Publication | Date of Publication | Type |
---|
Hash-Based Direct Anonymous Attestation | 2024-04-26 | Paper |
Nonlinear vibrations of thermo-hyperelastic moderately thick cylindrical shells with 2:1 internal resonance | 2024-04-23 | Paper |
Assessing the Dissipative Capacity of Particle Impact Dampers Based on their Nonlinear Bandwidth Characteristics | 2023-09-25 | Paper |
DFE-IP: delegatable functional encryption for inner product | 2023-09-08 | Paper |
Certificateless Public Key Signature Schemes from Standard Algorithms | 2023-06-30 | Paper |
Anonymous single-sign-on for \(n\) designated services with traceability | 2022-08-25 | Paper |
Efficient, XOR-based, ideal \((t,n)\)-threshold schemes | 2018-10-26 | Paper |
Revisiting and Extending the AONT-RS Scheme: A Robust Computationally Secure Secret Sharing Scheme | 2017-08-04 | Paper |
A Static Diffie-Hellman Attack on Several Direct Anonymous Attestation Schemes | 2017-01-23 | Paper |
Attribute-Based Signatures with User-Controlled Linkability | 2015-02-10 | Paper |
Reflections on the security proofs of Boneh-Franklin identity-based encryption scheme | 2014-03-05 | Paper |
Extended KCI attack against two-party key establishment protocols | 2013-04-04 | Paper |
CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model | 2012-11-01 | Paper |
A note on the Chen-Morrissey-Smart DAA scheme | 2012-03-12 | Paper |
The Twin Bilinear Diffie-Hellman Inversion Problem and Applications | 2011-10-27 | Paper |
A DAA Scheme Requiring Less TPM Resources | 2010-11-23 | Paper |
Certificate-Free Attribute Authentication | 2010-01-07 | Paper |
Security Notions and Generic Constructions for Client Puzzles | 2009-12-15 | Paper |
An Interpretation of Identity-Based Cryptography | 2009-10-22 | Paper |
Concurrent Signatures without a Conventional Keystone | 2009-03-09 | Paper |
Pairings in Trusted Computing | 2009-02-10 | Paper |
On Proofs of Security for DAA Schemes | 2009-01-27 | Paper |
Property-Based Attestation without a Trusted Third Party | 2008-11-20 | Paper |
https://portal.mardi4nfdi.de/entity/Q3518416 | 2008-08-07 | Paper |
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting | 2008-03-07 | Paper |
General and Efficient Certificateless Public Key Encryption Constructions | 2007-11-29 | Paper |
Advances in Cryptology - EUROCRYPT 2004 | 2007-09-25 | Paper |
https://portal.mardi4nfdi.de/entity/Q3442462 | 2007-05-18 | Paper |
Cryptography and Coding | 2006-11-01 | Paper |
Financial Cryptography and Data Security | 2005-12-22 | Paper |
Public Key Cryptography - PKC 2005 | 2005-12-07 | Paper |
https://portal.mardi4nfdi.de/entity/Q4448425 | 2004-02-18 | Paper |
https://portal.mardi4nfdi.de/entity/Q4408453 | 2003-06-29 | Paper |
https://portal.mardi4nfdi.de/entity/Q4501498 | 2002-08-05 | Paper |
https://portal.mardi4nfdi.de/entity/Q4249273 | 1999-06-17 | Paper |
https://portal.mardi4nfdi.de/entity/Q4373664 | 1998-01-21 | Paper |