Publication | Date of Publication | Type |
---|
Pointcheval-Sanders signature-based synchronized aggregate signature | 2023-08-21 | Paper |
Analysis of (U,U+V)-code problem with Gramian over binary and ternary fields | 2023-08-21 | Paper |
Turn-based communication channels | 2023-04-13 | Paper |
Watermarkable signature with computational function preserving | 2023-03-21 | Paper |
Receiver selective opening CCA secure public key encryption from various assumptions | 2023-03-21 | Paper |
Non-committing encryption with constant ciphertext expansion from standard assumptions | 2023-03-21 | Paper |
Approximation and special cases of common subtrees and editing distance | 2023-01-25 | Paper |
Forward secure message franking | 2022-12-07 | Paper |
Efficient two-party exponentiation from quotient transfer | 2022-11-09 | Paper |
Generic constructions for fully secure revocable attribute-based encryption | 2022-08-25 | Paper |
Payment trees: low collateral payments for payment channel networks | 2022-06-22 | Paper |
Obfustopia built on secret-key functional encryption | 2022-06-08 | Paper |
CCA security and trapdoor functions via key-dependent-message security | 2022-04-04 | Paper |
Security definitions on time-lock puzzles | 2022-03-24 | Paper |
Secret sharing with statistical privacy and computational relaxed non-malleability | 2022-03-24 | Paper |
Generic transformation from broadcast encryption to round-optimal deniable ring authentication | 2022-03-21 | Paper |
Impossibility on tamper-resilient cryptography with uniqueness properties | 2021-12-21 | Paper |
Tightly secure ring signatures in the standard model | 2021-10-21 | Paper |
Fine-grained cryptography revisited | 2021-07-30 | Paper |
Simple and generic constructions of succinct functional encryption | 2021-07-30 | Paper |
Improved security proof for the Camenisch-Lysyanskaya signature-based synchronized aggregate signature scheme | 2021-06-08 | Paper |
A t-out-of-n Redactable Signature Scheme | 2020-07-20 | Paper |
Simple and efficient KDM-CCA secure public key encryption | 2020-05-11 | Paper |
Non-committing encryption with quasi-optimal ciphertext-rate based on the DDH problem | 2020-05-11 | Paper |
Fine-grained cryptography revisited | 2020-05-11 | Paper |
Adaptively secure and succinct functional encryption: improving security and efficiency, simultaneously | 2020-03-09 | Paper |
CCA security and trapdoor functions via key-dependent-message security | 2020-03-09 | Paper |
Anonymous single-round server-aided verification | 2020-03-02 | Paper |
Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions | 2019-10-18 | Paper |
A framework for achieving KDM-CCA secure public-key encryption | 2019-01-23 | Paper |
Group signature with deniability: how to disavow a signature | 2018-10-26 | Paper |
Lower bounds for key length of \(k\)-wise almost independent permutations and certain symmetric-key encryption schemes | 2018-10-24 | Paper |
Fully anonymous group signature with verifier-local revocation | 2018-10-17 | Paper |
Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions | 2018-10-17 | Paper |
CCA2 key-privacy for code-based encryption in the standard model | 2018-09-12 | Paper |
Memory lower bounds of reductions revisited | 2018-07-09 | Paper |
Obfustopia built on secret-key functional encryption | 2018-07-09 | Paper |
Simple and generic constructions of succinct functional encryption | 2018-05-29 | Paper |
Key dependent message security and receiver selective opening security for identity-based encryption | 2018-05-16 | Paper |
How to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving Ones | 2017-01-06 | Paper |
Signatures Resilient to Uninvertible Leakage | 2016-10-21 | Paper |
On the complexity of negation-limited Boolean networks | 2016-09-01 | Paper |
On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions | 2016-04-13 | Paper |
Completeness of Single-Bit Projection-KDM Security for Public Key Encryption | 2016-03-02 | Paper |
Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Continuous Leakage Resiliency | 2015-10-20 | Paper |
Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Leakage Resiliency | 2015-09-29 | Paper |
Efficient Key Dependent Message Security Amplification Against Chosen Ciphertext Attacks | 2015-09-11 | Paper |
Attacks to the Proxy Re-Encryption Schemes from IWSEC2011 | 2014-09-15 | Paper |
Game-Theoretic Security for Bit Commitment | 2014-09-15 | Paper |
Strongly Simulation-Extractable Leakage-Resilient NIZK | 2014-07-24 | Paper |
Factoring-Based Proxy Re-Encryption Schemes | 2013-10-23 | Paper |
Grey-Box Public-Key Steganography | 2013-05-28 | Paper |
Symmetric-Key Encryption Scheme with Multi-ciphertext Non-malleability | 2013-04-04 | Paper |
Proxy Re-Encryption in a Stronger Security Model Extended from CT-RSA2012 | 2013-03-18 | Paper |
Approximation and parameterized algorithms for common subtrees and edit distance between unordered trees | 2013-02-19 | Paper |
A Game-Theoretic Perspective on Oblivious Transfer | 2012-09-07 | Paper |
Leakage-Resilience of Stateless/Stateful Public-Key Encryption from Hash Proofs | 2012-09-07 | Paper |
Weak Oblivious Transfer from Strong One-Way Functions | 2011-09-16 | Paper |
Randomness Leakage in the KEM/DEM Framework | 2011-09-16 | Paper |
Characterization of the Relations between Information-Theoretic Non-malleability, Secrecy, and Authenticity | 2011-05-19 | Paper |
A Multi-trapdoor Commitment Scheme from the RSA Assumption | 2010-10-25 | Paper |
CCA Proxy Re-Encryption without Bilinear Maps in the Standard Model | 2010-05-28 | Paper |
Security of Encryption Schemes in Weakened Random Oracle Models | 2010-05-28 | Paper |
Efficient Public Key Encryption Based on Ideal Lattices | 2009-12-15 | Paper |
Efficient Non-interactive Universally Composable String-Commitment Schemes | 2009-12-11 | Paper |
On the Insecurity of the Fiat-Shamir Signatures with Iterative Hash Functions | 2009-12-11 | Paper |
Zero-Knowledge Protocols for NTRU: Application to Identification and Proof of Plaintext Knowledge | 2009-12-11 | Paper |
Algorithms and Computation | 2009-08-07 | Paper |
Limiting negations in bounded-depth circuits: an extension of Markov's theorem | 2009-07-21 | Paper |
On the Weak Ideal Compression Functions | 2009-06-25 | Paper |
Multi-recipient Public-Key Encryption from Simulators in Security Proofs | 2009-06-25 | Paper |
Security on Hybrid Encryption with the Tag-KEM/DEM Framework | 2009-06-25 | Paper |
Public Key Cryptography – PKC 2004 | 2009-05-14 | Paper |
Anonymity on Paillier’s Trap-Door Permutation | 2009-03-06 | Paper |
Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems | 2009-02-10 | Paper |
Public-Key Cryptosystems with Primitive Power Roots of Unity | 2008-07-08 | Paper |
Universally Anonymizable Public-Key Encryption | 2008-03-18 | Paper |
Security of Digital Signature Schemes in Weakened Random Oracle Models | 2008-03-05 | Paper |
PA in the Two-Key Setting and a Generic Conversion for Encryption with Anonymity | 2007-09-07 | Paper |
Multi-bit Cryptosystems Based on Lattice Problems | 2007-09-04 | Paper |
Notch effect on fatigue strength reduction of bearing steel in the very high cycle regime | 2006-10-27 | Paper |
Smart structure for suppression of mode I and II crack propagation in CFRP laminates by shape memory alloy TiNi actuator | 2006-10-10 | Paper |
Mode II fatigue crack growth from delamination in unidirectional tape and satin-woven fabric laminates of high strength GFRP | 2006-10-10 | Paper |
Fatigue damage evaluation in SiCp/2024 by X-ray diffraction method | 2006-10-10 | Paper |
Information Security and Privacy | 2006-06-22 | Paper |
Public Key Cryptography - PKC 2005 | 2005-12-07 | Paper |
Quantum bit-commitment for small storage based on quantum one-way permutations | 2004-09-22 | Paper |
https://portal.mardi4nfdi.de/entity/Q4536799 | 2002-10-07 | Paper |
https://portal.mardi4nfdi.de/entity/Q4548325 | 2002-08-26 | Paper |
An exponential gap with the removal of one negation gate | 2002-07-14 | Paper |
https://portal.mardi4nfdi.de/entity/Q2743823 | 2001-09-17 | Paper |
https://portal.mardi4nfdi.de/entity/Q4503971 | 2001-02-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q4505401 | 2000-09-27 | Paper |
https://portal.mardi4nfdi.de/entity/Q4937871 | 2000-02-20 | Paper |
https://portal.mardi4nfdi.de/entity/Q4935140 | 2000-01-30 | Paper |
https://portal.mardi4nfdi.de/entity/Q4705469 | 1999-12-20 | Paper |
https://portal.mardi4nfdi.de/entity/Q4703654 | 1999-12-15 | Paper |
https://portal.mardi4nfdi.de/entity/Q4703849 | 1999-12-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4253361 | 1999-11-08 | Paper |
Minimizing maximum absolute lateness and range of lateness under generalized due dates on a single machine | 1999-06-10 | Paper |
https://portal.mardi4nfdi.de/entity/Q4234108 | 1999-03-16 | Paper |
On the Complexity of Negation-Limited Boolean Networks | 1998-09-20 | Paper |
Minimizing The Range Of Lateness On A Single Machine Under Generalized Due Dates | 1998-09-07 | Paper |
Negation-limited circuit complexity of symmetric functions | 1997-02-27 | Paper |
A Dislocation Model for Fatigue Crack Initiation | 1981-01-01 | Paper |