofs (Extended version)2023-08-22Paper
Fiat-Shamir transformation of multi-round interactive proofs2023-08-14Paper
Adaptive versus static multi-oracle algorithms, and quantum security of a split-key PRF2023-08-14Paper
Efficient NIZKs and signatures from commit-and-open protocols in the QROM2023-06-28Paper
Parallel repetition of \((k_1,\dots ,k_{\mu }) \)-special-sound multi-round interactive proofs2023-06-12Paper
The measure-and-reprogram technique 2.0: multi-round Fiat-Shamir and more2022-12-07Paper
Online-extractability in the quantum random-oracle model2022-08-30Paper
Compressing proofs of \(k\)-out-of-\(n\) partial knowledge2022-05-18Paper
Robust secret sharing with almost optimal share size and security against rushing adversaries2022-03-23Paper
On the quantum complexity of the continuous hidden subgroup problem2022-03-23Paper
On the compressed-oracle technique, and post-quantum security of proofs of sequential work2021-12-08Paper
Sublinear bounds on the distinguishing advantage for multiple samples2021-02-23Paper
A monogamy-of-entanglement game with applications to device-independent quantum cryptography2020-12-18Paper
Security of the Fiat-Shamir transformation in the quantum random-oracle model2020-03-09Paper
Towards optimal robust secret sharing with security against a rushing adversary2020-02-04Paper
Secure certification of mixed quantum states with application to two-party randomness generation2018-12-06Paper
Classical proofs for the quantum collapsing property of classical hash functions2018-12-06Paper
Quantum Authentication and Encryption with Key Recycling2017-06-23Paper
On the Conditional Rényi Entropy2017-05-16Paper
The garden-hose model2017-05-16Paper
https://portal.mardi4nfdi.de/entity/Q29690442017-03-13Paper
Cheater Detection in SPDZ Multiparty Computation2017-01-06Paper
Adaptive Versus Non-Adaptive Strategies in the Quantum Setting with Applications2016-11-09Paper
On the Composition of Two-Prover Commitments, and Applications to Multi-round Relativistic Commitments2016-07-15Paper
Multi-prover Commitments Against Non-signaling Attacks2015-12-10Paper
An All-But-One Entropic Uncertainty Relation, and Application to Password-Based Identification2015-12-03Paper
Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions2015-09-30Paper
Secure identification and QKD in the bounded-quantum-storage model2014-12-02Paper
Position-Based Quantum Cryptography: Impossibility and Constructions2014-06-04Paper
On quantum Rényi entropies: A new generalization and some properties2014-04-28Paper
Algebraic manipulation detection codes2014-03-05Paper
One-Sided Device-Independent QKD and Position-Based Cryptography from Monogamy Games2013-05-31Paper
Feasibility and Completeness of Cryptographic Tasks in the Quantum World2013-03-18Paper
Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority2012-09-25Paper
Unconditionally-Secure Robust Secret Sharing with Compact Shares2012-06-29Paper
Position-Based Quantum Cryptography: Impossibility and Constructions2011-08-12Paper
Secure Authentication from a Weak Key, without Leaking Information2011-05-27Paper
Sampling in a Quantum Population, and Applications2010-08-24Paper
Quantum cryptography2010-06-09Paper
Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks2010-06-01Paper
Improving the Security of Quantum Protocols via Commit-and-Open2009-10-20Paper
Theory of Cryptography2009-05-14Paper
A Tight High-Order Entropic Quantum Uncertainty Relation with Applications2009-03-10Paper
Secure Identification and QKD in the Bounded-Quantum-Storage Model2009-03-10Paper
Composing Quantum Protocols in a Classical Environment2009-03-03Paper
On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles2009-02-10Paper
Cryptography in the Bounded-Quantum-Storage Model2008-12-22Paper
Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors2008-04-15Paper
Black-Box Secret Sharing from Primitive Sets in Algebraic Number Fields2008-03-17Paper
Randomness Extraction Via δ-Biased Masking in the Presence of a Quantum Attacker2008-03-05Paper
Oblivious Transfer and Linear Functions2007-09-04Paper
Perfect NIZK with Adaptive Soundness2007-08-30Paper
Advances in Cryptology – CRYPTO 20042005-08-23Paper
Advances in Cryptology – CRYPTO 20042005-08-23Paper
https://portal.mardi4nfdi.de/entity/Q44349012003-11-26Paper
Non-interactive Distributed-Verifier Proofs and Proving Relations among Commitments2003-07-16Paper
https://portal.mardi4nfdi.de/entity/Q44091432003-06-30Paper
https://portal.mardi4nfdi.de/entity/Q44091242003-06-30Paper
https://portal.mardi4nfdi.de/entity/Q47837432002-12-08Paper

Research outcomes over time

This page was built for person: Serge Fehr