Serge Fehr

From MaRDI portal
Person:477163

Available identifiers

zbMath Open fehr.sergeMaRDI QIDQ477163

List of research outcomes

PublicationDate of PublicationType
Fixing and mechanizing the security proof of Fiat-Shamir with aborts and Dilithium2024-02-06Paper
Fiat-Shamir transformation of multi-round interactive proofs (Extended version)2023-08-22Paper
Adaptive versus static multi-oracle algorithms, and quantum security of a split-key PRF2023-08-14Paper
Fiat-Shamir transformation of multi-round interactive proofs2023-08-14Paper
Efficient NIZKs and signatures from commit-and-open protocols in the QROM2023-06-28Paper
Parallel repetition of \((k_1,\dots ,k_{\mu }) \)-special-sound multi-round interactive proofs2023-06-12Paper
The measure-and-reprogram technique 2.0: multi-round Fiat-Shamir and more2022-12-07Paper
Online-extractability in the quantum random-oracle model2022-08-30Paper
Compressing proofs of \(k\)-out-of-\(n\) partial knowledge2022-05-18Paper
On the quantum complexity of the continuous hidden subgroup problem2022-03-23Paper
Robust secret sharing with almost optimal share size and security against rushing adversaries2022-03-23Paper
On the compressed-oracle technique, and post-quantum security of proofs of sequential work2021-12-08Paper
Sublinear bounds on the distinguishing advantage for multiple samples2021-02-23Paper
A monogamy-of-entanglement game with applications to device-independent quantum cryptography2020-12-18Paper
Security of the Fiat-Shamir transformation in the quantum random-oracle model2020-03-09Paper
Towards optimal robust secret sharing with security against a rushing adversary2020-02-04Paper
Secure certification of mixed quantum states with application to two-party randomness generation2018-12-06Paper
Classical proofs for the quantum collapsing property of classical hash functions2018-12-06Paper
Quantum Authentication and Encryption with Key Recycling2017-06-23Paper
On the Conditional Rényi Entropy2017-05-16Paper
The garden-hose model2017-05-16Paper
https://portal.mardi4nfdi.de/entity/Q29690442017-03-13Paper
Cheater Detection in SPDZ Multiparty Computation2017-01-06Paper
Adaptive Versus Non-Adaptive Strategies in the Quantum Setting with Applications2016-11-09Paper
On the Composition of Two-Prover Commitments, and Applications to Multi-round Relativistic Commitments2016-07-15Paper
Multi-prover Commitments Against Non-signaling Attacks2015-12-10Paper
An All-But-One Entropic Uncertainty Relation, and Application to Password-Based Identification2015-12-03Paper
Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions2015-09-30Paper
Secure identification and QKD in the bounded-quantum-storage model2014-12-02Paper
Position-Based Quantum Cryptography: Impossibility and Constructions2014-06-04Paper
On quantum Rényi entropies: A new generalization and some properties2014-04-28Paper
Algebraic manipulation detection codes2014-03-05Paper
One-Sided Device-Independent QKD and Position-Based Cryptography from Monogamy Games2013-05-31Paper
Feasibility and Completeness of Cryptographic Tasks in the Quantum World2013-03-18Paper
Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority2012-09-25Paper
Unconditionally-Secure Robust Secret Sharing with Compact Shares2012-06-29Paper
Position-Based Quantum Cryptography: Impossibility and Constructions2011-08-12Paper
Secure Authentication from a Weak Key, without Leaking Information2011-05-27Paper
Sampling in a Quantum Population, and Applications2010-08-24Paper
Quantum cryptography2010-06-09Paper
Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks2010-06-01Paper
Improving the Security of Quantum Protocols via Commit-and-Open2009-10-20Paper
Theory of Cryptography2009-05-14Paper
Secure Identification and QKD in the Bounded-Quantum-Storage Model2009-03-10Paper
A Tight High-Order Entropic Quantum Uncertainty Relation with Applications2009-03-10Paper
Composing Quantum Protocols in a Classical Environment2009-03-03Paper
On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles2009-02-10Paper
Cryptography in the Bounded-Quantum-Storage Model2008-12-22Paper
Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors2008-04-15Paper
Black-Box Secret Sharing from Primitive Sets in Algebraic Number Fields2008-03-17Paper
Randomness Extraction Via δ-Biased Masking in the Presence of a Quantum Attacker2008-03-05Paper
Oblivious Transfer and Linear Functions2007-09-04Paper
Perfect NIZK with Adaptive Soundness2007-08-30Paper
Advances in Cryptology – CRYPTO 20042005-08-23Paper
Advances in Cryptology – CRYPTO 20042005-08-23Paper
https://portal.mardi4nfdi.de/entity/Q44349012003-11-26Paper
Non-interactive Distributed-Verifier Proofs and Proving Relations among Commitments2003-07-16Paper
https://portal.mardi4nfdi.de/entity/Q44091242003-06-30Paper
https://portal.mardi4nfdi.de/entity/Q44091432003-06-30Paper
https://portal.mardi4nfdi.de/entity/Q47837432002-12-08Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Serge Fehr