Serge Fehr

From MaRDI portal
(Redirected from Person:477163)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
On the (in)security of the BUFF transform2024-12-04Paper
On fully-secure honest majority MPC without \(n^2\) round overhead2024-10-16Paper
Generalized special-sound interactive proofs and their knowledge soundness2024-08-02Paper
On the Quantum Security of HAWK2024-04-26Paper
Fixing and mechanizing the security proof of Fiat-Shamir with aborts and Dilithium
Advances in Cryptology – CRYPTO 2023
2024-02-06Paper
Fiat-Shamir transformation of multi-round interactive proofs (Extended version)
Journal of Cryptology
2023-08-22Paper
Fiat-Shamir transformation of multi-round interactive proofs
Theory of Cryptography
2023-08-14Paper
Adaptive versus static multi-oracle algorithms, and quantum security of a split-key PRF
Theory of Cryptography
2023-08-14Paper
Adaptive versus static multi-oracle algorithms, and quantum security of a split-key PRF
Theory of Cryptography
2023-08-14Paper
Efficient NIZKs and signatures from commit-and-open protocols in the QROM
Advances in Cryptology – CRYPTO 2022
2023-06-28Paper
Efficient NIZKs and signatures from commit-and-open protocols in the QROM
Advances in Cryptology – CRYPTO 2022
2023-06-28Paper
Parallel repetition of \((k_1,\dots ,k_{\mu }) \)-special-sound multi-round interactive proofs
Advances in Cryptology – CRYPTO 2022
2023-06-12Paper
The measure-and-reprogram technique 2.0: multi-round Fiat-Shamir and more
(available as arXiv preprint)
2022-12-07Paper
Online-extractability in the quantum random-oracle model
(available as arXiv preprint)
2022-08-30Paper
Compressing proofs of \(k\)-out-of-\(n\) partial knowledge2022-05-18Paper
Robust secret sharing with almost optimal share size and security against rushing adversaries2022-03-23Paper
On the quantum complexity of the continuous hidden subgroup problem2022-03-23Paper
On the compressed-oracle technique, and post-quantum security of proofs of sequential work
(available as arXiv preprint)
2021-12-08Paper
Sublinear bounds on the distinguishing advantage for multiple samples2021-02-23Paper
A monogamy-of-entanglement game with applications to device-independent quantum cryptography
New Journal of Physics
2020-12-18Paper
Security of the Fiat-Shamir transformation in the quantum random-oracle model
(available as arXiv preprint)
2020-03-09Paper
Towards optimal robust secret sharing with security against a rushing adversary2020-02-04Paper
Secure certification of mixed quantum states with application to two-party randomness generation
(available as arXiv preprint)
2018-12-06Paper
Secure certification of mixed quantum states with application to two-party randomness generation2018-12-06Paper
Classical proofs for the quantum collapsing property of classical hash functions2018-12-06Paper
Quantum authentication and encryption with key recycling. Or: how to re-use a one-time pad even if \(\mathsf{P}= \mathsf{NP}\) -- safely \& feasibly
Lecture Notes in Computer Science
2017-06-23Paper
On the Conditional Rényi Entropy
IEEE Transactions on Information Theory
2017-05-16Paper
The garden-hose model
Proceedings of the 4th conference on Innovations in Theoretical Computer Science
2017-05-16Paper
On the parallel repetition of multi-player games: the no-signaling case
(available as arXiv preprint)
2017-03-13Paper
Cheater detection in SPDZ multiparty computation
Lecture Notes in Computer Science
2017-01-06Paper
Adaptive versus non-adaptive strategies in the quantum setting with applications
Advances in Cryptology – CRYPTO 2016
2016-11-09Paper
On the Composition of Two-Prover Commitments, and Applications to Multi-round Relativistic Commitments
Advances in Cryptology – EUROCRYPT 2016
2016-07-15Paper
Multi-prover commitments against non-signaling attacks
Lecture Notes in Computer Science
2015-12-10Paper
An all-but-one entropic uncertainty relation, and application to password-based identification
Theory of Quantum Computation, Communication, and Cryptography
2015-12-03Paper
Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions
Advances in Cryptology - EUROCRYPT 2015
2015-09-30Paper
Secure identification and QKD in the bounded-quantum-storage model
Theoretical Computer Science
2014-12-02Paper
Position-based quantum cryptography: impossibility and constructions
SIAM Journal on Computing
2014-06-04Paper
On quantum Rényi entropies: a new generalization and some properties
Journal of Mathematical Physics
2014-04-28Paper
Algebraic manipulation detection codes
Science China. Mathematics
2014-03-05Paper
One-sided device-independent QKD and position-based cryptography from monogamy games
Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
2013-05-31Paper
Feasibility and completeness of cryptographic tasks in the quantum world
Theory of Cryptography
2013-03-18Paper
Near-linear unconditionally-secure multiparty computation with a dishonest minority
Lecture Notes in Computer Science
2012-09-25Paper
Unconditionally-secure robust secret sharing with compact shares
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
Position-based quantum cryptography: impossibility and constructions
Advances in Cryptology – CRYPTO 2011
2011-08-12Paper
Secure Authentication from a Weak Key, without Leaking Information
Advances in Cryptology – EUROCRYPT 2011
2011-05-27Paper
Sampling in a quantum population, and applications
Advances in Cryptology – CRYPTO 2010
2010-08-24Paper
Quantum cryptography
Foundations of Physics
2010-06-09Paper
Encryption schemes secure against chosen-ciphertext selective opening attacks
Advances in Cryptology – EUROCRYPT 2010
2010-06-01Paper
Improving the Security of Quantum Protocols via Commit-and-Open
Advances in Cryptology - CRYPTO 2009
2009-10-20Paper
Theory of Cryptography
Lecture Notes in Computer Science
2009-05-14Paper
A Tight High-Order Entropic Quantum Uncertainty Relation with Applications
Advances in Cryptology - CRYPTO 2007
2009-03-10Paper
Secure Identification and QKD in the Bounded-Quantum-Storage Model
Advances in Cryptology - CRYPTO 2007
2009-03-10Paper
Composing Quantum Protocols in a Classical Environment
Theory of Cryptography
2009-03-03Paper
On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles
Lecture Notes in Computer Science
2009-02-10Paper
Cryptography in the Bounded-Quantum-Storage Model
SIAM Journal on Computing
2008-12-22Paper
Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors
Advances in Cryptology – EUROCRYPT 2008
2008-04-15Paper
Black-Box Secret Sharing from Primitive Sets in Algebraic Number Fields
Advances in Cryptology – CRYPTO 2005
2008-03-17Paper
Randomness Extraction Via δ-Biased Masking in the Presence of a Quantum Attacker
Theory of Cryptography
2008-03-05Paper
Oblivious Transfer and Linear Functions
Lecture Notes in Computer Science
2007-09-04Paper
Perfect NIZK with Adaptive Soundness
Theory of Cryptography
2007-08-30Paper
Advances in Cryptology – CRYPTO 2004
Lecture Notes in Computer Science
2005-08-23Paper
Advances in Cryptology – CRYPTO 2004
Lecture Notes in Computer Science
2005-08-23Paper
scientific article; zbMATH DE number 2009982 (Why is no real title available?)2003-11-26Paper
Non-interactive Distributed-Verifier Proofs and Proving Relations among Commitments
Lecture Notes in Computer Science
2003-07-16Paper
scientific article; zbMATH DE number 1942444 (Why is no real title available?)2003-06-30Paper
scientific article; zbMATH DE number 1942426 (Why is no real title available?)2003-06-30Paper
scientific article; zbMATH DE number 1842509 (Why is no real title available?)2002-12-08Paper


Research outcomes over time


This page was built for person: Serge Fehr