Publication | Date of Publication | Type |
---|
Adaptively Secure Single Secret Leader Election from DDH | 2024-03-26 | Paper |
Efficient and universally composable single secret leader election from pairings | 2023-11-24 | Paper |
Additive-homomorphic functional commitments and applications to homomorphic signatures | 2023-08-21 | Paper |
On the impossibility of algebraic vector commitments in pairing-free groups | 2023-08-14 | Paper |
Inner-product functional encryption with fine-grained access control | 2023-03-29 | Paper |
Double-authentication-preventing signatures in the standard model | 2022-12-16 | Paper |
Bandwidth-efficient threshold EC-DSA revisited: online/offline extensions, identifiable aborts proactive and adaptive security | 2022-11-17 | Paper |
Labeled homomorphic encryption. Scalable and privacy-preserving processing of outsourced data | 2022-08-25 | Paper |
Bandwidth-efficient threshold EC-DSA | 2021-12-01 | Paper |
Mon\(\mathbb{Z}_{2^k}\)a: fast maliciously secure two party computation on \(\mathbb{Z}_{2^k} \) | 2021-12-01 | Paper |
Two-party ECDSA from hash proof systems and efficient instantiations | 2020-03-09 | Paper |
Efficient function-hiding functional encryption: from inner-products to orthogonality | 2020-01-28 | Paper |
Verifiable pattern matching on outsourced texts | 2019-01-04 | Paper |
Multi-input functional encryption for inner products: function-hiding realizations and constructions without pairings | 2018-09-12 | Paper |
Homomorphic signatures with sublinear public keys via asymmetric programmable hash functions | 2018-09-06 | Paper |
On the security notions for homomorphic signatures | 2018-08-10 | Paper |
Practical homomorphic message authenticators for arithmetic circuits | 2018-04-26 | Paper |
Practical functional encryption for quadratic functions with applications to predicate encryption | 2017-11-03 | Paper |
Zero-Knowledge Sets With Short Proofs | 2017-07-27 | Paper |
Verifiable Pattern Matching on Outsourced Texts | 2016-10-21 | Paper |
Programmable Hash Functions Go Private: Constructions and Applications to (Homomorphic) Signatures with Shorter Public Keys | 2015-12-10 | Paper |
Algebraic (trapdoor) one-way functions: constructions and applications | 2015-10-08 | Paper |
Authenticating Computation on Groups: New Homomorphic Primitives and Applications | 2015-01-06 | Paper |
Homomorphic Signatures and Message Authentication Codes | 2014-10-14 | Paper |
Verifiable random functions: relations to identity-based key encapsulation and new constructions | 2014-09-25 | Paper |
Homomorphic Signatures with Efficient Verification for Polynomial Functions | 2014-08-07 | Paper |
Generalizing Homomorphic MACs for Arithmetic Circuits | 2014-03-25 | Paper |
Practical Homomorphic MACs for Arithmetic Circuits | 2013-05-31 | Paper |
Vector Commitments and Their Applications | 2013-04-19 | Paper |
Algebraic (Trapdoor) One-Way Functions and Their Applications | 2013-03-18 | Paper |
Efficient Network Coding Signatures in the Standard Model | 2012-07-20 | Paper |
Adaptive Pseudo-free Groups and Applications | 2011-05-27 | Paper |
Wildcarded identity-based encryption | 2011-04-01 | Paper |
Coercion-Resistant Electronic Elections | 2010-06-17 | Paper |
Advances in Cryptology - ASIACRYPT 2003 | 2010-01-05 | Paper |
Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness | 2009-07-07 | Paper |
Hybrid commitments and their applications to zero-knowledge proof systems | 2009-06-22 | Paper |
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions | 2009-06-08 | Paper |
Public Key Cryptography – PKC 2004 | 2009-05-14 | Paper |
Verifiable Random Functions from Identity-Based Key Encapsulation | 2009-05-12 | Paper |
Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework | 2008-04-24 | Paper |
Zero-Knowledge Sets with Short Proofs | 2008-04-15 | Paper |
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions | 2008-03-17 | Paper |
Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results | 2008-03-05 | Paper |
Identity-Based Encryption Gone Wild | 2007-09-11 | Paper |
Improved On-Line/Off-Line Threshold Signatures | 2007-09-04 | Paper |
Trapdoor hard-to-invert group isomorphisms and their application to password-based authentication | 2007-05-24 | Paper |
Cramer-Damgård signatures revisited: Efficient flat-tree signatures based on factoring | 2007-02-26 | Paper |
Theory of Cryptography | 2007-02-12 | Paper |
https://portal.mardi4nfdi.de/entity/Q5489058 | 2006-09-25 | Paper |
https://portal.mardi4nfdi.de/entity/Q3374909 | 2006-03-01 | Paper |
Automata, Languages and Programming | 2006-01-10 | Paper |
Public Key Cryptography - PKC 2005 | 2005-12-07 | Paper |
Contemporary cryptology. | 2005-08-30 | Paper |
Advances in Cryptology – CRYPTO 2004 | 2005-08-23 | Paper |
The Hardness of Hensel Lifting: The Case of RSA and Discrete Logarithm | 2003-07-16 | Paper |
Paillier's trapdoor function hides up to \(O(n)\) bits | 2003-03-25 | Paper |
https://portal.mardi4nfdi.de/entity/Q2778852 | 2002-03-21 | Paper |
https://portal.mardi4nfdi.de/entity/Q2728905 | 2001-11-04 | Paper |
New efficient and secure protocols for verifiable signature sharing and other applications | 2001-06-10 | Paper |
https://portal.mardi4nfdi.de/entity/Q4249324 | 2000-03-09 | Paper |